In the last years, a new technology called Cloud computing has been developed. Empirical and previous studies, commonly examined in business field and other domains. In this study, the significant factors that affecting the adoption of cloud computing have been examined using a frequency analysis that have been explored by the previous studies. The results showed that the most effected factors were relative advantage which followed by security and privacy, complexity, innovativeness, and external support. In this study the model of technology organization-environment was used to examine the significant factors that affecting the adoption of cloud computing.
The study aimed to identify the effect of the ethical perception of a sample of managers in public organizations on responsible behavior in light of the rapid changes taking place in the external environment. To achieve this, the researcher followed the descriptive analytical approach by applying a questionnaire of two parts. The first part dealt with the ethical perception according to the scale of Johnson (2015), which consisted of (22) items. The second part dealt with measuring responsible behavior, which consisted of (20) items based on the scale of Development of Ethical Behavior (Narvaez, 2006) for a sample of (125) respondents randomly chosen. The results showed that the estimation degree of managers in public governmental o
... Show MoreObjective: To find out if there are any significant differences between these women's knowledge in the
management of Breast Self-Examination in study and control group regarding some variables.
Methodology: A quasi-experimental design was used. A purposive "non-probability" sample of (260) women who
are employee and students in both colleges (Nursing and Health and Medical Technologies) was selected. The
sample consists of two groups, experimental group (130) includes those in (Nursing college), and control group
(130) in (Health and Medical Technologies). A questionnaire was constructed which included demographic
information, reproductive information, family history, previous medical history, and information about wome
Abstract
This research aims to study human error effects in the banking risks in the private banks through the measurement and testing of human error effect in every kind of banking risks types and stand on the most closely associated with the risks in order to focus on them and make appropriate processors have with respect to and increase the availability of skills and expertise required to carry out banking operations of error-free manner.
Find dealt with human error in terms of meaning and understandable, classifications and types, causes and consequences and its approaches and theories. Also addressed placed banking risks in terms of meaning and concept, species and entr
... Show MoreEducation varies in terms of form and content between verbal and abstract education through the delivery of knowledge and enriching experiences through verbal communication and ephemeral learning and based on sensory experiences that provide visual and audio visualizations that make it imperative to install and retain knowledge and experience. It is obvious that meanings And the concepts grow the more tangible sensory experiences that make the process of communication highly efficient, and the more the learner's acquisition of direct sensory experiences, ie the first source is the life situations and normal circumstances of the process of communication, but if these can not be available It is necessary to a
... Show MoreAbstract
Objective(s): To evaluate blended learning in nursing education at the Middle Region in Iraq.
Methodology: A descriptive study, using evaluation approach, is conducted to evaluate blended learning in nursing education in Middle Region in Iraq from September 26th, 2021 to March 22nd, 2022. The study is carried out at two Colleges of Nursing at the University of Baghdad and University of Tikrit in Iraq. A convenient, non-probability, sample of (60) undergraduate nursing students is selected. The sample is comprised of (30) student from each college of nursing, Self-report questionnaire is constructed from the literature, for e
... Show MoreThe paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreTo determine the evaluation of education program on women's knowledge regarding managing BSE. The present quasi- experimental study, Non-probability (purposive), sample consisting of (260) women who are employee, and students in both colleges (Nursing college, Medical and Health Techniques College). The sample consist of two groups, study group (130) including those in (Nursing college), and control group (130) in (Medical and Health Techniques College). A questionnaire was constructed which included, Demographic information, Reproductive information, Family history, Previous medical history, and information about women's knowledge toward management of breast self examination (BSE). Instrument validity and reliability was determined. Data w
... Show More