In the last years, a new technology called Cloud computing has been developed. Empirical and previous studies, commonly examined in business field and other domains. In this study, the significant factors that affecting the adoption of cloud computing have been examined using a frequency analysis that have been explored by the previous studies. The results showed that the most effected factors were relative advantage which followed by security and privacy, complexity, innovativeness, and external support. In this study the model of technology organization-environment was used to examine the significant factors that affecting the adoption of cloud computing.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThis paper set forth the spatial suitability of the informal settlement supposed to be distributed by the Iraqis government to poor people. The Iraqi government identified 9 locations of informal settlement in Baghdad city and acceptance it as a reality as a help for them to getting home. In this paper I discovered the suitability of those locations which one will be suitable more than others for living. The analysis process was applied using the GIS environment – spatial analysis. According to the results, It has been identified as the most important measures to identify which one of these areas suitable for development for housing by using some criteria (Distance from the city center, Proximity from transport routes, Proximity of high v
... Show MoreVocational education has great importance to comprehensive national development as it provides intermediate cadres able of operating the factories and laboratories in the farms and fields beside the work in the fields of health, service, administration and commercial. Due to the importance of this type of education in society, it is necessary to do a qualitative reform of vocational education in order to make the educational staffs get the necessary basic expertise to adapt the requirements of the labor market and try to rearrange and organize the workforce through put long-term economic and social policy through certain planning open to the workforce. The workforces structure according to gradual expansion in all the national ec
... Show MoreMicrofinance Institutions (MFIs) offers small loans with easy repayment system and till now these institutions have served millions of needy people around the globe. This study highlights the hurdles influence the smooth working and growth of Microfinance institution in Egypt. The structured interviews were conducted from the top and mid-level managers of MFI's. This study revealed that interest rate, political and economic conditions, corruption, customer outreach, competition and technology are the important elements for MFI's success. It is evident that lack of use of technology and less importance drawn on customer outreach programs are the main challenges of MFI's in Egypt. This study provides a roadmap for practitioners and strategic
... Show More
The objective of this study is to measure the impact of financial development on economic growth in Iraq over the period (2004-2018) by applying a fully corrected square model (FMOLS) Whereas, a set of variables represented by (credit-to-private ratio of GDP, the ratio of money supply in the broad sense of GDP, percentage of bank deposits from GDP) were chosen as indicators for measuring financial development and GDP to measure economic growth.
Major tests have been carried out, such as the stability test (Unite Root Test), the integration test (Cointegration). Results of the study showed that there
... Show MoreThe process of stocks evaluating considered as a one of challenges for the financial analysis, since the evaluating focuses on define the current value for the cash flows which the shareholders expected to have. Due to the importance of this subject, the current research aims to choose Fama & French five factors Model to evaluate the common stocks to define the Model accuracy in Fama& French for 2014. It has been used factors of volume, book value to market value, Profitability and investment, in addition to Beta coefficient which used in capital assets pricing Model as a scale for Fama & French five factors Model. The research sample included 11 banks listed in Iraq stock market which have me
... Show MoreProvides the style of benchmarking the best possible use whenevaluating the performance and evaluation, as well as improved performance,due to its consistency with the principles of good evaluation of theperformance, an extension of the completion of several functions of the timeand cost less, thereby increasing the efficiency of the management of theinstitutions, especially institutions, the media, as it became public the future ofthe message sender to the same time Zaorosaúl new media is challenging thetraditional media of what distinguishes this new interactive media and mass ledto this transition . However, the media Aljdidhoosaúl traditional mediacontinue to coexist and reinforce each Menhmaalakhr, for his wealth offreedom of opin
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More