As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak of the Russian-Ukrainian war, which affected food supply chains and was important for wheat. The Gaza war caused consequent repercussions on energy crossings and supplies in the Eastern Mediterranean and West Asia. Owing to these factors, there have been repercussions on regional and international hubs and blocs in the Middle East. Additionally, the continued US-Iranian escalation on controversial issues worsened the situation. The US- Iranian influence essentially imposed
Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreIn light of the developments and intense competition that the world has witnessed, the need to search for a sustainable and continuous competitive advantage for economic units has emerged, as the economic units must not lose sight of their interest in the activities they perform to achieve that advantage, and it can be said that the goal of the research is to identify the theoretical dimensions of the green value chain represented by: (Green research and development, green design, green manufacturing, green marketing, green services) and the dimensions of the sustainable competitive advantage represented by (quality, creativity, innovation, cost, response to the customer), as well as identifyi
... Show MoreThe research aims to show the possibility of adopting the market approach to measure the fair value of biological assets in Iraq, by applying to a sample of the company listed on the Iraq Stock Exchange, where the Middle East Fish Production and Marketing Company was selected from among 7 companies representing the agricultural sector in Iraq, and according to the availability of data and for five years, the financial statements were presented of the measurement and disclosure of biological assets at fair value according to the market approach, One of the most important conclusions reached by the researcher is the The possibility of measuring and disclosing biological assets at fair value according to the market approach in the Ira
... Show Moresome ecological (physical and chemical varible) of water samples were studies monthly from December 2008 to May 2009 at two stations( St.1) Al - Chibayesh marsh and (St.2) Abu – Zirik marsh which are located in the south of Iraq . These variables included : Temperature, pH, EC, Dissolved oxygen , Total alkalinity, Nitrate, Sulphate, and phosphate, Si-SiO2 and Ca ,Mg, Cl, The marsh Considered as fresh water and alkaline. Abu-Zirik less than Al-Chibayesh.
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreThe investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .
&nb
... Show MoreDBNRHM Sami, International Journal of Research in Social Sciences and Humanities, 2020
The research aims to study the elements of attraction in television advertising and determine their relationship to consumer preferences, the extent to which the sample (250) watches television advertisements, and the motives for viewing. Males and females, and the statistical program spss was used to analyze the results using percentages, arithmetic mean, correlation coefficients ch2, Pearson’s coefficient and Alpha Cronbach for the stability of the test, and the research came to the conclusion that the percentage of watching television advertisements is good motivated by the identification of new goods and services in the market, as advertisements sometimes achieve consumer preferences, and the most prominent The forms that a
... Show MoreThe Legend between reality and its future Treatment in threatre analytics study