Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. Meanwhile, sociopolitical values in Israeli society have undergone several changes since 2011, not to mention the continuing conflict with the Palestinians. This study, therefore, aims to elaborate on the concept of national security, differentiate national security from similar concepts, and identify the threats to Israel's national security, represented by challenges arising from actions without states in the Syrian border areas, namely Quneitra, Suwayda and Daraa. Also, this study demystifies the aspects of Israel's strategies to address these challenges after 2011. Thus, this study draws on three key border cities, Quneitra, Swayda, and Daraa, which are vital parts of Syria.
The world went through turmoil before the sixth century AD, and human societies were in conflict and rivalry, each strong state is a weak state-dependent, but the dominant societies made the slave societies to them .. And thus made many societies or civilizations system of classes, and differentiation between members of one community, Weakened its strength and go alone. As the Islamic society in the present weak and weak and falling to the lowest levels of civilizational underdevelopment in the organization of society and social security contrary to what it was Islamic civilization, because of our distance from the heavenly instructions, and this prompted many to walk behind Western ideas aimed at the demolition of Islamic civilization,
... Show MoreThe definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions, Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.
الشيخ الحاج محمد الأمين، من الشخصيات التي كتبت بعلامات بارزة تاريخ شعبها والمنطقة، من خلال مقاومة الاحتلال الفرنسي الصليبي في السودان الغربي، ونشره الاسلام بين القبائل الوثنية، القاطنة هناك و قيادة حركة قومية إسلامية لإعادة أمجاد الشعب السراكولا ،وإحياء إمبراطورية غانا الإسلامية والتي كانت تشكل الجزء الأغلب من السودان الغربي.
The new sustainable development goals set by the UN include a goal of making cities inclusive, safe, sustainable, and resilient. Cities are growing at huge rates, and conditions of deteriorating QOL̛s are increasing in the form of poor access to services, and slums are remarkable, especially in the cities of the Middle East; hence, the research problem can arise from a lack of knowledge regarding the in determination of a way to assess the resilience of cities to develop mechanisms that will improve the quality of urban life. In this study, a tool called CRF has been applied for the assessment of the city's resilience principles of health and quality of life, economics and social, infrastructure and environmental systems, and the principle
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreThe aim of the research is to identify to what extent to which Malcolm Baldrige standards of total quality are applied in the after-sales services of a private sector company for electrical appliances, from the point of view of administrative leaders, in it. To achieve this aim a questionnaire has been used to measure the degree of application of Malcolm’s seven criteria for total quality, namely: (leadership, strategic planning, focus on the customer, measurement and analysis and knowledge management, focus in human resource and operation management and results of the company’s management), the research found that the company achieved a good level of the standard from the de
... Show MoreBasically, media studies focused on the important role of the blogs in boosting the democratic process in the Arab States. Blogs also worked on creating an alternative media for the public that maintained freedom of expression. However, media studies ignored the status of the blogs in the social and cultural fields.
The current study tries to tackle the socio-cultural dimensions of the blogs by means of showing how the blogs construct the self. The researcher is going to conduct interviews with the bloggers. He will also carry out a semiotic analysis that may reveal the strategies used by the bloggers. Besides, he tries to identify the realistic and traditional frames in which the social relationships are buil
A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
The current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security
The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:
- The members of the sample have an intellectual Security.
- The members of the sample have