Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. Meanwhile, sociopolitical values in Israeli society have undergone several changes since 2011, not to mention the continuing conflict with the Palestinians. This study, therefore, aims to elaborate on the concept of national security, differentiate national security from similar concepts, and identify the threats to Israel's national security, represented by challenges arising from actions without states in the Syrian border areas, namely Quneitra, Suwayda and Daraa. Also, this study demystifies the aspects of Israel's strategies to address these challenges after 2011. Thus, this study draws on three key border cities, Quneitra, Swayda, and Daraa, which are vital parts of Syria.
Purpose: As managers can lead a set of ways to improve internal communication in public organizations, and leadership can cultivate a common understanding of goals within the organization and share the vision in preparation for its way to better performance, the purpose of the research is to assess the type and strength of the relationship between internal communication and different forms of leadership. Theoretical framework: The study demonstrates how leaders in public organizations improve internal communication, related to employees' perceptions of public organizations' routines and performance. Design/methodology/approach: The study uses the ordinary least squares (OLS) and applied multiple regression A sa
... Show MoreInvestigating the strength and the relationship between the Self-organized learning strategies and self-competence among talented students was the aim of this study. To do this, the researcher employed the correlation descriptive approach, whereby a sample of (120) male and female student were selected from various Iraqi cities for the academic year 2015-2016. the researcher setup two scales based on the previous studies: one to measure the Self-organized learning strategies which consist of (47) item and the other to measure the self-competence that composed of (50) item. Both of these scales were applied on the targeted sample to collect the required data
This research aims to deal with contemporary knowledge methodology to correlate between operations strategy and technological change or modernization in productive paths for industrial organizations depend on practical indicators for competitive priorities that is objectives of operations performance.
The research is based on main hypothesis, concentrates on determination of technological change which is decided by the level of technology deterioration in current operations path compared with the competitors leaders-technology leaders.
We apply these concepts on hypothetical case to two similar companies in their production nature and te
... Show MoreThere were signs of the first civilization known to humanity for more than 6000 years BC in the north of Iraq have disappeared this civilization to appear after 500 years in southern Iraq, the Sumerian civilization, which was considered as the opinion of scientists or civilizations, exceeds the impact to Asia and the countries that had been in contact (Sumerians) and see them today in other towns and villages. In subsequent periods of time appeared distinct personalities to their nature, religious, social, special clothing with clothes seem especially long. And usually dress is made from raw wool material making them in the Sumerian era. Put the garment on the body and leaves the top of the right shoulder with the survival of an ope
... Show MoreX-ray emission contains some of the gaseous properties is produced when the particles of the solar wind strike the atmosphere of comet ISON and PanSTARRS Comets. The data collected with NASA Chandra X-ray Observatory of the two comets, C/2012 S1 (also known as Comet ISON) and C/2011 S4 (Comet PanSTARRS) are used in this study.
The real abundance of the observed X-ray spectrum elements has been extracted by a new simple mathematic model. The study found some physical properties of these elements in the comet’s gas such as a relationship between the abundance with emitted energy. The elements that have emission energy (2500-6800) eV, have abundance (0.1-0.15) %, while the elements
... Show MoreThe importance of our research is that it examines the causes and sources of the security challenges in the internal security environment of the GCC countries, and aims to address the most important issues that are of great interest, namely, the issue of inter-GCC differences and addressing the issues of regional security for the Gulf region, After it is one of the most dynamic and more polarized areas for the emergence of threats and challenges because of the multiplicity of sources of threat and their complexity due to the specificity of the strategic environment and the negative repercussions it can have on the Gulf region, especially the issue of regional security of the Gulf Cooperation Council Which has become a magnet for competing i
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
يتناول البحث مسؤولية منتسبي قوى الامن الداخلي عن اعمالهم الشخصية
مشكلة البحث واهميته
يعد الامن النفسي من الحاجات الاساسية اللازمة للنمو النفسي السليم لكل فرد، واذا ما اشبعها الانسان تهيأ لاشباع حاجاته النفسية والاجتماعية الاخرى. وتشتمل هذه الحاجة على تجنب الالم والتحرر من الخوف اياً كان مصدره والشعور بالطمأنينة الاقتصادية والاجتماعية والجسمية والحصول على تقبل الاخرين ورضاهم، فضلاً عن تقبل الفرد لنفسه وقناعته ورضاه عنها.
ان الشعور ب
... Show More