The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the state issuing it does not take precedence over the interest of society as it is prevalent in traditional punitive laws (and the Iraqi law among them). In addition to the importance of expanding the legal diagnosis of images of indirect prejudice to social security that takes the form of media, economic and political activity, whether its source is internal or external. And presenting an integrated vision of state security that goes beyond the traditional formula in distinguishing between internal and external state security and considers the holistic character of the concept of state security in the modern era.
Reflect the sustainable development of the interaction of three key elements are the economic component and the social component and the environmental component while focusing economic component to achieve economic growth and focuses social element to achieve social justice in the distribution of income and achieve prosperity, the environmental component related fields and including emphasizes the protection of the environment and to ensure the continuation and sustainability of resources physical, biological and form in which it believes the interaction required for development process real and effective and sustainable, and is considered the province of Kurdistan Iraq of important areas where the movement of developmental mount
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThe research aims to clarify the role of the main variable represented by the four dimensions of entrepreneurial behavior (creative, risk-taking, seizing opportunities, proactivity), in Reducing the dependent variable of organizational anomie with the dimensions (Organizational Normlessness, Organizational Cynicism, Organizational Valuelessness).
The experimental, analytical method was adopted in the completion of the research, and an intentional sample of (162) individuals in the administrative levels (higher and middle) in the factory was taken. The questionnaire was also adopted as the main tool, which
... Show Moret
The research deals with the statement of the importance of unanimous in Islamic Sharia in terms of being the third source of Islamic legislation after the Holy Qur’an and the Sunnah of the Prophet, and the extent of interest of the scholars of interpretation in it, and those who took great interest in mentioning what was agreed upon in every site that necessitated mentioning its issues within, or mentioning an event that has encountered an unanimous, and in various sciences, to extract and extrapolate Sharia rules when these rules are lost in the texts, because it is based on them and derived from them. Among these distinguished scholars is Muhammad bin Jarir al-Tabari. Besides, the research discusses in
... Show MoreIN this work, a titanium dental implant was modified by electro-polymerized of 4-allyl-2-methoxyphenol (Eugenol) using direct current lower than 3.5 volt. The modification of titanium dental implant was achieved to improve its corrosion resistant. Fourier transform infrared spectroscopy (FTIR) was employed to confirm the electro-polymerization of Eugenol to Poly Eugenol (PE) on pure titanium. Deposition of PE on titanium was confirmed by X-ray diffraction and was characterized by thermogravimetric analysis (TGA). The surface morphology of polymeric film were examined through scanning electron microscopy (SEM). Coated titanium by (PE) revealed a good corrosion protection efficiency even at temperature ranged (293-323)K in artificial saliva.
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreThis paper studies a novel technique based on the use of two effective methods like modified Laplace- variational method (MLVIM) and a new Variational method (MVIM)to solve PDEs with variable coefficients. The current modification for the (MLVIM) is based on coupling of the Variational method (VIM) and Laplace- method (LT). In our proposal there is no need to calculate Lagrange multiplier. We applied Laplace method to the problem .Furthermore, the nonlinear terms for this problem is solved using homotopy method (HPM). Some examples are taken to compare results between two methods and to verify the reliability of our present methods.
The research amid to measure the extent of the Suggested procedures of the internal control in accordance with the updated COSO framework in improving the procedures for internal control work in Iraqi oil companies. As the research problem was represented in suggesting procedures for internal control according to the updated COSO framework and finding out the relationship of correlation and influence between the suggested procedures and the internal control procedures that are done in the Iraqi oil companies. The research followed the quantitative approach to handling and analysing data by designing a Questionnaire to represent the research tool for collecting data. The study population was represented in the Iraqi oil companies,
... Show MoreThe health care provided by health institutions and all kinds suffers from many problems, and since the health services provided are related to human life, it is necessary to shed light on this activity and identify the causes of these problems. This research aims to Definition of health institutions (hospitals) Performance audit of these institutions according to the latest indicators, which are the standards of health accreditation for hospitals, specifically the basic standards issued by the Health Care Accreditation Council (HCAC) to reach the level of performance and Knowledge of Constraints that lead to in an acceptable manner consistent with the approved standards. In theoretical and practical study, a number of conclusions were r
... Show More