Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of this feature in the application of access and control methods in terms of security. Based on this, we propose a model for improving security for all departments of government institutions by addressing security issues early in the system's life cycle, integrating them with functional elements throughout the life cycle, and focusing on the system's organizational aspects. The main security aspects covered are system administration, organizational factors, enterprise policy, and awareness and cultural aspects.
SAIs has a pivotal role in enhancing public sector performance through its quest to achieve the greatest possible efficiency and effectiveness in its, so it has to adopt applied framework for abilities building, the research aims to shed light on the role of SAIs and the nature of their work, and the definition for its abilities building, and to prepare a proposal for abilities building applied to work with the SAI in the Republic of Iraq (of the Federal Board of Supreme Audit ),the Researchers reached conclusions, namely: abilities building is the outcome of the interaction between the reality of all of the employees of the SAI and the institution itself and the environment and the specific requirements of the de
... Show MoreA legal discourse in the Qur’an and Sunnah is almost devoid of the use of one of the general formulas, and due to its frequent rotation in the tongue of the legislator, the formulas may overlap their members in apparently contradictory provisions, which makes the individual from the general members appear to the beholder to be covered by two contradictory provisions, and this research came to present what might happen to him The legal text interpreter of weighting between the two opposing texts is the strength of the generality that is established by the generality formula, so the two strongest formulas in the inclusion of its members outweigh the weaker of them and precede them, and the research decided that the formulas vary
... Show MoreThis study aims at evaluating the performance of MA students in the College of Education for Women in using the digital transformation and identifying the significant difference in performance evaluation according to the variable of academic qualification (Master or PHD). In order to achieve the aim of the research the researcher prepared a questionnaire of 20 items, and this happens after the researcher's getting acquaintance of the literature of previous studies related to the variable of the research. The apparent validity of the items was examined by exposing them to 10 juries specialized in education, psychology and evaluation and measurement. The stability of the items was examined via two methods, the test-repetition and half-divisio
... Show MoreAbstract: The article aimed to formulate an MLX binary ethosome hydrogel for topical delivery to escalate MLX solubility, facilitate dermal permeation, avoid systemic adverse events, and compare the permeation flux and efficacy with the classical type. MLX ethosomes were prepared using the hot method according to the Box–Behnken experimental design. The formulation was implemented according to 16 design formulas with four center points. Independent variables were (soya lecithin, ethanol, and propylene glycol concentrations) and dependent variables (vesicle size, dispersity index, encapsulation efficiency, and zeta potential). The design suggested the optimized formula (MLX−Ethos−OF) with the highest desirability to perform the
... Show MoreEstimation of the unknown parameters in 2-D sinusoidal signal model can be considered as important and difficult problem. Due to the difficulty to find estimate of all the parameters of this type of models at the same time, we propose sequential non-liner least squares method and sequential robust M method after their development through the use of sequential approach in the estimate suggested by Prasad et al to estimate unknown frequencies and amplitudes for the 2-D sinusoidal compounds but depending on Downhill Simplex Algorithm in solving non-linear equations for the purpose of obtaining non-linear parameters estimation which represents frequencies and then use of least squares formula to estimate
... Show MoreThe study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.
The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via
... Show More