This research study examines the impact of information technology on firm profitability and stock returns. Using a comprehensive dataset of firms across various industries, this research employs rigorous statistical analysis techniques to investigate the relationship between IT investments, firm profitability metrics, and stock returns. The study focuses at how IT investments affect financial performance measures including return on assets (ROA) and return on equity (ROE), with P-values of 0.34 and 0.12, respectively. Furthermore, the study investigates the influence of IT on stock returns, taking into account market capitalization, industry trends, and macroeconomic variables. This study's conclusions center on the beneficial association between IT investments and corporate profitability. The T-value for the IT investment has risen to 6.5. The analysis reveals that firms that strategically leverage IT investments tend to experience higher profitability metrics. Additionally, the research demonstrates the impact of IT on stock returns, highlighting the significance of IT as a driver of firm value and investor confidence. Moreover, this study delves into the mechanisms through which IT investments contribute to firm profitability and stock returns. It investigates the mediating role of factors such as process innovation, customer relationship management, and supply chain optimization, which facilitate the translation of IT investments into improved financial performance. The implications of this research are significant for both practitioners and policymakers. The findings provide valuable insights for firms seeking to enhance their profitability and create shareholder value through strategic IT investments. Additionally, policymakers can use these findings to formulate policies and initiatives that promote the adoption and effective utilization of IT in businesses across various sectors
Information centric networking (ICN) is the next generation of internet architecture with its ability to provide in-network caching that make users retrieve their data efficiently regardless of their location. In ICN, security is applied to data itself rather than communication channels or devices. In-network caches are vulnerable to many types of attacks, such as cache poisoning attacks, cache privacy attacks, and cache pollution attacks (CPA). An attacker floods non-popular content to the network and makes the caches evict popular ones. As a result, the cache hit ratio for legitimate users will suffer from a performance degradation and an increase in the content’s retrieval latency. In this paper, a popularity variation me
... Show MoreObjectives: The study objectives were to evaluate customer satisfaction with community pharmacy services and measure the relationships between customer satisfaction and pharmacy/pharmacist characteristics and customer quality of life. Methods: This was a cross-sectional survey of a convenience sample of customers at 20 community pharmacies in 10 different geographical areas in Baghdad city between May and September 2018. We used the satisfaction items which were developed by Paterson and colleagues in 2013. The survey also assessed customer quality of life (QoL) with 12 QoL items. Results: The study recruited 400 pharmacy customers. Overall, customers reported good satisfaction with community pharmacy services. The most
... Show MoreThe transition of professionals between different sectors is considered as one of sources of
acquisition of technology and will lead to add the practical experience to them. This experience
depending on different factors like: the scientific degree and practical experience by the
professionals, the technology possessed by the transferor sector, the duration that spent by
experienced in transferor sector, the type of work performed by professional….etc.
The research aims to verify the affect of these factors in technology transfer process.
Research reached that the technology transfer process which is depending on the Iraqi competencies
in work is unsatisfied level between Iraqi organizations because there are dif
Hydrocarbon displacement at the pore scale is mainly controlled by the wetness properties of the porous media. Consequently, several techniques including nanofluid flooding were implemented to manipulate the wetting behavior of the pore space in oil reservoirs. This study thus focuses on monitoring the displacement of oil from artificial glass porous media, as a representative for sandstone reservoirs, before and after nanofluid flooding. Experiments were conducted at various temperatures (25 – 50° C), nanoparticles concentrations (0.001 – 0.05 wt% SiO2 NPs), salinity (0.1 – 2 wt% NaCl), and flooding time. Images were taken via a high-resolution microscopic camera and analyzed to investigate the displacement of the oil at dif
... Show MoreHydrocarbon displacement at the pore scale is mainly controlled by the wetness properties of the porous media. Consequently, several techniques including nanofluid flooding were implemented to manipulate the wetting behavior of the pore space in oil reservoirs. This study thus focuses on monitoring the displacement of oil from artificial glass porous media, as a representative for sandstone reservoirs, before and after nanofluid flooding. Experiments were conducted at various temperatures (25 – 50° C), nanoparticles concentrations (0.001 – 0.05 wt% SiO2 NPs), salinity (0.1 – 2 wt% NaCl), and flooding time. Images were taken via a high-resolution microscopic camera and analyzed to investigate the displacement of the oil
... Show MoreNon-thermal argon plasma needle at atmospheric pressure was
constructed. The experimental setup was based on a simple and low
cost electric component that generates a sufficiently high electric
field at the electrodes to ionize the argon gas which flow at
atmospheric pressure. A high AC power supply was used with 1.1
kV and 19.57 kHz. Non-thermal Argon plasma used on blood
samples to show the ability of non-thermal plasma to promote blood
coagulation. Three tests have been done to show the ability of plasma
to coagulate both normal and anti-coagulant blood. Each blood
sample has been treated for varying time from 20sec. to 180sec. at
different distances. The results of the current study showed that the
co
In this study, hydroxyapatite (HAP, Ca10(PO4)6(OH)2) has been prepared as bioceramic material with biological specifications useful to used for orthopedic and dental implant applications. Wet chemical processing seems to form the fine grain size and uniform characteristic nanocrystalline materials by the interstice factors controlling which affected the grain size and crystallinity in order to give good mechanical and/or constituent properties similar as natural bone. Fluorinated hydroxyapatite [4-6 wt% F, (FHA, Ca10(PO4)6(OH)2–Fx] was developed in new method for its posses to increased strength and to give higher corrosion resistance in biofluids than pure HAP moreover reduces the risk of dental caries. The phase's and functional groups
... Show MoreThe current research aims to shed light on the Global Reporting Initiative (GRI), which helps to report financial and non-financial information by economic units in general and listed on the Iraq Stock Exchange in particular. The research was based on a main premise that apply the criteria of the Global Reporting Initiative (GRI) would provide useful information to users to help them make appropriate decisions. To achieve the goal of the research, the descriptive analysis method was used, and quantitative analysis was used. At the level of the descriptive analysis method, a desk survey was conducted. As for the quantitative analysis, it relied on applied data through a questionnaire form (Questioners) as a research tool, and the
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More