Purpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration. Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance. Design/methodology/approach: To investigate the effect of information technology; we the value-added intellectual coefficient approach and a defined corporate governance index were utilized. The performance of the company was assessed using operating efficiency ratio and Economic value Added (EVA). Findings: the results Show there are the high level of application of ITG in the banks listed in the Iraqi stock exchange. Also, we found the effectiveness of ITG under the COBIT framework in banking financial performance. Research, Practical & Social implications: The findings should inform practitioners and legislative institutions of the necessity to follow strong COBIT procedures and enhance the effectiveness of IT to produce a better financial performance for firms. Originality/value: the study is among the first to consider the casual connections and how COBIT policies for ITG affect financial performance in the setting of Iraq.
O estudo destaca a necessidade crítica de se focar nas capacidades físicas, motoras e técnicas das jogadoras de esgrima, desenvolvendo e testando metodologias de treino modernas, baseadas na ciência, adaptadas às exigências específicas do desporto. O objetivo do estudo foi avaliar a eficácia do treino tridimensional visando melhorar as capacidades motoras e o desempenho técnico dos participantes. Recorrendo a um desenho experimental, o estudo envolveu a formação de grupos experimentais e de controlo. A amostra incluiu 16 esgrimistas da Faculdade Feminina de Educação Física e Ciências do Desporto. Após a exclusão de dois jogadores durante a fase exploratória, os restantes 14 foram divididos igualmente em grupos experimental
... Show MoreThe current search aims to identify First: To measure the level of authoritarian personality among the students of the sample as a whole. Second: Measurement of differences in the level of authoritarian personality among students in the middle school according to the following variables 0.Science (literary, scientific) 8. Sex (male - female) Third: the level of control site level among the students of the sample as a whole. Ra'aa: Measurement of differences in the level of the control site among junior students according to the following variables 0.Science (literary, scientific) 8. Sex (male - female) Fifth: Explain the relationship between the authoritarian personality and the locus of control among the students of the research sample.
... Show MoreThe study deals with an analysis of the contents of the publications of the campaign (Together to defeat Corona), which was established by the United Nations Development Program in Iraq in the face of the Covid 19 virus.The research problem raises a main question:What are the implications of the campaign (Together to defeat Corona) of the United Nations Development Program (Iraq office) in addressing the Covid-19 virus in Iraq?From this main question, several sub-questions emerged, which were answered by this study in its chapters and investigations, including regarding the contents of advertisements, photos and videos for the publications of the (Together to Defeat Corona) campaign for the United Nations Iraq Office on their Facebook pageA
... Show MoreAbstract
Business organizations are using the technological innovations like cloud computing (CC) as a developmental platform in order to improve the performance of their information systems. In that context, our paper discusses know-how in employing the public and private CC to serve as platforms to develop the evaluation system of annual employees' performance (ESAEP) at Iraqi universities. Therefore, we ask the paper question which is “Is it possible to adopt the innovative solutions of ICTs (Like: public and private CC) for finding the developmental vision about management information systems at business organizations?”. In addition, the paper aim
... Show MoreThe purpose of this study is to examine the effect of human resource diversity management practices on achieving entrepreneurship in Jordanian public universities. To achieve the aims of the study, a well-designed questionnaire was used for collecting data. The population of the study was (7433) faculty members (including different ranks such as professors, associate professors, assistant professors and lecturers) in Jordanian public universities. The study sample was selected through the use of a random sample, the questionnaire is distributed to a sample (of 400 with the percentage of 5%) selected by using a random sampling (350) copies of the questionnaire were collected, reaching about (87.5%) out of the sum total of the dist
... Show MoreIt is very well known in the planning publications that when creating spacing development to a region or sub-region, it can be able to make more than an alternative consisting with the strategic directions overtaken from the actual development of region and the situational and developmental objectives needed. However, the difficulty facing the situational planning is in selecting one of these alternatives to be the best in order to make a balanced situational re-structure, and achieving the economic, social and civil objectives. The developmental situation elements in the regions and governorates, including (Karbala) impose themselves as situational power which implies the process of re-structural arrangement where the situational develo
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More