Quality of e-service is one of the critical factors that decide the success or failure of organizations. It may increase competitive advantages as well as enhance the relationships with the customers. Achieving high e-service quality and user satisfaction are challenging since they depend fundamentally on user perception and expectation which can be tricky at times. To date, there is no agreement as to what service quality is, and how it should be measured, whether it is a function of statistical measures of quality including physical defects or managerial judgment, or it is a function of customer perception about the services. This paper deep-dived the quality of e-services offered by five Malaysian Institutes of High Learning (IHL) including two private and three public universities. A quantitative approach was utilized to collect the data and AMOS 21 was used to analyze the data and develop the measurement model. The paper aims to find the relationship between e-service quality dimensions and the user satisfaction by using Conformity Factor Analysis (CFA) test with 320 students in the target universities. The research results indicated that the measurement model has acceptable values and the Structural Equation Model (SEM) has positive impact on the relationship between e-SQ dimensions and user satisfaction. Achieving high user satisfaction can enhance the competitive advantage of the universities in their respective target markets.
This study investigates the requirements of total quality management (TQM) and the determinants affecting its application in Al-Zaman newspaper, one of Iraq’s leading private press institutions. The research employed a survey methodology, using a structured questionnaire administered to 30 participants representing journalistic, administrative, and technical staff. Five TQM dimensions, each measured through four indicators, were assessed to capture the perceptions of employees regarding the availability and effectiveness of quality practices. Data were analyzed using the Statistical Package for the Social Sciences (SPSS). The results revealed that while senior management at Al-Zaman demonstrates formal support for TQM, there is a
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreAbstract
The research aimed to test the relationship between the size of investment allocations in the agricultural sector in Iraq and their determinants using the Ordinary Least Squares (OLS) method compared to the Error Correction Model (ECM) approach. The time series data for the period from 1990 to 2021 was utilized. The analysis showed that the estimates obtained using the ECM were more accurate and significant than those obtained using the OLS method. Johansen's test indicated the presence of a long-term equilibrium relationship between the size of investment allocations and their determinants. The results of th
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreIn this paper, a discrete SIS epidemic model with immigrant and treatment effects is proposed. Stability analysis of the endemic equilibria and disease-free is presented. Numerical simulations are conformed the theoretical results, and it is illustrated how the immigrants, as well as treatment effects, change current model behavior
This research aims to identify the effective role of self-managed teams in the quality of service performance in the directorate of Ramadi municipality. The problematic nature of our research involves this main question of the effective role of self-managed teams in the Municipality of Ramadi in improving the services of performance quality to the beneficiaries from the Directorate service. The importance of this study lies in the role played by the work teams in the organizations that excel in their field, the attendant of the changes in the leadership, administrative roles of the institutions, and teams leaders, will be achieved by the self-managed teams in improving the quality of the service provided by the institution to whi
... Show MoreObjectives of the study: The study aims to assess satisfy of the coronary artery patients for the care product from
the nurse and physician and to find out the relationship between patient satisfaction with the social and the
clinical characteristics of the patients.
Methodology: A descriptive design study conducted using the evaluation approach for the duration of June 3
rd
2012 to January 31, 2013. Non-probability sample of (60) patients who were visiting or admitted (inpatient or
outpatient) to the teaching hospital in Baquba with the diagnosis of coronary artery disease. A questionnaire have
been built and develop by the researcher based on review of literature and previous research, the form included of
(3) p
"The aim of the research is to identify the availability of the dimensions of the research variables represented by organizational symmetry and the quality of work-life at the University of Information and Communications Technology, which is one of the formations of the Ministry of Higher Education and Scientific Research in Baghdad, in addition to knowing the relationship and influence between them. The research relied on the descriptive analytical approach based on peer description. The research was analyzed and the research sample consisted of (148) individuals, the sample was chosen using the comprehensive inventory method, data was obtained by relying on the questionnaire which was prepared from ready-made m
... Show MoreAbstract:
The distribution or retention of profits is the third decision among financial management decisions in terms of priority, whether at the level of theory or practice, as the issue of distribution or retention is multi-party in terms of influence and impact, as determining the optimal percentage for each component is still the subject of intellectual debate because these decisions are linked to the future of the organization and several considerations, The research focus on the nature of the policies followed by the Iraqi banking sector As the sample chosen by the intentional sampling method was represented by the Commercial Bank of
... Show More