تشهد الساحة الاعلامية في وقتنا الحاضر تطورات سريعة وبشكل متزايد سواء في طريقة صناعة الرسالة الاعلامية او اسلوب تقديمها وعرضها ،وفي ظل تعدد وتنوع وسائل الاعلام الجديد والزخم الاعلامي الذي يتعرض له المستخدم فيجد نفسه وسط كم هائل من الاخبار متعددة المصادر والاشكال ، فكيف له ان يميز بين المعلومة الصادقة والزائفة ؟ ومادرجة ثقته بتلك المعلومات والمواقع الالكترونية ؟ ويهدف البحث الى الكشف عن مدى توفر عناصر صناعة المحتوى الاعلامي واختبار العلاقة بينها وبين مستويات ثقة الجمهور بالمواقع الالكترونية؟ ويعد البحث من البحوث الوصفية التي تسعى الى رصد مستويات ثقة الجمهور بالمواقع الالكترونية وتحديد عناصر صناعة المحتوى الاعلامي الذي يتمتع بدرجة مصداقية عالية لدى الجمهور عبر استخدام المنهج المسحي ويتمثل مجتمع البحث بالجمهور من مستخدمي المواقع الالكترونية وحددت عينة قصدية من المبحوثين الذين يتعرضون الى الاخبار عبر المواقع الالكترونية وللوصول الى المستخدمين استخدمت الباحثتان عينةكرة الثلج عبر استخدام اداة الاستبانة لتحقيق اهداف البحث وفروضه والتي اشتملت على محاور عدة تحاكي تساؤلات البحث وفروضه واهدافه .
The success of the company's strategy depends to a large extent on the success of its functional areas, the marketing Mix makes the company more able to monitor the external environment and the rapid changes related to competitors and customers, as well as the innovation contributes to meet the needs of customers and the requirements of competition and try to find solutions to various problems in Innovation ways, and thus integrated marketing and Innovation efforts in the company towards the design of competitive services to meet the requirements of customers and competition. The research aims to determine how marketing Mix and innovation to design unique and distinct services compared to the competitors, through exporator a sample of en
... Show MoreMottos Of Opposition Movements In iraq during the umayyad period and their religious and political indications - al shia and al khawarij
This study aims to know the extent of the impact of Strategic Leadership as an independent variable in Strategic Learning as a dependent variable to help the senior leadership in Anbar University to take the right decisions to develop Strategic Learning programs in light of the circumstances of the Covid-19 and the sudden decisions adopted by the university to switch to E-learning and to blend. The survey was conducted by distributing a questionnaire that was adopted as a primary tool in data collection from the study sample represented by the university's senior leaders, An intentional random sample of (105) was selected from our community of (127), the data were analyzed by (SPSS) Depe
... Show MoreThe topic of the research tagged (narrative structure and its impact on building open and closed endings in the fictional film) is summarized by studying the mechanism of employing closed and open endings in the fictional film. novelist, then the need for it, as well as the objectives of the research and clarifying its limits as well as its importance. Then moving to the theoretical framework, which included three topics, where the first topic was entitled (the cinematic construction of the film narrative), either the second topic (the structure of complexity and narrative solutions), or the third topic dealt with the subject (the structure of the end and its relationship to the construction of the narrative). After completing the theore
... Show MoreThis study aimed to statement jet stream and its impact in the anti-cyclone affecting the climate of Iraq. Through the use of simple correlation coefficient ( Pearson ) that there is a very strong relationship between high- Siberian and both of the jet stream especially during the winter or over the stations of North . Therefore we, observe the relationship be significant in most of the winter months , spring and autumn . Statistically significant , but are different between station and another station , while the study come to another Anti-ciyclon have a real ,significant and statistically relationship corrclation . But this relationship is less than which found in are much less it with the Siberian high , it depends on the type of stat
... Show MoreThis paper addresses the factors responsible for changes in crude oil prices, in real market and financial sector. In order to prepare the analytical background for further investigation, it highlights the patterns of correlations of the real oil price and the most related prices of assets, exchange rate and government bond yield. The paper reviews the statistical behavior of oil price, quantities and the global macroeconomic environment. Topics discussed include the theory of differential rent and scarcity effect ,the role of future market and speculation, strategies of energy of the major economies to investigate the prospects of oil market and the potential demand for OPEC's oil. The paper explores the
... Show MoreImage compression is an important tool to reduce the bandwidth and storage
requirements of practical image systems. To reduce the increasing demand of storage
space and transmission time compression techniques are the need of the day. Discrete
time wavelet transforms based image codec using Set Partitioning In Hierarchical
Trees (SPIHT) is implemented in this paper. Mean Square Error (MSE), Peak Signal
to Noise Ratio (PSNR) and Maximum Difference (MD) are used to measure the
picture quality of reconstructed image. MSE and PSNR are the most common picture
quality measures. Different kinds of test images are assessed in this work with
different compression ratios. The results show the high efficiency of SPIHT algori
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More