This study investigates self-perception and self-branding on Instagram among young Arab women in the UAE, focusing on how they curate, negotiate and perform their digital identities and whether their digital self-presentation in any way compromises their sense of authenticity. The study is based on 11 interviews with young women in the UAE, between the ages of 20 and 30, in addition to online observation to follow the participants’ activities on Instagram. The study demonstrates that while social and digital media platforms may play a role in “empowering” Arab women, women tend to set their boundaries of authenticity shaped according to their audience’s expectations and their in-groups. This confirms the role of collectivistic culture in the Arab cultural context, where women may feel more scrutinized than men.
Architecture has evolved through the ages as forms, relationships, materials and mechanisms according to the data of each era and up to the era of digital technology, where the change in proportions and aesthetic dimensions of contemporary architectural formation due to the capabilities of digitization has created innovative plastic properties using the void formation in the facades and the introduction of void as a formative and aesthetic element, which led to The emergence of new creative concepts and ideas that contradict traditional ideas and are consistent with the spirit of the times, led to a revolution in the world of architectural form at the level of (architectural ideas and the generation of shapes, materials and construction
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe research seeks to highlight the importance of digital finance in banking by providing financial and banking services and its role in improving the access of financial services to customers at the farthest possible point by using modern technology to finance their needs by granting them cash credits through electronic payment tools to facilitate them and shorten time and effort as well as Low cost, and this cannot be achieved without concerted efforts and the provision of basic infrastructure that includes connecting the Internet to all targeted areas, whether cities or rural areas, as well as distributing the largest possible number of ATMs and sending specialized teams to those areas that develop in customers the culture of digital
... Show Morethe digital public relations aim at make the workers getting the necessary information about the governmental institutions where they work and the enveronment surrounding them. it also tries to let the workers get the special knowlege of tthe publich relations and their jobs like the works of planning , arranging the active communication and executive skills needed in their writing , editing , special art skills for designing , production and technological skills to deal with the computer.
the problem of the research includes some questions as :
1- what are the uses achieved by degetal public relations workers at Iraqi universities (Baghdad, Mustansiriya, and Iraqi)
2- what are the tools used to apply digital public relations
This study aimed to identify the role of digital transformation in improving the quality of the internal audit process. The researchers used the descriptive analytical approach, and the questionnaire was relied on as a study tool that was applied to the study population consisting of internal auditors working in banks listed on the Palestine Stock Exchange, and their number was (85). A checker and a comprehensive inventory method was used due to the small size of the community, where the response data of the questionnaire was analyzed and interpreted using the Statistical Packages Program (SPSS).
The results of the study showed that the use of digital transformation contributes to ensuring the quality of
... Show MoreThis study dealt with the basics of financial inclusion in terms of concept, importance and objectives, The empowerment of women financially and bank,and then the relationship between financial inclusion and women, and determine the requirements of inclusion Financial resources for women. The analytical descriptive method was used for data, which included reviewing and analyzing information And data in economic and financial literature. The study: reached a number of conclusions, the most important of which are Financial inclusion contributes to women's financial and banking support, as there is a positive relationship between financial institutions Banking and women's access to financial and banking services, thus playing a role i
... Show Moreتهدف الورقة البحثية الى اعداد مشروع لصناعة مكتبة رقمية للطالب في قسم علوم القران الكريم والتربية االسالمية في كلية التربية ابن رشد للعلوم االنسانية / جامعة بغداد ، اعدت الباحثة استمارة نموذج كوكل تضمنت مجموعة من االسئلة الغرض منها تحديد المؤلفات االساسية التي يحتاجها طالب العلوم االسالمية في دراساته وابحاثه ،واعتمدت الباحثة على المنهج الوصفي اسلوب المسح لجمع البيانات ، ووزعت االستمارة عبر الصفوف االلكترو
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
خضعت العلاقة بين موقف الحساب الجاري, سواء اكان بحالة عجز ام فائض, وسعر الصرف, اكان بحالة انخفاض او ارتفاع, لجدل واسع بين اوساط الاقتصاديين بشأن هذه العلاقة واتجاهاتها.
الا ان الاعتماد المتزايد لبعض الدول على المستثمرين الاجانب لتمويل العجز في حساباتها الجارية قد يصطدم بعدم رغبة هولاء المستثمرون في الاستمرار باقتناء موجودات معينة مقوِِِِِِِِمة بعملات تلك الدول. وتنشأ الطامة الكبرى لاقتصاد
... Show MoreIn this work, zinc oxide nanoparticles (ZnONPs) and sawdust/epoxy composite (20:80) were mixed using a simple molding method with different ZnONPs concentrations of (0.1, 0.3, 0.5, 0.7, and 1.0 %). The samples of the nanocomposites were characterized by the Scanning Electron Microscopy (SEM) technique to demonstrate the homogeneity of the prepared ZnONPs/nanocomposites. The photocatalytic activity of the samples was examined using the methylene blue (MB) dye as a pollutant solution, through evaluation of the efficiency of the prepared compound in the treatment of organic pollutants under illumination by sunlight. The photocatalytic results showed that after 240 minutes of exposure to sunlight, the sample prepared using (0.5 vol.% of ZnON
... Show More