This study investigates self-perception and self-branding on Instagram among young Arab women in the UAE, focusing on how they curate, negotiate and perform their digital identities and whether their digital self-presentation in any way compromises their sense of authenticity. The study is based on 11 interviews with young women in the UAE, between the ages of 20 and 30, in addition to online observation to follow the participants’ activities on Instagram. The study demonstrates that while social and digital media platforms may play a role in “empowering” Arab women, women tend to set their boundaries of authenticity shaped according to their audience’s expectations and their in-groups. This confirms the role of collectivistic culture in the Arab cultural context, where women may feel more scrutinized than men.
This research focuses on the services provided by news websites (IMN, Youm7, Huffington Post Arabic) to its audience of Internet users, as well as materials posted through its pages, trying to monitor and explain them to identify their types & features, and it›s functions, whether informational or non-informational, to know the technical potential of each of the news sites, with the entry of the latest technology information. The research used the analysis method to achieve the research objectives within the period from 1/1 to 31/1/2017. The researchers used the content analysis tool as a research tool to analyze the news sites and to know the services they provide through their pages. The research was divided into three parts, the
... Show MoreThe current research tries to identify the employment of the digital technology in the formation of the theatrical show space. The researcher started with the significant importance of the digital technology and its workings in the formation of the contemporary theatrical show being a modern, artistic, aesthetic, intellectual and technological means to convey the topic in an integrated manner, as well as its close connection with the creative directive vision and the creative designing vision. It provides a variety of models of numerous implications in terms of transmission and advancement of the relationships represented by clarifying the scenography and dramatic conflict forms according to the numerous motivations of the directo
... Show MorePurpose: To identify the risk factors of urinary incontinency for menopausal women.
Methodology: A descriptive analytic study was conducted to identify the risk factor for urinary incontinency
and selected non-probability sample (purposive sample) from (200) menopausal women (45-65) who have
urinary incontinence as visitors and caregiver women who attend at Hila surgical teaching hospital during the
period 1/11/2010-30/3/2011. Questionnaire format used for data collection was designed and constructed
after reviewing related literatures and previous studies and consists of the following variables: Demographic
and reproductive characteristics of menopausal women who suffers from urinary incontinence
Results: The study
Objectives of the study: Assess pregnant women's knowledge about tetanus toxoid vaccination, to find out the
relationship between pregnant women's knowledge and some variables which included: (age, level of
education, occupational status, socio-economic level, gravidity, parity, following visits of antenatal care,
tetanus toxoid vaccination coverage).
Methods and Materials: Descriptive analytic study conducted on multistage probabilistic sample of 130
pregnant women during period from 30th January 2012 to the 24th April 2013 was carried out in the six primary
health care centers at Karbala city. The questionnaire was consisted of four parts which include of: sociodemographic
characteristics, reproductive information,
This study aimed to measure digital stress among students at the University of Baghdad and to identify differences in digital stress based on gender (male–female), academic level (first–fourth year), and field of study (scientific–humanities). The study sample consisted of 200 students from the University of Baghdad. The "Digital Stress" scale, developed by the researcher specifically for this study, was applied, and the descriptive-analytical method was adopted. After administering the scale and analyzing the results using appropriate statistical methods, the findings indicated that university students experience a high level of digital stress, while no statistically significant differences were found in digital stress accord
... Show MoreThis study dealt with the basics of financial inclusion in terms of concept, importance and objectives, The empowerment of women financially and bank,and then the relationship between financial inclusion and women, and determine the requirements of inclusion Financial resources for women. The analytical descriptive method was used for data, which included reviewing and analyzing information And data in economic and financial literature. The study: reached a number of conclusions, the most important of which are Financial inclusion contributes to women's financial and banking support, as there is a positive relationship between financial institutions Banking and women's access to financial and banking services, thus playing a role i
... Show Moreتهدف الورقة البحثية الى اعداد مشروع لصناعة مكتبة رقمية للطالب في قسم علوم القران الكريم والتربية االسالمية في كلية التربية ابن رشد للعلوم االنسانية / جامعة بغداد ، اعدت الباحثة استمارة نموذج كوكل تضمنت مجموعة من االسئلة الغرض منها تحديد المؤلفات االساسية التي يحتاجها طالب العلوم االسالمية في دراساته وابحاثه ،واعتمدت الباحثة على المنهج الوصفي اسلوب المسح لجمع البيانات ، ووزعت االستمارة عبر الصفوف االلكترو
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
خضعت العلاقة بين موقف الحساب الجاري, سواء اكان بحالة عجز ام فائض, وسعر الصرف, اكان بحالة انخفاض او ارتفاع, لجدل واسع بين اوساط الاقتصاديين بشأن هذه العلاقة واتجاهاتها.
الا ان الاعتماد المتزايد لبعض الدول على المستثمرين الاجانب لتمويل العجز في حساباتها الجارية قد يصطدم بعدم رغبة هولاء المستثمرون في الاستمرار باقتناء موجودات معينة مقوِِِِِِِِمة بعملات تلك الدول. وتنشأ الطامة الكبرى لاقتصاد
... Show MoreIn this work, zinc oxide nanoparticles (ZnONPs) and sawdust/epoxy composite (20:80) were mixed using a simple molding method with different ZnONPs concentrations of (0.1, 0.3, 0.5, 0.7, and 1.0 %). The samples of the nanocomposites were characterized by the Scanning Electron Microscopy (SEM) technique to demonstrate the homogeneity of the prepared ZnONPs/nanocomposites. The photocatalytic activity of the samples was examined using the methylene blue (MB) dye as a pollutant solution, through evaluation of the efficiency of the prepared compound in the treatment of organic pollutants under illumination by sunlight. The photocatalytic results showed that after 240 minutes of exposure to sunlight, the sample prepared using (0.5 vol.% of ZnON
... Show More