Social networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the questionnaire form to identify the Iraqi academic elite's attitudes towards the role of social network sites in the formation of electronic public opinion towards security crises that Iraqi society has witnessed. By distributing the questionnaire to 112 of academic lecturer of various specializations and scientific titles, the researcher has come up with a number of results:
1-lecturers at Iraqi universities use Facebook in a percentage of 92%
2-Most of the Iraqi academic elite user social networking sites for three hours every day
3-The statement “expressing public opinion towards various security events and crises” has taken the first place in a percentage of 90% ranking as the most important communicative advantages achieved when using the social networking sites.
MT Abed, ALSG Irhayyim, TH Rija, International Journal of Psychosocial Rehabilitation, 2020 - Cited by 1
Recently, Malaysia has been recognized as one of the most popular destinations for Foreign Direct Investment (FDI) in Southeast Asia. But how do these FDI inflows affect Malaysia economy? This paper aims to identify the role of FDI inflows in Malaysia economic growth through a proposed endogenous growth model. Annual data covers from 1975 to 2010. Unit root test and Johansen Co-integration test are adopted to respectively verify the time series data is stable and the linear combination of the variables is stationary. Hierarchical Multiple Regressions (HMR) Analysis is then conducted to find out the momentum of the Malaysia economic growth including FDI inflows. The results show that the FDI inflows together with the human capital deve
... Show MoreIn this paper, customers’ expectations are continually shifting due to the business environment’s growing competition and substantial changes. As a result, organisations no longer viewed it as a static objective but as an ever-evolving aim. From this vantage point, the research has explored the accounting literature in search of novel approaches to addressing the strategic dimensions of quality, cost and time. Getting them to respond positively to the customer’s requests also requires recognising their needs and controlling their impact on these dimensions. With the removal of operations that do not contribute any value to the product’s value chain and a reduction in manufacturing costs through continuous improvement, the ou
... Show MoreIt has become clear to see the role of the small and medium enterprises in the economy, and for the continuity of these projects it is necessary to supply finance from the banks, How ever the latter suffers risk of lending.
&n
... Show MoreThe administration on the basis of the activities designed to evaluate the performance of activities in terms of cost, time and quality by identifying activities that add value and those that are no add value and enables the administration of making up their own continuous improvement in production, through lower costs and reduce the time and improve the quality and reduce the incidence of spoilage and waste, y based search Ally premise that (the continuous improvement of the adoption of management style on the basis of the activities helps management in decision-making wise to reduce costs) to prove the hypothesis has sought research to achieve its goal of Alkadivh and Alkoppelan &nb
... Show MoreAbstract
The decision maker needs to understand the strategic environment to be addressed through different means and methods. It is obvious that there is a difference between the three strategic environments (conflict environment, peace environment, post- peace environment) in terms of inputs and strategies to deal with each one of them. There is an urgent need to understand each pattern separately, analyze its inputs, and identify the factors and variables that affect the continuity of this situation (conflict, peace, post-peace). It is not appropriate to identify treatment without diagnosis of the condition, so it is very important to understand the type of strategic environment to be dealt with it.
... Show MorePurpose: The research aims to explore the impact Business Intelligence System (BIS) and Knowledge Conversion Processes (KCP) in the Building Learning Organization (LO) in KOREK Telecom Company in Baghdad city.
Design/methodology/approach: in order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then has tested the search in the telecommunications sector, representatives of one of the telecommunications companies in Baghdad city, has therefore chosen KOREK Telecom company as a sample for research, and the choice was based on the best standard international companies to serve mobile communications in terms o
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More