Preferred Language
Articles
/
abaa-407
ELEMENTS OF BUILDING CONTENT FOR GOVERNMENT WEBSITES: : (An Experimental Study)
...Show More Authors

The study dealt with measuring the impact of the availability of each of the content elements of the interaction, electronic services, and information on the evaluation of the users of the government website for its effectiveness in terms of the site’s functions and for measuring the site’s ability to present the organization’s tasks to customer groups.

Authority is concerned with measuring the confidence of customers in the content of the site, and in the organization as a whole. Validity is related to measuring the effectiveness of employing the site’s content to achieve the goal of its creation and in communicating with customers. Availability It is for measuring the ease of use of the site. The relevance, which means measuring the compatibility of the site’s form and content with the nature and identity of the governmental organization. Then, presentation tools which are for measuring the multiplicity of content presentation tools.

And that is through an experimental study that relied on building a virtual government website, which was designed in terms of form and content in four copies. The content elements for each version were controlled. Then, each site was made available through an experimental group that used it and navigating its parts. Later, testing of a five-element scale was choosing to measure each group’s perception of site quality.

The study reached a number of results, the most important of which is the absence of sufficient information about the organization on its website; and the absence of information on the tasks and services performed by the government website that leads to a poor evaluation of the site's users in terms of the site's ability to introduce the organization and achieve its functions and support interaction with clients; the confidence in the site in terms of information and services it provides; and in terms of providing privacy and maintaining customer data; its ease of use and identification of its components and content and the employment of its tools.

Its ability to express the government’s identity and representation to the organization after it is one of its communicative methods. As well as the ability of site users to deal with multiple content tools with their different capabilities and categories. The absence of interaction tools on the government’s website, moreover, leads to a poor evaluation of the site’s users in terms of the website’s ability to achieve e-participation standards and continuous communication with customers.; as well as the ease of use.

The absence of government service delivery through the organization's website, however, leads to a poor assessment of site users for quality elements.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 16 2019
Journal Name
Al–bahith Al–a'alami
Academic Trends of Paper Press in Comparison with Internet Press A Field Study on Professors o College of Media at University of Baghdad
...Show More Authors

This search seeks to know the trends of academics in the field of Press and audio, video and read press about paper press compared with continued development and widespread deployment of web journalism. This research belongs to descriptive studies which depends on sample survey approach adopted by five-meter design measuring trends. It contains 28 items having applied honesty and reliability transaction and the scale form is distributed to the sample studied of about 110 professors and then the researcher collects them and then applying the appropriate statistical program to get the results. This search seeks to know the trends of academics in the field of Press and audio, video and read press about paper press compared with continu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The extent of the contribution of internal marketing in the management of human talent survey study of the views of some administrative leaders at the University of Mosul
...Show More Authors

 Abstract

Investment in the human resource has become an important part of the strategies of educational organizations so that they can be competitive, so that the access of academics in universities to the international awards as a result of their research excellence indicates the effectiveness of this human talent so the interest has emerged in the implementation of a strategy to manage these human talent in organizations in general and educational ones In particular as one of the power sources  that can not be imitated. The focus of the organization on the interaction between the working people has increased attention to the human element in order to achieve the desired quality levels, which called for organi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of performance of some industrial companies In the default reference comparison method Field study in the public companies of cement (Iraqi - North - South
...Show More Authors

The increasing Global Competitive and the continuous improvement in information technology has led the way to the development of the modern systems and using modern techniques. One of these techniques is benchmarking style and Total Quality Management all of them are used to improve the production process and target rid from the losts on the other side.

The Benchmarking style has become a very important for all the industrial systems and the serving systems as well. And an instrument to improve their performance specially those which are suffering from the highness of the costs or waste in time on the other side.

This study aims to depend on virtual Benchmarking style in the eval

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 22 2025
Journal Name
Al–bahith Al–a'alami
SOCIAL MEDIA AND ITS ROLE IN THE PRODUCTION AND NUTRITION OF CRISES: "ANALYTICAL STUDY OF A SAMPLE OF TWITTER DURING THE GULF CRISIS 2017"
...Show More Authors

Social networking sites have become very popular since the beginning of the current decade and have become linked to our daily life. We follow the news, Analyses  and opinions on the one issue in a way that attracts millions of users and the number grows every secon On Twitter, one of the most important social networking sites, all social groups rushed from the president to the last citizen to open accounts when they found themselves forced to do so .

During the recent Gulf crisis, Twitter was buzzing with Twitter, which achieved the largest circulation globally. Instead of serving the issue and directing it to serve the Arab interest, most of the publications were on th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2008
Journal Name
Journal Of Engineering
GEOTEXTILE AND GEOMEMBRANE USAGE IN AN IRAQI SANDY GEOENVIRONMENT
...Show More Authors

The work in this research presents an experimental and a theoretical study to obtain the effect of using a low permeability geosynthetic material on the longitudinal and lateral coefficients of dispersion. This would have its effect on the contaminants migration through an isotropic, homogenous and saturated soil. The first stage of this research involves the study of the geosynthetic material and in calculating the longitudinal and lateral coefficients of dispersion for an Iraqi sandy soil by using an experimental set-up to simulate the processes. To investigate the effect of using a geosynethtic material on the dispersion coefficients, the test was conducted for each velocity that was used in the experimental work and as follows:  with

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 26 2020
Journal Name
Al-kindy College Medical Journal
Prevention in Healthcare Practice: An issue with Rising Importance
...Show More Authors

Plentiful of healthcare practice is based on a disease/treatment approach rather than a prevention one.  That is, the predominant focus is on treating existing symptoms and conditions that bring the patient to healthcare setting. There is no doubt about the significance of this approach for acute conditions, but there is some question whether this is the most efficient and effective way of distributing healthcare for increasing number of diseases and limited resources.

The evidences from everywhere have showed the profound cost benefit of prevention in healthcare practice. Healthy community, therefore, is the ultimate aim in any health services planning. The priority of care giver is shifted now to promote health and prevent

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication