Preferred Language
Articles
/
abaa-494
PRESS COVERAGE OF CRISES: (A Research Drawn from a Doctoral Thesis)
...Show More Authors

Media is one of the main and effective factors; and it is a tool of crisis management equipment. Media is one of the most dangerous, effective and decisive weapons in modern conflicts; a tool for making events and influencing their events and trends as a means of reporting as the enormous capabilities of media which help media to move very quickly, and cross borders; and overcome obstacles, through many means of audio, reading and visual. As its ability, moreover, to influence the psychological and intellectual control of communities, and behaviors.

Intelligent media is, then, used in crises management and coverage. Crises have been existed with the presence of man on Earth. Their occurrence coincided with the various activities man has practiced on the planet. On an individual level, some crises pose a serious threat to human life and property.

At the state level, crises can have obvious effects. In addition to increasing their burdens and responsibilities, they can lead to a radical change in the economic, political and social conditions that threaten its existence or expose it to consequences beyond its means. Therefore, the issue of crises of all kinds has become one of the most important topics of interest to researchers, especially the diversity of crises and increasing risks.

All countries, without exception, are vulnerable to any kind of crises. Crises have become an integral part of the fabric of contemporary life. This leads to pay attention to the scale of crises management.

Although crises media is one of the research fields that has attracted the interest of researchers and media specialists in universities and research centers European and American for more than four decades. As a result, its theoretical concepts and practical applications have been crystallized.

However, Arab studies in the field of media relations with political crises and security events did not appear significantly until after the eighties of the last century.

Even after the emergence of this type of specialized media studies, what exists is only the beginnings of further research and study on one hand, and the link between its theoretical and applied fields on the other.

What is existed in reality is a natural extension of what is prevalent in the theories and models of media influence that preceded this kind of specialized studies.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
Misan Journal Of Academic Studies
مجالس الوعظ والوعاظ عند المسلمين من خلال كتب الحسبة.
...Show More Authors

كانت المجالس وما ا زلت تعقد فػي البيػوت او الػدواويف الرسػمية ينػاقش فيهػا المجتمعػوف امػوره الخاصػػة والعامػػة وقػػد اخػػذت هػػذ المجػػالس عمػػ عاتقهػػا نشػػر عمػو العممػػا والقصائد الشعرية والاخبار السياسية والفكاهية وكاف يحضرها مختمؼ ش ا رئح المجتمع ساعدت هػذ المجػالس عمػ حفػظ التػ ا رث العربػي الاسػلامي مػف مثُػؿ وقػي خمقيػة لكػف بسبب الفػتف المذهبيػة التػي سػادت المجتمػع فػي القػرف الخػامس الهجػري

... Show More
Publication Date
Tue Sep 27 2022
Journal Name
Arab Science Heritage Journal
قضية قانونية من العهد الاشوري القديم في بلاد الأناضول
...Show More Authors

  Assyrian merchants established in the second millennium BC Assyrian commercial settlements in Anatolia, and these settlements had a great cultural value

View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The poetry attributed to The Islamic orthodox caliphs
...Show More Authors

The Islamic orthodox caliphs had a great importance in the history of Arabs in
particular, and of Muslims in general.
Some attributed poetry to them. This issue to see whether such an attribution is correct
or not.
This research tried to deal objectively with this poetry .it discussed the topic,
exploring the scholars’ opinions about poetry attributed to the Islamic orthodox
Caliphs, stating their dispute : some of them agreed while others rejected the
attribution.
The research adopted the opinon that had rejected for reasons stated in the
research, of them: the weakness of poetry and its dealing with unimportant things, for
example, the caliph Omar composed verses about a new garment worn by him.
Is it

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2006
Journal Name
Political Sciences Journal
ملامح من فكرة القانون الطبيعي في حضارة العراق القديم
...Show More Authors

ملامح من فكرة القانون الطبيعي في حضارة العراق القديم

View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
مجلة نسق
الطرائق التربوية والنفسية في الوقاية من الإدمان على المخدرات
...Show More Authors

View Publication
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Woman's Quest for Survival: Margret Drabble's The Millstone
...Show More Authors

This study deals with The Millstone (1965) which is a dramatic depiction of a single
mother heroine in a classic predicament. This novel is considered as representative of the age
in which it was written. The primary theme is her intense preoccupation with questions of
fatalism and will. The work also involves, both explicitly and implicitly, feminist concerns.
Because the central protagonist is a woman and the society in which she lives is depicted,
accurately, as deeply patriarchal and class-bound, the problem of the individual's capacity for
self-determination is inevitably tied to the feminist perspective.

View Publication Preview PDF
Publication Date
Sun Jan 13 2019
Journal Name
Arab Science Heritage Journal
عزل بعض الجراثيم المرضية المشتركة من الأغنام العواسية المحلية
...Show More Authors

استهدف البحث الحالي عزل بعض الجراثيم المرضية المشتركة وشملت Listeria monocytogenes و Salmonella spp. و Brucella abortus من أنسجة أعمار مختلفة من الأغنام العواسية المحلية . أخذت عينات من الكبد والكلى والدم ومن محتويات منتصف أمعاء ثلاث مجاميع عمرية من الأغنام العواسية من مجزرة الشعلة ببغداد شملت أعمار اقل من سنة واحدة وسنة إلى سنتين وأكثر من ثلاث سنوات . بينت النتائج عزل جراثيم Listeria monocytogenes  و Salmonella spp. و  Brucella abortus من كافة المجاميع

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
التدقيق الداخلي وأثرة في الحد من ظاهرة غسيل الأموال
...Show More Authors

Still Financial institutions, including banks, a key target for money launderers to transfer illicit funds to the legitimate funds and by weaknesses in the internal audit procedures applied in the banks or through a lack of legal structure to combat this phenomenon in addition to the procedures by other regulations                                                                

T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Study the Axail Dispersion Model in Ion Exchange Column
...Show More Authors

A mathematical model is developed which predicates the performance of cylindrical ion exchange bed involving comparing of axial dispersion model for cation exchange column with different assumption, this model permits the performance to predicate the residence time within the bed with the variance, axial dispersion and Pecklet No. to indicated deviation from plug flow model.

      Two type of systems are chosen for positive ions first with divalent ions (Ca+2) to exchange with resin of Na+1form used as application in  water softener units and second with monovalent ions (Na+1) to exchange with resin of H+1 form used as application in deionize water units &n

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref