Preferred Language
Articles
/
abaa-946
Content of Data Journalism in Security Topics - Security Media Cell Model Research extracted from a master’s thesis

This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in different ways, the most important of which are narrative texts supported by pictures that express the nature of the security event, and the respondents' preference for social networking sites in following up on press releases.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 19 2024
Journal Name
Al–bahith Al–a'alami
Information Pollution in Iraqi Journalism…Study in Causes and Sources - A research drawn from a Master Degree thesis

Information pollution is regarded as a big problem facing journalists working in the editing section, whereby journalistic materials face such pollution through their way across the editing pyramid. This research is an attempt to define the concept of journalistic information pollution, and what are the causes and sources of this pollution. The research applied the descriptive research method to achieve its objectives. A questionnaire was used to collect data. The findings indicate that journalists are aware of the existence of information pollution in journalism, and this pollution has its causes and resources.

Crossref
View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
The security environment in Northeast Asia between American authority and Chinese influence

The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.

Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional lea

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
A Review of Assured Data Deletion Security Techniques in Cloud Storage

      Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Nov 19 2024
Journal Name
Al–bahith Al–a'alami
IRAQ YOUTH TRENDS TOWARDS CELEBRITY ADVERTISEMENTS ON SOCIAL MEDIA : (A research taken from a Master Degree thesis)

In the light of what is witnessing in the advertising arena of new ways and methods in delivering advertising message to consumers by finding new outlets to communicate with them especially through social networking sites, which became the first choice of advertising companies in order to spread its goods and services. These companies now are relying gradually on celebrities to appear with their products and goods to drive the audience's  attention towards them. The thesis aims to find out the attitudes of young people towards the the advertisements that show famous celebrities on social networking sites. The researcher used survey method which aims to record, analyze and interpret the phenomenon after collecting the necessa

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
Tendencies of Scientific Research in the Specialized Journalism: the Media Researcher Magazine A sur-vey study

The study of the tendencies of scientific research in specialized journalism through the three specialized levels, specifically the third level. It is referred to be a monthly, quarterly or annual magazine that follows the publication of the researches for new studies which have come to in every specialization. it is directed to the highly educated and is almost an alternative book. Thus, the subject is specialized and the audience is specialized.

The study aims in both its survey and field section at knowing the type of researches and their classification and the form, gender and the use of foreign sources and their scientific tank and the geographical position in addition to knowing the opinions of researchers and their satisfa

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication