Scams remain among top cybercrime incidents happening around the world. Individuals with high susceptibility to persuasion are considered as risk-takers and prone to be scam victims. Unfortunately, limited number of research is done to investigate the relationship between appeal techniques and individuals' personality thus hindering a proper and effective campaigns that could help to raise awareness against scam. In this study, the impact of fear and rational appeal were examined as well as to identify suitable approach for individuals with high susceptibility to persuasion. To evaluate the approach, pretest and posttest surveys with 3 separate controlled laboratory experiments were conducted. This study found that rational appeal treatment has a significantly stronger impact than the fear appeal. This result is a starting point in suggesting that rational appeal is a promising means in persuading individuals with high susceptibility to persuasion.
Due to the low cost of both unsaturated polyester resin and the plant fibers along with protect of the environment, the wasted Carrot fibers were employed in this study to strengthen and color the resin. Carrot peels powders have been incorporated with unsaturated polyester/ natural fibers (UPE/C.F) gel coats to form a good candidate with good mechanical behaviors in different industrial applications. The wasted carrot peels fibers, were dried, crashed and milled into micro particles sizes (2.5% microns) to improve the mechanical properties (impact energy, Compressive load and Elastic Modulus) of unsaturated polyester. Micro carrot fibers (C.F) have been loaded to unsaturated fibers a
The provision of openings in serviceable reinforced concrete beams may result in a substantial decline in the beam's capacity and integrity, indicating the necessity of opening strengthening. The present study investigates the experimental response of reinforced concrete T-beams with multiple web-strengthened openings disposed in shear span to static and impact loads. Fourteen RC T-beams were tested in two groups, each of seven beams. The first group was tested under static loading up to failure, while the second group was tested under repeated impact loading until the width of shear cracks reached 0.3 mm. The residual static strengths of the beams subjected to impact loading were then determined. The test variables considered were
... Show MoreThe provision of openings in serviceable reinforced concrete beams may result in a substantial decline in the beam's capacity and integrity, indicating the necessity of opening strengthening. The present study investigates the experimental response of reinforced concrete T-beams with multiple web-strengthened openings disposed in shear span to static and impact loads. Fourteen RC T-beams were tested in two groups, each of seven beams. The first group was tested under static loading up to failure, while the second group was tested under repeated impact loading until the width of shear cracks reached 0.3 mm. The residual static strengths of the beams subjected to impact loading were then determined. The test variables considered were
... Show MoreIn this study, the effect of glass fiber reinforced polymer (GFRP) section and compressive strength of concrete in composite beams under static and low velocity impact loads was examined. Modeling was performed and the obtained results were compared with the test results and their compatibility was evaluated. Experimental tests of four composite beams were carried out, where two of them are control specimen with 20 MPa compressive strength of concrete deck slab and 50 MPa for other. Bending characteristics were affected by the strength of concrete under impact loading case, as it increased maximum impact force and damping time at a ratio of 59% and reduced the damping ratio by 47% compared to the reference hybrid beam. Under stat
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show Morebased search on two variables two main (Administrative empowerment ) and (technical innovation) target detection relationship and influence between the five dimensions (the delegation of authority , personnel training , effective communication, work teams , motivating employees) and
(technical innovation) conducted research in General Company for electrical Industries , and through the sample included the views of managers in the various administrative levels poll .
And adopted a researcher at a major tool for data collection is questionnaire designed to find, as was the contents of the questionnaire analysis according to the Statistical Information System ( Spss), The (55) to identi
... Show MoreBreast cancer is one of the most important malignant diseases all over the world. The incidence of breast cancer is increasing around the world and it is still the leading cause of cancer mortality An Approximately 1.3 million new cases were diagnosed worldwide last year. With areas rising increasing, risk factors for breast cancer including obesity, early menarche, alcohol and smoking, environmental contamination and reduced or late birth rates become more prevalent. In Iraq, breast cancer ranks first among types of cancers diagnosed in women. This study was conducted on one hundred twenty women with breast cancer that was evaluated and investigated for the possible role of the risk factors on the development of breast cancer in females. T
... Show MoreObjective(s): to assess the effectiveness of educational program on nurses' knowledge concerning the side
effects of chemotherapy among children with leukemia.
Methodology: A descriptive analytic (quasi – experimental) design study was carried out at Baghdad City from
2
nd of October to 27th of June 2015. Non-probability sample of (35) male and female nurses was selected from
the Oncology Wards in Children Welfare, Child's Central and Baghdad Teaching Hospital. The study
instruments consisted of two major parts to meet the purposes of study. The first part is related to nurses'
demographic characteristics and the second part (four domains) is related to nurses' knowledge concerning the
side effects of chemothera
The current study aims to show the importance of plant products as mosquitocides against Culex quinquefasciatus. Castor oil Nanoemulsions were subedit in various ratios including castor oil, ethanol, tween 80, and deionized water by using ultrasonication. Thermodynamic, centrifugation, PH, assay which improved that the formula of 10 ml of castor oil, ethanol 5ml, tween 80 (14 ml) and deionized water 71ml was more stable than other formulas. The stable formula of castor oil nanoemulsion was characterized by transmission electron microscopy (TEM) and dynamic light scattering (DLS). Nanoemulsion droplets were spherical in shape and were found to have a Z-average diameter of 87.4nm. A concentration of ca
... Show MoreThis study aimed at analyzing and studying the strategic and geopolitical importance of the Sahel region, which increased the regional competition for the resources of the region, especially the energy resources that have been and continue to be one of the axes of conflict and competition between these forces.
The researcher tried to review the competition between the international force, France, the United States of America, China, Algeria and Libya, and the African coast. We note that there is a positive correlation between the severity of the conflict and the intensity of the competition of the major powers to control the countries of the region and the extent of political and economic stability These countries are directly affecte