المحاسبة السحابية افق جديد لتنظيم العمل المحاسبي
Cloud computing is the new technological trend for future generations. It represents a new way to use IT resources more efficiently. Cloud computing is one of the most technological models for developing and exploiting infrastructure resources in the world. Under the cloud, the user no longer needs to look for major financing to purchase infrastructure equipment as companies, especially small and medium-sized ones, can get the equipment as a service, rather than buying it as a product. The idea of cloud computing dates back to the sixties of the last century, but this idea did not come into actual application until the beginning of the third millennium, at the hands of technology companies such as Apple, Hp, IBM, which had
... Show Moreان وضع معايير دولية محاسبية على شكل نماذج وارشادات عامة تؤدي باصحاب القرارات الاقتصادية استخدام معايير المحاسبة الدولية عند اعداد وتجهيز القوائم والبيانات المالية اصبح مطلب اساسي وضرورة ملحة لمختلف الاطراف في المجتمع الحالي فهذه المعايير قد اثمرت في معالجة الامور المحاسبية على الصعيد المحلي والاقليمي والدولي. وان عدد كبير من الدول اعتمدت هذه المعايير فقد تجاوزت 150 بلدا. مما نتج عنه ازالة الفوارق الكث
... Show MoreThe rapid success and the field dilation of Daish organization in both Iraq and Syria make academic institutes and research centers to pay attention to its propaganda means to gain its public opinion, and to further investigation about new methods employed by this organization to disseminate its messages to the public, particularly young people in large areas of the world. This organization uses traditional propaganda techniques on psychological war and its levels, social network sites and platforms that are distributed online. This study seeks to expose more persuasive methods used by the organization to gain multiple classes of society and to disseminate its extremist ideological thoughts. It also studies the psychological operation an
... Show MoreAs a result of the entry of multinationals companies in Iraq for investing in the joint projects through conducting agreements and contracts for work on important and strategic projects to get the necessary funds and various experiences which characterize the foreign participant sides that Iraq currently needs them and because of the non-applying the accounting processing stipulated in the unified accounting system in addition to the absence of a local accounting bases as well as the default of the participant contracts on indicating the accounting methods about those projects which are considered one of the bases that enables auditors in the public sector to depend on it, thus the research paper deals with studying an
... Show MoreThe Accounting Disclosure for non-current intangible assets is necessary to rely on accounting information by decision makers in the economic unity, two international accounting standards issued (IAS16,36), which aims to provide the foundations of the recognition, measurement and disclosure of appropriate assets Non-current tangible. (IAS16) allowed to use re-evaluation approach to measure assets entrance due to the inadequacy of the accounting information resulting from the application of the historical cost of the entrance under increasing technical developments and continuing that leave clear their effects on non-current intangible assets, As well as the requirements of what came (IAS36) the importance of accounting for the impairment
... Show MoreThis study aims to observe and analysis the propaganda discourse image for Daesh, and know how it marketing the fear due to symbols structure, and discover the straight meanings and hidden inspiration, with the ideology that the image presented.
The study is descriptive and qualitative, and the method is analytic survey used semiotic approach.
The most important results of the study refer to:
- Daesh functioning the image in fear manufacture in all it components: the symbol of savageness, body language, color, clothes uniform and professionally shot.
- The indicative meaning of fear promoted by Daesh based of the manufacturing «Holy», and that mean places non-touchable and non-insulted.
- Daesh used in its propagand
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreA new Species of the Cerambycinae belonging to the genus Hesperophanes was found new to the fauna of Iraq and Science. H. testaceus was studied in details and the male genitalia were illustrated. Type's paratypes and the locality of this newly described Species were mentioned.
المقدمة ومنهجية البحث
تعد المحاسبة وليدة الحاجات الاقتصادية وقد بات من الضروري لها أن تتكيف مع التغيرات الحاصلة في بيئة الإعمال من ارتفاع حدة المنافسة، الثورة التكنولوجية للمعلومات والاتصالات، توسع الأسواق المالية، انتشار الشركات المتعددة الجنسيات، العولمة، التوجه نحو حماية البيئة من التلوث وتحمل المسؤولية الاجتماعية والتغيرات في طبيعة المهن لسوق العمل، إذ نجد أن للمحاسبين دورا هاما نحو
... Show MorePurpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa
... Show More