After the software revolution in the last decades, the field of information technology had a tremendous evolution that made many organizations reach the best benefits from this evolution in technologies. The banking sector evolved their old system from ordinary system to the online system. The term E-banking appears to cover almost all bank operations such as money transactions, account management, instant reports, instant notifications. E-banking offers several advantages to clients, but this opens many challenges and motivates unauthorized parties to focus on creating methods and exploiting weaknesses to attack and steal critical information that belongs to the banking system or clients. Iraqi banks recently adopted E-banking serves and made them available to all their clients. However, this shift in approach leaves many clients vulnerable to cyber-attacks. This paper presents an analytical study on Iraqi clients using E-banking as a service using real case studies. Many researchers prevent these threats by introducing novel methods to support cybersecurity specialists. This paper covers related work and the most common terms involving E-banking. It also covers the risks involved in E-banking, most common attacks, and modern security methods to prevent attacks.
The wide use of pesticides in recent years leads to rapid distribution of these pollutants in the environment (air, water and soil).They were transported by means of air or water to biological ecosystems. They become more toxic through the processes of biological magnification while some of them persist for along period.The aim of this work is to show the negative effect that chemical pesticides causes, and in the same to show their side effect on the environment and health in Iraq. We could conclude that the bad use of these chemicals could cause an urgent impact now or in the future. Governmental offices dealing with these materials should take the right measures to minimize the danger and the misuse of these chemicals by seeking alternat
... Show MoreThe objective of this study was to evaluate the activity of dry metallic copper and colloidal silver solution to reduce the viability of P.aeruginosa isolates compared with stainless steel as a control. Three clinical isolates of P.aeruginosa (108, 110 and 111 ) which were multi antibiotics resistant tested by inoculating 107 CFU/ml on to coupons( 1cm x 1cm) of copper and stainless steel and incubated at room temperature for various time periods ranging from 30minutes up to 180 minutes .Bacterial viability was determined by plate viable count CFU/ml. The results on copper coupons shows complete killing of isolates after 120 min in contrast to stainless steel, viable organisms were detected after 180 min, indicating a significant P value
... Show MoreAbstract
The research the impact of the application of some of the production system tools in the specified time, which can be adapted in the service sectors (banking sector) over the improvement and increase the quality of banking services, and highlights the research problem in the low quality of banking services provided to customers because of the reliance on traditional banking systems in the provision of services Because of the lack keep pace with global developments in the banking industry, and the goal of research is to clarify the applicability of the production system in the time specified in the service sector and th
... Show MoreThe concept of insurance policy is one of the concepts that expresses a way to face the risks that a person is exposed to in the field of his life. It is a system that involves a prior agreement between two parties through which the risk is transferred from the second party (the insured) to the first party (the insurer) in return for paying an amount Calculated was able to cover the potential loss according to certain percentages agreed upon between the two parties, and that the main goal of any scientific analysis of the risk is to choose the most appropriate policy or method to confront it, by identifying the risks and ways to address them, and the main goal is to reduce losses and limit the possibility of their occurrence.
In
... Show MoreIslamic banks are distinguished by providing banking activities that are unique in providing them from the rest of the other types of banks, and these activities are a group of banking services provided by the bank to its customers, whether these banking activities are tangible or intangible. At the same time, it is a source of bank profits, as Islamic banks impose a percentage of Islamic Murabaha on those banking activities , However, these banks have developed new services that they provide with the funds of the Central Bank initiative launched at the beginning of (2016) due to the economic conditions that befell the country due to the (financial security) crisis that the country faced in 2014. To put forward initiatives, and a
... Show MoreAbstract:
Central banks seek to control and supervise credit and follow it up effectively due to the high credit risks surrounding it that may lead to damage to banks, and may even lead to damage to the reputation and confidence of the banking system as a whole.
The main role of supervisory control is to control credit by controlling it from excessive expansion during periods of economic inflation or its revitalization and improvement and expansion of credit transactions in cases of economic recession, or when central banks desire to support the national economy or support a sector of various
... Show MoreThe recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.
This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Re
... Show MoreThe state, as one of the most important social institutions that works to provide services and security for individuals, needs security, and this security is achieved according to a specific hierarchy that starts from the security of the individual and the security of society to the security of the state, as the advanced state security is based on the basic pillars of solidarity and social peace This security consists of several levels (human, regional, social, economic, and cyber), unlike Arab criminal legislation, including Iraqi law, which is based on the concept of traditional state security, as it relies on the military side only in order to provide maximum criminal protection for the security of the political system The security of
... Show MoreBackground: Substance use disorders (SUDs) are among the common psychiatric disorders and constitute a major public health concern. Iraqi’s were exposed to widespread violence and wars in the last decades. High prevalence of alcohol and substance use was reported recently in Baghdad. Research literature documented the association of SUDs with exposure to trauma events e.g. wars, terrorist attacks and natural disaster. Published articles on SUDs among prisoners in Iraq are scarce. Therefore, this work was carried out to report on SUDs among prisoners in Al-Diwania governorate and its relation to antisocial activity.
Methods: A total of 1200 prisoners in Al-Diwania civilian prison were included in the stu