Preferred Language
Articles
/
jcoeduw-1199
Popular Mobilization and human security In Local Society

The definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions,  Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 28 2022
Journal Name
Al–bahith Al–a'alami
Content of Data Journalism in Security Topics - Security Media Cell Model Research extracted from a master’s thesis

This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Requirements of talent management in high- containment organizations/ field study in Technology and Science Ministry

Human resources constitute the most important recourses that the organization owned today, as it may have developed financial and technology resources to achieve their goals, but they are not able to use it with required efficiency and effective and quality desired unless there is human resources that have good skills, experiences and talents that able to directing and exploited ideally that compatible  with market requirements, where today's market and business organizations which compete naturally inherent talent, so the task is to attracting and developing talented resources and preservation these talented resources from the challenges that facing organizations. 

The research seek to achieve

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Wed Mar 29 2023
Journal Name
Journal Of The College Of Education For Women
Geographical Analysis of Sanitation Workers in the Urban District of Kut

Cleaning is one of the services provided by the state and its ad hoc institutions. Every developed country is clean due to the good planning and attention given to the staff of all municipalities and service institutions. Beside, the attention paid to this sector is considered one of the windows to maintain the states’ aesthetics. If janirtos stop disposing of all the discarded wastes, the result will be having big piles of waste, affecting accordingly the health and safety of its citizens and the aesthetics of the areas. The janitors and those responsible for them are tha staff that the state must take care of because of their importance to the state in general and to the province in particular. The importance of the research

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
Physical Identity in the Marshes Chabaish District as a Case Study

The marshes form large areas in southern Iraq, which are large water bodies, covered by reeds and papyrus plants. The marshes are characterized by distinctive physical elements, which have given them a unique and unique identity that can be clearly distinguished by the physical pattern. The physical environment derives its identity through a group Of inputs that interact with each other and represent both cultural and social inputs of the most important inputs that affect the formation of identity, and in the physical environment of the Marshlands many of the symbols that are associated with the collective memory of individuals, these symbols have value in the community Thus, the preservation of these symbols and inherited from one gener

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
Music Advertising People: علي عبد الله

Songs hawkers or steadfast in the market of the most important sources of musical heritage, most notably the popular influence in people's lives and their careers cultural, as history records for Those tunes Chorales and invested by the vendors to attract these people in order to promote their goods and for marketing.This study reviews a brief history of those tunes drafted by the innate taste stems from folk music with the rhythms of vigor and vitality originated and grew up on the audio format is consistent with the need for people eager to hear the tunes left moved the feelings and send to communicate with the idea that came from her.As contemplated in the study models of those melodies and recording musician with the installation of

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Tax Exemptions and their impact in reducing the phenomenon of tax evasion: A field study

The research aims to verifying the tax exemptions granted in accordance with the Iraqi tax legislations, showing their suitability for basic tax rules, and identifying their role to reduce the tax evasion phenomenon and the negative effects resulting therefrom, which arerepresented by a decrease in the proceeds of tax revenue and therefore leadings to a reduction of public revenues of the state. Also, the research tries to identify the ways to reduce cases of tax evasion due to their reflection positively on the public budgetof the state. The data of the research was collected through two models of questionnaires distributed to a sample of taxpayers from some professions and a sample of the tax administration staff. The research has reac

... Show More
Crossref
View Publication
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
Means of activating the role of civil society institutions in Iraq

    The concept of civil society is one of the relatively recent concepts that have emerged clearly on the political and social arena especially in European countries, where it effectively contributes to the process of democratic transformation through the multiple roles and functions that it exercises, and acts as mediator between the state and the individual. Civil society in essence works to bring about change in society whether it is political, economic, social or cultural .The civil society appeared in Iraq after 2003, as is the case with many concepts that entered Iraq and took upon themselves the building of a democratic Iraq .Accordingly civil society institutions are the entity capable of rebuilding the Iraqi personal

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
Crossref (8)
Crossref
View Publication
Publication Date
Sat Mar 20 2021
Journal Name
Agroforestry Systems
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
View Publication