Preferred Language
Articles
/
jcoeduw-1199
Popular Mobilization and human security In Local Society
...Show More Authors

The definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions,  Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Hiring managers tacit knowledge in the electronic Human Resource Management
...Show More Authors

Abstract
            This research aims to determine the nature of tacit knowledge relationship and its impact on building the electronic human resources management, as it constitutes the most prominent tacit knowledge resources owned by the Organization for being a stand out in the skill, knowledge and intellectual capacity of human resources, as the electronic human resources management is a contemporary trend that adopted by the organization in the performance of all tasks and duties related workers have remained in the contemporary environment in which it operates.

and have indicated the research problem to the low level of awareness of the ad

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Measuring university teachers attitudes towards the security man
...Show More Authors

Measuring university teachers attitudes towards the security man Summary This research aims to study the measurement of university teachers attitudes towards the security man, and represented the research sample (196) of teachers, including 124 males and 72 females from different faculties of Salah al-Din - Erbil University. The researchers adopted on a scale (Al-Tarawneh 2008), as amended, and its development, the scale consists of four areas and (28) paragraph covers paragraphs measure the beliefs and feelings of the individual towards the security man as the theme of direction. The research sample answered all the paragraphs of the scale grade five similar styles (Likert) (strongly OK, OK, neutral, non-OK, Strongly Disagree). The rese

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Wed Jan 10 2018
Journal Name
Al–bahith Al–a'alami
Work Stress Sources of the Communicator in Public Relations “A field study on Governmental Institutions in UAE”.
...Show More Authors

This study addressed the work stress sources and level of the communicator in public relations in governmental institutions in the United Arab Emirates. The importance of this study is the lack of studies on work stress of the communicator in public relations. The study aimed to investigate the work stress source Physical, individual, groups, organizational and Professional source which effect on the performance of communicator in public relations. The researcher used the descriptive approach and questionnaire as an essential tool for collecting information. Some of the important results of the study are The communicator in public relations facing stress in work by 42% which affect on his performance by average level. The organizational

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Aip Conference Proceedings
Optical information verification and authentication: Exploring sparsity constraints and optical encryption for enhanced security
...Show More Authors

View Publication
Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
QUALITY OF LOCAL AND IMPORTED DAIRY PRODUCTS FROM IRAQI CONSUMER OPINION: QUALITY OF LOCAL AND IMPORTED DAIRY PRODUCTS FROM IRAQI CONSUMER OPINION
...Show More Authors

The study aims to know the preference of the Iraqi consumer of imported dairy products to local, which has increased demand in recent years due to various reasons including commodity dumping policy that Iraq has been suffering since 2003, which has led to decline in the role of local dairy product in our markets and its inability to compete with imported product for different reasons. The research utilized questionnaire as a survey tool of the opinions of a sample of Iraqi 92 consumers in Baghdad/Alrisafa. The questionnaire consisted of twenty questions included the four components of marketing mixture (product quality, price, place, and promotion). Weighted mean and percentage weight used for data analysis. The study showed that the mos

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
Türk Halk Edebiyatında Manzum Atasözleri ve Irak Türkmenleri Arasında Atasözü İçerikli Hoyrat Örnekleri Yrd. Doç. Dr. Necdet Yaşar BAYATLI
...Show More Authors

Özet

 

Sözlü Türk halk edebiyatı ürünleri içinde önemli yere sahip olan türlerden biri de atasözleridir. Atasözleri, nesilden nesile halk ağzında dolaşan, kimin söylediği bilinmeyen, birtakım gerçekleri kısa ve öz bir şekilde ifade eden sözlerdir. Türk atasözleri Orhun Abideleri’nde ilk kez karşımıza çıkmakla birlikte, Uygur dönemi yazıtlarında ve özellikle Dîvânü Lûgati’t Türk’te geniş yer bulmuştur. Dilin anlatım ve kullanım imkânlarını geliştiren atasözlerine, dünyanın bütün dillerinde rastlanabilir. Bunun için, söyleyişte güzel, anlatımda güçlü, kavramda önemli unsurlar içeren kalıplaşmış sözler halinde bulunurlar. Bu çalı

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Relationship between Fiscal Policy and Human Development Analytical Studay Of Iraq Using The (ARDL)Model
...Show More Authors

Fiscal policy is one of the important economic tools that affect economic development in general and human development in particular through its tools (public revenues, public expenditures, and the general budget).

It was hoped that the effects of fiscal policy during the study period (2004-2007) will positively reflect on human development indicators (health, education, income) by raising these indicators on the ground. After 2003, public revenues in Iraq increased due to increased revenues. However, despite this increase in public budgets, the actual impact on human development and its indicators was not equivalent to this increase in financial revenues. QR The value of the general budget allocations ha

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Employ lean leadership behaviors to enhance investment in human capital
...Show More Authors

This research aims to determine the importance of the role that agile leadership plays in supporting programs and areas of investment in human capital, as it is the most important type of capital that the organization possesses and achieves returns that are many times the cost it bears, due to its rare and valuable characteristics. Through six behaviours: (humility behaviour, calm behaviour, wisdom behaviour, patience behaviour, objectivity behaviour, trust behaviour). As for investment in human capital, it was measured through its four elements (skills, knowledge, capabilities, experiences). Despite this, the researched organizations suffer from a decrease in awareness of the importance of this type of investment and the role of

... Show More
View Publication Preview PDF
Crossref (2)
Crossref