Preferred Language
Articles
/
jcois-2172
The Role Of Atheism In The Demolition Of Societal Security
...Show More Authors

The enemies of religion are still following the approach of undermining the Islamic faith in various ways through the diversity of methods of smear campaigns by raising suspicions to obliterate the Islamic identity and threaten security and stability of social life under the Islamic religion in Islamic societies, as we find that they have employed the doctrine of atheistic thought in order to distance people from the path of truth, distort the features of religion, destabilize psychological security and family stability, and thus destroy societal security by questioning the tolerant faith at times, and by raising suspicions at other times.

Hence, this research came to review the legal duty that requires Islamic scholars to protect the Islamic community from this dangerous epidemic and to inject Islamic youth with the serum of the true faith to confront the disease of the age, which is atheism, by refuting atheistic suspicions and responding to them, and warning Islamic societies of their danger and alerting to the devious ways that the enemies of Islam followed it in spreading poisons and atheistic ideas, and finding out the mechanism for immunizing the individual and society from being affected by atheistic principles through the role of the media in spreading the necessary awareness to eliminate this phenomenon that is spreading in future generations, and activating the role of the teacher and educator in schools and universities to educate promising youth against this The fierce attack that wants to destroy the Islamic faith.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
International Auditing Standards and their role in rationalizing the auditor's personal judgment in Iraq"
...Show More Authors

The impact of the auditor's personal judgment starts from the beginning of the audit process to the formation of the final opinion and the issuance of the report, and because of the possibility of bias in the auditor's judgment for various reasons that may relate to the auditor himself or the circumstances surrounding it, which requires assessing the current reality of the auditor's personal judgments In the local environment and determining their determinations. To clarify the concept and determinants of the auditor's personal judgments when implementing the audit work, prepare the report and determine the role of the international auditing standards in rationalizing the auditor's personal judgment when conducti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The Role of SMEs & The Justifications For Its incubation : Survy Study
...Show More Authors

Abstract

We can see the phenomena of small and medium-sized enterprises, by important and a new subject contemporary, thro related between important concept that develop and add. This research focused on the important concept of small and medium-sized enterprises, in public and privet sectors. small and medium-sized enterprises discrimination by large filer ratio in the especially at the first years when they started because of the limited managerial skills, financial recourses and marketing problems. On it they will creative new procedures. this research treatment the core issues about wakens local and international enterprises, so threat. the goals of this research are extended malty dimension concept o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
The Relations Of Design And The Role Of It Making The Idea For Fashion Design: فرات جمال العتابي
...Show More Authors

Any design subject to a set of forces contributing to the establishment of relations working to strengthen the internal elements of the design; any imbalance in these elements can make a fragmented and weak design, thus preventing it from achieving the goal or performance. Poor performance can be attributed to various factors: the extent and function of the elements and principles in the design, realization of the idea, especially in fashion design.
Moreover, there are many aspects of a design that go into achieving the realization of the designer’s idea. The design utilizes a lot of stimulants by drawing attention to its design, which is consistent with the need for psychological and material individuals. In this research, we will

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Degree of Management Practice of Roaming and Its Role in Achieving Organizational Justice ((An analytical Study of the Opinions of Directors in Anbar Education Directorate))
...Show More Authors

Abstract

This Study aimed to investigate the reality of the application of the degree of management practice by Walking Around, namely (discovery of facts, improvement of communication, motivation, development, creativity and feedback) and Its role in achieving organizational justice (procedural justice, distributive justice, Interactional Justice),The availability of the core principles of this system from the point of view of the senior management personnel in the Directorate of Anbar Education, and the importance of research in the philosophical rooting of the nature of the variables as a modern administrative terminology, the research dealt with a problem expressed by a number of intellectual and appl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 13 2015
Journal Name
Elsevier Procedia Economics And Finance
The Role of FDI Inflows in Economic Growth in Malaysia (Time Series: 1975-2010)
...Show More Authors

Recently, Malaysia has been recognized as one of the most popular destinations for Foreign Direct Investment (FDI) in Southeast Asia. But how do these FDI inflows affect Malaysia economy? This paper aims to identify the role of FDI inflows in Malaysia economic growth through a proposed endogenous growth model. Annual data covers from 1975 to 2010. Unit root test and Johansen Co-integration test are adopted to respectively verify the time series data is stable and the linear combination of the variables is stationary. Hierarchical Multiple Regressions (HMR) Analysis is then conducted to find out the momentum of the Malaysia economic growth including FDI inflows. The results show that the FDI inflows together with the human capital deve

... Show More
Publication Date
Sat Aug 16 2025
Journal Name
Imam Ja'afar Al-sadiq University Journal Of Legal Studies
The role of fluctuations and crises in stock markets in activating market makers models
...Show More Authors

View Publication