Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
We see human societies differ from one society to another in organizing social life, and each according to the foundations and rules prepared by the main thing in the welfare and prosperity.
That is why we see eastern societies differ from western societies in many patterns and various ways of reaching that sophistication, until Islam came and gave the proper model in raising society at that time to the best and highest social levels, because it is based on heavenly rules and foundations and not status as in previous civilizations.
And when the Islamic community has suffered at the present time from weakness, weakness and decline to the lowest levels of civilized backwardness in organizing the society and its social security, on the contrary of what it was the Islamic civilization, because of our distancing from the divine laws and his march behind Western ideas that want to destroy the prosperous Islamic civilization, and make Islamic societies not religious I chose an important topic at the present time, perhaps to explain to Islamic societies what they were missing, which is (the organization of society and its impact on social security), after I saw the chaos that afflicted Muslims and a torrential torrent that was from the West and their followers.
After this introduction, this research included a preamble, then defined the organization and the corresponding terms. To him, then I showed the importance of the organization, its goals and its reasons, then clarified the interconnection between organization and social security, and showed the impact of the organization and its importance in society, then after the conclusion, then the list of sources that I used in this research, and God is the success.
This study aims to identify the impact of social support on breast cancer patients’ psychological rigidity using a sample in Ramallah and al-Bireh. A descriptive correlative approach was adopted to fulfill the goals of the study and a questionnaire consisted of two criteria: social support and psychological rigidity, which was adopted as a tool for data collection for the study. In order to achieve the goals of the study, the researcher selected a convenient sample that consisted of 123 female breast cancer patients in Ramallah and al-Bireh. This sample represented 50% of the original patient population. The study showed that the average estimated percentage of social support and psychological rigidity for women with breast cancer, in
... Show MoreSocial isolation and quarantine have been implemented globally during outbreaks of a highly transmissible microbe. For instance, they were employed during the plague outbreak in 1894 and the COVID-19 pandemic in 2019. While these methods have proven effective against highly transmissible infections, they have also had significant negative consequences. In specific regions like Anbar, Diyala, Salahaddin, and Kirkuk, social isolation occurred during the period of ISIS occupation. After their liberation, these regions experienced a COVID-19 outbreak, and quarantine measures were put in place. This study aimed to investigate the effect of social isolation and quarantine on tuberculosis. Patients from Anbar, Diyala, Salahaddin, and Kirkuk distri
... Show MoreThis research investigates the importance of social accounting and the auditor’s report. It basically checks if there is an impact of social accounting on the auditor’s report at the availability the INTOSAI standards No. (1700 and 1706). The study recruited 105 employees of the Federal Financial Supervision Office in Iraq. Data were collected using questionnaire. The questionnaire validity and reliability were checked to assure the truthfulness of the findings. The study found a positive correlation and a statistically significant effect between the accounting for social responsibility and the auditor’s report. It is necessarily recommended for the auditor and the bodies working in the Board of Supreme Audit to ensure the inclusio
... Show MoreThe current study is based on previous findings, where corporate governance (CG) significantly increased corporate social responsibility (CSR) to enhance transparency while reducing the tendency of corporate management to engage in earnings management (EM). A sample of 11 Iraqi banks listed on the Iraq Stock Exchange from 2010 to 2020 was selected. The CG was included in the board size and board independence apart from the variables of Chief Executive Officer (CEOs) gender, majority shareholder ownership, foreign ownership, and institutional ownership. The CSR included the wage growth rate, bank contribution growth rate for social security, training programmes, subsidies, environmental protection, and bank compliance with the law. Specifica
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreThe first chapter the importance of research and need for education scientists see that the roots of the use of a specimen Wheatley in learning and teaching back to Grayson Wheatley, one of the largest supporters of a modern construction, which lay the groundwork for the specimen stage and the form in which it is. That was attributed to him, often called his name called while some educators based learning strategy on the issue. He sees the learner in this model make him a meaningful understanding of problems during his progress, thereby acting with his colleagues to find solutions to them in small groups. He
Borders Search: Search by students is determined by th
... Show More