Preferred Language
Articles
/
jcopolicy-110
National security and human security concepts in the study
...Show More Authors

Security reflects a permanent and complex movement that complies with international and societal needs and developments in all its dimensions, interactions and levels. To constitute a universal demand for all States, communities and individuals. The question of security is one of the most important motivations and motivations that govern the behavior, and even the objectives of those societies and States. These groups or individuals have always sought to avoid fear and harm, and to provide stability, safety and security. In the light of this, security studies have been among the important fields of study in the field of international and strategic relations. The field witnessed many theoretical efforts, from the traditional perspective, which limited understanding of specific dimensions, to the renaissance of this field during the Cold War era, And the emergence of a new environment with new interactions whose demands, structures and needs differ from past periods, to produce new concepts that adapt and respond to this environment. One of the most prominent of these adaptations was the shift in levels of interest in security studies from the states To individuals and to meet the needs of this environment and its data, including the emergence of the concept of human security, which was consistent in his movement with the concept of national security

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Trends in Contemporary Ceramic Art and the Overlapping of Stylistic Concepts (Installation Art and Assemblage as a Model)
...Show More Authors

Contemporary arts have achieved, in accordance with the transition of concepts, a new logic in presentation and expression in general, and specifically in the field of ceramic art. The shift towards the logic of rejection and subversion of prevailing methods, which have been almost a constant foundation for a long period, has directly influenced the direction of visual arts in the contemporary world.
The growth and cultural transformations that the world has witnessed after the two World Wars have produced cognitive shifts based on strategies that diverge from the dominant culture. These approaches vary according to existential needs, as the language of art has become conceptual and a medium for contemporary culture with its rapid an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Computing And Digital Systems
The Perception of Information Security Threats Surrounding the Cloud Computing Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The effectiveness of Barman model in acquiring the historical concepts among fourth-grade literary students
...Show More Authors

The researcher attempts to examine Barman model in acquiring the historical concepts among fourth-grade students at literary classrooms. To this end, the researcher held the null hypothesis, there is no significant difference between the experimental groups who was taught based on Barman model and the control group that taught based on the traditional method in acquiring the historical concepts on the post-test. To testify the effectiveness of Barman model, the researcher administered a questionnaire included (60) items on bunch of female-students who were selected from al-khamaeal preparatory school in al-hurriyah district in Baghdad. The author utilized different statistical tools to analyze the collected data.    &

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The effectiveness of Barman model in acquiring the historical concepts among fourth-grade literary students
...Show More Authors

The researcher attempts to examine Barman model in acquiring the historical concepts among fourth-grade students at literary classrooms. To this end, the researcher held the null hypothesis, there is no significant difference between the experimental groups who was taught based on Barman model and the control group that taught based on the traditional method in acquiring the historical concepts on the post-test. To testify the effectiveness of Barman model, the researcher administered a questionnaire included (60) items on bunch of female-students who were selected from al-khamaeal preparatory school in al-hurriyah district in Baghdad. The author utilized different statistical tools to analyze the collected data.    &

... Show More
View Publication Preview PDF