Preferred Language
Articles
/
jcopolicy-110
National security and human security concepts in the study
...Show More Authors

Security reflects a permanent and complex movement that complies with international and societal needs and developments in all its dimensions, interactions and levels. To constitute a universal demand for all States, communities and individuals. The question of security is one of the most important motivations and motivations that govern the behavior, and even the objectives of those societies and States. These groups or individuals have always sought to avoid fear and harm, and to provide stability, safety and security. In the light of this, security studies have been among the important fields of study in the field of international and strategic relations. The field witnessed many theoretical efforts, from the traditional perspective, which limited understanding of specific dimensions, to the renaissance of this field during the Cold War era, And the emergence of a new environment with new interactions whose demands, structures and needs differ from past periods, to produce new concepts that adapt and respond to this environment. One of the most prominent of these adaptations was the shift in levels of interest in security studies from the states To individuals and to meet the needs of this environment and its data, including the emergence of the concept of human security, which was consistent in his movement with the concept of national security

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Effect of Woods model in the Acquisition of Grammatical Concepts on students at the Sixth primary
...Show More Authors

The research aims at identifying The Effect of Woods model in the Acquisition of Grammatical Concepts on students at the Sixth Primary. The total number of students is (49) male and female. students are distributed in two groups . The First group is the experimental group which is taught the( Woods Model) and it is (25) students . The second group is the control group which is taught according to the traditional method of teaching and it is (24) students . The researcher has matched between the two groups by the following variables : the age (in months), their intelligence, their parents, academic level of education . The research has constructed multiple choice test of (20) items . The reliability of The test has been calculated and it

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 22 2022
Journal Name
مجلة الزرقاء للبحوث والدراسات
صياغة استراتيجية الامن القومي للدولة في ضوء ادراك التهديدات المتغيرة : الاستراتيجية الروسية انموذجا
...Show More Authors

Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Two Educational Models in Acquiring Historical Concepts and Orientation of Fourth Grade Students in History
...Show More Authors

The study focuses on Kamez model and the Claus Meyer model of instructional design, which are models that provide the learner with educational experiences to suit the logical information of the learner and the variety of instructional models. Research Objective: The present research aims to identify Limitations of the study. The current research is determined by ((fourth grade preparatory students, the book of the date of the fourth preparatory course)) Chapter II includes Arabic and foreign studies on the model of Kemp and Claus Mayer in the acquisition of concepts and direction towards the material. Chapter III Experimental Design: The researcher adopted an experimental design with two experimental groups and a control group. The resea

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Intellectual Security and Its Relation to Psychological Resilience of Secondary School Students
...Show More Authors

The current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security

The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:

  1. The members of the sample have an intellectual Security.
  2. The members of the sample have

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jul 12 2025
Journal Name
Journal Of Juridical And Political Science
Criminal protection of the internal state security in light of the fourth generation wars
...Show More Authors

The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the

... Show More
View Publication
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Instrumental Enrichment in the Acquisition of Geographical Concepts for First Grade Student in Intermediate school
...Show More Authors

The present study aims at knowing the effect of instrumental enrichment in the acquisition of geographical concepts for first grade student in intermediate school. The study is restricted in the students of first grade student in intermediate school\ The EducationalDirectorate of Rusafa for academic (2013/2014),for the purpose of achieving the objective, the following hypotheses:

There is no statistical significant different at the level of (0.5) between the scores of the experimental group  who study geography according to the instrumental enrichment and the scores of the control group who learned geographical according to the traditional methods.

    &nb

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
The impact of the US military variable in reality Security in the Arab Gulf region after 2003
...Show More Authors

The military presence in the Gulf region after the British withdrawal from it in 1971 was one of the most important pillars of the American strategy to climb the ladder of global leadership, as the geostrategic features that the region enjoyed provided factors of controlling energy sources and global trade routes. The United States of America guarantees Western Europe and Japan the process of access to energy sources and the exclusion of its opponents from the region, especially the Soviet Union, and the growing American military presence in the Gulf after the invasion of Iraq in 2003. On the other hand, the region experiences many contradictions, some of which threaten its security, such as the exacerbation of disputes between its count

... Show More
View Publication Preview PDF
Crossref