Preferred Language
Articles
/
jcopolicy-207
Democracy and human security
...Show More Authors

Since the widespread use of the concept of human security in 1994, and as stated in the report of human development (UNDP) issued by the United Nations Development Programmer,And framed it with multiple dimensions of political, economical, social and cultural. This concept has became beyond the state and its security ,and covered all what, can threaten human life and humanitarian groups, according to the humanitarian needs in the following aspects: The economic, the food,health,environmental , individual, community and the political aspect,which totally means ,the disability of the security traditional perspective to deal with these issues.The achievement of human security,that handles the maintenance of human dignity for meeting their basic needs,altimitly means a decent living and freedom and the end for , and it supposed for most respect for human rights through democratic framework.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Nov 02 2024
Journal Name
العلوم القانونية والسياسية
الحروب والصراعات وتداعيتها على الامن الانساني
...Show More Authors

تعد الحروب و الصراعات واحدة من اقدم الظواىر التي عرفتها المجتمعات البشرية وان ىذه الظاىرة تجسدت في البداية على مستوى الصراعات الفردية عندما كانت ترتقي الى مستوى الاشتباك وكانت بدائية في وسائلها وادواتها ،وكما ان ظاىرة الحرب بدأت من الاسرة ومن ثم القبيلة والعشيرة وانتهت بالدولة ،اذ ان ظاىرة الحروب بشكلها التقليدي تأخذ شكلا تدميريا بعد ان تتطور ابعادىا القصوى وان حدوثها ىو تضارب مصالح واىداف الاطراف وانها ال

... Show More
Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
المجلة العراقية للعلوم السياسية
الانتخابات ودورها في ترسيخ الديمقراطية
...Show More Authors

العلاقة بين الانتخابات والديمقراطية علاقة قويّة ، ولا يمكن تصور ديمقراطية راسخة في بلد ما بدون وجود انتخابات تُعبر عن الارادة الشعبية في اختيار قادتها وممثليها ، وغالباً تكون الانتخابات المعيار المُعبر عن الدور الذي تؤديه في ترسيخ الديمقراطية ، وتتفاوت الادوار التي تؤديها الانتخابات تبعاً لطبيعة النظام السياسي والنظام الانتخابي المعمول به في هذا البلد أو ذاك ، ولجوء النظام السياسي الى الانتخابات لا يعني ب

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Arab Food's Security
...Show More Authors

Arab Food's Security

View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Fri Apr 02 2021
Journal Name
Review Of International Geographical Education
Energy Security and Energy Transition in Germany
...Show More Authors

Energy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication
Publication Date
Tue Apr 01 2008
Journal Name
Journal Of Educational And Psychological Researches
اتجاهات طلبة جامعة بغداد نحو الديمقراطية
...Show More Authors

مشكلة البحث واهميته

 

      نعيش حالياً في عصر تتردد فيه اصداء الدعوة الى الحرية والديمقراطية في ارجاء الوطن العربي بشكل عام والعراق بشكل خاص، رغم التحديات التي تواجهها هذه الدعوة، وبما ان دور الجامعة لم يعد اليوم محددا بتزويد الطلبة بالمعلومات والمعارف، فقد وسعت نطاقها وعددت اغراضها وتنوعت اتجاهاتها, واصبح للطالب الجامعي ح

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 02 2014
Journal Name
International Journal Of Engineering Research And General Science
Security in Cloud Computing
...Show More Authors

Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pay

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Sources of Threatening Educational Security: Means and Effects
...Show More Authors

Today’s world confronts various threats from different sources. Similar to deprivation of energy, economic facilities, or political deposition, educational poisoning is one of the dangerous phenomena that result from distorting and corrupting the ethical and educational components of teaching by various material and non – material means.This paper sheds light on the concept of the educational system which is not a mere process of teaching, but rather an endless process of socialization that begins in the family and develops into religious, ethical, scientific and mythological systems, all of which form the cognitive component. It also defines the necessary means by which it is transmitted from one generation into another. The educati

... Show More
View Publication Preview PDF
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security of Iris Recognition and Voice Recognition Techniques
...Show More Authors

  Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul

... Show More
View Publication Preview PDF