Since the widespread use of the concept of human security in 1994, and as stated in the report of human development (UNDP) issued by the United Nations Development Programmer,And framed it with multiple dimensions of political, economical, social and cultural. This concept has became beyond the state and its security ,and covered all what, can threaten human life and humanitarian groups, according to the humanitarian needs in the following aspects: The economic, the food,health,environmental , individual, community and the political aspect,which totally means ,the disability of the security traditional perspective to deal with these issues.The achievement of human security,that handles the maintenance of human dignity for meeting their basic needs,altimitly means a decent living and freedom and the end for , and it supposed for most respect for human rights through democratic framework.
Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show Moreالديمقراطية في الفكر الاسلامي المعاصر وعلاقتها بنظرية الشورى
تعد الدیمقراطیة الخیار المناسب للمشكلات والأزمات التي تواجه أقطار الوطن العربي بـشكل عـام والعـراق ٕ بــشكل خــاص، فهــي لا تقــدم المعالجــات والحلــول الآنیــة لهــذه المــشكلات والأزمــات فحــسب،وانما تــضع الأطـــر والسیاقات لنمو وتطور النظام السیاسي وبناء هیكل دولة عصریة حدیثة. وفي الوقت الذي تحظى فیه الجوانب المؤسسیة بأهمیة قصوى فـي إطـار العملیـة الدیمقراطیـة، فـان غیابهـا یعمل على تشویه هذه ا
... Show MoreThe systems of governance in Europe are characterized by ancient democratic systems that have developed and developed through a long history of political conflicts that have emerged from a social reality that feeds them and receives the resulting effects. This is an achievement that has been achieved after the sacrifices and great efforts in formulating models of good governance through which to realize the aspirations of their peoples. . The democratic system operates within a balanced mechanism of two competing parties to manage and direct the work of the government and the parliament. The parties that achieve the majority in the elections carry out the functions of the government supported by their parliamentary base belonging to one
... Show Moreالرأي العام والمشاركة السياسية ودورهما في تعزيز الديمقراطية
Praise be to Allah and peace be upon our master and lover of our hearts and our souls doctor Muhammad and divine , especially the rest of God in Aladdin , and a curse on all the enemies to the day of judgment ,
After : The issue of education of man , and brought up within the curriculum properly and comprehensively cannot be completed for the seriousness and accuracy without revelation , the Qur'an inspiring , than when gentle expert , is a factory of man and humanity , in fact ... is the process of modifying behavior, one of the goals of education community at various levels in the family the school and the whole university and other educational institutions and community-based factories humanity that th
... Show MoreThe study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The ro
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.