Since the widespread use of the concept of human security in 1994, and as stated in the report of human development (UNDP) issued by the United Nations Development Programmer,And framed it with multiple dimensions of political, economical, social and cultural. This concept has became beyond the state and its security ,and covered all what, can threaten human life and humanitarian groups, according to the humanitarian needs in the following aspects: The economic, the food,health,environmental , individual, community and the political aspect,which totally means ,the disability of the security traditional perspective to deal with these issues.The achievement of human security,that handles the maintenance of human dignity for meeting their basic needs,altimitly means a decent living and freedom and the end for , and it supposed for most respect for human rights through democratic framework.
Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show Moreتعد الدیمقراطیة الخیار المناسب للمشكلات والأزمات التي تواجه أقطار الوطن العربي بـشكل عـام والعـراق ٕ بــشكل خــاص، فهــي لا تقــدم المعالجــات والحلــول الآنیــة لهــذه المــشكلات والأزمــات فحــسب،وانما تــضع الأطـــر والسیاقات لنمو وتطور النظام السیاسي وبناء هیكل دولة عصریة حدیثة. وفي الوقت الذي تحظى فیه الجوانب المؤسسیة بأهمیة قصوى فـي إطـار العملیـة الدیمقراطیـة، فـان غیابهـا یعمل على تشویه هذه ا
... Show Moreالديمقراطية في الفكر الاسلامي المعاصر وعلاقتها بنظرية الشورى
The systems of governance in Europe are characterized by ancient democratic systems that have developed and developed through a long history of political conflicts that have emerged from a social reality that feeds them and receives the resulting effects. This is an achievement that has been achieved after the sacrifices and great efforts in formulating models of good governance through which to realize the aspirations of their peoples. . The democratic system operates within a balanced mechanism of two competing parties to manage and direct the work of the government and the parliament. The parties that achieve the majority in the elections carry out the functions of the government supported by their parliamentary base belonging to one
... Show Moreالرأي العام والمشاركة السياسية ودورهما في تعزيز الديمقراطية
Praise be to Allah and peace be upon our master and lover of our hearts and our souls doctor Muhammad and divine , especially the rest of God in Aladdin , and a curse on all the enemies to the day of judgment ,
After : The issue of education of man , and brought up within the curriculum properly and comprehensively cannot be completed for the seriousness and accuracy without revelation , the Qur'an inspiring , than when gentle expert , is a factory of man and humanity , in fact ... is the process of modifying behavior, one of the goals of education community at various levels in the family the school and the whole university and other educational institutions and community-based factories humanity that th
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreThe study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The ro
... Show More