Preferred Language
Articles
/
jcopolicy-207
Democracy and human security
...Show More Authors

Since the widespread use of the concept of human security in 1994, and as stated in the report of human development (UNDP) issued by the United Nations Development Programmer,And framed it with multiple dimensions of political, economical, social and cultural. This concept has became beyond the state and its security ,and covered all what, can threaten human life and humanitarian groups, according to the humanitarian needs in the following aspects: The economic, the food,health,environmental , individual, community and the political aspect,which totally means ,the disability of the security traditional perspective to deal with these issues.The achievement of human security,that handles the maintenance of human dignity for meeting their basic needs,altimitly means a decent living and freedom and the end for , and it supposed for most respect for human rights through democratic framework.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Wed Dec 28 2022
Journal Name
Al–bahith Al–a'alami
Content of Data Journalism in Security Topics - Security Media Cell Model Research extracted from a master’s thesis
...Show More Authors

This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 02 2007
Journal Name
Political Sciences Journal
الرأي العام والمشاركة السياسية ودورهما في تعزيز الديمقراطية
...Show More Authors

الرأي العام والمشاركة السياسية ودورهما في تعزيز الديمقراطية 

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
المجلة السياسية والدولية
الديمقراطية في الفكر الاسلامي المعاصر وعلاقتها بنظرية الشورى
...Show More Authors

الديمقراطية في الفكر الاسلامي المعاصر وعلاقتها بنظرية الشورى

Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Democratic systems in Europe Harmonic experience in governance
...Show More Authors

The systems of governance in Europe are characterized by ancient democratic systems that have developed and developed through a long history of political conflicts that have emerged from a social reality that feeds them and receives the resulting effects. This is an achievement that has been achieved after the sacrifices and great efforts in formulating models of good governance through which to realize the aspirations of their peoples. . The democratic system operates within a balanced mechanism of two competing parties to manage and direct the work of the government and the parliament. The parties that achieve the majority in the elections carry out the functions of the government supported by their parliamentary base belonging to one

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 09 2011
Journal Name
المجلة السياسية والدولية
جدلية العلاقة بين الديمقراطية وتداول السلطة : العراق انموذجا
...Show More Authors

تعد الدیمقراطیة الخیار المناسب للمشكلات والأزمات التي تواجه أقطار الوطن العربي بـشكل عـام والعـراق ٕ بــشكل خــاص، فهــي لا تقــدم المعالجــات والحلــول الآنیــة لهــذه المــشكلات والأزمــات فحــسب،وانما تــضع الأطـــر والسیاقات لنمو وتطور النظام السیاسي وبناء هیكل دولة عصریة حدیثة. وفي الوقت الذي تحظى فیه الجوانب المؤسسیة بأهمیة قصوى فـي إطـار العملیـة الدیمقراطیـة، فـان غیابهـا یعمل على تشویه هذه ا

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More