Since the widespread use of the concept of human security in 1994, and as stated in the report of human development (UNDP) issued by the United Nations Development Programmer,And framed it with multiple dimensions of political, economical, social and cultural. This concept has became beyond the state and its security ,and covered all what, can threaten human life and humanitarian groups, according to the humanitarian needs in the following aspects: The economic, the food,health,environmental , individual, community and the political aspect,which totally means ,the disability of the security traditional perspective to deal with these issues.The achievement of human security,that handles the maintenance of human dignity for meeting their basic needs,altimitly means a decent living and freedom and the end for , and it supposed for most respect for human rights through democratic framework.
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreThis paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ
... Show Moreالرأي العام والمشاركة السياسية ودورهما في تعزيز الديمقراطية
الديمقراطية في الفكر الاسلامي المعاصر وعلاقتها بنظرية الشورى
The systems of governance in Europe are characterized by ancient democratic systems that have developed and developed through a long history of political conflicts that have emerged from a social reality that feeds them and receives the resulting effects. This is an achievement that has been achieved after the sacrifices and great efforts in formulating models of good governance through which to realize the aspirations of their peoples. . The democratic system operates within a balanced mechanism of two competing parties to manage and direct the work of the government and the parliament. The parties that achieve the majority in the elections carry out the functions of the government supported by their parliamentary base belonging to one
... Show Moreتعد الدیمقراطیة الخیار المناسب للمشكلات والأزمات التي تواجه أقطار الوطن العربي بـشكل عـام والعـراق ٕ بــشكل خــاص، فهــي لا تقــدم المعالجــات والحلــول الآنیــة لهــذه المــشكلات والأزمــات فحــسب،وانما تــضع الأطـــر والسیاقات لنمو وتطور النظام السیاسي وبناء هیكل دولة عصریة حدیثة. وفي الوقت الذي تحظى فیه الجوانب المؤسسیة بأهمیة قصوى فـي إطـار العملیـة الدیمقراطیـة، فـان غیابهـا یعمل على تشویه هذه ا
... Show MoreTechnological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreAspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More