Since the widespread use of the concept of human security in 1994, and as stated in the report of human development (UNDP) issued by the United Nations Development Programmer,And framed it with multiple dimensions of political, economical, social and cultural. This concept has became beyond the state and its security ,and covered all what, can threaten human life and humanitarian groups, according to the humanitarian needs in the following aspects: The economic, the food,health,environmental , individual, community and the political aspect,which totally means ,the disability of the security traditional perspective to deal with these issues.The achievement of human security,that handles the maintenance of human dignity for meeting their basic needs,altimitly means a decent living and freedom and the end for , and it supposed for most respect for human rights through democratic framework.
Praise be to Allah and peace be upon our master and lover of our hearts and our souls doctor Muhammad and divine , especially the rest of God in Aladdin , and a curse on all the enemies to the day of judgment ,
After : The issue of education of man , and brought up within the curriculum properly and comprehensively cannot be completed for the seriousness and accuracy without revelation , the Qur'an inspiring , than when gentle expert , is a factory of man and humanity , in fact ... is the process of modifying behavior, one of the goals of education community at various levels in the family the school and the whole university and other educational institutions and community-based factories humanity that th
... Show MoreGenocide and crimes against humanity have a distinct meaning in that they are particularly reprehensible attacks that constitute a grave assault on human dignity or constitute a gross humiliation or degradation of the dignity of one or more human beings, and they are not isolated and sporadic incidents.
That the crime of mass graves as a collective genocide is considered a mass murder of a group of people that is carried out on a discriminatory basis with the aim of their total annihilation as a race, people, or a distinct group that is culturally, culturally, linguistically or religiously independent, or for any reason that distinguishes them from humans, and this is what happened with the crime of mass graves in Iraq. We have n
... Show MoreTechnological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreIn this paper, the proposes secure system to improving security of ID card and passports is by generating cubic spline co-occurrence code (CCO code) for each ID card. The authentication part, begins passing ID card through the checkpoint then the checkpoint will check the information of card or passport by also extracting features in order to generate the cubic spline co-occurrence code (CCO code), finally comparison is made between extracted CCO code at the checkpoint and CCO code that has been printed on ID card or passport (type of fraud like change personal picture or fraud it’s information). Several tests were conducted to evaluate the performance of the proposed security system. Furthermore, the experiment results reveal that the
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIt is known that the economic impact of medicines is not negligible as a pillar of national income because of the profits of its industry contribute to industrial development, and the health impact of medicines can not be underestimated or underestimated, as many people already die in various low-lying countries The middle income because of the difficulty in providing them with safe and effective essential medicines or their inability to buy them to be available to enable them to cure and save their lives.
This requires the development of policies and strategies to save lives by researching the concept of drug security to provide the best possible level of modern health care supported by soun
... Show MoreAfter the tremendous development witnessed by the world of communications at the beginning of the third millennium, the activities that are performed through cyberspace have increased, and its importance has therefore increased, and the risks to which this space is exposed have increased, and in view of the global trend towards regulating this space and the practices that take place through it, as well as finding legal and technical ways to secure it. And to secure the services that are provided through it, it was necessary to determine the nature of this space and therefore its security. In order to create an appropriate theoretical framework around it that may be used if the Iraqi legislator goes towards organizing this space and secur
... Show MoreAspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.
TI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show More