Preferred Language
Articles
/
jcopolicy-487
Obstacles to reforming the Security Council and new international changes
...Show More Authors

The international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 15 2015
Journal Name
Alustath Journal For Human And Social Sciences
The Degree of Satisfaction of Secondary School Principals with the Role of Universities and their Obstacles in Developing their Administrative Skills
...Show More Authors

    A field study aimed at identifying the degree of satisfaction of secondary school principals with regard to the role of universities and their obstacles in developing their administrative skills. It adopted the descriptive analytical approach. The research community consisted of (249) male and female principals in the schools of Baghdad (Al-Rusafa and Karkh), and the research sample was chosen by the simple random stratified method at a percentage of (40%) of the research community, and the number of the sample was (100) male and female principals. A questionnaire consisting of (40) items distributed between two domains was developed. Its validity and reliability were confirmed. The researcher used the (SPS

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The political changes and economic developments in contemporary Turkish Backgrounds, manifestations and future possibilities
...Show More Authors

         The research entitled "The political changes and economic developments in contemporary Turkish Backgrounds, manifestations and future possibilities" consists of the introduction, four sections and conclusions. The background details, its developments, and the transformation in the economic   sector in Turkey were reviewed. The first section concentrated on the brief introduction about the political developments which happened since the independence of Turkey at 1923 with the highlight on the years after the receipt of the Freedom and Justice Party (Ak PARTi) the Turkish Government rule. The second section demonstrated the reality of Turkish economy before 2002, while the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Total Quality Management and Its Role in the Development of Financial Performance "Reality and Obstacles" (Case Study on Diyala State Company)
...Show More Authors

           This research aims to identify and measure the role of TQM in the process of developing  the financial  performance of  Diyala State Company and show the reality and obstacles, after applying the company's management to the requirements of ISO 9001: 2008 and compare it with its performance before applying this standard, The researcher measured the financial performance by conducting financial analysis of the financial statements and conducting a number of interviews at the company's headquarters, Diyala State Company (one of the Iraqi Ministry of Industry and Minerals formations) was sele

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 23 2025
Journal Name
Journal Of Al-turath University College
The role of the Prophet ( peace be upon him and progeny) in the field of the Administration Regulation and applying Shura Principle Council in Islamic State Administration
...Show More Authors

View Publication
Publication Date
Thu Jun 07 2012
Journal Name
Scientific Research And Essays
Security verification of the return routability protocol by Murphi
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of The College Of Languages (jcl)
Some Reflections on the Semantic Changes of Neos Creativity
...Show More Authors

Various semantic innovations and expansions have been tackled as factors and sources of neos.  A variety of internal (linguistic) and external (extra-linguistic) motives and motifs leads to the appearance of new terms causing such changes in the political language.  Some statesmen are productive in introducing new terms and creative in manipulating expressions and meanings.

      New words are nonces that get metaphorical expansion for quadrilateral motivations resting on extra meaning innovation, new terms at the semantic expansions to be honed as neos.  In tracing the phases of the semantic processes of neos and hulks, lexical and semantic changes might be of widening or narrowing of refe

... Show More
View Publication Preview PDF
Publication Date
Mon May 27 2024
Journal Name
Pakistan Journal Of Criminology
The Liability of Maritime Carrier under the Iraqi Transport Law and International Conventions
...Show More Authors

Everywhere carriers incur a measure of liability for the safety of the goods. Carriers are liable for any damage or for the loss of the goods that are in their possession as carriers unless they prove that the damage or loss is attributable to certain excepted causes. Damaged and lost items can unfortunately be a common problem when shipping freight. Legal responsibilities arise due to loss or damage during transit while cargo is in their care. This study intends to investigate the nature of the liability of the maritime carrier when this liability is realized, and the extent to which it can be paid or disposed of given the risks realized from the transportation process, which may result in damage or loss of the goods, and the damag

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref