The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The role of the academic institution” depending on its intellectual origins on the ideas of Renaissance and Enlightenment philosophers such as Hobbes, Locke, Rousseau and Kant, after mixing it with the critical style of the Frankfurt School. While the Paris School deals with “globalization of security”, “collection and analysis”, and “The link between internal and external security”. Its intellectual origins are based on the approaches of Michel Foucault and Pierre Bourdieu.
TI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show MoreAbstract
The aim of the research is to identify the role of ethical leadership in achieving comprehensive quality standards in public education schools in the Al-Ardha governorate. To achieve this goal, the descriptive approach was used, the researcher developed a questionnaire consisting of (35) items, divided into two sections: the first one is related to ethical leadership includes (17) items, and the second section relates to total quality management includes (18) items. The research sample consisted of (405) teachers from the stages of public education. The results showed that the level of ethical leadership practice (ethical personal characteristics, ethical administrative features, teamwork, and human rela
... Show MoreAlthough Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. M
... Show MoreThe aim of the current research is to know the degree to which middle school teachers and female teachers in the southern border schools use electronic educational alternatives in the field of education from their point of view and its relationship to some variables, and to achieve this goal, a random sample of (200) teachers was selected in southern border schools, and a questionnaire was prepared to collect The data, as well as the descriptive approach was used to achieve this goal. T-test and analysis of variance were used for the statistical treatment. The results concluded that the educational courses provided to male and female teachers are not sufficient. It has also been concluded that the use of electronic educational alternativ
... Show MoreAs contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o
... Show MoreAbstract
The factor that keeps society from collapsing and regressing to chaos, violence, and lawbreaking is to stick to the human moral principles and criteria of moral behavior that prevent the spread of corruption and crime to the extent that law becomes devoid of activity and loss its dot errant power in front of chaos. The role of moral behavior is to motivate individuals to respect the general laws in dealing with others. Because of the dissemination of odd behavior patterns within our society, the social links are been badly affected and it's urgent for educational institutions to perform their duty in working on spreading awareness about moral values and avoid deviant directions and socially threatening t
... Show MoreNowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThis study aimed to develop scale of Selectiv Mutism with pupils of primary schools according to their teachers' view in Baghdad city (Karh and Resaf(.
Children might choose the mutism as the solution to avoid some psychological and social problems that surrounded them. Furthermore, this could consider as a disorder that could effect the child and led him to use the Selected Mutism.
This is supported by the pilot study which was conducted by the researcher on 150 teachers in different primary schools in Baghdad. The results revealed some symptoms were found with children who have selected mutism.
Because of there was no scale was found to measure the Selected Mutism, a scale was develop in order to measure t
... Show MoreThe current research aims to identify the effectiveness of a computerized program in developing mathematical skills among the first cycle students in basic education schools in the Sultanate of Oman. The two researchers used the quasi-experimental approach on an intentional sample consisting of (40) male and female students at Al Kawakeb School for Basic Education (1-4). Two of the basic fourth-grade classes and then randomly distributing them into two groups, one is experimental (20) male and female students who followed the computerized interactive program, and the other is (20) male and female students followed the traditional way. On the other hand, its reliability has reached (0.81), and the results of the research have concluded th
... Show More