Preferred Language
Articles
/
jcopolicy-606
The Role of Association of Southeast Asian Nations (Asean) in Achieving Regional Security
...Show More Authors

The organizational structure of relations between states is among the main features that distinguished the twentieth century as the era of international organization, especially after the increase in the number of political units after World War II in which regionalism was crystallized as a phenomenon. It is not modern, as there are many blocs such as the European Union that have developed in it, the idea of ​​regional bloc is prominent, especially in Europe, as it emerged after a controversy revolved around what was called globalism in the face of Globalism vs. Regionalism. Regional, as the proponents of the global orientation saw the establishment of a global organization that includes all countries, as the best way to achieve international peace and security, while the proponents of the regional orientation emphasized the importance of establishing regional organizations to achieve this, and from here the theory of “regional peace” arose after the World War the second. Since the capabilities of developing countries to compete are weak, many of these countries have sought to take one form or another of regional cooperation in order to enhance their economic capacity in facing these challenges. In this context, the experience of the Association of Southeast Asian Nations, known as ASEAN for short, represents a distinct model in this regard, which prompted it to be considered a model capable of being emulated by developing countries in their quest to maximize their gains in light of the contemporary international reality. Hence the importance of this research paper, which seeks to identify the factors of success or failure of the “ASEAN” experience in achieving regional security, its weaknesses, the challenges and difficulties it faces, and how to deal with them, in order to identify the extent of the possibilities of benefiting from this experience within the Arab region.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Wed Sep 20 2023
Journal Name
Scientific Culture
THE REALITY OF THE PARTICIPATION OF FEMALE ENTREPRENEURS IN ACHIEVING THE GOALS OF SUSTAINABLE DEVELOPMENT/ A FIELD STUDY IN BAGHDAD GOVERNORATE
...Show More Authors

Abstract In light of the changing conditions that prevail in society, and the intense competition that institutions and countries are forced to face, especially after the opening of markets, and the transformation of the world into what is called a small village, entrepreneurship has emerged as an important tool for dealing with the developments of societies, whether it is related to individual business projects or Economics for national business, leadership was the key to any driving force towards achieving growth. Today, women are no longer captive to a specific orientation, but rather all horizons and fields of work have been opened to them, and they have been able to occupy the most important economic, voluntary, service, and

... Show More
View Publication
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Use Of Artificial Neural Networks In Developing The Role Of Auditor In Discovering Fundamental Errors: An Applied Research In General Company for Electrical Industries and Nasr General Company for Mechanical Industries
...Show More Authors

Artificial neural networks usage, as a developed technique, increased in many fields such as Auditing business. Contemporary auditor should cope with the challenges of the technology evolution in the business environment by using computerized techniques such as Artificial neural networks, This research is the first work made in the field of modern techniques of the artificial neural networks in the field of auditing; it is made by using thesample of neural networks as a sample of the artificial multi-layer Back Propagation neural networks in the field of detecting fundamental mistakes of the financial statements when making auditing. The research objectives at offering a methodology for the application of theartificial neural networks wi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the internal audit in the performance enhancing
...Show More Authors

  After the internal audit as a tool of internal control in any organization, and helps in the evaluation of all internal control activities, as a tool to ensure compliance with the plans and policies to achieve the goals of the institution as much as possible of the efficiency, effectiveness, and should have the Internal Audit full independence and is linked to senior management, and aims to get the credibility and accuracy of information and data, and keep abreast of modern developments.

  The practical side includes the preparation of the questionnaire, which included a set of questions that fit the hypothesis of the research, was Tozeiha the research sample consisting of employees of the Internal Audit Department an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of Cost awareness of activation of strategic cost management techniques of industrial units: A prospective study at the General Company for the manufacture of medicines and medical supplies in the province of Mosul
...Show More Authors

The last ten years observed a shift enormous scientific in the method and way that it deals professional with the cost accounting and reflected the result those shift enormous scientific of increase the competitive environmental that accompanied the emergence of a modern manufacturing environmental on surface the long roductive life and emergence advanced information technology that give a central focus of his important on client with growing global markets growth on a large scale.

        The research aim to define the concept of cost awareness, the concept and methods of  strategic cost management and the role of cost awareness for managers of industrial units in strategic of cost managem

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
Lecture Notes In Networks And Systems
Advanced Security Technique in Presence of Open Communication System and Cyber Era
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security of Iris Recognition and Voice Recognition Techniques
...Show More Authors

  Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Culture Consumption in an Increase of Deception Marketing , a Sample Survey of Cosmetic Users Employees College of Administration & Economics / University of Mosul
...Show More Authors

Economics / University of Mosul

 

Abstract

The spread of the phenomenon of excessive buying in our society, especially for cosmetics, and at the same time increase the marketing deception by the organizations to take quick profit 'and accordingly was identified the problem of research in several questions, including:

Is there a significant effect of consumption culture on marketing deception?                                                &n

... Show More
View Publication Preview PDF
Crossref