Preferred Language
Articles
/
jcopolicy-628
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
The economic dimensions of the railway link between Iraq and Kuwait and the role of national alternatives (Faw port and the dry canal as a model(
...Show More Authors

   Decision-makers in each country work to define a list of internal and external interests, goals and threats to their countries according to the nature of their awareness of these interests, goals and threats. 

  Hence, Iraq is not an exception to this rule, and the process of evaluating its interests and the objectives of its foreign policy is subject to the pattern of awareness of decision-makers and the influencing forces in defining its basic interests, which often witness some kind of difference in defining them, evaluating their importance and determining the size of the threats they face. And among these interests and threats that have witnessed a difference in the assessment of their

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 28 2023
Journal Name
Al–bahith Al–a'alami
Public Attitudes Towards National Issues in Interactive Television Programs
...Show More Authors

This research aims to investigate the extent to which the Iraqi audience relies on interactive television programs as a source of information regarding national issues and their resulting impacts. It seeks to identify the types and nature of attitudes developed among the public towards national issues through these programs and determine the prominent topics and issues highlighted to the audience. The researcher employed a field survey as the primary research method, employing a questionnaire for data collection along with scientific observation and the Likert three-point scale to measure attitudes. The study was guided by the media dependency theory. A sample of 520 questionnaires was distributed to residents in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 08 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Determination of Diabetes type 2 Clients’ Self-Management Skills toward Dietary Pattern
...Show More Authors

Objective: study aims to identify the diabetes type2 clients self management skills toward dietary pattern
, and find out the relationship between variables which are (Age, gender, educational level, duration of DM
diagnosis, and monthly income) with diabetes type 2 clients self management skills toward dietary pattern
Methodology: descriptive study was carried out through the present investigation from January 2nd
2011to September 2nd 2011 in order to achieve the objectives of the present study. A non probability
(purposive) sample, (200) cases which consists of clients who were attending Al-Nasiriyha diabetic center.
Including (118) males and (82) females. The data were collected by utilization of the study instrument

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Biochem. Cell. Arch.
Venation pattern and leaf architectures of cordia myxa L. from boraginaceae family
...Show More Authors

Scopus (2)
Scopus
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Characteristics and pattern of organizational structure for general inspectors offices :Testing Research
...Show More Authors


    
Concentrated research topic in addressing variable vital to the work of offices of inspectors general, construction and scale effectiveness and efficiency is the organizational structure, which are important as is obvious to any researcher in the management and organization and this variable would affect the exercise task supervision and inspection of financial and administrative corruption and combat efficiently, Thus this effect will be placed in the fold ability to achieve goals. That the creation of the organizational structure and requirements to achieve harmony between its properties is creating step towards success. This research aims to analyze the characteristics and style o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
Prescribing pattern of antibiotics in AL-Elwia Pediatric Teaching Hospital, Baghdad, 2016.
...Show More Authors

Background: Antibiotics are among the most commonly used medicine, in both community and hospital setting, all over the world especially in countries where no strict guideline to regulate their use. In Iraq, only a few studies conducted to describe the antibiotic prescription pattern in general hospitalsand even less in pediatric hospital.

Objective: To describe the patterns for antibiotics used in Elwia pediatric teaching hospital in Baghdad, Iraq

Type of the study: Descriptive cross sectional study.

.Methodology: The study was conducted at AL-Elwia Pediatric Teaching Hospitalduring the year 2016. A random sample from all the prescriptions sheets

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication