Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
The subject of the information technology system ( ITS ) of the important issues And contemporary thought in management, and various types of organizations seeking to apply and try to
... Show MoreLive the present companies in a competitive business environment going on and try to achieve excellence in their industry through the marketing of their products and achieve greater market share as possible to ensure its continued existence, and perhaps the concept of time production, which confirms, in essence, on the need to reduce inventory to a minimum in the production process as well as the concept of the marketing information system which asserts, in essence, to document all the events that are related to the marketing of the product provided by the production process, together constitute the subject deserves research and investigation as they have raised well-known in the fields of production management and marketing management.
... Show MoreThis research aims to clarify the principles governing the exploration and utilization of outer space, emphasizing the role of international law, particularly international criminal law, in addressing crimes committed beyond Earth whether aboard spacecraft, the International Space Station, or in outer space generally. It examines relevant international treaties governing outer space activities, evaluates their strengths and ambiguities, and highlights deficiencies in their provisions. Furthermore, the study analyzes traditional principles of state criminal jurisdiction territoriality, nationality, universality, and protection and assesses their applicability to offenses committed in outer space.
This research aims to study the impact of strategic information systems on the development of intellectual capital in the Public Shareholding Electricity Distribution Company in the Hashemite Kingdom of Jordan. To achieve the objectives of the study, a questionnaire was developed for the purpose of data collection, as the number of valid questionnaires for analysis was about (135), and SPSS and AMOS 0.26 software was used to analyze the collected data. The study found out that the respondents' perceptions of the level of importance of strategic information systems and the level of importance of intellectual capital were high, and that the relational capital has ranked as first, followed by structural capital, and h
... Show MoreAbstract
The entities responsible for regulating the financial market are seeking to provide high quality accounting information, to provide appropriate protection to investors, and thus encourage them and attract them to increase their investments. the research reached several conclusion, the most prominent of which comes :-
1-The production of high quality accounting information reduces investment costs and costs of processing accounting information.
2- The production of high quality accounting information helps investors identify the best investment opportunities.
3- The results of the statistical analysis showed that there is significant
... Show MoreThis study aims to observe and analysis the propaganda discourse image for Daesh, and know how it marketing the fear due to symbols structure, and discover the straight meanings and hidden inspiration, with the ideology that the image presented.
The study is descriptive and qualitative, and the method is analytic survey used semiotic approach.
The most important results of the study refer to:
- Daesh functioning the image in fear manufacture in all it components: the symbol of savageness, body language, color, clothes uniform and professionally shot.
- The indicative meaning of fear promoted by Daesh based of the manufacturing «Holy», and that mean places non-touchable and non-insulted.
- Daesh used in its propagand
Purpose: To identify the size of the food gap for the main agricultural products and crops in Iraq, which reflects to us the extent to which agricultural production in particular and the agricultural sector in general have declined.Theoretical framework: The theoretical side of the research dealt with the definition of self-sufficiency and the food gap, as well as identifying the reality of agricultural production in Iraq during the study period, as well as the reality of the food gap for the most important agricultural, plant and animal products.Design/methodology/approach: In reviewing the research problem, the researcher adopted the method of deductive and descriptive analysis based on the presentation and detail of official data
... Show MoreThe research addressed the formal functions resulting from the use of various guiding signs in the design of the interior spaces of airports in various pragmatic, expressive and psychological aspects. The aim is to identify the functions the guiding signs perform in facilitating and organizing the travelers' movement and satisfying the needs of the visitors and users of the unfamiliar places which they intend to visit, the nature of the services offered by these signs as one of the important parts within their general design. The research also identified the concept and types of signs as a means of visual communication and how to employ them in the design of the airports public spaces, and what are the criteria of their use and fu
... Show Morewith an organized propaganda campaign. This military campaign was helped to formulate its speech by many institutions, research centers, and knowledge and intelligence circles in order to mobilize public opinion gain supporters and face the opponents by different means depending on a variety of styles to achieve its required effects.
After the US occupation of Iraq, US media fighters sought to influence the Iraqi public opinion and making them convinced them of the important presence of US military forces in Iraq which necessitated finding its justification through the use of persuasive techniques in its intensive propaganda campaigns.
This research discusses the most important