Preferred Language
Articles
/
jcopolicy-666
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is based on the literature of behavioral economics, with a focus on three basic and recent theories: nudges, fast and slow thinking, and chaos bias. All of them confirm that the ordinary person acts spontaneously, and makes his daily decisions according to what is available, without thinking and contemplation. Thus, they bear characteristics that the security researcher can employ in preventing crime and designing security policies.

Many of the results of studies using poke and behavioral economics theories in crime prevention emphasized the reduction of crime rates, and yielded positive results in preventing crime, rather than combating it, especially in the field of urban planning, shop design, afforestation, lighting, and paving of streets, which encourages the turnout of individuals to it and causes a natural social interaction that prevents the criminal from being motivated to commit his crime.

The study recommends giving more attention to studies about uses of the nudge theory, developing the design of security policies in crime prevention, and supporting modern security studies and security policy studies.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

Scopus (58)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte

... Show More
Scopus (58)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

View Publication
Scopus (58)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Wed Dec 29 2021
Journal Name
Modern Sport
Effect of rehabilitation exercises in improving the motor range of people with partial rupture of the anterior cruciate ligament of the knee joint by ages (30-35) men
...Show More Authors

The study aimed to prepare rehabilitation exercises using some rubber ropes for people with partial rupture of the anterior cruciate ligament, to recognize their effect on the recovery of motor tides and to reduce the pain of those with partial rupture of the anterior cruciate ligament of the knee joint, and adopted the experimental method by designing the experimental and controlled groups on a sample of those with partial rupture of the anterior cruciate ligament of men (30-35) One year of those who attend the Physiotherapy Center/Rafidain University College of 12 injured were deliberately selected from their community of origin by (100%), and after determining the measuring tools and preparation of exercises applied with rubber r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Optimizing Blockchain Consensus: Incorporating Trust Value in the Practical Byzantine Fault Tolerance Algorithm with Boneh-Lynn-Shacham Aggregate Signature
...Show More Authors

The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Dec 30 2019
Journal Name
College Of Islamic Sciences
The matter, its wisdom, and models of its applications In Ahmadiyya interpretations Research drawn from a doctoral thesis
...Show More Authors

This study examined the tagged (the matter, its ruling, and examples of its applications in Ahmadiyya interpretations), the study of devising formulas of commissioning, especially the matter from the book of interpretation, which is: (Ahmadiyyeh’s interpretations), and the contemplative of the nature of (Ahmadiyya’s interpretations) realizes that the cognitive, linguistic and juristic knowledge product and the verses of judgments And other is the focus of this immortal travel, as it is truly a comprehensive book containing what the students of knowledge, scholars and the general public need in terms of interpreting the legal verses, and it is not possible to reach an understanding of the Book of God Almighty, and to clarify his purpo

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Usage of non-linear programming in building a mathematical model for production planning according to discount constraints put on bought amount
...Show More Authors

Abstract

 This research deals will the declared production planning operation in the general company of planting oils, which have  great role in production operations management who had built mathematical model for correct non-linear programming according to discounting operation during raw materials or half-made materials purchasing operation which concentration of six main products by company but discount included just three products of raw materials, and there were six months taken from the 1st half of 2014 as a planning period has been chosen . Simulated annealing algorithm  application on non-linear model which been more difficulty than possible solution when imposed restric

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 19 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Elements of Promotion Mix and Their Effect in Insurance Service Marketing by Using Factor Analysis Approach: An Exploratory Research foe views of works Sample at the National Insurance Company
...Show More Authors

The insurance is considered as one of the sectors that is impact is vital to the national economy and development programs, Insurance companies as financial institutions have an effect an aspects of social, economic as well as the participation of enterprises in compensation for the risk potential losses and individuals, Insurance sector provides insurance service insurance which should be characterized by quality and satisfy  needs and desires of the customer , so the  raise insurance awareness in the community its members and institutions will help in  maintaining the movement of production and service delivery standards, quality sought by the insured to obtain, as well as the development of promotional programs, and use

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Global Trends In Pharmaceutical Sciences
A REVIEW: CEFPODOXIME PROXETIL (DOXEF. PROXETIL) DISCOVERY, PREPARATION, APPLICATIONS AND COMPARISON WITH CEFPODOXIME- CLAVULANIC ACID IN ACTIVITY
...Show More Authors