Preferred Language
Articles
/
jcopolicy-666
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is based on the literature of behavioral economics, with a focus on three basic and recent theories: nudges, fast and slow thinking, and chaos bias. All of them confirm that the ordinary person acts spontaneously, and makes his daily decisions according to what is available, without thinking and contemplation. Thus, they bear characteristics that the security researcher can employ in preventing crime and designing security policies.

Many of the results of studies using poke and behavioral economics theories in crime prevention emphasized the reduction of crime rates, and yielded positive results in preventing crime, rather than combating it, especially in the field of urban planning, shop design, afforestation, lighting, and paving of streets, which encourages the turnout of individuals to it and causes a natural social interaction that prevents the criminal from being motivated to commit his crime.

The study recommends giving more attention to studies about uses of the nudge theory, developing the design of security policies in crime prevention, and supporting modern security studies and security policy studies.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 29 2021
Journal Name
Journal Of The College Of Education For Women
Professional Development and its Relationship with some Variables in the Light of Sullivan Theory among Male and Female Teachers in the Basic Education Schools in Sultanate of Oman: سالم بن ناصر بن سعيد الكحالي
...Show More Authors

The study aims to reveal the level of professional development in basic education schools from the male and female teachers’ viewpoint in the Sultanate of Oman. It further aims to examine its relationship with some variables in light of Sullivan theory, and the differences in the level of professional development (teachers’ skills, professional participation, professional development problems) according to the gender variable, and the educational stage (first cycle/ second cycle). The study sample consisted of (93) teachers distributed as such: (46) male teachers, and (47) female teachers. A questionnaire was prepared and applied to measure the level of the professional development of the male and female teachers. The questionnaire c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Role of Managerial Accounting Information System in Improving the Value Chain and its Impaction Evaluation Performance: دراسة حالة في الشركة العامة لصناعة الزيوت النباتية
...Show More Authors

The performance measures and traditional methods used in management accounting is no longer able to provide convenient to evaluate the performance of economic units in the modern manufacturing environment information، and so this information is more important and feasibility must be Mistohat of all the company's activities and functions، and it is a problem Find the inadequacy of information management accounting that contribute to meet the needs of the upper levels of management to cope with the problems resulting from the increased size and complexity of the business، and lack of management accounting information and methods used in the performance evaluation، which reflected negatively on the value chain activities and then on the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
Developing the Skill of Friendship for Kindergarten Children in the Light of Bandura's Theory Social Learning: Ministry of Education / Baghdad Directorate of Education, Al/Rusafa
...Show More Authors

The current research aims to identify the effect of the program to develop the skill of friendship among kindergarten children, as well as the scope of the impact of the program on the sample. To achieve the objectives of the research, the researcher hypothesizes there is no significant difference between the average scores of the sample members on the friendship skill scale for the dimensional scale according to the experimental and control group. The research sample consisted of (60) girl and boy with age ranges (4-6) who were randomly selected from the Kindergarten Unity at Baghdad city/ Rusafa 1. The children were distributed into an experimental and control group, each group consists of (30) girl and boy. The two groups were chosen

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Extent of application the principles of total quality management in Improving health services in hospitals exploratory study at Al-kindi hospital / Baghdad health department Rusafa
...Show More Authors

Abstract :

The purpose of the subject of Total quality management is an important management style in organizations including hospitals through the achievement of this method of success in the administration to include        this approach describes the provision of health services and make adjustment and suggestions that  help to improve the quality of health care on an ongoing basis . Hence the idea of the study to shed light on the reality of the application of principles of  Total quality management and to highlight the quality of health services provided in al-kindi hospital / Baghdad health department rusafa and the staff at the hospital were included to find out the appl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Electronic Trading Useand its Impacton Iraqi Stock Exchange Performance Improvement
...Show More Authors

The Research examines the transmission advantage from Floor Trading (FT) to the Electronic Trading (ET) in the Iraqi Stock Exchange (ISE). Testing three hypothesis, first, test the significant different of market depth before and after period of ET used, second, test the significant different of market liquidity also before and after period of ET used. And third test the impact of market depth and liquidity on the performance of ISE. AnEvent Study is depended with 74 observing distributed equality on research period which is extent among 2006 to 2012, Note that the event window is 5-7-2009.The Result of hypothesis testing explore that the all three null main hypothesis is refusing and accept the alternative of it's because the ET

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 01 2016
Journal Name
International Journal Of Applied Mathematics & Statistical Sciences
Topological Structures Using Mixed Degree Systems in Graph Theory
...Show More Authors

This paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.

View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref