Preferred Language
Articles
/
jcopolicy-666
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is based on the literature of behavioral economics, with a focus on three basic and recent theories: nudges, fast and slow thinking, and chaos bias. All of them confirm that the ordinary person acts spontaneously, and makes his daily decisions according to what is available, without thinking and contemplation. Thus, they bear characteristics that the security researcher can employ in preventing crime and designing security policies.

Many of the results of studies using poke and behavioral economics theories in crime prevention emphasized the reduction of crime rates, and yielded positive results in preventing crime, rather than combating it, especially in the field of urban planning, shop design, afforestation, lighting, and paving of streets, which encourages the turnout of individuals to it and causes a natural social interaction that prevents the criminal from being motivated to commit his crime.

The study recommends giving more attention to studies about uses of the nudge theory, developing the design of security policies in crime prevention, and supporting modern security studies and security policy studies.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 22 2025
Journal Name
اكليل للدراسات الانسانية
Topic review article Britain and Iraq's book The Economic Status of Iraq during the era of the British administration 1914-1921 by Dr. Hussein Ali Falih Al-Khazraji
...Show More Authors

: Summary Iraq suffered under the British administration during the First World War and its entry into an occupation of economic backwardness, and this economic backwardness was linked to the phenomenon of linking Iraq economically to the capitalist world by keeping it as a source of raw materials and a market for capitalist goods, and that the occupation authorities controlled Iraq's economic goods and wealth and mocked them to serve its interests and achieve their political and economic goals that it drew before the war.

View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Development and innovation in the theory of singing   In the Umayyad era
...Show More Authors

The Umayyad era is characterized by the diversity of the subjects and their multiplicity in the literary phenomena. These phenomena are singing phenomena, although they were known in previous eras, they took a distinctive form in the era.
  In this light, the researcher tried to prove that singing theory in the Umayyad period was characterized by development and renewal. The research was entitled (evolution and renewal in the theory of singing in the Umayyad era).

View Publication Preview PDF
Publication Date
Sat Dec 31 2011
Journal Name
Al-khwarizmi Engineering Journal
Using of Coating Technique by Inorganic Flame Retardants to Protect Civil and Industrial Foundations from Fires
...Show More Authors

   In the present research the flame retardancy to  buildings and industrial foundations which are manufacturing from advanced polymeric  composite material was increased by coating it with surface layer included flame retardant material.  A(3mm) thick antimony tetroxide was used as a coated layer to retard and prevent the flame spread to the coating surface of polyester resin (SIROPOL 8340-PI) reinforced with hybrid fibers as a woven roving (°45-°0) consist of carbon and kevlar (49) fibers, and exposed it to direct flame generated from gas torch at temperature of (2000ºC), at  different exposed distance (10,15,20mm)and study the rang of resistance for this layer and its ability to protec

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
International Journal Of Applied Mathematics & Statistical Sciences
Topological Structures Using Mixed Degree Systems in Graph Theory
...Show More Authors

This paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.

View Publication Preview PDF
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of applying lean construction tools to improving the results of the earned value management model: Applied research in Al-Rasheed General Company for Construction Contracting
...Show More Authors

Contracting companies play a prominent role today in economic activity, due to their contribution to the implementation of major construction projects which together constitute the infrastructure of society. Most construction projects also suffer from exceeding the time and cost specified and planned for the completion of the project, and this comes for several reasons, including the work environment, country conditions, The method of managing project costs and the techniques used in its implementation Accordingly, the concepts of lean construction came, which help in addressing the causes of waste, both in time and cost, in addition to the fact that project management needs techniques that are useful in controlling the control and manag

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of The College Of Education For Women
The Warning Messages of Jeanne DuPrau’sThe City of Ember to the World with Reference to Gil Kenan’s Film Adaptation: The Theory of Conspiracy
...Show More Authors

The City of Ember is a very interesting novel that is although intended for young readers, have so many layers and messages that are misunderstood. In this research, both the novel and the film adaptation are studied with the intent to decode the warning messages that the novelist and the director tried to introduce to the audience. The research studies four vital messages; the first message is that history repeats itself for the novel has many allusions to the history of Jews and their painful holocaust and even goes back in history the days of Moses and the Exodus, the second message tackles the conspiracy theory that states nothing happens by accident and that everything is planned and connected hence comes the third message

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref