Preferred Language
Articles
/
jcopolicy-87
Towards a new global leadership to combat international terrorism

In the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle East in favor of their organization. They tried to co-opt the jihad volunteers who traveled to Bosnia after the break-up of Yugoslavia in 1992 after the Bosnian army was able to contain them but ended up expelling them in the fall of 1995. A year later, al-Qaeda achieved greater success in supervising the training of Pakistani fighters who were smuggled into Kashmir to play a combat role In Afghanistan and elsewhere. Al-Qaeda members have also succeeded in excluding local supporters of Kashmir's independence and mixing the cards between national independence,

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 21 2007
Journal Name
Journal Of Planner And Development
Towards a decentralized planning policy in Iraq

Iraq is changing from the centralized system of governance to the decentralized system, which assumes devolution of more authorities to the local governments of Iraqi provinces and cities. This puts a responsibility on the academics to produce more research work on the best framework for this change, to ensure the best results. The main objective of this research is to suggest a policy for the decentralized transformation in domain of Urban and Regional Planning in Iraq. A suggested program for the transformation is involved in the paper as well, with analysis for the new relationships between different levels of planning authorities depending on democracy. In addition, a description for planning process flows from bottom to top.

View Publication Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Macro Sustainability Accounting: A New Way to Prepare Value Added Statement

Traditional accounting takes only one dimension (economic) in calculating the value added of the company, and all other aspects (including environmental and social) are neglected, and despite the emergence of Sustainability Accounting and the interest of companies in preparing sustainability reports, these reports are suffering from many problems, including multiple metrics used in measuring companies (cash, quantity and lavish). In addition, these reports may reach dozens of pages in some companies and this causes the problem (information overload) which affects the qualitative properties of accounting information such as appropriate and relative, which requires the need to find a tool that can measure the Sustainability Unit of

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Legal Sciences
International Child Abduction in the Framework of the Hague Conference on Private International Law

The prevailing pattern of child abduction has changed in the current era, and is no longer limited to the local borders of states but is taking an international turn, and the most accurate legal use of the term international child abduction originates in the Hague Convention on the Civil Aspects of International Child Abduction, which considers-as the naming of the convention suggests - In cases of kidnapping from the point of view of private international law, the essence of it is a bitter dispute over custody rights that develops to the point of abducting children across borders, to try to obtain custody of the child in another country, so that the snap here is a family member and most often a parent, as it causes many legal consequenc

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The concept of violence in political thought (Theoretical study, compared with the concept of terrorism)

The researcher of human history finds that the first social relations on earth were represented by the violence of Adam, peace be upon him, Cain and Abel. Violence has been a phenomenon of life and society. The history of history is full of all forms of violence and its forms. It speaks of cruelty, oppression and states. History began, in some of its chapters, written with the blood of the victims. It is a testimony to the cruelty of human beings. His human nature and his sin have played a major role that can not be overlooked in the development of important and fundamental developments in some historical turning points where violence was a necessity for life, and its launching change, renewal and reform, and major revolutions in human h

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Dec 24 2022
Journal Name
Journal Of Legal Sciences
The Law Applicable to the Implementation of the Judgment of International Bankruptcy

International bankruptcy is a legal system for those who take trade as a craft and stop performing their obligations of an international character as a result of a defect in their financial position. Legislative jurisdiction in cases of international bankruptcy is one of the most important topics of international bankruptcy by researching the position of national and comparative legislation by determining the applicable law such as the law of the court that hears the dispute or the law to which the attribution rule refers. 

View Publication Preview PDF
Publication Date
Mon Nov 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Effective Leadership in Application of E-Human Resources Management System Applied research at Baghdad International Airport

The research acquires its importance by motivating the behavioural side of the employees to apply modern technology in the work, because of its great importance in increasing the efficiency of employees’ performance and excellence. The research was based on two main hypotheses to show the relationship and impact between the variables through the adoption of a questionnaire to collect data and information related to the research, which consisted of (50) people from administrators working at different levels, based on personal interviews and field visits to collect research data. The data collection process was subjected to statistical analysis using the statistical program (SPSS) (Statistical package for social science) to reach

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Mon Dec 25 2023
Journal Name
Journal Of Legal Sciences
Black money and ways to combat its whitening: A comparative study

The phenomenon of black money laundering (money laundering) receives wide and great attention from researchers of all their intellectual orientations, legal or economists, as this process acquires great importance in light of commercial developments and electronic transactions, Especially after the opening of Iraq to the outside world after 2003, and there are many factors that encourage the process of money laundering, including the large number of crimes, the prevalence of financial and administrative corruption, and the weakness of legal procedures to combat it, as the phenomenon of black money laundering is considered a criminal case that affects developed and developing countries. Because it impedes the tracking and seizure of funds

... Show More
View Publication
Publication Date
Wed Feb 10 2021
Journal Name
Journal Of Legal Sciences
ISIS Violations of International Law “Iraq as a model”

The Iraqi people were subjected to the most brutal crime in the history of humanity when ISIS violated the rights system and targeted women, children, civilians, minorities, religion, belief and the right to education and committed many crimes of genocide and crimes against humanity and the abandonment of millions of citizens and the recruitment of thousands of children, which constituted a flagrant violation of human rights and international law It emphasizes the gravity of the threat to international peace and security by the organization and its associated individuals, groups, institutions and entities, including foreign terrorist fighters.

          That the legal characterization

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Feb 10 2021
Journal Name
Journal Of Legal Sciences
The failure of international law to protect Iraqi cultural property from the intentional destruction by ISIS: A priority worthy of international protection

The destruction and protection of cultural property has been a feature of armed conflicts for thousands of years and it has received increasing international focus over the past two decades. This feature was clearly appeared during the recent armed conflict in Iraq. During the conflict, cultural property was subjected to intentional and organised destruction by members of ISIS. Although there are international legal norms to protect cultural property during armed conflict, however, this destruction has proven the failure of those rules to effectively deter these criminal acts. This Article analyses the framework of international law relevant to the protection of cultural property during of armed conflict in the light of that destruction,

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
View Publication Preview PDF