Preferred Language
Articles
/
jeasiq-1143
السياسة الضريبية المحلية في ظل العولمة ( مع إشارة خاصة لالسياسة الضريبية المحلية في ظل العولمة ( مع إشارة خاصة لبلدان جنوب شرق آسيا)بلدان جنوب شرق آسيا)
...Show More Authors

تركت العولمة المتسارعة أثرا عميقا على مدى واسع من السياسات والتطبيقات الاقتصادية في كل من الدول النامية والمتقدمة على حد سواء, إذ نشأت الأنظمة الضريبية الحالية عندما نمّط كل بلد سياسته الضريبية بشكل تركز معه على متطلبات الاقتصاد المحلي, وعندما كانت تعقد المفاوضات بين الأمم المختلفة حول المعاملات الضريبية والاتفاقات الضريبية كانت تجري في إطار من هيمنة السياسة الضريبية المحلية.

لكن العولمة قد غيرت من هذا خاصة فيما يتعلق بمستوى الضرائب أو مزيج الضرائب
(الهيكل الضريبي) أو تصميم بعض أنواع الضرائب، وكذلك من حالة الإدارة الضريبية
وامتثال المكلف. وبدأت الأقطار تكشف قلقا متزايدا و حساسية متنامية للتغيرات الضريبية, التي بدأت تظهر من قبل الشركاء التجاريين أو المنافسين, وبدأ يضيق معها هامش الاستقلالية الذاتية التي تركز على السياسات الضريبية المحلية.

مما حدى ببعض الاقتصاديين (مثل vito tanzi    عام 2000) لاستخدام مصطلح النمل الأبيض المالي fiscal termites"  لوصف مدى تأثير التغيرات التكنولوجية والعولمة على الأنظمة الضريبية الوطنية.

ومن المتوقع أن يكون تبني الأنظمة الضريبية  للعولمة بطيئا فضلا عن كونه متقطعاً وغير مستقر, كذلك من الممكن إذا ما جابهت الإدارات الضريبية  تحديات في ادارة الضرائب الحالية, فقد يظهر نوع جديد من الضرائب مع ظهور تقنيات وفعاليات جديدة.

لذا يهدف هذا البحث لتحليل أهم آثار العولمة ونتائج التكامل المتعاظم في الاقتصاد العالمي على الأنظمة الضريبية في الدول النامية عموما، ودول جنوب شرق آسيا خصوصا.

وأنطلق البحث من فرضية مفادها, وجود علاقة عكسية بين درجة اندماج الدول النامية في ركب العولمة والحصيلة الضريبية المحلية في هذه الدول.

وتوخيا للهدف السابق جاءت هيكلية البحث في ثلاثة مباحث, كل مبحث تضمن مطلبين, تناول المبحث الأول منها حركة عناصر الانتاج وتوزيع العبء الضريبي عليها, أما المبحث الثاني فتناول المنافسة الضريبية وحركة الاستثمار الأجنبي المباشر, وجاء المبحث الثالث لينصرف للاهتمام بثورة الاتصالات والابتكار الضريبي المطلوب, وصولا في الختام  للاستنتاجات والمقترحات.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
An excerpt on the analysis of correlate constructions: Exkurs zur Analyse der Korrelatkonstruktionen
...Show More Authors

The main idea that led me to write such research paper within the framework of Germanic linguistics is that I have not found any topic dealing with the term correlate in the German language, except in several articles in linguistic journals as well as one topic in a book describing the use of such a linguistic phenomenon in the language system. The research initially deals with the definition of the correlate at the level of the German language system. Correlate is unity describes specific relation of two sentences and identifies denoted constructs. Correlate is called a placeholder at the syntactic level because it does not occupy its original topological fields in the syntactic structure. The correlate (es) or the prepositiona

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
" أنعكاس تبني المعيار المحاسبي الدولي رقم ( 2 ) للقطاع العام على بيان التدفق النقدي "
...Show More Authors

يعد بيان التدفق النقدي من البيانات المهمة الصادرة من الوحدات الحكومية غير الهادفة للربح، بعد تبنيها معايير IPSASs ، مما يوفر معلومات اوسع تلبي حاجات المستخدمين لأتخاذ القرارات المناسبة . أذ يتضمن بيان التدفق النقدي بموجب المعيار رقم ( 2 ) التدفقات النقدية حسب الأنشطة التشغيلية و الاستثمارية والتمويلية ، وهذا لا ينسجم مع مخرجات النظام المحاسبي الحكومي العراقي . وان هدف البحث هو  التعرف

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Re-distribution of income in favor of the poor - theoretical entrance of stagnation treatment
...Show More Authors

Research deals the crises of the global recession of the facets of different and calls for the need to think out of the ordinary theory and find the arguments of the theory to accommodate the evolution of life, globalization and technological change and the standard of living of individuals and the size of the disparity in income distribution is not on the national level, but also at the global level as well, without paying attention to the potential resistance for thought the usual classical, Where the greater the returns of factors of production, the consumption will increase, and that the marginal propensity to consume may rise and the rise at rates greater with slices of low-income (the mouths of the poor) wi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Abuse elder and relationship life review
...Show More Authors

The study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 31 2020
Journal Name
College Of Islamic Sciences
(Generalized Anxiety Disorder among Students of Baisc Education in Unv of Sulamina)
...Show More Authors

The current research aims to measure Generalized Anxiety Disorder among students of the University of Sulaymaniyah / College of Basic Education, and to identify the significance of differences between sex, scientific specialization and age, and for that reason, the research sample of (102) male and female students was chosen in a random manner, and the researcher used the diagnostic criteria for the generalized anxiety disorder contained He mentioned it in the Statistical and Diagnostic Manual of Psychiatry, and the paragraphs of the scale were formulated according to those standards after they verify the conditions of honesty and consistency, and the use of appropriate statistical means. The results of the research indicated that genera

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
Divine orders Divine orders directed to his prophets (peace be upon them): Divine orders directed to his prophets (peace be upon them)
...Show More Authors

 

ملخص البحث:

    ان الله تعالى هو الذي خلق جميع المخلوقات ، والذي بيده الموت والحياة وان كل هذه المخلوقات تحتاج الى اوامر ، وهذه الاوامر الالهية وجهها الله لعبادة بوساطة انبياءه ( عليهم السلام) فكانوا هم اول المستسلمين والمنقادين لأوامره ، فجاءت الآيات الكريمة مخاطبة للأنبياء واقوامهم بشكل عام ولنبينا محمد (r) بشكل خاص.

اما عن المضمون البحثي فقد جاءت مادته مقسمة الى ثل

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Iraqi Journal Of Physics
Bandwidth Improvement of a Cone-Inverted Cylindrical and Cross Hybrids Dielectric Resonator Antennas
...Show More Authors

In this work, two cone-inverted cylindrical and cross-hybrid dielectric resonator antennas are stacked and excited by the coaxial probe method with an operating standard resonant frequency of 5.438 GHz. A drawback of these standard Dielectric Resonator Antennas (DRAs) is their narrow bandwidth. For good antenna performance, a stacked DR geometry and a thick dielectric substrate having a low dielectric constant are desired since this provides large bandwidth, better radiation power, reduces conductor loss and nonappearance of surface waves. Many approaches, such as changing the shape of the dielectric resonator, have been used to enhance bandwidth. Using DRA, having the lowest dielectric constant, increases the bandwidth and the electroma

... Show More
View Publication Preview PDF
Crossref