-
The problem of the study represented in the gap between what banks possess of Information Technology and Knowledge Management and what they need to help them in decision making and problem solving and achieving High Business Value. It formed a focus and fundamental point for this study in its analysis and interpretation. This was done by a scientific methodology and five chapters.
The study aimed at analyzing the use of partnering Information Technology with Knowledge Management to achieve High Business Value at commercial banks in Jordan. Data were collected from 116 managers, experts, and advisors working for 16 Jordanian banks through a questionnaire designed as a tool to measure the model. The variables levels of the study were analyzed by using descriptive statistics (means, standard deviations, and coefficient variance).
The relations were tested by inferential statistics such as Pearson's correlation, and impact was tested by using simple and multiple regression linear. Then ANOVA Two-way analysis among more two groups, and on an interval dependent variable and one way ANOVA between two variable were used to test the differences.
Through analysis of practical applications the study concluded a number of findings, the most important were:
- The correlation’s investigation showed a strong and significant relation between Knowledge and High Business Value of banks business. The resulted correlation was (86.9%). Another strong relation coefficient was found between Information Technology and High Business Value (88.3%).There was also a very strong relation between the shared use of Knowledge Management and Information Technology and the High Business Value for the commercial banks (90.6%).
- The test results on the impact showed a clear direct and positive impact in the obtained increment of the banks Business Value as a result of the combined use of Information Technology and Knowledge management reached 61.2% for Information Technology and 48.3% for Knowledge management.
- The impact test results also showed a strong significant and direct impact in Business Value resulted from employment of Information Technology. The increase in one unit in one Information Technology variable affected the increase in High Business Value by (1.03) unit. On the other hand the increase in one unit in Knowledge Management affected the High Business Value by (1.26) rise.
An edge dominating set of a graph is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G. The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin
... Show MoreCervical Uterine Cancer is a disease that explains the vulnerability in which women are in terms of reproductive health with an impact on occupational health and public health, even when in Mexico the prevalence rate is lower than the other member countries of the OECD, its impact on Human Development and Local Development shows the importance that the disease have in communities more than in cities where prevention policies through check-ups and medical examinations seem to curb the trend, but show the lack of opportunities and capacities of health centers in rural areas. To establish the reliability, validity, and correlations between the variables reported in the literature with respect to their weighting in a public hospital. A
... Show MoreThe importance of television has emerged as an effective and influential force in the lives of societies and peoples, And not just a professional media since the fifties of the twentieth century, It was used as a platform to achieve the goals and objectives of the media and politics for governments, agencies and individuals in different countries of the world, Using many methods, methods and techniques that later became important major subjects and curricula and a scientific specialization that was founded for him to study and teach in most international universities, The media, especially television and satellite channels, play an active and significant role in managing crises and conflicts and directing them through the methods of deal
... Show MoreSince there is no market for bond issuance by companies in the Iraqi market and the difficulty of borrowing, companies must resort to proprietary financing to finance their investments. However, in the framework of the literature of financial management, the type of financing used by the company sends signals to investors and therefore reflected on the market value. Therefore, the problem of the study revolves around the variables of the study (Equity financing within the framework the signal theory, price of common stock in the Iraqi market).
The study aims to verify the impact of the capital increase through the issuance of new stock on the price of
... Show MoreThis paper discusses the role of Auditors' Technological Maturity in reinforcing the quality of auditing profession, through focusing on the concepts of Technological Maturity and quality of auditing profession, as well as designing a proposed model for Technological Maturity which includes five evolutionary and sequential stages, and this proposed model would contribute to reinforce the quality of auditing. This proposed model will be employed in the field of auditing profession because the importance of the development and investment in this profession and the importance of the need for specialized knowledge in Information Technology, and the result of a proposed model is development of technological knowledge for the auditor to reach
... Show MoreInterested in this research shed light on the reality of foreign trade to Iraq Who suffers from a marked deterioration due to poor economic diversification of the country And increase the degree of economic exposure , Which creates a state of extreme caution towards the question of accession to the (WTO) , As controls Iraq's foreign trade commodity , a president of one oil As well as the contribution of this item , and by a large formation in GDP , And that such a large and dangerous decline in the degree of economic diversification will create negative effects On overall economic activity components&
... Show MoreAn image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-
... Show MoreImproving speaking skills of Iraqi EFL students was the main purpose of the current research. Thirty EFL students were selected as the research participants for achieving this aim. All students completed the pretest and then spent the next 25 weeks meeting for 90 minutes each to present their nine lectures, answer difficult questions, and get feedback on their use of language in context. Progressive-tests, posttests and delayed post-tests followed every three courses. The researcher utilized SPSS 22 to anal Analyze the data descriptively and inferentially after doing an ANOVA on repeated measurements. It has been shown that using the ideas of sociocultural theory in the classroom has an important and positive impact on students of
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.