Preferred Language
Articles
/
jeasiq-1397
الاستخدام المشترك لتكنولوجيا المعلومات وإدارة المعرفة لتحقيق قيمة عالية لأعمال البنوك التجارية الأردنية( )
...Show More Authors
  •  

    The problem of the study represented in the gap between what banks possess of Information Technology and Knowledge Management and what they need to help them in decision making and problem solving and achieving High Business Value. It formed a focus and fundamental point for this study in its analysis and interpretation. This was done by a scientific methodology and five chapters.

    The study aimed at analyzing the use of partnering Information Technology with Knowledge Management to achieve High Business Value at commercial banks in Jordan. Data were collected from 116 managers, experts, and advisors working for 16 Jordanian banks through a questionnaire designed as a tool to measure the model. The variables levels of the study were analyzed by using descriptive statistics (means, standard deviations, and coefficient variance).

    The relations were tested by inferential statistics such as Pearson's correlation, and impact was tested by using simple and multiple regression linear. Then ANOVA Two-way analysis among more two groups, and on an interval dependent variable and one way ANOVA between two variable were used to test the differences.

    Through analysis of practical applications the study concluded a number of findings, the most important were:

    • The correlation’s investigation showed a strong and significant relation between Knowledge and High Business Value of banks business. The resulted correlation was (86.9%). Another strong relation coefficient was found between Information Technology and High Business Value (88.3%).There was also a very strong relation between the shared use of Knowledge Management and Information Technology and the High Business Value for the commercial banks (90.6%).
    • The test results on the impact showed a clear direct and positive impact in the obtained increment of the banks Business Value as a result of the combined use of Information Technology and Knowledge management reached 61.2% for Information Technology and 48.3% for Knowledge management.
    • The impact test results also showed a strong significant and direct impact in Business Value resulted from employment of Information Technology. The increase in one unit in one Information Technology variable affected the increase in High Business Value by (1.03) unit. On the other hand the increase in one unit in Knowledge Management affected the High Business Value by (1.26) rise.
Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Foreign Trade of Iraq Between the imperatives of economic diversification And the challenges of joining the (WTO)
...Show More Authors

         Interested in this research shed light on the reality of foreign trade to Iraq Who suffers from a marked deterioration due to poor economic diversification of the country And increase the degree of economic exposure   , Which creates a state of extreme caution towards the question of accession to the (WTO)   , As controls Iraq's foreign trade commodity  , a president of one oil As well as the contribution of this item  , and by a large formation in GDP   , And that such a large and dangerous decline in the degree of economic diversification will create negative effects On overall economic activity components&

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
A Sociocultural Perspective on Iraqi EFL Learners Reading Comprehension Development
...Show More Authors

 Improving speaking skills of Iraqi EFL students was the main purpose of the current research. Thirty EFL students were selected as the research participants for achieving this aim. All students completed the pretest and then spent the next 25 weeks meeting for 90 minutes each to present their nine lectures, answer difficult questions, and get feedback on their use of language in context. Progressive-tests, posttests and delayed post-tests followed every three courses. The researcher utilized SPSS 22 to anal Analyze the data descriptively and inferentially after doing an ANOVA on repeated measurements. It has been shown that using the ideas of sociocultural theory in the classroom has an important and positive impact on students of

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
The Degree of Knowledge and Use of Authentic Assessment Tools by Basic Elementary Teachers' According to some Variables: أمجد عزات جمعة، شريف عبد الرحمن السعودي، و سلمى علي العلوي
...Show More Authors

Evaluation is one of the most important elements of  teaching process. The recent trends in evaluation and educational reform movements have called for using alternative evaluation, which focuses on performance evaluation. Authentic assessment is usually described as formative, in which students participate in their acquisition, in addition to the fact that students are productive and active, which is reflected in the students' achievement and skill level. The study aims to reveal the degree of knowledge and use of alternative assessment tools by primary school teachers in Gaza -Palestine. To meet the objective of the study, the researchers used the descriptive-analytical method and the questioner as a study tool. The study sample c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
A Cognitive Linguistic Study of Battered Woman in Selected Iraqi Caricatures
...Show More Authors

The present paper is a qualitative descriptive study. It aims to examine the macro-cultural schemata addressing the concept of violence against women in Iraq from a cognitive linguistic point of view. To meet this objective, a number of Iraqi social caricatures have been selected from two popular and active Iraqi caricaturists, Odeh Al-Fahdawi and Nasser Ibrahim. The selection and the analysis of data have been achieved following the validity and reliability procedures and the ethical considerations. To meet this objective, Sharifian’s Model (2011) of Cultural Schemata has been adopted in data analysis. The study has concluded that the macro-cultural schemata regarding the concept of violence in the selected panels reveals that violenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 08 2023
Journal Name
Journal Of Planner And Development
Analysis of Walking Accessibility of Community Park in Duhok City
...Show More Authors

Research studies show that urban green spaces promote physical activity, the health of urban residents, and psychological well-being. Taking the community park in Duhok city as the research object, the spatial service area in terms of accessibility of to the Community Park under the mode of pedestrian transportation is analyzed by using the network analysis service area function of the geographic information system (GIS). The results show that under the walking mode in the research area, Parks are concentrated in the north and south of the city, but community parks are few in disadvantaged neighborhoods. In addition, there is a significant disparity between the number of community parks and the number of communities. Only 11 communities

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
ž (( The role of Organisational learning in building a talent management strategies Applied research in the Ministry of Science and Technology ))
...Show More Authors

The aims of the research is to know the role of Organisational learning in building talent management strategies in the Ministry of Science and Technology , where we see the challenges facing organizations today dictate now and in the future activation of scientific expertise to meet these challenges and the dissemination of these concepts within the priorities and data organizational culture of these organizations despite having a lot of the importance of organizational knowledge and learning applications .Despite learning and adopting some of the organizations have to enhance their competitiveness, we find a lot of organizations, including (The ministry researched) still do not realize the importance of the role of organization

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Real- time Financial reporting : Role promoting completeness and timeliness in Investment & profit distribution decision
...Show More Authors

  The accounting information that is produced by any System a user either entering or leaving, since the needs of the users began to evolve where he became the information provided by the current reporting system that does not meet their requirements in terms of users began to demand information, more quickly, and as a result of the needs of the user accounting system and the development of information and communications technology has emerged a new system (real- time reporting system), which has the ability to produce information at the moment of data gathered, it is no longer dependent on local circumstance, but this case has become a global response where the computer has become a cornerstone of the culture of the communi

... Show More
View Publication Preview PDF
Crossref