Preferred Language
Articles
/
jeasiq-1765
The Effect of Authentic Leadership In Business Process Reengineering
...Show More Authors

Abstract  :

The present study aims at identifying the status of the two research variables in the organization under study and specifying the relationship and impact of the authentic leadership with all its four branch dimensions of (self-awareness, transparent relations, balanced processing of information and the moral perspective) on business process reengineering.

The basic problem of the study lies in the attempt to present a new leadership style that is more responsive to the dynamic changes surrounding it based on the authentic leadership behaviors. This is because this pattern has an impact on the nature of the organization's work and its progress.

The research sought to test hypotheses related to the correlation and influence between search variables. The analytical descriptive approach was adopted mainly in the presentation, analysis and interpretation of the study information. The questionnaire was used as a main tool in collecting study data and information, as well as personal interviews conducted by the researcher with some of the sample members who represented a group of leaders and followers of the organization in question. Individual. The responses were analyzed using a set of statistical methods through the Statistical Program (SPSS).

The study has arrived at a set of conclusions, the most important of which was that the managers of the organization under study are able to have a proper analytical ability and a high level of transparency.

The research also made a number of recommendations, the most important of which is the need to start implementing business process reengineering methodology by forming highly experienced and efficient teams from different departments. These teams must attain a high level of intensive training to acquaint themselves with the programs approved in implementing this method and to be in line with the nature of the company's business.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
In-betweenness and Liminal Selfin Amiri Baraka's Dutchman
...Show More Authors

This study deals with the thems of "in-betweeness" in the modern Afro-American Drama, drawing upon the accumulated literature of the colonial and postcolonial studies. In-betweeness appears in these studies under the canopy of the terms mimicry, hybridity and liminality which refer to a transformative, in-between state of being. It also refers to themutual relations holdingbetween man and his cultural space.

This concept is fitting the Afro-American playwright Amiri Baraka's plays and his violent, revolutionary theatre. In his play Dutchman (1964), Clay, the protagonist, is a good example of the two-ness or in-betweeness. He finds difficulty choosing between the ethnocentric white culture and the black culture.He allows

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Pedagogy and its applications in art education curricula
...Show More Authors

               The research aims to (identify the applications of pedagogy in art education), the research community included, art education for the primary stage, so the community consisted of (8) main areas in art education, either the research sample was chosen, two main areas (objectives, and content), and included the research methodology (descriptive and analytical), the researcher built the research tool represented (the validity form of the tool) and presented to a group of experts to indicate its validity as well as to measure its stability,  To show the results, the researcher used the percentage, and the researcher recommended - modifying the curriculum every period of time, such as every four years, others

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Political Sciences Journal
Depleted Uranium And use an American in Iraq
...Show More Authors

اليورانيوم المنضب واستخدامه امريكياً في العراق

View Publication Preview PDF
Crossref
Publication Date
Fri Nov 07 2025
Journal Name
Sciences Journal Of Physical Education
Cognitive bias and its relationship to the performance of the two skills of standing on (hands and the human wheel) on the floor movement carpet device in the artistic gymnastics for women
...Show More Authors

View Publication
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
A Study Of Corrosion Inhibition Of Low Carbon Steel In Washing Water Of Crude Oil Solution In The Presence Of Folic Acid
...Show More Authors

The corrosion behavior of low carbon steel in washing water of crude oil solution has been studied potentiostatically at five temperatures in the range (30–70)°C .The corrosion potential shifted to more negative values with increasing temperature and the corrosion current density increased with increasing temperature. Folic acid had on inhibiting effect on the corrosion of low carbon steel in washing water at a concentration (5× 10-4-- 5× 10-3 ) mol/dm3 over the temperature range (30–70)°C. Values of the protection efficiency were calculated from the corrosion current density .From the general results for this study, it can be seen that thermodynamic and kinetic function were also calculated (?G, ?S, ?H and Ea )

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Dec 28 2020
Journal Name
The Iraqi Journal Of Veterinary Medicine
Isolation and Molecular Identification of Nontuberculous Mycobacterium from Different Species of Fish in Karbala Province, Iraq
...Show More Authors

This study was designed for isolation and molecular identification of Nontuberculous Mycobacterium (NTM) from fish during the period between October and December 2017 from Karbla province, Iraq. This study included 200 fresh fish samples from four different species including Spondyliosoma cantharus, Liza abu, Carassius carassius and Cyprinuscarpio. Three samples of each fish were taken including gills, muscles and all internal organs. The samples were processed by decontamination, concentration of 4% sodium hydroxide, and 0.1 ml of sediment was streaking on Löwenstein Johnson (LJ) media; then the bacterial cultures were incubated at 28-30 °C for 3days up to 4 weeks and suspected colonies were stained with acid fast stain to confir

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Modification of Searle’s Speech Act of Promising in its Application to Selected Religious and Political Texts
...Show More Authors

This study presents certain modifications done to the conditions set by Searle
(1969: 57) concerning the speech act of promising in order to render them to selected
sayings of Prophet Muhammad (P.B.U.H.) and Jesus Christ (P.B.U.H.) and to
political texts. These modifications make the conditions of the speech act of
promising appropriate for sincere promises made by the Messengers of God since
they deliver their Messages of God but they are unable, as Messengers, to fulfill
God’s promises which they make as part of their Messages and by representatives of
States who deliver speeches on behalf of their Governments. These are the only two
situations where the speakers can make promises and do not fulfill these prom

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Acta Facultatis Medicae Naissensis
Rhabdomyosarcoma in children in the five-year period in Oncology Unit in a pediatric Teaching Hospital
...Show More Authors

Introduction/Aim. Rhabdomyosarcoma (RMS) is the most common soft tissue sarcoma in pediatric population and adolescents. Limited data is available on the characteristics of RMS in Iraqi pediatric patients. The aim of the study was to examine the clinical and histological aspects of RMS in Iraqi children, with a focus on their response to treatment, prognosis, and survival. Methods. A retrospective cohort study was conducted at the Oncology Unit of Children's Welfare Teaching Hospital, Medical City, Baghdad, Iraq and included patients who were newly diagnosed with RMS and received treatment during the period between January 1, 2015, and December 31, 2019. The patients were followed up from the time of diagnosis until October 1, 2020.

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
A Study of Feminist Stylistic Analysis of Language Issues of Gender Representation in Selected Literary text
...Show More Authors

Stylistics is the analysis of the language of literary texts integrated within  various approaches to create a framework of different devices that describe and distinct a particular work. Therefore, feminist stylistics relied on theories of feminist criticism tries to present a counter- image of a woman both in language use and society, to draw attention , raise awareness and change ways that gender represents. Feminist stylistic analysis is related not only to describe sexism in a text, but also to analyze the way that point of view, agency, metaphor, and transitivity choices are  unanticipatedly and carefully connected to issues of gender(Mills,1995:1)            &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref