Given the growing interest in digital marketing operations and the technology imposed by the reality in which both companies and their customers are affected, the researchers attempted to shed light on the reality and challenges of digital marketing from the faculty members viewpoint at Jouf university, the problem is that technology has imposed a new reality that has resulted in a major change in behavioral patterns of customers with a number of obstacles and challenges confronted customers in digital marketing, it is expected that the outcomes of this study help companies in overcoming the obstacles that prevent the desire and ability of the customer to change his behavioral style to deal with electronic shopping operations and attract more customers, and the study aimed to know the impact of electronic obstacles and challenges and electronic applications on electronic shopping operations; one of its most important hypotheses is that digital marketing obstacles and challenges negatively affect digital marketing in the field of digital marketing in KSA within the study community represented by faculty members by taking a simple random sample of (128) members from faculty members through questionnaire, the study followed a descriptive and analytical approach statistical procedures and treatments were used to estimate regression models, the study reveals that; customers sense of development in electronic programs and applications and companies motivation of customers electronically with their marketing advantages increases digital marketing operations, except that their fear of fraud and theft reduces opportunities for digital marketing, ensuring the return of the commodity, shopping through electronic applications in their language does not reduce from the obstacles and challenges of e-marketing; the study recommends that companies consider differences in the educational level of electronic shoppers by designing electronic programs and applications that are characterized by a high degree of security and confidentiality that protects customers from fraud and stealing and increases their confidence in dealing with electronic shopping as well as the continuous development in programs and applications that avoid threats on the internet; It must also know the extent of customer satisfaction with e-shopping and products and to which they meet their expectations periodically through electronic surveys and sales returns and the number and type of complaints received and others.
he current research aims at showing the correlation and effect of the internal environment analysis in the quality of health service in AL_Elwiya Maternity Teaching Hospital, researcher depended on the integral method in the "analytical descriptive method" for the study of the relation between the main variables and the sub-variables throughout data collection required by the theme of this study, a case study" in tackling the data and information related to the financial aspects of the internal environment.
The problem of the study was manifested in the essential question, that is (is there internal struc
... Show MoreThe Legend between reality and its future Treatment in threatre analytics study
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThe research aims to know the relation between positive thinking and self academic motivation, trend towards teaching profession. So a sample of (344) male and female student of the morning study of education colleges from the two universities of Baghdad and al Mustansria for the academic year 2012-2013.
So three tools had been used to achieve the procedures of the research which are: the scale of positive thinking constracted by Abdal satar Ibrahim year 2010, the scale of self academicmotivation constracted by (Gottfried) and adapted by Hanan Hussan year 2010, the scale of teaching profession trend constracted by Enayat Zaki year 1974.
And by using the statistical means of person
... Show MoreWith the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show MoreThe administrative leadership relies on a variety of behavioral paths in the functional areas in which it operates, and thus indicates its ability and thus has the upper hand in the organizational events, and in such a way that it can draw lessons and evaluate the results so as to test the expectations within the framework of the changes.
Does the study sample leadership have the characteristics that enable it to contain both crises and environmental stresses?
The aim of the study was to determine the location of the administrative leaders in the system of the study sample from the issue of crises and environmental pressures. The study concluded with a number of conclusions, the m
... Show MoreIn regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement
... Show MoreThe marketing logistic chain, as an integrated system aimed to balance the achievement of its main opposite objectives which represented in the access to the best service presented to the customer with lowest possible logistic costs especially the transportation costs, where encourages the researcher to choose the second objective as a field of this study in order to reduce the transportation costs in the final link of marketing logistic chain which related to delivering of fuel oil to the customer that falls within organizational responsibilities of the company under consideration (Oil Marketing Company) and also known in a brief name by (SOMO) through two methods, the first is by functioning quantative techniques by using trans
... Show MoreThis study aimed to provide a conceptual model for the use and benefits of the e-Government as related to administrative fraud and financial corruption. The study also looked into their concepts, forms, dimensions and types and the role of e-Government on fraud reduction, corruption in administration and finance and its impact on the government performance. From the result, it is revealed that there is need for electronic government for implementation in order to curb the rate of fraud and administrative and financial corruption and improve the quality of service provision for better performance
Iraq has confronted a huge political transformations after 2003 which resembled and presented rapid changes from totalitarian regime into democracy's system , this phenomenon has become a feature embodied in a new political system, specifically is being a price for previous deprivation and despotism .So that, the nature of political work has been changed as a result of practicing new democratic values ,but the real challenges appeared by depending on the conformity and political compromise in dealing with all of crises and problems in the political life .
The future of political work in this nascent democracy could be prepared according to fulfillment an active doings values stretched on national unity and forgiveness from one side ,t