Preferred Language
Articles
/
jeasiq-968
International Cooperation in the Face of Internet Crimes
...Show More Authors

في بداية الستينيات ظهرت شبكة الإنترنت لاستعمالها في أغراض غير تجارية ، ثم تطورت بشكل مذهل خلال السنوات الأخيرة، فبعد أن كانت مجرد شبكة صغيرة أصبحت الآن تضم ملايين المستخدمين حول العالم ، وتحولت من مجرد شبكة بحث أكاديمي إلى بيئة متكاملة للاستثمار والعمل والإنتاج والإعلام والحصول على المعلومات .

 وفي بداية تأسيس الشبكة لم يكن ثمة اهتمام بمسائل الأمن بقدر ما كان الاهتمام ببنائها وتوسيع نشاطها  إلا أنَّه بعد إتاحة الشبكة للعموم بدأ يظهر على الوجود ما يسمى بالجرائم المعلوماتية على الشبكة أو بواسطتها، وهي جرائم تتميز بحداثة الأسلوب وسرعة التنفيذ وسهولة الإخفاء والقدرة على محو آثارها وتعدد صورها وأشكالها، إضافة إلى اتصافها بالعالمية وعبورها للحدود . وقد صاحب تطور شبكة الإنترنت وانتشارها الواسع والسريع ظهور العديد من المشاكل القانونية ، فظهر على الساحة القانونية مصطلح جديد عرف باسم " الفراغ القانوني لشبكة الإنترنت "، وإزاء ذلك كان لابد من تكاتف جهود الدول من أجل مكافحة هذا النوع المستحدث من الجرائم التي لم تعد تتمركز في دولة معينة ولا توجه إلى مجتمع بعينه بل أصبحت تعبر الحدود لتلحق الضرر بعدة دول ومجتمعات مستغلة التطور الكبير للوسائل التقنية الحديثة في الاتصالات وتعزيز التعاون بين هذه الدول واتخاذ تدابير فعالة للحد منها والقضاء عليها ومعاقبة مرتكبيها .

ولمواجهة الصعوبات التي تواجه التعاون الدولي في مكافحة جرائم الإنترنت كان لا بد من اتخاذ إجراءات سريعة تتمثل في تحديث التشريعات الوطنية المتعلقة بالجرائم المعلوماتية وجرائم الإنترنت وإبرام اتفاقيات      (دولية، إقليمية، ثنائية) لمواجهة القصور في التشريعات والقوانين الحالية ، ومعالجة حالات تنازع القوانين والاختصاص القضائي وتحديث الإجراءات التحقيقية الجنائية بما يتناسب مع التطور الكبير الذي تشهده تكنولوجيا المعلومات والاتصالات ، وتأهيل القائمين على أجهزة تنفيذ القانون لتطوير معلوماتهم حول هذا النوع المستحدث من الجرائم

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Role of External Audit in Limiting Creative Accounting Practices in Light of International Standards from The Point of View of Certified Accountancy Experts in Iraq as a Model
...Show More Authors

This research aims to solve a problem in the field of accounting and financial knowledge in the world today, that is, the problem of creative accounting. Especially after the global financial crisis and the collapse of many large companies in the world, people find that they use creative accounting methods to distinguish them from reality, showing the results of their activities and their financial status. This research discusses the concept of creative accounting, the most important methods used in financial statements and its relationship with external auditing, and procedures to limit accounting creativity. This study uses descriptive analysis methods after confirming its theoretical aspects in practice. Using the statistical

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (15)
Crossref (8)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Journal Of Computational And Theoretical Nanoscience
Feasibility of Internet of Things Application for Real-Time Healthcare for Malaysian Pilgrims
...Show More Authors

Internet of Things (IoT) technology could be an effective solution to accomplish real-time retrieval of historical electronic health records (EHRs) to present better service of healthcare. In a pilgrimage environment such as the Hajj, IoT can be applied by identifying the non-local patients as electronic tags, and the tag data can be read by wireless sensors. The data that is collected using Radio-Frequency Identification (RFID) can be acquired from a Wireless Sensor Network (WSN) in order to accomplish many decisions, such as sending an ambulance to a patient’s location, sending an emergency alert to his immediate family circle, and retrieving his EHR from a database. The main contribution of this research is to propose a conceptual IoT

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Tikrit Journal For Political Science
التأثير الدولي والإقليمي لإعادة بناء العراق بعد 2003
...Show More Authors

: تفرض مرحلة إعادة بناء الدولة أو مرحلة بناء الدولة حالتين متقاربتين، لكن تختلف تجربة كل منهما عن األخرى، ففي الحالة األولى نعني بها أن دولة ما متكاملة المقومات سواء القانونية أو السياسية أو االقتصادية، وتمتلك هذه الدولة الشرعية القانونية واالعتراف الدولي، لكن تتعرض هذه الدولة لألزمة سواء كانت ثورة أو انقالب أو احتالل، وإلى السقوط ونهاية نظامها السياسي القانوني ومن ثم إعادة بناء الدولة ومنظومتها السياسية..

... Show More
View Publication
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 09 2023
Journal Name
Indian Journal Of Economics And Business
Evaluation of reverse logistics options for international and local companies in Iraq
...Show More Authors

Many international companies have branches or agencies in Iraq and have large market shares, and this has contributed to the increase in the import of these companies' products. This process created an additional problem of handling a large number of expired or defective products. There are many methods that contribute significantly to reducing these problems. The most prominent of these is the activation of reverse logistics options in Iraq by international and local companies. This research aims to conduct a survey of the reverse logistics options approved by some local and international companies and compare between them. This paper found that Amaron, Hitachi, Apple, Samsung and Huawei have limited options for reverse logistics and that

... Show More
Publication Date
Sun Aug 11 2024
Journal Name
Lecture Notes In Networks And Systems
International Financial Reporting Standards and Their Impact on the Value of the Economic Unit
...Show More Authors

This study examines the impact of adopting International Financial Reporting Standards (IFRS) on the value of economic units. Given the global push toward standardization of financial reporting to enhance financial statement transparency, comparability, and reliability, this research seeks to understand the implications of these standards for economic valuation within a region characterized by its unique economic and regulatory challenges. A questionnaire was distributed to 86 Iraqi academics specializing in economics, accounting, and finance to collect their views on the impact of adopting international financial reporting standards. Through careful statistical analysis, the study concluded that applying international financial reporting s

... Show More
View Publication
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
An Evaluation of Environmental Performance According to The International Standard (ISO14001: 2015) in a Field East of Baghdad / A Case Study in the Midline Oil Company
...Show More Authors

EMS in accordance with ISO 14001: 2015 is considered an entry point to reduce environmental impacts, especially the effects resulting from the oil industry, which is the main source of environmental pollution and waste of natural resources, since the second revision of the standard took place in September 2015. The problem of the research was manifested in the weakness in understanding the correct guidelines that must be followed in order to obtain and maintain the standard. The purpose of this research was to give a general picture of what is behind ISO14001:2015 and how it is possible to create a comprehensive base for understanding its application by seeking the gap between the actually achieved reality, standards requirements

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
Understanding Inclusion (National and International Perspective)
...Show More Authors

Abstract

There have been a number of positive developments in inclusive education in many different countries, recognizing that all students, including those with disabilities, have a right to education. Around the world, educators, professionals, and parents are concerned about including children with disabilities in mainstream schools along with their peers. As a result of this trend, a number of factors are contributing, including the increasing importance of education in achieving social justice for pupils with special education needs; the right of individuals with disabilities to attend mainstream schools together with their typically developing peers; the benefit of equal opportunities for everyone in achie

... Show More
View Publication Preview PDF