Preferred Language
Articles
/
jeasiq-968
International Cooperation in the Face of Internet Crimes
...Show More Authors

في بداية الستينيات ظهرت شبكة الإنترنت لاستعمالها في أغراض غير تجارية ، ثم تطورت بشكل مذهل خلال السنوات الأخيرة، فبعد أن كانت مجرد شبكة صغيرة أصبحت الآن تضم ملايين المستخدمين حول العالم ، وتحولت من مجرد شبكة بحث أكاديمي إلى بيئة متكاملة للاستثمار والعمل والإنتاج والإعلام والحصول على المعلومات .

 وفي بداية تأسيس الشبكة لم يكن ثمة اهتمام بمسائل الأمن بقدر ما كان الاهتمام ببنائها وتوسيع نشاطها  إلا أنَّه بعد إتاحة الشبكة للعموم بدأ يظهر على الوجود ما يسمى بالجرائم المعلوماتية على الشبكة أو بواسطتها، وهي جرائم تتميز بحداثة الأسلوب وسرعة التنفيذ وسهولة الإخفاء والقدرة على محو آثارها وتعدد صورها وأشكالها، إضافة إلى اتصافها بالعالمية وعبورها للحدود . وقد صاحب تطور شبكة الإنترنت وانتشارها الواسع والسريع ظهور العديد من المشاكل القانونية ، فظهر على الساحة القانونية مصطلح جديد عرف باسم " الفراغ القانوني لشبكة الإنترنت "، وإزاء ذلك كان لابد من تكاتف جهود الدول من أجل مكافحة هذا النوع المستحدث من الجرائم التي لم تعد تتمركز في دولة معينة ولا توجه إلى مجتمع بعينه بل أصبحت تعبر الحدود لتلحق الضرر بعدة دول ومجتمعات مستغلة التطور الكبير للوسائل التقنية الحديثة في الاتصالات وتعزيز التعاون بين هذه الدول واتخاذ تدابير فعالة للحد منها والقضاء عليها ومعاقبة مرتكبيها .

ولمواجهة الصعوبات التي تواجه التعاون الدولي في مكافحة جرائم الإنترنت كان لا بد من اتخاذ إجراءات سريعة تتمثل في تحديث التشريعات الوطنية المتعلقة بالجرائم المعلوماتية وجرائم الإنترنت وإبرام اتفاقيات      (دولية، إقليمية، ثنائية) لمواجهة القصور في التشريعات والقوانين الحالية ، ومعالجة حالات تنازع القوانين والاختصاص القضائي وتحديث الإجراءات التحقيقية الجنائية بما يتناسب مع التطور الكبير الذي تشهده تكنولوجيا المعلومات والاتصالات ، وتأهيل القائمين على أجهزة تنفيذ القانون لتطوير معلوماتهم حول هذا النوع المستحدث من الجرائم

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (25)
Crossref (12)
Scopus Crossref
Publication Date
Sun Aug 11 2024
Journal Name
Lecture Notes In Networks And Systems
International Financial Reporting Standards and Their Impact on the Value of the Economic Unit
...Show More Authors

This study examines the impact of adopting International Financial Reporting Standards (IFRS) on the value of economic units. Given the global push toward standardization of financial reporting to enhance financial statement transparency, comparability, and reliability, this research seeks to understand the implications of these standards for economic valuation within a region characterized by its unique economic and regulatory challenges. A questionnaire was distributed to 86 Iraqi academics specializing in economics, accounting, and finance to collect their views on the impact of adopting international financial reporting standards. Through careful statistical analysis, the study concluded that applying international financial reporting s

... Show More
View Publication
Scopus (5)
Crossref (10)
Scopus Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The Evaluation of Information Security Management System in the Iraqi Commission for Computers and Informatics according to the International Standard (ISO 27001: 2013)
...Show More Authors

    The current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations  dependence on computers and information technology in work and communication  with others. The international legitimacy (represented by the  International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 09 2023
Journal Name
Indian Journal Of Economics And Business
Evaluation of reverse logistics options for international and local companies in Iraq
...Show More Authors

Many international companies have branches or agencies in Iraq and have large market shares, and this has contributed to the increase in the import of these companies' products. This process created an additional problem of handling a large number of expired or defective products. There are many methods that contribute significantly to reducing these problems. The most prominent of these is the activation of reverse logistics options in Iraq by international and local companies. This research aims to conduct a survey of the reverse logistics options approved by some local and international companies and compare between them. This paper found that Amaron, Hitachi, Apple, Samsung and Huawei have limited options for reverse logistics and that

... Show More
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
The Difficulties which Face Public Basic School Principals in Jarash Governorate in Editing Formal Letters and Correspondence and Means of Dealing With These Problems as Perceived by Them
...Show More Authors

This study aimed at identity baying the difficulties which face public basic school
principals in jar ash governorate in editing formal letters and correspondence and means of
debating with these problems to collect data the researchers developed a question air were
established the population of the study which represents its sample consisted of 129 principals
65 males and 64 females
The results of the study revealed that the principals face difficulties in office and file
management in preparing plans and reports and writing formal letters and answering them
saved recommendations were presented among which were organizing training sessions and
workshops to train the principals on how to dead with there problems.<

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 20 2019
Journal Name
Political Sciences Journal
Means of the right to self - determination actions and patterns of its practices under the contemporary international development
...Show More Authors

Abstract The means of self-determination have their peaceful and non-peaceful dimensions and are united(peaceful and non-peaceful) by international consensus adopted by international conventions and instruments. This has given it various dimensions at the applied level, especially in the light of the contemporary international developments witnessed by the world represented by a number of complete and incomplete implementation models that have nothing to do with the theory of truth Self-determination associated with the liberation of peoples from colonial domination or the liberation of oppressed nationalities

View Publication Preview PDF
Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Applications of contemporary feminist theory and its role in international relations (Singapore as a Model)
...Show More Authors

Since the emergence of the science of international relations as an independent academic scientific field,  various theories and trends have appeared and have tried to understand and explain the international reality and give a clear picture of what is happening within the international system of interactions and influences and the search for tools for stability and peace in international relations. Among these theories is the feminist theory, which is a new intellectual trend on the level of international relations theories,  which tried to give an explanation of what is happening in world politics and in international relations in particular. The main issue that feminist theory is concerned with is the lack of women’s subordination

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Extent of Applying Corporate Governance Requirements According to International Specification (ISO 26000:2010) in the National Insurance Company: A Research Application
...Show More Authors

Abstract

                The research aims to identify the application of corporate governance requirements according to the international standard (ISO 26000:2010) in the National Insurance Company. Strengths and weaknesses were identified to study the current state of this requirement's application in the company under investigation. The descriptive-analytical approach was utilized through a checklist derived from ISO 26000:2010. Several personal interviews and field visits were conducted to understand the extent of application and documentation based on various statistical methods. The results revealed a level of applic

... Show More
View Publication Preview PDF