Preferred Language
Articles
/
jeasiq-968
International Cooperation in the Face of Internet Crimes
...Show More Authors

في بداية الستينيات ظهرت شبكة الإنترنت لاستعمالها في أغراض غير تجارية ، ثم تطورت بشكل مذهل خلال السنوات الأخيرة، فبعد أن كانت مجرد شبكة صغيرة أصبحت الآن تضم ملايين المستخدمين حول العالم ، وتحولت من مجرد شبكة بحث أكاديمي إلى بيئة متكاملة للاستثمار والعمل والإنتاج والإعلام والحصول على المعلومات .

 وفي بداية تأسيس الشبكة لم يكن ثمة اهتمام بمسائل الأمن بقدر ما كان الاهتمام ببنائها وتوسيع نشاطها  إلا أنَّه بعد إتاحة الشبكة للعموم بدأ يظهر على الوجود ما يسمى بالجرائم المعلوماتية على الشبكة أو بواسطتها، وهي جرائم تتميز بحداثة الأسلوب وسرعة التنفيذ وسهولة الإخفاء والقدرة على محو آثارها وتعدد صورها وأشكالها، إضافة إلى اتصافها بالعالمية وعبورها للحدود . وقد صاحب تطور شبكة الإنترنت وانتشارها الواسع والسريع ظهور العديد من المشاكل القانونية ، فظهر على الساحة القانونية مصطلح جديد عرف باسم " الفراغ القانوني لشبكة الإنترنت "، وإزاء ذلك كان لابد من تكاتف جهود الدول من أجل مكافحة هذا النوع المستحدث من الجرائم التي لم تعد تتمركز في دولة معينة ولا توجه إلى مجتمع بعينه بل أصبحت تعبر الحدود لتلحق الضرر بعدة دول ومجتمعات مستغلة التطور الكبير للوسائل التقنية الحديثة في الاتصالات وتعزيز التعاون بين هذه الدول واتخاذ تدابير فعالة للحد منها والقضاء عليها ومعاقبة مرتكبيها .

ولمواجهة الصعوبات التي تواجه التعاون الدولي في مكافحة جرائم الإنترنت كان لا بد من اتخاذ إجراءات سريعة تتمثل في تحديث التشريعات الوطنية المتعلقة بالجرائم المعلوماتية وجرائم الإنترنت وإبرام اتفاقيات      (دولية، إقليمية، ثنائية) لمواجهة القصور في التشريعات والقوانين الحالية ، ومعالجة حالات تنازع القوانين والاختصاص القضائي وتحديث الإجراءات التحقيقية الجنائية بما يتناسب مع التطور الكبير الذي تشهده تكنولوجيا المعلومات والاتصالات ، وتأهيل القائمين على أجهزة تنفيذ القانون لتطوير معلوماتهم حول هذا النوع المستحدث من الجرائم

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
Appraisal of intelligent notification system for smart university campus based internet of objects for social activities
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Ingénierie Des Systèmes D Information
Performance Evaluation of a Multi Organizations Secure Internet of Vehicles Based on Hyperledger Fabric Blockchain Platform
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Proceedings of Ninth International Congress on Information and Communication Technology
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
View Publication
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of adopting international accounting and financial reporting standards to measure investments in stock on sustainable growth: applied research
...Show More Authors

Investments in shares represent an essential component of companies’ assets and a source of profit making resources. These investments are linked to the areas of trading and speculation, which is reflected on their market value, which makes accounting for and evaluating these investments require their own accounting standards, and thus several international standards were issued regarding this as well as a statement of their impact on growth Sustainable, as the research problem is to show the impact of measuring investments in shares according to international accounting and financial reporting standards on the sustainable growth of economic units, the research sample and its reflection on audit procedures. In accordance with i

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Diagnosing the reality of applying the operating requirement according to the international specification for the business continuity management system (ISO 22301:2019) : applied research in the General Tax Authority
...Show More Authors

Abstract

                 The research aims to diagnose the reality of applying the eighth requirement (operation) of the business continuity management system according to the international standard (ISO 22301: 2019), in the General Tax Authority, which is related to planning, implementing and controlling specific processes and procedures to address risks and opportunities, and the research adopted the checklist of the standard ( ISO 22301: 2019), in obtaining information, to measure the extent of application and documentation, the percentages and the weighted arithmetic mean were relied upon, and the research reached a set of result

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Advanced Computer Science And Applications
Face Detection and Recognition Using Viola-Jones with PCA-LDA and Square Euclidean Distance
...Show More Authors

View Publication
Crossref (27)
Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Engineering, Technology & Applied Science Research
Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence
...Show More Authors

In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring Operational Risk on according to International Requirements: An Applied Research in Bank of Baghdad- Private Shareholders Organization
...Show More Authors

This research aims to study and evaluate the reality of the Iraqi banks in terms of how they cope with the risks of the banking business, specifically banking operational risks, and to develop a model integrated to define, identify, measure and mitigate the impact of these risks on according to the Basel Committee requirements II about the dangers of Alchgal.uchir major search to the presence of weak results in the Iraqi banks in understanding and defining and measuring operational risks and not hedged properly, which avoids those banks operating losses as well as the results show there is a shortage in the equation of capital adequacy applied by the Iraqi banks because of non-observance of the minimum capital required to counter the ris

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Engineering
Efficient Energy Management for a Proposed Integrated Internet of Things-Electric Smart Meter (2IOT-ESM) System
...Show More Authors

In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurement

... Show More
Crossref (2)
Crossref