Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fundamental security functions demanded by organizations and whether these functions have been securely developed. Therefore, this paper proposes a security framework for mobile data that combines core security mechanisms to avoid these problems and protects sensitive information without spending time and money deploying several new applications.
This paper presents an experimental and theoretical analysis to investigate the two-phase flow boiling heat transfer coefficient and pressure drop of the refrigerant R-134a in the evaporator test section of the refrigeration system under different operating conditions. The test conditions considered are, for heat flux (13.7-36.6) kW/m2, mass flux (52-105) kg/m2.s, vapor quality (0.2-1) and saturation temperature (-15 to -3.7) ˚C. Experiments were carried out using a test rig for a 310W capacity refrigeration system, which is designed and constructed in the current work. Investigating of the experimental results has revealed that, the enhancement in local heat trans
... Show MoreThe research aims to form a clear theoretical philosophy and perceptions about strategic Entrepreneurship through the relationship between high Involvement management practices, the basis in creating that leadership and high-performance work systems as a support tool in achieving them according to the proposals (Hitt et al, 2011), in an attempt to generalize theoretical philosophy and put forward how to apply it within The Iraqi environment, and on this basis the problem of the current research was launched to bridge the knowledge gap between the previous proposals and the possibility of their application, aiming to identify the practices of high Involvement management and the possibility of high-performance work systems and thei
... Show MoreThe current study is based on previous findings, where corporate governance (CG) significantly increased corporate social responsibility (CSR) to enhance transparency while reducing the tendency of corporate management to engage in earnings management (EM). A sample of 11 Iraqi banks listed on the Iraq Stock Exchange from 2010 to 2020 was selected. The CG was included in the board size and board independence apart from the variables of Chief Executive Officer (CEOs) gender, majority shareholder ownership, foreign ownership, and institutional ownership. The CSR included the wage growth rate, bank contribution growth rate for social security, training programmes, subsidies, environmental protection, and bank compliance with the law. Specifica
... Show Moreيهدف هذا العمل الى بيان طبيعة العلاقة بين الادارة بالتجوال والتجديد الاستراتيجي ، ومدى تأثير المتغير المستقل في المتغير التابع. تضمنت فقرات الاستبانة بوصفه الأداة الرئيسة لجمع البيانات ثلاث جوانب اساسية، تضمن الاول البيانات الشخصية للمستجيبين، فيما تضمن الجانب الثاني الفقرات الخاصة بمتغير الادارة بالتجوال من خلال خمسة ابعاد، فيما اشتمل الجانب الثالث على فقرات التجديد الاستراتيجي عبر تناول اربعة ابعاد. ي
... Show MoreThe strategies of knowledge management have became the basis in the promotion of core competencies. Therefore gained an increasing prominence. This led the administrations of organizations to work to effectiveness of there strategies, which results to build there core competences through teamwork, empowerment and personal effectiveness of employees. From this arises research problem about the organizations leaders recognize extent of knowledge management strategies which that lead to core competence. In addition the research tray definition the relation and nature of affect between its variables. The research was carried on sample (72) managers from board of supreme audit in Iraq and used statistical tools and methods.
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show More