Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.
This research aims to study and evaluate the reality of the Iraqi banks in terms of how they cope with the risks of the banking business, specifically banking operational risks, and to develop a model integrated to define, identify, measure and mitigate the impact of these risks on according to the Basel Committee requirements II about the dangers of Alchgal.uchir major search to the presence of weak results in the Iraqi banks in understanding and defining and measuring operational risks and not hedged properly, which avoids those banks operating losses as well as the results show there is a shortage in the equation of capital adequacy applied by the Iraqi banks because of non-observance of the minimum capital required to counter the ris
... Show MoreThe media, especially the satellite channels in our time, are one of the most important pillars of daily life, public and private, for society and people, and are considered by sociologists and sociologists as one of the most important factors of social upbringing and the most important, as a result of the technological and technological development of the media as well as increasing their numbers and vertical and horizontal expansion locally, As well as entering into the lives of individuals and people and leading them to important sites within their interests and preferences, not to mention the long time spent exposure to those media and benefit from the programs offered or broadcast. , The problem of this research is that there is a l
... Show MoreAbstract: -
The purpose of the research is to present and discuss the concept of grants and aid, with the study and analysis of the role and importance of grants and assistance on the activities of In government units, and then to determine the factors of obtaining grants and assistance, and the importance of providing accounting information in order to enhance the financial reporting of grants and assistance. The accounting system of the government and determine the areas of shortness, taking into account the failure to issue a local accounting base to determine the basis of accounting measurement and disclosure of grants and assistance to guide, and this is the starting point of the current research and so has been intr
... Show MoreThe rabid development in life and technology arouse the anxiety, stress, and fear of people. Accordingly the maladjustment and deceived conceptions appear in their behaviors which influence their selves and others.
These changes and development in society influence the university students' life, personality, thoughts and behavior. An exceeding in anxiety and fear has negative effect on everyday life activities and. negative effect on both mind and body.
The problem of the study is centered around cognitive conception anxiety of the university students.
The university students have their special importance in society and nation development, therefore many studies search in their personality and the effect of anxiety on them to fi
This study was aimed to explore the impact of social concepts about tribe, clan and women, on internal audit performance. These concepts are considered to be components of the organizational culture and performance of internal audit practice, with respect to the individual and collective performance within the institution. The study, furthermore, was intended to investigate and understand the role of the organizational culture of the tribal, clan and women components with regard to their role in society, in Qatar.
To achieve these objectives, the researcher followed the descriptive analytical approach, using a questionnaire directed to experts and staff working in the banking sector, with the view to test
... Show MoreThe concept of implementing e-government systems is growing widely all around the world and becoming an interest to all governments. However, governments are still seeking for effective ways to implement e-government systems properly and successfully. As services of e-government increased and citizens’ demands expand, the e-government systems become more costly to satisfy the growing needs. The cloud computing is a technique that has been discussed lately as a solution to overcome some problems that an e-government implementation or expansion is going through. This paper is a proposal of a new model for e-government on basis of cloud computing. E-Government Public Cloud Model EGPCM, for e-government is related t
... Show MoreThe research examines the mechanism of application of )ISO 21001: 2018( in the Energy Branch- Electromechanical Engineering at the University of Technology to achieve the quality of the educational service to prepare the branch to obtain the certificate of conformity with the requirements of) ISO 21001: 2018(, the necessary data were collected Depending on the (CHEKLIST) of (ISO 21001: 2018), field interviews and records of the concerned department, The researchers reached a number of results, the most prominent of which was the adoption of high quality leadership leaders and their willingness to implement the standard requirements, The university has a basic structure that qualifies it to implement the international standard, as
... Show MoreDuring the last two decades at least, increased interest in Social attraction variable by scientists in psychology and sociology, to multi-dimensional and its association with psychological and emotional variables , and what are of importance in the process of human communication , leadership, and social relations.
Social psychologists interested in social attraction also so its relation with social influence , political and occupational .
"Social attraction defined as "individual ability functioned his skills in at
Computer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties, Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application. This study comes to shed light on the legal nature of computer
... Show More