Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a common security reference in the government organizations of Iraq. In order to make this model more practical, applicable and to represent the security readiness with a numerical value, evaluation modeling has been done for this model by using fuzzy logic tool of MATLAB R2010a program.
Since the risk assessment is considered as a major part in the information security management system, an effective and practical method to assess security risk is proposed by combining FEMRA (fuzzy expert model risk assessment) and Wavelet Neural Network (WNN). The fuzzy system is used to generate the training data set in order to make the required training for WNN. The proposed method is applied when a risk assessment case study is made at the computer center of Baghdad University. It is found from the numerical results that the risk levels obtained by WNN are (with maximum of 58.23) too close to these calculated from FEMRA (with maximum of 60), with an average error of 5.51%. According to these results, the proposed method is effective and reasonable and can provide the support toward establishing the e-government.
In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreAbstract
This research aims to determine the role of the quality of higher education in achieving organizational excellence at the universities of Baghdad and Al-Nahren, was based on research on the main hypothesis is:First:- There is correlation and between the quality of higher education dimensions (continuous improvement, measurement and analysis, the culture of the organization, optimal use of resources , customer satisfaction) and organizational excellence dimensions (strategic planning, focusing on the market and the customer, information and analysis, the effectiveness of operations, processes and resources), Second:- Second, there is the impact of relationship sig
... Show MoreThe principal concern of this study is Disjunct and Conjunct adverbials in the
English language. The study sets out to explore and clarify the types, nature and
structure of disjuncts and conjuncts. It also aims at testing student's performance to
evaluate the use and usage of the disjuncts and conjuncts in their written performance.
Two tests, accordingly, were given to some fifty students of at the Dept. of English, at
the college of languages (third and fourth stages) in the University of Sulaimani. The
hypothesis that the study was based on are those students use disjuncts and conjuncts
hardly enough in their writings and when doing so, they generally tend to stick only to
the most commonly used and familiar o
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreThe present study identifies the linguistic means used to realize hyperbole in poetry as a rhetorical device that makes readers experience the beauty of poetic language. To achieve the aim of the study, a model of analysis in accordance with Spitzbardt (1963), Norrick (1982), and McCarthy & Carter (2004) is used. The analysis of data under investigation reveals that hyperbole is a crucial aid used by poets to portrait the real world as imaginative. In conclusion, poets prefer using lexico-grammatical repertoires than lexico-grammatical configurations. Keywords
Of the importance of the concept of ownership of real estate as the basic basis from which various projects are launched in various economic, tourism, and urban areas .... The need to research the diagnosis of real estate reality went astray in the difficulties, which played a decisive role in the process of urban development.
This leads us to the research problem of the difficulty of implementing urban development plans in many cases due to the absence of a clear methodology for organizing and modernizing the ownership of real estate and its coordination with the management of urban land and to achieve the objective
... Show MoreBackground:The referral system constitutes a key element of health system. Effective referral system between different levels of health care delivery represents a cornerstone in addressing patients’ health needs.
Objectives:To assess the referral system Baghdad/ Al-Rusafa Health Directorate by evaluation the referral pattern and identify the quality of the referral letters and feedback reports.
Type of the study: This cross-sectional study .
Methodology : It was conducted in5PHCC in from 1st July 2015 - 31st December 2015 at Bagdad/Al-Rusafa health directorate. The study population (sampled population) included all ref
... Show MoreFencing sport coaches seek fencers who have high velocity and work hard to develop it through training. The research problem lies on when measuring movement abilities through some tests. Manual measurement does not give reasonable impartiality of timing because there is a time-frame between the movement of the fencer and the speed of the movement of the human time setter. Therefore, the authors sought to design an electronic vest to evaluate movement abilities in foil fencers. The study design was experimental, with 12 Iranian foil fencers of the national team, who were divided into two equal groups of 6 fencers. Moreover, there were 12 students from Physical Education and Sport Sciences that worked on the scientific f
... Show MoreThe research aims to apply a modified SERVQUAL model to evaluate the quality of the educational services via conducting exploratory research for students from the College of Administration and Economics- Department of Business Administration- Evening studies at the University of Baghdad. Questionnaire of two parts was distributed to a sample of (72) students out of (720) students of the 2nd.,3rd. and 4th. year in the beginning of the second semester of the year 2008-2009 to measure the expectations and perceptions to the quality of the educational services. Five major dimensions were analyzed to see the gaps for (22) variables. The study concluded that there were (13) variables confirmed that the
... Show MoreDepartments and offices of public relations and media in any institution or company is the most important departments that reflect the results of their work negatively or positively on their reputation. This goes beyond the trust and credibility that its internal and external audiences will give it. Where such matter requires the staff, working in these departments and offices, to have communication skills that qualify them to do the role of marketing the communication message. Yet, the communication skills of public relations and media staff vary from person to person depending on the communication position. This skill has two criteria: Achieving the communication goal and the speed in achieving it as a number of skills
... Show More