In Iraq, more than 1031 school projects have been halted due to disputes and claims resulting from financial, contractual, or other issues. This research aims to identify, prioritize, and allocate the most critical risk factors that threaten these projects’ success for the duration (2017-2022). Based on a multi-step methodology developed through systematic literature reviews, realistic case studies, and semi-structured interviews, 47 risk factors were identified. Based on 153 verified responses, the survey reveals that the top-ranked risk factors are corruption and bribery, delaying the payments of the financial dues to the contractors or sub-contractors, absence of risk management strategy, multiple change orders due to changing designs and specifications during construction; inaccuracy in time and budget estimation; construction material price; financial and economic crisis/financial instability; selecting the contractor only based on the lowest bid, regardless of technical competence; instability within the political system of the government/instability of the government as a client; foreign exchange rates fluctuate against the Iraqi dinar. The study also showed that the respondents recommended allocating four risks to the owner, eight risk factors to the contractor, one risk to the consultant, and 32 factors allocated as shared. The study concluded that the results could help identify the most critical risks facing this type of project and the contracting party that can bear the risks and manage them efficiently.
The rapid developmemt of information technology and its use in all fields has a bositive influence on all fields , and financial markets have a share of this development through the use of an electronic trading system to settle transactions and enhance transparency and disclosure in all activities of these markets and stimulate their performance .
It is worth nothing that these revolutions remove the necessity for nonstop connection with persons through the internet or phone networks , novel knowledge decreases the charges of structure original transaction system and reducing the fences of new participants entry .
The development in transportations expertise allows for quicker or
... Show MoreThe Frankfurt School most prominent school of philosophical and social cash Contemporary directed cash centrally according to the cons of social and intellectual known to communities of European contemporary criticism of radical and profound concepts and values that founded this community (k rationality, liberty, scientific and technical progress), as was most of the thinkers seeking to one common goal is to work to change the reality to become more humane and find a picture of the mind that are commensurate with the human mind .as Although extinguished spark most of the patrons adults, but the ideas of philosophical and social cash continue to be under live and this is evidence of the vitality and strength of the impact and effe
... Show MoreThe aim of this study is to evaluate the implementation of ICT applications in public service organizations, which is responsible for the implementation of public policy. The study examined the success of ICT in achieving its goals by meeting the main needs of the community members which is the first requirement in the success of sustainable development plans before determine the capabilities of ICT. The main pillar of success in the implementation of ICT systems is the key to improving the efficiency of the organization's performance. This is a reflection of the effectiveness and quality of the services provided to its beneficiaries. The study concluded that the current level of capabilities of individuals working in public organizations i
... Show MoreIraq is considered the origin of civilization first colonies have been cited in its northern parts , when the first attempt in agriculture and animal breeding were began ,and the cave , were taken as houses. That time the first agricultural colony were colonized in Kirkuk and Mussel . There colonies have been developed to be villages which had another activities in addition to the main activity which was agriculture . The distribution without any administrative planning . Lately , the stochastic distribution starting to disappear due to the planning of cities and their to rural surrounding. This study is involved in the analysis of the patterns of the location distribution of the villages , and the form that taken by the village
... Show MoreThe most important features that we have reached through this study, are shown the cross-section of root were in the secondary growth stage and the epidermis of leaf were studded by stomata complex, the type of it was anomocytic that’s mean no have subsidiary cells around the guard cells, the mesophyll bifacial also the midrib region of leaf like the pear and the vascular bundle located in the center crescent in shape. The cross-sections of petiole ovate shape with two ears in the lateral side and the vascular bundles crescent in shape. The cross-section of fruits circular component of three-layer the outer layer pericarp, mesocarp, and the endocarp, surrounding the ovary or the see
The theory of Pilgrims in the Magra is based on Dekru's view that the mgha is considered a pilgrim, and that the pilgrims are pilgrims
Tujia purely exposes the abstract temptation structure, and that the discharge of the Mfezouz Mfarouz is through factors
This theory tends to highlight the role of pilgrim function as a language
There is no preservation unless directed towards a particular outcome. Gemma can include morphine blindness
Or formulas that allow for the presentation of a pilgrimage to a writer in addition to the content of the news, and the guidance of the recipient
In one direction or another.
The orbital masses are one of these morphines and functional components that achieve function
The Togolese
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More