The research sheds light on a new topic of international law, the most important of which is, around which there are still question marks and differences in most of its aspects, especially with regard to international liability for damage caused by cyber attacks in the virtual space, the last is the fifth area that appeared alongside other area (Land, sea, air and outer space) and in addition to being a space on which states depend in the performance of their functions and international relations, it is a new arena for war and a source of danger to the security of states, As the security exposure to the secrets of states increased due to espionage and piracy, and the attacks on the infrastructure of countries increased, and the silence of states at times and the difficulty in knowing the attacker or the attributing the act to a specific country or party led to an exacerbation of the problem that may turn from a mere attack to a war on the ground, Therefore, the problem of concealing the identity of the attacker must be overcome and the international liability system must be activated in this space because it is the basis of the international legal system. Through its activation, it is possible to confront the dangers and preserve cyber security, which has become an important issue in our time.
The research aims to improve the effectiveness of internal control system according to a model COSO, by identifying the availability of system components according to the model and then improve the effectiveness of each component by focusing on areas for improvement in each component, as it was addressed to a model COSO and then Maamth with the environment, the current Iraqi by introducing some improvements on the form of some mechanisms of corporate governance of the Council of Directors, and senior management, the Audit Committee, Committee appointments, especially that supplies application available in the laws and legislation, the current Iraqi, taking into consideration to make some
... Show MoreThe importance of this research comes from the possibility of achieving positive interaction between accounting and tax through the interest in setting accounting standards and adapting them to local tax legislation, as the adoption of the application of the international standard (IAS 12) for income taxes helps to measure and determine the base for income tax and may lead to an increase in the tax outcome. Through the reliance of enterprises on many accounting bases, and that the tax administration in Iraq depends on the element of personal judgment in determining the tax base, which leads to lack of objectivity in determining the tax outcome, as the impact of the accounting standard (IAS 12) on the tax base and tax outcome is one of th
... Show MoreAbstract\
The developed financial infrastructure is one of the most important elements for achieving stable financial system in a country. The importance of developed financial infrastructure comes from its role in create economic and financial context attractive for foreign investments. Thus, this paper aims first to measure an index of financial infrastructure, and secondly, to gauge the nexus between the developed financial infrastructure and foreign investments inflow in Malaysia and Indonesia. We estimate the index of financial infrastructure by using different indicators such as (the institutional environment, access to finance, legal environment, and others).
By using the G
... Show MoreThe current study primarily aims to develop a dictionary system for tracing mobile phone numbers for call centers of mobile communication companies. This system tries to save the numbers using a digital search tree in order to make the processes of searching and retrieving customers’ information easier and faster. Several shrubs that represent digits of the total phone numbers will be built through following the phone number digits to be added to the dictionary, with the owner name being at the last node in the tree. Thus, by such searching process, every phone number can be tracked digit-by-digit according to a required path inside its tree, until reaching the leaf. Then, the value stored in the node, that rep
... Show MoreThe massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by
... Show MoreThis study aims to estimate the accuracy of digital elevation models (DEM) which are created with exploitation of open source Google Earth data and comparing with the widely available DEM datasets, Shuttle Radar Topography Mission (SRTM), version 3, and Advanced Spaceborne Thermal Emission and Reflection Radiometer Global Digital Elevation Model (ASTER GDEM), version 2. The GPS technique is used in this study to produce digital elevation raster with a high level of accuracy, as reference raster, compared to the DEM datasets. Baghdad University, Al Jadriya campus, is selected as a study area. Besides, 151 reference points were created within the study area to evaluate the results based on the values of RMS.Furthermore, th
... Show MoreThe current study aimed to measure the attitudes of female teachers towards the use of digital learning and the degree of possessing their digital education skills. The study sample consisted of (180) workers with disabilities (mental disability، auditory impairment، visual disability، hyperactivity and distraction. To achieve the goals of the study, the transformation measure was used towards digital education for people with disabilities. The study reached the following results: the availability of digital learning skills among workers with disabilities. The study concluded with a series of recommendations including holding Training courses to keep up with the challenges of educational trends and modern technology in this area.
With the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and s
... Show MoreDigital images are open to several manipulations and dropped cost of compact cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instance, news reports and insurance claims in a criminal court. Images forensic methods therefore measure the integrity of image by apply different highly technical methods established in literatures. The present work deals with copy move forgery images of Media Integration and Communication Center Forgery (MICC-F2000) dataset for detecting and revealing the areas that have been tampered portion in the image, the image is sectioned into non overlapping blocks using Simple
... Show Moreإن التغيرات السريعة والبعيدة المدى في تكنولوجيا المعلومات القائمة على أساس الالكترونيات الدقيقة تساعد في حدوث تحول في صورة الاقتصاد العالمي، وكذلك تساعد في تغيير المزايا التنافسية للبلدان، وربط المؤسسات البعيدة ببعضها البعض، ونشر الخدمات المالية على نطاق عالمي، وكذلك إثارة مشكلات جديدة او العكس فتح فرص جديدة أمام تنمية ونمو أفقر البلدان .
وأدت هذه التكنولوجيا الجديد
... Show More