Preferred Language
Articles
/
jols-485
Autonomous state security
...Show More Authors

The state, as one of the most important social institutions that works to provide services and security for individuals, needs security, and this security is achieved according to a specific hierarchy that starts from the security of the individual and the security of society to the security of the state, as the advanced state security is based on the basic pillars of solidarity and social peace This security consists of several levels (human, regional, social, economic, and cyber), unlike Arab criminal legislation, including Iraqi law, which is based on the concept of traditional state security, as it relies on the military side only in order to provide maximum criminal protection for the security of the political system The security of the government, and this was the result of the ideological influence of the authoritarian political regime on the criminal law before 2003, which aimed to reduce the security of the state to the security of the political system and the security of the government.

      After 2003, the political system shifted from an authoritarian regime to a democratic one, but this transformation did not remove the deliberate confusion between crimes against the security of the state and crimes against the security of the political system and the government, although crimes against the security of the state are distinguished from crimes against the security of the system.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Consumer Use of E-Banking in Iraq: Security Breaches and Offered Solution
...Show More Authors

    After the software revolution in the last decades, the field of information technology had a tremendous evolution that made many organizations reach the best benefits from this evolution in technologies. The banking sector evolved their old system from ordinary system to the online system. The term E-banking appears to cover almost all bank operations such as money transactions, account management, instant reports, instant notifications. E-banking offers several advantages to clients, but this opens many challenges and motivates unauthorized parties to focus on creating methods and exploiting weaknesses to attack and steal critical information that belongs to the banking system or clients. Iraqi banks recently adopted E-banking se

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Apr 10 2019
Journal Name
Journal Of Legal Sciences
The effectiveness of legislative reforms in the protection of public property in Iraq
...Show More Authors

Public property has been very important because the function of the state is not limited to traditional jobs, but extends to all aspects of activities to provide services to the public, with the attendant use of public property and the need to maintain it as the basis for such activities.

The legislation concerned the Public property and its protection. Starting with the Constitution, which is the highest legal rules in the state as well as general laws administrative decisions.

This study aims to shed light on the concept of legislative reforms and its effects on legislation that protects the Public property, which is a precise legislative process that needs to be examined because it does not always aim at evaluating the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 02 2008
Journal Name
Political Sciences Journal
الطائفية وتداعياتها على بناء الدولة العراقية المعاصرة
...Show More Authors

الطائفية وتداعياتها على بناء الدولة العراقية المعاصرة

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 02 2007
Journal Name
Political Sciences Journal
وظائف الدولة (في الفكر السياسي العربي الاسلامي)
...Show More Authors

وظائف الدولة (في الفكر السياسي العربي الاسلامي)

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 07 2009
Journal Name
Political Sciences Journal
اثر التوظيف الاستراتيجي في تحقيق اهداف الدولة
...Show More Authors

 اثر التوظيف الاستراتيجي في تحقيق اهداف الدولة

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 02 2011
Journal Name
Political Sciences Journal
مفهوم الدولة واركانها في الفكر الاسلامي المعاصر
...Show More Authors

تعددت آراء المفكرين الاسلاميين المعاصرين حول الدولة الاسلامية بعد سقوط الخلافة العثمانية بصورة خاصة نتيجة لتأثر هؤلاء المفكرين بالمفاهيم التي سادت في الثقافة الغربية ، ومنها مفهوم الدولة ، حيث لم يتطرق الفكر الاسلامي الى مناقشة مفهوم الدولة الاسلامية قبل هذه الفترة ، لان اهتمامهم كان منصبا بالتظير حول موضوع السلطة . وسيتم التطرق في هذا البحث لمفهوم الدولة لدى المفكرين الاسلاميين المعاصر

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Intellectual Security and Its Relation to Psychological Resilience of Secondary School Students
...Show More Authors

The current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security

The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:

  1. The members of the sample have an intellectual Security.
  2. The members of the sample have

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Thu May 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Effect of Journal Misalignment on the Static Characteristics of Porous Journal Bearings Lubricated with Couple Stress Fluid
...Show More Authors

In this paper, a theoretical study to the effect of journal misalignment on the static characteristics of oil filled porous journal bearing when lubricated with couple stress fluid has been carried out.

The analytical model used through this work is for a bearing with isotropic permeability. Considering isotropic permeability the Reynolds' equation for the oil film is modified to include a so – called filter term and the effect of fluid coupled stress. The pressure equation for the porous medium is obtained from Darcy's law and continuity equation. The equation which was used to evaluate the oil film thickness was modified to include the effect of possible misalignment in longitudinal and transverse directions. The governing eq

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Predicting Social Security Fund compensation in Iraq using ARMAX Model
...Show More Authors

Time series have gained great importance and have been applied in a manner in the economic, financial, health and social fields and used in the analysis through studying the changes and forecasting the future of the phenomenon. One of the most important models of the black box is the "ARMAX" model, which is a mixed model consisting of self-regression with moving averages with external inputs. It consists of several stages, namely determining the rank of the model and the process of estimating the parameters of the model and then the prediction process to know the amount of compensation granted to workers in the future in order to fulfil the future obligations of the Fund. , And using the regular least squares method and the frequ

... Show More
View Publication Preview PDF
Crossref