After the tremendous development witnessed by the world of communications at the beginning of the third millennium, the activities that are performed through cyberspace have increased, and its importance has therefore increased, and the risks to which this space is exposed have increased, and in view of the global trend towards regulating this space and the practices that take place through it, as well as finding legal and technical ways to secure it. And to secure the services that are provided through it, it was necessary to determine the nature of this space and therefore its security. In order to create an appropriate theoretical framework around it that may be used if the Iraqi legislator goes towards organizing this space and securing it legislatively.
The acquisition is of one of the methods utilized by the holding company to expand its activities and its control over other companies. Acquisition activity of the holding companies is particularly important to distinguish them from the rest of the commercial companies. Economic changes in Iraq and the country's need for foreign capitals havethe multiple and diverse of experiences, leading to, besides the need for a certain technique to increase the competitiveness and financial efficiency capabilities in companies, push the economy towards openness and allow for foreign companies, like national companies, to exercise its business in Iraq and to revitalize the financial market to ensure companies enter new markets through whi
... Show More
summary of the research
The heart is the pine-shaped flesh on the left side of the chest. The moral gentleness in this flesh is called the home of perception, reason and understanding, as well as the place of desires and passions, so it turns between one desire and another between good and evil. As for its parts, it consists of four main parts called chambers, two rooms on the right As for the two chambers below, it is called the ventricle, the heart works regularly and accurately to pump blood and distribute it to all parts of the body and vital organs. And the Holy Quran divided the types of heart into two main types of healthy hearts, which are types (healthy, hidden, living....)
And the second type is sick hea
... Show MoreThe legal security has become a principle and necessity in the state of law, based on the fact that the legal basis must be based on legal security, Since the Council of State has become the backbone of the legal base as long as we cannot talk about the value of the rule of law only in view of the degree of stability and the extent of the realization of rights and legal conditions and the consequent to achieve the confidence of individuals in the legal system as a whole.
That means stabilizing the rules governing the affairs of individuals and nations and keeping them away from factors that lead to instability. This ensures the rights of individuals and states as well, since the individual cannot obtain h
... Show MoreThe researcher has studied in his research (International Public Relations methods in building the state's image through Cyberspace)
, analytical study of the Facebook and twitter pages for British foreign office , the role was played by the International Public Relations in building the mental image of British , especially after the new media and internet have became influential role in political life . and became an important tools used by political institutions as ministries of foreign affairs in the twenty: one century .
The researcher identified the problem of this study with the following question:
(what is the role of the International Public Relations in building the mental image of state through Cyberspace)
To answer
The Constitution of the Republic of Iraq for the year 2005 dealt with the policy of national security as an exclusive competence of the federal authorities, and the policy of national security as one of the forms of general policies that the constitution enclosed in privacy when it was stipulated in particular, and this policy also attracted the attention of comparative constitutional examples, as it stipulated the formation of specialized constitutional councils to undertake The process of developing and implementing this policy, or forming specialized institutions for this matter, and according to the national security policy, the unity of policies in the state is ensured and directed towards achieving the requirements of Iraqi nationa
... Show MoreConservation of Concept among Children: Semantic Study
يمثل الأخذ بالنظام الفيدرالي أطاراً تنظيمياً لشكل الدولة و مرحلة تحول مهمة في بنية الدولة العامة في مختلف مجالاتها، فالانتقال من المركزية في أدارة الشؤون العامة للدولة الى النمط الفيدرالي يمثل تحولا بنيوياً وسيكولوجياً ،حيث يكون هنالك توزيع مكاني - عمودي للسلطة والثروة بين الوحدات المكونة للدولة بشكل يختلف كليا عن الحالة المركزية، ونجد صور تنظيمية عديدة تتأسس ضمن اطار الفيدرالية العام ،
... Show MoreThe concept of transitional justice is newly emerging, as it was mainly associated with addressing issues of serious breaches and abuses of human rights during conflicts and situations resulting from violence and the use of force in societies that are in the process of democratization, as transitional justice aims primarily to restore civil peace and rebuild institutions The state needs multidimensional justice: a judicial system that achieves the rule of law, corrective restoration of the wounds of the past, and a distributive characteristic of the redistribution of wealth.
The importance of this research in studying the actor life existence on the stage through the performance art;where as all the literary theatrical dimensions didn't ignore the importance of the actor's performance.
So, it is shed a light on the nature of the scenery in the actor's performance and what its representations in the temporary directions ……..
The research set off from the imitation as a human instinct to the performance of the actor in post-modernity theater; so the researcher found that there is a question must be answered which is :Is the actor live a regression state in his theatrical performance ,or that the performance of the actor connect with collective conscience of human being which is repeated in certain
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More