Measuring university teachers attitudes towards the security man Summary This research aims to study the measurement of university teachers attitudes towards the security man, and represented the research sample (196) of teachers, including 124 males and 72 females from different faculties of Salah al-Din - Erbil University. The researchers adopted on a scale (Al-Tarawneh 2008), as amended, and its development, the scale consists of four areas and (28) paragraph covers paragraphs measure the beliefs and feelings of the individual towards the security man as the theme of direction. The research sample answered all the paragraphs of the scale grade five similar styles (Likert) (strongly OK, OK, neutral, non-OK, Strongly Disagree). The researchers extracted the psychometric properties of the measure, including the virtual validity and reliability testing and re-testing in a way, andIt was then calculate the correlation coefficient between the scores of individuals in the first and second application using the correlation coefficient (Person) and the degree was (0.84) correlationcoefficient.The researchers used several statistical methods to process information, including the percentage equation Fisher and center-weighted and Pearson correlation coefficient and (t - test) for one sample, and (t - test) for two independent samples pouch Statistical Social Sciences (SPSS). The results showed that there are positive trends by university teachers around the security man in general. As for the differences between the sexes results showed that there were significant differences between the sexes (male and female) and the results were in favor of males. In light of the findings the researchers made a number of recommendations and proposals.
Energy is one of the components of the national security of countries and is of particular importance to the industrialized countries, including Germany. Energy policy includes many areas and has an impact on various sectors such as the environment, climate, agriculture and others. During the past few years, Germany has witnessed many transformations, the most important of which is the energy transition towards renewable energy, and it was strengthened in the strategy that was It was developed in 2010, which aims to achieve a long-term energy transformation, and sales of the German energy technology sector have evolved from 2010 to 2020, and this issue is related on the other hand to the concept of energy security and because of its strateg
... Show MoreThe security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.
Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional lea
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreThe current study aims at identifying of the differences of life quality level for the academic instructors at Omar Al-Mukhtar University / Libya according to the city variable that the instructor belong to ( Libya, Iraq, Egypt ), and also according to gender Variable (Male - Female),To achieve the aims of study ,the researcher chose a sample consists of (210) instructors ( 170 males and 40 females) from four colleges at Omar Al- Mukhtar University/ Darna . The researcher built the scale of life quality which consists of (42) items in last version . The researcher has conducted the validity and reliability of the scale. and by using Analysis of Variance via (SPSS program). The research reaches the following results : 1-The life quality o
... Show MoreThe aim of the study was to find out the correlations and impact between the variable of ethical leadership behavior and university performance at Sumer University. Use the descriptive analytical method by adopting the questionnaire tool to collect data. The questionnaire was distributed electronically to 113 teachers at Sumer University and the response was from 105 teachers. The research results showed that there is a correlation and effect relationship between the search variables. In addition, the responding university does not have ethically defined standards in terms of performance of the work of the cadres working there. Finally, the research presented a set of recommendations aimed at tackling problems in the ethical lead
... Show MoreThis study aims to identify the Israeli policies towards Palestinian refugees during the period 1999-2010 which had seen several Israeli governments, whether left or right, The researcher found that there is continuity in decision-making and legislation in Israeli governments, regardless of political or ideological orientation towards refugees and the Palestinians during the study, which focused on two main axis, The first: refugee issue in the permanent negotiations where the researcher found that the Israeli position is fixed of the non-return of Palestinian refugees, and Increased the power of the Israeli position by U.S. The seconds axis: deals with Israeli legislation and the views taken by Israel which prevent the right of return f
... Show MoreThis research aims to evaluate the teaching methods used by intermediate Arabic language teachers. To achieve the goal, the researcher followed the descriptive-analytical approach. The research sample was limited to Arabic language teachers at intermediate school for the academic year (2017-2018) the researcher chose a random sample included (155) teachers which form a (40%) Of the original community at Baghdad/ Rusafa1th. The researcher has developed standards of teaching methods which are (7) standards with (39) paragraphs included three alternatives. The results showed the need to pay attention to the use of various modern teaching methods. Moreover, the researcher suggested making an evaluation of the teaching methods used by Arabic
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show More