Drawbacks of Implementing Electronic Management in the Ministry of Education (A sample: Oman Educational Portal) from the Point of View of IT Staff. The study aimed at discovering the drawbacks of implementing electronic management in the Ministry of Education (a sample: Oman Educational Portal) from the point of view of IT staff, and that is by answering the following questions: - What are the main drawbacks (administrative, financial, technical and drawbacks related to human resources) that hinder implementing the electronic management in the Ministry of Education (a sample: Oman Educational Portal) from the point of view of IT staff? - Are there any statistical significance differences at the level (0.05) between study samples on the drawbacks of implementing the electronic management in the Ministry of Education (a sample: Oman Educational Portal) from the point of view of IT staff attributed to gender, academic qualifications, years of experience and the number of training courses? To answer the research's questions, the researcher used a questionnaire as her study tool. It consisted of 52 statements, and their credibility was confirmed by several experts. Cronbach's alpha was also used to confirm its reliability, and it scored (0.92). The study community consisted of all of IT staff (146 employee) in the Directorate General of Information Technology in the Ministry of Education in Muscat Governorate. The study sample was the study community itself. The researcher used the descriptive approach in her study. She also used the statistical methods like the arithmetic average, standard deviation, t-test and one-way analysis of variance to discover the significance level between variables. The most important results of the study are as follows: financial drawbacks took the first place among other drawbacks, and the other three drawbacks had very similar results. There were no statistical significance differences at the level (0.05) in all of the 4 drawbacks attributed to gender, academic qualifications and the number of training courses, but there were statistical significance differences at the level (0.05) in the administrative drawbacks attributed to years of experience (more than 10 years of experience). It was also found that there were statistical significance differences in the financial drawbacks (5 to 10 years of experience). In light of the results, the researcher recommended: providing adequate financial support to implement electronic management in the Ministry of Education and suitable training programmes for the staff responsible for implementing the electronic management. She also recommended creating a motivating system and linking it to the performance expected and the results of the actual implementation of the electronic management in the Ministry of Education.
بهذا البحث نقارن معاييرالمعلومات التقليدية (AIC , SIC, HQ , FPE ) مع معيارمعلومات الانحراف المحور (MDIC) المستعملة لتحديد رتبة انموذج الانحدارالذاتي (AR) للعملية التي تولد البيانات,باستعمال المحاكاة وذلك بتوليد بيانات من عدة نماذج للأنحدارالذاتي,عندما خضوع حد الخطأ للتوزيع الطبيعي بقيم مختلفة لمعلماته
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreAbstract :
The research aims to diagnose some of the negative phenomena
( Counterfiting , Pettifogging , Embezzlement ) that have been detected over the past ( 2010 – 2014 ), a fixed-term part of the national strategy for the fight against corruption launched by the Joint Council for the fight against corruption in Iraq and measuring the application of government control according to the American standard GAO standards and identifying the potential for the application of those standards gap. It has been collecting data and information of special issues of corruption reports and meeting with (42) employees and the use of a checklist has been prepared for thi
This research includes problems that facing the philosophy of education in the variables of knowledge and Informatics society (techno _ social).
The problematic research included three questions:
1- What are the concepts and characterization related to the problematic of relationship between the philosophy of education and informatics variables (techno - social).
2-What kind of problems facing speech philosophy of education in the variables information (techno - social)
3 - What are the perceptions of educational proposed to address problematic philosophy of education in the scope of human (human nature) and (values and morals), in addition the research may explain the co
... Show MoreThis is a descriptive study that used the survey method, it’s aimed to identify the topics and frameworks of diplomatic and political issues covered by the news of the website of the Iraqi Ministry of Foreign Affairs, through the content analysis method applied on a sample selected in a systematic random manner for news published in the year 2021. The sample included (191) news equivalent to (20%) of the total study population of (942). The study reached some results, the most important of which were as follows: The political issue, in its general sense, grabbed the most prominent attention among the various issues and events focused on by Iraqi diplomacy: "international cooperation", "bilateral cooperation", and then "regional politic
... Show MoreThe current research focuses on the extent to which the strategic orientation(entrepreneurial orientation, customer orientation, technology orientation, learning orientation, and investment orientation) affects the learning organization (building common vision, systemic thinking, personal dominance, mental models, team learning)The first hypothesis to test the connection relation between research variables and The second hypothesis was to test the relationship between these variables. In order to ascertain the validity of the hypotheses, the research was based on a questionnaire questionnaire prepared according to a number of In addition to building a fifth sub-variable for the strategic orientation (investment orientation) based
... Show Moreenjoyed the process of the development of higher education institutions attention of most countries of the world and to reconsider its objectives and programs and administrative and organizational structures, and it was the most important development of the application of Quality Assurance and Accreditation Standards (QAAS) tools, as the aim of these tools to the application of advanced with a far-reaching impact on all of the disciplines in the organization methods education that contribute, and plays a performance audit an important role in verifying the extent to which carried out these institutions activities or programs effectively and efficiently, economic, There are a number of objectives for the search of the most important attem
... Show MoreThe research aims to demonstrate the impact of tax techniques on the quality of services provided to income taxpayers by studying the correlational and influencing relationships between the exploited variable (tax techniques) and the dependent variable (the quality of services provided to income taxpayers), and in line with the research objectives, the main hypothesis of the research was formulated (there is a relationship Significance between tax techniques and the quality of services provided to income taxpayers) a number of sub-hypotheses emerged from this hypothesis that were stated in the research methodology, and a number of conclusions were reached, the most important of which were (through the use of the correlation coeff
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More