Objective: To know the recent shifts in the decision-making process and theories and stages, techniques and systems affecting it.
The need for research coming because of the problems that accompany the decision as a result of the failure Sometimes, poor visualization or the narrow perspective of decision-making than miss the opportunity to choose alternatives or options of the most effective and appropriate to solve a problem.
And has received exceptional decision-making process in administrative studies and research to enable the organization to continue its activities and its high efficiency, especially successful that the decision depends on the future, and on a clear vision to achieve the desired goals, here it is occupied decision-making is of extreme importance.
The research built on addressing the strategic concepts, cover the destruction of the activities and work of the organization, and give a clear ability and can be guided to achieve harmony and adaptation between ends and means and protect the organization and resources of slipping and deviation The decision-making process is the focus of the administrative process, which is associated with complex realities and values that the organization, which must be careful and cautious in making decisions.
And emerged several theories in the development of administrative thought about the decision-making process, including traditional theories and behavioral (humanity), dealt with the development of decision-making process and its stages and the steps that follow it, and administrative problems that require analysis and collection of data required and the sources and factors and criteria that control decision-making and goal achievement.
It also touched on the transformations in modern decision-making process, including the transition from totalitarianism to selectivity, and the adoption of scientific method and transform facts and information to the concepts and terminology, and expand decentralized rather than centralized, and overall control to control partial to the distribution of responsibilities and giving flexibility instead of inertia imposed by the central work such as planning, leadership and decision-making and communication that hinder the movement of the organization.
The research that the recent developments in the decisions made it possible to overcome the problems associated with decision-making in different environments, and helped in the emergence of technology and electronic management, which played a major role in providing information, data and build information systems and decision support at the levels of the organization's strategic as well as a shift in thought patterns creative and future outlook in decision-making.
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreEstimations of average crash density as a function of traffic elements and characteristics can be used for making good decisions relating to planning, designing, operating, and maintaining roadway networks. This study describes the relationships between total, collision, turnover, and runover accident densities with factors such as hourly traffic flow and average spot speed on multilane rural highways in Iraq. The study is based on data collected from two sources: police stations and traffic surveys. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. The selection
... Show MoreThermal conductivity of compacted bentonite is one of the most important properties where this type of clay is proposed for use as a buffer material. In this study, Lee's disc method was used to measure the thermal conductivity of compacted bentonite specimens. The experimental results have been analyzed to observe the three major factors affecting the thermal conductivity of bentonite buffer material. While the clay density reaches to a target value, the measurement is taken to evaluate the thermal conductivity. By repeating this procedure, a relationship between clay dry density and thermal conductivity has been established in specimens after adjusting the water contents of the bentonite by placing its specimens in a drying oven for diffe
... Show MoreBackground. To identify the most common retention protocols practiced by Iraqi orthodontists using a specially designed e-survey. Furthermore, this study aimed to assess the effect of sociodemographic factors on the participant’s choice. Methods. Two hundred and twenty-five questionnaires with 23 multiple choice questions were sent to members of the Iraqi Orthodontic Society. The questionnaire was organized into four sections representing information about sociodemographic status of the orthodontists, factors affecting the selection of the retention system, commonly used retainers in the upper arch and lower arch, and duration of the retention system. The chi-square test was used to test the significant association between differe
... Show MoreOne of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreThe research aims to know (the effect of the pdeode strategy) in acquiring historical concepts among the fourth-grade literary female students in the history module. To achieve the goal of this research, the following null hypothesis was formulated. There is no statistically significant difference at the level of (0.05) between the average scores of the experimental group students, who study history according to the PDEODE strategy, and the average scores of the control group students who study the same module in the traditional way of the historical concepts acquisition test.The researcher chose the experimental method for the current research and adopted the experimental design of partial control with a post-test, which depends on the
... Show MoreThe aim of the research is to find out the nature of the relationship between the interrelationships and the interrelationships between risk management strategies (avoiding danger, risk exposure, risk exhibition, preventive programs and activities to reduce risks) and the dangers of container transportation, as an independent variable in the dangers of container transportation as a dependent variable, the study started from the problem that the company suffers from The practical aspect of the study was applied at the National Insurance Corporation, and the researcher designed a diagram according to the study's schematic diagram. The study, and for the purpose of data and information related to that, it relied on the descriptive a
... Show MoreAs contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o
... Show More