Preferred Language
Articles
/
jperc-568
The Role of School in Promoting Intellectual Security of Students in Qurayyat Governorate
...Show More Authors

The current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) items distributed on the four main axes: Principal, teacher, curriculum and extracurricular activities. The study sample consisted of (152) teachers, principals and supervisors. The results showed that the school plays a highly-positive role in promoting intellectual security in the axes of the principal, curriculum, teacher and a moderate role in the axis of the extracurricular activities. The study also showed that there were no statistically significant differences attributable to any of the variables of the study. In light of the results, the study provided a number of recommendations that aim to further activate the role of the school in promoting intellectual security.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Culture Consumption in an Increase of Deception Marketing , a Sample Survey of Cosmetic Users Employees College of Administration & Economics / University of Mosul
...Show More Authors

Economics / University of Mosul

 

Abstract

The spread of the phenomenon of excessive buying in our society, especially for cosmetics, and at the same time increase the marketing deception by the organizations to take quick profit 'and accordingly was identified the problem of research in several questions, including:

Is there a significant effect of consumption culture on marketing deception?                                                &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Two Educational Models in Acquiring Historical Concepts and Orientation of Fourth Grade Students in History
...Show More Authors

The study focuses on Kamez model and the Claus Meyer model of instructional design, which are models that provide the learner with educational experiences to suit the logical information of the learner and the variety of instructional models. Research Objective: The present research aims to identify Limitations of the study. The current research is determined by ((fourth grade preparatory students, the book of the date of the fourth preparatory course)) Chapter II includes Arabic and foreign studies on the model of Kemp and Claus Mayer in the acquisition of concepts and direction towards the material. Chapter III Experimental Design: The researcher adopted an experimental design with two experimental groups and a control group. The resea

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
The Degree of Implementation of the Coronavirus Prevention Standards (Covid-19) In the Kingdom Of Saudi Arabia (A COMPARATIVE STUDY BETWEEN FAMILIES OF PEOPLE WITH INTELLECTUAL DISABILITIES AND FAMILIES OF ORDINARY PEOPLE)
...Show More Authors

The study aims to identify the degree of implementation of the coronavirus prevention standards (covid-19) in the kingdom of Saudi Arabia and compare it with the families of intellectual disabilities. The study population consisted of all families residing in the Kingdom of Saudi Arabia. To achieve the objectives of the research, the analytical descriptive approach was employed. The study sample consisted of (372) families, among them (84) families with intellectual disabilities, and (288) families without intellectual disabilities. They were chosen from the Saudi community according to what is available for collection in a simple random way, using the standard criteria for the prevention of coronavirus (Covid- 19) Prepared by the resear

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Tue Jun 21 2022
Journal Name
مجلة جامعة الانبار للعلوم الانسانية
تطوير المدارس الثانوية باستخدام مفهوم المدرسة المتعلمة
...Show More Authors

Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
KINDNESS AMONG FEMALE UNIVERSITY STUDENTS
...Show More Authors

The research aims at constructing a Scale of Kindness phenomenon among university female students and elicit criteria to it, It also recognizes the differences in kindness levels among female students according to variables (specialization, academic grade, social status, and the age). The sample consists of 534 female students who were selected randomly. The two researchers rely on experience and the results of questionnaire, The questionnaire is given to 130 female university students from different colleges as well as their acquaintance with literary works witch dealt with kindness , The scale consists of 39 items , It has psychometric characteristics (Validity and Reliability) . The criterion (Z) is extracted from it and throu

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
The Motivation of Students Toward Enrolling to Education College Departments in Tikrit University
...Show More Authors

The research aims to identify motivated to join the Evening Studies students to the College of Education at the University of Tikrit sections. In addition to knowledge of the differences in the degree of motivation of students according to gender, specialty, educational stage. To achieve the objectives of the research scholar us a measure consisting of (34) paragraph formulated positively, have been applied to a stratified random sample strength (500) students.

    The results showed that the degree of motivation was very big on all areas of the college and class, reaching the percentage of response (84.3%), and professional motives came first prize as a percentage of (93.8%), in addition

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Green Innovation and its Impact in Reinforcing Sustainable Competitive Advantage: An Exploratory Study of Opinions of a Sample of Employees in the Karungi group in Kirkuk
...Show More Authors

The development of the world, and in light of the intensity of competition highlighted the need to research and create a sustainable competitive advantage is sustained from an internal source in the company earned by the scarcity and difficulty of imitation by competitors, and this source is green innovation. In order to achieve the objective of the research, which is the diagnosis and analysis of the relationship between green innovation (in products, processes) and sustainable competitive advantage in the group of companies Kronji, was developed a default model of the research reflects the nature of the relationship and influence among its variables, the research adopted the questionnaire as a key tool for collecting data and i

... Show More
View Publication Preview PDF
Crossref