Preferred Language
Articles
/
jpgiafs-1262
Auditing the comprehensive electronic banking system to detect operational business risks (applied research)
...Show More Authors

Abstract:

                In light of the development in the banking environment and the increasing reliance on electronic systems in providing banking services and due to the intense competition witnessed by the banking sector, the need has emerged to apply the comprehensive electronic banking system, which works on the Internet in providing new and diverse banking services regardless of time and place by linking all branches to one central database, and despite the advantages achieved from the application of the comprehensive system, there is a set of risks that accompany the use of that system, What requires the auditors to develop the audit method in line with the size of the development in the customer's environment, and from here the research gained its importance by highlighting the reality of the application of the comprehensive electronic banking system in Rafidain Bank and identifying the nature of the external auditor's work in light of the client's application of electronic systems, and thus this research aims to provide a theoretical introduction to the comprehensive banking system, as well as to know the role of the auditor in light of the business risks surrounding the application of the system, The research reached a set of conclusions, most notably, the ability of the comprehensive banking system to develop and adapt banking operations more than other systems, which makes it a global solution for banks in the future due to the importance of the system and its ability to access multiple geographical areas and process operations in real time, and that the lack of preparation of an effective plan in advance for the transformation procedures towards the application of the comprehensive system in terms of providing infrastructure and qualified staffing and studying the problems of transformation and ways to solve them before the actual application of the system led to high operational risks. intrinsic, Therefore, the researcher proposed several recommendations, the most important of which is the need to increase investment in information technology with the development of a division for research and development of banking services provided by the comprehensive system in line with the development in the technological environment and the

needs and desires of customers to provide new and diverse banking services, with the need for the auditor to conduct an audit based on business risks in light of the customer's use of banking systems that rely on the Internet in providing his services, to control the size of current and future business risks that lead to failure Business or material misrepresentations extending to the financial statements.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Aerosol Science
On the design of miniature parallel-plate differential mobility classifiers
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun May 22 2005
Journal Name
University Of Technology
Results Of The Factor Group CF(G,Z)/R(G)
...Show More Authors

Publication Date
Tue Jul 01 2014
Journal Name
Bulletin Of The Iraq Natural History Museum
SURVEY OF THE GENUS PHYTOMYZA FALLEN,1810 (DIPTERA:AGROMYZIDAE) OF IRAQ
...Show More Authors

Publication Date
Sun Jun 03 2012
Journal Name
Baghdad Science Journal
Spectrofluorimetric method for the determination of glibenclamide in pharmaceutical formulations
...Show More Authors

A sensitive spectrofluorimetric method for the determination of glibenclamide in its tablet formulations has been proposed. The method is based on the dissolving of glibenclamide in absolute ethanol and measuring the native fluorescence at 354 nm after excitation at 302 nm. Beers law is obeyed in the concentration of 1.4 to 10 µg.ml-1 of glibenclamide with a limit of detection (LD) of 0.067 µg.ml-1 and a standard deviation of 0.614. The range percent recoveries (N=3) is 94 - 103.

View Publication Preview PDF
Crossref
Publication Date
Thu May 05 2022
Journal Name
5g Impact On Biomedical Engineering
Wireless Techniques and Applications of the Internet of Medical Things
...Show More Authors

View Publication
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
International Journal Of Research In Social Sciences And Humanities
The Anonymous Identity of Forced Migrants: A Post-Colonial Study
...Show More Authors

Colonialism invades the Third World countries, physically and psychologically. This article exposes but sample of the physical and psychological consequences of colonialism. The Beekeeper of Aleppo (2019) by the British novelist, Christy Lefteri is a typical novel to diagnose the harsh circumstances of individuals within and after the disaster. Since it depicts characters from Asian countries, it would be a best representative for all Asian people who suffer colonialism. Migration toward anonymity is the mere option for the colonized people. Aftermath, they experience displacement, trauma, and the loss of identity.

View Publication
Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
The Conflict between Somalian – Ethiopian Aboyt Al – Oaghaden 1960 – 1978
...Show More Authors

The study of the subject shows us the couflict between Somalian- Ethiopian. About Al-Oaghaden (1960-1978). This province is purely Somalian area in their language ،manners ،
traditions ،and their most population from Migrant bedouin.
In the last nineteenth century ،Ethiopia had entered to exit from plateau ،and become nearly from Red Sea and Indian Ocean.
The study shows us ،the conflict between colonization countries ،about African horn ،then fore Ethiopia entered as partner to divide the zone area ، and that division hadn’t Cares about the unity of people ،or the similar of language or religoun ،for this reason which had interference happened between broders and division about the same tribe from more Century ،

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 06 2023
Journal Name
Journal Of University Of Anbar For Pure Science (juaps)
Approximate Solution of Emden-Fowler Equation Using the Galerkin Method
...Show More Authors

Publication Date
Sun Mar 06 2011
Journal Name
Baghdad Science Journal
The Composition operator induced by a polynomial of degree n
...Show More Authors

In this paper, we characterize normal composition operators induced by holomorphic self-map , when and .Moreover, we study other related classes of operators, and then we generalize these results to polynomials of degree n.

View Publication Preview PDF
Crossref