Preferred Language
Articles
/
jpgiafs-911
The role of the external auditor in assessing the security of information technology systems in light of (ISO/IEC 27001): (Applied research on a sample of private banks)
...Show More Authors

This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the policies described in the standard (ISO / IEC 27001), has been approved (checklist) Based on the standard specifications and procedures mentioned in the standard as a main tool for collecting and analyzing data and information for a sample of private banks, and in the light of the application process a number of conclusions were reached, the most prominent of which is the failure of banks to fulfill the research sample for all the requirements and conditions of the standard (ISO / IEC) 27001. Weaknesses and imbalances in the security of the systems used to process data and information, which requires standing on them and studying them, and the researchers made a number of recommendations, the most prominent of which are on the banks ’departments. To discuss increasing interest in meeting quality requirements in relation to the security of its information by meeting the reliability requirements of information technology security contained in the standard (ISO/IEC 27001), with the need to seek external consultants and auditors specialized in the field of information security for the purpose of security checks of the systems applied in the bank..

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
مجلة العلوم الاحصائية
نمذجة السلاسل الزمنية التي تنتجها اجهزة الاحصاء الدولية وانتاج قيم تنبؤية لمتخذ القرار حالة دراسية : التنبؤ بالمساحة المزروعة لمحصول الذرة الصفراء في العراق للفترة (2015-2020
...Show More Authors

تنفذ أجهزة اإلحصاء الدولية ومنها الجهاز المركزي لإلحصاء في العراقإحدى أجهزة وزارة التخطيط، تقوم بإجراء مسوح سنوية ودورية لإنتاج مؤشرات تقييم وتقويم أنشطة القطاعات الاقتصادية المختلفة. يتيح هذا الكم الهائل من البيانات بشكل سلسل زمني لهذه الأجهزة إنتاج مؤشرات جديدة، بما في ذلك القيم التنبؤية لمؤشرات رئيسية تستخدم في إعداد الخطط طويلة وقصيرة المدى. في عام 2015، قامت مديرية الإحصاء الزراعي في الجهاز المركزي للإ

... Show More
Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
WLAN Integrated with GPRS Network Securely
...Show More Authors

In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.

      Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy  was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Banking efficiency between concept and measurement methods
...Show More Authors

The research aims to review the concepts of banking efficiency and its relationship to performance, productivity and efficiency, as well as analyze the efficiency of the banking in micro-economic view.
In order to achieve the objectives of the research We have been employed graphic, Econometrics  and Mathematical methods to derive the different concepts of banking efficiency.

We showed that there are two main methods used to measure the bank efficiency, the first called Stochastic Frontier Analysis , this technique depends on the parametric methods, The other method is called Data Envelopment Analysis is based on mathematical programming methods

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 08 2023
Journal Name
Journal Of Planner And Development
Lebanese building law between texts, Application gaps and land scarcity
...Show More Authors

This paper examines the gaps in Lebanese building law as well as the exploitation of contractors, stakeholders, and residents in order to make illegal profits at the expense of The Shape of urban agglomerations and their expansion in cities and rural areas, which is contrary to the principles of sustainable land development. It also emphasizes the amplification of the factors of vertical and horizontal building investments in the implementation of buildings contrary to the license, as well as the burden that this places on the city's resulting infrastructure and ability to absorb the activities and needs of its residents. The study then presents recommendations in the process of transformation in the technique of planning and application

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 28 2023
Journal Name
Al–bahith Al–a'alami
Is it Time to Develop Government Communication Functions?
...Show More Authors

Embracing digital technological advancements in media and communication has led government entities to adopt communication practices fully aligned with the digital and networked system in government communication. Traditional media practices within the government environment increasingly rely on the ability to utilize digital tools and systems for content creation, communication, evaluation, and the management of the entire communication process within an electronic and intelligent framework for government services. Naturally, this transformation has caught the attention of communication and public relations researchers worldwide, as the digital and networked aspects of government communication now form an intelle

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 29 2018
Journal Name
Iraqi Journal Of Science
Steganography Technique using Genetic Algorithm
...Show More Authors

Steganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to b

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
أثر تطوير معايير التدقيق العراقية في الإيفاء بمتطلبات الإصلاح ومناهضة الفساد: دراسة مقارنة تحليلية مع وضع إطار مقترح لتعديل دليل التدقيق العراقي رقم(6) بشأن تخطيط عملية التدقيق والإشراف عليه
...Show More Authors

The research aimed to statement, which impact that the development of Iraqi auditing standards in the fight against corruption and to fulfill the reform requirements by conducting a comparative study analysis with a framework proposal to amend the Iraqi Audit directory number statement (6) issued by the Accounting and Auditing Standards Board of the Republic of Iraq dated 08/24/2002 on audit planning and supervision on the basis of the latest versions of international auditing standards in this regard.

The researchers concluded that there is a need to update the standards (evidence) audit accredited in the Republic of Iraq in accordance with international auditing standards to meet the requirements of the report of the external a

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
دراسة تحليلية لظاهرة الفساد الاداري والمالي في بعض المؤسسات الصحية لمحافظة القادسية: An analytical study of the phenomenon of administrative and financial corruption in some health institutions in Al-Qadisiyah Governorate
...Show More Authors

Certainly there is a negative impact on development due to corruption in its corruption forms It is administrative and financial as well as direct impact on all sectors Including the health sector, which has seen in Iraq a marked setback in performance and services , The research aims at the possibility of demonstrating the negative effects of financial and administrative corruption on health institutions and Inability to meet health needs The extent to which Regulatory institutions and institutions manage to reduce financial and administrative corruption and ways of dealing with it The phenomenon of financial and administrative corruption is the most serious phenomenon because of its impact on economic growth, which in turn impedes the

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (6)
Scopus