Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
The subject of the information technology system ( ITS ) of the important issues And contemporary thought in management, and various types of organizations seeking to apply and try to
... Show MoreGroundwater is an essential source because of its high quality and continuous availability characterize this water resource. Therefore, the study of groundwater has required more attention. The present study aims to assess and manage groundwater quality's suitability for various purposes through the Geographical Information System GIS and the Water Quality Index WQI. The study area is located in the city of Baghdad in central Iraq, with an approximate area of 900 , data were collected from the relevant official departments representing the locations of 97 wells of groundwater in the study area for the year 2019, as it included physicochemical parameters such as pH, EC, TDS, Na, K, Mg, Ca, Cl, , and &nbs
... Show More
The process of soil classification in Iraq for industrial purposes is important topics that need to be extensive and specialized studies. In order for the advancement of reality service and industrial in our dear country, that a lot of scientific research touched upon the soil classification in the agricultural, commercial and other fields. No source and research can be found that touched upon the classification of land for industrial purposes directly. In this research specialized programs have been used such as geographic information system software The geographical information system permits the study of local distribution of phenomena, activities and the aims that can be determined in the loca
Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreBackground: Health information systems in most countries are inadequate in providing the needed management support and the current health information systems are therefore widely seen as management obstacles rather than as tools,Objectives: the current study is an attempt to assess the behavioral and organizational determinants of health information system performance in Iraq.Methods: A cross-sectional study was conducted by interviewed a total of 189 respondents selected from six Iraqi governorates. The Organizational and Behavioral Assessment Tool was used to measure the behavioral and organizational determinants of health information system performance, it is one of the PRISM package tools that are used to assess the health informatio
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreAbstract
Drug information resources are the information that is used in medications discovery, utilization, and management. Little information about different types of resources used by Iraqi community pharmacists is known. Therefore, the objectives were to determine drug information resources' type do the pharmacists used and the common drug information questions they faced during their work in community pharmacy. A cross-sectional descriptive study was conducted in different Iraqi provinces and online self-reported survey was introduced through Google Form Software to an appropriate sample of graduated pharmacists who were working in a private community pharmacy and having at least one
... Show More