Preferred Language
Articles
/
rBf7UZEBVTCNdQwCcpTy
The Perception of Information Security Threats Surrounding the Cloud Computing Environment
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Applications of ecological theory in the urban environment
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Nov 10 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of the Families, Attitudes toward Environment Pollution
...Show More Authors

Objectives: To evaluate the families’ attitudes toward environment pollution, and determine the relationship
between families’ attitudes towards environment pollution and their demographic characteristics of age,
education, type of family, and socioeconomic status.
Methodology: A descriptive design is carried throughout the present study to evaluate families’ attitudes toward
environment pollution for the period of October 5th2013 to May 7th2014. A non-probability "purposive" sample of
(110) families’ is selected. The sample is comprised of two groups; (75) urban families’ and (35) rural ones. An
evaluation tool is designed and constructed for the purpose of the study. It is consisted of (4) main parts;
dem

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the Level of Entrepreneurial Orientation: Analytical Research in the National Security Advisory
...Show More Authors

The current research aims to measure the level of entrepreneurial orientation and its dimensions (creativity, independence, proactivity, risk tolerance, and achievement) in the National Security Chancellery, as its importance and role in guiding senior leaders of the chancellery to make strategic decisions with high quality in various Iraqi concerns, more specifically the security aspect. The data was collected from 94 individuals (the research sample) from the research community (120) individuals at different administrative levels and intentionally where the questionnaire was adopted as a main tool for data collection and the primary data was analyzed through descriptive and inferential statistical methods (arithmetic mean, standard dev

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 15 2025
Journal Name
University Of Anbar Sport And Physical Education Sciences
The effect of using aids in spatial sense perception Throwing weights under 18 years old
...Show More Authors

View Publication
Publication Date
Mon Dec 16 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of information technology on tax evasion
...Show More Authors

The research aims at shedding light on the impact of information technology in reducing tax evasion in the General Authority for Taxation. In order to achieve this, the research relied on the analysis of its variables as a main tool for collecting data and information. The results showed that there is a positive and positive effect of information technology on tax evasion. The impact of information technology on increasing tax revenues and reducing the phenomenon of tax evasion In the performance of the research sample, the research sought to highlight the importance of tax information technology through its data and information to the tax administration for the purpose of completing the process Taxpayers for persons subject to income ta

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 15 2025
Journal Name
Journal Of Juridical And Political Science
Criminal protection of the internal state security in light of the fourth generation wars
...Show More Authors

The research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the

... Show More
View Publication
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Requirements for the Application of IFRS 17 in the Iraqi Environment
...Show More Authors

This research aims to address the most recent international standard in the field of insurance contracts, the International Financial Reporting Standard (IFRS17) and the theoretical framework of the standard in addition to the most important characteristics of the standard (IFRS17), as well as to identify the paragraphs of the modern standard, with the challenges its application in general and the use of the approach (inputs - operations - outputs) to present the challenges of its application in the Iraqi environment and specifically in the environment of Iraqi insurance sector companies (government), the research is based on the main premise that the identification of the requirements for the application of the International Fin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
New Approaches of Cloud Services Access using Tonido Cloud Server for Real-Time Applications
...Show More Authors

A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 13 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The evaluation of the role of the information system in reducing tax evasion
...Show More Authors

This research attempts to evaluate the role of the information system by highlighting its importance in providing date and information to the tax administration the process of tax accounting for those who are subject to income tax whether they are individuals or companies where the effective information system provides accurate and reliable information in a timely manner.

At the theoretical part of the research, the research approaches the problem of the research represented in that whether the information system, applied in the General Commission for Taxes, is capable of achieving its role in reducing the phenomenon of tax evasion. The existence of a set of things which in the Commission may lead to increase tax evasion by taxpa

... Show More
View Publication Preview PDF