الناصر، عامر عبد الرزاق عبد المحسن والكبيسي، صلاح الدين عواد كريم. 2018. إمكانية تبني الحوسبة السحابية الهجينة في الجامعات العراقية : دراسة تحليلية باستخدام أنموذج القبول التكنولوجي. مجلة الإدا
The Catering contract is considered as a type of hospitality contracts in the English common law of customary origins. Which is unwritten and based upon judicial precedents of the English courts. It is a complex contract of mixed nature، Is Regarded as a contract for the sale of meals of food and drink،, and is considered as a contract for supply of services concerning the preparation of food and drink، for providing them to the customer، as well as being a bailment contract. It is worth-bearing in mind that this contract is subject to the rules of three important English legislations: The Sale of Goods Act 1979، The Supply of Goods and Services 1982، The Consumer Protection Act 1987، and The Consumer Rights Act 2015. It is also w
... Show MoreIn the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThis research aims at studying the websites of Iraqi ministries to determine the extent of the use of electronic communication in the practice of public relations' activities through these sites, which represent a formal means of communication between the ministry and its people.
The research consists of three chapters: chapter one studies the methodological framework of the research; chapter two includes three units: unit one studies technologies of electronic communication including its concept, features and types; unit two studies electronic publications i.e. its concept and features; and unit three deals with designing the electronic websites .it ends with chapter three which is divided into two sections: section one studies the
The economical units in the world face great and rapid challenges in all aspects, a matter that requires facing these challenges throughout continuous improving and developing in their performance to keep their competitive position "place".
The Benchmarking Technique is one of the modern managerial tools that are proved to be successful in application throughout making continuous comparisons between products or services and the best – performance levels the compete with it . This is achieved to develop its performance and give it the competitive criterion with which it faces its competitors.
... Show More
In this research, we addressed the modern criminal policy of the UAE legislator in the face of adultery, in accordance with the most recent amendments under Decree No. 31 of 2021 on crimes and penalties, in which the federal legislator adopted a modern criminal policy in an attempt to balance the protection of the public freedom of individuals, including sexual freedom, with the protection of family ties, by criminalizing the adultery of the husband or wife or those under the mandate to describe the position of the female with her consent under the text of article 409 of the aforementioned law. The male, and what confirms to us this is the adoption of the narrow concept of the position, so that the site is limited to the natural penetrat
... Show MoreThis study aims at defining the concept of the fragile state, a term that came into existence in 2014, when the states that had internal Problems and external interventions were referred to as the failure states. However, the indicators for their designation and the criteria adopted are 12 indicators that address all aspects of the State’s duties vis-a-vis its citizens. The study examined the reasons that led to the continuation of Iraq within the fragile states, and the selection of the five years within the time limits of the study due to the factors that led to the decline of Iraq and falling back within the most fragile countries. The study dealt with the fragile state challenges to the media reality as a result of the change of it
... Show More
The increase in military spending has become a feature of the times for many countries, including China. They have sought to increase their defence spending, not with the aim of domination and possession, but rather to protect their economic interests and to secure their foreign trade. The research aims to identify the impact of military spending by studying the nature of defence spending and its role in providing security. And stability and facilitating foreign investment in it, as well as storming the military industry, securing some humanitarian supplies, and participating in a variety of public works that can be used in the civil and military fields, and the aim of the research is to id
... Show MoreExisting literature suggests that construction worker safety could be optimized using emerging technologies. However, the application of safety technologies in the construction industry is limited. One reason for the constrained adoption of safety technologies is the lack of empirical information for mitigating the risk of a failed adoption. The purpose of this paper is to fill the research gap through identifying key factors that predict successful adoption of safety technologies.
In total, 26 key technology adoption predictors
Abstract As the United Nations approaches its 70th anniversary, the world is going through the most severe accumulation of serious international security failures in recent memory, challenging the UN Security Council’s ability to address them effectively. Over the past four years, crises in Libya, Syria and Ukraine have precipitated a worrisome erosion of great power relations that has complicated Security Council decision making on a number of trouble spots. Its inability to devise consensus responses to the escalating civil war in Syria has been particularly troubling, resulting in the regional spill over into Iraq and the emergence of Islamic State as a new threat to peace in the region and beyond. Meanwhile, the UN’s often under
... Show More