Intellectual security for department managers
DOI:
https://doi.org/10.31973/aj.v2i139.2630Keywords:
intellectual security, department managers, informatics, technologyAbstract
Individuals differ in their level of intellectual stability and the ways in which they confront the crises facing them. Intellectual security is one of the terms that emerged as an inevitable consequence of the new intellectual influences resulting from the information openness and technological development, some of which were characterized by extremism and distance from moderation, and since the directors of departments in government institutions are one of the most important effective figures and leaders In the development and construction of society, it was imperative to give them clear attention in this field, Therefore, the researcher proceeded to conduct this kind of study, especially since we are living in this period of many pressures that pass on our country and its impact is reflected on members of society, and that these crises and pressures require studying the concept of Intellectual Security on a sample of department managers in government institutions because they are from Important elements that must be characterized by this concept. The current research aims to identify:
- Building a measure of intellectual security
- Measuring the intellectual security of department managers in governmental institutions
- Identify the differences in intellectual security of department managers according to the gender variable (male - female)
To achieve the goals, the researcher relied on the theory of social disintegration in intellectual security. She also built a scale for intellectual security, and conducted statistical analyzes for the scale. The reliability coefficient for the Intellectual Security Scale was (0.92), and for the Cronbach Alpha method (0.96) After that, the measure was applied in its final form to the research sample, which numbered (400) managers and directors of a department in government institutions, and the data was processed statistically, and after analyzing the data, the following results were reached:
1- Department managers possess a high level of intellectual security
2- The level of intellectual security according to the gender variable is high for females compared to males
Downloads
References
Abdul Aziz, Aqeel Al-Enezi, Muhammad Salim Al-Zaboon (2015): Suggested educational foundations to develop the concept of intellectual security among secondary school students in the Kingdom of Saudi Arabia, Journal of Educational Sciences Studies, Volume 42, Issue 2.
Abu Allam, Salah El-Din Mahmoud, 2000, Educational and Psychological Measurement and Evaluation, Methods, Applications, and Contemporary Directions, Cairo, The Educational House of Fikr.
Abu Arad, Salih bin Ali, 2010, The University’s Role in Achieving Intellectual Security, a Suggested Concept, The Arab Journal for Security Studies and Training, Volume (27) P.52
Al-Buqami, Saud bin Saad Muhammad, 2009, Towards building a project to strengthen intellectual security in the Ministry of Education, King Saud University - Saudi Arabia.
Al-Da'ah, Dr. Hassan Abdullah, 2013, Strategy of Intellectual and Cultural Security in the Islamic World, Master Thesis, Naif Arab University for Security Sciences, Riyadh.
Al-Harthi, Zaid, 2008, The Contribution of the Educational Media to Achieving Intellectual Security for High School Students in Makkah Al-Mukarramah City from the Viewpoint of School Principals, Agents, and Educational Supervisors, Unpublished Master Thesis, Umm Al-Qura University, Makkah Al-Mukarramah, Saudi Arabia.
Al-Juhani, Ali bin Fayez, 2001, Security Media and Crime Prevention, Center for Studies and Research, Naif Arab University for Security Studies, Riyadh.
Al-Khafaji, Zainab Hayawi, 1994, Measuring Psychological Security of State Employees and Employees, Unpublished Master Thesis, University of Baghdad, College of Arts, Iraq.
Al-Khatib, Muhammad Shahat, 2005, Intellectual Deviation and its Relationship to International National Security.
Al-Majzoub, Ahmad Ali (1987): Intellectual and ideological security: its concepts, characteristics and how to achieve it, in a book Toward an Arab Strategy for Training in Security Fields, Naif University for Security Sciences, Riyadh.
Al-Nabhan, Musa (2004) Basics of Measurement in the Behavioral Sciences, Jordan, Dar Al-Shorouk for Publishing, Distribution and Printing.
Al-Otaibi, Subhi Jaber (2005): The Development of Thought and Methods in Management, 1st Edition, Amman: Al-Hamid House for Publishing and Distribution
Al-Saif, Muhammad Ibrahim (1996), The Social Phenomenon in the Culture and Building of Saudi Society, Between Social Perception and Realities of the Islamic Trend, Riyadh: Al-Obaikan Press.
Al-Sudais, Abd al-Rahman 2005 Intellectual Security, Friday sermon at the Grand Mosque, printed at the Ministry of Islamic Affairs, Endowments, Call and Guidance, Riyadh.
Al-Turki, Abdullah bin Abdul-Mohsen 2002 Security in people's lives and its importance in Islam, Ministry of Islamic Affairs, Endowments, Call and Guidance, Riyadh.
Al-Zaytoun, Ayesh Mahmoud (1984) Fundamentals of Descriptive Statistics, University of Jordan, College of Education, Jordan. I. 1, Ammar House for Publishing and Distribution
Anastasi,A.(1979).psychological testing,(ued),new yourk.macmillan publishing Co.,INC.
Chisel,e.e,(1980).measurement theory for behavioral sciences,son Francisco,w.h,freeman company.
Daoud, Nabila, 1991, The Contemporary Political Encyclopedia, Cairo: Gharib Library
Ebel, R.L.(1972). essential of education measurement , new jersey: prentice- hall company
Ferguson, George, 1991, Statistical Analysis in Education and Psychology, translated by Hana Al-Aqili, Baghdad, Dar Al-Hikma.
Jones,A.T.(2011).comparing method for items analysis the impact of difficulty.journal of applied psychological measure ment,pp1-6
Kelly,T.1,(1939).the selection of upper and lower groups for validation of test items.new York.
Lord,f.m.&norick,m.r.(1968).statistical theories of mental test scores.reading (ma);adlsson-wesley.
Miller, Benjamin "The Concept of Security: Should it be Redefined?"Journalof Strategic Studies,Vol.24,Issue2,June,2001
Omar, Ahmed Mukhtar (2002). Encyclopedic Dictionary of Expressions and Readings of the Noble Qur’an, Saudi Arabia: The Letters of Knowledge Foundation.
Van Dalen, Deobold (1985) Research Methods in Education and Psychology, Cairo, translation, Muhammad Nabil Nofal and others, Revision by Syed Othman, 2nd Edition, The Anglo-Egyptian Library.
Yuki, G. A. (1989). Leadership in Organization , Prentice-Hill Englewood Cliffs, New Jersey, USA.
Downloads
Published
Issue
Section
License
Copyright and Licensing:
For all articles published in Al-Adab journal, copyright is retained by the authors. Articles are licensed under an open access Creative Commons CC BY 4.0 license, meaning that anyone may download and read the paper for free. In addition, the article may be reused and quoted provided that the original published version is cited. These conditions allow for maximum use and exposure of the work.
Reproducing Published Material from other Publishers: It is absolutely essential that authors obtain permission to reproduce any published material (figures, schemes, tables or any extract of a text) which does not fall into the public domain, or for which they do not hold the copyright. Permission should be requested by the authors from the copyrightholder (usually the Publisher, please refer to the imprint of the individual publications to identify the copyrightholder).
Permission is required for: Your own works published by other Publishers and for which you did not retain copyright.
Substantial extracts from anyones' works or a series of works.
Use of Tables, Graphs, Charts, Schemes and Artworks if they are unaltered or slightly modified.
Photographs for which you do not hold copyright.
Permission is not required for: Reconstruction of your own table with data already published elsewhere. Please notice that in this case you must cite the source of the data in the form of either "Data from..." or "Adapted from...".
Reasonably short quotes are considered fair use and therefore do not require permission.
Graphs, Charts, Schemes and Artworks that are completely redrawn by the authors and significantly changed beyond recognition do not require permission.
Obtaining Permission
In order to avoid unnecessary delays in the publication process, you should start obtaining permissions as early as possible. If in any doubt about the copyright, apply for permission. Al-Adab Journal cannot publish material from other publications without permission.
The copyright holder may give you instructions on the form of acknowledgement to be followed; otherwise follow the style: "Reproduced with permission from [author], [book/journal title]; published by [publisher], [year].' at the end of the caption of the Table, Figure or Scheme.