يُعد التنمر ظاهرة إجتماعية قديمة موجودة في جميع المجتمعات سواء أكان المجتمع صناعيًا أم ناميًا، كما يُعد من المفاهيم الحديثة نسبيًا، وربما يرجع لحداثة الإعتراف به نوعًا من أنواع العنف فضلاعن ندرة الدراسات التي تناولته وعدم وجود معيار محدد لتحديد السلوك الذي يعد تنمرًا أم عابرًا، لقد بدأ الأهتمام بدراسة التنمر في سبعينات القرن الماضي وأصبح موضعًا يحضى بأهتمام العديد في مختلف البلدان، وفي عصرنا الحالي تطورت الظاهرة الإجرامية تطورًا ملحوظًا سواء في أسلوب إرتكابها أو مرتكبيها وكل ذلك يرجع إلى التقدم السريع في ثورة المعلومات والإتصالات، فظهرتْ الجرائم الإلكترونية ومنها جريمة التنمر الإلكتروني، وفي نطاق الجريمة الإلكترونية، أختلف الفقه والقضاء في تحديد مسؤولية مزود خدمة الإنترنت وفقًاً لطبعية عمله المتمثل بمدى الرقابة التي يقوم بها على المحتويات غير المشروعة التي تتم عبر الخدمة التي يقدمها في الجرائم الإلكترونية ومنها جريمة التنمر الإلكتروني Bullying is considered an ancient social phenomenon that has existed in all societies for a long time, whether the society was industrialized or developing. Recently, bullying was recognized as a form of violence. Additionally, the interest in studying bullying began in the seventies of the last century and became a topic of interest in many countries around the world. nowadays, the criminal phenomenon has developed remarkably, both in the way it is committed or its perpetrators, and all this is due to the rapid progress In the information and communication revolution, cybercrimes appeared, including the cyber-bullying crime In addition, Jurisprudence and the judiciary have differed in determining responsibility of the internet service provider according to the nature of its work, which is the extent of control it performs on the illegal content that is carried out through the service it provides in cybercrime, including the cyberbullying crime. Le harcèlement est un phénomène social ancien présent dans toutes les sociétés, qu'elles soient industrielles ou en développement. Il est également considéré comme un concept relativement moderne en raison de sa reconnaissance récente en tant que forme de violence, ainsi que de la rareté des études qui l'ont abordé et de l'absence du critère spécifique pour déterminer quel comportement est considéré comme du harcèlement ou toléré. L'intérêt, pour l'étude du harcèlement a commencé dans les années 70 du siècle dernier et est devenu un sujet d'intérêt pour de nombreuses personnes dans différents pays. De nos jours, le phénomène criminel s'est sensiblement développé, que ce soit dans sa manière de se produire ou chez ses auteurs, et cela est dû aux progrès rapides de la révolution de l'information et de la communication. Les crimes électroniques, y compris le harcèlement électronique, ont émergé dans le cadre de la cybercriminalité. Dans ce contexte, les juges et les autorités judiciaires ont divergé dans l'établissement de la responsabilité du fournisseur d'accès internet en fonction de la nature de son travail, qui consiste en l'étendue de son contrôle sur les contenus illégaux qui se produisent par le biais du service qu'il fournit dans les crimes électroniques, y compris le harcèlement électronique.
In this research , we study the inverse Gompertz distribution (IG) and estimate the survival function of the distribution , and the survival function was evaluated using three methods (the Maximum likelihood, least squares, and percentiles estimators) and choosing the best method estimation ,as it was found that the best method for estimating the survival function is the squares-least method because it has the lowest IMSE and for all sample sizes
In the era of the digital economy, public organizations need to consolidation the capabilities of entrepreneurial alertness to reduce the risks of sudden transformations and changes, and to find effective mechanisms to discover and invest in environmental opportunities proactively, as this concern has become a knowledge gap in public sector institutions, the current research aims to identify the role of digital competence in influencing on entrepreneurial alertness in the Central Bank of Iraq (CBI), the descriptive analytical approach was used as a research method to describe and analyze the main research variables. digital competence as an explanatory variable includes three dimensions: digital infrastructure, digital integration, and d
... Show MoreMany studies have recommended implying the skills and strategies of creative thinking, critical thinking, and reflective thinking in EFLT curriculum to overcome EFL teaching-learning process difficulties. It is really necessary to make EFL teachers aware of the importance of cultural thinking and have a high perception of its forces. Culture of thinking consists of eight cultural forces in every learning situation; it helps to shape the group's cultural dynamic. These forces are expectations, language, time, modeling, opportunities, routines, interactions, and environment. This study aims to investigate EFL student-teachers’ perceptions of cultural thinking. The participants are selected randomly from the fourth-stage students at
... Show MoreDust and bird residue are problems impeding the operation of solar street lighting systems, especially in semi-desert areas, such as Iraq. The system in this paper was designed and developed locally using simple and inexpensive materials. The system runs automatically. It Connects to solar panels used in solar street lighting, and gets the required electricity from the same solar system. Solar panels are washed with dripping water in less than half a minute by this system. The cleaning period can also be controlled. It can also control, sensing the amount of dust the system operates. The impact of different types of falling dust on panels has also been studied. This was collected from different winds and studied their impact o
... Show MoreBackground: The access cavity is a critical stage in root canal therapy and it may influence the subsequent steps of the treatment. The new minimally invasive endodontic access cavity preparation concept aims to preserve sound tooth structure by conserving as much intact dentine as possible including the pulp chamber's roof, to keep the teeth from fracturing during and after endodontic treatment. While there is great interest in such access opening designs in numerous publications, still there is a lack of scientific evidence to support the application of such modern access cavity designs in clinical practice. This review aims to critically examine the literature on minimal access cavity preparations, explain the effect of minimally inva
... Show MoreAbstract
Asthma is a complex disease defined by chronic airway inflammation and airflow limitation causing variable respiratory symptoms which include shortness of breath (SOB), wheezing, chest tightness and cough. Asthma guidelines advocate adding a second long acting bronchodilator to medium doses of inhaled corticosteroids (ICS) rather using high doses of ICS alone to control moderate to severe persistent asthma. The aim of this study was to evaluate the clinical outcomes of three medication regimens indicated for Iraqi patients suffering from persistent asthma.
This study was interventional randomized clinical study conducted on a sample of adult Iraqi asthm
... Show MoreA theoretical model is developed to determine time evolution of temperature at the surface of an opaque target placed in air for cases characterized by the formation of laser supported absorption waves (LSAW) plasmas. The model takes into account the power temporal variation throughout an incident laser pulse, (i.e. pulse shape, or simply: pulse profile).
Three proposed profiles are employed and results are compared with the square pulse approximation of a constant power.
The present art icle discusses the prob lems of understanding and translating the lingu istic and cult ural aspect of a foreign lite rary text. The article considers the trans lation process through the pr ism of cult ural orientation. In the process of transl ation, the nati onal cultural iden tity should be expressed to the max imum extent, through all me ans of expre ssion that include imagery and inton ation. In addi tion to the author's sty le, special atte ntion should al so be pa id to tro pes, phraseological uni ts, colloquial wo rds and dial&n
... Show MoreThis paper offers a critical examination of Canadian news guidelines and policies
on user-generated content (UGC) posted on news-related comment sections and
social media.
The outline of how news-related UGC is moderated within Canadian news is achieved
by looking at the online comment policies of major Canadian news organizations like .
the CBC, CityNews (Halifax), CTV News, Glacier Media, Global News, The Globe
and Mail, Narcity Media, Postmedia, QUB (Québecor), and Torstar.The policies highlight how Canadian news organizations have practical strategies
to manage news-related UGC but also call upon positive and negative social
principles, to flag ill practices, foster democracy, and fight against online hate sp