يُعد التنمر ظاهرة إجتماعية قديمة موجودة في جميع المجتمعات سواء أكان المجتمع صناعيًا أم ناميًا، كما يُعد من المفاهيم الحديثة نسبيًا، وربما يرجع لحداثة الإعتراف به نوعًا من أنواع العنف فضلاعن ندرة الدراسات التي تناولته وعدم وجود معيار محدد لتحديد السلوك الذي يعد تنمرًا أم عابرًا، لقد بدأ الأهتمام بدراسة التنمر في سبعينات القرن الماضي وأصبح موضعًا يحضى بأهتمام العديد في مختلف البلدان، وفي عصرنا الحالي تطورت الظاهرة الإجرامية تطورًا ملحوظًا سواء في أسلوب إرتكابها أو مرتكبيها وكل ذلك يرجع إلى التقدم السريع في ثورة المعلومات والإتصالات، فظهرتْ الجرائم الإلكترونية ومنها جريمة التنمر الإلكتروني، وفي نطاق الجريمة الإلكترونية، أختلف الفقه والقضاء في تحديد مسؤولية مزود خدمة الإنترنت وفقًاً لطبعية عمله المتمثل بمدى الرقابة التي يقوم بها على المحتويات غير المشروعة التي تتم عبر الخدمة التي يقدمها في الجرائم الإلكترونية ومنها جريمة التنمر الإلكتروني Bullying is considered an ancient social phenomenon that has existed in all societies for a long time, whether the society was industrialized or developing. Recently, bullying was recognized as a form of violence. Additionally, the interest in studying bullying began in the seventies of the last century and became a topic of interest in many countries around the world. nowadays, the criminal phenomenon has developed remarkably, both in the way it is committed or its perpetrators, and all this is due to the rapid progress In the information and communication revolution, cybercrimes appeared, including the cyber-bullying crime In addition, Jurisprudence and the judiciary have differed in determining responsibility of the internet service provider according to the nature of its work, which is the extent of control it performs on the illegal content that is carried out through the service it provides in cybercrime, including the cyberbullying crime. Le harcèlement est un phénomène social ancien présent dans toutes les sociétés, qu'elles soient industrielles ou en développement. Il est également considéré comme un concept relativement moderne en raison de sa reconnaissance récente en tant que forme de violence, ainsi que de la rareté des études qui l'ont abordé et de l'absence du critère spécifique pour déterminer quel comportement est considéré comme du harcèlement ou toléré. L'intérêt, pour l'étude du harcèlement a commencé dans les années 70 du siècle dernier et est devenu un sujet d'intérêt pour de nombreuses personnes dans différents pays. De nos jours, le phénomène criminel s'est sensiblement développé, que ce soit dans sa manière de se produire ou chez ses auteurs, et cela est dû aux progrès rapides de la révolution de l'information et de la communication. Les crimes électroniques, y compris le harcèlement électronique, ont émergé dans le cadre de la cybercriminalité. Dans ce contexte, les juges et les autorités judiciaires ont divergé dans l'établissement de la responsabilité du fournisseur d'accès internet en fonction de la nature de son travail, qui consiste en l'étendue de son contrôle sur les contenus illégaux qui se produisent par le biais du service qu'il fournit dans les crimes électroniques, y compris le harcèlement électronique.
The current environment is witnessing several developments as a result of the changes taking place in all areas of economic, social , political and legal that led to the transformation of the industrial economy , which depends based on quantitative production to a knowledge economy which relies based on information and knowledge , as the central pillar of this economy during the trading of these information and knowledge between all individuals in general and decision makers , in particular, through information and communication technology of computers and the Internet to achieve sustainable human development in the social dimension. &
... Show Morestudied, and its important properties and relationship with both closed and open Nano sets were investigated. The new Nano sets were linked to the concept of Nano ideal, the development of nano ideal mildly closed set and it has been studied its properties. In addition to the applied aspect of the research, a sample was taken from patients infected with viral hepatitis, and by examining the infected people and using closed and open (nano mildly. and nano ideal mildly) sets, the important symptoms that constitute the core of this dangerous examining the infected people and using closed and open (nano mildly. and nano ideal mildly) sets, the important symptoms that constitute the core of this dangerous disease.
It is a common Knowledge that adverbs in Turkish languages can modify verbs, adjectives, nouns or other adverbs. Moreover, adverbs can determine the meanings of nouns and verbs in a sentence as far as time, place, manner, quantity and interrogative are concerned. The present study debates adverbs’ functions in Namiq Kamal’s play Vatan yahut Silistre.
The study sheds light on the author’s use of the adverbs to describe the required theatrical actions of the play and to convey his reflections and thoughts easily to the auidence. One of the main hindrances encountered in conducting the study is the shortage of the upto date academic resources necessary for
... Show MoreSatire is genre of the literary arts that has always been the source of human interest. Because it is difficult to accept direct criticism, Satire appears as a literary tool in which vices, follies, abuses and shortcomings are held up to ridicule, with the intent of shaming individuals, corporations, government, or society itself into improvement. A satirical critic usually employs irony to attain this goal. Although satire is usually meant to be humorous, its greater purpose is often profitable social criticism, using wit to draw at
... Show MoreUsing the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through tha
... Show MoreThe study seeks to identify e-governance requirements in human resources management, which are (administrative requirements, technical, human, financial, and security) which is a new style differs from the traditional management pattern, where work depends on multiple forms and methods of Tools, (e. g. computers and various electronic software), by relying on powerful information systems that help to make management decisions as quickly and less effortless and less expensive to keep up with the tremendous technological advancements in the field of information and communication technology revolution.
The sample included 132 Person who constitute a position (Director General, assistant Director General, section managers and d
... Show More"The aim of the research is to identify the availability of the dimensions of the research variables represented by organizational symmetry and the quality of work-life at the University of Information and Communications Technology, which is one of the formations of the Ministry of Higher Education and Scientific Research in Baghdad, in addition to knowing the relationship and influence between them. The research relied on the descriptive analytical approach based on peer description. The research was analyzed and the research sample consisted of (148) individuals, the sample was chosen using the comprehensive inventory method, data was obtained by relying on the questionnaire which was prepared from ready-made m
... Show MoreThe utilization of artificial intelligence techniques has garnered significant interest in recent research due to their pivotal role in enhancing the quality of educational offerings. This study investigated the impact of employing artificial intelligence techniques on improving the quality of educational services, as perceived by students enrolled in the College of Pharmacy at the University of Baghdad. The study sample comprised 379 male and female students. A descriptive-analytical approach was used, with a questionnaire as the primary tool for data collection. The findings indicated that the application of artificial intelligence methods was highly effective, and the educational services provided to students were of exceptional quality.
... Show MoreBackground: As photochemical reaction that can stiffen the cornea, CXL is the only promising method of preventing progression of keratectasia such as KC and secondary ectasia following refractive surgery. The aim of CXL is to stabilize the underlying condition with a small chance of visual improvement. Objective: To show the sequences of changes in visual acuity and topographic outcomes during 1 year post CXL for patients with progressive Keratoconus.Type of the study: Cross sectional studyMethods: CXL procedure was done for 45 eyes with progressive KC. The following parameters had been monitored pre operatively, 1, 3, 6 and 12 months postoperatively: K apex, K2, corneal thickness at thinnest location, anterior and posterior elevation po
... Show MoreIn this paper we study the selection of cognitive elements and criteria of the inflectional structure of the Russian and Arabic languages in the process of speech communication. Phonetic-physiological principle is the main parameter by which the elements and criteria of cognitive activity in the presented study are distinguished. On the basis of the above mentioned parameter, we select the investigated criteria and elements. The first criterion is semantic, reflects the accordance of the elements of thinking to sound combinations in the studied languages, and allows us to distinguish the second criterion – morphonological. The second criterion depends on the phonetic changes of these combinations occurring in the process of speech activit
... Show More