يُعد التنمر ظاهرة إجتماعية قديمة موجودة في جميع المجتمعات سواء أكان المجتمع صناعيًا أم ناميًا، كما يُعد من المفاهيم الحديثة نسبيًا، وربما يرجع لحداثة الإعتراف به نوعًا من أنواع العنف فضلاعن ندرة الدراسات التي تناولته وعدم وجود معيار محدد لتحديد السلوك الذي يعد تنمرًا أم عابرًا، لقد بدأ الأهتمام بدراسة التنمر في سبعينات القرن الماضي وأصبح موضعًا يحضى بأهتمام العديد في مختلف البلدان، وفي عصرنا الحالي تطورت الظاهرة الإجرامية تطورًا ملحوظًا سواء في أسلوب إرتكابها أو مرتكبيها وكل ذلك يرجع إلى التقدم السريع في ثورة المعلومات والإتصالات، فظهرتْ الجرائم الإلكترونية ومنها جريمة التنمر الإلكتروني، وفي نطاق الجريمة الإلكترونية، أختلف الفقه والقضاء في تحديد مسؤولية مزود خدمة الإنترنت وفقًاً لطبعية عمله المتمثل بمدى الرقابة التي يقوم بها على المحتويات غير المشروعة التي تتم عبر الخدمة التي يقدمها في الجرائم الإلكترونية ومنها جريمة التنمر الإلكتروني Bullying is considered an ancient social phenomenon that has existed in all societies for a long time, whether the society was industrialized or developing. Recently, bullying was recognized as a form of violence. Additionally, the interest in studying bullying began in the seventies of the last century and became a topic of interest in many countries around the world. nowadays, the criminal phenomenon has developed remarkably, both in the way it is committed or its perpetrators, and all this is due to the rapid progress In the information and communication revolution, cybercrimes appeared, including the cyber-bullying crime In addition, Jurisprudence and the judiciary have differed in determining responsibility of the internet service provider according to the nature of its work, which is the extent of control it performs on the illegal content that is carried out through the service it provides in cybercrime, including the cyberbullying crime. Le harcèlement est un phénomène social ancien présent dans toutes les sociétés, qu'elles soient industrielles ou en développement. Il est également considéré comme un concept relativement moderne en raison de sa reconnaissance récente en tant que forme de violence, ainsi que de la rareté des études qui l'ont abordé et de l'absence du critère spécifique pour déterminer quel comportement est considéré comme du harcèlement ou toléré. L'intérêt, pour l'étude du harcèlement a commencé dans les années 70 du siècle dernier et est devenu un sujet d'intérêt pour de nombreuses personnes dans différents pays. De nos jours, le phénomène criminel s'est sensiblement développé, que ce soit dans sa manière de se produire ou chez ses auteurs, et cela est dû aux progrès rapides de la révolution de l'information et de la communication. Les crimes électroniques, y compris le harcèlement électronique, ont émergé dans le cadre de la cybercriminalité. Dans ce contexte, les juges et les autorités judiciaires ont divergé dans l'établissement de la responsabilité du fournisseur d'accès internet en fonction de la nature de son travail, qui consiste en l'étendue de son contrôle sur les contenus illégaux qui se produisent par le biais du service qu'il fournit dans les crimes électroniques, y compris le harcèlement électronique.
One of the main techniques to achieve phase behavior calculations of reservoir fluids is the equation of state. Soave - Redlich - Kwong equation of state can then be used to predict the phase behavior of the petroleum fluids by treating it as a multi-components system of pure and pseudo-components. The use of Soave – Redlich – Kwon equation of state is popular in the calculations of petroleum engineering therefore many researchers used it to perform phase behavior analysis for reservoir fluids (Wang and Orr (2000), Ertekin and Obut (2003), Hasan (2004) and Haghtalab (2011))
This paper presents a new flash model for reservoir fluids in gas – oil se
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of Messengers, and upon his family and companions
And whoever follows his guidance until the Day of Judgment. As for what follows: Islamic law commands Muslims to unite, reject disagreement, and not dispute, and to spread the spirit of tolerance and love among them. God Almighty said: “And hold fast to the rope of God all of you and do not become divided, and remember the favor of God upon you when you are enemies and He has joined your hearts.” So, by His grace, you became brothers (1), and He said: (And You will be like those who became divided and disagreed after the clear proofs had come to them. It is they - for them is a great punishment.) (2
... Show MoreThis paper introduces a generalization sequence of positive and linear operators of integral type based on two parameters to improve the order of approximation. First, the simultaneous approximation is studied and a Voronovskaja-type asymptotic formula is introduced. Next, an error of the estimation in the simultaneous approximation is found. Finally, a numerical example to approximate a test function and its first derivative of this function is given for some values of the parameters.
Abstract
It considers training programs is an important process contributing to provide employees with the skills required to do their jobs efficiently and effectively, so it should be concerned with and the focus of all government our organizations, and perhaps the most important reasons that I was invited to select the subject (evaluation of training programs directed toward the diagnosis of the phenomenon of financial and administrative corruption) It is the importance of those programs working in the regulatory institutions General and the Office of Inspector General of Finance and the Ministry particularly for employees because of their role in the development of their skills and their experience and their beha
... Show MoreRate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal. The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in
... Show Moreתקציר
ביטויי אהבה ושנאה קבלה בההגדרות שונות, לפעמים ביניהם לבין עצמם והסכימו בזמנים אחרים מהבחינה הדתית נתפסה לאהוב ביטויים ושנאה במונחים של טוב ורע, או במונחים של חלאל וחראם למעשה, הרגשות של אהבה ושנאה הם רגשות אנושיים המקושרים לאמונות של חברות אנושיות הבנויות על העמדה של דתות מכל נושא או מקרה , דבר אשר אהוב על ידי הקדושים והכמורה יהיה חלאל, וכל מה שהם שונאים יהיה חראם במילים אח
... Show MoreShmuel Yosef Agnon, a well-known Jewish writer, wrote many literary works, including poetry, story, etc. In the field of story, this writer used two areas: the first: a simple exterior, and the second: an inner full of secrets and mysteries. This area is common when Agnon is affected by his symbolic method of purpose. In his productions, we find the political and historical significance embodied in his characters, where there is almost no story without it.
Agnon and all his productions gave the character a large area, Agnon’s characters often play the center and cornerstone in those productions, where the author dealt deeply and stated the fines details of the external and internal of that ch
... Show MoreThe focus of this research lies in the definition of an important aspect of financial development, which is reflected on the alleviation of poverty in Iraq, namely financial inclusion and then taking the path of achieving a sustainable economy, certainly after reviewing one of the important international experiences in this regard and finally measuring the level of financial inclusion in Iraq and its impact on poverty reduction through the absolute poverty line indicator.
The aim of the research to apply TD-ABC technology to determine the idle capacity of the central oil companies (oil field east of Baghdad), as a modern cost management technology based on time-oriented activities (TD-ABC) is used by industrial companies in general and oil companies on In particular to build a sustainable Calvinist pillar and make future decisions by identifying idle energy to gain it a competitive advantage, the descriptive analytical approach has been adopted in calculating and analyzing the company’s data for 2018, and the most prominent conclusions of this research are managing idle energy and the task of applying cost technology on the basis of time-oriented activities and providing Convenient spatial infor
... Show MoreLet R be commutative Ring , and let T be unitary left .In this paper ,WAPP-quasi prime submodules are introduced as new generalization of Weakly quasi prime submodules , where proper submodule C of an R-module T is called WAPP –quasi prime submodule of T, if whenever 0≠rstϵC, for r, s ϵR , t ϵT, implies that either r tϵ C +soc or s tϵC +soc .Many examples of characterizations and basic properties are given . Furthermore several characterizations of WAPP-quasi prime submodules in the class of multiplication modules are established.