يُعد التنمر ظاهرة إجتماعية قديمة موجودة في جميع المجتمعات سواء أكان المجتمع صناعيًا أم ناميًا، كما يُعد من المفاهيم الحديثة نسبيًا، وربما يرجع لحداثة الإعتراف به نوعًا من أنواع العنف فضلاعن ندرة الدراسات التي تناولته وعدم وجود معيار محدد لتحديد السلوك الذي يعد تنمرًا أم عابرًا، لقد بدأ الأهتمام بدراسة التنمر في سبعينات القرن الماضي وأصبح موضعًا يحضى بأهتمام العديد في مختلف البلدان، وفي عصرنا الحالي تطورت الظاهرة الإجرامية تطورًا ملحوظًا سواء في أسلوب إرتكابها أو مرتكبيها وكل ذلك يرجع إلى التقدم السريع في ثورة المعلومات والإتصالات، فظهرتْ الجرائم الإلكترونية ومنها جريمة التنمر الإلكتروني، وفي نطاق الجريمة الإلكترونية، أختلف الفقه والقضاء في تحديد مسؤولية مزود خدمة الإنترنت وفقًاً لطبعية عمله المتمثل بمدى الرقابة التي يقوم بها على المحتويات غير المشروعة التي تتم عبر الخدمة التي يقدمها في الجرائم الإلكترونية ومنها جريمة التنمر الإلكتروني Bullying is considered an ancient social phenomenon that has existed in all societies for a long time, whether the society was industrialized or developing. Recently, bullying was recognized as a form of violence. Additionally, the interest in studying bullying began in the seventies of the last century and became a topic of interest in many countries around the world. nowadays, the criminal phenomenon has developed remarkably, both in the way it is committed or its perpetrators, and all this is due to the rapid progress In the information and communication revolution, cybercrimes appeared, including the cyber-bullying crime In addition, Jurisprudence and the judiciary have differed in determining responsibility of the internet service provider according to the nature of its work, which is the extent of control it performs on the illegal content that is carried out through the service it provides in cybercrime, including the cyberbullying crime. Le harcèlement est un phénomène social ancien présent dans toutes les sociétés, qu'elles soient industrielles ou en développement. Il est également considéré comme un concept relativement moderne en raison de sa reconnaissance récente en tant que forme de violence, ainsi que de la rareté des études qui l'ont abordé et de l'absence du critère spécifique pour déterminer quel comportement est considéré comme du harcèlement ou toléré. L'intérêt, pour l'étude du harcèlement a commencé dans les années 70 du siècle dernier et est devenu un sujet d'intérêt pour de nombreuses personnes dans différents pays. De nos jours, le phénomène criminel s'est sensiblement développé, que ce soit dans sa manière de se produire ou chez ses auteurs, et cela est dû aux progrès rapides de la révolution de l'information et de la communication. Les crimes électroniques, y compris le harcèlement électronique, ont émergé dans le cadre de la cybercriminalité. Dans ce contexte, les juges et les autorités judiciaires ont divergé dans l'établissement de la responsabilité du fournisseur d'accès internet en fonction de la nature de son travail, qui consiste en l'étendue de son contrôle sur les contenus illégaux qui se produisent par le biais du service qu'il fournit dans les crimes électroniques, y compris le harcèlement électronique.
Cumhuriyet Üniversitesi Fen-Edebiyat Fakültesi Sosyal Bilimler Dergisi | Volume: 48 Issue: 2
The grey system model GM(1,1) is the model of the prediction of the time series and the basis of the grey theory. This research presents the methods for estimating parameters of the grey model GM(1,1) is the accumulative method (ACC), the exponential method (EXP), modified exponential method (Mod EXP) and the Particle Swarm Optimization method (PSO). These methods were compared based on the Mean square error (MSE) and the Mean Absolute percentage error (MAPE) as a basis comparator and the simulation method was adopted for the best of the four methods, The best method was obtained and then applied to real data. This data represents the consumption rate of two types of oils a heavy fuel (HFO) and diesel fuel (D.O) and the use of tests to conf
... Show MoreThis current research aims to reveal the difference between the levels of teaching expertise of physics teachers according to the years of service by answering the following question: does the educational skill level of physics teachers work according to the service? The sample of the study consisted of (225) physics teachers by (125) females (56%), and (100) males (44%), distributed on (4) education directorates in Baghdad governorate on both sides of al-Karkh and al-Rusafa. In order to achieve the aim of the study, the researcher prepared a note card for expertise teaching, consisting of (39) paragraphs distributed into (5) fields. The apparent validity and reliability of the card were verified through an agreement (the researcher hers
... Show MoreAbstract
This research aims to improve the provided health service level inside Baghdad hospitals and the Yarmouk educational, as well as to shed light on the reality of the health service and the quality within the major operations room in both hospitals, as the operations room represent the research community, as was the use of some quality tools Pareto and Ishikawa diagram to measure and assess the level of quality provided, and include research problem to find out what are the problems and obstacles facing the process of improving quality in both hospitals, and whether there are scientifically accurate method to assess the quality of health service in Baghdad's Yarmouk hospital and educational . Where the researcher h
... Show MoreDirectional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show More11-22 Description An apology may be defined as “the act of declaring one’s regret, remorse or sorrow for having insulted, failed, injured, harmed or wronged another (Internet Encyclopedia of Philosophy IEP). A definition quite interested in the function suggests that “an apology is a speech act addressed to B’s face–needs and intended to remedy an offence for which A. takes responsibility.”(Holmes, 1990: 159). Apologies are also" speech acts" that are hard to identify, define or categorize, a difficulty that arises directly out of the functions they perform (Lakoff, 2001: 201) and the forms they take. In function, they range from selfabasement for wrongdoing to the formal display of appropriate feeling. In form, they range from
... Show MoreThis research investigates the type and the significant relationship between roaming management and self-efficacy and its impact on excellence in providing hotel service. To achieve this, the applied approach was adopted through A questionnaire was designed and developed for the collected data. It has consisted of three parts. The firsts section included nine questions to measure the dimensions of management by roaming. The second section includes nine questions to measure the effectiveness of the two employees. The last section includes 12 questions to measure the excellence of the hotel service. The research sample included 43 employees' responding to this
... Show MoreIn order to advance the education process and raise the educational level of the players, it became necessary to introduce new educational aids, programmed education in the education process, through which the basic skills to be learned are explained and clarified, and immediate feedback is provided that would enhance the information of the learner, and Reaching the goal to be achieved, taking into account the individual differences between the players, and thus it is possible to move away from the educational methods used in learning skills, which requires great effort and time, in addition to that the open playground may not perform the skill accurately and the player looks from one side, while when using the computer you look from severa
... Show MoreFuture wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for ser
... Show MoreCette recherche étudie les structures composant Barbara, un poème de Jacques Prévert pour mettre en valeur la particularité de ce langage. Nous avons d'abord, dissocié ces structures, en : structure thématique, actancielle, syntaxico-énonciative, sémantique, formelle et finalement spacio-temporelle en vue de les analyser minutieusement. Le poète a adopté pour les thèmes : souvenir, nostalgie et guerre, un langage simple et une syntaxe incomplexe. L'usage du lexique et des figures de style célèbrent ces thèmes. La forme, la versification et la sonorité approfondissent ces images et renforcent ce langage. Ce poème dépend des phrases simples et variées : affirmative, interrogative, exclamative qui s'orientent vers des acte
... Show More