Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order to raise community awareness of the dangers of these crimes and their dimensions and manifestations that are still under study and research and digital exploration and statistical especially states that characterized Banglagaha prolonged contact of the world , making it more vulnerable to such crimes characterized by a high degree of organization , precision and uncertainty for large segments of individuals , specifically in the Iraqi society , The importance of this study lies in its search optimization for this phenomenon, and the legacy of a great vacuum in punitive legal aspect to criminalize this type of crime, which requires us a quick review of all laws that seek to curb cyber crime, whether at the international, regional or Arab or national through a modification and change, so in line with the new reality
The consisting of four topics to study in answer focused on some questions including: What are the cyber crimes, and what are the kinds of characteristics, and what are the difficulties that could face means control at the international level and Aarabiy and local, and what are the risks to various private groups in society, the kids category 1. The study has concluded that these crimes notifier great on all members of the community, especially children.
2. It threatens Social Security is not only the local and national community, but that the risks and penetrate beyond the territorial and national and international borders.
3. Azert results that traditional laws and new laws still do not rise to the level of combating this type of crime, and need more studies with to find the kind of coordination and cooperation with various countries to track crimes that carry the trait and the nature of the laws that could criminalize the perpetrators real quest.
4.Azart study that this type of crime suffered material losses and moral expensive process threatens the advancement of society and its development in the long run, particularly with regard to terrorism and the exploitation of children in this type of crime offenses.
The research dealt with the effectiveness of prediction and foresight in design as a phenomenon that plays a role in the recipient's engagement with the design, as it shows the interaction between the recipient and the interior space. The designer is keen to diversify his formal vocabulary in a way that secures visual values that call for aesthetic integration, as well as securing mental and kinetic behavioral understanding in the interior space.
As the designer deals with a three-dimensional space that carries many visual scenes, the designer should not leave anything from it without standing on it with study and investigation, and puts the user as a basic goal as he provides interpretive data through prediction and foresight that le
This article discusses the peculiarities of the Arabic root, its phonemic structure, and morphological categorization. The pure appearance of the Arabic root in language categorization allows you to separate the onomatopoeic feature of inflectional structure and phonetic rules of the Arabic language by which the root is categorized. This phenomenon of meaningful consonant phonemes in the Arabic roots makes the theory of onomatopoeia practicable not just only in Arabic but also in other Semitic languages. Moreover, the first consonant of an Arabic root usually contains the word's primary, essential meaning, and the second and third lookup. Also, in this work, it is noted that the grammar of the Arabic language has many features aimed
... Show MoreDifferent Arabic and Islamic societies are free of evil instincts. Therefore, certain provisions of legitimacy came to stress the importance of the intentions of sharia to achieve the interests of all people that involve several aspects, including the five fundamental things: religion, oneself, offspring, mind and money. Almighty Allah has specified certain punishments on those who violate these things by imposing punishments on the part of the criminal to preserve souls. He imposes the penalty of theft to preserve property, the Hadd punishment for adultery to preserve the symptoms, the punishment on the drunk to preserve the mind, and the Hadd punishment for the apostate to preserve the religion. By the adherence to these punishments li
... Show MoreThe fabrication of Solid and Hollow silver nanoparticles (Ag NPs) has been achieved and their characterization was performed using transmission electron microscopy (TEM), zeta potential, UV–VIS spectroscopy, and X-ray diffraction (XRD). A TEM image revealed a quasispherical form for both Solid and Hollow Ag NPs. The measurement of surface charge revealed that although Hollow Ag NPs have a zeta potential of -43 mV, Solid Ag NPs have a zeta potential of -33 mV. According to UV-VIS spectroscopy measurement Solid and Hollow Ag NPs both showed absorption peaks at wavelengths of 436 nm and 412 nm, respectively. XRD pattern demonstrates that the samples' crystal structure is cubic, similar to that of the bulk materials, with
... Show MoreD-mannose sugar was used to prepare [benzoic acid 6-formyl-2, 2-dimethyl-tetrahydrofuro [3, 4-d][1, 3] dioxol-4-yl ester](compound A). The condensation reaction of folic acid with (compound A) resulted in the formation of new ligand [L]. These compounds were characterized by elemental analysis CHN, atomic absorption AA,(FT-IR),(UV-Vis), TLC, ES mass (for electrospray), molar conductance, and melting point. The new tetradentate ligand [L], reacted with two moles of some selected metal ions and two moles of (2-aminophenol),(metal: ligand: 2-aminophenol) at reflux in water medium to give a series of new complexes of the general formula K2 [M2 (L)(HA) 2] where M= Co (II), Ni (II), Cu (II) and Cd (II). These complexes were characterized by eleme
... Show MoreIn his life, a person engages in different types of verbal and actual dispositions that result in various effects, some of which are necessary and not valid, such as selling, and some are not necessary for one of the two contracting parties, such as a mortgage or both, such as lending and agency. However, there are some actions that are sometimes necessary and not necessary at other times, such as a gift that indicates in its simplest sense. Owning money for another without compensation, it is one of the doors of benevolence and benevolence, and it is one of the attributes of perfection with which God, may He be glorified and exalted be He, described Himself. - And if this analogy is the difference - and distanced himself from greed, the
... Show MoreD-mannose sugar was used to prepare [benzoic acid 6-formyl-2,2-dimethyl-tetrahydrofuro[3,4-d][1,3]dioxol-4-yl ester] (compound A). The condensation reaction of folic acid with (compound A) resulted in the formation of new ligand [L]. These compounds were characterized by elemental analysis CHN, atomic absorption A.A, (FT-I.R.), (U.V.-Vis), TLC, E.S. mass (for electrospray), molar conductance, and melting point. The new tetradentate ligand [L], reacted with two moles of some selected metal ions and two moles of (2-aminophenol), (metal : ligand : 2-aminophenol) at reflux in water medium to give a series of new complexes of the general formula K2[M2(L)(HA)2] where M= Co(II), Ni(II), Cu(II) and Cd(II). These complexes were characterized by elem
... Show MoreCommunicative-based textbooks are developed and disseminated throughout the country.
However, it is difficult for teachers who themselves have learnt English through the traditional
approaches to suddenly be familiar with CLT (Communicative Language Teaching) principles
and teach communicatively. Therefore, many teachers remain somewhat confused about what
exactly CLT is and others familiar with CLT but unable to achieve communicative classroom
teaching. Consequently, those teachers need to be introduced to the CLT principles and they need
training in how to put CLT principles into practice. Accordingly, this study aims to find out the
effect of combining video lectures and Kolb experiential learning on EFL student-t
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More