Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order to raise community awareness of the dangers of these crimes and their dimensions and manifestations that are still under study and research and digital exploration and statistical especially states that characterized Banglagaha prolonged contact of the world , making it more vulnerable to such crimes characterized by a high degree of organization , precision and uncertainty for large segments of individuals , specifically in the Iraqi society , The importance of this study lies in its search optimization for this phenomenon, and the legacy of a great vacuum in punitive legal aspect to criminalize this type of crime, which requires us a quick review of all laws that seek to curb cyber crime, whether at the international, regional or Arab or national through a modification and change, so in line with the new reality
The consisting of four topics to study in answer focused on some questions including: What are the cyber crimes, and what are the kinds of characteristics, and what are the difficulties that could face means control at the international level and Aarabiy and local, and what are the risks to various private groups in society, the kids category 1. The study has concluded that these crimes notifier great on all members of the community, especially children.
2. It threatens Social Security is not only the local and national community, but that the risks and penetrate beyond the territorial and national and international borders.
3. Azert results that traditional laws and new laws still do not rise to the level of combating this type of crime, and need more studies with to find the kind of coordination and cooperation with various countries to track crimes that carry the trait and the nature of the laws that could criminalize the perpetrators real quest.
4.Azart study that this type of crime suffered material losses and moral expensive process threatens the advancement of society and its development in the long run, particularly with regard to terrorism and the exploitation of children in this type of crime offenses.
The aim of this research is to construct a cognitive behavior program based on the theory of Meichenbaum in reducing the emotional sensitivity among Intermediate school students. To achieve the aims of the research, two hypotheses were formulated and the experimental design with equal groups was chosen. The population of research and its sample are determined. The test of negative emotional sensitivity, which is constructed by the researcher, was adopted. The test contains (20) items proved validity and reliability as a reliable test by presenting it to a group of arbitrators and experts in education and psychology. An educational program is constructed based on the theory of Meichenbaum. The test was applied to a sample of (60) second i
... Show MoreObjective: Determination the effectiveness of educational program on female students’ practices toward premenstrual.
Methodology: A quasi-experimental design study was conducted involving (140) student purposely in four secondary schools at Al-sadder city (70) student for study group and (70) for control group. The prevalence of PMS selected through American College of Obstetricians and Gynecologists (ACOG) (2015) criteria to select PMS students before program. The education program were set in four steps, the first step (pre-test) is to assess the practices, before the implementation of the program, the second step is implementing the program, following two steps post-test I and II betwe
... Show MoreThe aim of the research is to identify the extent of the ability to ensure the integrated reports by the auditor in verifying the credibility of these reports, and their implications for the benefit of all parties dealing with the economic unit, as well as measuring the impact of the assurance procedures followed by the auditors and their role in confirming these reports.
The research methodology was designed after studying the previous literature related to the research variables, and then the relationship between these variables was tested, through the use of a questionnaire list. A questionnaire targeting the community of auditors in the local environment, and the results of the study wer
... Show MoreThe indirect monetary policy tools led to financial stability for the period being studied through the use of indicators of financial stability (aggregate) to show the effect of the foreign reserves of the Central Bank of Iraq and its indirect instruments in achieving financial and economic stability, especially after the significant decline in oil prices and dependence of the Iraqi economy on Oil (rent) and lower reserves of the Central Bank of Iraq after 2014 and now compared to previous years, the goal of this research is to achieve financial stability according to selected indicators and achieve an optimal monetary policy to achieve the development goals of The economic policy in the country. Standard models were used to test
... Show MoreThe dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s
... Show MoreSome responses to ancient grammarians
And contemporary researchers
In monograms
The reaction of 1,5-dimethyl-2-phenyl-1H-pyrazol-3(2H)-one with one equivalent of 4-chlorophenol by coupling reaction afforded (E)-4-((5-chloro-2- hydroxyphenyl)diazenyl)-1,5-dimethyl-2-phenyl-1H-pyrazol-3(2H)-one. Then azo ligand was characterize using spectroscopic studies ( FTIR,UV-Vis, 1H and 13CNMR, Mass) also micro-elemental analysiz (C.H.N.O). Transition metal chelation with Co(II), Ni(II), Cu(II), and Zn(II) was investigated, revealing 1:2 metal-to-ligand stoichiometry with octahedral geometry. The biological, and industrial application for the azo ligand and it is complexes were evaluated, demonstrating antimicrobial activity against bacterial and fungal strains, with the Zn(II) complex exhibiting superior inhibition. Additionally,
... Show MoreVehicular ad hoc network (VANET) is a distinctive form of Mobile Ad hoc Network (MANET) that has attracted increasing research attention recently. The purpose of this study is to comprehensively investigate the elements constituting a VANET system and to address several challenges that have to be overcome to enable a reliable wireless communications within a vehicular environment. Furthermore, the study undertakes a survey of the taxonomy of existing VANET routing protocols, with particular emphasis on the strengths and limitations of these protocols in order to help solve VANET routing issues. Moreover, as mobile users demand constant network access regardless of their location, this study seeks to evaluate various mobility models for vehi
... Show MoreIn this paper, we introduce the concepts of Large-lifting and Large-supplemented modules as a generalization of lifting and supplemented modules. We also give some results and properties of this new kind of modules.