شكلت التطورات التكنولوجية في وسائل التواصل الاجتماعي الناجمة عن العولمة معلم رئيسي في تحولات التنظيمات الإرهابية، وإنتاج انماط جديدة من الإرهابيين والمتطرفين القادرين على التفاعل مع الثورة المعلوماتية والاتصالية. ان معظم الجرائم الإرهابية الإلكترونية مرتبطة بالإنترنت وهو المسرح المفضل للمتطرفين فالأول يقتل والثاني يسوغ ويحرض ويجند، والذي جعل الإنترنت وسيلة فعالة كونها سهلة الاستخدام وسريعة الوصول إلى الجمهور ورخيصة الثمن وساحة حرة بلا رقيب على ما يكتب ويشاهد. وعلى الرغم من أن الإرهاب الإلكتروني يعد واحداً من التهديدات الكبيرة لأمن المجتمع الدولي إلا ان التشريعات القانونية الدولية لمواجهته تعتمد على الإطار القانوني لمواجهة الإرهاب والجرائم التكنولوجية عموماً. ولا يوجد موقف دولي واضح ولا ضوابط او سوابق قانونية يمكن الاستناد إليها، أو حتى أتفاقية دولية واضحة شاملة حول الأمن الإلكتروني لتجريم المتطرفين والإرهابيين مستخدمي وسائل التواصل الأجتماعي .
Crime has become a phenomenon associated with human socialization. Wherever human groups are found, a crime, which differs from one society to another, is found. It is one of the most dangerous social issues that undermines the solidarity of a given society. This is because it establishes a takeoff from community's norms, values, customs and traditions, and thus turns into a danger to the lives of people, groups and society that threatens its strength and security. The paper focuses on the crimes that violate the social law, like child rape, incest and electronic extortion, which are increasing in size, increasing as a result their repercussions on the human society. The study seeks several objectives, including: examining the natu
... Show MoreThe study aims to design an electronic puppet educational theater by Camtasia studio and identify the effectiveness in learning some of the artistic gymnastics skills for first grade, the research curriculum is experimental by designing two equal groups, and the research sample first grade students are distributed among 4 grade, and by the pumpkin determines two divisions (15 from each) representing the experimental group and control group, the main experiment conducted for 8 weeks by two educational units per week after which the post-tests were conducted, SPSS was used to process the results, and it was found that the electronic puppet educational theater contributed by making the learning process enjoyable and interesting and meeting the
... Show MoreAbstract
The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program
... Show MoreThe owner and possessor may meet in one person, thus who have these property they have its fruit. But in sometimes the owner is different than possessor, this happen in case the original owner succeeds in recovering his property or right. About that the legislations differed on the determination the person who deserves the fruits and whether the possessor is bona fide or mala fide. This paper is focused on the idea of the excluded from the rule of possession of the thing. And the applications of the rule (acquisition by possession) that belong to modern Roman law also the standpoint of Iraqi law.
The importance of international treaties reside at the present time in regulating a several issues within the internal scope of the state, and that after it was monopolized by the internal legal system of the latter, besides this the three authorities of the state assume the task of implementing the obligations imposed by international treaties on the states party to them.
Therefore, we will expose in this study the mechanism used by the Iraqi state in incorporation the international obligations into the Iraqi internal legal system under the successive constitutions from the establishment of the Iraqi state until the issuance of the constitution (2005) in effect, as Iraq fol
... Show MoreEnglish law defines different types of fraud, and we do not find a counterpart in other legislations, relying on its distinction on the criterion of knowledge of the truth of the information presented, that is, determining the type of fraud depends on the extent of the owner of false evidence that it is not correct at the time of its issuance. These false statements are either issued from Accompanying the owner with his full knowledge of its content and in a way that makes it a presumption that proves his bad intention so that fraud is not innocent, or that it is issued by indiscretion and negligence and without a reasonable and logical basis on which it is based, then fraud is negligently, and finally that this data is issued by its own
... Show MoreSince the law is the tool for implementing the state’s public policies, it is natural that its provisions (or at least some of them) seek to preserve human dignity as the source on which all rights and freedoms are based. One of the examples of humanizing the provisions of the law in France is what is known as the winter truce. What is this truce, what are the justifications for granting it, what is its historical origin, how did the legislative treatment of it develop, what are the similarities and differences between it and other legal periods included in French law, what is the scope of its application, and what are the effects resulting from it. These questions and others are what we will try to answer through this research.
Piracy on phonograms is now, rightly, the crime of the electronic age. Despite the protection sought by States to provide for such registrations, whether at the level of national legislation or international agreements and conventions, but piracy has been and continues to pose a significant threat to the rights of the producers of those recordings, especially as it is a profitable way for hackers to get a lot of money in a way Illegal, which is contrary to the rules of legitimate competition. Hence, this research highlights the legal protection of producers of phonograms in light of the Iraqi Copyright Protection Act No. (3) of 1971, as amended.
The research aims to know The Effect Of Flexible Grouping Strategy and Three Step Interview strategy on achievement of the history material among student of the first literary class, The Researcher used the experimental design of the two experimental groups and the control group and with post test, researcher group (a) represent the experimental group taught according the Flexible Grouping Strategy , and Division (c) to represent the second experimental group which studied according Three Step Interview strategy and Division (b ) to represent the control group taught in the traditional method, the number of students (99) students of (33) female students in each division. T
... Show MoreBackground: The diagnosis of interstitial lung disease (ILD) is frequently delayed, because clinical clues are neglected and respiratory symptoms are ascribed to more common pulmonary diagnosis such as asthma and chronic obstructive pulmonary disease in the primary care setting.
Objective: To evaluate the diagnostic yield of open lung biopsy in patients with suspected ILD in relation to clinical and radiological features.
Patients and methods: Thirty-five patients were admitted with suspected interstitial lung disease (ILD), and scheduled for open lung biopsy (OLB) in Ghazi AL-Hariri hospital for surgical specialty, were included in this study. Data collected from the patient's files (who were subjected to open lung biopsies which