Do you want to publish a course? Click here

Violation of Private Life over Internet

انتهاك حرمة الحياة الخاصة عبر الإنترنت (دراسة مقارنة)

10763   9   296   5.0 ( 1 )
 Publication date 2012
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

Right to privacy is considered one of the closest rights to the human being, and it has been the most controversial right among jurists for a long time. Also the sacredness and saintliness of the private life were preserved in ancient civilizations, heavenly religions, constitutions and legislations in most of the world countries. The concept of privacy is considered a relatively flexible concept, which means that this concept changes among societies, cultures and the cultural heritage of the countries fromone time to another. Probably the advent of computer, the information revolution and the internet gave this right a special momentum; particularly after the wide spread of information banks in the eighties of the last century, which was called the hysteria of the social communication over the internet. This hysteria was spread through websites, chat rooms and social networks where people, whether kids or adults, are putting a lot of personal information, photos and videos on line. This thing constitutes a considerable threat on the sacredness of their private lives from the violation of information, which justifies the legislated interference in many countries all over the world to pass legislations for computers and internet crimes, such as the Syrian legislator. Passing the legislative decree /17/ on 08 February 2012 in regard to organizing the communication over the internet and the internet crimes came in time to respond to the urgent need of reducing the computer and internet crimes. As such, we will highlight what was mentioned in the aforementioned decree which gave importance to the private life in the information domain, when it defined the privacy concept in its first article and dedicated article /23/ to criminalize the violation of the private life over the internet or any information system. We will try to respond to many questions about these crimes and provide some suggestions and recommendations regarding the legislative decree /17/. We hope that it attracts the necessary attention for the sake of avoiding any gaps in this decree. . ...

References used
أحمد فراج حسين: حرمة الحياة الخاصة في الإسلام، مصر، الدار الجامعية، 1988
أسامة عبد الله قايد: الحماية الجنائية للحياة الخاصة وبنوك المعلومات، مصر دار النهضة العربية، 1989
بولين أنطونيوس أيوب: الحماية القانونية للحياة الشخصية في مجال المعلوماتية، لبنان منشورات الحلبي الحقوقية، 2009
rate research

Read More

This study aimed to explore the impact of psychological contract violation on intention to quit among academic staff in private universities in Syria. To achieve these objectives, the researchers constructed a questionnaire consisting of (13) items and distributed the questionnaire to a sample of (127) member of academic staff in Syrian private universities. The statistical analyses point to the following results: - There is a significant impact of violation of the psychological contract on the intention of academic staff to quit private universities in Syria. - There are no significant differences between the academic staff’s perception of violation of psychological contract concerning the variables of (sex, nature of contract, and job status). - There are significant differences between the academic staff’s perception of violation of psychological contract concerning the variables of (age, academic degree, and source of certificate
The present research aims at studying the impact, which the US Occupation of Iraq has left on the children's social life and violation of their rights, through a field research study of a sample of Iraqi Refugee children and their families, curren tly staying in Damascus. The study is divided into five main parts, where the first part deals with the War on Iraq, its threats to children, pointing out the number of the refugees throughout the Syrian Governorates, and explaining the demographic, health and educational conditions of those children. The second part deals with the basic patterns of the research; explaining the importance of the research, its goals, enquiries and the patterned measures adopted, while defining the original community, the research sample, and the method adopted. The third part deals with a number of Arab and Foreign studies, pointing out the position of this research in relation to these studies. As for the fourth part, it brings in an analysis of the US Occupation^ impact on the Iraqi children, who are now refugees in Syria, as the fifth part reviews the basic results reached and all enquiries related.
The process of transfer a speech signal by high confidentially and as quickly as possible through the Internet needs to develop compression and encryption technology for a speech signal, so as, to reduce its size and make it understandable to persons not authorized to listen to. A system was designed to encrypt the voice over Internet Protocol (VoIP) and use compression technique for the purpose of reducing the size of data and send it over the network, (A_law PCM) algorithm was used the to compress audio data. Then algorithms of Triple Data Encryption Standard (TDES) and Advanced. Encryption Standard (AES) were applied. A new encryption algorithm was proposed based in its work on the block cipher encryption system called the Direct and Reverse algorithm, which based on three basic steps, firstly expand the initial key, secondly direct the encryption of each round in one direction, and finally substitute (Bytes) as used in the Compensation Box in AES algorithm by making it moving. In general compression ratio was calculated and it was (50%) and the results of the correlation coefficient for the proposed algorithm was compared with the results of (AES, TDES) algorithms.
There is a need for a standard protocol that provides safe and reliable commands transportation to devices over Internet/ Intranet. Thus, we propose in this paper an Automatic Remote Control Protocol ARCP that helps designers and programmers to es tablish the connection and data transport between circuits/devices over the networks which control them safely and easily. The protocol allows sharing the circuits under control, where they can send or respond to commands over the Internet. We also provide a practical implementations and tests for this protocol using different devices interfaces and controlling then remotely by building a website with an easy and flexibly user interface.
Adaptive Machine Translation purports to dynamically include user feedback to improve translation quality. In a post-editing scenario, user corrections of machine translation output are thus continuously incorporated into translation models, reducing or eliminating repetitive error editing and increasing the usefulness of automated translation. In neural machine translation, this goal may be achieved via online learning approaches, where network parameters are updated based on each new sample. This type of adaptation typically requires higher learning rates, which can affect the quality of the models over time. Alternatively, less aggressive online learning setups may preserve model stability, at the cost of reduced adaptation to user-generated corrections. In this work, we evaluate different online learning configurations over time, measuring their impact on user-generated samples, as well as separate in-domain and out-of-domain datasets. Results in two different domains indicate that mixed approaches combining online learning with periodic batch fine-tuning might be needed to balance the benefits of online learning with model stability.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا