Social Dimensions of Cyber Extortion in Social Media;An empirical Study in Karbala Governorate

Authors

  • Ali Jawad Witwit College of Arts , Dept. of Sociology, Al-Qadisiyah University Author
  • Ahmed Ali Marzouk College of Arts , Dept. of Sociology, Al-Qadisiyah University Author

DOI:

https://doi.org/10.61841/hfe62j50

Keywords:

Social Dimensions of Cyber Extortion, Social Media, An empirical Study in Karbala Governorate

Abstract

The use of social networking websites is spreading at a breakneck speed across the world; this is supported by the wide spread of modern technologies (smart mobile devices, tablets, iPods, laptops, etc.) and their various applications that enabled individuals to get to know and communicate with capabilities that humans had previously not reached. This has enabled all members of society and all age groups, especially girls and women, in countries of the Middle East, including Iraq; it has allowed the spread of new social values and customs, some of which might contradict the values of the conservative societies to which our young men and women belong. Arab and Islamic societies are conservative societies; however, some men and women users of these devices did not care about that; they did not take into account the social boundaries, customs, traditions, and provisions that define and control their behavior, on the one hand. On the other hand, this expansion in the use of modern communication, and the associated social media, the spread of cybercrime in general and electronic blackmail in particular, devices, whether this cyber extortion is emotional or material, entangled in the traps of perpetrators or cybercriminals, young men and women are victims bound by fear, confusion and isolation, especially in light of the openness that society is witnessing in the midst of what we are witnessing of the expansion of social networking sites and the creation of more of these smart names in a successive way, as the development of modern technology and the dissemination of personal data are the most important factors falling into the trap of electronic extortion, so the main question of research revolves around the following:

What are the social dimensions of the crime of cyberextortion?

However, several questions arise from the main question, including: What is meant by (extortion)? What exactly is cyberextortion? Is cyberextortion a crime? What is meant by electronic crimes in general? What are the pillars of the crime of cyberextortion? What are its motives? What are the types of electronic extortion crimes, and what are their means? What are its visible effects? Is society affected by these crimes? What is the social group most affected by these crimes? These and other questions that the researcher will try to answer in the course of his study. 

Downloads

Download data is not yet available.

References

1. Ibrahim Madhkour Ibrahim Madkour: Dictionary of Social Sciences, 1st Edition, Egyptian Book Authority, Cairo 1975.

2. Blackmail seminar research (meaning, causes, treatment) papers of participants in the symposium, prepared by the Research Center for Women Studies in cooperation with the Department of Islamic Culture at King Saud University, 1st Edition.

3. Look at: The Impact of Social Networks on Audiences of Recipients, by Muhammad Al-Mansour, The Arab Academy in Denmark, MA Thesis in Media and Communication, 2012.

4. Look at: New media (social networks) by the professor. Ali Khalil Shakra, Osama House for Publishing and Distribution, Jordan, First Edition: 2114 AD.

5. Abdullah Mamdouh: The Role of Communication Networks in Political Change, PhD Thesis, Middle East University, 2012.

6. Amina Adel Suleiman Al-Sayed, Heba Muhammad Khalifa Abdel-Aali: Social Networks and their Impact on the Library Specialist, A Comprehensive Study of the Presence and Use of Facebook, Dr. Shawki Salem Library, Helwan University 2009.

7. Khaled Khalfan Mansouri, and others, A knowledge overview on social networks, Research and Studies Center at Dubai Police Academy, 2013.

8. Ali Milad Bin Rahuma, Electronic Sociology, Negative Knowledge of Knowledge, The National Council for Culture, Literature, and Arts, Kuwait, 2002.

9. Helmy Khader Sari, Social Media, House of Treasures Knowledge, Amman, 2013.

10. Na`im Faisal, University Students' Uses of Social Media, Yarmouk University, 2011.

11. Nasser Muhammad Al-Buqami, Combating Information Crimes and Their Applications in the Countries of the Cooperation Council for the Arab Gulf States, Abu Dhabi, Emirates Center for Strategic Studies and Research, 2008.

12. Yunus Arab, Computer and Internet Crimes, a paper submitted to the Arab Security Conference for Research and Studies, Abu Dhabi, 2002.

13. Ali Shweil Al-Qarni, New Media, King Saud University Press, Riyadh, 2013.

14. Muhammad Ali Al-Erian, Information Crimes, New University House for Publishing and Distribution, Alexandria, 2004.

15. Rami Ahmad Al-Ghalibi: The crime of electronic extortion and mechanisms to combat it in the Republic of Iraq, second edition, Directorate of Relations and Information, 2019. When visiting some security agencies, as well as investigation courts in Karbala, to closely examine the mechanisms of dealing with the crime of extortion, it became clear that most of the articles that are judged against abusers of social media are (330, 333, 343) of the Iraqi Penal Code (111). For the year 1969, and the reason is due to the absence of legislation and an enforceable law related to Internet and information crimes. Date of visit: 01/27/2020.

16. Rashad Khaled Omar: Legal and Technical Problems for Investigating Information Crimes, Hadith University Office, 2013

17. Ali Hussein Khalaf and Sultan Abdul Qadir al-Shawi, General Principles in the Penal Code, Law Library, Baghdad, 1982.

18. Mahmoud Naguib Hosni: Explanation of the Penal Code, General Section, 3rd Edition, Dar Al-Nahda Al-Arabiya, 1973.

19. Abbas Moneim Salih: Criminal Protection for Internal State Security, Master Thesis, Al-Mustansiriya University College of Law, 2012.

20. Al-Mutairi, Sami Marzouq Naja, Criminal Responsibility for Electronic Blackmail in the Saudi System, Master Thesis, Naif Arab University for Security Sciences, Riyadh, 2015.

21. Article No. (2/3) of the Saudi Anti-Cyber Crime Law issued by the Council of Ministers No. 79 on 3/7/1428 AH, and Article No. 9 of the UAE Federal Law to Combat Cybercrime No. 5 of 2012.

22. Juvenile Care Law No. 76 of 1983.

23. Mohsen, Sinai Abdullah: Legislative Confrontation of Computer-Related Crimes in Light of International and National Legislations, Proceedings of the Regional Symposium on Internet-Related Crimes, Publications of the United Nations Program to Promote the Rule of Law in Some Arab Countries, Kingdom of Morocco, 2015.

24. Al-Musnad, Saleh bin Muhammad, Al-Muhaini, Abdul Rahman bin Rashid: Computer Crimes: The Real Danger in the Information Age, Arab Journal of Security Studies and Training, Volume 15, Issue 29, Riyadh, 2015.

25. Article No. 2 of the Saudi Labor Law issued by Royal Decree No. (M/51) dated 8/23/1426.

26.Al-Zuraik, Khalifa bin Ali bin Muhammad: Blackmail and Punishment of Juveniles in the Saudi System (An Empirical Comparative and Applied Study), Master Thesis, Naif Arab University for Security Sciences, Riyadh, 2015

27. Noura bint Abdullah bint Muhammad al-Mutlaq: Blackmailing girls with rules and punishment for Islam, Imam Muhammad bin Saud Islamic University.

28. Suzanne Forward: Emotional Blackmail, 1st Edition, Jarir Bookstore, Saudi Arabia, 2015.

29. The Absolute One, Noura bint Abdullah bin Muhammad: Blackmailing girls with its rulings and punishment in Islamic jurisprudence, Imam Muhammad bin Saud Islamic University, Riyadh, without a year.

30. Hisham bin Abdulaziz Al-Hamidi: The Role of the Commission for the Promotion of Virtue and the Prevention of Vice in Reducing the Crimes of Extortion against Girls in the Kingdom of Saudi Arabia, Master Thesis, Riyadh, 2011.

31. Turki bin Abdul Rahman Al-Mushair: Building a Security Model for Combating Information Crimes and Measuring Effectiveness, Master Thesis, Naif Arab University for Security Sciences, Riyadh, 2009. • The Trojan horse program was initially designed for a useful purpose: to know what children do on the computer in the absence of parents or to know what the employees do in the absence of the manager, but the development within

This program is so that it becomes possible to access the user's password by entering the device, which is used by the owner of the device himself, so the owner of the device cannot notice the presence of an intruder on his device.

32. Saidani Naim: Research and Investigation Mechanisms for Information Crime in Algerian Law, Master Thesis, El Hadj Khadr-Batna Rabbania University, Faculty of Law and Political Science, 2012, 2013.

33. Mamoun Naim: Face to Face: Hackers No Masks, First Edition, Al-Sha`a for Publishing and Media, DT, Syria.

34. Muhammad Al-Kaabi: Crimes Arising from Using the Internet, Dar Al-Nahda Al-Arabiya for Publishing and Distribution, 2009.

35. Abdul Aziz bin Hamin, Researcher Center for Women's Studies, in cooperation with the Department of Islamic Culture and I-1, King Saud University, and researchers at the Blackmail Seminar (Concept, Causes, and Effects) 2011.

36. Riyadh Al-Haidan Muhammad Al-Masmiri: Mixing between the Sexes: Its Provisions and Effects, Kingdom of Saudi Arabia, Riyadh, Dar Al-Jawzi, 2009, p.153

37. Muhammad Bin Saleh Bin Masoud Al-Omairah, Criminalization of Women Blackmail: An Empirical Study, Unpublished Research, Prince Nayef Arab University for Security Sciences, 2012.

38. Fahd Muhammad Shaqqa: National Security: A Comprehensive Vision, Naif Arab University for Security Sciences, Riyadh, 2003.

39. Muhammad Shafiq: Scientific Research, Methodological Steps for Preparing Social Research, Modern University Office, Alexandria, 1998.

40. Talat Ibrahim Lotfi and Kamal Abdel-Hamid Al-Zayyat: The Contemporary Theory in Sociology, Dar Gharib, Cairo, 2005.

41. Morris Ingres: Methodology of Scientific Research in the Humanities, translated by Bouzid Sahraoui and others, Dar El Kasbah, 2nd Edition, Algeria, 2006.

42. Abdel-Ghani Emad, Research Methodology in Sociology, Problems, Techniques, and Approaches, Dar Al Taleea-Beirut, 2007.

43. Mustafa Omar Al-Tir: Contributions to the Foundations of Social Research, Institute for Arab Development, 1989.

44. Mahjoub Attia Al-Ghandi: Methods of Scientific Research in the Social Sciences, Omar Al-Mukhtar University Publications, Libya, Al-Bayda, 1994.

45. Maa'n Khalil Omar: Objectivity and Analysis in Social Research, Beirut, Dar Al-Afaq, 1983.

Downloads

Published

30.04.2020

How to Cite

Jawad Witwit, A., & Ali Marzouk, A. (2020). Social Dimensions of Cyber Extortion in Social Media;An empirical Study in Karbala Governorate. International Journal of Psychosocial Rehabilitation, 24(2), 7298-7314. https://doi.org/10.61841/hfe62j50