Social Dimensions of Cyber Extortion in Social Media;An empirical Study in Karbala Governorate
DOI:
https://doi.org/10.61841/hfe62j50Keywords:
Social Dimensions of Cyber Extortion, Social Media, An empirical Study in Karbala GovernorateAbstract
The use of social networking websites is spreading at a breakneck speed across the world; this is supported by the wide spread of modern technologies (smart mobile devices, tablets, iPods, laptops, etc.) and their various applications that enabled individuals to get to know and communicate with capabilities that humans had previously not reached. This has enabled all members of society and all age groups, especially girls and women, in countries of the Middle East, including Iraq; it has allowed the spread of new social values and customs, some of which might contradict the values of the conservative societies to which our young men and women belong. Arab and Islamic societies are conservative societies; however, some men and women users of these devices did not care about that; they did not take into account the social boundaries, customs, traditions, and provisions that define and control their behavior, on the one hand. On the other hand, this expansion in the use of modern communication, and the associated social media, the spread of cybercrime in general and electronic blackmail in particular, devices, whether this cyber extortion is emotional or material, entangled in the traps of perpetrators or cybercriminals, young men and women are victims bound by fear, confusion and isolation, especially in light of the openness that society is witnessing in the midst of what we are witnessing of the expansion of social networking sites and the creation of more of these smart names in a successive way, as the development of modern technology and the dissemination of personal data are the most important factors falling into the trap of electronic extortion, so the main question of research revolves around the following:
What are the social dimensions of the crime of cyberextortion?
However, several questions arise from the main question, including: What is meant by (extortion)? What exactly is cyberextortion? Is cyberextortion a crime? What is meant by electronic crimes in general? What are the pillars of the crime of cyberextortion? What are its motives? What are the types of electronic extortion crimes, and what are their means? What are its visible effects? Is society affected by these crimes? What is the social group most affected by these crimes? These and other questions that the researcher will try to answer in the course of his study.
Downloads
References
1. Ibrahim Madhkour Ibrahim Madkour: Dictionary of Social Sciences, 1st Edition, Egyptian Book Authority, Cairo 1975.
2. Blackmail seminar research (meaning, causes, treatment) papers of participants in the symposium, prepared by the Research Center for Women Studies in cooperation with the Department of Islamic Culture at King Saud University, 1st Edition.
3. Look at: The Impact of Social Networks on Audiences of Recipients, by Muhammad Al-Mansour, The Arab Academy in Denmark, MA Thesis in Media and Communication, 2012.
4. Look at: New media (social networks) by the professor. Ali Khalil Shakra, Osama House for Publishing and Distribution, Jordan, First Edition: 2114 AD.
5. Abdullah Mamdouh: The Role of Communication Networks in Political Change, PhD Thesis, Middle East University, 2012.
6. Amina Adel Suleiman Al-Sayed, Heba Muhammad Khalifa Abdel-Aali: Social Networks and their Impact on the Library Specialist, A Comprehensive Study of the Presence and Use of Facebook, Dr. Shawki Salem Library, Helwan University 2009.
7. Khaled Khalfan Mansouri, and others, A knowledge overview on social networks, Research and Studies Center at Dubai Police Academy, 2013.
8. Ali Milad Bin Rahuma, Electronic Sociology, Negative Knowledge of Knowledge, The National Council for Culture, Literature, and Arts, Kuwait, 2002.
9. Helmy Khader Sari, Social Media, House of Treasures Knowledge, Amman, 2013.
10. Na`im Faisal, University Students' Uses of Social Media, Yarmouk University, 2011.
11. Nasser Muhammad Al-Buqami, Combating Information Crimes and Their Applications in the Countries of the Cooperation Council for the Arab Gulf States, Abu Dhabi, Emirates Center for Strategic Studies and Research, 2008.
12. Yunus Arab, Computer and Internet Crimes, a paper submitted to the Arab Security Conference for Research and Studies, Abu Dhabi, 2002.
13. Ali Shweil Al-Qarni, New Media, King Saud University Press, Riyadh, 2013.
14. Muhammad Ali Al-Erian, Information Crimes, New University House for Publishing and Distribution, Alexandria, 2004.
15. Rami Ahmad Al-Ghalibi: The crime of electronic extortion and mechanisms to combat it in the Republic of Iraq, second edition, Directorate of Relations and Information, 2019. When visiting some security agencies, as well as investigation courts in Karbala, to closely examine the mechanisms of dealing with the crime of extortion, it became clear that most of the articles that are judged against abusers of social media are (330, 333, 343) of the Iraqi Penal Code (111). For the year 1969, and the reason is due to the absence of legislation and an enforceable law related to Internet and information crimes. Date of visit: 01/27/2020.
16. Rashad Khaled Omar: Legal and Technical Problems for Investigating Information Crimes, Hadith University Office, 2013
17. Ali Hussein Khalaf and Sultan Abdul Qadir al-Shawi, General Principles in the Penal Code, Law Library, Baghdad, 1982.
18. Mahmoud Naguib Hosni: Explanation of the Penal Code, General Section, 3rd Edition, Dar Al-Nahda Al-Arabiya, 1973.
19. Abbas Moneim Salih: Criminal Protection for Internal State Security, Master Thesis, Al-Mustansiriya University College of Law, 2012.
20. Al-Mutairi, Sami Marzouq Naja, Criminal Responsibility for Electronic Blackmail in the Saudi System, Master Thesis, Naif Arab University for Security Sciences, Riyadh, 2015.
21. Article No. (2/3) of the Saudi Anti-Cyber Crime Law issued by the Council of Ministers No. 79 on 3/7/1428 AH, and Article No. 9 of the UAE Federal Law to Combat Cybercrime No. 5 of 2012.
22. Juvenile Care Law No. 76 of 1983.
23. Mohsen, Sinai Abdullah: Legislative Confrontation of Computer-Related Crimes in Light of International and National Legislations, Proceedings of the Regional Symposium on Internet-Related Crimes, Publications of the United Nations Program to Promote the Rule of Law in Some Arab Countries, Kingdom of Morocco, 2015.
24. Al-Musnad, Saleh bin Muhammad, Al-Muhaini, Abdul Rahman bin Rashid: Computer Crimes: The Real Danger in the Information Age, Arab Journal of Security Studies and Training, Volume 15, Issue 29, Riyadh, 2015.
25. Article No. 2 of the Saudi Labor Law issued by Royal Decree No. (M/51) dated 8/23/1426.
26.Al-Zuraik, Khalifa bin Ali bin Muhammad: Blackmail and Punishment of Juveniles in the Saudi System (An Empirical Comparative and Applied Study), Master Thesis, Naif Arab University for Security Sciences, Riyadh, 2015
27. Noura bint Abdullah bint Muhammad al-Mutlaq: Blackmailing girls with rules and punishment for Islam, Imam Muhammad bin Saud Islamic University.
28. Suzanne Forward: Emotional Blackmail, 1st Edition, Jarir Bookstore, Saudi Arabia, 2015.
29. The Absolute One, Noura bint Abdullah bin Muhammad: Blackmailing girls with its rulings and punishment in Islamic jurisprudence, Imam Muhammad bin Saud Islamic University, Riyadh, without a year.
30. Hisham bin Abdulaziz Al-Hamidi: The Role of the Commission for the Promotion of Virtue and the Prevention of Vice in Reducing the Crimes of Extortion against Girls in the Kingdom of Saudi Arabia, Master Thesis, Riyadh, 2011.
31. Turki bin Abdul Rahman Al-Mushair: Building a Security Model for Combating Information Crimes and Measuring Effectiveness, Master Thesis, Naif Arab University for Security Sciences, Riyadh, 2009. • The Trojan horse program was initially designed for a useful purpose: to know what children do on the computer in the absence of parents or to know what the employees do in the absence of the manager, but the development within
This program is so that it becomes possible to access the user's password by entering the device, which is used by the owner of the device himself, so the owner of the device cannot notice the presence of an intruder on his device.
32. Saidani Naim: Research and Investigation Mechanisms for Information Crime in Algerian Law, Master Thesis, El Hadj Khadr-Batna Rabbania University, Faculty of Law and Political Science, 2012, 2013.
33. Mamoun Naim: Face to Face: Hackers No Masks, First Edition, Al-Sha`a for Publishing and Media, DT, Syria.
34. Muhammad Al-Kaabi: Crimes Arising from Using the Internet, Dar Al-Nahda Al-Arabiya for Publishing and Distribution, 2009.
35. Abdul Aziz bin Hamin, Researcher Center for Women's Studies, in cooperation with the Department of Islamic Culture and I-1, King Saud University, and researchers at the Blackmail Seminar (Concept, Causes, and Effects) 2011.
36. Riyadh Al-Haidan Muhammad Al-Masmiri: Mixing between the Sexes: Its Provisions and Effects, Kingdom of Saudi Arabia, Riyadh, Dar Al-Jawzi, 2009, p.153
37. Muhammad Bin Saleh Bin Masoud Al-Omairah, Criminalization of Women Blackmail: An Empirical Study, Unpublished Research, Prince Nayef Arab University for Security Sciences, 2012.
38. Fahd Muhammad Shaqqa: National Security: A Comprehensive Vision, Naif Arab University for Security Sciences, Riyadh, 2003.
39. Muhammad Shafiq: Scientific Research, Methodological Steps for Preparing Social Research, Modern University Office, Alexandria, 1998.
40. Talat Ibrahim Lotfi and Kamal Abdel-Hamid Al-Zayyat: The Contemporary Theory in Sociology, Dar Gharib, Cairo, 2005.
41. Morris Ingres: Methodology of Scientific Research in the Humanities, translated by Bouzid Sahraoui and others, Dar El Kasbah, 2nd Edition, Algeria, 2006.
42. Abdel-Ghani Emad, Research Methodology in Sociology, Problems, Techniques, and Approaches, Dar Al Taleea-Beirut, 2007.
43. Mustafa Omar Al-Tir: Contributions to the Foundations of Social Research, Institute for Arab Development, 1989.
44. Mahjoub Attia Al-Ghandi: Methods of Scientific Research in the Social Sciences, Omar Al-Mukhtar University Publications, Libya, Al-Bayda, 1994.
45. Maa'n Khalil Omar: Objectivity and Analysis in Social Research, Beirut, Dar Al-Afaq, 1983.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.