Electronic Extortion through Social Networks and its Social Risks on Jordanian Women: A Field Study
DOI:
https://doi.org/10.35516/hum.v51i4.3170Keywords:
Online Extortion, social networks, Jordanian Women, social risksAbstract
Objectives: The study aims to identify the forms of electronic extortion and its justifications through social media and the social risks it poses to Jordanian women.
Methodos: This study falls under descriptive research utilizing a survey-based approach for data collection and information gathering. The study population consisted of all women who have experienced electronic extortion from various regions of the Hashemite Kingdom of Jordan. The survey was distributed via "Google Forms" to a sample of 303 individuals.
Results: The study found that sexual extortion is the most common form of extortion experienced by Jordanian women, with an average score of (2.37 ± 0.73), followed by utilitarian extortion in the second place (2.22 ± 0.74). The main justifications that drive the extortionist to victimize the target include excessive trust in social media users (2.78 ± 0.50) and communicating with unknown individuals and exchanging friendships with them (2.76 ± 0.49). The study also identified the most significant social risks of electronic extortion on women, including jeopardizing their social future and causing them significant family and social suffering (2.75 ± 0.52) and online enticement, fraud, and cyber scams (0.71 ± 0.57).
Conclusions: The study emphasizes the importance of guiding families towards responsible and moderate use of social media, educating women on how to deal with extortionists, increasing awareness about electronic extortion, its forms, motivations, justifications, and ways to confront it.
Downloads
References
Fogg, B. J., & Nass, C. (1997). Silicon Sycophants: The Effects of Computers That Flatter. International Journal of Human-Computer Studies, 46(5), 551-561.
Harris, B., & Woodlock, D. (2022). Spaceless Violence: Women's Experiences of Technology-Facilitated Domestic Violence in Regional, Rural and Remote Areas. Trends and Issues in Crime and Criminal Justice, [Electronic Resource], (644), 1-14.
Joseph B. Walther. Theories of Computer Mediated Communication and Interpersonal Relations. http://wiki.commres.org/pds/Theories In New Media/2017.
Kabir, N. (2018). Cyber Crime a New Form of Violence Against Women: From the Case Study of Bangladesh. Available at SSRN 3153467.
Kopecky, K. (2017). Online Blackmail of Czech Children Focused on So-Called “Sextortion” (Analysis of Culprit and Victim Behaviors). Telematic.
Mandau, M. B. H. (2021). “Snaps”, “Screenshots”, and Self-Blame: A qualitative Study of Image-Based Sexual Abuse Victimization Among Adolescent Danish Girls. Journal of Children and Media, 15(3), 431-447.
Rafi, M. S. (2019). Cyberbullying in Pakistan: Positioning the Aggressor, Victim, and Bystander. Pakistan Journal of Psychological Research, 34(3), 601-620.
Rubin, J. D., Blackwell, L., & Conley, T. D. (2020, April). Fragile Masculinity: Men, Gender, and Online Harassment. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (pp. 1-14).
Walther, J. B., Van Der Heide, B., Ramirez Jr, A., Burgoon, J. K., & Peña, J. (2015). Interpersonal and Hyper Personal Dimensions of Computer‐Mediated Communication. The Handbook of the Psychology of Communication Technology, 1-22.
Walther, J. B. (1996). Computer-Mediated Communication: Impersonal, Interpersonal, and Hyper Personal Interaction. Communication Research, 23(1), 3-43.
Walther, J. B. (2011). Theories of Computer-Mediated Communication and Interpersonal Relations. The Handbook of Interpersonal Communication, 4, 443-479.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Dirasat: Human and Social Sciences

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Accepted 2023-09-04
Published 2024-07-30


