Electronic Extortion through Social Networks and its Social Risks on Jordanian Women: A Field Study

Authors

DOI:

https://doi.org/10.35516/hum.v51i4.3170

Keywords:

Online Extortion, social networks, Jordanian Women, social risks

Abstract

Objectives: The study aims to identify the forms of electronic extortion and its justifications through social media and the social risks it poses to Jordanian women.

Methodos: This study falls under descriptive research utilizing a survey-based approach for data collection and information gathering. The study population consisted of all women who have experienced electronic extortion from various regions of the Hashemite Kingdom of Jordan. The survey was distributed via "Google Forms" to a sample of 303 individuals.

Results: The study found that sexual extortion is the most common form of extortion experienced by Jordanian women, with an average score of (2.37 ± 0.73), followed by utilitarian extortion in the second place (2.22 ± 0.74). The main justifications that drive the extortionist to victimize the target include excessive trust in social media users (2.78 ± 0.50) and communicating with unknown individuals and exchanging friendships with them (2.76 ± 0.49). The study also identified the most significant social risks of electronic extortion on women, including jeopardizing their social future and causing them significant family and social suffering (2.75 ± 0.52) and online enticement, fraud, and cyber scams (0.71 ± 0.57).

Conclusions: The study emphasizes the importance of guiding families towards responsible and moderate use of social media, educating women on how to deal with extortionists, increasing awareness about electronic extortion, its forms, motivations, justifications, and ways to confront it.

Downloads

Download data is not yet available.

References

Fogg, B. J., & Nass, C. (1997). Silicon Sycophants: The Effects of Computers That Flatter. International Journal of Human-Computer Studies, 46(5), 551-561.‏

Harris, B., & Woodlock, D. (2022). Spaceless Violence: Women's Experiences of Technology-Facilitated Domestic Violence in Regional, Rural and Remote Areas. Trends and Issues in Crime and Criminal Justice, [Electronic Resource], (644), 1-14.‏

Joseph B. Walther. Theories of Computer Mediated Communication and Interpersonal Relations. http://wiki.commres.org/pds/Theories In New Media/2017.

Kabir, N. (2018). Cyber Crime a New Form of Violence Against Women: From the Case Study of Bangladesh. Available at SSRN 3153467.

Kopecky, K. (2017). Online Blackmail of Czech Children Focused on So-Called “Sextortion” (Analysis of Culprit and Victim Behaviors). Telematic.

Mandau, M. B. H. (2021). “Snaps”, “Screenshots”, and Self-Blame: A qualitative Study of Image-Based Sexual Abuse Victimization Among Adolescent Danish Girls. Journal of Children and Media, 15(3), 431-447.‏

Rafi, M. S. (2019). Cyberbullying in Pakistan: Positioning the Aggressor, Victim, and Bystander. Pakistan Journal of Psychological Research, 34(3), 601-620.

Rubin, J. D., Blackwell, L., & Conley, T. D. (2020, April). Fragile Masculinity: Men, Gender, and Online Harassment. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (pp. 1-14).‏

‏ Walther, J. B., Van Der Heide, B., Ramirez Jr, A., Burgoon, J. K., & Peña, J. (2015). Interpersonal and Hyper Personal Dimensions of Computer‐Mediated Communication. The Handbook of the Psychology of Communication Technology, 1-22.‏

Walther, J. B. (1996). Computer-Mediated Communication: Impersonal, Interpersonal, and Hyper Personal Interaction. Communication Research, 23(1), 3-43.‏

Walther, J. B. (2011). Theories of Computer-Mediated Communication and Interpersonal Relations. The Handbook of Interpersonal Communication, 4, 443-479.

Published

2024-07-30

How to Cite

Nejadat, A. ., & Bani Salim, S. . (2024). Electronic Extortion through Social Networks and its Social Risks on Jordanian Women: A Field Study. Dirasat: Human and Social Sciences, 51(4), 302–324. https://doi.org/10.35516/hum.v51i4.3170

Issue

Section

Mass Communication
Received 2022-11-28
Accepted 2023-09-04
Published 2024-07-30