This study aims to uncover the relationship between two cybercrimes, harassment and blackmailing, as well as their impact on Jordanian society. The study population included 90 prosecutors working in Jordanian courts. The researchers used the relational method in the second half of the academic year 2020. According to Jordanian prosecutors, the rate of cybercrime harassment is average, whereas that of blackmail is high. The findings also show a statistically significant relationship between harassment and blackmail crimes among the sample members, which is a statistically significant rate. The study also showed that the spread of harassment had six consequences: threatening and defaming the victim, family breakup, social decay, loss of values, instilling skcepticism and loss of self-confidence, and security instability. The authors recommend increasing citizens' awareness of the concept of electronic governance to combat cybercrime. They also recommend that governments conclude agreements and treaties that criminalize all types of crimes, pinpoint their locations when they are committed, and explain how cybercriminals should be delivered.
Full text article
Ajmi, A. D. (2014). The practical and legal problems of cybercrime: a comparative study, Middle East University, Amman, Jordan. https://meu.edu.jo/libraryTheses/587ddc0b4a493_1.pdf
Al-Alfi, M. (2010). Al Internet, works of the seminar on combating crime via the Internet, Arab Administrative Development Organisation, Egypt. http://search.mandumah.com/Record/125049
Al-Thniyan, T. (2012). Proof of cybercrimes. Journal of King Faisal University, 6 (7), 44-65.
Al-badayneh, D. M. (2014). Cybercrimes: Definition and causes: Research paper for the Conference on New Crimes in Light of Regional and International Changes and Transformations, College of Strategic Sciences, Amman, Jordan.
Al-bawabiji, R. (2006). Harassment of Women, a Social Study and Legal Solutions, University of Jordan, Department of Graduate Studies, Amman, Jordan.
Al-Bishri, M.A. (2002). Digital Forensic Evidence, Its Concept, and Its Role in the Internet. Arab Journal for Security Studies, 8(11), 33-65.
Al-Dhneebat, M. (2015). Electronic pornographic crime as regulated by the Jordanian Information Systems Crimes Law. Dirasat Journal, 42(3) 101-155. https://doi.org/10.12816/0028522
Al Habsi, A., Butler, M., Percy, A., & Sezer, S. (2021). Blackmail on social media: What do we know and what remains unknown? Security Journal, 34(3), 525-540. https://doi.org/10.1057/s41284-020-00246-2
Alansari, M. M., Aljazzaf, Z. M., & Sarfraz, M. (2019). On Cyber Crimes and Cyber Security.In M. Sarfraz (Ed.), Developments in Information Security and Cybernetic Wars, pp. 1-41. IGI Global, Hershey, PA, USA. https://doi.org/10.4018/978-1-5225-8304-2.ch001
Al-Khiliwi, MY. (2014). The role of social networks in increasing extortion crimes against women from the point of view of Saudi university students, Naif Arab University for Security Sciences, Riyadh, KSA. https://library.nauss.edu.sa/ 02-10-2022.
Al-Majali, M. (2009). Blackmail and law. Journal of Education, Mutah University, 8(13), 34-61.
Al-Matiri T. A. (2009). Provisions for the crime of extortion established in the Saudi law combating information crime. Journal of Imam Muhammad ibn Saud Islamic University, 5(12), 67-88.
Al-Matiri, S. M. (2015). Criminal responsibility for electronic extortion in the Saudi system, Naif Arab University for Security Sciences (ed.), Riyadh, KSA. http://ecat.kfnl.gov.sa:88/ipac20/ipac.jsp?session=169C507A149F1.144558&profile=akfnl&uri=link=3100023@!560857@!3100006@!3100013&aspect=basic_search&menu=search&ri=2&source=172.27.18.30, 02-10-2022.
Al-Omari, A. (2010). Islamic Criminal Legislation Compared to Positive Law, Dar Al-Kitab Al-Arabi (ed.), Part 1, Beirut. Lebanon
Al-Qteishat, K (2018) The Crime of Attacking Private Life in the System of Combating SaudiInformatics Crimes Asian Social Science; Vol. 14, No. 4; 2018ISSN 1911-2017 E-ISSN 1911-2025
Alshathry Sahar (2016) Cyber Attack on Saudi Aramco, International Journal Of Management & Information Technology, 11(5):3037-3039, https://doi.org/10.24297/ijmit.v11i5.5613
Chadha, K., Steiner, L., Vitak, J., & Ashktorab, Z. (2020). Women’s responses to online harassment. International journal of communication, 14, 1-19.
Hakeem, A. M. B. (2015). Cybercrimes. Journal of Law and Humanities Sciences, 9 (23) 123-139.
Hamilton-Giachritsis Catherine, Elly Hanson, Helen Whittle, Filipa Alves-Costa, Anthony Beech, (2020) Technology assisted child sexual abuse in the UK: Young people’s views on the impact of online sexual abuse, Children and Youth Services Review, vol119, doi.org/10.1016/j.childyouth.2020.105451
Hussainat Mohammad. M. (2013) Computer Crimes in the Jordanian Society: Ajloun/Empirical Study Asian Social Science; Vol. 9, No. 9; 2013ISSN 1911-2017 E-ISSN 1911-2025
Jawdat, T. H.M. (2007). Legislative Confrontation of Organised Crime Using Technical Methods, Conference on Law, Computers and the Internet, College of Sharia and Law, United Arab Emirates.UEU Press
Jones, C., Trott, V., & Wright, S. (2020). Sluts and Soyboys: MGTOW and the Production of Misogynistic Online Harassment. New Media & Society, 22(10), 1903–1921. https://doi.org/10.1177/1461444819887141
Khawaldeh, M.S. (2012). The Crime of Illegal Entry into a Website or Information System, According to Jordanian Legislation. Dar Al Thaqafa, Amman, Jordan.
Kshetri, N, Alcantara, & Lailani, L. (2015). Cyber threats and cybersecurity challenges: A cross-cultural perspective. In Nigel Holden, Snejina Michailova, and Susanne Tietze (Eds), The Routledge Companion to Cross-Cultural Management. London and New York: Routledge. eBook ISBN :9780203798706
Mamdouh, A. H. M (2006). Digital forensic research and investigation of computer and Internet crimes, Legal Library Books publishing, El-Mahalla El-Kubra, Egypt.
Slutskiy P (2021). Blackmail. Communication and Libertarianism. Springer Nature Singapore Pte Ltd., pp 305–318 https://doi.org/10.1007/978-981-33-6664-0_20
Saeed, T. and Mustafa, A. (2015). Privacy and Protection in Electronic Transactions: A Review of E-Commerce Security Protocols. In ICIT 2015 The 7th International Conference on Information Technology, https://doi.org/10.15849/icit.2015.0079
Salvati, D. (2008). Management of Information system risks. Published dissertation, Switzerland: University of Zurich. www.dsv.su.se/eng/publikationer/inde.html (accessed on August 2012).
Talpur, M. A. R., Touseef, T., Jilanee, S. D. A., Shabu, M. M., & Khan, A. (2018). Effects of Cyberbullying on Teenagers: A Short Review of the Literature. Open Access Journal of Addiction and Psychology, 1(3), 1-4. https://doi.org/10.33552/OAJAP.2018.01.000511
Copyright (c) 2023 Hanene Lahiani, Prof. Mohammad Salman Al-Khaza’leh
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright / Open Access Policy: This journal provides immediate free open access to its content on the principle that making research freely available to the public supports a greater global exchange of ideas and is distributed under the terms and conditions of the Creative Commons Attribution License (CC BY). But the copyright was retained by the authors. Articles are free for personal use but are protected by copyright in the sense that they may not be used for purposes other than personal use without permission.