The Etiology of Women's Victimization in Social Networks
Subject Areas : Quarterly Journal of Woman and SocietyM.A Haji Deh Abadi 1 , احسان Salimi 2
1 - qom
2 - qom
Keywords: Lifestyle, Social networks, The culprit guilty, cybercrime, crime prevention,
Abstract :
In recent years, cybercrime has become one of the biggest and most serious challenges facing the criminal justice system. Studies in the context of cyber victim show that women, including "vulnerable groups" are in cyberspace. What adds to worries is that in recent years, with the advent of social networks, the number of female offenders has expanded exponentially. Countering this unpleasant situation in cyberspace depends on the exact pathology of the problem and the adoption of appropriate measures to deal with crime factors. This study, using criminological theories, seeks to identify the causes of female victimization in cyberspace and specifically in social networks. Findings of this study suggest that along with the ease of committing crime in social networks, the victim's lifestyle and the type of virtual interactions are parts of the causes and factors of female victimization in cyberspace.
- Aalipour, Hasan (2011), Information Technology Penal Law, Tehran, Khorsandi Publishing, First Printing. (Persian)
- Abuzari, Mehrnoush (1395) Criminology of Cyber Crimes, Tehran, Publishing Mizan, First Printing. (Persian)
- Aameli, saeed reza (2011) cyberspace, Tehran, Publishing Tehran University, First Printing. (Persian)
- Bocij, P. (2003). Victims of cyberstalking: An exploratory study of harassment perpetrated via the Internet. First Monday. Retrieved on 28th June, 2010, from http://131.193.153.231/www/issues/ issue8_10/
- BROADHURST, RODERIC AND JAYAWARDENA, KASUN (2011) Online Social Networking and Pedophilia: An Experimental Research “Sting” In: Cyber Criminology: Exploring Internet Crimes And Criminal Behavior, CRC Press.
- Citron, K. D. (2009). Cyber Civil Rights. Boston University Law Review. Vol. 89:61.
- Frith, Emily (2017) social media and children mental health: a review of the evidence, educational policy institute.
- darbandi Farahani, Elham (2012), The criminal approach to cybercrime, Master's Thesis for Criminal Law and Criminology, University of Moody.
- Haji deh abadi, mohammad ali, salami, ehsan (2016) Generalization of cybercrime, collection of articles international conference on: restorative justice & crime prevention, Tehran, publishing mizan. (Persian)
- Halder, D. And Jaishankar, K. (2010) Cyber Crime and Victimization of Women: Laws, Rights, and Regulations. Hershey, PA, USA: IGI Global.
- Herath, T, rao, H.r upadhyaya, s. (2012) internet crime: how vulnerable are you? Do gender social influence and education play a role in vulnerability? Psychology of cybercrime business science reference.
- Hindelang, M. J. Gottfredson, M. R. & Gaffalo, J. (1978). Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization. Cambridge, MA: Allinger.
- Holtfreter, k. M. D. reisig, and T.C. Pratt (2008) law self -control, routine activities, and fraud victimization, criminology and Criminal Justice, 46, 1.
- Javan jafari, abdoreza, shahideh, farhad (2013) The Role of Women Victims of Sex Crimes, Criminal Law Research, vol.7. (Persian)
- Kafashi, majeid. Pirjalili, Zahra. (2015) Spending Leisure Time in Women in Virtual Space (Tehran, 1394) Journal of Women and Society. Special Issue, pp.105-122. (Persian)
- Karmen, A. (2007) Crime Victims, an Introduction to Victimology. Wadsworth Publishing.
- Kordealivand, ruhdien, mohammadi, Mehdi, mirzaee, mohammad (2017) The typology of cybercrime in computer crime law, The first national cybercrime combating conference, Tehran, cyber police press. (Persian)
- Langos, Colette (2013) Cyberbullying, Associated Harm and the Criminal Law (PhD Thesis, University of South Australia, 2013), 55–60.
- McFarlane, L. & Bocij, P. (2005). An exploration of predatory behaviour in cyberspace: Towards a typology of cyber stalkers. First Monday, 8. Retrieved from http://fi rstmonday.org
- McKim, J. (2006, July 12). Pimp pleads guilty to prostituting minor. Orange County Register. Retrieved from http://www.ocregister.com/ocregister/news/atoz/ article_1209170.php
- McQuade, S. C. (2006). Understanding and managing cybercrime. Boston, MA:
- Pearson/Allyn and Bacon.
- Marcum, Catherine, D. (2011), “Adolescent Online Victimization and Constructs of Routine Activities Theory”, In: Jaishankar, K. (Ed), Cyber Criminology: Exploring Internet Crimes and Criminal Behavior, CRC Press.
- Mitchell, K. Finkelhor, D. & Wolak. J. (2007). Youth internet users at risk for the more serious online sexual solicitations. American Journal of Preventive Medicine, 32.
- Mokhtari, Maryam & malek ahmadi, hakimeh, (2017) Pornography and hyper-reality, Culture strategy, vol.38. (Persian)
- Mustaine, E. And Tewksbury, R. (1998) Predicting Risks of Larceny Theft Victimization: A Routine Activity Analysis Using Refined Lifestyle Measures, Criminology, Vol. 36.
- SHICK CHOI, KYUNG (2011) Cyber-Routine Activities: Empirical Examination of Online Lifestyle, Digital Guardians, and Computer-Crime Victimization, Cyber Criminology: Exploring Internet Crimes And Criminal Behavior, CRC Press.
- Petrocelli, J. (2005). Cyber Stalking, Law & Order, Vol. 53, NO.12.
- Sadebeek, liave (2004). Internet ethnography: online and offline, international journal of qualitative method, vol,3, no.2
- Sanders, T. (2010). The sex industry, regulation and the internet. In Jewkes, Y. & Yar, M. (Eds.), Handbook of Internet crimes (pp. 302–319). Cullompton, UK: Willan.
- Van Wilsem, J. (2011) Worlds Tied Together? Online and Non-Domestic Routine Activities and Their Impact on Digital Threat Victimization, European Journal of Criminology, Sage.
- Williams, Matthew (2012), Virtual criminal: Crime, Deviation and Online Regulation, Translated by: Amir Hossein Jalali Farahani and Mahboubeh Monfared, Under the Supervision of Ali Hossein Najafi Ebrahbandadi, Tehran: Size, First Edition. (Persian)
- Willard, Nancy (2007), Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats and Distress (Research Press, 2007),
- Yucedal, B. (2010) Victimization in Cyber Space: An Application of Routine Activity and Lifestyle Exposure Theories. Available In: https://etd.ohiolink.edu/rws_etd/ document/ get/kent1279290984/inline
- Zararkh, Ehsan, (2010) Cyber Victims, Journal of Legislation and Strategy, No. 64. (Persian)
_||_