The effect of using technology as a routine activity in increasing crime rates
DOI:
https://doi.org/10.31973/aj.v1i143.1838Keywords:
daily routine, technology, cybercrimeAbstract
This study seeks to realize the relationship between the use of technology as a routine activity and the increase in crime rates.
The importance of the study is that despite the efforts made by governments and media roles in alerting and warning of the negatives and risks of technology, there is a rise in crime rates due to the lack of expertise needed to deal with this virtual world, so it is necessary to avoid the damages and social, security and economic risks, caused by Using technology as a routine activity without awareness and lack of expertise to deal with it or at least limit its effects.
The problem of the study was that the high crime rates, depending on the use of technology, will have a negative impact on the social, economic, and cultural level on the individual and society, and that the victim in most technology-related crimes has a significant role no less than the role of the offender in completing the crime.
The results of this study showed that most victims of the use of technology had a role in what happened to them. If a perpetrator and a victim were found in a place and time with the absence of control, the crime occurs according to the theory of routine activities, and on the other hand, we find that the conformity of the hypotheses of lifestyle theory confirmed the role of the victim in the occurrence of the crime.
The proposals and recommendations noted the attempt to implement plans and policies that would preserve society from the clutches of such crimes, such as the crime prevention and prevention policy, and others.
Downloads
References
- دراسة (جهيدة، لموشي 2018) بعنوان (دور الضحية في حدوث جريمة النصب والاحتيال)
- صفوح، محمد "نقل التكنولوجيا" مجلة أثر التقنية على المجتمع العربي، دار النشر بالمركز العربي للدراسات الأمنية والتدريب بالرياض، 1984.
- عطیة، طارق ابراھیم الدسوقي، الأمن المعلوماتي (النظام القانوني لحماية المعلوماتي)، دار الجامعة الجديدة، القاهرة، الطبعة 2009، ص177.
- سيد، جابر عوض: التكنولوجيا والعلاقات الاجتماعية، دار المعرفة الجامعية، القاهرة، 1996.
- قطب، محمد علي، الجرائم المعلوماتية وطرق مواجهتها، مركز الإعلام الأمني، الأكاديمية الملكية للشرطة، عمان، المجرم الإلكتروني شخص سوي واجتماعي.
- الوريكات، عايد عواد، (2002). التحديث والنشاط الروتيني والجريمة: دراسة نظرية ناقدة. الفكر الشرطي، مج. 11، ع. 2، ص. 37-79.
- علي، عبد الصبور عبد القوي، الجريمة الإلكترونية الطبعة الأولي دار العلوم للطباعة والنشر، القاهرة، مصر، 2007.
- يوسف، صغير، الجريمة المرتكبة عبر الإنترنت، مذكرة لنيل درجة ماجستير، كلية الحقوق والعلوم السياسية، جامعة مولود معمري، تیزي وزو، الجزائر، 2013، ص 44
- جنسية فاضحة وأفلام جنسية، وكثيرا ما تستهدف الأطفال والشباب لأن هذه الفئة أقل تحصينا الحميدي، محمد ضيدان، تقدر الذات وعلاقته بالسلوك العدواني، أكاديمية نايف العربية للعلوم الأمنية، الرياض، 1424هـ.
المراجع الأجنبية:
- Hsieh, M., & Wang, S.K. (2018). Routine activities in a virtual space: A Taiwanese case of an ATM hacking spree.
- Schreck CJ, Fisher BS. Specifying the influence of family and peers on violent victimization: extending routine activities and lifestyles theories. J Interpers Violence. 2004 Sep;19(9):1021-41. doi: 10.1177/0886260504268002.PMID:15296615.
- Argun, U., & Dağlar, M. (2016). Examination of Routine Activities Theory by the property crime. Journal of Human Sciences, 13(1), 1188–1198.
المواقع الإلكترونية:
- Day, J. C., Janus, A., & Davis, J. (2005). Computer and Internet Use in the United States: 2003. (October 2015 ed.) US Department of Commerce. https://www.census.gov/prod/2005pubs/p23-208.pdf
- Walters G.D. (2014) Lifestyle Theory. In: Bruinsma G., Weisburd D. (eds) Encyclopedia of Criminology and Criminal Justice. Springer, New York, NY.
https://doi.org/10.1007/978-1-4614-5690-2_509
- تقرير كوفيد-19: تحليل التهديدات الإلكترونية الصادر عن مكتب الأمم المتحدة المعني بالمخدرات والجريمة بتاريخ 1/5/2020 على الرابط
شبكة المحامين العرب، ماهـية الجـريمة وتأصيلها الشرعي والقانوني، تاريخ الاسترجاع - (6/9/2020) على الرابط
http://www.mohamoon-montada.com/default.aspx?Action=Display&ID=43025&Type=3
Downloads
Published
Issue
Section
License
Copyright and Licensing:
For all articles published in Al-Adab journal, copyright is retained by the authors. Articles are licensed under an open access Creative Commons CC BY 4.0 license, meaning that anyone may download and read the paper for free. In addition, the article may be reused and quoted provided that the original published version is cited. These conditions allow for maximum use and exposure of the work.
Reproducing Published Material from other Publishers: It is absolutely essential that authors obtain permission to reproduce any published material (figures, schemes, tables or any extract of a text) which does not fall into the public domain, or for which they do not hold the copyright. Permission should be requested by the authors from the copyrightholder (usually the Publisher, please refer to the imprint of the individual publications to identify the copyrightholder).
Permission is required for: Your own works published by other Publishers and for which you did not retain copyright.
Substantial extracts from anyones' works or a series of works.
Use of Tables, Graphs, Charts, Schemes and Artworks if they are unaltered or slightly modified.
Photographs for which you do not hold copyright.
Permission is not required for: Reconstruction of your own table with data already published elsewhere. Please notice that in this case you must cite the source of the data in the form of either "Data from..." or "Adapted from...".
Reasonably short quotes are considered fair use and therefore do not require permission.
Graphs, Charts, Schemes and Artworks that are completely redrawn by the authors and significantly changed beyond recognition do not require permission.
Obtaining Permission
In order to avoid unnecessary delays in the publication process, you should start obtaining permissions as early as possible. If in any doubt about the copyright, apply for permission. Al-Adab Journal cannot publish material from other publications without permission.
The copyright holder may give you instructions on the form of acknowledgement to be followed; otherwise follow the style: "Reproduced with permission from [author], [book/journal title]; published by [publisher], [year].' at the end of the caption of the Table, Figure or Scheme.