The impact of gender on routine activities practiced through social media and have an impact on the incidence of crime
DOI:
https://doi.org/10.31973/9ez0xp82Keywords:
crime, impact, routine activities, social mediaAbstract
The study seeks to identify the impact of gender on routine activities that are practiced through social media, on crime.
A questionnaire was designed to a sample of men and women in Sharjah, and this sample represents 488 individuals (212 men and 276 women) in the Emirate of Sharjah, using the descriptive-analytical survey as a social study method with a non-probability sample.
The study reached a number of results, the most important of which are: that the most dangerous routine activities that are practiced through social media and have an impact on the occurrence of crime are the failure to secure electronic accounts in the most appropriate manner, dealing with unreliable or anonymous websites, and sharing personal information and account details through the means of communication The study revealed that there are statistically significant differences for these activities, and that females have a greater share than males in realizing the dangers of these routine activities.
Downloads
References
Khalil, Abu Asbaa Saleh (2005 AD), Communication Strategies and Its Effects, Majdalawi House for Publishing and Distribution, Jordan, 1st Edition.
Al-Dosari, Samhan bin Muhammad Theeb (2010 AD), The crimes of theft in the Saudi society in light of the theory of routine activity, Naif Arab Academy for Security Sciences, Riyadh.
Talib, Ahsan Mubarak (2001 AD), Crime Prevention, Dar Al-Tali’a for Printing and Publishing, Beirut, 1st Edition.
Alomosh, Ahmad Falah (2003), Fear of Crime in the Emirates Society, Sharjah: Publications of the Sharjah Police Research Center, Issue No. (106).
Alomosh, Ahmad Falah (2008 AD), Social Problems in the UAE Society, Journal of Social Sciences, No. 136, 113-158 .
Qdouh.N, Jamal (2015). Victims' contribution to criminal and violent behavior in Algerian society, Journal of Arts and Social Sciences, V8,28_11.
Jamal Huwaireb) (2016), The family and the digital generation, Qandil publishing, Dubai, 1st Edition.
Felson, M. & Cohen, L. (1979). Social change and crime rate Trends: A routine activity approach, American Sociological Review, 44: 588-608.
Ming and Shun, (2018). Routine Activities in a Virtual Space: A Taiwanese Case of an ATM Hacking Spre. International Journal of Cyber Criminology. Vol. 12(1): 333–352.
Ugur and Daglar, (2016). Examination of Routine Activities Theory by the property crime. Journal of Human Sciences · Volume: 13. Issue: 1. 1188-1198.
Andrew Osentoski, (2016). EXAMINING IDENTITY THEFT VICTIMIZATION USING ROUTINE ACTIVITIES THEORY. Michigan State University.
Kawohl, W. and Nordt, C. (2020) ‘COVID-19, unemployment, and suicide’, The Lancet Psychiatry 7(5): 389–90.
Rubington, E., Weinberg, M. (2011). The study of social problems: Seven perspectives,7: p59_60.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 امينة إبراهيم الاميري، أ.د. احمد فلاح العموش
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright and Licensing:
For all articles published in Al-Adab journal, copyright is retained by the authors. Articles are licensed under an open access Creative Commons CC BY 4.0 license, meaning that anyone may download and read the paper for free. In addition, the article may be reused and quoted provided that the original published version is cited. These conditions allow for maximum use and exposure of the work.
Reproducing Published Material from other Publishers: It is absolutely essential that authors obtain permission to reproduce any published material (figures, schemes, tables or any extract of a text) which does not fall into the public domain, or for which they do not hold the copyright. Permission should be requested by the authors from the copyrightholder (usually the Publisher, please refer to the imprint of the individual publications to identify the copyrightholder).
Permission is required for: Your own works published by other Publishers and for which you did not retain copyright.
Substantial extracts from anyones' works or a series of works.
Use of Tables, Graphs, Charts, Schemes and Artworks if they are unaltered or slightly modified.
Photographs for which you do not hold copyright.
Permission is not required for: Reconstruction of your own table with data already published elsewhere. Please notice that in this case you must cite the source of the data in the form of either "Data from..." or "Adapted from...".
Reasonably short quotes are considered fair use and therefore do not require permission.
Graphs, Charts, Schemes and Artworks that are completely redrawn by the authors and significantly changed beyond recognition do not require permission.
Obtaining Permission
In order to avoid unnecessary delays in the publication process, you should start obtaining permissions as early as possible. If in any doubt about the copyright, apply for permission. Al-Adab Journal cannot publish material from other publications without permission.
The copyright holder may give you instructions on the form of acknowledgement to be followed; otherwise follow the style: "Reproduced with permission from [author], [book/journal title]; published by [publisher], [year].' at the end of the caption of the Table, Figure or Scheme.