Reducing Electronic Blackmail and its Relationship to Modern Technologies
Main Article Content
Abstract
Electronic blackmail crime refers to one of the most dangerous crimes which result in victim many harms, if in reputation/personal life in his work. Cyber extortion and electronic blackmail became an increasing issue in digital era, aiming at firms and persons via threats of operational disruptions, reputational damage, data breaches. Present paper explores relation among new technologies and growing electronic blackmail prevalence. Through reviewing present paper, recognizing the main technologies which facilitate these crimes, analyzing efficient mitigation strategies, present paper targets at presenting general perspectives into combating electronic blackmail in evolving technological area.
Article Details
Issue
Section
How to Cite
References
1. Zaltina P, Nurtjahyo LI. Right To Be Forgotten as a Legal Protection for The Victims of Electronic Sexual Violence Cases. The Indonesian Journal of Socio-Legal Studies. 2024;3(2):4.
2. AlGhanboosi B, Ali S, Tarhini A. Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach. Computers in Human Behavior. 2023 Jul 1;144:107702.
3. Zolfagharipour L, Kadhim MH, Mandeel TH. Enhance the Security of Access to IoT-based Equipment in Fog. In2023 Al-Sadiq International Conference on Communication and Information Technology (AICCIT) 2023 Jul 4 (pp. 142-146). IEEE.
4. Ibrahim E, Sharif H, Aboelazm KS. Legal Confrontation of the Cyber Blackmail: a Comparative Study. Journal of Lifestyle and SDGs Review. 2025 Jan 17;5(2):e04039-.
5. Wang F. Breaking the silence: Examining process of cyber sextortion and victims’ coping strategies. International Review of Victimology. 2025 Jan;31(1):91-116.
6. Fisher T, Pieri Z, Howell CJ, O’Malley R, Tremblay L, Dawood M. Vendor Communication Themes in Darknet Ransomware-as-a-Service (RaaS) Advertisements. Computers in Human Behavior. 2025 Jan 17:108571.
7. Birthriya SK, Ahlawat P, Jain AK. Detection and Prevention of Spear Phishing Attacks: A Comprehensive Survey. Computers & Security. 2025 Jan 6:104317.
8. Mulligan C, Morsfield S, Cheikosman E. Blockchain for sustainability: A systematic literature review for policy impact. Telecommunications Policy. 2024 Mar 1;48(2):102676.
9. Ozkan-Okay M, Akin E, Aslan Ö, Kosunalp S, Iliev T, Stoyanov I, Beloev I. A comprehensive survey: Evaluating the efficiency of artificial intelligence and machine learning techniques on cyber security solutions. IEEe Access. 2024 Jan 18;12:12229-56.
10. Sonko S, Ibekwe KI, Ilojianya VI, Etukudoh EA, Fabuyide A. Quantum cryptography and US digital security: a comprehensive review: investigating the potential of quantum technologies in creating unbreakable encryption and their future in national security. Computer Science & IT Research Journal. 2024 Feb 18;5(2):390-414.
11. Jubur M, Shrestha P, Saxena N. An In-Depth Analysis of Password Managers and Two-Factor Authentication Tools. ACM Computing Surveys. 2025.
12. Udeh CA, Orieno OH, Daraojimba OD, Ndubuisi NL, Oriekhoe OI. Big data analytics: a review of its transformative role in modern business intelligence. Computer Science & IT Research Journal. 2024 Jan 15;5(1):219-36.
13. Akinade AO, Adepoju PA, Ige AB, Afolabi AI. Cloud security challenges and solutions: A review of current best practices. Int J Multidiscip Res Growth Eval. 2025 Jan;6(1):26-35.
14. Al Habsi A, Butler M, Percy A, Sezer S. Blackmail on social media: what do we know and what remains unknown?. Security Journal. 2021 Sep;34:525-40.
15. Kainz O, Kissi S, Michalko M, Murin M, Nováková I, Šimko E. A Simulated Reconnaissance Attack on a Mobile Device. In2024 International Conference on Emerging eLearning Technologies and Applications (ICETA) 2024 Oct 24 (pp. 262-268). IEEE.
16. Gupta RK, Lamkuche HS, Prasad S. Enhancing the Security of Sensitive Data in Cloud Using Enhanced Cryptographic Scheme. InArtificial Intelligence-Augmented Digital Twins: Transforming Industrial Operations for Innovation and Sustainability 2024 Jan 20 (pp. 387-399). Cham: Springer Nature Switzerland.
17. Carletti R, Luo X, Adelopo I. Understanding criminogenic features: case studies of cryptocurrencies-based financial crimes. Journal of Financial Crime. 2024 Dec 24.
18. Syahreen M, Hafizah N, Maarop N, Maslinan M. A Systematic Review on Multi-Factor Authentication Framework. International Journal of Advanced Computer Science & Applications. 2024 May 1;15(5).
19. Ahmed M, Gaber M. An investigation on cyber espionage ecosystem. Journal of Cyber Security Technology. 2024 Sep 22:1-25.
20. Ananthakrishna V, Yadav CS. Innovations in Cloud Security: Enhanced Hybrid Encryption Approach with AuthPrivacyChain for Enhanced Scalability. Nanotechnology Perceptions. 2024 May 5:560-77.
21. Ahmead M, El Sharif N, Abuiram I. Risky online behaviors and cybercrime awareness among undergraduate students at Al Quds University: a cross sectional study. Crime Science. 2024 Oct 10;13(1):29.
22. Chapagain D, Kshetri N, Sihag VK. webCyberBlock: Cybersecurity and Cyber Ethics via Blockchain Technology–Need for Web Security, Software Practices, and End-User Cyber Education. InBlockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures 2025 (pp. 123-138). CRC Press.
23. Alamprese JA. Adult learning and education in digital environments: Learning from global efforts to promote digital literacy and basic skills of vulnerable populations. Adult Learning. 2024 May;35(2):73-81.
24. Kareem A, Akhtar MS, Tarar MA, Karim MA, Lighari M, Fatima K. Perceptions of Senior Citizens Regarding the Social Media Impact on Relationship between Parents and Teenagers: A Sociological Case Study in Dera Ghazi Khan. The Critical Review of Social Sciences Studies. 2024 Oct 24;2(2):339-59.
25. Hussein S, Mohammed S. Analyzing the Legal Framework and Implications of Federal Decree-Law No. 34/2021 in Combatting Cyber Blackmail in the UAE. In2024 2nd International Conference on Cyber Resilience (ICCR) 2024 Feb 26 (pp. 1-6). IEEE.
26. Al-Kasassbeh FY, Rukba RO, Abunaseir MH. Electronic Sexual Extortion in International Legislation and National Applications. International Journal of Criminal Justice Sciences. 2024 Jun 5;19(1):205-27.
27. Xu H. The positioning of China’s anti-corruption agencies: law enforcement or political?. Crime, Law and Social Change. 2025 Jun;83(1):4.
28. Oladinni A, Odumuwagun OO. Enhancing Cybersecurity in FinTech: Safeguarding Financial Data Against Evolving Threats and Vulnerabilities.
29. Ravichandran R, Singh S, Sasikala P. Exploring School Teachers' Cyber Security Awareness, Experiences, and Practices in the Digital Age. Journal of Cybersecurity Education, Research and Practice. 2025 Jan;2025(1):1.
30. Kalinaki K. Ransomware Threat Mitigation Strategies for Protecting Critical Infrastructure Assets. InRansomware Evolution 2025 (pp. 120-143). CRC Press.
31. Coccia M. Converging Artificial Intelligence and Quantum Technologies: Accelerated Growth Effects in Technological Evolution. Technologies. 2024 May 10;12(5):66.
32. Magableh HY, Ahmad Al-Shawabkeh BK. The Problem of Jurisdictional Conflict and the Applicable Law on Cybercrime. Pakistan Journal of Criminology. 2024 Jul 1;16(3).
33. Dupont B, Fortin F, Leukfeldt R. Broadening our understanding of cybercrime and its evolution. Journal of Crime and Justice. 2024 Mar 1:1-5.