You are on page 1of 11

PSYCHOLOGY AND EDUCATION (2021) 58(1): 833-843 ISSN: 00333077

The Legislative Confrontation Of The Cyber Stalking Crime: A


Comparative Study

Dr. Fahad Alkasasbeh, Dr. IbtIsam Al Saleh


Assistant professor – faculty of law, Amman Arab University ,amman –jordan
Dr.fahadalkasassbeh@yahoo.com

Assistant professor – faculty of law, Amman Arab University , Amman - jordan


Ibtisam_saleh@yahoo.com

ABSTRACT
This study examined the legislative confrontation of the cyber stalking crime and focused on how the Jordanian legislator and the
comparative regulations confront this modern crime. In addition, the study used the descriptive methodology that relies on
describing the legal texts of the legal framework and it also used the analytical methodology in order to reach a correct adaptation
of this crime. On the other hand, the study used the comparative methodology when conducting comparison among the
comparative legal texts. Accordingly, due to the severe impact of harassment on man and the fact that it is considered the most
common and widespread phenomenon after the emergence of information technology, many western legislations have been
interested in confronting and criminalizing it in contrast to the Jordanian legislator and the comparative Arab legislations that have
not yet examined the text of this crime and the threat is represented mostly in such act. The act threat of harassment that we deal
with including the newly developed Arab legislations regarding is concerned in combating cybercrime.

Keywords:
Legislative Confrontation, Cyber Stalking Crime, information technology

Article Received: 18 August 2020, Revised: 3 November 2020, Accepted: 24 November 2020

Introduction staying for a long time in front of his home, doing


continuous surveillance, appearing unexpectedly
In the late twentieth century and because of the
and unwelcome in the victim's private area, Or
progress of which the western countries reached in
impeding him to reach his place of work or
respect as well as their interest in the rights of the
residence or any other place or to send unwanted
citizen that have to be protected from any harm
letters and phone calls and parcels, whether or not
that might affect him, whether this harm is a
they include a threat, or to act in any way that
physical or a psychological one, criminal laws in
causes frightens the targeted person of affects his
some western countries began to criminalize the
safety.
pattern of behavior that might cause the victims'
distress, suffering and inconvenience or the fear or Furthermore, the scientific progress had
disease, and sometimes it may be the reason for significantly affected the harassment acts, as
the occurrence of other crimes such as murder and people began to realize it with the beginning of
rape. the spread of mobile phones and their use by
callers who use obscene language and due to
This includes many actions that may be
repeated and unknown communications or those
threatening to the victim or monitoring him, i.e.
that contain a threat not to forget the emergence of
intrusive pursuit of the targeted person, such as
833
www.psychologyandeducation.net
PSYCHOLOGY AND EDUCATION (2021) 58(1): 833-843 ISSN: 00333077

modern information technology and its spread. that may cause a psychological or emotional
This shows the speed with which technology suffering (Goodno. 2007, p: 125).
adapts modern information with criminal goals.
Some scholars define the cyber stalking and
However, recently, the role of information
online harassment crime as is an emotional terror
technology has not only provided criminals with a
by using means of modern information technology
wide range of modern methods of committing
to instill fear of harm or death in a person. It is
harassment acts, but also helped to overcome the
also a form of psychological or intellectual
traditional difficulties that prevented the
aggression, whereby the perpetrator repeatedly
achievement of committing many harassment acts
and in an undesirable appearance penetrates the
that the perpetrator cannot do face to face.
victim's world without having a relationship with
Similarly, a new criminal phenomenon which her or if this relationship no longer exists, and
jurisdiction refers to as "Cyber Stalking" has with direct or indirect motives it can be traced
appeared. Such a phenomenon represents a real back to the emotional sphere. In general, in the
challenge for the efficiency of the traditional field of the crime of harassment, the following
criminalization texts in confronting such crimes. characteristics or a set of characteristics are taken
into consideration: malice, premeditation,
The problem of the study is represented in the fact
severity, repetition and illegal purpose/s
despite all of the procedures and development
)Laughryn,2000, p:27(.
implemented by the Hashemite Kingdom of
Jordan in terms of activating the cyber crime law However, it is believed that cyber stalking crime
No. (27) of 2015 and amendments in the year is defined as: the pattern of behavior that is
(2018) to limit cyber crimes, but not clear text directed at a specific person through the use of
stipulates punishment for such crime. modern information technology means with the
intention of annoying, harassing, pressuring,
Keyword: Stalk
threatening or intimidating him, and in other
Means of modern IT, threat, email and legality words with the intention of causing him
principle psychological and emotional harm and sometimes
physical harm.
Definition of Cyber Stalking
The perspective of western legislations from
The term (Stalking) is defined as an unwanted and
the cyber stalking crime
repetitive intrusive behavior that causes fear and
emotional or physical harm to the victim. It is a The French legislator did not stipulate a specific
complex phenomenon with a series of motivations provision for harassment through modern
including hatred, jealousy, obsession, or love for information technology means, but the French
exercising control or dominate on the others code devoted a special chapter on acts of
)Purcell, Pathe ,Mullen ,2004, p: 157). harassment under the title of assault or harming
the safety and security of persons, which included
In the legal texts that examined harassment
criminalizing the actions that cause psychological
crimes, the word (Stalk) means committing a
pain for people or make them vulnerable to it due
repeated conduct with an intention to cause harm
to harassment. For example, Article 422 stipulated
to the victim or cause fear or to provoke his fear
in the Law of October 30, 1998, stipulates the
or fear for his safety or the safety of others
punishment of anyone who matches a person who
(Clough, 2010, p: 369). These texts were not
knows or is supposed to know that his behavior
limited in the threat but also included any conduct

834
www.psychologyandeducation.net
PSYCHOLOGY AND EDUCATION (2021) 58(1): 833-843 ISSN: 00333077

seriously affects the tranquility of the targeted By reading the previous sample of harassment
person (Jafar, 2013, p. 281). legislations, it becomes clear that legislators, in
their determination of the element of behavior or
Article (2-33-222) of Law No. (73) That was
criminal activity in the material element of the
issued in January, 2002 indicates to the
crime of harassment, have followed one of two
following:
methods, either not stipulating the determination
Harassing another person by repeated conduct of the acts that constitute the punishable behavior
which is designed to or which leads to a in the crime of harassment and contentment with
deterioration of his conditions of work liable to using the phrase “repetitive or group behavior.
harm his right and his dignity, to damage his Course of conduct, is a term that is adopted by
physical or mental health or compromise his both the US federal law and the British law, which
career prospects is punished by a year’s stipulates that the behavior takes place at least
imprisonment and fine of the offender for the twice. This term has been adopted by both US
amount 0f (15,000 €) . federal law and the British law, which stipulate
that the behavior should occur at least twice.)
In Britain, the Act of Protection from Harassment
that was issued in 1997, which stipulates that a Protection
person should not conduct any behavior that
"From Harassment Act 1997 (UK): Even
amounts to harassing another person while he
where there are two incidents, the
knows or is supposed to know that his behavior is
circumstances must be such that they may
offensive to others (Finsh, 2002, p: 703).
properly be described as a course of conduct".
The forth part of the protection law stipulated for
This method of determining the element of
the more serious act that the conduct (the course
criminal behavior in the material element of the
of conduct) shall be repeated at least in two
crime of harassment bears the benefit of flexibility
occasions that do not cause fear, harm or violence
as it gives courts greater appreciation in terms of
that might be used against him (Claugh, 2010, p:
law enforcement, especially with regard to
370).
modern and unfamiliar forms of harassment, but
In the United States of America, most states have at the same time it is critical of its contravention
introduced special legislations on harassment of the general principle that states that there
crimes through modern information technology in should be a definition of acts. According to the
addition to texts on traditional harassment crimes criminal law, such act is banned.
(Goodno, 2007, p125).
(This concept is given constitutional protection
In this regard, on the federal level harassment is under the due process clause of the fourteenth
subject to this through law (18 USC 2261A). It amendment to the US constitution) "See
was amended to include modern technology generally: A. Packerd Does proposed federal
means. According to this law, the crimes of using cyberstalking legislation meet constitutional
the email or any e-means that is activated through requirements –: Communication law and policy –
computer to engage in a repeated conduct that 2000".
may cause pain and emotional distress or make
In fact, there is a need to stipulate a clear text that
him frightened of death of fear for his safety.
contains a specific definite list of acts that
Safety: is defined to include a person's "mental represent a harassment behavior, for example the
well being “or the sake of any of his family Canadian Penal Code stipulated that the acts that
members, brothers or anyone with whom he cares.
835
www.psychologyandeducation.net
PSYCHOLOGY AND EDUCATION (2021) 58(1): 833-843 ISSN: 00333077

constitute the offense of harassment are defined as threatens another through A forum spread on the
follows: Internet or through chat and chat rooms.

- Stalking someone over and over from one place First: Threat crime in the Jordanian penal
to another. code
- Unwanted contact with a person repeatedly, The legislator spoke about the crimes of
directly or indirectly. threatening people in Articles (349-354) of the
Penal Code. Some of these crimes are of the
- Constantly staring at a person or watching his
reconciliation misdemeanor type, some are of the
home in which he lives, his place of work, or any
primitive misdemeanor type, and some are of the
place he frequents
violation type.
- A direct threat to a person or any of his family
The threat may be considered a first misdemeanor
members (Criminal Code, Canada, S. 264 (2).
punishable by imprisonment from 6 months to 3
The perspective of the Jordanian legislation years in the event that the perpetrator threatens
and some Arab legislations on Cyber stalking another person with a felony whose penalty is not
crime less than death or permanent labor or more than
fifteen years, whether by closed writing or by a
The concept of the crime of harassment in the
third person, provided that the warrant includes
Arab world has not been crystallized in the way
the order Conducting or abstaining from an action,
that happened in Western countries, so that most
even if it is legitimate.
Arab legislations have not stipulated the crime of
harassment, whether it occurred in its traditional According to Article 351, a threat may be
form or through modern information technology. considered a reconciliation misdemeanor, if the
threat to one of the aforementioned felonies does
Although there are some texts of the legislations
not include an order or included an order, but it
that may address the issue of emotional harm and
occurred verbally without the mediation of a third
harassment / including what has been stipulated in
person, then he / she shall be punished based on
Article 298 of the UAE Federal Penal Code, a
the victim’s complaint by imprisonment from one
penalty of imprisonment for a period not
month to two years.
exceeding one year or a fine not exceeding ten
thousand Dirhams shall be imposed on anyone In this regard, Article 349 stipulates on
who intentionally causes inconvenience to others punishment with imprisonment for a period not
by using transportation devices Wired and exceeding six months for anyone who threatens
wireless. This is what was stipulated in Article another one month with a firearm. The
166 (repeated in the Egyptian Penal Code, and punishment ranges between two months and a
Article 393 of the Iraqi Penal Code). year if the perpetrator uses a firearm.

It could be said that the threat is almost the only The text on the threat of a breach of the type was
act of harassment that was dealt and examined by mentioned in Article (345) "penalties", which
Arab legislations, including the new Arab stipulates: “Every other threat to inflict unjust
legislation regarding combating information harm, if it occurs by word or by any of the means
technology crimes. The threat is one of the acts mentioned in Article (73) and that would severely
that constitute the element of criminal behavior in affect the victim's soul, he will be punished with
the crime of harassment through modern imprisonment for up to a week or a fine not
information technology means, such as if a person exceeding five Dinars (Ahmed, 2016, p: 218-220).
836
www.psychologyandeducation.net
PSYCHOLOGY AND EDUCATION (2021) 58(1): 833-843 ISSN: 00333077

Second: The applicability of the traditional searches in public, it was considered a means of
texts contained in the Jordanian Penal Code, in publicity.
the event that they occur through information
Writing, drawings, hand and solar photos, films,
technology means
badges and photography in their contradiction if
In this context, the Jordanian legislator remained they are displayed in a public place, an open place
silent in defining the act of threatening and left it to the public, an exhibition of sight, sold, offered
to the jurists. The threat is that act that a person for sale, distributed to more than one person, or
undertakes to warn another of a danger that he published by electronic means that enable the
wants to impose on his person or his money or the public to read or view them without restriction. It
person or money of others, and it is equal for that is also possible to adapt this text to include many
warning to be verbally or in writing by any phrase forms of electronic threat, and to include this new
that would cause terror in the soul Or the money model of crime within the logic of the text (every
or offer of any person of interest to him, and other threat), taking into account that the
considering the statement as a threat does not previously mentioned threat texts that have
negate the fact that the phrases are wrapped with discussed the types of traditional threat, it is
some ambiguity, whenever they would have the indispensable for penal texts that deal with the
intended effect on the soul of whom they were electronic threat as a deterrent punishment for
directed to (Ahmed, 2016, p .: 221). him. (Al-Mana'sa, Al-Zoubi, 2017, p. 255).

As a result, it is not necessary for the perpetrator This remained the case until the enactment of the
to carry out any of the elements of the crime he is Cybercrime Law of 2015, which in the first
threatened with. Rather it is sufficient for this paragraph, Article 3 of which spoke about
threat to be of a degree of seriousness that would unauthorized access to the electronic data and
intimidate the victim, undermine his security and information processing system, then indicated the
reassurance and lead him to believe that the cases, goals and objectives of the perpetrator of
perpetrator will implement what he threatens. It is illegal access in Paragraph 2. However, this law
for honor or disclosure to take place by one of the did not offer what was expected, as it did not
methods of publicity. Rather, threatening to include among the forms of behavior the
divulge to a single person or secretly suffices, investigation of access and data and information
because this achieves the same effect by throwing with the intention of threatening, extorting or
fear and terror in the soul of the victim, just as it disturbing the victim and causing psychological
does not matter whether the matters threatened are and emotional pain for the victim (ibid).
correct or invented. (Al-Kaibi, 2005, p.88).
Third: The crime of threatening the Arab
As we mentioned before, the Jordanian legislator private legislations
handled the threat crime and allocated specific
In this context, the Arab guiding law for
legal texts for it, where he presented its forms,
combating information systems technology crimes
shapes, aspects and components.
in Article (9) stipulates on the following: Whoever
Article (345) Jordanian penalties stipulated on the uses the information network or a computer
general rule and the general model for the crime device and the like to threaten or blackmail
of threat, where it mentioned the phrase (any other another person to compel him to do or refrains
threat). Therefore, with the ability to read this text from doing it, even if this act or omission is
and the text of Article (73/4), of the same law that lawful, it is punishable by imprisonment and a
fine, or one of these two penalties.
837
www.psychologyandeducation.net
PSYCHOLOGY AND EDUCATION (2021) 58(1): 833-843 ISSN: 00333077

Moreover, this was stipulated in Article (3) of the laws is that criminalization only applies to
Saudi Law to Combat Information Technology material acts, that is, external manifestations that
Crimes, and Article (9) of the Federal Law can be touched in the outer space in any way, and
Concerning Combating Information Technology therefore not Criminalization deals with the
Crimes Law in the United Arab Emirates. thoughts, intentions, and beliefs that remain latent
in the inner realm of the soul (Hosni, 267. 1989, p.
Components of Cyber Stalking Crime
267).
Cyber stalking crime does not differ from any
In the analysis of the material component, we note
other traditional crime established in the penal
that it is based on three components:
code in that it requires for its fulfillment the
consistent elements as it must be achieved in any 1- Criminal activity, which is the positive or
crime in order to be present on the ground, in negative behavior that the perpetrator commits to
addition to the necessity of having the initial the protected interest, and this activity or act is
condition in each crime and we mean here the realized in the crime of harassment when a person
legal element, it must The existence of a tangible issues behaviors directed at a specific person that
material element that clearly expresses the will of affect his psychological integrity and sometimes
the perpetrator can be proven, and then there must lead to compromising his physical integrity as
also be a moral element that expresses the will of well, and criminal activity in The crime of
the criminal, modern information technology. harassment by means of modern information
technology takes many manifestations and is
First: the legal component
either direct or indirect.
The legal component means (no crime and no
Criminal activity in the crime of harassment
punishment without a text/ evidence). This means
through modern information technology means -
there should be a text that prohibits and punishes
in its direct form -, may include sending e-mail
the crime; the law is required to consider the act
messages from one person to another whose
as a crime and there should be a text that
content is either offensive or obscene or causing
criminalized this act and punishes it. This is called
the victim to feel threatened or in other words
the principle of legality; the legal component is
feeling fear and dread. (Cullen, 1997, p 217).
talking legality from criminalization through the
legal texts. Originality in this is permissibility Moreover, the behavior of electronic harassment
until a text that stipulated criminalization (Al- in its direct form on the form of sabotage, such as
Qahwaji, 2002, p. 65). a bombing e-mail, where hundreds or thousands
of unwanted e-mails are sent, i.e. what is known
First: the material component of the cyber
as (junk e-mail messages). Accordingly, this leads
stalking crime
to the destruction of his mail, whether it is the
The material element means the external postal address of a person or a company. The
appearance of the crime and its face in which it foreign jurisprudence demonstrates this activity in
appears and through it, the assault on the protected the term of (Spamming) and also viruses might be
interest is achieved, and the operational actions of sent to the device which is used by the target
the crime take place (Sorour, 1985, p. 308). person. (Graw, 1995 - p: 492)

The material element has a clear importance, as As for the indirect form of criminal activity in the
the fact that the crime is based on tangible crime of harassment through modern information
materials that makes establishing evidence for it technology means, it may include spreading
easy. The prevailing principle in modern positive rumors about the victim on web pages, or posting
838
www.psychologyandeducation.net
PSYCHOLOGY AND EDUCATION (2021) 58(1): 833-843 ISSN: 00333077

false pictures or personal information about him, It is enough fur such crime is to take place once so
impersonating the victim in chat rooms and news as to form a harassment crime (Ja'far, 2013, p.
groups, sending offensive, obscene or fraudulent 294-295).
messages and advertisements. In such cases, the
2 - The criminal outcome: It is the impact or
victim’s name is false and these messages may
damage resulting from the criminal activity, and
include the victim’s address, phone numbers, and
this harm in the crime of harassment through
e-mail addresses.
modern information technology means is the
Consequently, the victim becomes the one who target person's feeling of real emotional distress or
subscribes hundreds of messages without his pain, or fear of death or fear for his safety or the
knowledge. As a result, he receives hundreds of safety of one of his family members or brothers
abusive and unwanted e-mails and Or any of the people he cares about. The criminal
communications every day. On the other hand, the outcome has a clear significance, as the material
victim -in many cases- becomes vulnerable to element is not complete until the result is
tracking and monitoring many people who have achieved, and if the crime was intended (Hosni
seen the messages sent in his name, or who have 1998, 238).
spoken with his impersonator, so that the person is
3- Casual relationship: Casual relationship is the
a victim of online or cyberspace harassment
link between the criminal activity and the criminal
causes great discomfort and anxiety that amounts
outcome, and it has great importance in the
to fear, but the real and greatest fear is when the
material element, as it is not sufficient for this
aggressive behavior and the threat that has arisen
element to be established in the crime of
escalates The line, to reach stalking, surveillance
harassment through modern information
and harassment in reality (real life). Fears have
technology means for a criminal behavior to occur
increased in several countries about the increase
by the perpetrator and for a result to occur. In
of this pattern of the criminal beach of electronic
addition, this result must be based on that
media and this is the number of cases that began
behavior. That is, there is a causal link between
with this pattern of electronic harassment and then
them that leads to the assertion that it is the
led to incidents of assault, stalking, rape and
behavior of the agent that caused this harmful
murder (Al-Mana'sa, Al-Zoubi, 2017, p. 254).
outcome.
For the occurrence of the of the material element,
Second: the moral component of the
most legislations stipulate that the crime of
harassment crime
harassment require that the criminal activity take
place repeatedly at least twice (as stated in the It is the criminal intent or the desire and will with
British legislation on the crime of harassment), as which the act of harassment is associated as the
the actions involved in the pattern of behavior in criminal intent is the main indicator to determine
the crime of harassment, in their separate form, who is responsible for the crime. In this regard, no
cannot cause the occurrence that is a desired person is asked about a crime unless there is a
criminal outcome. However, most of the relationship between its material and its psyche,
legislations do not require that the act to which the and these materials are not reliable unless they are
description of harassment or persecution applies issued by a person who asks about them and bears
to the offense be repeated, in order for the the punishment. This means that it is chosen and
perpetrator to be considered harassment in case the offender is aware of its meanings and
this act constitutes an act of threat (ibid). consequences.

839
www.psychologyandeducation.net
PSYCHOLOGY AND EDUCATION (2021) 58(1): 833-843 ISSN: 00333077

Most of harassment legislations require that the Among the applications of the possible hateful or
perpetrator of the crime of harassment acts with that contain offensive, obscene or threatening
the intention of causing the target to any material, one of the manifestations of harassment
emotional and psychological harm or with the aim through modern information technology means is
of arousing his fears, as some of this requires that a high-ranking graduate from San Diego
evidence of this criminal intent. For example, the University of America committed the offense of
US federal law, require that the allegation should harassing girls by sending many aggressive e-
be proven that the accused acted with intent or mails that include a threat, due to his belief that
recklessly when he harasses the victim. For girls make fun of him (Dean, 2000, available at:
instance, the Canadian Penal Code where some of www.wired.com/news/politics ).
them are satisfied that the accused has acted in
In another case, the South Carolina District Court
any way that is reasonably expected to cause harm
in the US, state of Columbia sentenced James
and psychological pain to the victim or that arouse
Murphy, 38, to five years of probation, 500 hours
his fears (ibid).
of social service, and a fine of 12,000 US dollars,
In Britain, the Protection from Harassment Act, for using of modern information technology
issued in 1997, stipulated that a person should not media for harassment, threats by sending
behave in any manner that amounts to harassment electronic messages containing the previous
of another person while he knows or is supposed descriptions to Joel Legon and other Seattle staff.
to know that his behavior causes harassment to The convict admitted that he had an affair with
others. In France, Article 422 stipulated in the law Joel Legon during the period between 1984 and
(October 30, 1998) stipulates that anyone who 1990.
harasses a person when he knows or is supposed
In May 2002, the convict began sending dozens of
to know that his behavior seriously affects the
annoying and unwanted e-mails to Joelle and her
tranquility of the targeted person.
co-workers, and the convict concealed his identity
using a special e-mail program and created a
group in the name of the anti-Joel fan club and
Forms of cyber stalking crime
sent threatening messages through this alleged
Based on the above, we believe that harassment group, moreover, he sent an e-mail containing
crime takes the following forms: sexually explicit material to Joel's colleagues in a
way that showed Joel as the sender of this
The first form: Harassment via email
scandalous mail. (Jafar, 2013, p .: 300)
The idea of e-mail is based on exchanging
In Saudi Arabia, the Criminal Court in the Al-
electronic messages, files, graphics, pictures,
Ahsa region issued a one year and 10 months in
audio, programs… etc by sending them from the
prison sentence and 200 lashes in addition to a
sender to one or more persons using the e-mail
fine of 50,000 SR against a person who
address of the sender. (Ahmad, 2015, p. 113)
blackmailed a girl by hacking her email and
Despite the tremendous benefits provided by this obtaining her pictures and threatening to expose
service, it turns into a devastating bomb that her. The verdict came in implementation of the
threatens people and their interests if misused and Anti-Cyber Crime Law. In addition, a judicial
unsolicited e-mail with content is the most court in the Khobar region issued a verdict on a
common forms of harassment via e-mail (Yousif, young man with 60 lashes and 8 months
2011, pp: 110-111). imprisonment for a high school student, after he
photographed his colleague and published his
840
www.psychologyandeducation.net
PSYCHOLOGY AND EDUCATION (2021) 58(1): 833-843 ISSN: 00333077

pictures on the Internet after distorting them and information about the service provider are easily
inserting some clips In them and sending them via available as part of the message itself, and these
e-mail (the verdict was published in Al-Watan on public messages through chat groups can be
8/21/ 2008, the Saudi newspaper). accessed by anyone at any time and even after
years to write it down.
The second form: harassment through internet
(Chat), discussion forums, news groups and Consequently, the perpetrator can interrupt the
web pages. conversation of the targeted person by electronic
means or he targets the conversation system which
Online communication is known as the speaking
makes it impossible for a person to continue a
service used through devices connected to the
conversation with another person. Moreover, the
internet (computers), where the user of this
perpetrator can enter in a direct conversation that
service who wants to communicate with someone
offends the victim or he may leave an
writes the message that is displayed directly in
inappropriate message on the message board or in
front of the other person who wants to
the chat rooms or even about the victim.
communicate with him, where the other responds
in the same way, and it can be done by voice and Moreover, among the cases is a former security
the picture. guard - 50 years old - impersonating a 28-year-old
girl through chat rooms and web pages on the
With the emergence of different tools such as
Internet. These conversations and advertisements
internet, chat rooms and direct communication has
included the girl’s address and declaring her
become more popular among Internet users. Chat
desire and fondness to be raped by men. For a
rooms and newsgroups have become one of the
year, she was exposed to six rape attempts by men
most popular and well-known chat systems in the
who came to her house. (Maxwell, 2001, p: 6)
field of internet communication and an important
means that enables perpetrators of the crime of The third form: Harassment by targeting the
electronic harassment to identify and following up victim's computer:
their victims, defamation and threaten them. In
In this kind of electronic harassment, the
addition to using web pages, the user can, once
perpetrator of the crime targets the victim's
logged in, perform functions such as uploading
computer in a form of intimidation, or
and downloading programs and data, read news
surveillance so the criminal who has the ability
and bulletins and exchange messages with other
and technical competence can control access to
users through public message forums, which also
the victim's computer to collect information,
allows chat rooms and users to interact with each
deletes or modifies data or to exercise control over
other (Shawabkeh, 2011, 43-44).
a device victim's computer.
When a person enters a chat room, his name
An example of this type of electronic harassment
appears on the screen and joins the list of the
is the case of a woman who appeared on her
names of other person who are within the group.
computer screen with a message saying: “I will
In such case, the electronic harassment takes the
get you, and then the sender of this message
overt and public dimension instead of the private
opened the CD-ROM drive to prove to the woman
one. Therefore, when a person sends a public
that he was dominating her computer. (Jafar,
message to a news group conversation, this
2013, p. 306).
message becomes available to everyone so that
anyone can see it and keep a copy of it. In Results
addition to this, the person's name, email, and
841
www.psychologyandeducation.net
PSYCHOLOGY AND EDUCATION (2021) 58(1): 833-843 ISSN: 00333077

Through our study that dealt with the legislative 3. Ahmed Fathy Sorour (1985), Mediator in
confrontation with the crime of electronic the Penal Code, General Section), 4th
harassment (a comparative study), we were able to Edition, Dar Al-Nahda Al-Arabiya, Cairo.
reach several results:
4. Mahmoud Naguib Hosni (1989),
- The Jordanian Cybercrime Law does not Explanation of the Lebanese Penal Code
guarantee the necessary legal protection for the (General Section), 6th Edition, Dar Al-
crime of cyber harassment, because this law Taqwa for Printing, Beirut.
protects information and works without protecting
5. Muhammad Amin Al-Shawabkeh (2011),
the person from the harassment issued against
Computer and Internet Crimes, Dar Al
him.
Thaqafa for Publishing and Distribution,
- The threat is almost the only act of harassment Amman.
dealt with in the Jordanian and Arab legislations,
6. Kamel Al-Saeed (2009), Explanation of
including the new Arab legislations related to
General Provisions in the Penal Code,
combating information technology crimes, but
House of Culture for Publishing and
none of these legislations has been subject to the
Distribution, Amman.
text of the crime of electronic harassment.
7. Abdul-Rahman Tawfiq Ahmed (2016),
- The Jordanian jurisdiction, as well as the
Explanation of the Penal Code / Crimes
judiciary of Arab legislations, stands in a
against Persons, Dar Al-Thaqafa for
perplexed position in front of the crimes of
Publishing and Distribution, Amman.
electronic harassment, which prompts it to adapt it
to another criminal adaptation. 8. Osama Ahmad Al- Mana'sa, Hilal
Muhammad Al-Zoubi (2017), Electronic
Recommendations:
Information Systems Technology Crimes,
- The Jordanian legislator must intervene in Dar Al Thaqafa for Publishing and
enacting a legal text within the Cyber crime Law Distribution, Amman.
to confront the crime of electronic harassment.
9. Yuosif Hassan Yuosif (2011),
- Not tolerating the perpetrators, along with the International Internet Crimes, National
need to work on increasing legal awareness of the Center for Legal Publications, Cairo.
victims of this crime and providing them with
10. Ali Abdel-Qader Al-Qahwaji (2002),
protection.
Explanation of the Penal Code, Al-Halabi
Legal Publications, Beirut.

References: 11. Tarek Afifi Sadiq Ahmed (2015), Mobile


Phone Crimes, National Center for Legal
Arab references
Issues, Cairo.
1. Muhammad Obaid Al-Kaibi (2005),
Foreign references
Crimes Arising from the Illicit Use of the
Internet, Arab Mahdah House, Cairo. 12. Jonathan Clough (2010), Principles of
Cyber Crime, Cambridge university press.
2. Ali Abboud Jaafar (2013), Modern
Information Technology Crimes against 13. N. H. Goodno )2007( Cyberstalking a new
Persons and the Government, 1st Edition, crime: Evaluating the effectiveness of cur-
Zain Human Rights Publications, Beirut.
842
www.psychologyandeducation.net
PSYCHOLOGY AND EDUCATION (2021) 58(1): 833-843 ISSN: 00333077

(2) rent state and federal laws - Missouri


Law Review

14. .Emily Finish ( )2000Stalking the perfect


stalking law: An evaluation of the efficacy
of (3) the protection from Harassment Act
1997 Criminal Law Review

15. Cullen P, QC (1997) Computer Crime " in


Edwards L and Waelde C, (eds) Law and
The Internet, Regulating Cyberspace
Oxford, Hart Publishing.

16. Mac Graw - Sexual harassment in cyber


space: The problem of unwelcome (1)
Email 1995 - Rutgers computer and
technology law journal -

17. K .Dean (2000( The epidemic of Cyber


stalking - Wired news - available at :
(www .wired .com / news / politics.

18. Medlin Amanda (2002) Stalking to Cyber


stalking ,a Problem

19. Caused by the Internet Law and the


Internet ,Fall 2002 papers ,Georgia State
University Col ledge of Law ,140-
www.gsula.gsu.edu

20. Angela Maxwell )2001( Cyber stalking -


Department of psychology - Auckland
University

21. R. Purcell, M. Pathe and P. E. Mullen –


(2004) Stalking : Defining and Prosecuting
a new category of offending - International
Journal of Law and Psychiatry.

843
www.psychologyandeducation.net

You might also like