Skip to main content
Log in

Blackmail on social media: what do we know and what remains unknown?

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

Increasing numbers of people fall victim to blackmail on social media. Yet, there has been little attempt to synthesise research on this topic. This study seeks to address this gap by investigating what is currently known about blackmail and the disclosure of sensitive information on social media. Two rapid reviews were conducted and based on their findings those who disclose more information, are younger, female and willing to use social media to create and distribute images are more likely to fall victim to blackmail on social media. However, worry about privacy and the possibility of becoming a victim of blackmail on social media did not necessarily prevent the disclosure of sensitive information. The implications of these findings for interventions and future research are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Abramova, O., A. Wagner, H. Krasnova, and P. Buxmann. 2017. Understanding self-disclosure on social networking sites-A literature review. Americas Conference on Information Systems 23: 1–10.

    Google Scholar 

  • Ahmed, A., E. Awad, S. Farouq, R. Ayesh, M. Mohammed, N. Alneqabi, M. Abdulahamiad, and J. Ismail. 2017 Online blackmail. Crimes feed on the boom of social networking. https://www.albayan.ae/across-the-uae/news-and-reports/2017-07-24-1.3009066. Accessed 17 December 2019.

  • Al Lawati, H. 2016. Big jump in cyber blackmail cases in Oman. https://timesofoman.com/article/93557 Accessed 10 February 2020.

  • Al makrami, H. 2015. Online self-disclosure across cultures: A study of Facebook use in Saudi Arabia and Australia. PhD Thesis, Queensland University of Technology, Australia.

  • Al Neyadi, A., A. Al Kaabi, L. Al Kaabi, M. Al Ghufli, M. Al Shamsi, and M. Khan. 2015. Internet governance and cyber crimes in UAE. International Journal of Scientific & Technology Research 4 (11): 350–357.

    Google Scholar 

  • Al Qahtani, E., M. Shehab, and A. Aljohani. 2018. The effectiveness of fear appeals in increasing smartphone locking behavior among Saudi Arabians. https://www.usenix.org/conference/soups2018/presentation/qahtani. Accessed 17 December 2019.

  • Al Saggaf, Y. 2016. An exploratory study of attitudes towards privacy in social media and the threat of blackmail: The views of a group of Saudi women. The Electronic Journal of Information Systems in Developing Countries 75 (1): 1–16.

    Article  Google Scholar 

  • Al Salehi, B. 2016. Blackmailing reportage for year 2016, Information Technology Authority. Oman. https://ita.gov.om/ITAPortal/MediaCenter/Document_detail.aspx?NID=109. Accessed 17 December 2019.

  • Alam, S. 2018. E-extortion: how do teenagers’ suicide? https://www.ida2at.com/cyber-extortion-how-do-teenagers-suicide/. Accessed 17 December 2019.

  • Ali, S., N. Islam, A. Rauf, I. Din, M. Guizani, and J. Rodrigues. 2018. Privacy and security issues in online social networks. Future Internet 10 (114): 1–12.

    Google Scholar 

  • Alseyah, A. 2011. Symposium on extortion: Concept—causes—treatment. Centre for Women Studies. Riyadh. https://www.feqhup.com/uploads/145612377634481.pdf. Accessed 17 December 2019.

  • Ampong, G., A. Mensah, A. Adu, J. Addae, O. Omoregie, and K. Ofori. 2018. Examining self-disclosure on social networking sites: A flow theory and privacy perspective. Behavioural Sciences 8 (6): 58.

    Article  Google Scholar 

  • Bauer, C. and M. Schiffinger. 2016. Perceived risks and benefits of online self-disclosure: Affected by culture? A meta-analysis of cultural differences as moderators of privacy calculus in person-to-crowd settings. https://aisel.aisnet.org/ecis2016_rp/68. Accessed 10 February 2020.

  • Bauer, C., K.S. Schmid, and C. Strauss. 2018. An open model for researching the role of culture in online self-disclosure. https://aisel.aisnet.org/hicss-51/in/global_issues/3/. Accessed 17 December 2019.

  • Bazarova, N., and H. Choi. 2014. Self-disclosure in social media: Extending the functional approach to disclosure motivations and characteristics on social network sites. Journal of Communication 64 (4): 635–657.

    Article  Google Scholar 

  • Bevan-Dye, A.L., and U. Akpojivi. 2016. South African Generation y students’ self-disclosure on Facebook. South African Journal of Psychology 46 (1): 114–129.

    Article  Google Scholar 

  • Bronstein, J. 2014. Creating possible selves: Information disclosure behaviour on social networks. Information Research: An International Electronic Journal 19 (1): n1.

    Google Scholar 

  • Campbell, A., T. Forbes, A. McLaughlin, G. Davidson, M. Butler, C. Blair, N. Menabney, and C. McKeaveney. 2019. Rapid evidence review: The relationship between alcohol and mental health problems. London: Alcohol Change UK.

    Google Scholar 

  • Chen, S., B. Shao, and K. Zhi. 2018. Predictors of Chinese users’ location disclosure behavior: An empirical study on WeChat. Information 9 (9): 219.

    Article  Google Scholar 

  • Cheung, C., Z.W. Lee, and T.K. Chan. 2015. Self-disclosure in social networking sites: The role of perceived cost, perceived benefits and social influence. Internet Research 25 (2): 279–299.

    Article  Google Scholar 

  • Derlaga, V.J., and J.H. Berg. 1987. Self-disclosure: Theory, research, and therapy. London: Plenum Press.

    Book  Google Scholar 

  • EUROPOL. 2017. Online sexual coercion and extortion as a form of crime affecting children: law enforcement perspective. https://www.europol.europa.eu/publications-documents/online-sexual-coercion-and-extortion-form-of-crime-affecting-children-law-enforcement-perspective. Accessed 17 December 2019.

  • Hallam, C., and G. Zanella. 2017. Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Computers in Human Behaviour 68: 217–227.

    Article  Google Scholar 

  • Hamilton-Giachritsis, C., E. Hanson, H.C. Whittle, and A.R. Beech. 2017. Everyone deserves to be happy and safe. A mixed methods study exploring how online and offline child sexual abuse impact young people and how professionals respond to it. London: NSPCC.

    Google Scholar 

  • Heravi, A., S. Mubarak, and K.K.R. Choo. 2018. Information privacy in online social networks: Uses and gratification perspective. Computers in Human Behavior 84: 441–459.

    Article  Google Scholar 

  • Hofstetter, R., R. Rüppell, and L.K. John. 2017. Temporary sharing prompts unrestrained disclosures that leave lasting negative impressions. Proceedings of the National Academy of Sciences 114 (45): 11902–11907.

    Article  Google Scholar 

  • Kapoor, K.K., K. Tamilmani, N.P. Rana, P. Patil, Y.K. Dwivedi, and S. Nerur. 2018. Advances in social media research: Past, present and future. Information Systems Frontiers 20 (3): 531–558.

    Article  Google Scholar 

  • Kennedy, C., and A. Phippen. 2018. Sexting and sexting behaviour-“Oh you’re all children, children do silly things. You’ll be fine. Get over it!”. Entertainment Law Review 28 (6): 1–13.

    Google Scholar 

  • Khangura, S., K. Konnyu, R. Cushman, J. Grimshaw, and D. Moher. 2012. Evidence summaries: The evolution of a rapid review approach. Systematic Reviews 1 (1): 10.

    Article  Google Scholar 

  • Kopecký, K. 2016. Czech children and Facebook: A quantitative survey. Telematics and Informatics 33 (4): 950–958.

    Article  Google Scholar 

  • Kopecký, K. 2017. Online blackmail of Czech children focused on so-called “sextortion” (analysis of culprit and victim Behaviours). Telematics and Informatics 34 (1): 11–19.

    Article  Google Scholar 

  • Krämer, N.C., and S. Winter. 2008. Impression management 20: The relationship of self-esteem, extraversion, self-efficacy, and self-presentation within social networking sites. Journal of Media Psychology 20 (3): 106–116.

    Article  Google Scholar 

  • Krasnova, H., S. Spiekermann, K. Koroleva, and T. Hildebrand. 2010. Online social networks: Why we disclose. Journal of Information Technology 25 (2): 109–125.

    Article  Google Scholar 

  • Li-Barber, K.T. 2012. Self-disclosure and student satisfaction with Facebook. Computers in Human Behaviour 28 (2): 624–630.

    Article  Google Scholar 

  • Malik, A., K. Hiekkanen, A. Dhir, and M. Nieminen. 2016. Impact of privacy, trust and user activity on intentions to share Facebook photos. Journal of Information, Communication and Ethics in Society 14 (4): 364–382.

    Article  Google Scholar 

  • Monaghan, A. 2017. The impact of Self-Generated Images in online pornography. Middlesex University: Doctoral Dissertation.

  • National Crime Council. 2020. Sextortion. https://www.nationalcrimeagency.gov.uk/what-we-do/crime-threats/kidnap-and-extortion/sextortion-webcam-blackmail Accessed 27 February 2020.

  • NCCMT. 2010. Methods: Synthesis 1. Rapid reviews: Methods and implications. Hamilton: National Collaborating Centre for Methods and Tools.

  • Office of National Statistics. 2019. Crime in England and Wales: Year ending December 2018. https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/bulletins/crimeinenglandandwales/yearendingdecember2018 Accessed 27 February 2020.

  • Ohm, P. 2015. Sensitive information. Southern California Law Review 88 (5): 1125–1196.

    Google Scholar 

  • Orzech, K.M., W. Moncur, A. Durrant, S. James, and J. Collomosse. 2017. Digital photographic practices as expressions of personhood and identity: Variations across school leavers and recent retirees. Visual Studies 32 (4): 313–328.

    Article  Google Scholar 

  • Pace, R., P. Pluye, G. Bartlett, A.C. Macaulay, J. Salsberg, J. Jagosh, and R. Seller. 2012. Testing the reliability and efficiency of the pilot Mixed Methods Appraisal Tool (MMAT) for systematic mixed studies review. International Journal of Nursing Studies 49 (1): 47–53.

    Article  Google Scholar 

  • Quayle, E., L.S. Jonsson, K. Cooper, J. Traynor, and C.G. Svedin. 2018. Children in identified sexual images-who are they? Self-and non-self-taken images in the international child sexual exploitation image database 2006–2015. Child Abuse Review 27 (3): 223–238.

    Article  Google Scholar 

  • Raas, K.M.R. 2015. The threat of social media blackmailing in the hospitality industry: when customers misuse their power. Bachelor's thesis: University of Twente.

  • Salleh, N., R. Hussein, N. Mohamed, and I.J. Aditiawarman. 2013. An empirical study of the factors influencing information disclosure behaviour in social networking sites. In 2013 International Conference on Advanced Computer Science Applications and Technologies (pp. 181–185). IEEE.

  • Sancho, D. 2017. Digital extortion: A forward-looking view. https://documents.trendmicro.com/assets/wp-digital-extortion-a-forward-looking-view.pdf Accessed 20 February 2020.

  • Sawer, P. 2016. Huge rise in 'sextortion' by crime gangs using social media to entrap victims. https://www.telegraph.co.uk/news/2016/11/30/huge-rise-sextortion-crime-gangs-using-social-media-entrap-victims/ Accessed 27 February 2020.

  • Seidman, G. 2014. Expressing the “true self” on Facebook. Computers in Human Behaviour 31: 367–372.

    Article  Google Scholar 

  • Tow, W.N.F.H., P. Dell, and J. Venable. 2010. Understanding information disclosure behaviour in Australian Facebook users. Journal of Information Technology 25 (2): 126–136.

    Article  Google Scholar 

  • Tricco, A.C., E.V. Langlois, and S.E. Straus. 2017. Rapid reviews to strengthen health policy and systems: A practical guide. Geneva: World Health Organisation.

    Google Scholar 

  • Van Gool, E., J. Van Ouytsel, K. Ponnet, and M. Walrave. 2015. To share or not to share? Adolescents’ self-disclosure about peer relationships on Facebook: An application of the Prototype Willingness Model. Computers in Human Behavior 44: 230–239.

    Article  Google Scholar 

  • Van Ouytsel, J., E. Van Gool, M. Walrave, K. Ponnet, and E. Peters. 2017. Sexting: Adolescents’ perceptions of the applications used for, motives for, and consequences of sexting. Journal of Youth Studies 20 (4): 446–470.

    Google Scholar 

  • Williams, M., M. Butler, A. Jurek-Loughrey, and S. Sezer. 2019. Offensive communications: Exploring the challenges involved in policing social media. Contemporary Social Science. https://doi.org/10.1080/21582041.2018.1563305.

    Article  Google Scholar 

  • Yar, M. 2018. A failure to regulate? The demands and dilemmas of tackling illegal content and behaviour on social media. International Journal of Cybersecurity Intelligence & Cybercrime 1 (1): 5–20.

    Article  Google Scholar 

  • Yu, S. 2014. Does low self-control explain voluntary disclosure of personal information on the Internet. Computers in Human Behavior 37: 210–215.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michelle Butler.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al Habsi, A., Butler, M., Percy, A. et al. Blackmail on social media: what do we know and what remains unknown?. Secur J 34, 525–540 (2021). https://doi.org/10.1057/s41284-020-00246-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/s41284-020-00246-2

Keywords

Navigation