Insults Against Women in Telegram (Empirical Study based on the Theory of Neutralization Techniques)

Document Type : Original Article


1 Assistant Professor, dept. of Humanities, University of Maragheh, Maragheh, Iran

2 Bachelor of Law, dept. of Humanities, University of Maragheh, Maragheh, Iran


Among the common crimes and deviations in virtual social networks, the crime of verbal abuse (insult) against women is the most prevalent and common. Some characteristics of social networks, such as the remoteness of communication, being virtual and intangible, the possibility of anonymity, are effective in explaining the high number of these crimes. These features give criminals the opportunity to excuse their actions with ease and lessen the twinge in their conscience. However, the main source of women's victimization should be found in the human interactions of cyber space and not its structure. Criminals sometimes justify their behavior by denying responsibility or denying injury and sometimes with the thought that the victim deserves the crime. This article tries to reveal the cause and manner of verbal abuse against women in Telegram social network. For this purpose, the analysis has been built upon the methods of a criminological theory known as the theory of "neutralization techniques". The data was collected through observation and indirect interview and the method used to analyze this data is descriptive-analytical. The findings of this research indicate that in the case of the slightest unusual behavior of a female user, she faces more and more severe reactions than in the same case for a man. Regarding their abusive behavior, they consider the virtual and intangible nature of the injuries or the guilt of the victim to be enough to neutralize their conscience.


Main Subjects

  • Halder, and J. Karuppannan, “Cybercrime and Victimization of Women; Laws, Rights and Regulations”, Pennsylvania: IGI Global, 2012. DOI:10.4018/978-1-60960-830-9.
  • Hajidehabadi, and E. Salimi, “The Etiology of Women's Victimization in Social Networks”, Quarterly Journal of Woman and Society, vol. 9, no. 35, pp. 117-142, 2018.
  • Sheidaeian, R. Dehghani, S. M. Mirkhalili, and S. Darabi, “Criminological Explanation of Women Victimization in Social Networks; with Emphasis on objectification Theory”, Criminal Law and Criminology Modares, vol. 1, no. 2, pp. 67-95, 2021.
  • Hajidehabadi, and E. Salimi, “Delinquency and Victimization of Digital Natives; from Etiology to Response in the Restorative Justice Paradigm”, Criminal law and Criminology Studies, vol. 49, no. 1, pp. 41-63, 2019.
  • Williams, “Virtually Criminal: Crime, Deviance and Regulation Online”, London, New York: Routledge, 2006.
  • R. Ameli, “A two-space approach to damages, crimes, laws and policies of 2cyberspace”, Tehran: Amirkabir Publications, 2011.
  • Sadeqi, M. Foroutan, and S. Ebrahimi, “The Criminology Approach to Online Threats to Girls”, Criminal Law Doctrines, vol. 17, no. 20, pp. 215-234, 2021.
  • Melville, K. Morgan, G. Nooris, Z. Walkington, “Theories of Crime”, London: Routledge, 2006. DOI:
  • H. Najafi Ebrandabadi, and H. Hashembeigi, “Encyclopedia of Criminology”, Tehran: Ganj-e Danesh Publications, 2018.
  • M. Sykes, and D. Metza, “Techniques of Neutralization: A Theory of Delinquency”, American Sociological Review, vol. 22, no. 6, pp. 664-670, 1957.
  • White and F. Haynes, “Crime and Criminology”, Oxford: Oxford University Press ANZ, 2017.M. Williams, “Virtually Criminal: Crime, Deviance and Regulation Online”, London, New York: Routledge, 2006.
  • B. Snipes, T. J. Bernard, and A. L. Gerould, “Vold's Theoretical Criminology”, Oxford: Oxford University Press, 2019.
  • R. Ameli, “Two-dimensional studies computer games; Value - local approach to games”, Tehran: Amirkabir Publications, 2015.
  • Sourander, A. Brunstein Klomek, M. Ikonen, J. Lindroos, T. Luntamo, M. Koskelainen, T. Ristkari, and H. Helenius, “Psychosocial Risk Factors Associated With Cyberbullying among Adolescents: a population-based study”, Arch Gen Psychiatry, vol. 67, no. 7, pp. 720-728, 2010.
  • K. Citron, “Civil Rights in the Cyber World”, JD Alumni Magazine, Iss. 1, Article 10, pp. 32-33, 2009.