4.3 Article

Cyber Sextortion: An Exploratory Analysis of Different Perpetrators Engaging in a Similar Crime

期刊

JOURNAL OF INTERPERSONAL VIOLENCE
卷 37, 期 1-2, 页码 258-283

出版社

SAGE PUBLICATIONS INC
DOI: 10.1177/0886260520909186

关键词

sextortion; revenge porn; image-based sexual abuse; cybercrime; sexual violence

向作者/读者索取更多资源

This study explored the crimes of 152 cyber sextortion offenders using qualitative content analysis of media articles and court documents. Four different types of offenders were identified, highlighting the diverse nature of cyber sextortion and its implications for crime control policies. The lack of legislative action targeting cyber sextortion also limits legal recourse for victims, presenting challenges for the criminal justice system.
Sextortion, a portmanteau of sexual and extortion, is the threat to distribute intimate, sexual materials unless a victim complies with certain demands. Cyber sextortion is part of a larger continuum of image-based sexual offending in which images are used for harm. Despite the serious nature of this crime, there exists a dearth of empirical knowledge of sextortion. This article employed a qualitative content analysis of media articles and court documents to explore the crimes of 152 cyber sextortion offenders. Characteristics of offenders, victims, demands, and methodology were identified and synthesized to generate a qualitative understanding of offenders who employed cyber sextortion. The results revealed four different themes of offenders based on crime characteristics: minor-focused cyber sextortion offenders, cybercrime cyber sextortion offenders, intimately violent cyber sextortion offenders, and transnational criminal cyber sextortion offenders. The diverse nature of cyber sextortion has implications for crime control policies. Certain offenders are more likely to be apprehended and prosecuted depending on the crime victim and methodology. In addition, there has been a lack of legislative action targeting cyber sextortion, which limits legal recourse available for victims. We discuss the contribution of this work to the broader literature on cyber sextortion and address some of the challenges that this crime presents to the criminal justice system.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.3
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据