Cyber Sextortion: An Exploratory Analysis of Different Perpetrators Engaging in a Similar Crime

Sextortion, a portmanteau of “sexual” and “extortion,” is the threat to distribute intimate, sexual materials unless a victim complies with certain demands. Cyber sextortion is part of a larger continuum of image-based sexual offending in which images are used for harm. Despite the serious nature of...

Descripción completa

Guardado en:  
Detalles Bibliográficos
Autores principales: O’Malley, Roberta Liggett (Autor) ; Holt, Karen M. (Autor)
Tipo de documento: Electrónico Artículo
Lenguaje:Inglés
Publicado: 2022
En: Journal of interpersonal violence
Año: 2022, Volumen: 37, Número: 1/2, Páginas: 258-283
Acceso en línea: Volltext (lizenzpflichtig)
Journals Online & Print:
Gargar...
Verificar disponibilidad: HBZ Gateway
Palabras clave:

MARC

LEADER 00000caa a22000002c 4500
001 1783529989
003 DE-627
005 20211224235909.0
007 cr uuu---uuuuu
008 211223s2022 xx |||||o 00| ||eng c
024 7 |a 10.1177/0886260520909186  |2 doi 
035 |a (DE-627)1783529989 
035 |a (DE-599)KXP1783529989 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a O’Malley, Roberta Liggett  |e VerfasserIn  |4 aut 
245 1 0 |a Cyber Sextortion: An Exploratory Analysis of Different Perpetrators Engaging in a Similar Crime 
264 1 |c 2022 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Sextortion, a portmanteau of “sexual” and “extortion,” is the threat to distribute intimate, sexual materials unless a victim complies with certain demands. Cyber sextortion is part of a larger continuum of image-based sexual offending in which images are used for harm. Despite the serious nature of this crime, there exists a dearth of empirical knowledge of sextortion. This article employed a qualitative content analysis of media articles and court documents to explore the crimes of 152 cyber sextortion offenders. Characteristics of offenders, victims, demands, and methodology were identified and synthesized to generate a qualitative understanding of offenders who employed cyber sextortion. The results revealed four different themes of offenders based on crime characteristics: minor-focused cyber sextortion offenders, cybercrime cyber sextortion offenders, intimately violent cyber sextortion offenders, and transnational criminal cyber sextortion offenders. The diverse nature of cyber sextortion has implications for crime control policies. Certain offenders are more likely to be apprehended and prosecuted depending on the crime victim and methodology. In addition, there has been a lack of legislative action targeting cyber sextortion, which limits legal recourse available for victims. We discuss the contribution of this work to the broader literature on cyber sextortion and address some of the challenges that this crime presents to the criminal justice system. 
650 4 |a Sexual Violence 
650 4 |a Cybercrime 
650 4 |a Image-based sexual abuse 
650 4 |a Revenge Porn 
650 4 |a sextortion 
700 1 |a Holt, Karen M.  |e VerfasserIn  |0 (DE-588)1206224959  |0 (DE-627)1692190431  |4 aut 
773 0 8 |i Enthalten in  |t Journal of interpersonal violence  |d London [u.a.] : Sage, 1986  |g 37(2022), 1/2, Seite 258-283  |h Online-Ressource  |w (DE-627)324614721  |w (DE-600)2028900-5  |w (DE-576)276556305  |x 1552-6518  |7 nnas 
773 1 8 |g volume:37  |g year:2022  |g number:1/2  |g pages:258-283 
856 4 0 |u https://doi.org/10.1177/0886260520909186  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
935 |a mkri 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4026372081 
LOK |0 003 DE-627 
LOK |0 004 1783529989 
LOK |0 005 20211223061535 
LOK |0 008 211223||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)KrimDok#2021-12-22#26B725080ECBCB37386A473E3BDE08A2331F2B53 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a zota 
ORI |a SA-MARC-krimdoka001.raw