Sextortion: Cybersecurity, teenagers, and remote sexual assault

dc.contributor.authorWittes, B., Poplin, C., Jurecic, Q., & Spera, C.
dc.date.accessioned2016-06-24T14:22:44Z
dc.date.available2016-06-24T14:22:44Z
dc.date.issued2016
dc.description.abstractThis paper represents an effort―to our knowledge the first―to study in depth and across jurisdictions the problems of sextortion. In it, we look at the methods used by perpetrators and the prosecutorial tools authorities have used to bring offenders to justice. We hope that by highlighting the scale and scope of the problem, and the brutality of these cases for the many victims they affect, to spur a close look at both state and federal laws under which these cases get prosecuted.en_US
dc.identifier.citationWittes, B., Poplin, C., Jurecic, Q., & Spera, C. (2016). Sextortion: Cybersecurity, teenagers, and remote sexual assault. Washington, DC: Center for Technology Innovation at Brookings.en_US
dc.identifier.urihttp://www.brookings.edu/~/media/Research/Files/Reports/2016/05/sextortion/sextortion1.pdf?la=en
dc.identifier.urihttp://hdl.handle.net/11212/2818
dc.language.isoen_USen_US
dc.publisherCenter for Technology Innovation at Brookingsen_US
dc.subjectonline victimizationen_US
dc.subjectsextortionen_US
dc.subjectinterneten_US
dc.subjectresearchen_US
dc.titleSextortion: Cybersecurity, teenagers, and remote sexual assaulten_US
dc.typeArticleen_US

Files