Sextortion: Cybersecurity, teenagers, and remote sexual assault
dc.contributor.author | Wittes, B., Poplin, C., Jurecic, Q., & Spera, C. | |
dc.date.accessioned | 2016-06-24T14:22:44Z | |
dc.date.available | 2016-06-24T14:22:44Z | |
dc.date.issued | 2016 | |
dc.description.abstract | This paper represents an effort―to our knowledge the first―to study in depth and across jurisdictions the problems of sextortion. In it, we look at the methods used by perpetrators and the prosecutorial tools authorities have used to bring offenders to justice. We hope that by highlighting the scale and scope of the problem, and the brutality of these cases for the many victims they affect, to spur a close look at both state and federal laws under which these cases get prosecuted. | en_US |
dc.identifier.citation | Wittes, B., Poplin, C., Jurecic, Q., & Spera, C. (2016). Sextortion: Cybersecurity, teenagers, and remote sexual assault. Washington, DC: Center for Technology Innovation at Brookings. | en_US |
dc.identifier.uri | http://www.brookings.edu/~/media/Research/Files/Reports/2016/05/sextortion/sextortion1.pdf?la=en | |
dc.identifier.uri | http://hdl.handle.net/11212/2818 | |
dc.language.iso | en_US | en_US |
dc.publisher | Center for Technology Innovation at Brookings | en_US |
dc.subject | online victimization | en_US |
dc.subject | sextortion | en_US |
dc.subject | internet | en_US |
dc.subject | research | en_US |
dc.title | Sextortion: Cybersecurity, teenagers, and remote sexual assault | en_US |
dc.type | Article | en_US |