The cyber-industrialization of catfishing and romance fraud
We examine a new form of online fraud, which we refer to as Intimacy Manipulated Fraud
Industrialization (IMFI). This type of fraud bears a strong resemblance to traditional online …
Industrialization (IMFI). This type of fraud bears a strong resemblance to traditional online …
The Help-Seeking Behavior of Victims of Image-Based Sexual Harassment and Abuse: A Scoping Review
V Pijlman, M Waardt, L Schoonmade… - … Violence, & Abuse, 2024 - journals.sagepub.com
Image-based sexual harassment and abuse (IBSHA) has recently gained scientific attention.
To date, research has primarily focused on victim characteristics and impact, while little …
To date, research has primarily focused on victim characteristics and impact, while little …
“I did not want to make a bigger deal out of it than it was”: A mixed-method study on the help-seeking behavior of victims of image-based sexual harassment and …
V Pijlman, V Eichelsheim… - Journal of …, 2024 - journals.sagepub.com
Experiencing image-based sexual harassment and abuse (IBSHA), or the sending of
unsolicited nude or sexual images and the nonconsensual taking, sharing, or threats to …
unsolicited nude or sexual images and the nonconsensual taking, sharing, or threats to …
“Cutie, click on the link”: A forensic analysis of URLs
This article presents an examination of the technological components of the online sexual
grooming abuse process. While much of the existing literature on online grooming and child …
grooming abuse process. While much of the existing literature on online grooming and child …
Breaking the silence: Examining process of cyber sextortion and victims' coping strategies
F Wang - International Review of Victimology, 2024 - journals.sagepub.com
Sextortion is the threat to distribute intimate, sexual materials unless a victim complies with
particular demands. Cyber sextortion, specifically, takes advantage of the Internet's …
particular demands. Cyber sextortion, specifically, takes advantage of the Internet's …
[HTML][HTML] Psychological Factors leading to Sextortion: The Role of Personality, Emotional Factors and Sexual Needs in Victimisation.
Sextortion often begins with a perpetrator contacting a victim through social media platforms,
dating websites, or messaging applications. Victims share their explicit content, allowing the …
dating websites, or messaging applications. Victims share their explicit content, allowing the …
[图书][B] The Language of Romance Crimes: Interactions of Love, Money, and Threat
E Carter - 2024 - cambridge.org
Exploring the interplay of love, money and threat in romance fraud, this Element reveals how
language is used to persuade, manipulate, and threaten without causing alarm. It provides …
language is used to persuade, manipulate, and threaten without causing alarm. It provides …
“Anything I could do to not have it paralyze me was welcome”: Coping strategies employed by survivors of image-based sexual abuse.
JA Siegel, AM Miller, MA Krieger… - Psychology of …, 2024 - psycnet.apa.org
Objective: Image-based sexual abuse (IBSA) is a form of technology-facilitated sexual
violence in which intimate photos or videos are nonconsensually taken, shared, and/or …
violence in which intimate photos or videos are nonconsensually taken, shared, and/or …
[HTML][HTML] Exploring the impact of sextortion on adult males: a narrative approach
RJ Notté - Technology in Society, 2024 - Elsevier
This research provides a comprehensive exploration into sextortion, specifically focusing on
adult male victims—an understudied demographic in the realm of Image Based Sexual …
adult male victims—an understudied demographic in the realm of Image Based Sexual …
Sextortion, Nonconsensual Pornography, and Mental Health Outcomes Across the Lifespan: The Moderating Role of Gender, Age, and Sexual Orientation
Introduction Although the association between being a victim of image-based sexual abuse
(IBSA) and psychological maladjustment has been documented in previous research …
(IBSA) and psychological maladjustment has been documented in previous research …