The cyber-industrialization of catfishing and romance fraud

F Wang, V Topalli - Computers in Human Behavior, 2024 - Elsevier
We examine a new form of online fraud, which we refer to as Intimacy Manipulated Fraud
Industrialization (IMFI). This type of fraud bears a strong resemblance to traditional online …

The Help-Seeking Behavior of Victims of Image-Based Sexual Harassment and Abuse: A Scoping Review

V Pijlman, M Waardt, L Schoonmade… - … Violence, & Abuse, 2024 - journals.sagepub.com
Image-based sexual harassment and abuse (IBSHA) has recently gained scientific attention.
To date, research has primarily focused on victim characteristics and impact, while little …

“I did not want to make a bigger deal out of it than it was”: A mixed-method study on the help-seeking behavior of victims of image-based sexual harassment and …

V Pijlman, V Eichelsheim… - Journal of …, 2024 - journals.sagepub.com
Experiencing image-based sexual harassment and abuse (IBSHA), or the sending of
unsolicited nude or sexual images and the nonconsensual taking, sharing, or threats to …

“Cutie, click on the link”: A forensic analysis of URLs

E Kamar, RL O'Malley, CJ Howell, D Maimon… - Computers in Human …, 2025 - Elsevier
This article presents an examination of the technological components of the online sexual
grooming abuse process. While much of the existing literature on online grooming and child …

Breaking the silence: Examining process of cyber sextortion and victims' coping strategies

F Wang - International Review of Victimology, 2024 - journals.sagepub.com
Sextortion is the threat to distribute intimate, sexual materials unless a victim complies with
particular demands. Cyber sextortion, specifically, takes advantage of the Internet's …

[HTML][HTML] Psychological Factors leading to Sextortion: The Role of Personality, Emotional Factors and Sexual Needs in Victimisation.

C Tzani, M Ioannou, R Fletcher, TJV Williams - Computers in Human …, 2024 - Elsevier
Sextortion often begins with a perpetrator contacting a victim through social media platforms,
dating websites, or messaging applications. Victims share their explicit content, allowing the …

[图书][B] The Language of Romance Crimes: Interactions of Love, Money, and Threat

E Carter - 2024 - cambridge.org
Exploring the interplay of love, money and threat in romance fraud, this Element reveals how
language is used to persuade, manipulate, and threaten without causing alarm. It provides …

“Anything I could do to not have it paralyze me was welcome”: Coping strategies employed by survivors of image-based sexual abuse.

JA Siegel, AM Miller, MA Krieger… - Psychology of …, 2024 - psycnet.apa.org
Objective: Image-based sexual abuse (IBSA) is a form of technology-facilitated sexual
violence in which intimate photos or videos are nonconsensually taken, shared, and/or …

[HTML][HTML] Exploring the impact of sextortion on adult males: a narrative approach

RJ Notté - Technology in Society, 2024 - Elsevier
This research provides a comprehensive exploration into sextortion, specifically focusing on
adult male victims—an understudied demographic in the realm of Image Based Sexual …

Sextortion, Nonconsensual Pornography, and Mental Health Outcomes Across the Lifespan: The Moderating Role of Gender, Age, and Sexual Orientation

A Miguel-Alvaro, J Martínez-Bacaicoa, S Wachs… - Sexuality Research and …, 2024 - Springer
Introduction Although the association between being a victim of image-based sexual abuse
(IBSA) and psychological maladjustment has been documented in previous research …