Sextortion: A continuing mode of cyber crime Article Swipe
Sextortion, a form of cybercrime obvious by the exploitation of intimate pictures or videos for fiscal, sexual, or psychological advantage, has become an rising global threat in the digital age. This crime includes forcing victims into compliance—often by bullying to openly release flexible content if specific demands are not met. As wrongdoers exploit the suppression and reach provided by digital platforms, sextortion cases progressively target vulnerable individuals, including juveniles and young adults. The emotional influence on sufferers is thoughtful, ranging from apprehension and depression to extreme cases of suicide, underlining the urgent need for robust legal, technical, and edifying measures. These abstract goals to discuss the skeletons of sextortion as a contemporary cybercrime, investigating into its psychological, legal, and technical dimensions. Furthermore, it highpoints the urgent need for a multi-disciplinary method that involves lawmakers, cybersecurity specialists, educators, and numerical platform providers to implement preventive measures and effective response campaigns. In hypothesis, sextortion underscores the obligation for a resilient framework to shield individuals from mistreatment in an increasingly digitalized the world.
Related Topics
- Type
- other
- Language
- en
- Landing Page
- https://doi.org/10.5281/zenodo.17841980
- OA Status
- green
- OpenAlex ID
- https://openalex.org/W7109676356
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W7109676356Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5281/zenodo.17841980Digital Object Identifier
- Title
-
Sextortion: A continuing mode of cyber crimeWork title
- Type
-
otherOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-11-28Full publication date if available
- Authors
-
Neha DasList of authors in order
- Landing page
-
https://doi.org/10.5281/zenodo.17841980Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.5281/zenodo.17841980Direct OA link when available
- Concepts
-
Exploit, Computer security, Apprehension, Cybercrime, Internet privacy, Forcing (mathematics), Public relations, Obligation, Evasion (ethics), Mode (computer interface), Criminology, Computer science, Vulnerability (computing), Digital Revolution, Economic Justice, Authorization, Digital forensics, Business, Psychology, Identity theft, Cyber crime, Sanctions, Anxiety, Poison control, Blame, Engineering, Authentication (law), Political science, Web application, SociologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
Full payload
| id | https://openalex.org/W7109676356 |
|---|---|
| doi | https://doi.org/10.5281/zenodo.17841980 |
| ids.doi | https://doi.org/10.5281/zenodo.17841980 |
| ids.openalex | https://openalex.org/W7109676356 |
| fwci | |
| type | other |
| title | Sextortion: A continuing mode of cyber crime |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C165696696 |
| concepts[0].level | 2 |
| concepts[0].score | 0.6926923990249634 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q11287 |
| concepts[0].display_name | Exploit |
| concepts[1].id | https://openalex.org/C38652104 |
| concepts[1].level | 1 |
| concepts[1].score | 0.6827388405799866 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[1].display_name | Computer security |
| concepts[2].id | https://openalex.org/C2780409804 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6783696413040161 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q621701 |
| concepts[2].display_name | Apprehension |
| concepts[3].id | https://openalex.org/C2779390178 |
| concepts[3].level | 3 |
| concepts[3].score | 0.6768671274185181 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q29137 |
| concepts[3].display_name | Cybercrime |
| concepts[4].id | https://openalex.org/C108827166 |
| concepts[4].level | 1 |
| concepts[4].score | 0.6397530436515808 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q175975 |
| concepts[4].display_name | Internet privacy |
| concepts[5].id | https://openalex.org/C197115733 |
| concepts[5].level | 2 |
| concepts[5].score | 0.4738714396953583 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1003136 |
| concepts[5].display_name | Forcing (mathematics) |
| concepts[6].id | https://openalex.org/C39549134 |
| concepts[6].level | 1 |
| concepts[6].score | 0.4696309566497803 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q133080 |
| concepts[6].display_name | Public relations |
| concepts[7].id | https://openalex.org/C2778447849 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4191521108150482 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q2648051 |
| concepts[7].display_name | Obligation |
| concepts[8].id | https://openalex.org/C2781251061 |
| concepts[8].level | 3 |
| concepts[8].score | 0.4048764109611511 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q5416089 |
| concepts[8].display_name | Evasion (ethics) |
| concepts[9].id | https://openalex.org/C48677424 |
| concepts[9].level | 2 |
| concepts[9].score | 0.39236339926719666 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q6888088 |
| concepts[9].display_name | Mode (computer interface) |
| concepts[10].id | https://openalex.org/C73484699 |
| concepts[10].level | 1 |
| concepts[10].score | 0.3794284164905548 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q161733 |
| concepts[10].display_name | Criminology |
| concepts[11].id | https://openalex.org/C41008148 |
| concepts[11].level | 0 |
| concepts[11].score | 0.36864274740219116 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[11].display_name | Computer science |
| concepts[12].id | https://openalex.org/C95713431 |
| concepts[12].level | 2 |
| concepts[12].score | 0.3556363582611084 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q631425 |
| concepts[12].display_name | Vulnerability (computing) |
| concepts[13].id | https://openalex.org/C2778132726 |
| concepts[13].level | 2 |
| concepts[13].score | 0.34386593103408813 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q1096872 |
| concepts[13].display_name | Digital Revolution |
| concepts[14].id | https://openalex.org/C139621336 |
| concepts[14].level | 2 |
| concepts[14].score | 0.33839094638824463 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q3190382 |
| concepts[14].display_name | Economic Justice |
| concepts[15].id | https://openalex.org/C108759981 |
| concepts[15].level | 2 |
| concepts[15].score | 0.31766456365585327 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q788590 |
| concepts[15].display_name | Authorization |
| concepts[16].id | https://openalex.org/C84418412 |
| concepts[16].level | 2 |
| concepts[16].score | 0.3152153789997101 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q3246940 |
| concepts[16].display_name | Digital forensics |
| concepts[17].id | https://openalex.org/C144133560 |
| concepts[17].level | 0 |
| concepts[17].score | 0.3148995041847229 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q4830453 |
| concepts[17].display_name | Business |
| concepts[18].id | https://openalex.org/C15744967 |
| concepts[18].level | 0 |
| concepts[18].score | 0.3039480745792389 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q9418 |
| concepts[18].display_name | Psychology |
| concepts[19].id | https://openalex.org/C522325796 |
| concepts[19].level | 2 |
| concepts[19].score | 0.2944883406162262 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q471880 |
| concepts[19].display_name | Identity theft |
| concepts[20].id | https://openalex.org/C2989129637 |
| concepts[20].level | 3 |
| concepts[20].score | 0.2930876910686493 |
| concepts[20].wikidata | https://www.wikidata.org/wiki/Q29137 |
| concepts[20].display_name | Cyber crime |
| concepts[21].id | https://openalex.org/C2778069335 |
| concepts[21].level | 2 |
| concepts[21].score | 0.2929460108280182 |
| concepts[21].wikidata | https://www.wikidata.org/wiki/Q32098 |
| concepts[21].display_name | Sanctions |
| concepts[22].id | https://openalex.org/C558461103 |
| concepts[22].level | 2 |
| concepts[22].score | 0.2909708619117737 |
| concepts[22].wikidata | https://www.wikidata.org/wiki/Q154430 |
| concepts[22].display_name | Anxiety |
| concepts[23].id | https://openalex.org/C3017944768 |
| concepts[23].level | 2 |
| concepts[23].score | 0.2874366343021393 |
| concepts[23].wikidata | https://www.wikidata.org/wiki/Q1450463 |
| concepts[23].display_name | Poison control |
| concepts[24].id | https://openalex.org/C2781466463 |
| concepts[24].level | 2 |
| concepts[24].score | 0.28536495566368103 |
| concepts[24].wikidata | https://www.wikidata.org/wiki/Q621695 |
| concepts[24].display_name | Blame |
| concepts[25].id | https://openalex.org/C127413603 |
| concepts[25].level | 0 |
| concepts[25].score | 0.27756166458129883 |
| concepts[25].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[25].display_name | Engineering |
| concepts[26].id | https://openalex.org/C148417208 |
| concepts[26].level | 2 |
| concepts[26].score | 0.26330867409706116 |
| concepts[26].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[26].display_name | Authentication (law) |
| concepts[27].id | https://openalex.org/C17744445 |
| concepts[27].level | 0 |
| concepts[27].score | 0.2613106369972229 |
| concepts[27].wikidata | https://www.wikidata.org/wiki/Q36442 |
| concepts[27].display_name | Political science |
| concepts[28].id | https://openalex.org/C118643609 |
| concepts[28].level | 2 |
| concepts[28].score | 0.26021039485931396 |
| concepts[28].wikidata | https://www.wikidata.org/wiki/Q189210 |
| concepts[28].display_name | Web application |
| concepts[29].id | https://openalex.org/C144024400 |
| concepts[29].level | 0 |
| concepts[29].score | 0.2567739188671112 |
| concepts[29].wikidata | https://www.wikidata.org/wiki/Q21201 |
| concepts[29].display_name | Sociology |
| keywords[0].id | https://openalex.org/keywords/exploit |
| keywords[0].score | 0.6926923990249634 |
| keywords[0].display_name | Exploit |
| keywords[1].id | https://openalex.org/keywords/apprehension |
| keywords[1].score | 0.6783696413040161 |
| keywords[1].display_name | Apprehension |
| keywords[2].id | https://openalex.org/keywords/cybercrime |
| keywords[2].score | 0.6768671274185181 |
| keywords[2].display_name | Cybercrime |
| keywords[3].id | https://openalex.org/keywords/forcing |
| keywords[3].score | 0.4738714396953583 |
| keywords[3].display_name | Forcing (mathematics) |
| keywords[4].id | https://openalex.org/keywords/obligation |
| keywords[4].score | 0.4191521108150482 |
| keywords[4].display_name | Obligation |
| keywords[5].id | https://openalex.org/keywords/evasion |
| keywords[5].score | 0.4048764109611511 |
| keywords[5].display_name | Evasion (ethics) |
| keywords[6].id | https://openalex.org/keywords/mode |
| keywords[6].score | 0.39236339926719666 |
| keywords[6].display_name | Mode (computer interface) |
| keywords[7].id | https://openalex.org/keywords/vulnerability |
| keywords[7].score | 0.3556363582611084 |
| keywords[7].display_name | Vulnerability (computing) |
| language | en |
| locations[0].id | doi:10.5281/zenodo.17841980 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400562 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| locations[0].source.host_organization | https://openalex.org/I67311998 |
| locations[0].source.host_organization_name | European Organization for Nuclear Research |
| locations[0].source.host_organization_lineage | https://openalex.org/I67311998 |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | |
| locations[0].raw_type | article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | False |
| locations[0].is_published | |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.5281/zenodo.17841980 |
| indexed_in | datacite |
| authorships[0].author.id | https://openalex.org/A2138432202 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-7819-0383 |
| authorships[0].author.display_name | Neha Das |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Neha Das |
| authorships[0].is_corresponding | True |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.5281/zenodo.17841980 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-12-07T00:00:00 |
| display_name | Sextortion: A continuing mode of cyber crime |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-12-07T23:44:45.987378 |
| primary_topic | |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.5281/zenodo.17841980 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400562 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| best_oa_location.source.host_organization | https://openalex.org/I67311998 |
| best_oa_location.source.host_organization_name | European Organization for Nuclear Research |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | |
| best_oa_location.raw_type | article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.5281/zenodo.17841980 |
| primary_location.id | doi:10.5281/zenodo.17841980 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400562 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| primary_location.source.host_organization | https://openalex.org/I67311998 |
| primary_location.source.host_organization_name | European Organization for Nuclear Research |
| primary_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | |
| primary_location.raw_type | article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.5281/zenodo.17841980 |
| publication_date | 2025-11-28 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 1, 110, 128, 156 |
| abstract_inverted_index.As | 50 |
| abstract_inverted_index.In | 149 |
| abstract_inverted_index.an | 22, 165 |
| abstract_inverted_index.as | 109 |
| abstract_inverted_index.by | 6, 37, 58 |
| abstract_inverted_index.if | 44 |
| abstract_inverted_index.in | 26, 164 |
| abstract_inverted_index.is | 77 |
| abstract_inverted_index.it | 122 |
| abstract_inverted_index.of | 3, 9, 87, 107 |
| abstract_inverted_index.on | 75 |
| abstract_inverted_index.or | 12, 17 |
| abstract_inverted_index.to | 39, 84, 103, 141, 159 |
| abstract_inverted_index.The | 72 |
| abstract_inverted_index.and | 55, 69, 82, 97, 118, 137, 145 |
| abstract_inverted_index.are | 47 |
| abstract_inverted_index.for | 14, 93, 127, 155 |
| abstract_inverted_index.has | 20 |
| abstract_inverted_index.its | 115 |
| abstract_inverted_index.not | 48 |
| abstract_inverted_index.the | 7, 27, 53, 90, 105, 124, 153, 168 |
| abstract_inverted_index.This | 30 |
| abstract_inverted_index.age. | 29 |
| abstract_inverted_index.form | 2 |
| abstract_inverted_index.from | 80, 162 |
| abstract_inverted_index.into | 35, 114 |
| abstract_inverted_index.met. | 49 |
| abstract_inverted_index.need | 92, 126 |
| abstract_inverted_index.that | 131 |
| abstract_inverted_index.These | 100 |
| abstract_inverted_index.cases | 62, 86 |
| abstract_inverted_index.crime | 31 |
| abstract_inverted_index.goals | 102 |
| abstract_inverted_index.reach | 56 |
| abstract_inverted_index.young | 70 |
| abstract_inverted_index.become | 21 |
| abstract_inverted_index.global | 24 |
| abstract_inverted_index.legal, | 95, 117 |
| abstract_inverted_index.method | 130 |
| abstract_inverted_index.openly | 40 |
| abstract_inverted_index.rising | 23 |
| abstract_inverted_index.robust | 94 |
| abstract_inverted_index.shield | 160 |
| abstract_inverted_index.target | 64 |
| abstract_inverted_index.threat | 25 |
| abstract_inverted_index.urgent | 91, 125 |
| abstract_inverted_index.videos | 13 |
| abstract_inverted_index.world. | 169 |
| abstract_inverted_index.adults. | 71 |
| abstract_inverted_index.content | 43 |
| abstract_inverted_index.demands | 46 |
| abstract_inverted_index.digital | 28, 59 |
| abstract_inverted_index.discuss | 104 |
| abstract_inverted_index.exploit | 52 |
| abstract_inverted_index.extreme | 85 |
| abstract_inverted_index.fiscal, | 15 |
| abstract_inverted_index.forcing | 33 |
| abstract_inverted_index.obvious | 5 |
| abstract_inverted_index.ranging | 79 |
| abstract_inverted_index.release | 41 |
| abstract_inverted_index.sexual, | 16 |
| abstract_inverted_index.victims | 34 |
| abstract_inverted_index.abstract | 101 |
| abstract_inverted_index.bullying | 38 |
| abstract_inverted_index.edifying | 98 |
| abstract_inverted_index.flexible | 42 |
| abstract_inverted_index.includes | 32 |
| abstract_inverted_index.intimate | 10 |
| abstract_inverted_index.involves | 132 |
| abstract_inverted_index.measures | 144 |
| abstract_inverted_index.pictures | 11 |
| abstract_inverted_index.platform | 139 |
| abstract_inverted_index.provided | 57 |
| abstract_inverted_index.response | 147 |
| abstract_inverted_index.specific | 45 |
| abstract_inverted_index.suicide, | 88 |
| abstract_inverted_index.effective | 146 |
| abstract_inverted_index.emotional | 73 |
| abstract_inverted_index.framework | 158 |
| abstract_inverted_index.implement | 142 |
| abstract_inverted_index.including | 67 |
| abstract_inverted_index.influence | 74 |
| abstract_inverted_index.juveniles | 68 |
| abstract_inverted_index.measures. | 99 |
| abstract_inverted_index.numerical | 138 |
| abstract_inverted_index.providers | 140 |
| abstract_inverted_index.resilient | 157 |
| abstract_inverted_index.skeletons | 106 |
| abstract_inverted_index.sufferers | 76 |
| abstract_inverted_index.technical | 119 |
| abstract_inverted_index.advantage, | 19 |
| abstract_inverted_index.campaigns. | 148 |
| abstract_inverted_index.cybercrime | 4 |
| abstract_inverted_index.depression | 83 |
| abstract_inverted_index.educators, | 136 |
| abstract_inverted_index.highpoints | 123 |
| abstract_inverted_index.lawmakers, | 133 |
| abstract_inverted_index.obligation | 154 |
| abstract_inverted_index.platforms, | 60 |
| abstract_inverted_index.preventive | 143 |
| abstract_inverted_index.sextortion | 61, 108, 151 |
| abstract_inverted_index.technical, | 96 |
| abstract_inverted_index.vulnerable | 65 |
| abstract_inverted_index.wrongdoers | 51 |
| abstract_inverted_index.Sextortion, | 0 |
| abstract_inverted_index.cybercrime, | 112 |
| abstract_inverted_index.digitalized | 167 |
| abstract_inverted_index.dimensions. | 120 |
| abstract_inverted_index.hypothesis, | 150 |
| abstract_inverted_index.individuals | 161 |
| abstract_inverted_index.suppression | 54 |
| abstract_inverted_index.thoughtful, | 78 |
| abstract_inverted_index.underlining | 89 |
| abstract_inverted_index.underscores | 152 |
| abstract_inverted_index.Furthermore, | 121 |
| abstract_inverted_index.apprehension | 81 |
| abstract_inverted_index.contemporary | 111 |
| abstract_inverted_index.exploitation | 8 |
| abstract_inverted_index.increasingly | 166 |
| abstract_inverted_index.individuals, | 66 |
| abstract_inverted_index.mistreatment | 163 |
| abstract_inverted_index.specialists, | 135 |
| abstract_inverted_index.cybersecurity | 134 |
| abstract_inverted_index.investigating | 113 |
| abstract_inverted_index.progressively | 63 |
| abstract_inverted_index.psychological | 18 |
| abstract_inverted_index.psychological, | 116 |
| abstract_inverted_index.compliance—often | 36 |
| abstract_inverted_index.multi-disciplinary | 129 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 1 |
| citation_normalized_percentile |