Please use this identifier to cite or link to this item:
https://anrows.intersearch.com.au/anrowsjspui/handle/1/20158
Record ID: 4e2057f7-e215-4acc-9f2f-cea9d3c0df83
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Poplin, Cody | en |
dc.contributor.author | Spera, Clara | en |
dc.contributor.author | Jurecic, Quinta | en |
dc.contributor.author | Wittes, Benjamin | en |
dc.date.accessioned | 2022-06-30T23:51:21Z | - |
dc.date.available | 2022-06-30T23:51:21Z | - |
dc.date.issued | 2016 | en |
dc.identifier.uri | https://anrows.intersearch.com.au/anrowsjspui/handle/1/20158 | - |
dc.language | en | en |
dc.publisher | Brookings Institution | en |
dc.relation.isversionof | May 2016 | en |
dc.subject | Sex crimes | en |
dc.subject | Cyberbullying | en |
dc.subject | Youth | en |
dc.subject | Sexting | en |
dc.subject | Sexual assault | en |
dc.title | Sextortion : cybersecurity, teenagers, and remote sexual assault | en |
dc.type | Report | en |
dc.identifier.catalogid | 13346 | en |
dc.subject.keyword | new_record | en |
dc.description.notes | "This paper represents an effort?to our knowledge the first?to study in depth and across jurisdictions the problems of sextortion. In it, we look at the methods used by perpetrators and the prosecutorial tools authorities have used to bring offenders to justice. We hope that by highlighting the scale and scope of the problem, and the brutality of these cases for the many victims they affect, to spur a close look at both state and federal laws under which these cases get prosecuted."<br/ >Open access | en |
dc.date.entered | 2016-07-05 | en |
dc.publisher.place | Washington DC | en |
Appears in Collections: | Reports |
Files in This Item:
There are no files associated with this item.
Items in ANROWS library are protected by copyright, with all rights reserved, unless otherwise indicated.