Due to technological developments, cybercrime techniques evolve day by day. Nowadays, innocent users have been the target of cybercriminals who want to make money or extort sexual favor in the context of sextortion crime. This paper discusses the definition of sextortion with the techniques used by the criminals, legal framework of aforementioned crime in Turkey and discusses how to prevent and solve past crimes.
BROADHURSY R., Cybercrime: thieves, swindlers, bandits and privateers in cyberspace, 2017, Retrieved from, https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3009574.
BRUİN J.S. de, COCX T.K., KOSTERS W.A., LAROS J.F.J. and KOK J.N., Data Mining Approaches To Criminal Career Analysis, 2006, Sixth International Conference on Data Mining.
Digital Citizens Alliance, “Selling “Slaving”: Outing the Principal Enablers that Profit from Pushing Malware and Put Your Privacy at Risk, 2015, Retrieved from https://media.gractions.com/314A5A5A9ABBBBC5E3BD824CF47C46EF4B9D3A76/07027202-8151-4903-9c40-b6a8503743aa.pdf.
Federal Bureau of Investigation: Sextortion; 2015, Retrieved from, https://rems.ed.gov/docs/Sextortion_Fact_Sheet_Draft_for_Compliance_508C.pdf.
HAN J., KAMBER M., PEİ J., Data Mining Concepts and Techniques 3rd ed., 2012, Morgan Kaufmann Publishers.
HUMELNİCU I.V., Sextortion – The Newest Online Threat”, AGORA International Journal of Administration Sciences, 2016, Retrieved from, http://univagora.ro/jour/index.php/aijas.
KÜPELİ C., The Right to be Forgotten of the Women Victims of Violence, “Şiddet Mağduru Kadınların Unutulma Hakkı”, 2016, Marmara Üniversitesi Hukuk Fakültesi Hukuk Araştırmaları Dergisi, C. 22, S.1.
LLİNARES, F.M. and JOHNSTON, S., 2018, Cybercrime and Place: Applying Environmental Criminology to Crimes in Cyberspace, The Oxford Handbook of Environmental Criminology.
Naming, Shaming and Ending Sextortion A Research Across the World, UIA-IROL, 2017, Retrieved from, http://bonnschmitt.net/fileadmin/media/Events/Bibliographie_UIA_2017/Sextortion%20Report%20-%202017.pdf.
NATH S.V., Crime Pattern Detection Using Data Mining, 2006, International Conferences on Web Intelligence and Intelligent Agent Technology.
National Strategy on Child Exploitation Prevention and Interdiction, A report to Congress, US Department of Justice, April 2016, Retrieved from, https://www.justice.gov/psc/file/842411/download.
NİLSSON N. J., Introduction to Machine Learning, 1997, Standford University
PERROT P., What What about AI in criminal intelligence? From predictive policing to AI perspectives, 2017, Retrieved from, https://bulletin.cepol.europa.eu/index.php/bulletin/article/download/244/208/.
Prevalence and characteristics of sexual violence, stalking, and intimate partner violence victimization—National Intimate Partner And Sexual Violence Survey, United States, 2011 Retrieved from, https://www.cdc.gov/mmwr/preview/mmwrhtml/ss6308a1.htm.
RİNGROSE J, A qualitative study of children, young people and “sexting”: A report prepared for the NSPCC. London (UK): National Society for the Prevention of Cruelty to Children; 2012. Retrieved from, https://www .nspcc.org.uk/services-and-resources/research-and-resources/pre-2013/qualitative-study-sexting/.
The Cyber Civil Rights Initiative, 2017, Retrieved from, https://www.cybercivilrights.org/definitions/.
WİTTES B., POPLİN C., JURECİC Q. and SPERA C., Sextortion: Cybersecurity, teenagers, and remote sexual assault, 2016, Retrieved from, https://www.brookings.edu/research/sextortion-cybersecurity-teenagers-and-remote-sexual-assault/.
WOLAK J., FİNKELHOR D., 2016, Sextortion:Finding from a Survey of 1,631 Victims, Retrieved from, https://27l51l1qnwey246mkc1vzqg0-wpengine.netdna-ssl.com/wp-content/uploads/2016/08/Sextortion_Report.pdf.
WOLAK J., FİNKELHOR D., WALSH W., TREİTMAN L., 2018, Sextortion of Minors: Characteristics and Dynamics, Journal of Adolescent Health 62.
ZWEİG ZM., DANK M., YAHNER J., LACHMAN P., 2013, The rate of cyber dating abuse among teens and how it relates to other forms of teen dating violence, J Youth Adolesc. 2013 Jul;42(7):1063-77.