Sulkowski, Adam J.; Shea, Timothy - 2013
This article has three goals. First, the authors review the available data on the phenomenon of cyber-extortion - the practice of demanding money in exchange for not carrying out threats to commit harm that would involve a victim's information systems. Second, the authors investigate why...