1. Introduction
The advancement of communication technologies has, on the one hand, greatly enhanced online social interaction, but on the other hand, increased unanticipated and unexpected challenges. One notable challenge is that people, especially minors, are exploited because of how easily technology has become accessible and easy to use (
Humphreys et al. 2019;
Zeyzus Johns et al. 2024). Criminals and technology users with nefarious intent can now exploit technology and engage in activities such as cyber sextortion to threaten and scam other people.
Sextortion is described as a threat targeting a victim by the perpetrator to disseminate sexually explicit images or videos of the victim, and, in so doing, forces the victim to comply with the perpetrators’ demands (
O’Malley and Holt 2022;
Patchin and Hinduja 2020). The name for this form of attack is derived from a portmanteau of two words, “sex” and “extortion.” Sextortion is seen as a form of perpetration of sexual coercion, in which sexual cooperation is obtained by pressuring the victim through threats. The online occurrence of this attack is termed cyber sextortion (
Carlton 2019). Cyber sextortion can be facilitated through fake profiles on social media sites such as Facebook and dating apps (
Carlton 2019;
Mondal et al. 2022). Fake social media profiles are known as catfishing (
Kibe et al. 2022). Catfishing fools victims into thinking that they are interacting with peers (
Humphreys et al. 2019).
In the field of cybersecurity, cyber sextortion is a form of cybercrime that leverages privacy violations to exploit a victim by breaching private data and violating personal autonomy, since victims lose security and control over personal information (
Wittes et al. 2016). Cyber sextortion continues to grow and has become a lucrative business for scammers and criminals (
Carlton 2019;
Humphreys et al. 2019). This is because, through cyber sextortion, it is possible to manipulate compromised individuals who may be in possession of sexually explicit images or videos, for example, pornography (
Humphreys et al. 2019).
Advancements in communication technologies are now one of the primary reasons why there has been an increase in cyber sextortion among adults and adolescents (
Mondal et al. 2022). Technology makes victims highly susceptible to cyber sextortion (
O’Malley and Holt 2022). What is missing in the literature are studies that point to the extent to which youth, specifically adolescent youths in Africa, are or are becoming susceptible to sextortion. This may only be understood if prior research on sextortion conducted by other countries is examined and contextualized.
Studies show that cyber sextortion may exacerbate or become an antecedent to existing societal ills, such as rape (
Mondal et al. 2022). As an example, studies point out that South Africa, where this study is domiciled, has a high victimization rate of rape at 70.5 out of 100,000 people in 2017–2018, compared to the United States of America with an estimated rate of 41.7 out of 100,000 individuals in 2017 (
Fakunmoju et al. 2021). Therefore, there is a need to learn, from other studies carried out outside of South Africa, as well as from the advent of South African rape statistics, how susceptible South African adolescent youth are to sextortion (
Pethers and Bello 2023;
Wolak et al. 2018).
Humphreys et al. (
2019) have pointed to the link between cyber sextortion and webcam pornography, arguing that coercion or duress in these online activities remains largely unregulated. Additionally, cyber sextortion may emerge because of romance fraud, where perpetrators create online relationships with the intent of exploiting victims for financial gain (
Cross et al. 2023). However, despite the growing awareness of romance fraud, there is still limited research on how this form of fraud intersects with and leads to sextortion (
Cross et al. 2023). This gap in understanding necessitates more comprehensive studies in this area.
4. Results
This section presents the results of the work, organized as follows: (1) the growth of cyber sextortion research based on publication output, distribution, source, and citations; (2) scholarship, affiliations, and social networks; and (3) the thematic focus in in the cyber sextortion field.
4.1. The Growth of Cyber Sextortion Research
Table 3 was derived using the bibliometrix R package and shows the average annual growth of cyber sextortion research, covering 31.19% of scientific production from 2008 to the third quarter of 2024.
The term ‘cyber sextortion’ was not familiar before 2012. Before 2008, the terminology was not used in any known research. As shown by
Table 3, one article (
Tettey 2008) presented research on “globalization and Internet fraud in Ghana”, pointing to the start of research in Africa regarding the understanding of nefarious activities that technology was starting to present. In 2009, another article with the theme of “online friendships” was published, showing how technology was shaping behavior and human interaction (
Fair et al. 2009). These early authors did not directly or indirectly address any specific themes related to cyber sextortion in their titles and abstracts. However, a clear pattern was beginning to emerge, namely the focus on behavior and nefarious activities.
There were no publications in the field of cyber sextortion in 2010 and 2011. Research in cyber sextortion seems to have possibly commenced from 2012 onwards, with
Whitty and Buchanan (
2012),
Couch et al. (
2012), and
Mazanderani (
2012) being the first three articles published that year, mainly focusing on “online romance scams”, “risks and dangers of online dating”, and “online dating ethics of intimacy”, respectively. In 2013, the number of articles that touched on nefarious online behavior increased to six, but there was no recorded growth in 2014. The number of published documents increased steadily from 2015 to 2018, with six, ten, eighteen, twenty-four, and twenty-eight recorded articles for the respective years, which indicated a steady growth of research and understanding of cyber sextortion. There was gradual growth from 2019 to 2021, with 43, 58, and 76 articles recorded in those years, respectively. In 2022, the number of published documents in the field of cyber sextortion slowed down, with only 86 articles recorded. However, there was a sharp increase in the number of published documents in 2023. In September 2024, the number of recorded documents was 77. So far, the highest number of publications recorded was in 2023, with 111 articles, indicating an impressive growth trend in the cyber sextortion field. Since the cyber sextortion field is still emerging, the number of scientific publications is expected to continue growing year-on-year, as shown in the outcomes of this analysis.
Figure 2 visualizes the geometric progression of scientific production over a period of 17 years.
Table 4 provides the annual average citation counts for publications on cyber sextortion, illustrating their impact on the field’s growth and the quality of research contributions (
Bornmann and Mutz 2015;
Larsen and von Ins 2009). Studies indicate that the number of citations for a publication forms indices for ascertaining its significance and scholarly impact (
Grant et al. 2000).
Prior work before 2012, by
Tettey (
2008) and
Fair et al. (
2009), was not included in the theme of sextortion and yielded average citations of 0.06 and 1.25, respectively. Three seminal articles were published in 2012 by
Whitty and Buchanan (
2012),
Couch et al. (
2012), and
Mazanderani (
2012) on cyber sextortion, which yielded an average of 4.79 citations per year. This pointed to the significant impact of these works in shaping the early foundations and seminal understanding of cyber sextortion. However, in 2013, there was a noticeable decline in the average number of citations, dropping to 2.62. This trend reversed in the subsequent years, with the average rising to 3.02 in 2014 and peaking at 5.65 in 2015, the highest annual average in the dataset. This peak reflects a period of notable growth and high-quality contributions to the field of cyber sextortion.
4.2. Scholarship, Affiliations, and Social Networks
After 2015, the average number of citations decreased to 3.11 in 2016 but gradually rose again in 2017 and 2018, reaching 4.74 and 5.37, respectively. Despite a minimal increase in the number of publications in 2018, the quality and influence of these publications remained substantial, as indicated by the high average citation count of 5.37. This consistency in citation performance could be attributed to the limited yet focused definition of cyber sextortion during this period (
Hagglund and Khan 2023).
From 2019 onward, the average number of citations experienced a gradual decline, with figures dropping to 4.19 in 2019, 4.01 in 2020, 3.70 in 2021, 2.34 in 2022, and 1.57 in 2023. Interestingly, this decline coincided with a sharp increase in the number of scientific publications in the field, as shown in
Table 3. By the third quarter of 2024, the average citation count had further decreased to 0.61. This downward trend in average citations since 2019 may be a consequence of the growing volume of publications in the cyber sextortion field. As pointed out in
Table 4, the rising number of publications indicates sustained interest and engagement in cyber sextortion and online sexual behavior despite the decline in publication citations.
The top 20 most relevant sources of published work on cyber sextortion are presented in
Figure 3, based on data retrieved from Scopus in September 2024. The journal
Computers in Human Behaviour remained the most relevant and most cited (753 documents) source at the time of this study. Other relevant sources included the
Journal of Interpersonal Violence (300 documents), the
International Journal of Environmental Research &
Public Health (219 documents), and the
Archives of Sexual Behaviour (177 documents). Apart from these sources, other multidisciplinary sources included
Victims and Offenders (133 documents),
the Conference on Human Factors in Computing Systems (107 documents),
the International Journal of Cyber Criminology (69 documents),
the Journal of Financial Crime (161 documents),
the Palgrave Handbook of International Cybercrime (61 documents), and
ECrime Researchers Summit (ECRIME) (85 documents), to name but a few.
Citation counts were used to understand the publication’s influence in cyber sextortion, with local citations indicating relevance. As
Hasumi and Chiu (
2024) noted, Biblioshiny for Bibliometrix was the tool used to elicit local citation metrics to identify core publications. Further analysis compared local documents and the same documents cited globally. This analysis is presented in
Table 5.
Among the documents analyzed,
Henry and Powell’s (
2018) article on technology-facilitated sexual violence (TFSV), published in
Trauma,
Violence,
and Abuse, was the most globally cited paper, with 301 citations. Their detailed work addressed various dimensions of TFSV, such as coercion into unwanted sexual acts. The work addressed the scarcity of both qualitative and quantitative research in this domain, particularly concerning adults. Their findings revealed significant gaps in understanding the nature, scope, and impacts of TFSV, which predominantly affected women.
Klettke et al.’s (
2019) study on sexting and psychological distress stood out with the highest local citation count of 71 and a global citation count of 98. Similarly,
Whitty and Buchanan’s (
2012) article on online romance scams had 70 local citations and 114 global citations, while
Drouin et al.’s (
2015) work on sexting as a form of intimate partner aggression also recorded 70 local citations but a significantly higher global citation count of 209. Interestingly, papers with high global citation counts, such as
McGlynn et al.’s (
2017) article on image-based sexual abuse (277 global citations, 39 local citations) and
Van Ouytsel et al.’s (
2017) study on adolescent sexting behaviors (164 global citations, 32 local citations), tended to have relatively lower local citation numbers. This trend was found to be consistent across the dataset, as seen with
Klettke et al. (
2019) and
Whitty and Buchanan (
2012), whose work had a broader global impact. These works pointed to widespread recognition of the contribution in areas of cyber sextortion and online romance fraud.
This study analyzed the global scientific production and contribution to the field of cyber sextortion, focusing on countries and regions. The results, presented in
Figure 4, show that the United States (USA) has the leading publication count, followed by Australia, the United Kingdom (UK), and Spain. Other contributing countries include Indonesia, the Philippines, Malaysia, India, Pakistan, Israel, and China in Asia; Belgium, Germany, Portugal, and the Netherlands in Europe; and South Africa, Nigeria, and Ghana in Africa. African contributions remain limited, with South Africa, Ghana, and Nigeria as emerging contributors.
Further analysis of the top 20 countries by total and average citations, presented in
Table 6, reveals that the USA holds the highest total citations (1685, average 15.30), followed by the UK (1422, average 30.90) and Australia (1369, average 21.40). Notably, Belgium, with 403 total citations and the highest average (50.40), as well as countries such as Norway, Sweden, and Hong Kong, despite lower publication counts, exhibit significant impact through high citation averages. South Africa ranks 21st globally, with 21 citations (average 5.20), while Ghana and Nigeria rank 24th and 28th, respectively. This indicates that while African countries are underrepresented, their contributions to cyber sextortion research are beginning to grow, particularly in the southern and western African regions.
4.3. Thematic Focus in the Cyber Sextortion Field
This study also examined the directional change in topics discussed among scholars in the field of cyber sextortion by analyzing the first author’s keywords and their frequency. Key trends, co-occurrence networks, and thematic areas were investigated to understand the evolving focus of research. According to
Song et al. (
2019), analyzing publication keywords is crucial to identify trending topics and scholarly focus within a field. Keywords offer a quick snapshot of a publication’s primary topic and emphasis. The keyword dynamics are illustrated in
Figure 5.
Each line corresponds to a keyword, with the frequency in the third quarter of 2024 indicated in parentheses. The figure reveals that terms such as cybercrime and fraud began appearing in 2013, while keywords such as sexting, victimization, online dating, scams, social media, intimate partner violence, and mental health emerged in 2015. In subsequent years, adolescents and dating violence appeared in 2016, followed by sextortion, romance fraud, and image-based sexual abuse in 2017. The term sexual harassment was introduced in 2018. The frequency of these keywords has steadily grown since their first appearance. By the third quarter of 2024, sexting reached 104 mentions, cybercrime 64 mentions, and adolescents 35 mentions. Similarly, the terms sextortion and online fraud each increased to 22 mentions, while romance fraud rose to 16 mentions. Notably, keywords such as sextortion, romance fraud, and image-based sexual abuse have gained prominence since 2017. These trends indicate that cyber sextortion research will likely continue to focus on core topics, including sexting, cybercrime, adolescents, online dating, romance fraud, image-based sexual abuse, and sexual harassment. This ongoing evolution reflects the dynamic nature of the field and its responsiveness to emerging societal challenges.
This study also analyzed the keywords co-occurrence network (KCN) to uncover the interconnections and trends within the field of cyber sextortion. The KCN provides insight into the field’s knowledge structure by mapping the relationships between keywords found in the literature (
Prell et al. 2009). As shown in
Figure 6, the network reveals the significant links between various keywords, highlighting how certain terms play a central role in the research landscape. The size and width of the keywords in the visualization indicate their importance and level of interconnectedness with other terms. Sexting is a pivotal keyword, closely connected to related terms such as adolescents, youth, young adults, and online victimization.
The term sextortion is strongly linked to concepts such as grooming, image-based sexual abuse, and revenge porn, while revenge porn also has ties to social media. The keyword cybercrime emerges as another significant hub, interlinking with terms such as sextortion, sexting, fraud, social engineering, victimization, and cybersecurity. These findings demonstrate the cohesive structure of the field, where specific keywords act as central nodes, bridging various research topics. This network analysis highlights the interconnected and multidisciplinary nature of cyber sextortion research, indicating that future studies may continue to build on these foundational themes.
Figure 7 presents an overview of the annual rankings and trends of topics in the cyber sextortion field between 2016 and 2024, highlighting their relevance to key themes within the domain. In 2021, cybercrime emerged as the most prominent topic, reflecting its centrality to discussions on online threats and criminal activities.
By 2022, sexting became the most frequently discussed topic, demonstrating increased scholarly focus on its role in cyber exploitation and victimization. The year 2023 witnessed a shift in focus toward sextortion, which became the leading topic of discourse, accompanied by related themes such as image-based sexual abuse and privacy. In the third quarter of 2024, online romance fraud and COVID-19 were the latest trending topics, indicating the evolving nature of the field in response to emerging societal and technological developments. The analysis also highlights the interconnectedness of trending topics within the field. For example, sexting was frequently discussed alongside victimization and dating violence, while cybercrime was examined in relation to adolescence and online dating. Sextortion was often studied in conjunction with image-based sexual abuse and privacy, showcasing the interconnected and multi-dimensional nature of these research themes. Thematic mapping was conducted further to understand the field’s current status and future trajectory. This method utilized clusters of interconnected keywords to derive properties of centrality, which reflects the importance of topics, and density, which represents the cohesiveness of research themes (
Esfahani et al. 2019). Centrality was used to identify the degree of correlation among different topics, with higher centrality indicating greater importance and positioning within the network. Conversely, density reflected the cohesiveness of topics, signaling their development potential and sustainability.
Topics with high centrality, such as sextortion, cybercrime, and sexting, were positioned as critical themes, indicating their significance and extensive connections to other areas of study. Topics with high density demonstrated strong cohesiveness, reflecting their maturity as research themes. Emerging topics, such as online romance fraud, have gained attention in recent years, signaling the field’s dynamic evolution. This mapping provides a comprehensive understanding of the development and sustainability of research themes within the cyber sextortion domain.
Figure 8 depicts the thematic map of the cyber sextortion research field, categorizing themes into four quadrants (Q1 to Q4) based on their centrality and density. The upper-right quadrant (Q1) represents driving themes (motor themes), which are well-developed and highly important to the field.
The lower-right quadrant (Q4) contains underlying themes (basic themes), which are equally significant but less developed. Specialized themes (niche themes) appear in the upper-left quadrant (Q2), characterized by lower relevance to the core research field but connected to other less central topics. Finally, the lower-left quadrant (Q3) includes emerging or declining themes, reflecting marginal importance or themes undergoing transitions. Some node texts overlap due to their proximity. For instance, in Q2, nodes such as “digital forensics” and “all crime” completely overlap, as do “content analysis” and “children”. Similarly, in Q3, the “fraud detection” and “fraud prediction” nodes overlap, as well as the “risk” and “self-esteem” nodes. In Q4, the “self-esteem” (se) and “federated learning” (fl) nodes also exhibit overlap. The results highlight key findings within the thematic map. In Q1, highly important themes include the “online romance scam” node, encompassing topics such as financial exploitation and persuasion, and the “social media” node, which includes privacy, intimacy, and deception. Additional critical themes include the “Internet and abuse” and “cybercrime” nodes. In Q4, themes such as the “sexting” node, encompassing topics such as sextortion, sexual violence, dating violence, and intimate partner violence, along with the “protection motivation theory” node, are shown to be well-developed and foundational to the research field. Other key nodes in Q4, such as “child sexual abuse”, include topics such as child sexual exploitation, child pornography, and online sexual solicitation. Similarly, the “cybersecurity” node, which includes themes such as machine learning, deep learning, and dating fraud, indicates areas that are still in development but critical to the field. The “self-esteem” node in Q4 includes topics such as deaf adolescents and moderation models, partially traversing into Q3, indicating that these themes are emergent and developing.
Niche themes in Q2 include the “bullying” node, which incorporates topics related to child abuse, educational policy, and educational leadership, as well as other nodes such as “digital forensics”, “all crimes”, “children”, and “cyber dating violence”. These themes connect to less central topics. For example, the “cyber dating violence” node in Q2, which includes coercive sexting, relates to sextortion in Q4. In contrast, the child abuse topic within the “bullying” node connects to themes in the “child sexual abuse” node in Q4. Emerging or declining themes in Q3 include nodes such as “fraud detection” and “fraud prediction”. These findings suggest that topics in Q2, such as cyber dating violence, digital forensics, children, and bullying, could be integrated with topics in Q1 and Q4 to develop the cyber sextortion research field further. This integration may enable a more cohesive and comprehensive understanding of the field’s evolving dynamics.
4.4. Prolific Scholars, Institutions, and Collaboration Networks
Figure 9 presents the top 20 most prolific scholars contributing to the field of cyber sextortion from 2012 to 2024 based on the dataset. These scholars have demonstrated consistent and impactful contributions to the research in this area. Among them, Cassandra Cross from Australia stands out with a total of 25 documents and 524 citations. Cross holds the highest h-index (14), indicating her significant impact in the field. Her first publication on cyber sextortion appeared in 2015, with an average of 15.7 citations per year. Cross consistently published one to three articles annually from 2015 to 2023, with notable peaks of six articles in 2018 and five in 2020.
Monica Whitty from the United Kingdom is another leading scholar, with 14 documents and the highest citation total of 805. Whitty has an h-index of 11, the second highest in the field, highlighting her influence. Her first article in this domain was published in 2012, with an average of 8.77 citations per year. Whitty consistently published one to two articles annually from 2013 to 2023, except for 2017, when no publications were recorded. Bianca Klettke from Australia ranks as another prominent contributor, with 11 documents and 182 total citations. Klettke published her first article in 2019, achieving an average citation count of 19.5 per year. She has consistently published one to two articles annually through to 2024. Dominika Howard, also from Australia, has authored nine articles with a total of 52 citations. Howard’s first publication appeared in 2019, with an average citation rate of 3.17 per year. While there were no publications in 2020, Howard has consistently contributed since 2021, peaking with four articles in 2023. Based on productivity over the years, Klettke ranks second and Howard ranks third, with h-indices of 5 and 4, respectively. Joris Van Ouytsel from Belgium is another significant figure in the field, producing nine articles with an impressive total of 510 citations. Van Ouytsel holds an h-index of 9, signifying his substantial scholarly impact. His first publication appeared in 2016, and he consistently contributed to the field until 2021. Other impactful contributors include Koen Ponnet (Belgium), Jeff R. Temple (USA), and Michel Walrave (Belgium), each with an h-index of 7. Additionally, scholars such as Michelle Drouin, Yu Lu, and Gianluca Stringhini from the USA, alongside Klettke from Australia, have an h-index of 5, affirming their relevance in the research field. These scholars and their contributions, as depicted in
Figure 10, highlight the intellectual growth and collaborative efforts within the cyber sextortion research domain. Their publications and citation metrics underscore the evolving landscape and expanding interest in this critical area of study.
Figure 10 provides a visual representation of prolific scholars, their countries, and specific areas of interest (themes) within the field of cyber sextortion. This three-field plot consists of three columns: the left-most column represents countries, the middle column lists authors, and the right-most column highlights themes (authors’ keywords).
The frequency of keyword occurrences defines the themes in this study. The significance of each element is reflected in the height of the boxes and the thickness of the connecting lines. Specifically, box height signifies the relative importance of a country, author, or theme, while the thickness of the lines correlates with the volume of scholarly contributions. As indicated by the height of the country boxes, Australia holds the highest number of author affiliations, with 222 contributors affiliated with institutions in the country. Although the United States leads in total scientific productions and citation counts, it ranks second with 148 author affiliations. Belgium follows in third place, with other countries such as the United Kingdom, Italy, Spain, Croatia, China, and Israel contributing notable affiliations.
The thickness of the lines connecting countries to authors illustrates the significant contributions made by specific individuals. In Australia, the leading contributors include Bianca Klettke, Dominika Howard, Cassandra Cross, Elizabeth Clancy, and Matthew Fuller-Tyszkiewicz. In the United States, prolific contributors to the field are Joris Van Ouytsel, Koen Ponnet, Michelle Drouin, Gianluca Stringhini, Jeff Temple, and Fuzhou Wang. Belgium’s notable contributors include Joris Van Ouytsel, Koen Ponnet, and Michel Walrave. In the United Kingdom, the primary contributors are Gianluca Stringhini, Matthew Edwards, and Monica Whitty. In Italy, the significant contributors are Joris Van Ouytsel, Koen Ponnet, and Michel Walrave, while in Spain, Aina Gasso is a notable scholar. Croatia’s key contributors include Arta Dodaj and Kristina Sesar. In China, major contributors are Joris Van Ouytsel, Koen Ponnet, Michel Walrave, and Michelle Drouin. From Israel, Michal Dolev-Cohen emerges as a leading contributor to the field.
In terms of themes, “sexting” has garnered the most interest, with 74 associated articles, followed by the “adolescents” theme, with 34 articles authored by scholars such as Joris Van Ouytsel, Koen Ponnet, Bianca Klettke, Michel Walrave, Cassandra Cross, and Jeff Temple. Other themes, including “cybercrime”, “online fraud”, “romance fraud”, and “online dating”, are also attracting scholarly attention, with respective article counts of twelve, eleven, nine, and eight. Additionally, emerging themes such as “mental health”, “sextortion”, “sexual violence”, “dating violence”, and “intimate partner violence” have attracted some interest, with article counts of three, three, three, two, and two, respectively.
This visual mapping demonstrates the collaborative and thematic focus in the field of cyber sextortion, highlighting the interdisciplinary nature of the research and the key areas that continue to shape its trajectory.
Figure 11 illustrates a three-field plot highlighting the relationship between countries (left-most column), themes of interest (middle column), and authors (right-most column) in the cyber sextortion research field. This visualization offers an overview of global contributions to specific themes and the authors driving research in these areas.
The results indicate that the “sexting” theme has attracted significant interest from 18 countries, with the United States leading in contributions from the North American region, followed by Australia in the Oceania region. Other notable contributors to this theme include Spain and Italy from southern Europe, Canada from North America, and Belgium from western Europe. Similarly, the “adolescents” theme has garnered attention from 11 countries, with the United States again at the forefront, followed by Australia, Spain, Italy, and Belgium. The “cybercrime” theme has seen contributions from 12 countries, with the United States, the United Kingdom, northern Europe, and Australia taking the lead. The “dating violence” theme, although less widely explored, has received interest from eight countries, led by the United States and followed by Spain, and Italy. The “victimization” theme has garnered substantial interest from 9 countries, with leading contributions from the United States, Australia, Spain, and Italy. Similarly, the “sextortion” theme has attracted research from 9 countries, with Spain emerging as the leader, followed by the United States and India from southern Asia.
The “social media” theme has drawn attention from five countries, with the United States leading, followed by the United Kingdom and Australia. The “intimate partner violence” theme has been addressed by three countries, with the United States again leading, followed by Spain and Malaysia. Notably, regions such as the United States (North America), Australia (Oceania), Spain (southern Europe), Italy (southern Europe), Canada (northern America), Belgium (western Europe), and the United Kingdom (northern Europe) have made substantial contributions to addressing key themes, including sexting, adolescents, cybercrime, dating violence, victimization, and sextortion. However, there remain themes that require further exploration across different regions. These include topics such as the Internet, fraud, sexual harassment, sexual violence, online dating, mental health, gender, image-based sexual violence, romance fraud, online fraud, scams, and victims, as indicated by the relative heights of their boxes in
Figure 11. This highlights opportunities for further research to bridge thematic and geographic gaps in the field.
Institutions, Co-Authorship, and Collaboration Networks
As shown in
Table 7, Deakin University in Australia ranks first with 63 documents. It is followed by the Queensland University of Technology, also in Australia, with 25 documents. These two Australian universities are followed by George Mason University in the USA with 23 documents and the Sapienza University of Rome in Italy with a document count of 23. Michigan State University, the University of Antwerp, Zhejiang University, Barcelona International University of Catalonia, the University of Michigan, and the University of Tennessee are all among the top 20 institutions, with document numbers of 20, 19, 15, 12, 12, and 12, respectively.
As shown by
Table 7, institutions such as Queensland University of Technology, Deakin University in Australia, and Michigan State University in the USA have a big network of collaborations with other universities. This collaboration network is shown in
Figure 12.
As shown in
Figure 12, Queensland University of Technology has networked with the University of South Florida, Michigan State University, Wayne State University, and Michigan State University. In addition, the University of Hong Kong, Zhejiang University, and Monash University have collaborated with each other. Although these institutions are actively contributing to the research field of cyber sextortion, they have not established collaborations with other institutions to expand their social network in the field.
Regarding co-authorship and social collaboration analysis, this study explored the social structure component of the bibliometrix R-package (
Aria and Cuccurullo 2017) provided in the biblioshiny user interface (UI). According to scholars, the social network of actors within a field delineates the relationship between two or more individuals, institutions, or countries with regards to collaborations (
Song et al. 2019;
Prell et al. 2009). These relationships are presented in a network where nodes represent actors, and links connecting the nodes represent relationships. In this study, the collaboration network between authors is presented in
Figure 13.
5. Discussion
This study aimed to address the primary research question of how cyber sextortion research has evolved over time in terms of scientific productions, thematic developments, scholars’ contributions, and future thematic trajectories. To achieve this, a bibliometric mapping analysis was employed, providing both quantitative and qualitative measures of reviewing the maturity of the cyber sextortion field. As demonstrated, cyber sextortion research commenced in 2012, with
Whitty and Buchanan (
2012),
Couch et al. (
2012), and
Mazanderani (
2012) being the first three published articles. There was a steady publication growth of three or more articles between 2013 and 2018, except for 2014, where no growth was recorded. Then, there was an impressive growth trend of 15+ articles between 2019 and 2021, but this growth declined in 2022. In 2023, there was a sharp increase in publication growth, and the sextortion keyword began to trend in the same year. The results also showed that the trending status of the adolescents topic in 2021 paved the way for future studies. For instance, the sexting topic trended in the subsequent year (2022), followed by sextortion in 2023.
Additionally, themes such as self-esteem, deaf adolescents, and the mediation model appear as basic emerging and developing themes with a focus on special needs issues in the cyber sextortion field. Similarly, child sexual abuse, child sexual exploitation, child pornography, and online sexual solicitation are developing in this field as basic and child-focused themes. These findings are particularly insightful because the age groups that are more inclined to report sextortion among children or adolescents aged 12–17 have not been established (
Patchin and Hinduja 2020).
Thorn’s (
2017) study found that 47% of participants aged between 13 and 25 experienced sextortion before they reached 18 years. These observations confirm the recency and impressive growth of empirical studies in the sextortion research field, as it was called for in the literature (
O’Malley and Holt 2022;
Patchin and Hinduja 2020).
Hagglund and Khan (
2023) note that cyber sextortion lacks a consistent definition. Therefore, the observed research growth in the field could also aid in the creation of adequate cyber sextortion definitions in future studies. Overall, these observations indicate a growth trajectory of the cyber sextortion research field.
The results on relevant sources and documents of cyber sextortion publications showed that
Computers in Human Behaviour is the most relevant source, while other relevant sources include the
Journal of Interpersonal Violence,
International Journal of Environmental Research and Public Health, and
Archives of Sexual Behaviour. Additionally, the most relevant documents include
Henry and Powell’s (
2018) article published in 2018, which is the most globally cited paper with a total of 301 citations. However,
Hasumi and Chiu (
2024) note that the number of local citations reveals core publications in a specific field. Therefore, works such as that of
Klettke et al. (
2019), with 71 local citations and 98 global citations,
Whitty and Buchanan (
2012), with 70 local citations and 114 global citations, and
Drouin et al. (
2015), with 70 local citations and 209 global citations, are the most impactful in the field of cyber sextortion. Overall, all documents had low local citation counts compared to global citations. This observation revealed that these authors’ work has a great influence in the field of cyber sextortion. Additionally, as suggested by
Agbo et al. (
2021), a high global citation count indicates that authors also publish their work outside of a research field (in this case, cyber sextortion). This study noted authors who have high global citations, including
Henry and Powell’s (
2018) work with 301 global citations and 30 local citations,
McGlynn et al.’s (
2017) work with 277 global citations and 39 local citations, and
Van Ouytsel et al.’s (
2017) work with 164 global citations and 32 local citations. These authors’ works, with higher global citation counts, indicate the possibility of multidisciplinary research in the cyber sextortion field (
Agbo et al. 2021).
Results on prolific scholars, institutions, and collaboration networks showed that the most outstanding scholars in the field of cyber sextortion include Cassandra Cross from Australia, Monica Whitty from the United Kingdom, Bianca Klettke from Australia, Dominika Howard from Australia, and Joris Van Ouytsel from Belgium. In addition, the results showed a steadily rising interest in the cyber sextortion research field as distinguished authors affiliated with different institutions around the world are inclined to collaborate. These author collaboration networks include those of Cassandra Cross, Bianca Klettke, Joris van Ouytsel, and Monica Whitty. These collaborations could bring thematic domains such as bullying, cybersecurity, digital forensics, and machine learning into the cyber sextortion field. This is particularly important as
Wang and Topalli (
2024) advocate for the development of social media tools and algorithms that can recognize the vulnerabilities of victims in order to proactively prevent or stop the continuation of online scams such as romance fraud. Therefore, bullying, cybersecurity, and machine learning domains have the potential to boost the research maturity of the cyber sextortion field.
The results of countries’ scientific publications show that the United States of America (USA) is the country with the most contributions, followed by Australia and the United Kingdom (UK). However, countries in the African region had low contributions to the cyber sextortion field, indicating that most African countries are still lagging in the cyber sextortion field, while South Africa in the southern region and Ghana in the western region of Africa are emerging. This dearth of cyber sextortion research in the African region could be attributed to a scarcity of funding, as researchers and institutions depend on government funding as the main source. Lately, their allocations have been clustered across fewer institutions and are based on a competitive allocation system (
Angori et al. 2024). This observation indicates a need to increase funding and overall productivity in the numbers and quality of research publications in the African region. The results of this study presented countries where prominent scholars produce their work in this field to highlight the potential for collaboration opportunities for emerging countries (
Bhagat et al. 2022).
The investigation of prolific scholars versus their countries and specific areas of interest (themes) in the field of cyber sextortion showed that Australia had more author affiliations, which surpassed the USA even though the latter had the highest number of scientific productions and citation counts. Similarly, UK author affiliations were surpassed by those of Belgium. The sexting theme attracted more interest from authors such as Joris Van Ouytsel, Koen Ponnet, Bianca Klettke, and Michel Walrave. The adolescents topic follows the sexting theme, which has drawn the interest of Joris Van Ouytsel, Koen Ponnet, Bianca Klettke, Michel Walrave, Cassandra Cross, and Jeff Temple. Other themes that attracted interest include cybercrime, online fraud, romance fraud, and online dating. Additionally, themes such as mental health, sextortion, sexual violence, dating violence, and intimate partner violence seem to be drawing scholars’ interest. This observation shows that despite the prevailing dearth of empirical knowledge about the sextortion phenomenon (
Notté 2024;
Wang 2024), there is an increasing scholarly interest in online dating as a path of technology-facilitated sexual violence (
Filice et al. 2024). Therefore, these themes have the potential to grow and attract more author interest.
Additionally, this study identified themes such as sexting, adolescents, cybercrime, dating violence, victimization, and sextortion, which are addressed in different countries and regions over time. The results showed that the USA in North America is the leading contributor on themes. Other countries and regions that have been impactful in their contribution to addressing these themes include Australia in the Oceania region, Spain in the southwestern European region, Italy in southwestern Europe, Canada in North America, Belgium in western Europe, and the UK in northern Europe. Interdisciplinary collaboration fosters creativity and innovation and advances academic research by tackling pressing issues in the real world, while individual researchers can find peer support, creative competitiveness, and critical mass, as well as a sense of belonging in their communities provided by discipline-based collaboration (
Newman 2024). Furthermore, collaborations between universities, industries, and governments are required to effectively address grand challenges (
Rådberg and Löfsten 2024). Therefore, whether emerging researchers seek to establish interdisciplinary or discipline-based collaborations, the knowledge identified in this study could be invaluable in guiding researchers to potential collaborators from the identified countries and regions to help develop research on cyber sextortion in their countries. In addition, themes that still need attention across different regions were identified, including the Internet, fraud, sexual harassment, sexual violence, online dating, mental health, gender, image-based sexual violence, romance fraud, online fraud, scams, and victims. Addressing the psychological, societal, and systemic issues related to child sexual abuse that occurs online is a complex task that requires an all-encompassing and collaborative approach (
Hamdi Bacha 2024). Hence, this finding presents an opportunity to investigate cyber sextortion in relation to these identified themes by fostering collaborative approaches to address research gaps in other countries and regions. These collaborations could focus on empowering adolescents with skills for safety and protection, with digital resilience as one of the essential skills.
As pointed out by many of these studies, many are deficient in resilience and focus on adolescent vulnerabilities and weaknesses, often blaming or stigmatizing them for these situations. It is therefore necessary to move beyond these approaches towards more digitally resilient and autonomy-based research design principles.
Sage et al. (
2021) note that building digital resilience in adolescents, as well as practicing safe decision-making both online and offline, can help buffer online harm. Resilience is one of the essential predictors that can help to characterize the harm experienced, which can contribute to the development of interventions to facilitate protective factors in adolescents to buffer harms from online attacks such as cyber sextortion (
Patchin and Hinduja 2020). Some key considerations that can help foster adolescent digital resilience include self-awareness. It is crucial for any adolescent engaging in cyber communication and usage to know and understand their own strengths, weaknesses, values, and, importantly, emotions that are prone to manipulation. The adolescent youth should foster positive cyber relationships by having a network of family, friends, and peers who can intervene and manage their emotions (
Setyawati and Hamka 2022). Importantly, the adolescent should develop skills to navigate challenges, adapt to changing situations, and inculcate coping strategies and ways to deal with online adversity.
These interventions should leverage the building of mentalization abilities in adolescents, which enables one to precisely gauge the motives and intents of others when interacting online (
Bucci et al. 2023). Adolescents who are distressed or have regulatory difficulties as a result of online abuse or victimization are at the highest risk of developing difficulties in mentalization and repeated victimization and its harm (
Penner et al. 2019). Therefore, resilience-based interventions tailored to proactively address sextortion risk factors are extremely essential to build adolescents’ mentalization (
Bucci et al. 2023). Research on these interventions can provide insights into the prevalence, tactics, and characteristics of perpetrators and victims. Studying these experiences and the behavior of adolescent youth may form part of victimology studies on cyber sextortion that will inform the design of better intervention programs and better support the empowerment of victims.
There is presently a lack of studies on adolescents’ digital resilience and evidence-based interventions to improve mental health and prevent them from falling victim to technology-facilitated sexual abuse and its recurrence (
Qi and Yang 2024;
Sage et al. 2021). Future studies should thus concentrate on examining adolescents’ digital resilience from the viewpoints of sextortion, coercive sexting, dating violence, and mental health. Furthermore, future studies should also focus on the development and evaluation of digital resilience-based interventions.
Research shows that youth can flag low- and medium-risk online interactions, such as flirty comments and sexting, as unsafe, which helps them to build resilience before encountering high-risk behaviors such as increased sexting and the sale or promotion of illegal activities (
Alsoubai et al. 2024;
Jia et al. 2015;
Wisniewski et al. 2015,
2016). Care and proactive interventions are essential for youth, especially for higher-risk youth who are susceptible to high-risk sexual interactions, self-harm, and delinquencies online that could increase real-world physical and emotional difficulties (
Alsoubai et al. 2024). Future studies should therefore concentrate more on identifying the traits of young people and contextual elements that may promote digital resilience and the ability to resist low- and medium-risk behavious while providing proactive and tailored interventions for high-risk individuals (
Alsoubai et al. 2024). In this regard, collaborative studies should investigate contextual factors such as participant demographics, which could aid in fostering digital resilience to enable the identification of proactive intervention entry points in the development stages of adolescents.
As previously discussed, themes that have been researched in relation to cyber sextortion so far include sexual violence, dating violence, and intimate partner violence, among others. In addition to romance fraud and coercive sexting, other thematic domains that can be included in the cyber sextortion research include digital forensics, bullying, and cyber dating violence. In addition,
Ray and Henry (
2024) suggest that there is a need for studies that are focused on both adults and minors (cross-age) to enable synthesizing data on age as a risk demographic. Therefore, scholars could combine the identified topics and employ cross-age strategies to further develop the cyber sextortion research field, especially tailored for adolescent youth. These studies will inform programs for digital literacy, healthy online relationships, resilience and coping skills, counseling, and reporting mechanisms. This study presents a potential for more scientific publications, since the body of literature may not currently be large compared to other bibliometric studies (
Bhagat et al. 2022). Thus, researchers in this study recommend increasing research output globally through institutional and author collaborations and a multidisciplinary approach, combining theoretical and empirical knowledge to better understand cyber sextortion nuances (
Notté 2024). Encouraging interagency collaboration is crucial for the involvement of institutions such as law enforcement, higher education providers, and social services to foster digital resilience among adolescent youth, ultimately reducing their vulnerability to online exploitation.
6. Conclusions
This study undertook a comprehensive bibliometric analysis of the cyber sextortion research field over the years, applying a bibliometric approach to analyze the data for a comprehensive overview of the trend, thematic focus, and scientific production in the cyber sextortion field. The dataset was retrieved from the Scopus-indexed database only, as the bibliometrix R-package software used in this study does not support the merging of data generated from independent databases (
Agbo et al. 2021). Therefore, the authors acknowledge the single-source limitations and potential language biases.
The results identified prolific scholars and research trends and showed a growth trajectory of the field, with possibilities for multidisciplinary research, including thematic domains such as bullying, cybersecurity, and machine learning to advance the cyber sextortion field research. This analysis is useful in providing knowledge to researchers and stakeholders regarding the potential of future research development of thematic areas such as special needs adolescents and child sexual exploitation within the cyber sextortion field.
This study identified themes such as sexting, adolescents, cybercrime, dating violence, victimization, and sextortion that have been addressed in different countries and regions. Other themes that still need focus in the field of cyber sextortion include the Internet, fraud, sexual harassment, sexual violence, online dating, mental health, gender, image-based sexual violence, and romance fraud. Regarding the themes that have been addressed in other countries, this study recommends (1) expanding these themes in different countries and regions to gain insight into the influence of socio-economic factors on cyber sextortion. (2) Future studies should incorporate themes that still need focus to expand the knowledge base about their influence on cyber sextortion; (3) countries and regions with established research should collaborate with emerging countries in the field, and vice versa. This will enable peer support and creative competitiveness, as well as a sense of belonging in the communities provided by discipline-based collaboration in the field of cyber sextortion; (4) future studies should also conduct cross-age research that includes both adults and adolescents to enable a synthesis of data on age as a risk demographic; and (5) multidisciplinary studies are also encouraged to gain insights into combating cyber sextortion from other disciplines such as cyberbullying, cybersecurity, digital forensics, and machine learning.