{"title":"网络勒索与威胁:美国判例法分析","authors":"Ioana Vasiu, Lucian Vasiu","doi":"10.5817/mujlt2020-1-1","DOIUrl":null,"url":null,"abstract":"This article presents an analysis of the cyber extortion and threats cases brought to the United States courts. The inquiry employed content analysis to identify important elements and attributes and answers research questions concerning essential attributes, legal elements, and how do the courts interprets these offenses. The article extends the understanding of this phenomenon by providing a thorough discussion of the conceptual issues and characteristics and an analysis of the most important litigation aspects, such as intent, true threats, sentencing, and the insanity defense. The article concludes with recommendations for stakeholders, to more effectively address the phenomenon.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":"14 1","pages":"3-28"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyber Extortion and Threats: Analysis of the United States Case Law\",\"authors\":\"Ioana Vasiu, Lucian Vasiu\",\"doi\":\"10.5817/mujlt2020-1-1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article presents an analysis of the cyber extortion and threats cases brought to the United States courts. The inquiry employed content analysis to identify important elements and attributes and answers research questions concerning essential attributes, legal elements, and how do the courts interprets these offenses. The article extends the understanding of this phenomenon by providing a thorough discussion of the conceptual issues and characteristics and an analysis of the most important litigation aspects, such as intent, true threats, sentencing, and the insanity defense. The article concludes with recommendations for stakeholders, to more effectively address the phenomenon.\",\"PeriodicalId\":38294,\"journal\":{\"name\":\"Masaryk University Journal of Law and Technology\",\"volume\":\"14 1\",\"pages\":\"3-28\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-05-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Masaryk University Journal of Law and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5817/mujlt2020-1-1\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Masaryk University Journal of Law and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5817/mujlt2020-1-1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cyber Extortion and Threats: Analysis of the United States Case Law
This article presents an analysis of the cyber extortion and threats cases brought to the United States courts. The inquiry employed content analysis to identify important elements and attributes and answers research questions concerning essential attributes, legal elements, and how do the courts interprets these offenses. The article extends the understanding of this phenomenon by providing a thorough discussion of the conceptual issues and characteristics and an analysis of the most important litigation aspects, such as intent, true threats, sentencing, and the insanity defense. The article concludes with recommendations for stakeholders, to more effectively address the phenomenon.