Understanding and countering cyber coercion | IEEE Conference Publication | IEEE Xplore