Coercion, extortion, or corruption can compromise the security of information or business processes. By threatening violence or other disadvantages, …