The increased use of information technology to manage our personal and business data leads to an increased need for secure systems. Besides traditional and well studied security requirements like secrecy and integrity, new security properties gain importance. One such property is incoercibility which guarantees that security is preserved even if the attacker can use threats to force an honest participant to deviate from the protocol. In this talk I will discuss the difficulty of formally modeling incoercibility and present the first general purpose definition of incoercible protocols.