Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
169 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

"Did They F***ing Consent to That?": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse (2403.04659v2)

Published 7 Mar 2024 in cs.CR and cs.HC

Abstract: As many as 8 in 10 adults share intimate content such as nude or lewd images. Sharing such content has significant benefits for relationship intimacy and body image, and can offer employment. However, stigmatizing attitudes and a lack of technological mitigations put those sharing such content at risk of sexual violence. An estimated 1 in 3 people have been subjected to image-based sexual abuse (IBSA), a spectrum of violence that includes the nonconsensual distribution or threat of distribution of consensually-created intimate content (also called NDII). In this work, we conducted a rigorous empirical interview study of 52 European creators of intimate content to examine the threats they face and how they defend against them, situated in the context of their different use cases for intimate content sharing and their choice of technologies for storing and sharing such content. Synthesizing our results with the limited body of prior work on technological prevention of NDII, we offer concrete next steps for both platforms and security & privacy researchers to work toward safer intimate content sharing through proactive protection. Content Warning: This work discusses sexual violence, specifically, the harms of image-based sexual abuse (particularly in Sections 2 and 6).

Definition Search Book Streamline Icon: https://streamlinehq.com
References (90)
  1. Exploring User Mental Models of End-to-End Encrypted Communication Tools. In 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18), Baltimore, MD, August 2018. USENIX Association.
  2. Obstacles to the Adoption of Secure Communication Tools. In 2017 IEEE Symposium on Security and Privacy (SP), pages 137–153, San Jose, CA, USA, May 2017. IEEE.
  3. Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption. In 30th USENIX Security Symposium (USENIX Security 21), pages 447–464. USENIX Association, August 2021.
  4. Am I In Porn. FAQ: The How. https://amiinporn.org/faq#how, 2023.
  5. Rikke Amundsen. ‘A male dominance kind of vibe’: Approaching unsolicited dick pics as sexism. New Media & Society, 23(6):1465–1480, June 2021.
  6. Rikke Amundsen. Hetero-sexting as mediated intimacy work: ‘Putting something on the line’. New Media & Society, 24(1):122–137, January 2022.
  7. Apple. Hide photos on your iPhone, iPad, or Mac. https://support.apple.com/en-us/HT205891.
  8. Samantha Bates. Revenge Porn and Mental Health: A Qualitative Analysis of the Mental Health Effects of Revenge Porn on Female Survivors. Feminist Criminology, 12(1):22–42, January 2017.
  9. BBC Disinformation Team. Telegram: Where women’s nudes are shared without consent. BBC News, February 2022.
  10. Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification. In Sorelle A. Friedler and Christo Wilson, editors, Proceedings of the 1st Conference on Fairness, Accountability and Transparency, volume 81 of Proceedings of Machine Learning Research, pages 77–91. PMLR, February 2018.
  11. A Trauma-Informed Approach to Sexual Violence Research Ethics and Open Science. Journal of Interpersonal Violence, 34(23-24):4765–4793, December 2019.
  12. Centers for Disease Control and Prevention. Preventing sexual violence|violence prevention|injury center|CDC. https://www.cdc.gov/violenceprevention/sexualviolence/fastfact.html.
  13. Danielle K. Citron. Sexual Privacy. 128 Yale Law Journal 1870, 2019.
  14. Danielle Keats Citron. The fight for privacy: protecting dignity, identity, and love in the digital age. W.W. Norton & Company, Inc, New York, first edition, 2022.
  15. Criminalizing Revenge Porn. Wake Forest Law Review, 49, 2014.
  16. CNN Newsource. Bank of America employee accused of stealing nude photos from customer’s phone. ABC 13 Eyewitness News, March 2021.
  17. Motivations for Nonuniversity-Based Adults Who Sext Their Relationship Partners. Journal of Sex & Marital Therapy, 45(4):317–327, May 2019.
  18. Cyber Civil Rights Initiative. Nonconsensual Pornography Laws. https://cybercivilrights.org/nonconsensual-pornography-laws/, 2023.
  19. A typology of perceived triggers for {{\{{End-User}}\}} security and privacy behaviors. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), pages 97–115, 2019.
  20. Breaking! A typology of security and privacy news and how it’s shared. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pages 1–12, 2018.
  21. In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P), pages 401–415, Stockholm, Sweden, June 2019. IEEE.
  22. 2017 Nationwide Online Study of Nonconsensual Porn Victiization and Perpetration. Technical report, Cyber Civil Rights Initiative, 2017.
  23. The relationship between sextortion during COVID-19 and pre-pandemic intimate partner violence: A large study of victimization among diverse US men and women. Victims & Offenders, 18(2):338–355, 2023.
  24. Body image self-consciousness, sexting, and sexual satisfaction among midlife Canadians. The Canadian Journal of Human Sexuality, 31(1):46–63, April 2022.
  25. Victim-blaming and image-based sexual abuse. Journal of Criminology, 56(1):7–25, 2023.
  26. “A Stalker’s Paradise”: How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pages 1–13, Montreal QC Canada, April 2018. ACM.
  27. Gabrielle Fonrouge. The rise of the modern-day ‘Peeping Tom’: How creeps are stealing nude images off phones. New York Post, May 2022.
  28. Gabrielle Fonrouge. T-Mobile sued after employee stole nude images from customer phone during trade-in. November 2023.
  29. Usable Sexurity: Studying People’s Concerns and Strategies When Sexting. In The Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, 2020.
  30. Government of Western Australia. Criminal Law Amendment (Intimate Images) Act 2019, 2019.
  31. Grindr. Albums. https://help.grindr.com/hc/en-us/articles/4414580688787-Albums#h_01FTRQMC7YBBR9D9EV5FBZX20A.
  32. Posting the story of your sexual assault online: A phenomenological study of the aftermath. Feminist Media Studies, 21(5):840–852, 2021.
  33. Risk, resilience and reward: Impacts of shifting to digital sex work. Proceedings of the ACM on Human-Computer Interaction, 6(CSCW2):1–37, 2022.
  34. “Nudes? Shouldn’t I charge for these?”: Motivations of new sexual content creators on OnlyFans. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, pages 1–14, 2023.
  35. Deconstructing Community-Based Collaborative Design: Towards More Equitable Participatory Design Engagements. Proceedings of the ACM on Human-Computer Interaction, 3(CSCW):1–25, November 2019.
  36. Amy Adele Hasinoff. Sexting in Context: Privacy Norms and Expectations. International Journal of Communications, 8, 2014.
  37. What is Secure? Analysis of Popular Messaging Apps. Technical report, Tech Policy Press, June 2023.
  38. Image-Based Sexual Abuse: Online Distribution Channels and Illicit Communities of Support. Violence Against Women, 25(16):1932–1955, December 2019.
  39. Responding to ‘Revenge Pornography’: Prevalence, Nature and Impacts. Criminology Research Grants Program, Australian Institute of Criminology, 2019.
  40. Image-based sexual abuse: A study on the causes and consequences of non-consensual nude or sexual imagery. Routledge, Abingdon, Oxon, 2022. OCLC: 1302578390.
  41. Technology-facilitated sexual violence: A literature review of empirical research. Trauma, violence, & abuse, 19(2):195–208, 2018.
  42. Antoinette Huber. ‘A shadow of me old self’: The impact of image-based sexual abuse in a digital society. International Review of Victimology, 29(2):199–216, 2023.
  43. Understanding ewhoring. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P), pages 201–214. IEEE, 2019.
  44. Outside looking in: Approaches to content moderation in end-to-end encrypted systems. Technical report, Center for Democracy and Technology, 2021.
  45. The legal and policy contexts of ‘revenge porn’ criminalisation: The need for multiple approaches. Oxford University Commonwealth Law Journal, 19(1):1–29, January 2019.
  46. Bart P. Knijnenburg. Privacy? I Can’t Even! Making a Case for User-Tailored Privacy. IEEE Security & Privacy, 15(4):62–67, 2017.
  47. Content analysis in mass communication: Assessment and reporting of intercoder reliability. Human communication research, 28(4):587–604, 2002.
  48. Sexting among British adults: A qualitative analysis of sexting as emotion work governed by ‘feeling rules’. Culture, Health & Sexuality, pages 1–16, June 2022.
  49. Sophie Maddocks. From non-consensual pornography to image-based sexual abuse: Charting the course of a problem with many names. Australian Feminist Studies, 33(97):345–361, 2018.
  50. Sophie Maddocks. ‘A Deepfake Porn Plot Intended to Silence Me’: Exploring continuities between pornographic and ‘political’ deep fakes. Porn Studies, 7(4):415–423, October 2020.
  51. Paul Marks. Can the biases in facial recognition be fixed; also, should they? Communications of the ACM, 64(3):20–22, 2021.
  52. Sexting Among Married Couples: Who Is Doing It, and Are They More Satisfied? Cyberpsychology, Behavior, and Social Networking, 18(11):628–634, November 2015.
  53. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on human-computer interaction, 3(CSCW):1–23, 2019.
  54. ‘It’s torture for the soul’: The harms of image-based sexual abuse. Social & Legal Studies, 30(4):541–562, 2021.
  55. Image-based sexual abuse. Oxford Journal of Legal Studies, 37(3):534–561, 2017.
  56. Shattering lives and myths: A report on image-based sexual abuse. Technical report, Durham University, 2019.
  57. Factors associated with and barriers to disclosure of a sexual assault to formal on-campus resources among college students. Violence against women, 27(2):255–273, 2021.
  58. User Perceptions of Security and Privacy for Group Chat. Digital Threats: Research and Practice, 3(2):1–29, June 2022.
  59. Social reactions to disclosure of sexual victimization and adjustment among survivors of sexual assault. Journal of interpersonal violence, 28(10):2005–2023, 2013.
  60. A multi-country study of image-based sexual abuse: Extent, relational nature and correlates of victimisation experiences. Journal of Sexual Aggression, 0(0):1–16, 2022.
  61. Sex, Lies, or Kittens? Investigating the Use of Snapchat’s Self-Destructing Messages. In Financial Cryptography and Data Security, volume 8437, pages 64–76. Springer Berlin Heidelberg, Berlin, Heidelberg, 2014. Series Title: Lecture Notes in Computer Science.
  62. Casing the Vault: Security Analysis of Vault Applications. In Proceedings of the 21st Workshop on Privacy in the Electronic Society, pages 175–180, Los Angeles CA USA, November 2022. ACM.
  63. Nonconsensual pornography among us adults: a sexual scripts framework on victimization, perpetration, and health correlates for women and men. Psychology of violence, 10(1):68, 2020.
  64. Nonconsensual distribution of intimate images: Exploring the role of legal attitudes in victimization and perpetration. Journal of interpersonal violence, 38(7-8):5430–5451, 2023.
  65. “They Don’t Leave Us Alone Anywhere We Go”: Gender and Digital Abuse in South Asia. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pages 1–14, Glasgow Scotland Uk, May 2019. ACM.
  66. Samsung. What is the Secure Folder and how do I use it? https://www.samsung.com/uk/support/mobile-devices/what-is-the-secure-folder-and-how-do-i-use-it/.
  67. Non-consensual sharing of images: Commercial content creators, sexual content creation platforms and the lack of protection. new media & society, page 14614448231172711, 2023.
  68. SoK: Content Moderation for End-to-End Encryption. In Proceedings on Privacy Enhancing Technologies Symposium, Lausanne, Switzerland, July 2023.
  69. Visual Violence: Sex Worker Experiences of Image-Based Abuses, February 2022.
  70. Online Harassment in Majority Contexts: Examining Harms and Remedies across Countries. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, pages 1–16, Hamburg Germany, April 2023. ACM.
  71. The Use of Telegram for Non-Consensual Dissemination of Intimate Images: Gendered Affordances and the Construction of Masculinities. Social Media + Society, 6(4):205630512098445, October 2020.
  72. Sexual Assault Kit Initiative. Victim or Survivor: Terminology from Investigation Through Prosecution. Technical report, RTI International.
  73. Reframing sexting as a positive relationship behavior. In 123rd American Psychological Association Annual Convention, Toronto, Ontario, Canada, August 6-9, 2015, 2015.
  74. StopNCII. How StopNCII.org Works, 2023.
  75. The House of Representatives, Japan. Act on Prevention of Damage by Provision of Private Sexual Image Records, 2014.
  76. SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. In 2021 IEEE Symposium on Security and Privacy (SP), pages 247–267, San Francisco, CA, USA, May 2021. IEEE.
  77. Joint statement of scientists and researchers on EU’s proposed Child Sexual Abuse Regulation: 4 July 2023, July 2023.
  78. Gender Differences in Sending Nude Pictures and Videos Across Multiple Relationship Contexts in the Adult Norwegian Population. Sexuality & Culture, October 2022.
  79. UK Public General Acts. Section 33, Criminal Justice and Courts Act 2015, 2015.
  80. Neal R Wagner. Fingerprinting. In 1983 IEEE Symposium on Security and Privacy, pages 18–18. IEEE, 1983.
  81. Ari Ezra Waldman. Law, Privacy, and Online Dating: “Revenge Porn” in Gay Online Communities. Law & Social Inquiry, 44(04):987–1018, November 2019.
  82. “Is Reporting Worth the Sacrifice of Revealing What I’ve Sent?”: Privacy Considerations When Reporting on End-to-End Encrypted Platforms. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), pages 491–508, Anaheim, CA, August 2023. USENIX Association.
  83. Zara Ward. Revenge Porn Helpline Report 2022. Technical report, Revenge Porn Helpline, 2022.
  84. C Waring. Visual terrorism: The weaponisation of photography, image-based violence and the online sex worker. In E Cooper and P Maginn, editors, Navigating Contemporary Sex Work: Gender, Justice and Policy in the 21st century. Palgrave Macmillan, 2021.
  85. Rick Wash. Folk models of home computer security. In Proceedings of the Sixth Symposium on Usable Privacy and Security, pages 1–16, Redmond Washington USA, July 2010. ACM.
  86. WhatsApp. WhatsApp Chat Lock: Making Your Most Intimate Conversation Even More Private. https://about.fb.com/news/2023/05/whatsapp-chat-lock/, May 2023.
  87. Reconsidering Forced Labels: Outcomes of Sexual Assault Survivors Versus Victims (and Those Who Choose Neither). Violence Against Women, 24(6):668–683, May 2018.
  88. Give Social Network Users the Privacy They Want. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, pages 1427–1441, Vancouver BC Canada, February 2015. ACM.
  89. World Health Organization. Countries, 2023.
  90. Consent: A research and design lens for human-computer interaction. In Companion Publication of the 2022 Conference on Computer Supported Cooperative Work and Social Computing, pages 205–208, 2022.
Citations (1)

Summary

We haven't generated a summary for this paper yet.