Qin et al., 2024 - Google Patents
" Did They {F*** ing} Consent to That?": Safer Digital Intimacy via Proactive Protection Against {Image-Based} Sexual AbuseQin et al., 2024
View PDF- Document ID
- 5989335059674442836
- Author
- Qin L
- Hamilton V
- Wang S
- Aydinalp Y
- Scarlett M
- Redmiles E
- Publication year
- Publication venue
- 33rd USENIX Security Symposium (USENIX Security 24)
External Links
Snippet
As many as 8 in 10 adults share intimate content such as nude or lewd images. Sharing such content has significant benefits for relationship intimacy and body image, and can offer employment. However, stigmatizing attitudes and a lack of technological mitigations put …
- 230000001568 sexual effect 0 title abstract description 27
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Sambasivan et al. | " They Don't Leave Us Alone Anywhere We Go" Gender and Digital Abuse in South Asia | |
| Henry et al. | Policing image-based sexual abuse: Stakeholder perspectives | |
| Matthews et al. | Stories from survivors: Privacy & security practices when coping with intimate partner abuse | |
| Cross et al. | “I suspect that the pictures are stolen”: romance fraud, identity crime, and responding to suspicions of inauthentic identities | |
| Redmiles | " Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response | |
| US8578501B1 (en) | Anonymous social networking with community-based privacy reviews obtained by members | |
| Nash | ‘Scum Cuddlers’: police offender managers and the sex offenders' register in England and Wales | |
| Gallardo et al. | Speculative privacy concerns about ar glasses data collection | |
| Qin et al. | " Did They {F*** ing} Consent to That?": Safer Digital Intimacy via Proactive Protection Against {Image-Based} Sexual Abuse | |
| Preston | Lawyers' Abuse of Technology | |
| Sugiura et al. | Victim blaming, responsibilization and resilience in online sexual abuse and harassment | |
| Islam | Patriarchal masculinities and cyberbullying on Facebook: unraveling interconnections and implications in the context of Bangladesh | |
| Ashraf et al. | " Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in Pakistan | |
| Hartzog | Social Data | |
| Coduto et al. | " Delete it and move on": digital management of shared sexual content after a breakup | |
| van der Sanden et al. | “I straight up criminalized myself on messenger”: law enforcement risk management among people who buy and sell drugs on social media | |
| Ali | Silenced online: Women's experiences of digital harassment in Pakistan | |
| Herrera et al. | Bridging the Protection Gap: Innovative Approaches to Shield Older Adults from AI-Enhanced Scams | |
| Brown | Privacy concerns over employer access to employee social media | |
| Blue | The Smart Girl's Guide to Privacy: Practical tips for staying safe online | |
| Umbach et al. | Prevalence and Impacts of Image-Based Sexual Abuse Victimization: A Multinational Study | |
| Geeng et al. | " Say I'm in {public... I} don't want my nudes to pop up." User Threat Models for Using Vault Applications | |
| Pillay et al. | Cyberbullying—a shrouded crime: Experiences of South African undergraduate students | |
| Shahid et al. | Privacy threats on social networking websites | |
| Maseko | Remedies to reduce user susceptibility to phishing attacks |