{"title":"非自愿的图片分享","authors":"J. T. Klein, Kristen L. Zaleski","doi":"10.1093/oso/9780190927097.003.0007","DOIUrl":null,"url":null,"abstract":"Non-consensual image sharing is a 21st-century concern at the intersection of some of the most difficult challenges of our time: sexual trauma, victims’ rights, internet privacy, and free speech. Also known as non-consensual pornography, technology-facilitated violence, and revenge pornography, the phenomenon occurs when sexually explicit, nude or semi-nude photos are distributed without the consent of the individual pictured. This chapter explores non-consensual image sharing research and discusses trends as well as future questions that have yet to be answered about the pervasiveness of this problem. It is asserted that research on the impact of cyber sexual exploitation on victims is needed, as are initiatives that integrate victim resources, tools for law enforcement, and technical resources to identify and remove content.","PeriodicalId":309838,"journal":{"name":"Women's Journey to Empowerment in the 21st Century","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Non-Consensual Image Sharing\",\"authors\":\"J. T. Klein, Kristen L. Zaleski\",\"doi\":\"10.1093/oso/9780190927097.003.0007\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Non-consensual image sharing is a 21st-century concern at the intersection of some of the most difficult challenges of our time: sexual trauma, victims’ rights, internet privacy, and free speech. Also known as non-consensual pornography, technology-facilitated violence, and revenge pornography, the phenomenon occurs when sexually explicit, nude or semi-nude photos are distributed without the consent of the individual pictured. This chapter explores non-consensual image sharing research and discusses trends as well as future questions that have yet to be answered about the pervasiveness of this problem. It is asserted that research on the impact of cyber sexual exploitation on victims is needed, as are initiatives that integrate victim resources, tools for law enforcement, and technical resources to identify and remove content.\",\"PeriodicalId\":309838,\"journal\":{\"name\":\"Women's Journey to Empowerment in the 21st Century\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Women's Journey to Empowerment in the 21st Century\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1093/oso/9780190927097.003.0007\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Women's Journey to Empowerment in the 21st Century","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/oso/9780190927097.003.0007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Non-consensual image sharing is a 21st-century concern at the intersection of some of the most difficult challenges of our time: sexual trauma, victims’ rights, internet privacy, and free speech. Also known as non-consensual pornography, technology-facilitated violence, and revenge pornography, the phenomenon occurs when sexually explicit, nude or semi-nude photos are distributed without the consent of the individual pictured. This chapter explores non-consensual image sharing research and discusses trends as well as future questions that have yet to be answered about the pervasiveness of this problem. It is asserted that research on the impact of cyber sexual exploitation on victims is needed, as are initiatives that integrate victim resources, tools for law enforcement, and technical resources to identify and remove content.