Reporting Revenge Porn: a Preliminary Expert Analysis
- URL: http://arxiv.org/abs/2106.12223v1
- Date: Wed, 23 Jun 2021 08:08:59 GMT
- Title: Reporting Revenge Porn: a Preliminary Expert Analysis
- Authors: A. De Angeli, M. Falduti, M. Menendez Blanco, S. Tessaris
- Abstract summary: We present a preliminary expert analysis of the process for reporting revenge porn abuses in selected content sharing platforms.
Among these, we included social networks, image hosting websites, video hosting platforms, forums, and pornographic sites.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In our research, we focus on the response to the non-consensual distribution
of intimate or sexually explicit digital images of adults, also referred as
revenge porn, from the point of view of the victims. In this paper, we present
a preliminary expert analysis of the process for reporting revenge porn abuses
in selected content sharing platforms. Among these, we included social
networks, image hosting websites, video hosting platforms, forums, and
pornographic sites. We looked at the way to report abuse, concerning both the
non-consensual online distribution of private sexual image or video (revenge
pornography), as well as the use of deepfake techniques, where the face of a
person can be replaced on original visual content with the aim of portraying
the victim in the context of sexual behaviours. This preliminary analysis is
directed to understand the current practices and potential issues in the
procedures designed by the providers for reporting these abuses.
Related papers
- Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse [28.586678492600864]
Image-based sexual abuse (IBSA) is a growing threat to people's digital safety.
In this paper, we explore how people seek and receive help for IBSA on social media.
arXiv Detail & Related papers (2024-06-18T00:23:00Z) - "Did They F***ing Consent to That?": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse [12.424265801615322]
8 in 10 adults share intimate content such as nude or lewd images.
Stigmatizing attitudes and a lack of technological mitigations put those sharing such content at risk of sexual violence.
arXiv Detail & Related papers (2024-03-07T17:04:55Z) - Non-Consensual Synthetic Intimate Imagery: Prevalence, Attitudes, and
Knowledge in 10 Countries [0.0]
Deepfake technologies have become ubiquitous, "democratizing" the ability to manipulate photos and videos.
One popular use of deepfake technology is the creation of sexually explicit content, which can then be posted and shared widely on the internet.
This article examines attitudes and behaviors related to "deepfake pornography" as a specific form of non-consensual synthetic intimate imagery (NSII)
arXiv Detail & Related papers (2024-01-26T21:51:49Z) - Unveiling Local Patterns of Child Pornography Consumption in France
using Tor [0.6749750044497731]
We analyze local patterns of child pornography consumption across 1341 French communes in 20 metropolitan regions of France using fine-grained mobile traffic data of Tor network-related web services.
We estimate that approx. 0.08 % of Tor mobile download traffic observed in France is linked to the consumption of child sexual abuse materials by correlating it with local-level temporal porn consumption patterns.
arXiv Detail & Related papers (2023-10-17T09:31:26Z) - A deep-learning approach to early identification of suggested sexual
harassment from videos [0.802904964931021]
Sexual harassment, sexual abuse, and sexual violence are prevalent problems in this day and age.
We have classified the three terms (harassment, abuse, and violence) based on the visual attributes present in images depicting these situations.
We identified that factors such as facial expression of the victim and perpetrator and unwanted touching had a direct link to identifying the scenes.
Based on these definitions and characteristics, we have developed a first-of-its-kind dataset from various Indian movie scenes.
arXiv Detail & Related papers (2023-06-01T16:14:17Z) - Tainted Love: A Systematic Review of Online Romance Fraud [68.8204255655161]
Romance fraud involves cybercriminals engineering a romantic relationship on online dating platforms.
We characterise the literary landscape on romance fraud, advancing the understanding of researchers and practitioners.
Three main contributions were identified: profiles of romance scams, countermeasures for mitigating romance scams, and factors that predispose an individual to become a scammer or a victim.
arXiv Detail & Related papers (2023-02-28T20:34:07Z) - Fighting Malicious Media Data: A Survey on Tampering Detection and
Deepfake Detection [115.83992775004043]
Recent advances in deep learning, particularly deep generative models, open the doors for producing perceptually convincing images and videos at a low cost.
This paper provides a comprehensive review of the current media tampering detection approaches, and discusses the challenges and trends in this field for future research.
arXiv Detail & Related papers (2022-12-12T02:54:08Z) - Fragments of the Past: Curating Peer Support with Perpetrators of
Domestic Violence [88.37416552778178]
We report on a ten-month study where we worked with six support workers and eighteen perpetrators in the design and deployment of Fragments of the Past.
We share how crafting digitally-augmented artefacts - 'fragments' - of experiences of desisting from violence can translate messages for motivation and rapport between peers.
These insights provide the basis for practical considerations for future network design with challenging populations.
arXiv Detail & Related papers (2021-07-09T22:57:43Z) - Privacy-Preserving Image Acquisition Using Trainable Optical Kernel [50.1239616836174]
We propose a trainable image acquisition method that removes the sensitive identity revealing information in the optical domain before it reaches the image sensor.
As the sensitive content is suppressed before it reaches the image sensor, it does not enter the digital domain therefore is unretrievable by any sort of privacy attack.
arXiv Detail & Related papers (2021-06-28T11:08:14Z) - Multi-Modal Video Forensic Platform for Investigating Post-Terrorist
Attack Scenarios [55.82693757287532]
Large scale Video Analytic Platforms (VAP) assist law enforcement agencies (LEA) in identifying suspects and securing evidence.
We present a video analytic platform that integrates visual and audio analytic modules and fuses information from surveillance cameras and video uploads from eyewitnesses.
arXiv Detail & Related papers (2020-04-02T14:29:27Z) - #MeToo on Campus: Studying College Sexual Assault at Scale Using Data
Reported on Social Media [71.74529365205053]
We analyze the influence of the # trend on a pool of college followers.
The results show that the majority of topics embedded in those # tweets detail sexual harassment stories.
There exists a significant correlation between the prevalence of this trend and official reports on several major geographical regions.
arXiv Detail & Related papers (2020-01-16T18:05:46Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.