{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T17:04:29Z","timestamp":1770743069938,"version":"3.49.0"},"reference-count":126,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T00:00:00Z","timestamp":1762992000000},"content-version":"vor","delay-in-days":316,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Image-based sexual abuse (IBSA) refers to the creating, taking, sharing, or threatening to share, of intimate images without consent. There is a scarcity of research on perpetration, despite increasing evidence that digital technologies are facilitating IBSA perpetration. We surveyed over 16\u2009000 respondents in 10 countries to understand the prevalence of perpetration across five subtypes of IBSA, the demographic risk factors for perpetrating, and the nature of perpetration. Over 1 in 10 respondents reported at least one perpetration behavior, and polyperpetration was more common than not. Men, LGBT+ respondents, and young people were disproportionately more likely to report perpetrating compared to their counterparts. The most common motivation for perpetration for both genders was because they thought the behavior was funny. The vast majority of respondents thought there should be some consequence for sharing images nonconsensually, but women were more likely than men to support harsher punishments. Almost half of respondents indicated that they had received or encountered nonconsensual intimate images of someone else, reflecting high rates of circulation of abusive material. The relatively high rates of IBSA, paired with the prevalence of polyperpetration, suggests that current laws, policies, and practices are insufficient and more urgent intervention is needed.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf033","type":"journal-article","created":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T12:55:39Z","timestamp":1763038539000},"source":"Crossref","is-referenced-by-count":1,"title":["Perpetration of image-based sexual abuse in the digital age: prevalence, motivations, and community attitudes in 10 countries"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4463-1096","authenticated-orcid":false,"given":"Rebecca","family":"Umbach","sequence":"first","affiliation":[{"name":"Google LLC , Mountain View, CA 94043 ,","place":["United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2241-7985","authenticated-orcid":false,"given":"Nicola","family":"Henry","sequence":"additional","affiliation":[{"name":"Social Equity Research Centre, Royal Melbourne Institute of Technology , Melbourne, Victoria 3000 ,","place":["Australia"]}]}],"member":"286","published-online":{"date-parts":[[2025,11,13]]},"reference":[{"key":"2025111307553477900_bib1","doi-asserted-by":"crossref","DOI":"10.4324\/9781351135153","volume-title":"Image-based Sexual Abuse: A Study on the Causes and Consequences of Non-Consensual Nude or Sexual Imagery","author":"Henry","year":"2020"},{"key":"2025111307553477900_bib2","first-page":"4391","article-title":"Understanding help-seeking and help-giving on social media for image-based sexual abuse","volume-title":"Proceedings of the 33rd USENIX Security Symposium (USENIX Security 24)","author":"Wei","year":"2024"},{"key":"2025111307553477900_bib3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3173574.3174241","article-title":"\u201cA stalker\u2019s paradise\u201d: how intimate partner abusers exploit technology","volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems","author":"Freed","year":"2018"},{"key":"2025111307553477900_bib4","doi-asserted-by":"crossref","DOI":"10.1145\/3706598.3713545","article-title":"Prevalence and impacts of image-based sexual abuse victimization: a multinational study","volume-title":"Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems. CHI \u201925","author":"Umbach","year":"2025"},{"key":"2025111307553477900_bib5","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s10508-021-02200-8","article-title":"Sexual victimization in the digital age: a population-based study of physical and image-based sexual abuse among adolescents","volume":"52","author":"Pedersen","year":"2023","journal-title":"Arch Sex Behav"},{"key":"2025111307553477900_bib6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3686914","article-title":"The sociotechnical stack: opportunities for social computing research in non-consensual intimate media","volume":"8","author":"Qiwei","year":"2024","journal-title":"Proc ACM Hum Comput Interact"},{"key":"2025111307553477900_bib7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3134681","article-title":"Digital technologies and intimate partner violence: a qualitative analysis with multiple stakeholders","volume":"1","author":"Freed","year":"2017","journal-title":"Proc ACM Hum Comput Interact"},{"key":"2025111307553477900_bib8","first-page":"87","article-title":"The digital-safety risks of financial technologies for survivors of intimate partner violence","volume-title":"Proceedings of the 32nd USENIX Security Symposium (USENIX Security 23)","author":"Bellini","year":"2023"},{"key":"2025111307553477900_bib9","first-page":"105","article-title":"\u201cIt\u2019s the equivalent of feeling like you\u2019re in jail\u201d: lessons from firsthand and secondhand accounts of IoT-enabled intimate partner abuse","volume-title":"Proceedings of the 32nd USENIX Security Symposium (USENIX Security 23)","author":"Stephenson","year":"2023"},{"key":"2025111307553477900_bib10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/cybsec\/tyaa006","article-title":"Privacy threats in intimate relationships","volume":"6","author":"Levy","year":"2020","journal-title":"J Cybersecur"},{"key":"2025111307553477900_bib11","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1108\/978-1-83982-848-520211049","article-title":"Threat modeling intimate partner violence: tech abuse as a cybersecurity challenge in the internet of things","volume-title":"The Emerald International Handbook of Technology-Facilitated Violence and Abuse","author":"Slupska","year":"2021"},{"key":"2025111307553477900_bib12","first-page":"1893","article-title":"The tools and tactics used in intimate partner surveillance: an analysis of online infidelity forums","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security 20)","author":"Tseng","year":"2020"},{"key":"2025111307553477900_bib13","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1177\/02697580211063659","article-title":"\"A shadow of me old self\": the impact of image-based sexual abuse in a digital society","volume":"29","author":"Huber","year":"2023","journal-title":"Int Rev Victimol"},{"key":"2025111307553477900_bib14","doi-asserted-by":"publisher","first-page":"3981","DOI":"10.1177\/15248380241266137","article-title":"Image-based sexual abuse perpetration: a scoping review","volume":"25","author":"Henry","year":"2024","journal-title":"Trauma Violence Abuse"},{"key":"2025111307553477900_bib15","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1037\/vio0000233","article-title":"Nonconsensual pornography among US adults: a sexual scripts framework on victimization, perpetration, and health correlates for women and men","volume":"10","author":"Ruvalcaba","year":"2020","journal-title":"Psychol Viol"},{"key":"2025111307553477900_bib16","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.chb.2018.11.009","article-title":"Image-based sexual abuse: the extent, nature, and predictors of perpetration in a community sample of Australian residents","volume":"92","author":"Powell","year":"2019","journal-title":"Comput Hum Behav"},{"key":"2025111307553477900_bib17","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1071\/SH19201","article-title":"Non-consensual sexting: characteristics and motives of youths who share received-intimate content without consent","volume":"17","author":"Barrense-Dias","year":"2020","journal-title":"Sex Health"},{"key":"2025111307553477900_bib18","doi-asserted-by":"publisher","first-page":"106460","DOI":"10.1016\/j.chb.2020.106460","article-title":"Sharing is not always caring: understanding motivations and behavioural associations with sext dissemination","volume":"112","author":"Clancy","year":"2020","journal-title":"Comput Hum Behav"},{"key":"2025111307553477900_bib19","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.chb.2018.11.023","article-title":"The dark side of sexting\u2013factors predicting the dissemination of sexts","volume":"92","author":"Clancy","year":"2019","journal-title":"Comput Hum Behav"},{"key":"2025111307553477900_bib20","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1177\/10443894241239091","article-title":"The power of language to transform efforts to address intimate partner violence: tensions in the field and pathways forward","volume":"105","author":"Graham","year":"2024","journal-title":"Fam Soc"},{"key":"2025111307553477900_bib21","first-page":"1","article-title":"Image-based sexual abuse: victims and perpetrators","volume":"148","author":"Henry","year":"2019","journal-title":"Trends Iss Crime Crim Just"},{"key":"2025111307553477900_bib22","doi-asserted-by":"publisher","first-page":"107879","DOI":"10.1016\/j.chb.2023.107879","article-title":"Image-based sexual abuse: victim-perpetrator overlap and risk-related correlates of coerced sexting, non-consensual dissemination of intimate images, and cyberflashing","volume":"148","author":"Sparks","year":"2023","journal-title":"Comput Hum Behav"},{"key":"2025111307553477900_bib23","doi-asserted-by":"publisher","first-page":"100414","DOI":"10.1016\/j.ijchp.2023.100414","article-title":"Prevalence and risk factors for nonconsensual distribution of intimate images among Italian young adults: implications for prevention and intervention","volume":"23","author":"Brighi","year":"2023","journal-title":"Int J Clin Health Psychol"},{"key":"2025111307553477900_bib24","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1007\/s12119-023-10100-3","article-title":"Prevalence and impact of revenge pornography on a sample of Portuguese women","volume":"28","author":"Mur\u00e7a","year":"2024","journal-title":"Sexual Cult"},{"key":"2025111307553477900_bib25","doi-asserted-by":"publisher","first-page":"NP9078","DOI":"10.1177\/0886260518819878","article-title":"Nonconsensual sharing of private sexually explicit media among university students","volume":"36","author":"Walker","year":"2021","journal-title":"J Interpers Viol"},{"key":"2025111307553477900_bib26","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1108\/JACPR-02-2021-0578","article-title":"The role of sexting and related behaviors to victimization via nonconsensual pornography: an exploratory analysis of university students","volume":"14","author":"Marcum","year":"2022","journal-title":"J Aggress Conflict Peace Res"},{"key":"2025111307553477900_bib27","doi-asserted-by":"publisher","first-page":"3933","DOI":"10.1177\/10778012221077126","article-title":"Nonconsensual distribution of sexually explicit images within a context of coercive control: frequency, characteristics, and associations with other forms of victimization","volume":"28","author":"Dardis","year":"2022","journal-title":"Violence Against Wom"},{"key":"2025111307553477900_bib28","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1080\/15564886.2021.2022057","article-title":"The relationship between sextortion during COVID-19 and pre-pandemic intimate partner violence: a large study of victimization among diverse US men and women","volume":"18","author":"Eaton","year":"2023","journal-title":"Victims Offenders"},{"key":"2025111307553477900_bib29","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/s13178-021-00536-3","article-title":"Image-based sexual abuse in a culturally conservative Nigerian society: female victims\u2019 narratives of psychosocial costs","volume":"19","author":"Aborisade","year":"2022","journal-title":"Sex Res Soc Pol"},{"key":"2025111307553477900_bib30","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1177\/1557085116654565","article-title":"Revenge porn and mental health: a qualitative analysis of the mental health effects of revenge porn on female survivors","volume":"12","author":"Bates","year":"2017","journal-title":"Feminist Criminol"},{"key":"2025111307553477900_bib31","doi-asserted-by":"publisher","first-page":"2158","DOI":"10.1177\/15248380231207896","article-title":"The mental health and social implications of nonconsensual sharing of intimate images on youth: a systematic review","volume":"25","author":"Schmidt","year":"2023","journal-title":"Trauma Viol Abuse"},{"key":"2025111307553477900_bib32","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1007\/s10508-021-02226-y","article-title":"Examining the gendered impacts of technology-facilitated sexual violence: a mixed methods approach","volume":"51","author":"Champion","year":"2022","journal-title":"Arch Sex Behav"},{"key":"2025111307553477900_bib33","doi-asserted-by":"crossref","first-page":"NP7268","DOI":"10.1177\/0886260520967150","article-title":"Social anxiety as a consequence of non-consensually disseminated sexually explicit media victimization","volume":"37","author":"Campbell","year":"2022","journal-title":"J Interpers Viol"},{"key":"2025111307553477900_bib34","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1177\/0964663920947791","article-title":"\"It\u2019s torture for the soul\": the harms of image-based sexual abuse","volume":"30","author":"McGlynn","year":"2021","journal-title":"Soc Legal Stud"},{"key":"2025111307553477900_bib35","first-page":"346","article-title":"Criminalizing revenge porn","volume":"49","author":"Citron","year":"2014","journal-title":"Wake Forest Law Rev"},{"key":"2025111307553477900_bib36","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1093\/ojls\/gqw033","article-title":"Image-based sexual abuse","volume":"37","author":"McGlynn","year":"2017","journal-title":"Oxf J Leg Stud"},{"key":"2025111307553477900_bib37","doi-asserted-by":"crossref","DOI":"10.1145\/3613904.3642382","article-title":"Non-consensual synthetic intimate imagery: prevalence, attitudes, and knowledge in 10 countries","volume-title":"Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems. CHI \u201924","author":"Umbach","year":"2024"},{"key":"2025111307553477900_bib38","doi-asserted-by":"publisher","first-page":"3637","DOI":"10.1177\/0886260516672055","article-title":"Technology-facilitated sexual violence victimization: results from an online survey of Australian adults","volume":"34","author":"Powell","year":"2019","journal-title":"J Interpers Viol"},{"key":"2025111307553477900_bib39","article-title":"\"Send nudes?\": Risk factors for the perpetration of inappropriate intimate image-based behaviours and impacts on victim mental health","author":"Trendell","year":"2019"},{"key":"2025111307553477900_bib40","doi-asserted-by":"publisher","first-page":"2203","DOI":"10.1007\/s10508-021-01920-1","article-title":"Slutpage use among US college students: the secret and social platforms of image-based sexual abuse","volume":"50","author":"Maas","year":"2021","journal-title":"Arch Sex Behav"},{"key":"2025111307553477900_bib41","doi-asserted-by":"publisher","first-page":"673202","DOI":"10.3389\/fpsyg.2021.673202","article-title":"Unsolicited pics and sexual scripts: gender and relationship context of compliant and non-consensual technology-mediated sexual interactions","volume":"12","author":"Courtice","year":"2021","journal-title":"Front Psychol"},{"key":"2025111307553477900_bib42","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1177\/1524838020958057","article-title":"The prevalence of technology-facilitated sexual violence: a meta-analysis and systematic review","volume":"23","author":"Patel","year":"2022","journal-title":"Trauma Violence Abuse"},{"key":"2025111307553477900_bib43","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1007\/s10508-020-01656-4","article-title":"The prevalence of sexting behaviors among emerging adults: a meta-analysis","volume":"49","author":"Mori","year":"2020","journal-title":"Arch Sex Behav"},{"key":"2025111307553477900_bib44","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1177\/1097184X17696170","article-title":"# TheFappening: virtual manhood acts in (homo) social media","volume":"21","author":"Moloney","year":"2018","journal-title":"Men Masc"},{"key":"2025111307553477900_bib45","doi-asserted-by":"publisher","first-page":"NP22864","DOI":"10.1177\/08862605211072266","article-title":"Perpetration of image-based sexual abuse: extent, nature and correlates in a multi-country sample","volume":"37","author":"Powell","year":"2022","journal-title":"J Interpers Viol"},{"key":"2025111307553477900_bib46","volume-title":"\"Weaponized sexuality\" to the normalization of sexual violence: rape culture and the non-consensual distribution of intimate imagery (NCDII)","author":"Hanson","year":"2022"},{"key":"2025111307553477900_bib47","first-page":"15","article-title":"Sexting on the college campus","volume":"17","author":"Winkelman","year":"2014","journal-title":"Elect J Hum Sex"},{"key":"2025111307553477900_bib48","doi-asserted-by":"publisher","first-page":"155","DOI":"10.3390\/sexes4010013","article-title":"Understanding the vicious cycle: relationships between nonconsensual sexting behaviours and cyberbullying perpetration","volume":"4","author":"Hu","year":"2023","journal-title":"Sexes"},{"key":"2025111307553477900_bib49","doi-asserted-by":"publisher","first-page":"5430","DOI":"10.1177\/08862605221122834","article-title":"Nonconsensual distribution of intimate images: exploring the role of legal attitudes in victimization and perpetration","volume":"38","author":"Said","year":"2023","journal-title":"J Interpers Viol"},{"key":"2025111307553477900_bib50","doi-asserted-by":"publisher","first-page":"1515","DOI":"10.1007\/s13178-023-00798-z","article-title":"Sexting behaviors before and during COVID-19 in Italian and Colombian young adults","volume":"20","author":"Morelli","year":"2023","journal-title":"Sex Res Soc Pol"},{"key":"2025111307553477900_bib51","volume-title":"Sextortion: Key Findings from an Online Survey of 1631 Victims","author":"Wolak","year":"2016"},{"key":"2025111307553477900_bib52","doi-asserted-by":"publisher","first-page":"108298","DOI":"10.1016\/j.chb.2024.108298","article-title":"Sextortion: prevalence and correlates in 10 countries","volume":"158","author":"Henry","year":"2024","journal-title":"Comput Hum Behav"},{"key":"2025111307553477900_bib53","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1177\/1079063218800469","article-title":"Sextortion among adolescents: results from a national survey of US youth","volume":"32","author":"Patchin","year":"2020","journal-title":"Sex Abuse"},{"key":"2025111307553477900_bib54","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1002\/jad.12064","article-title":"Assessing image-based sexual abuse: measurement, prevalence, and temporal stability of sextortion and nonconsensual sexting (\u201crevenge porn\u201d) among adolescents","volume":"94","author":"G\u00e1mez-Guadix","year":"2022","journal-title":"J Adolesc"},{"key":"2025111307553477900_bib55","article-title":"Sextortion summary findings from a 2017 survey of 2,097 survivors","author":"Thorn","year":"2017"},{"key":"2025111307553477900_bib56","doi-asserted-by":"publisher","first-page":"108576","DOI":"10.1016\/j.chb.2025.108576","article-title":"Technology-facilitated sexual violence among sexual and gender minority youth: the moderating role of digital resilience","volume":"166","author":"Amadori","year":"2025","journal-title":"Comput Hum Behav"},{"key":"2025111307553477900_bib57","doi-asserted-by":"publisher","first-page":"e2354485","DOI":"10.1001\/jamanetworkopen.2023.54485","article-title":"Prevalence of technology-facilitated abuse among sexual and gender minority youths","volume":"7","author":"Turner","year":"2024","journal-title":"JAMA Netw Open"},{"key":"2025111307553477900_bib58","doi-asserted-by":"publisher","first-page":"11290","DOI":"10.1177\/08862605231179724","article-title":"Experiences of technology-facilitated abuse among sexual and gender minorities","volume":"38","author":"Vogler","year":"2023","journal-title":"J Interpers Viol"},{"key":"2025111307553477900_bib59","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1071\/SH15240","article-title":"Sexting among singles in the USA: prevalence of sending, receiving, and sharing sexual messages and images","volume":"13","author":"Garcia","year":"2016","journal-title":"Sex Health"},{"key":"2025111307553477900_bib60","doi-asserted-by":"publisher","first-page":"2429","DOI":"10.3390\/ijerph18052429","article-title":"Sext dissemination: differences across nations in motivations and associations","volume":"18","author":"Clancy","year":"2021","journal-title":"Int J Environ Res Public Health"},{"key":"2025111307553477900_bib61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/02691728.2025.2525238","article-title":"Stop calling it \"revenge porn\". Hermeneutical injustice in image-based sexual abuse","author":"Viola","year":"2025","journal-title":"Soc Epistemol"},{"key":"2025111307553477900_bib62","doi-asserted-by":"publisher","first-page":"NP19265","DOI":"10.1177\/08862605211043586","article-title":"Personality, attitudinal, and demographic predictors of non-consensual dissemination of intimate images","volume":"37","author":"Karasavva","year":"2022","journal-title":"J Interpers Viol"},{"key":"2025111307553477900_bib63","doi-asserted-by":"crossref","DOI":"10.1145\/3544548.3581020","article-title":"Online harassment in majority contexts: examining harms and remedies across countries","volume-title":"Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. CHI \u201923","author":"Schoenebeck","year":"2023"},{"key":"2025111307553477900_bib64","doi-asserted-by":"publisher","first-page":"1932","DOI":"10.1177\/1077801219863881","article-title":"Image-based sexual abuse: online distribution channels and illicit communities of support","volume":"25","author":"Henry","year":"2019","journal-title":"Violence Against Wom"},{"key":"2025111307553477900_bib65","doi-asserted-by":"publisher","first-page":"2056305120984453","DOI":"10.1177\/2056305120984453","article-title":"The use of Telegram for non-consensual dissemination of intimate images: gendered affordances and the construction of masculinities","volume":"6","author":"Semenzin","year":"2020","journal-title":"Soc Media Soc"},{"key":"2025111307553477900_bib66","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1177\/0959353517720225","article-title":"An examination of nonconsensual pornography websites","volume":"28","author":"Uhl","year":"2018","journal-title":"Feminism Psychol"},{"key":"2025111307553477900_bib67","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1177\/1363460718779965","article-title":"\"This is my cheating ex\": gender and sexuality in revenge porn","volume":"22","author":"Hearn","year":"2019","journal-title":"Sexualities"},{"key":"2025111307553477900_bib68","first-page":"15248380241241014","article-title":"Understanding the perspectives and experiences of male perpetrators of sexual violence against women: a scoping review and thematic synthesis","volume":"25","author":"Jim\u00e9nez\u00a0Aceves","year":"2024","journal-title":"Trauma Violence Abuse"},{"key":"2025111307553477900_bib69","article-title":"Understanding the attitudes and motivations of adults who engage in image-based abuse","author":"Mortreux","year":"2019"},{"key":"2025111307553477900_bib70","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1080\/15546128.2023.2212189","article-title":"Sexting behavior by young adults: the correlation between emotion regulation and moral judgment","volume":"19","author":"Ricon","year":"2024","journal-title":"Am J Sex Educ"},{"key":"2025111307553477900_bib71","article-title":"Image based sexual abuse (IBSA): perceptions toward victims and the attribution of blame","author":"Nott\u00e9","year":"2024"},{"key":"2025111307553477900_bib72","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1080\/13218719.2020.1734977","article-title":"Why did she send it in the first place? Victim blame in the context of \"revenge porn\"","volume":"27","author":"Mckinlay","year":"2020","journal-title":"Psychiatry Psychol Law"},{"key":"2025111307553477900_bib73","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/JACPR-09-2016-0253","article-title":"Understanding revenge pornography: public perceptions of revenge pornography and victim blaming","volume":"10","author":"Bothamley","year":"2017","journal-title":"J Aggress Conflict Peace Res"},{"key":"2025111307553477900_bib74","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1080\/1068316X.2020.1818236","article-title":"Perceptions of victim and offender culpability in non-consensual distribution of intimate images","volume":"27","author":"Zvi","year":"2021","journal-title":"Psychol Crime Law"},{"key":"2025111307553477900_bib75","doi-asserted-by":"publisher","first-page":"3","DOI":"10.4103\/ipj.ipj_166_23","article-title":"\"Snapping, sharing and receiving blame\": a systematic review on psychosocial factors of victim blaming in non-consensual pornography","volume":"33","author":"Amudhan","year":"2024","journal-title":"Ind Psych J"},{"key":"2025111307553477900_bib76","doi-asserted-by":"publisher","DOI":"10.5817\/CP2021-4-3","article-title":"Gender differences in videoed accounts of victim blaming for revenge porn for self-taken and stealth-taken sexually explicit images and videos","volume":"15","author":"Attrill-Smith","year":"2021","journal-title":"Cyberpsychol J Psychosoc Res Cyberspace"},{"key":"2025111307553477900_bib77","doi-asserted-by":"publisher","first-page":"30","DOI":"10.54555\/ccjls.3769.30145","article-title":"Perceptions of image-based sexual abuse among the American public","volume":"22","author":"Call","year":"2021","journal-title":"Criminol Crim Just Law Soc"},{"key":"2025111307553477900_bib78","doi-asserted-by":"crossref","first-page":"NP20146","DOI":"10.1177\/08862605211050109","article-title":"The double standard toward female and male victims of non-consensual dissemination of intimate images","volume":"37","author":"Zvi","year":"2022","journal-title":"J Interpers Viol"},{"key":"2025111307553477900_bib79","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1080\/10538720.2021.1911901","article-title":"The objectification and blame of sexually diverse women who are revenge porn victims","volume":"34","author":"Serpe","year":"2022","journal-title":"J Gay Lesbian Soc Serv"},{"key":"2025111307553477900_bib80","article-title":"UK\u2019s YouGov says demand from Silicon Valley clients holding up","author":"Sandle","year":"2021"},{"key":"2025111307553477900_bib81","article-title":"survey: analysis of complex survey samples","author":"Lumley","year":"2023"},{"key":"2025111307553477900_bib82","volume-title":"R: A Language and Environment for Statistical Computing","author":"R Core Team","year":"2023"},{"key":"2025111307553477900_bib83","article-title":"wCorr: weighted correlations","author":"Bailey","year":"2021"},{"key":"2025111307553477900_bib84","article-title":"srvyr: \"dplyr\"-like syntax for summary statistics of survey data","author":"Freedman\u00a0Ellis","year":"2023"},{"key":"2025111307553477900_bib85","article-title":"marginaleffects: predictions, comparisons, slopes, marginal means, and hypothesis tests","author":"Arel-Bundock","year":"2024"},{"key":"2025111307553477900_bib86","article-title":"jtools: analysis and presentation of social scientific data. 2020","author":"Long","year":"2022"},{"key":"2025111307553477900_bib87","article-title":"broom: an R package for converting statistical analysis objects into tidy data frames","author":"Robinson","year":"2014"},{"key":"2025111307553477900_bib88","article-title":"epitools: epidemiology tools","author":"Aragon","year":"2020"},{"key":"2025111307553477900_bib89","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.tjem.2018.08.001","article-title":"User\u2019s guide to correlation coefficients","volume":"18","author":"Akoglu","year":"2018","journal-title":"Turk J Emerg Med"},{"key":"2025111307553477900_bib90","doi-asserted-by":"publisher","first-page":"1932","DOI":"10.1177\/1077801219863881","article-title":"Image-based sexual abuse: online distribution channels and illicit communities of support","volume":"25","author":"Henry","year":"2019","journal-title":"Violence Against Wom"},{"key":"2025111307553477900_bib91","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1080\/08974454.2019.1646190","article-title":"Image-based sexual abuse: an Australian reflection","volume":"31","author":"Flynn","year":"2021","journal-title":"Women Crim Just"},{"key":"2025111307553477900_bib92","first-page":"1","article-title":"Fragile masculinity: men, gender, and online harassment","volume-title":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. CHI \u201920","author":"Rubin","year":"2020"},{"key":"2025111307553477900_bib93","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1080\/09589236.2021.1947206","article-title":"\"Wanna trade?\": Cisheteronormative homosocial masculinity and the normalization of abuse in youth digital sexual image exchange","volume":"31","author":"Ringrose","year":"2022","journal-title":"J Gender Stud"},{"key":"2025111307553477900_bib94","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1177\/1464700113499853","article-title":"Teen girls, sexual double standards and \"sexting\": gendered value in digital image exchange","volume":"14","author":"Ringrose","year":"2013","journal-title":"Feminist Theory"},{"key":"2025111307553477900_bib95","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3359254","article-title":"\"I\u2019m going to hell for laughing at this\": norms, humour, and the neutralisation of aggression in online communities","volume":"3","author":"Allison","year":"2019","journal-title":"Proc ACM Hum Comput Interact"},{"key":"2025111307553477900_bib96","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1080\/09589236.2016.1202815","article-title":"Moving beyond ideas of laddism: conceptualising \"mischievous masculinities\" as a new way of understanding everyday sexism and gender relations","volume":"27","author":"Nichols","year":"2018","journal-title":"J Gender Stud"},{"key":"2025111307553477900_bib97","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1215\/07311613-10621412","article-title":"Time divide, gender divide: gender, work, and family in South Korea","volume":"28","author":"Cha","year":"2023","journal-title":"J Kor Stud"},{"key":"2025111307553477900_bib98","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1080\/09589236.2018.1560245","article-title":"\"If a girl\u2019s photo gets sent around, that\u2019s a way bigger deal than if a guy\u2019s photo gets sent around\": gender, sexting, and the teenage years","volume":"28","author":"Ricciardelli","year":"2019","journal-title":"J Gender Stud"},{"key":"2025111307553477900_bib99","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1111\/josi.12575","article-title":"Recognizing and addressing how gender shapes young people\u2019s experiences of image-based sexual harassment and abuse in educational settings","volume":"79","author":"Ringrose","year":"2023","journal-title":"J Soc Iss"},{"key":"2025111307553477900_bib100","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1071\/SH14032","article-title":"Prevalence, correlates and attitudes towards sexting among young people in Melbourne, Australia","volume":"11","author":"Yeung","year":"2014","journal-title":"Sex Health"},{"key":"2025111307553477900_bib101","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1177\/1461444820909517","article-title":"Sexting, power, and patriarchy: narratives of sexting from a college population","volume":"23","author":"Bonilla","year":"2021","journal-title":"New Media Soc"},{"key":"2025111307553477900_bib102","doi-asserted-by":"publisher","first-page":"106728","DOI":"10.1016\/j.chb.2021.106728","article-title":"Homophobia is online: sexual victimization and risks on the internet and mental health among bisexual, homosexual, pansexual, asexual, and queer adolescents","volume":"119","author":"G\u00e1mez-Guadix","year":"2021","journal-title":"Comput Hum Behav"},{"key":"2025111307553477900_bib103","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1080\/00224499.2013.871626","article-title":"Gay and bisexual men\u2019s use of the Internet: research from the 1990s through 2013","volume":"51","author":"Grov","year":"2014","journal-title":"J Sex Res"},{"key":"2025111307553477900_bib104","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1017\/lsi.2018.29","article-title":"Law, privacy, and online dating: \"revenge porn\" in gay online communities","volume":"44","author":"Waldman","year":"2019","journal-title":"Law Soc Inq"},{"key":"2025111307553477900_bib105","first-page":"127","article-title":"Usable sexurity: studying $\\lbrace$People\u2019s$\\rbrace$ concerns and strategies when sexting","volume-title":"Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)","author":"Geeng","year":"2020"},{"key":"2025111307553477900_bib106","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.jadohealth.2019.10.010","article-title":"It is time to teach safe sexting","volume":"66","author":"Patchin","year":"2020","journal-title":"J Adolesc Health"},{"key":"2025111307553477900_bib107","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.chb.2014.12.009","article-title":"Unresponsive or un-noticed?: cyberbystander intervention in an experimental cyberbullying context","volume":"45","author":"Dillon","year":"2015","journal-title":"Comput Hum Behav"},{"key":"2025111307553477900_bib108","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1093\/oso\/9780198877813.003.0015","article-title":"\"It wasn\u2019t worth the pain to me to pursue it\u2019","volume-title":"Criminalizing Intimate Image Abuse: A Comparative Perspective","author":"Henry","year":"2024"},{"key":"2025111307553477900_bib109","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10691-021-09460-8","article-title":"Seeking justice and redress for victim-survivors of image-based sexual abuse","volume":"29","author":"Rackley","year":"2021","journal-title":"Feminist Legal Stud"},{"key":"2025111307553477900_bib110","article-title":"Guide for legislators","author":"Cyber Civil Rights Initiative","year":"2021"},{"key":"2025111307553477900_bib111","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1080\/15614263.2018.1507892","article-title":"Policing image-based sexual abuse: stakeholder perspectives","volume":"19","author":"Henry","year":"2018","journal-title":"Police Pract Res"},{"key":"2025111307553477900_bib112","doi-asserted-by":"publisher","first-page":"2166","DOI":"10.1177\/0886260518760011","article-title":"Understanding revenge pornography: a national survey of police officers and staff in England and Wales","volume":"36","author":"Bond","year":"2021","journal-title":"J Interpers Viol"},{"key":"2025111307553477900_bib113","doi-asserted-by":"publisher","first-page":"2148","DOI":"10.3389\/fpsyg.2020.02148","article-title":"Police officer perceptions of non-consensual dissemination of intimate images","volume":"11","author":"Zvi","year":"2020","journal-title":"Front Psychol"},{"key":"2025111307553477900_bib114","article-title":"Sentencing image-based sexual abuse offences in Victoria","author":"Sentencing Council of Victoria","year":"2020"},{"key":"2025111307553477900_bib115","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1177\/14732254211030570","article-title":"\"Young people just resolve it in their own group\": young people\u2019s perspectives on responses to non-consensual intimate image distribution","volume":"22","author":"Dodge","year":"2022","journal-title":"Youth Just"},{"key":"2025111307553477900_bib116","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1093\/oso\/9780198877813.003.0017","article-title":"Seeking justice for image-based sexual abuse","volume-title":"Criminalizing Intimate Image Abuse","author":"McGlynn","year":"2024"},{"key":"2025111307553477900_bib117","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1080\/09589236.2020.1799767","article-title":"Only sluts love sexting: youth, sexual norms and non-consensual sharing of digital sexual images","volume":"30","author":"Naezer","year":"2021","journal-title":"J Gender Stud"},{"key":"2025111307553477900_bib118","doi-asserted-by":"crossref","first-page":"09593535241234429","DOI":"10.1177\/09593535241234429","article-title":"The failed promise of consent in women\u2019s experiences of coercive and unwanted anal sex with men","volume":"34","author":"Faustino","year":"2024","journal-title":"Feminism Psychol"},{"key":"2025111307553477900_bib119","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1080\/10304312.2012.665840","article-title":"Sexting, consent and young people\u2019s ethics: beyond Megan\u2019s Story","volume":"26","author":"Albury","year":"2012","journal-title":"Continuum"},{"key":"2025111307553477900_bib120","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/MSEC.2023.3324615","article-title":"Safer digital intimacy for sex workers and beyond: a technical research agenda","volume":"22","author":"Hamilton","year":"2023","journal-title":"IEEE Secur Priv"},{"key":"2025111307553477900_bib121","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1093\/bjc\/azy052","article-title":"Digital coercive control: insights from two landmark domestic violence studies","volume":"59","author":"Harris","year":"2019","journal-title":"Brit J Criminol"},{"key":"2025111307553477900_bib122","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/s11135-005-8081-8","article-title":"Conducting online surveys","volume":"40","author":"Van\u00a0Selm","year":"2006","journal-title":"Qual Quant"},{"key":"2025111307553477900_bib123","article-title":"Phase 3.2 of Census Bureau Survey questions now include SOGI, child tax credit, COVID vaccination of children","author":"File","year":"2021"},{"key":"2025111307553477900_bib124","article-title":"Data collection in the field of ethnicity","author":"European Commission","year":"2021"},{"key":"2025111307553477900_bib125","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MPRV.2022.3182222","article-title":"Safety as a grand challenge in pervasive computing: using feminist epistemologies to shift the paradigm from security to safety","volume":"21","author":"Strohmayer","year":"2022","journal-title":"IEEE Pervas Comput"},{"key":"2025111307553477900_bib126","first-page":"10778012231222486","article-title":"Safeguarding the \u201cInternet of Things\u201d for victim-survivors of domestic and family violence: anticipating exploitative use and encouraging safety-by-design","volume":"3","author":"Brown","year":"2024","journal-title":"Violence Against Women"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf033\/65282085\/tyaf033.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf033\/65282085\/tyaf033.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T12:55:46Z","timestamp":1763038546000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf033\/8322282"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":126,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf033","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf033"}}