{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:17:02Z","timestamp":1776122222935,"version":"3.50.1"},"reference-count":107,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2311102"],"award-info":[{"award-number":["2311102"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2024,11,7]]},"abstract":"<jats:p>\n            Non-consensual intimate media (NCIM) involves sharing intimate content without the depicted person's consent, including 'revenge porn' and sexually explicit deepfakes. While NCIM has received attention in legal, psychological, and communication fields over the past decade, it is not sufficiently addressed in computing scholarship. This paper addresses this gap by linking NCIM harms to the specific technological components that facilitate them. We introduce the\n            <jats:italic toggle=\"yes\">sociotechnical stack<\/jats:italic>\n            , a conceptual framework designed to map the technical stack to its corresponding social impacts. The sociotechnical stack allows us to analyze sociotechnical problems like NCIM, and points toward opportunities for computing research. We propose a research roadmap for computing and social computing communities to deter NCIM perpetration and support victim-survivors through building and rebuilding technologies.\n          <\/jats:p>","DOI":"10.1145\/3686914","type":"journal-article","created":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T15:52:40Z","timestamp":1731081160000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["The Sociotechnical Stack: Opportunities for Social Computing Research in Non-Consensual Intimate Media"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-3720-7086","authenticated-orcid":false,"given":"Li","family":"Qiwei","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7477-6782","authenticated-orcid":false,"given":"Allison","family":"McDonald","sequence":"additional","affiliation":[{"name":"Boston University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6552-4540","authenticated-orcid":false,"given":"Oliver L.","family":"Haimson","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8688-1595","authenticated-orcid":false,"given":"Sarita","family":"Schoenebeck","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3047-7059","authenticated-orcid":false,"given":"Eric","family":"Gilbert","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,8]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Accessed","year":"2024","unstructured":"[n. d.]. Safe Digital Intimacy. https:\/\/www.safedigitalintimacy.org\/. Accessed: April 28, 2024."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI1523_5"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/14626268.2013.767276"},{"key":"e_1_2_1_4_1","volume-title":"Fast Frequency Domain Screen-Shooting Watermarking Algorithm Based on ORB Feature Points. Mathematics 11, 7 (Jan","author":"Bai Yu","year":"2023","unstructured":"Yu Bai, Li Li, Shanqing Zhang, Jianfeng Lu, and Mahmoud Emam. 2023. Fast Frequency Domain Screen-Shooting Watermarking Algorithm Based on ORB Feature Points. Mathematics 11, 7 (Jan. 2023), 1730. https:\/\/doi.org\/10.3390\/ math11071730 Number: 7 Publisher: Multidisciplinary Digital Publishing Institute."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/1557085116654565"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134659"},{"key":"e_1_2_1_7_1","first-page":"233","article-title":"No vengeance for revenge porn victims: Unraveling why this latest female-centric, intimate-partner offense is still legal, and why we should criminalize it","volume":"42","author":"Bloom Sarah","year":"2014","unstructured":"Sarah Bloom. 2014. No vengeance for revenge porn victims: Unraveling why this latest female-centric, intimate-partner offense is still legal, and why we should criminalize it. Fordham Urb. LJ 42 (2014), 233.","journal-title":"Fordham Urb. LJ"},{"key":"e_1_2_1_8_1","volume-title":"Posting into the void: Studying the impact of shadowbanning on sex workers and activists. Hacking\/Hustling","author":"Blunt Danielle","year":"2020","unstructured":"Danielle Blunt, Ariel Wolf, Emily Coombes, and Shanelle Mullin. 2020. Posting into the void: Studying the impact of shadowbanning on sex workers and activists. Hacking\/Hustling (2020), 1--87."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668339"},{"key":"e_1_2_1_10_1","volume-title":"A networked self","author":"Boyd Danah","unstructured":"Danah Boyd. 2010. Social network sites as networked publics: Affordances, dynamics, and implications. In A networked self. Routledge, 47--66."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125765"},{"key":"e_1_2_1_12_1","volume-title":"Sexual Justice: Supporting Victims, Ensuring Due Process, and Resisting the Conservative Backlash","author":"Brodsky Alexandra","year":"2021","unstructured":"Alexandra Brodsky. 2021. Sexual Justice: Supporting Victims, Ensuring Due Process, and Resisting the Conservative Backlash. Metropolitan Books."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2019.1708773"},{"key":"e_1_2_1_14_1","article-title":"CRIMINALIZING NONCONSENSUAL PORNOGRAPHY","volume":"103","author":"Burnett Emma","year":"2023","unstructured":"Emma Burnett. 2023. CRIMINALIZING NONCONSENSUAL PORNOGRAPHY. Boston University Law Review 103, 6 (2023).","journal-title":"Boston University Law Review"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00061"},{"key":"e_1_2_1_16_1","volume-title":"Trauma-Informed Computing: Towards Safer Technology Experiences for All. In CHI Conference on Human Factors in Computing Systems. 1--20","author":"Chen Janet X","year":"2022","unstructured":"Janet X Chen, Allison McDonald, Yixin Zou, Emily Tseng, Kevin A Roundy, Acar Tamersoy, Florian Schaub, Thomas Ristenpart, and Nicola Dell. 2022. Trauma-Informed Computing: Towards Safer Technology Experiences for All. In CHI Conference on Human Factors in Computing Systems. 1--20."},{"key":"e_1_2_1_17_1","unstructured":"Michelle Chen. 2016. One More Way the Courts Aren?t Working for the Poor. https:\/\/www.thenation.com\/article\/archive\/one-more-way-the-courts-arent-working-for-the-poor\/."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817744784"},{"key":"e_1_2_1_19_1","volume-title":"Hate crimes in cyberspace","author":"Citron Danielle Keats","unstructured":"Danielle Keats Citron. 2014. Hate crimes in cyberspace. Harvard University Press."},{"key":"e_1_2_1_20_1","volume-title":"A New Compact for Sexual Privacy. William & Mary Law Review","author":"Citron Danielle Keats","year":"2020","unstructured":"Danielle Keats Citron. 2020. A New Compact for Sexual Privacy. William & Mary Law Review (2020)."},{"key":"e_1_2_1_21_1","volume-title":"The Fight for Privacy: Protecting Dignity, Identity and Love in our Digital Age","author":"Citron Danielle Keats","unstructured":"Danielle Keats Citron. 2022. The Fight for Privacy: Protecting Dignity, Identity and Love in our Digital Age. W.W. Norton & Company."},{"key":"e_1_2_1_22_1","first-page":"345","article-title":"Criminalizing revenge porn","volume":"49","author":"Citron Danielle Keats","year":"2014","unstructured":"Danielle Keats Citron and Mary Anne Franks. 2014. Criminalizing revenge porn. Wake Forest L. Rev. 49 (2014), 345.","journal-title":"Wake Forest L. Rev."},{"key":"e_1_2_1_23_1","unstructured":"Danielle Keats Citron and Mary Anne Franks. 2020. The Internet as a Speech Machine and Other Myths Confounding Section 230 Reform. U. Chi. Legal F. (2020) 45."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.11.023"},{"key":"e_1_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Kathryn D Coduto and Allison McDonald. 2024. 'Delete it and Move On': Digital Management of Shared Sexual Content after a Breakup. (2024).","DOI":"10.1145\/3613904.3642722"},{"key":"e_1_2_1_26_1","volume-title":"Deepfake Abuse: Landscape Analysis. Technical Report. My Image My Choice Coalition. Available online: www.myimagemychoice.org.","author":"Compton Sophie","year":"2024","unstructured":"Sophie Compton and Marina Hunt. 2024. Deepfake Abuse: Landscape Analysis. Technical Report. My Image My Choice Coalition. Available online: www.myimagemychoice.org."},{"key":"e_1_2_1_27_1","volume-title":"Violence Against Women in the US: Theory, Research and Policy","author":"Coy Maddy","unstructured":"Maddy Coy. 2024. Violence Against Women in the US: Theory, Research and Policy. Taylor & Francis."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022--14291-z"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/02732173.1993.9982041"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/2374623816684692"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/jcm8050706"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1017\/cls.2019.4"},{"key":"e_1_2_1_33_1","unstructured":"Asia Eaton Holly Jacobs and Yanet Ruvalcaba. 2017. 2017 Nationwide Online Study of Nonconsensual Porn Victimization and Perpetration. (2017)."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.21300\/19.3.2018.593"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2468823"},{"key":"e_1_2_1_36_1","volume-title":"Drafting an effective 'revenge porn' law: A guide for legislators. Available at SSRN 2468823","author":"Franks Mary Anne","year":"2015","unstructured":"Mary Anne Franks. 2015. Drafting an effective 'revenge porn' law: A guide for legislators. Available at SSRN 2468823 (2015)."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359304"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134681"},{"key":"e_1_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Deen Freelon and Chris Wells. 2020. Disinformation as political communication. 145--156 pages.","DOI":"10.1080\/10584609.2020.1723755"},{"key":"e_1_2_1_41_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS","author":"Geeng Christine","year":"2020","unstructured":"Christine Geeng, Jevan Hutson, and Franziska Roesner. 2020. Usable Sexurity: Studying {People's} Concerns and Strategies When Sexting. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 127--144."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1153700"},{"key":"e_1_2_1_43_1","volume-title":"Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media","author":"Gillespie Tarleton","unstructured":"Tarleton Gillespie. 2018. Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media. Yale University Press."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/09589236.2021.1892610"},{"key":"e_1_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Eric Goldman. 2020. How Section 230 Enhances the First Amendment. https:\/\/papers.ssrn.com\/abstract=3662475.","DOI":"10.2139\/ssrn.3351323"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.3390\/e25020288"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1086\/686904"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2023.3324615"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1177\/1363460718779965"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801219863881"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1177\/0004865814524218"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445778"},{"key":"e_1_2_1_53_1","unstructured":"Cyber Civil Rights Initiative. 2014. Revenge Porn Statistics. (2014). https:\/\/www.cybercivilrights.org\/wp-content\/uploads\/2014\/12\/RPStatistics.pdf"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185593"},{"key":"e_1_2_1_55_1","unstructured":"Xiao-Dan Jiang Shi-Ming Yu De-Feng He Yong-Liang Liu and Zhe-Ming Lu. [n. d.]. Information Leakage Source Tracing Based on Robust Image Watermarking Against Mobile Instant Messaging. ([n. d.])."},{"key":"e_1_2_1_56_1","volume-title":"Sluts and soyboys: MGTOW and the production of misogynistic online harassment. New media & society 22, 10","author":"Jones Callum","year":"2020","unstructured":"Callum Jones, Verity Trott, and Scott Wright. 2020. Sluts and soyboys: MGTOW and the production of misogynistic online harassment. New media & society 22, 10 (2020), 1903--1921."},{"key":"e_1_2_1_57_1","first-page":"741","article-title":"Barriers to affirmative consent policies and the need for affirmative sexuality","volume":"47","author":"Jozkowski Kristen N","year":"2015","unstructured":"Kristen N Jozkowski. 2015. Barriers to affirmative consent policies and the need for affirmative sexuality. U. of Pac. L. Rev. 47 (2015), 741.","journal-title":"U. of Pac. L. Rev."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3170639"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2020.0272"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/13683500.2020.1738357"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.52306\/02020319CICB2462"},{"key":"e_1_2_1_62_1","unstructured":"Una Lee and Dann Toliver. 2017. Building Consentful Tech. Technical Report. http:\/\/www.consentfultech.io\/wpcontent\/uploads\/2019\/10\/Building-Consentful-Tech.pdf"},{"key":"e_1_2_1_63_1","volume-title":"Code: And other laws of cyberspace. ReadHowYouWant. com.","author":"Lessig Lawrence","year":"2009","unstructured":"Lawrence Lessig. 2009. Code: And other laws of cyberspace. ReadHowYouWant. com."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1813486116"},{"key":"e_1_2_1_65_1","unstructured":"Allison McDonald Florian Schaub Catherine Barwulor Michelle L Mazurek and Elissa M Redmiles. [n. d.]. 'It's stressful having all these phones': Investigating Sex Workers? Safety Goals Risks and Practices Online. ([n. d.])."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1177\/0964663920947791"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1093\/ojls\/gqw033"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051231179696"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1080\/09589236.2020.1799767"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376827"},{"key":"e_1_2_1_71_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23002"},{"key":"e_1_2_1_73_1","volume-title":"Share and Share Alike' An Exploration of Secure Behaviors in Romantic Relationships. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018","author":"Park Cheul Young","year":"2018","unstructured":"Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, and Jason Hong. 2018. Share and Share Alike' An Exploration of Secure Behaviors in Romantic Relationships. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). 83--102. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/park"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1177\/1524838020958057"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2021.1935290"},{"key":"e_1_2_1_76_1","volume-title":"Blurred lines? Responding to 'sexting? and gender-based violence among young people. Children Australia 39, 2","author":"Powell Anastasia","year":"2014","unstructured":"Anastasia Powell and Nicola Henry. 2014. Blurred lines? Responding to 'sexting? and gender-based violence among young people. Children Australia 39, 2 (2014), 119--124. Publisher: Cambridge University Press."},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1080\/13552600.2022.2119292"},{"key":"e_1_2_1_78_1","volume-title":"Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse. arXiv preprint arXiv:2403.04659","author":"Qin Lucy","year":"2024","unstructured":"Lucy Qin, Vaughn Hamilton, Sharon Wang, Yigit Aydinalp, Marin Scarlett, and Elissa M Redmiles. 2024. \" Did They Consent to That?\": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse. arXiv preprint arXiv:2403.04659 (2024)."},{"key":"e_1_2_1_79_1","unstructured":"Li Qiwei Francesca Lameiro Shefali Patel Cristi-Isaula-Reyes Eytan Adar Eric Gilbert and Sarita Schoenebeck. 2024. Feminist Interaction Techniques: Deterring Non-Consensual Screenshots with Interaction Techniques. arXiv:2404.18867 [cs.HC]"},{"key":"e_1_2_1_80_1","volume-title":"Participatory Design: an introduction","author":"Robertson Toni","unstructured":"Toni Robertson and Jesper Simonsen. 2012. Participatory Design: an introduction. In Routledge international handbook of participatory design. Routledge, 1--17."},{"key":"e_1_2_1_81_1","volume-title":"Nonconsensual pornography among US adults: a sexual scripts framework on victimization, perpetration, and health correlates for women and men. Psychology of violence 10, 1","author":"Ruvalcaba Yanet","year":"2020","unstructured":"Yanet Ruvalcaba and Asia A Eaton. 2020. Nonconsensual pornography among US adults: a sexual scripts framework on victimization, perpetration, and health correlates for women and men. Psychology of violence 10, 1 (2020), 68."},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2912727"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300232"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820913122"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449076"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2023.102036"},{"key":"e_1_2_1_87_1","volume-title":"Mark W Newman, and Sarita Schoenebeck.","author":"Scott Carol F","year":"2023","unstructured":"Carol F Scott, Gabriela Marcu, Riana Elyse Anderson, Mark W Newman, and Sarita Schoenebeck. 2023. Trauma-Informed Social Media: Towards Solutions for Reducing and Healing Online Harm. arXiv preprint arXiv:2302.05312 (2023)."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1177\/14614448231188929"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0037564"},{"key":"e_1_2_1_90_1","volume-title":"Intimate partner violence, technology, and stalking. Violence against women 13, 8","author":"Southworth Cynthia","year":"2007","unstructured":"Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, and Sarah Tucker. 2007. Intimate partner violence, technology, and stalking. Violence against women 13, 8 (2007), 842--856."},{"key":"e_1_2_1_91_1","volume-title":"Burr Reintroduce Bipartisan Bill to Address Online Exploitation of Private Images on International Women's Day. https:\/\/speier","author":"Speier Jackie","year":"2022","unstructured":"Jackie Speier. 2022. Speier, Katko, Klobuchar, Burr Reintroduce Bipartisan Bill to Address Online Exploitation of Private Images on International Women's Day. https:\/\/speier.house.gov\/2022\/3\/speier-and-katko-reintroducebipartisan-bill-to-address-online-exploitation-of-private-images-on-international-women-s-day"},{"key":"e_1_2_1_92_1","unstructured":"Amia Srinivasan. 2021. The right to sex: Feminism in the twenty-first century. Farrar Straus and Giroux."},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445107"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00028"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.54501\/jots.v2i1.126"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1017\/glj.2021.33"},{"key":"e_1_2_1_97_1","volume-title":"29th USENIX security symposium (USENIX Security 20). 1893--1909.","author":"Tseng Emily","unstructured":"Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2020. The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums. In 29th USENIX security symposium (USENIX Security 20). 1893--1909."},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502038"},{"key":"e_1_2_1_99_1","first-page":"441","article-title":"Affirmative consent","author":"Tuerkheimer Deborah","year":"2015","unstructured":"Deborah Tuerkheimer. 2015. Affirmative consent. Ohio St. J. Crim. L. 13 (2015), 441.","journal-title":"Ohio St. J. Crim."},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452918.3458794"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2017.06.010"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1080\/10538712.2022.2067093"},{"key":"e_1_2_1_103_1","article-title":"Cross-platform disinformation campaigns: lessons learned and next steps","volume":"1","author":"Wilson Tom","year":"2020","unstructured":"Tom Wilson and Kate Starbird. 2020. Cross-platform disinformation campaigns: lessons learned and next steps. Harvard Kennedy School Misinformation Review 1, 1 (2020).","journal-title":"Harvard Kennedy School Misinformation Review"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790106"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117820"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580911"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449288"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686914","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3686914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:55:31Z","timestamp":1755737731000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686914"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,7]]},"references-count":107,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2024,11,7]]}},"alternative-id":["10.1145\/3686914"],"URL":"https:\/\/doi.org\/10.1145\/3686914","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,7]]},"assertion":[{"value":"2024-11-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}