{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:03:44Z","timestamp":1751688224898,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":92,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"NSF","award":["1763297,2311102"],"award-info":[{"award-number":["1763297,2311102"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713334","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T03:33:32Z","timestamp":1745465612000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Law of One's Own: The Inefficacy of the DMCA for Non-Consensual Intimate Media"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-3720-7086","authenticated-orcid":false,"given":"Li","family":"Qiwei","sequence":"first","affiliation":[{"name":"School of Information, University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5176-3137","authenticated-orcid":false,"given":"Shihui","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5343-6367","authenticated-orcid":false,"given":"Samantha Paige","family":"Pratt","sequence":"additional","affiliation":[{"name":"School of Information, University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0505-1606","authenticated-orcid":false,"given":"Andrew Timothy","family":"Kasper","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3047-7059","authenticated-orcid":false,"given":"Eric","family":"Gilbert","sequence":"additional","affiliation":[{"name":"School of Information, University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8688-1595","authenticated-orcid":false,"given":"Sarita","family":"Schoenebeck","sequence":"additional","affiliation":[{"name":"School of Information, University of Michigan, Ann Arbor, Michigan, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","unstructured":"[n. d.]. Safe Digital Intimacy. https:\/\/www.safedigitalintimacy.org\/. Accessed: April 28 2024."},{"key":"e_1_3_3_3_3_2","unstructured":"[n. d.]. These States Have Banned the Type of Deepfake Porn That Targeted Taylor Swift."},{"key":"e_1_3_3_3_4_2","unstructured":"1991. Feist Publications Inc. v. Rural Telephone Service Co.346\u00a0pages."},{"key":"e_1_3_3_3_5_2","unstructured":"1996. Communications Decency Act Section 230. 47 U.S.C. \u00a7 230. https:\/\/www.law.cornell.edu\/uscode\/text\/47\/230 Enacted as part of the Telecommunications Act of 1996."},{"key":"e_1_3_3_3_6_2","unstructured":"1998. Digital Millennium Copyright Act. Pub. L. No. 105-304 112 Stat. 2860 (1998)."},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"crossref","unstructured":"2012. 47 U.S.C. \u00a7 230 (2012). United States Code. https:\/\/www.law.cornell.edu\/uscode\/text\/47\/230","DOI":"10.1353\/wal.2012.0054"},{"key":"e_1_3_3_3_8_2","unstructured":"2015. Garcia v. Google Inc.733\u00a0pages."},{"key":"e_1_3_3_3_9_2","unstructured":"118th United States Congress. 2023. S.3696 - Deepfake Task Force Act. https:\/\/www.congress.gov\/bill\/118th-congress\/senate-bill\/3696\/text Accessed: 2024-08-21."},{"key":"e_1_3_3_3_10_2","unstructured":"American Civil Liberties Union. 2020. ACLU Letter to Congress Opposing Amending or Repealing Section 230. https:\/\/www.aclu.org\/documents\/aclu-letter-congress-opposing-amending-or-repealing-section-230. Accessed: 2025-02-12."},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"crossref","unstructured":"Basak Bak and Rebecca\u00a0Rose Nocella. 2023. Unveiling copyright law double bind through pragmatist feminism: adult content creators as authors. Porn Studies 10 4 (2023) 431\u2013451.","DOI":"10.1080\/23268743.2023.2225531"},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"publisher","unstructured":"Samantha Bates. 2017. Revenge Porn and Mental Health: A Qualitative Analysis of the Mental Health Effects of Revenge Porn on Female Survivors. Feminist Criminology 12 1 (Jan. 2017) 22\u201342. 10.1177\/1557085116654565 Publisher: SAGE Publications.","DOI":"10.1177\/1557085116654565"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642871"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"crossref","unstructured":"Danielle Blunt and Ariel Wolf. 2020. Erased: The impact of FOSTA-SESTA and the removal of Backpage on sex workers. Anti-trafficking review14 (2020) 117\u2013121.","DOI":"10.14197\/atr.201220148"},{"key":"e_1_3_3_3_15_2","unstructured":"Natalie\u00a0Grace Brigham Miranda Wei Tadayoshi Kohno and Elissa\u00a0M Redmiles. 2024. \" Violation of my body:\" Perceptions of AI-generated non-consensual (intimate) imagery. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2406.05520 (2024)."},{"key":"e_1_3_3_3_16_2","unstructured":"Zoe Carpou. 2015. Robots Pirates and the Rise of the Automated Takedown Regime: Using the DMCA to Fight Piracy and Protect End-Users. Colum. JL & Arts 39 (2015) 551."},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","unstructured":"Eshwar Chandrasekharan Shagun Jhaver Amy Bruckman and Eric Gilbert. 2022. Quarantined! Examining the Effects of a Community-Wide Moderation Intervention on Reddit. ACM Transactions on Computer-Human Interaction 29 4 (Aug. 2022) 1\u201326. 10.1145\/3490499","DOI":"10.1145\/3490499"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","unstructured":"Eshwar Chandrasekharan Mattia Samory Shagun Jhaver Hunter Charvat Amy Bruckman Cliff Lampe Jacob Eisenstein and Eric Gilbert. 2018. The Internet\u2019s Hidden Rules: An Empirical Study of Reddit Norm Violations at Micro Meso and Macro Scales. Proceedings of the ACM on Human-Computer Interaction 2 CSCW (Nov. 2018) 1\u201325. 10.1145\/3274301","DOI":"10.1145\/3274301"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517475"},{"key":"e_1_3_3_3_20_2","unstructured":"Danielle\u00a0Keats Citron. 2018. Sexual privacy. Yale LJ 128 (2018) 1870."},{"key":"e_1_3_3_3_21_2","volume-title":"The Fight for Privacy: Protecting Dignity, Identity and Love in our Digital Age","author":"Citron Danielle\u00a0Keats","year":"2022","unstructured":"Danielle\u00a0Keats Citron. 2022. The Fight for Privacy: Protecting Dignity, Identity and Love in our Digital Age. W.W. Norton & Company."},{"key":"e_1_3_3_3_22_2","unstructured":"Danielle\u00a0Keats Citron. 2023. How to fix section 230. BUL Rev. 103 (2023) 713."},{"key":"e_1_3_3_3_23_2","unstructured":"Danielle\u00a0Keats Citron and Mary\u00a0Anne Franks. 2014. Criminalizing revenge porn. Wake Forest L. Rev. 49 (2014) 345."},{"key":"e_1_3_3_3_24_2","unstructured":"Danielle\u00a0K Citron and Mary\u00a0Anne Franks. 2016. Criminalizing Revenge Porn. (2016)."},{"key":"e_1_3_3_3_25_2","unstructured":"Danielle\u00a0Keats Citron and Mary\u00a0Anne Franks. 2020. The Internet as a Speech Machine and Other Myths Confounding Section 230 Reform. U. Chi. Legal F. (2020) 45."},{"key":"e_1_3_3_3_26_2","unstructured":"Jeffrey Cobia. 2009. The digital millennium copyright act takedown notice procedure: Misuses abuses and shortcomings of the process. Minn. JL Sci. & Tech. 10 (2009) 387."},{"key":"e_1_3_3_3_27_2","unstructured":"Julie\u00a0E. Cohen. 2017. Law for the Platform Economy. U.C. Davis Law Review 51 (2017) 133\u2013143."},{"key":"e_1_3_3_3_28_2","volume-title":"Deepfake Abuse: Landscape Analysis","author":"Compton Sophie","year":"2024","unstructured":"Sophie Compton and Marina Hunt. 2024. Deepfake Abuse: Landscape Analysis. Technical Report. My Image My Choice Coalition. Available online: www.myimagemychoice.org."},{"key":"e_1_3_3_3_29_2","unstructured":"U.S. Congress. 2022. Consolidated Appropriations Act 2022. https:\/\/www.congress.gov\/bill\/117th-congress\/house-bill\/2471\/text Accessed: 2024-08-14."},{"key":"e_1_3_3_3_30_2","unstructured":"U.S. Congress. 2024. Take It Down. https:\/\/dean.house.gov\/_cache\/files\/b\/9\/b9837a71-3e00-400b-ba43-0ac564a2c206\/C4DD154E8571ECF5D836BF3A0C010889.take-it-down.pdf#page=1.00"},{"key":"e_1_3_3_3_31_2","unstructured":"Cyber Civil Rights Initiative. 2024. CCRI Safety Center: Online Content Removal. https:\/\/cybercivilrights.org\/ccri-safety-center\/. Accessed: 2024-09-05."},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","unstructured":"Antonella De\u00a0Angeli Mattia Falduti Maria Menendez-Blanco and Sergio Tessaris. 2023. Reporting non-consensual pornography: clarity efficiency and distress. Multimedia Tools and Applications (Jan. 2023). 10.1007\/s11042-022-14291-z","DOI":"10.1007\/s11042-022-14291-z"},{"key":"e_1_3_3_3_33_2","unstructured":"Elisa D\u2019Amico and Luke Steinberger. 2015. Fighting for online privacy with digital weaponry: Combating revenge pornography. NYSBA Entertainment Arts and Sports Law Journal 26 2 (2015) 24\u201336."},{"key":"e_1_3_3_3_34_2","unstructured":"Asia Eaton Holly Jacobs and Yanet Ruvalcaba. 2017. 2017 Nationwide Online Study of Nonconsensual Porn Victimization and Perpetration. (2017)."},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"crossref","unstructured":"Asia\u00a0A Eaton Michelle\u00a0A Krieger Jaclyn\u00a0A Siegel and Abbey\u00a0M Miller. 2024. Victim-survivors\u2019 proposed solutions to addressing image-based sexual abuse in the US: Legal corporate educational technological and cultural approaches. Analyses of Social Issues and Public Policy (2024).","DOI":"10.22541\/au.169646224.49311265\/v1"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"crossref","unstructured":"Elizabeth Farries and Tristan Sturm. 2019. Feminist legal geographies of intimate-image sexual abuse: Using copyright logic to combat the unauthorized distribution of celebrity intimate images in cyberspaces. Environment and Planning A: Economy and Space 51 5 (2019) 1145\u20131165.","DOI":"10.1177\/0308518X18786964"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376745"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675234"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"publisher","unstructured":"Casey Fiesler Joshua Paup and Corian Zacher. 2023. Chilling Tales: Understanding the Impact of Copyright Takedowns on Transformative Content Creators. Proceedings of the ACM on Human-Computer Interaction 7 CSCW2 (Sept. 2023) 1\u201321. 10.1145\/3610095","DOI":"10.1145\/3610095"},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1093\/acrefore\/9780190264079.013.534"},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"publisher","unstructured":"Mary\u00a0Anne Franks. 2014. Drafting an Effective \u2019Revenge Porn\u2019 Law: A Guide for Legislators. SSRN Electronic Journal (2014). 10.2139\/ssrn.2468823","DOI":"10.2139\/ssrn.2468823"},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"publisher","unstructured":"Mary\u00a0Anne Franks. 2021. Reforming Section 230 and Platform Liability. SSRN Electronic Journal (2021). 10.2139\/ssrn.4213840","DOI":"10.2139\/ssrn.4213840"},{"key":"e_1_3_3_3_43_2","unstructured":"Mary\u00a0Anne Franks and Ari\u00a0Ezra Waldman. [n. d.]. Sex Lies and Videotape: Deep Fakes and Free Speech Delusions. ([n. d.])."},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_3_3_3_45_2","unstructured":"Jeanne\u00a0C Fromer. 2015. Should the Law Care Why Intellectual Property Rights Have Been Asserted. Hous. L. Rev. 53 (2015) 549."},{"key":"e_1_3_3_3_46_2","unstructured":"Christine Geeng. [n. d.]. Usable Sexurity: Studying People\u2019s Concerns and Strategies When Sexting. ([n. d.])."},{"key":"e_1_3_3_3_47_2","unstructured":"GIGAZINE. 2024. The Number of DMCA Deletion Requests to Google Due to Copyright Violations is Increasing Day by Day Reaching an All-Time High. https:\/\/gigazine.net\/gsc_news\/en\/20240112-google-requests\/ Accessed: 2024-08-12."},{"key":"e_1_3_3_3_48_2","unstructured":"Andrew Gilden. [n. d.]. COPYRIGHT\u2019S MARKET GIBBERISH. WASHINGTON LAW REVIEW 94 ([n. d.])."},{"key":"e_1_3_3_3_49_2","unstructured":"Andrew Gilden. 2018. Sex Death and Intellectual Property. Harv. JL & Tech. 32 (2018) 67."},{"key":"e_1_3_3_3_50_2","unstructured":"Andrew Gilden. 2019. Copyright\u2019s Market Gibberish. Wash. L. Rev. 94 (2019) 1019."},{"key":"e_1_3_3_3_51_2","volume-title":"Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media","author":"Gillespie Tarleton","year":"2018","unstructured":"Tarleton Gillespie. 2018. Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media. Yale University Press."},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"crossref","unstructured":"Nicola Henry and Gemma Beard. 2024. Image-based sexual abuse perpetration: a scoping review. Trauma Violence & Abuse (2024) 15248380241266137.","DOI":"10.1177\/15248380241266137"},{"key":"e_1_3_3_3_53_2","unstructured":"Sean Hollister. 2024. How Nintendo\u2019s destruction of Yuzu is rocking the emulator world. The Verge (2024). https:\/\/www.theverge.com\/24098640\/nintendo-emulator-yuzu-lawsuit-switch-aftermath"},{"key":"e_1_3_3_3_54_2","unstructured":"Cyber Civil\u00a0Rights Initiative. 2014. Revenge Porn Statistics. (2014). https:\/\/www.cybercivilrights.org\/wp-content\/uploads\/2014\/12\/RPStatistics.pdf"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"publisher","unstructured":"Benjamin\u00a0N Jacobsen. 2024. Deepfakes and the promise of algorithmic detectability. European Journal of Cultural Studies (April 2024) 13675494241240028. 10.1177\/13675494241240028 Publisher: SAGE Publications Ltd.","DOI":"10.1177\/13675494241240028"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"publisher","unstructured":"Shagun Jhaver Sucheta Ghoshal Amy Bruckman and Eric Gilbert. 2018. Online Harassment and Content Moderation: The Case of Blocklists. ACM Trans. Comput.-Hum. Interact. 25 2 (March 2018) 12:1\u201312:33. 10.1145\/3185593","DOI":"10.1145\/3185593"},{"key":"e_1_3_3_3_57_2","unstructured":"Brett\u00a0G Johnson. 2018. Beyond section 230: Liability free speech and ethics on global social networks. Bus. Entrepreneurship & Tax L. Rev. 2 (2018) 274."},{"key":"e_1_3_3_3_58_2","unstructured":"Andrew Koppelman. 2015. Revenge pornography and first amendment exceptions. Emory LJ 65 (2015) 661."},{"key":"e_1_3_3_3_59_2","unstructured":"Katherine Lee A\u00a0Feder Cooper and James Grimmelmann. 2023. Talkin\u201dBout AI Generation: Copyright and the Generative-AI Supply Chain. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2309.08133 (2023)."},{"key":"e_1_3_3_3_60_2","unstructured":"South\u00a0Dakota Legislature. n. d.. Statute 22-21-4: South Dakota Codified Laws. https:\/\/sdlegislature.gov\/Statutes\/22-21-4 Accessed: 2024-08-14."},{"key":"e_1_3_3_3_61_2","unstructured":"Texas Legislature. 2023. Senate Bill 1361 Analysis 88th Legislature. https:\/\/capitol.texas.gov\/tlodocs\/88R\/analysis\/html\/SB01361F.htm Accessed: 2024-08-14."},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"crossref","unstructured":"Philipp Lorenz-Spreen Bjarke\u00a0M\u00f8rch M\u00f8nsted Philipp H\u00f6vel and Sune Lehmann. 2019. Accelerating dynamics of collective attention. Nature communications 10 1 (2019) 1759.","DOI":"10.1038\/s41467-019-09311-w"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174160"},{"key":"e_1_3_3_3_64_2","unstructured":"Allison McDonald Florian Schaub Catherine Barwulor Michelle\u00a0L Mazurek and Elissa\u00a0M Redmiles. [n. d.]. \u201cIt\u2019s stressful having all these phones\u201d: Investigating Sex Workers\u2019 Safety Goals Risks and Practices Online. ([n. d.])."},{"key":"e_1_3_3_3_65_2","doi-asserted-by":"publisher","unstructured":"Clare McGlynn Kelly Johnson Erika Rackley Nicola Henry Nicola Gavey Asher Flynn and Anastasia Powell. 2021. \u2018It\u2019s Torture for the Soul\u2019: The Harms of Image-Based Sexual Abuse. Social & Legal Studies 30 4 (Aug. 2021) 541\u2013562. 10.1177\/0964663920947791 Publisher: SAGE Publications Ltd.","DOI":"10.1177\/0964663920947791"},{"key":"e_1_3_3_3_66_2","volume-title":"NIST Artificial Intelligence Report: Synthetic Content","author":"(NIST) National Institute of Standards and Technology","year":"2024","unstructured":"National Institute of Standards and Technology (NIST). 2024. NIST Artificial Intelligence Report: Synthetic Content. Technical Report. https:\/\/airc.nist.gov\/docs\/NIST.AI.100-4.SyntheticContent.ipd.pdf?ref=dataphoenix.info Accessed: 2024-08-12."},{"key":"e_1_3_3_3_67_2","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004) 119."},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"crossref","unstructured":"Hesam Nourooz\u00a0Pour. 2023. Transitional justice and online social platforms: Facebook and the Rohingya genocide. International Journal of Law and Information Technology 31 2 (2023) 95\u2013113.","DOI":"10.1093\/ijlit\/eaad016"},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"crossref","unstructured":"Aislinn O\u2019Connell and Ksenia Bakina. 2020. Using IP rights to protect human rights: copyright for \u2018revenge porn\u2019removal. Legal Studies 40 3 (2020) 442\u2013457.","DOI":"10.1017\/lst.2020.17"},{"key":"e_1_3_3_3_70_2","unstructured":"Oversight Board. 2024. New Decision Addresses Meta\u2019s Rules on Non-Consensual Deepfake Intimate Images. https:\/\/www.oversightboard.com\/news\/new-decision-addresses-metas-rules-on-non-consensual-deepfake-intimate-images\/?_hsenc=p2ANqtz-_C2C8OgPpU80HHv8jZ3T-gxBA4mR_7JLBLqvUEwCKgS-mz6bDrtPuRNqc91tQZkd_VGUr752BBbSeuxPP1q536ThY33g&_hsmi=317275693 Accessed: 2024-08-12."},{"key":"e_1_3_3_3_71_2","unstructured":"Li Qiwei Allison McDonald Oliver\u00a0L Haimson Sarita Schoenebeck and Eric Gilbert. 2024. The Sociotechnical Stack: Opportunities for Social Computing Research in Non-consensual Intimate Media. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2405.03585 (2024)."},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"crossref","unstructured":"Courtney Radsch. 2023. Weaponizing Privacy and Copyright Law for Censorship. CIGI Papers No (2023).","DOI":"10.2139\/ssrn.4464300"},{"key":"e_1_3_3_3_73_2","doi-asserted-by":"crossref","unstructured":"Jason\u00a0T Rich J\u00a0Gail Neely Randal\u00a0C Paniello Courtney\u00a0CJ Voelker Brian Nussenbaum and Eric\u00a0W Wang. 2010. A practical guide to understanding Kaplan-Meier curves. Otolaryngology\u2014Head and Neck Surgery 143 3 (2010) 331\u2013336.","DOI":"10.1016\/j.otohns.2010.05.007"},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"crossref","unstructured":"Roni\u00a0M Rosenberg and Hadar Dancig-Rosenberg. 2022. Revenge porn in the shadow of the first amendment. University of Pennsylvania Journal of Constitutional Law 24 (2022).","DOI":"10.2139\/ssrn.4021172"},{"key":"e_1_3_3_3_75_2","volume-title":"Copyright unbalanced: From incentive to excess","author":"Salam Reihan","year":"2012","unstructured":"Reihan Salam, Patrick Ruffini, David\u00a0G Post, Timothy\u00a0B Lee, Eli Dourado, Christina Mulligan, and Tom\u00a0W Bell. 2012. Copyright unbalanced: From incentive to excess. Mercatus Center at George Mason University."},{"key":"e_1_3_3_3_76_2","unstructured":"Abigail\u00a0C Salvania and Jaderick\u00a0P Pabico. 2015. Information spread over an Internet-mediated social network: Phases speed width and effects of promotion. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1507.06380 (2015)."},{"key":"e_1_3_3_3_77_2","doi-asserted-by":"crossref","unstructured":"Andre Sardaryzadeh. 2022. Security Researchers Battle Against the DMCA. Chi.-Kent J. Intell. Prop. 22 (2022) 38.","DOI":"10.2139\/ssrn.4346121"},{"key":"e_1_3_3_3_78_2","doi-asserted-by":"crossref","unstructured":"Sarah Scheffler and Jonathan Mayer. 2023. Sok: Content moderation for end-to-end encryption. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2303.03979 (2023).","DOI":"10.56553\/popets-2023-0060"},{"key":"e_1_3_3_3_79_2","unstructured":"Maj Leader\u00a0Chuck Schumer Sen\u00a0Mike Rounds Sen\u00a0Martin Heinrich and Sen\u00a0Todd Young. [n. d.]. A Roadmap for Artificial Intelligence Policy in the U.S. Senate. ([n. d.])."},{"key":"e_1_3_3_3_80_2","doi-asserted-by":"crossref","unstructured":"Carol\u00a0F Scott Gabriela Marcu Riana\u00a0Elyse Anderson Mark\u00a0W Newman and Sarita Schoenebeck. 2023. Trauma-Informed Social Media: Towards Solutions for Reducing and Healing Online Harm. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2302.05312 (2023).","DOI":"10.1145\/3544548.3581512"},{"key":"e_1_3_3_3_81_2","unstructured":"Security Hero. 2024. State of Deepfakes Report. https:\/\/www.securityhero.io\/state-of-deepfakes\/ Accessed: 2024-08-12."},{"key":"e_1_3_3_3_82_2","unstructured":"Wendy Seltzer. 2010. Free speech unmoored in copyright\u2019s safe harbor: Chilling effects of the DMCA on the First Amendment. Harv. JL & Tech. 24 (2010) 171."},{"key":"e_1_3_3_3_83_2","unstructured":"New York\u00a0State Senate. 2023. Senate Bill S1042 2023 Amendment. https:\/\/www.nysenate.gov\/legislation\/bills\/2023\/S1042\/amendment\/A Accessed: 2024-08-14."},{"key":"e_1_3_3_3_84_2","unstructured":"Daniel Seng. 2021. Copyrighting copywrongs: An empirical analysis of errors with automated DMCA takedown notices. Santa Clara High Tech. LJ 37 (2021) 119."},{"key":"e_1_3_3_3_85_2","doi-asserted-by":"crossref","unstructured":"David Sloss. 2020. Section 230 and the duty to prevent mass atrocities. Case W. Res. J. Int\u2019l L. 52 (2020) 199.","DOI":"10.2139\/ssrn.3650346"},{"key":"e_1_3_3_3_86_2","doi-asserted-by":"crossref","unstructured":"Cathay\u00a0YN Smith. 2021. Weaponizing Copyright. Harv. JL & Tech. 35 (2021) 193.","DOI":"10.2139\/ssrn.3806015"},{"key":"e_1_3_3_3_87_2","doi-asserted-by":"crossref","unstructured":"Benjamin Sobel. 2024. A Real Account of Deep Fakes. Cornell Legal Studies Research Paper Forthcoming (2024).","DOI":"10.2139\/ssrn.4829598"},{"key":"e_1_3_3_3_88_2","volume-title":"The right to sex: Feminism in the twenty-first century","author":"Srinivasan Amia","year":"2021","unstructured":"Amia Srinivasan. 2021. The right to sex: Feminism in the twenty-first century. Farrar, Straus and Giroux."},{"key":"e_1_3_3_3_89_2","unstructured":"Heidi Tripp. 2019. All sex workers deserve protection: How FOSTA\/SESTA overlooks consensual sex workers in an attempt to protect sex trafficking victims. Penn St. L. Rev. 124 (2019) 219."},{"key":"e_1_3_3_3_90_2","first-page":"1893","volume-title":"29th USENIX security symposium (USENIX Security 20)","author":"Tseng Emily","year":"2020","unstructured":"Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2020. The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums. In 29th USENIX security symposium (USENIX Security 20). 1893\u20131909."},{"key":"e_1_3_3_3_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502038"},{"key":"e_1_3_3_3_92_2","unstructured":"U.S. Copyright Office. 2024. Copyright and Artificial Intelligence: Part 1 - Digital Replicas Report. https:\/\/www.copyright.gov\/ai\/Copyright-and-Artificial-Intelligence-Part-1-Digital-Replicas-Report.pdf#page=14 Accessed: 2024-08-12."},{"key":"e_1_3_3_3_93_2","unstructured":"Majid Yar and Jacqueline Drew. 2019. Image-Based Abuse Non-Consensual Pornography Revenge Porn: A Study of Criminalization and Crime Prevention in Australia and England & Wales. International Journal of Cyber Criminology 13 2 (2019)."}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Yokohama Japan","acronym":"CHI '25"},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713334","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:21:51Z","timestamp":1751606511000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713334"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":92,"alternative-id":["10.1145\/3706598.3713334","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713334","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}