{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T00:37:39Z","timestamp":1768005459046,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2026,10,17]],"date-time":"2026-10-17T00:00:00Z","timestamp":1792195200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. National Science Foundation","award":["2339431"],"award-info":[{"award-number":["2339431"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,18]]},"DOI":"10.1145\/3715070.3748293","type":"proceedings-article","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T05:55:41Z","timestamp":1760680541000},"page":"144-149","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Co-Constructing the Future of Digital Intimacy"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-6813-2302","authenticated-orcid":false,"given":"Chris","family":"Geeng","sequence":"first","affiliation":[{"name":"Northeastern University, Seattle, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7925-7620","authenticated-orcid":false,"given":"Lucy","family":"Qin","sequence":"additional","affiliation":[{"name":"Georgetown University, Washington, District of Columbia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7477-6782","authenticated-orcid":false,"given":"Allison","family":"McDonald","sequence":"additional","affiliation":[{"name":"Boston University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5207-5352","authenticated-orcid":false,"given":"Amna","family":"Batool","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5262-4147","authenticated-orcid":false,"given":"Diana","family":"Freed","sequence":"additional","affiliation":[{"name":"Brown University, Providence, Rhode Island, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6552-4540","authenticated-orcid":false,"given":"Oliver L.","family":"Haimson","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3312-1733","authenticated-orcid":false,"given":"Jevan","family":"Hutson","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3930-8128","authenticated-orcid":false,"given":"Elissa M.","family":"Redmiles","sequence":"additional","affiliation":[{"name":"Georgetown University, Washington, District of Columbia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8555-4456","authenticated-orcid":false,"given":"Zahra","family":"Stardust","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2539-0730","authenticated-orcid":false,"given":"Miranda","family":"Wei","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6854-5336","authenticated-orcid":false,"given":"Douglas","family":"Zytko","sequence":"additional","affiliation":[{"name":"University of Michigan-Flint, Flint, Michigan, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"[n. d.]. How to spot extortion scams on LGBTQ+ dating apps | FTC Consumer Information. FTC https:\/\/www.consumer.ftc.gov\/blog\/2021\/09\/how-spot-extortion-scams-lgbtq-dating-apps. (Accessed on 09\/17\/2021)."},{"key":"e_1_3_3_1_3_2","unstructured":"[n. d.]. Nonconsensual pornography (revenge porn) laws in the United States - Ballotpedia. https:\/\/ballotpedia.org\/Nonconsensual_pornography_(revenge_porn)_laws_in_the_United_States. (Accessed on 10\/04\/2024)."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Fatemeh Alizadeh Dennis Lawo Gunnar Stevens Douglas Zytko and Motahhare Eslami. 2024. When the\" Matchmaker\" Does Not Have Your Interest at Heart: Perceived Algorithmic Harms Folk Theories and Users\u2019 Counter-Strategies on Tinder. Proceedings of the ACM on Human-Computer Interaction 8 CSCW2 (2024) 1\u201329.","DOI":"10.1145\/3689710"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Hanan\u00a0Khalid Aljasim and Douglas Zytko. 2023. Foregrounding women\u2019s safety in mobile social matching and dating apps: a participatory design study. Proceedings of the ACM on Human-Computer Interaction 7 GROUP (2023) 1\u201325.","DOI":"10.1145\/3567559"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445378"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642871"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"Rosanna Bellini Emily Tseng Nora McDonald Rachel Greenstadt Damon McCoy Thomas Ristenpart and Nicola Dell. 2021. \"So-called Privacy Breeds Evil\": Narrative Justifications for Intimate Partner Surveillance in Online Forums. Proceedings of the ACM on Human-Computer Interaction 4 CSCW3 (Jan. 2021) 1\u201327. 10.1145\/3432909","DOI":"10.1145\/3432909"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Jolien Beyens and Eva Lievens. 2016. A legal perspective on the non-consensual dissemination of sexual images: Identifying strengths and weaknesses of legislation in the US UK and Belgium. International Journal of Law Crime and Justice 47 (2016) 31\u201343.","DOI":"10.1016\/j.ijlcj.2016.07.001"},{"key":"e_1_3_3_1_10_2","first-page":"373","volume-title":"Twentieth Symposium on Usable Privacy and Security (SOUPS 2024)","author":"Brigham Natalie\u00a0Grace","year":"2024","unstructured":"Natalie\u00a0Grace Brigham, Miranda Wei, Tadayoshi Kohno, and Elissa\u00a0M. Redmiles. 2024. \"Violation of my body:\" Perceptions of AI-generated non-consensual (intimate) imagery. In Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). USENIX Association, Philadelphia, PA, 373\u2013392. https:\/\/www.usenix.org\/conference\/soups2024\/presentation\/brigham"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Melissa Burkett. 2015. Sex (t) talk: A qualitative analysis of young adults\u2019 negotiations of the pleasures and perils of sexting. Sexuality & Culture 19 4 (2015) 835\u2013863.","DOI":"10.1007\/s12119-015-9295-0"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674735613"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052592"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517624"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517624"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Isha Datey and Douglas Zytko. 2024. \" Just Like Risking Your Life Here\": Participatory Design of User Interactions with Risk Detection AI to Prevent Online-to-Offline Harm Through Dating Apps. Proceedings of the ACM on Human-Computer Interaction 8 CSCW2 (2024) 1\u201341.","DOI":"10.1145\/3686906"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Daniel Delmonaco and Oliver\u00a0L Haimson. 2023. \u201cNothing that I was specifically looking for\u201d: LGBTQ+ youth and intentional sexual health information seeking. Journal of LGBT Youth 20 4 (2023) 818\u2013835.","DOI":"10.1080\/19361653.2022.2077883"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Michael\u00a0A DeVito Ashley\u00a0Marie Walker and Jeremy Birnholtz. 2018. \u2019Too Gay for Facebook\u2019 Presenting LGBTQ+ Identity Throughout the Personal Social Media Ecosystem. Proceedings of the ACM on Human-Computer Interaction 2 CSCW (2018) 1\u201323.","DOI":"10.1145\/3274313"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Nicola D\u00f6ring M\u00a0Rohangis Mohseni and Roberto Walter. 2020. Design use and effects of sex dolls and sex robots: Scoping review. Journal of medical Internet research 22 7 (2020) e18551.","DOI":"10.2196\/18551"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Michelle Drouin Manda Coupe and Jeff\u00a0R. Temple. 2017. Is sexting good for your relationship? It depends\u2026. Computers in Human Behavior 75 (2017) 749\u2013756.","DOI":"10.1016\/j.chb.2017.06.018"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Julia\u00a0R Fernandez and Jeremy Birnholtz. 2019. \" I Don\u2019t Want Them to Not Know\" Investigating Decisions to Disclose Transgender Identity on Dating Platforms. Proceedings of the ACM on Human-Computer Interaction 3 CSCW (2019) 1\u201321.","DOI":"10.1145\/3359328"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Jacinthe Flore and Kiran Pienaar. 2020. Data-driven intimacy: emerging technologies in the (re) making of sexual subjects and \u2018healthy\u2019sexuality. Health Sociology Review 29 3 (2020) 279\u2013293.","DOI":"10.1080\/14461242.2020.1803101"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","unstructured":"Asher Flynn Anastasia Powell Adrian\u00a0J Scott and Elena Cama. 2022. Deepfakes and Digitally Altered Imagery Abuse: A Cross-Country Exploration of an Emerging form of Image-Based Sexual Abuse. The British Journal of Criminology 62 6 (Oct. 2022) 1341\u20131358. 10.1093\/bjc\/azab111","DOI":"10.1093\/bjc\/azab111"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_3_3_1_25_2","first-page":"433","volume-title":"Twentieth Symposium on Usable Privacy and Security (SOUPS 2024)","author":"Geeng Chris","year":"2024","unstructured":"Chris Geeng, Natalie Chen, Kieron\u00a0Ivy Turk, Jevan Hutson, and Damon McCoy. 2024. \"Say I\u2019m in public...I don\u2019t want my nudes to pop up.\" User Threat Models for Using Vault Applications. In Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). USENIX Association, Philadelphia, PA, 433\u2013451. https:\/\/www.usenix.org\/conference\/soups2024\/presentation\/geeng"},{"key":"e_1_3_3_1_26_2","first-page":"305","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Geeng Christine","year":"2022","unstructured":"Christine Geeng, Mike Harris, Elissa Redmiles, and Franziska Roesner. 2022. \" Like Lesbians Walking the Perimeter\": Experiences of { US}.{ LGBTQ+} Folks With Online Security, Safety, and Privacy Advice. In 31st USENIX Security Symposium (USENIX Security 22). 305\u2013322."},{"key":"e_1_3_3_1_27_2","volume-title":"The Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)","author":"Geeng Christine","year":"2020","unstructured":"Christine Geeng, Jevan Huston, and Franziska Roesner. 2020. Usable Sexurity: Studying People\u2019s Concerns and Strategies When Sexting. In The Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association."},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"crossref","unstructured":"Vaughn Hamilton Hanna Barakat and Elissa\u00a0M Redmiles. 2022. Risk resilience and reward: Impacts of shifting to digital sex work. Proceedings of the ACM on Human-Computer Interaction 6 CSCW2 (2022) 1\u201337. Publisher: ACM New York NY USA.","DOI":"10.1145\/3555650"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","unstructured":"Heidi Hartikainen Afsaneh Razi and Pamela Wisniewski. 2021. Safe Sexting: The Advice and Support Adolescents Receive from Peers regarding Online Sexual Risks. Proceedings of the ACM on Human-Computer Interaction 5 CSCW1 (April 2021) 1\u201331. 10.1145\/3449116","DOI":"10.1145\/3449116"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Jevan\u00a0A Hutson Jessie\u00a0G Taft Solon Barocas and Karen Levy. 2018. Debiasing desire: Addressing bias & discrimination on intimate platforms. Proceedings of the ACM on Human-Computer Interaction 2 CSCW (2018) 1\u201318.","DOI":"10.1145\/3274342"},{"key":"e_1_3_3_1_31_2","unstructured":"Institute for Rebooting Social Media at Harvard University. 2024. Designing Safe(r) Digital Intimacy Workshop. https:\/\/rebootingsocialmedia.org\/events\/call-for-applications-designing-safer-digital-intimacy-workshop\/"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957296"},{"key":"e_1_3_3_1_33_2","unstructured":"Kevin Roose. 2024. Meet My A.I. Friends. The New York Times (May 2024). https:\/\/www.nytimes.com\/2024\/05\/09\/technology\/meet-my-ai-friends.html"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"crossref","unstructured":"Jungyoon Koh. 2023. \u201cDate me date me\u201d: AI chatbot interactions as a resource for the online construction of masculinity. Discourse Context & Media 52 (2023) 100681.","DOI":"10.1016\/j.dcm.2023.100681"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"crossref","unstructured":"David Lafortune Laurence Dion and Patrice Renaud. 2020. Virtual reality and sex therapy: future directions for clinical research. Journal of Sex & Marital Therapy 46 1 (2020) 1\u201317.","DOI":"10.1080\/0092623X.2019.1623357"},{"key":"e_1_3_3_1_36_2","unstructured":"Lydia Morrish. 2024. Ads for Explicit \u2018AI Girlfriends\u2019 Are Swarming Facebook and Instagram. Wired Magazine (April 2024). https:\/\/www.wired.com\/story\/ads-for-explicit-ai-girlfriends-swarming-facebook-and-instagram\/"},{"key":"e_1_3_3_1_37_2","first-page":"375","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"McDonald Allison","year":"2021","unstructured":"Allison McDonald, Catherine Barwulor, Michelle\u00a0L Mazurek, Florian Schaub, and Elissa\u00a0M Redmiles. 2021. \" It\u2019s stressful having all these phones\": Investigating Sex Workers\u2019 Safety Goals, Risks, and Practices Online. In 30th USENIX Security Symposium (USENIX Security 21). 375\u2013392."},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"crossref","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on human-computer interaction 3 CSCW (2019) 1\u201323. Publisher: ACM New York NY USA.","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","unstructured":"Clare McGlynn and Erika Rackley. 2017. Image-Based Sexual Abuse. Oxford Journal of Legal Studies 37 3 (2017) 534\u2013561. 10.1093\/ojls\/gqw033","DOI":"10.1093\/ojls\/gqw033"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"crossref","unstructured":"Sonia Milani Faith Jabs Natalie\u00a0B Brown Bozena Zdaniuk Alan Kingstone and Lori\u00a0A Brotto. 2022. Virtual reality erotica: exploring general presence sexual presence sexual arousal and sexual desire in women. Archives of Sexual Behavior (2022) 1\u201312.","DOI":"10.1007\/s10508-021-02111-8"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207785"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2403.04659"},{"key":"e_1_3_3_1_43_2","first-page":"55","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Qin Lucy","year":"2024","unstructured":"Lucy Qin, Vaughn Hamilton, Sharon Wang, Yigit Aydinalp, Marin Scarlett, and Elissa\u00a0M. Redmiles. 2024. \"Did They F***ing Consent to That?\": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse. In 33rd USENIX Security Symposium (USENIX Security 24). USENIX Association, Philadelphia, PA, 55\u201372. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/qin"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3654777.3676380"},{"key":"e_1_3_3_1_45_2","unstructured":"Li Qiwei Allison McDonald Oliver\u00a0L. Haimson Sarita Schoenebeck and Eric Gilbert. 2024. The Sociotechnical Stack: Opportunities for Social Computing Research in Non-consensual Intimate Media. arxiv:https:\/\/arXiv.org\/abs\/2405.03585\u00a0[cs.CY] https:\/\/arxiv.org\/abs\/2405.03585"},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"crossref","unstructured":"Li Qiwei Allison McDonald Oliver\u00a0L Haimson Sarita Schoenebeck and Eric Gilbert. 2024. The Sociotechnical Stack: Opportunities for Social Computing Research in Non-consensual Intimate Media. Proceedings of the ACM on Human-Computer Interaction 8 CSCW2 (2024) 1\u201321.","DOI":"10.1145\/3686914"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW61312.2024.00060"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300232"},{"key":"e_1_3_3_1_49_2","doi-asserted-by":"publisher","unstructured":"Kelsea Schulenberg Guo Freeman Lingyuan Li and Catherine Barwulor. 2023. \"Creepy Towards My Avatar Body Creepy Towards My Body\": How Women Experience and Manage Harassment Risks in Social Virtual Reality. Proc. ACM Hum.-Comput. Interact. 7 CSCW2 Article 236 (oct 2023) 29\u00a0pages. 10.1145\/3610027","DOI":"10.1145\/3610027"},{"key":"e_1_3_3_1_50_2","unstructured":"Sarath\u00a0S Shanker and Douglas Zytko. 2022. The... tinderverse?: Opportunities and challenges for user safety in extended reality (xr) dating apps. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2203.15120 (2022)."},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"publisher","unstructured":"Zahra Stardust Kath Albury and Jenny Kennedy. 2023. Sex tech entrepreneurs: Governing intimate data in start-up culture. New Media & Society (April 2023) 146144482311644. 10.1177\/14614448231164408","DOI":"10.1177\/14614448231164408"},{"key":"e_1_3_3_1_52_2","doi-asserted-by":"publisher","unstructured":"Zahra Stardust Rosalie Gillett and Kath Albury. 2023. Surveillance does not equal safety: Police data and consent on dating apps. Crime Media Culture: An International Journal 19 2 (June 2023) 274\u2013295. 10.1177\/17416590221111827","DOI":"10.1177\/17416590221111827"},{"key":"e_1_3_3_1_53_2","doi-asserted-by":"crossref","unstructured":"Emily\u00a0C. Stasko and Pamela\u00a0A. Geller. 2015. Reframing Sexting as a Positive Relationship Behavior. Drexel University. https:\/\/www.apa.org\/news\/press\/releases\/2015\/08\/reframing-sexting.pdf.","DOI":"10.1037\/e528002015-001"},{"key":"e_1_3_3_1_54_2","doi-asserted-by":"crossref","unstructured":"Jenny Sund\u00e9n. 2023. Play secrecy and consent: theorizing privacy breaches and sensitive data in the world of networked sex toys. Sexualities 26 8 (2023) 926\u2013940.","DOI":"10.1177\/1363460720957578"},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025775"},{"key":"e_1_3_3_1_56_2","unstructured":"Emily Tseng Rosanna Bellini Nora McDonald Matan Danos Rachel Greenstadt Damon McCoy Nicola Dell and Thomas Ristenpart. [n. d.]. The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. ([n. d.])."},{"key":"e_1_3_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502038"},{"key":"e_1_3_3_1_58_2","unstructured":"Rebecca Umbach Nicola Henry Gemma Beard and Colleen Berryessa. 2024. Attitudes Towards and Knowledge of Non-Consensual Synthetic Intimate Imagery in 10 Countries. _eprint: 2402.01721."},{"key":"e_1_3_3_1_59_2","doi-asserted-by":"publisher","unstructured":"Ari\u00a0Ezra Waldman. 2019. Law Privacy and Online Dating: \u201cRevenge Porn\u201d in Gay Online Communities. Law & Social Inquiry 44 04 (Nov. 2019) 987\u20131018. 10.1017\/lsi.2018.29","DOI":"10.1017\/lsi.2018.29"},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"crossref","unstructured":"Michel Walrave Joris Van\u00a0Ouytsel Koen Ponnet and Jeff\u00a0R Temple. 2018. Sharing and caring? The role of social media and privacy in sexting behaviour. Sexting: Motives and risk in online sexual self-presentation (2018) 1\u201317.","DOI":"10.1007\/978-3-319-71882-8_1"},{"key":"e_1_3_3_1_61_2","volume-title":"Navigating Contemporary Sex Work: Gender, Justice and Policy in the 21st century","author":"Waring C","year":"2021","unstructured":"C Waring. 2021. Visual Terrorism: The weaponisation of photography, image-based violence and the online sex worker. In Navigating Contemporary Sex Work: Gender, Justice and Policy in the 21st century, E\u00a0Cooper and P\u00a0Maginn (Eds.). Palgrave Macmillan."},{"key":"e_1_3_3_1_62_2","first-page":"4391","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Wei Miranda","year":"2024","unstructured":"Miranda Wei, Sunny Consolvo, Patrick\u00a0Gage Kelley, Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska Roesner, Renee Shelby, Kurt Thomas, and Rebecca Umbach. 2024. Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse. In 33rd USENIX Security Symposium (USENIX Security 24). USENIX Association, Philadelphia, PA, 4391\u20134408. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/wei-miranda-understanding"},{"key":"e_1_3_3_1_63_2","volume-title":"Symposium on Usable Privacy and Security","author":"Wei Miranda","year":"2022","unstructured":"Miranda Wei, Eric Zeng, Tadayoshi Kohno, and Franziska Roesner. 2022-08-07\/2022-08-09. Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships. In Symposium on Usable Privacy and Security. USENIX, Boston Massachusetts USA."},{"key":"e_1_3_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833757"},{"key":"e_1_3_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781003278405-52"},{"key":"e_1_3_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642045"},{"key":"e_1_3_3_1_67_2","doi-asserted-by":"publisher","unstructured":"Douglas Zytko and Jonathan Chan. 2023. The Dating Metaverse: Why We Need to Design for Consent in Social VR. IEEE Transactions on Visualization and Computer Graphics 29 5 (feb 2023) 2489\u20132498. 10.1109\/TVCG.2023.3247065","DOI":"10.1109\/TVCG.2023.3247065"},{"key":"e_1_3_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580911"},{"key":"e_1_3_3_1_69_2","doi-asserted-by":"publisher","unstructured":"Douglas Zytko Nicholas Furlo Bailey Carlin and Matthew Archer. 2021. Computer-Mediated Consent to Sex: The Context of Tinder. Proc. ACM Hum.-Comput. Interact. 5 CSCW1 Article 189 (apr 2021) 26\u00a0pages. 10.1145\/3449288","DOI":"10.1145\/3449288"},{"key":"e_1_3_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3500868.3561201"}],"event":{"name":"CSCW Companion '25: Companion of the Computer-Supported Cooperative Work and Social Computing","location":"Bergen Norway","acronym":"CSCW Companion '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Companion Publication of the 2025 Conference on Computer-Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3715070.3748293","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3715070.3748293","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3715070.3748293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T17:48:25Z","timestamp":1767980905000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715070.3748293"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"references-count":69,"alternative-id":["10.1145\/3715070.3748293","10.1145\/3715070"],"URL":"https:\/\/doi.org\/10.1145\/3715070.3748293","relation":{},"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"2025-10-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}