{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:20:53Z","timestamp":1777936853075,"version":"3.51.4"},"reference-count":42,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2017,1,16]],"date-time":"2017-01-16T00:00:00Z","timestamp":1484524800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2017,5]]},"abstract":"<jats:p>This article engages with media responses to the 2015 Ashley Madison hack (which largely exposed the sexual details of adult heterosexual men) and the 2014 \u2018Fappening\u2019 hack (which exposed private sexual images of adult female celebrities). It draws on Petchesky\u2019s concept of positive sexual rights and Warner\u2019s framework of sexual ethics to reflect on the ways current educational and policy responses to \u2018teen sexting\u2019 (or sharing nude\/semi-nude pictures) might change if young people\u2019s sexual rights were recognized as being similar (if not the same) to those of the adult victims of the 2014 and 2015 hacks.<\/jats:p>","DOI":"10.1177\/1461444816686322","type":"journal-article","created":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T04:46:48Z","timestamp":1484714808000},"page":"713-725","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":64,"title":["Just because it\u2019s public doesn\u2019t mean it\u2019s any of your business: Adults\u2019 and children\u2019s sexual rights in digitally mediated spaces"],"prefix":"10.1177","volume":"19","author":[{"given":"Kath","family":"Albury","sequence":"first","affiliation":[{"name":"UNSW Australia, Australia"}]}],"member":"179","published-online":{"date-parts":[[2017,1,16]]},"reference":[{"key":"bibr1-1461444816686322","first-page":"359","volume-title":"The Routledge Research Companion to Geographies of Sex and Sexualities","author":"Albury K","year":"2016"},{"key":"bibr2-1461444816686322","first-page":"213","volume-title":"Negotiating Digital Citizenship: Control, Contest and Culture","author":"Albury K","year":"2016"},{"key":"bibr3-1461444816686322","doi-asserted-by":"publisher","DOI":"10.1080\/10304312.2012.665840"},{"key":"bibr4-1461444816686322","unstructured":"Albury K, Crawford K, Byron P, (2013) Young People and Sexting in Australia: Ethics, Representation, and the Law. Sydney, NSW: Australian Research Centre for Creative Industries and Innovation, UNSW. Available at: www.cci.edu.au\/node\/1522"},{"key":"bibr5-1461444816686322","unstructured":"Albury K, Funnell N, Noonan E (2010) The politics of sexting: young people, self-representation and citizenship. In: Media democracy and change: refereed proceedings of the Australian and New Zealand Communications Association annual conference (ed McCallum K), Canberra, ACT, 7\u20139 July 2010. Available at: http:\/\/www.anzca.net\/index.php?option=com_content&view=article&id=12:anzca10-conference&catid=46"},{"key":"bibr6-1461444816686322","doi-asserted-by":"publisher","DOI":"10.1057\/9780230500983"},{"key":"bibr7-1461444816686322","doi-asserted-by":"publisher","DOI":"10.1080\/01425692.2012.704719"},{"key":"bibr8-1461444816686322","unstructured":"Anand P (2015) Hundreds of email addresses in Ashley Madison data dump are in big banks\u2019 domains. MarketWatch, 19 August. Available at: www.marketwatch.com\/story\/these-bankers-used-their-work-emails-on-ashley-madison-2015&ndash;08\u201319?siteid=rss&rss=1"},{"key":"bibr9-1461444816686322","unstructured":"Boesel E (2014) Indecent exposure: breasts as data, data as breasts. The Society Pages: Cyborgology, 19 July. Available at: http:\/\/thesocietypages.org\/cyborgology\/2014\/06\/19\/indecent-exposure-breasts-as-data-data-as-breasts\/"},{"key":"bibr10-1461444816686322","first-page":"39","volume-title":"Networked Self: Identity, Community, and Culture on Social Network Sites","author":"boyd d","year":"2011"},{"key":"bibr11-1461444816686322","volume-title":"Proceedings of a decade in internet time: OII symposium on the dynamics of the internet and society","author":"boyd d","year":"2011"},{"key":"bibr12-1461444816686322","doi-asserted-by":"publisher","DOI":"10.1080\/10304312.2012.665834"},{"key":"bibr13-1461444816686322","doi-asserted-by":"publisher","DOI":"10.1057\/9781137405975"},{"key":"bibr14-1461444816686322","doi-asserted-by":"publisher","DOI":"10.4324\/9780203894170"},{"key":"bibr15-1461444816686322","volume-title":"Adult Themes: Rewriting the Rules of Adulthood","author":"Crawford K","year":"2006"},{"key":"bibr16-1461444816686322","doi-asserted-by":"publisher","DOI":"10.1057\/9781137392817"},{"key":"bibr17-1461444816686322","unstructured":"Cushing E (2015) I talked to my cheating ex after finding his email in the Ashley Madison leak. BuzzFeed, 19 August. Available at: www.buzzfeed.com\/ellencushing\/i-talked-to-my-cheating-ex-after-finding-his-email-in-the-as#.vr99BXewj"},{"key":"bibr18-1461444816686322","unstructured":"Dewey C (2015) How to search the Ashley Madison leak. Washington Post, 19 August. Available at: www.washingtonpost.com\/news\/the-intersect\/wp\/2015\/08\/19\/how-to-see-if-you-or-your-spouse-appear-in-the-ashley-madison-leak\/"},{"key":"bibr19-1461444816686322","doi-asserted-by":"publisher","DOI":"10.1080\/14681811.2015.1050486"},{"key":"bibr20-1461444816686322","unstructured":"Felizi N, Varon J (2015) Safer nudes: a sexy guide to digital security. Codingrights.org, Available at: www.codingrights.org\/wp-content\/uploads\/2015\/11\/zine_ingles_lado2.pdf"},{"key":"bibr21-1461444816686322","doi-asserted-by":"publisher","DOI":"10.1177\/1750481309343870"},{"key":"bibr22-1461444816686322","doi-asserted-by":"publisher","DOI":"10.1093\/hrlr\/ngt032"},{"key":"bibr23-1461444816686322","unstructured":"Hartzog W, Selinger E (2014) Why smart phones should help us avoid selfie sabotage. Forbes, 10 September. Available at: www.forbes.com\/sites\/privacynotice\/2014\/09\/10\/why-smart-phones-should-help-us-avoid-selfie-sabotage\/"},{"key":"bibr24-1461444816686322","unstructured":"Hill K (2015) The Ashley Madison hack, and the value of averting your eyes. Fusion, 20 August. Available at: http:\/\/fusion.net\/story\/185749\/the-ashley-madison-hack-and-the-value-of-averting-your-eyes\/"},{"key":"bibr25-1461444816686322","doi-asserted-by":"publisher","DOI":"10.4324\/9780203017524"},{"key":"bibr26-1461444816686322","unstructured":"Isaac M (2014) Nude photos of Jennifer Lawrence are latest front in online privacy debate. The New York Times, 2 September. Available at: www.nytimes.com\/2014\/09\/03\/technology\/trove-of-nude-photos-sparks-debate-over-online-behavior.html"},{"key":"bibr27-1461444816686322","volume-title":"Spreadable Media: Creating Value and Meaning in a Networked Culture","author":"Jenkins H","year":"2013"},{"key":"bibr28-1461444816686322","unstructured":"Klinkenberg K, Frenkel S (2015) Hackers release details of Ashley Madison cheaters. BuzzFeed, 19 August. Available at: www.buzzfeed.com\/brendanklinkenberg\/hackers-claim-to-have-dumped-ashley-madison-user-data-online#.gjJaYVq6y"},{"issue":"1","key":"bibr29-1461444816686322","first-page":"85","volume":"1","author":"Las\u00e9n A","year":"2013","journal-title":"Intervalla: Platform for Intellectual Exchange"},{"key":"bibr30-1461444816686322","unstructured":"Lichfield G (2015) Workplace etiquette after Ashley Madison: 8 tips for dealing with embarrassed colleagues. Quartz, 19 August. Available at: http:\/\/qz.com\/483095\/workplace-etiquette-after-ashley-madison-8-tips-for-dealing-with-embarrassed-colleagues\/"},{"key":"bibr31-1461444816686322","unstructured":"Livingstone S, Mason J (2015) Sexual Rights and Sexual Risks among Youth Online: a Review of Existing Knowledge Regarding Children and Young People\u2019s Developing Sexuality in Relation to New Media Environments. London: European NGO Alliance for Child Safety Online. Available at: http:\/\/eprints.lse.ac.uk\/64567\/"},{"key":"bibr32-1461444816686322","volume-title":"One in three: internet governance and children\u2019s rights","author":"Livingstone S","year":"2016"},{"key":"bibr33-1461444816686322","unstructured":"Manjoo F (2014) Taking a naked selfie? Your phone should step in to protect you. The New York Times, 5 September. Available at: http:\/\/bits.blogs.nytimes.com\/2014\/09\/05\/taking-a-naked-selfie-your-phone-should-step-in-to-protect-you\/?_php"},{"key":"bibr34-1461444816686322","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810365313"},{"key":"bibr35-1461444816686322","doi-asserted-by":"publisher","DOI":"10.1525\/9780520922754-007"},{"key":"bibr36-1461444816686322","unstructured":"Pyburne P, Jolly R (2014) Australian Governments and Dilemmas in Filtering the Internet: Juggling Freedoms against Potential for Harm: Parliamentary Libraries Research Paper Series 2014\u20132015. Canberra, ACT: Parliament of Australia. Available at: www.aph.gov.au\/About_Parliament\/Parliamentary_Departments\/Parliamentary_Library\/pubs\/rp\/rp1415\/InternetFiltering"},{"key":"bibr37-1461444816686322","unstructured":"Stern M (2015) Ashley Madison hack: 10,000 gov\u2019t officials\u2019 email addresses on leaked Ashley Madison list. The Daily Beast, 19 August. Available at: www.thedailybeast.com\/articles\/2015\/08\/19\/ashley-madison-hack-identities-of-33-million-aspiring-adulterers-released-online.html"},{"key":"bibr38-1461444816686322","volume-title":"New Voices\/New Laws: school-age Young People in New South Wales Speak Out about the Criminal Laws that Apply to Their Online Behaviour","author":"Tallon K","year":"2012"},{"key":"bibr39-1461444816686322","doi-asserted-by":"crossref","unstructured":"Tiidenberg K (2014) Bringing sexy back: Reclaiming the body aesthetic via self-shooting. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8(1): 3. Available at: http:\/\/cyberpsychology.eu\/view.php?cisloclanku=2014021701","DOI":"10.5817\/CP2014-1-3"},{"key":"bibr40-1461444816686322","unstructured":"United Nations (UN) (1989) Convention on the Rights of the Child. Geneva: Office of the United Nations High Commissioner for Human Rights. Available at: www.ohchr.org\/en\/professionalinterest\/pages\/crc.aspx"},{"key":"bibr41-1461444816686322","volume-title":"Proceedings of the on-site presentation at the fifth international conference on the image and the image knowledge community","author":"Warfield K","year":"2014"},{"key":"bibr42-1461444816686322","volume-title":"The Trouble with Normal: Sex, Politics and the Ethics of Queer Life","author":"Warner M","year":"1999"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816686322","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444816686322","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816686322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:45:29Z","timestamp":1777693529000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444816686322"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,16]]},"references-count":42,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["10.1177\/1461444816686322"],"URL":"https:\/\/doi.org\/10.1177\/1461444816686322","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,16]]}}}