This article examines the motivations, techniques and potential consequences of the governance of teenage sexting. I examine the over-representation of white, middle-class, heterosexual, female sexters, and abstinence from sexting discourses in the ‘Respect Yourself’ child protection/crime prevention initiative. This campaign, I suggest, exploits slut shaming in an effort to responsibilize teenage girls for preventing the purported harms that may flow from sexting—including humiliation, sexual violations and criminalization—for both themselves and their peers. I examine this responsibilization effort through the lens of critical whiteness, queer, girlhood/young feminist and porn studies’ theorizations of the politics of sexual respectabilit...
Youth sexters are considered vulnerable to privacy violations in the form of unauthorized distributi...
This Article explores child pornography law in relation to teen sexting conduct. Recently, some teen...
Youth sexters are considered vulnerable to privacy violations in the form of unauthorized distributi...
Advances in digital photography and distribution technologies enable many people to produce and dist...
Advances in digital photography and distribution technologies enable many people to produce and dist...
In recent years, the prosecution of teenagers who use digital and online technology to produce and c...
This article explores the criminalisation and governance of sexting among young people. While the fo...
This thesis explores young people’s perceptions and practices surrounding ‘youth sexting’, particula...
This thesis explores young people’s perceptions and practices surrounding ‘youth sexting’, particula...
This article explores the criminalisation and governance of sexting among young people. While the fo...
This article explores the criminalisation and governance of sexting among young people.While the fo...
The last several years in Anglophone societies have seen an explosion of anxiety about teenage 'sext...
This article explores gender inequities and sexual double standards in teens' digital image exchange...
The emerging phenomenon of youth 'sexting' presents a range of unique legal, policy and ed...
Currently the law in England and Wales means that young people who engage in mutually consensual tee...
Youth sexters are considered vulnerable to privacy violations in the form of unauthorized distributi...
This Article explores child pornography law in relation to teen sexting conduct. Recently, some teen...
Youth sexters are considered vulnerable to privacy violations in the form of unauthorized distributi...
Advances in digital photography and distribution technologies enable many people to produce and dist...
Advances in digital photography and distribution technologies enable many people to produce and dist...
In recent years, the prosecution of teenagers who use digital and online technology to produce and c...
This article explores the criminalisation and governance of sexting among young people. While the fo...
This thesis explores young people’s perceptions and practices surrounding ‘youth sexting’, particula...
This thesis explores young people’s perceptions and practices surrounding ‘youth sexting’, particula...
This article explores the criminalisation and governance of sexting among young people. While the fo...
This article explores the criminalisation and governance of sexting among young people.While the fo...
The last several years in Anglophone societies have seen an explosion of anxiety about teenage 'sext...
This article explores gender inequities and sexual double standards in teens' digital image exchange...
The emerging phenomenon of youth 'sexting' presents a range of unique legal, policy and ed...
Currently the law in England and Wales means that young people who engage in mutually consensual tee...
Youth sexters are considered vulnerable to privacy violations in the form of unauthorized distributi...
This Article explores child pornography law in relation to teen sexting conduct. Recently, some teen...
Youth sexters are considered vulnerable to privacy violations in the form of unauthorized distributi...