Those who wish to control, expose, and damage the identities of individuals routinely do so by invading their privacy. People are secretly recorded in bedrooms and public bathrooms and “up their skirts.” Such images are used to coerce people into sharing nude photographs and filming sex acts under the threat of public disclosure. People’s nude images are posted online without permission. Machine-learning technology is used to create digitally manipulated “deep fake” sex videos that swap people’s faces into pornography. Each of these abuses is an invasion of sexual privacy—the behaviors, expectations, and choices that manage access to and information about the human body, sex, sexuality, gender, and intimate activities. Most often, women, no...
Technology-facilitated sexual violence is a violation unique to the digital age that extends the ana...
Broadly speaking, privacy doctrine suggests that the right to privacy is non-existent once one enter...
In this chapter I give a brief explanation of what privacy is, argue that protecting privacy is impo...
Those who wish to control and expose the identities of women and people from marginalized communitie...
Every generation’s intimates have their preferred modes of self-disclosure. Not long ago, intimate p...
Intimate life is under constant surveillance. Firms track people’s periods, hot flashes, abortions, ...
The article reviews current privacy laws in the context of “Revenge Porn”. Given the speed at which ...
For well over a century, technological change has motivated the legal protection of the individual’s...
National research literature and public debate regarding the capture and distribution of unauthorise...
Revenge porn is a growing phenomenon where the victim is constantly re-victimized as the intimate ph...
In this essay, we try to present a case for having a general privacy offence. Privacy is about much ...
Violations of intimate privacy can be never ending. As long as nonconsensual pornography and deepfak...
This research takes an exploratory examination of the creation and dissemination (both planned and u...
Revenge porn occurs when someone posts sexually explicit images of their former paramour on the web,...
This paper considers the role of the criminal law in respect to revenge pornography and the adequacy...
Technology-facilitated sexual violence is a violation unique to the digital age that extends the ana...
Broadly speaking, privacy doctrine suggests that the right to privacy is non-existent once one enter...
In this chapter I give a brief explanation of what privacy is, argue that protecting privacy is impo...
Those who wish to control and expose the identities of women and people from marginalized communitie...
Every generation’s intimates have their preferred modes of self-disclosure. Not long ago, intimate p...
Intimate life is under constant surveillance. Firms track people’s periods, hot flashes, abortions, ...
The article reviews current privacy laws in the context of “Revenge Porn”. Given the speed at which ...
For well over a century, technological change has motivated the legal protection of the individual’s...
National research literature and public debate regarding the capture and distribution of unauthorise...
Revenge porn is a growing phenomenon where the victim is constantly re-victimized as the intimate ph...
In this essay, we try to present a case for having a general privacy offence. Privacy is about much ...
Violations of intimate privacy can be never ending. As long as nonconsensual pornography and deepfak...
This research takes an exploratory examination of the creation and dissemination (both planned and u...
Revenge porn occurs when someone posts sexually explicit images of their former paramour on the web,...
This paper considers the role of the criminal law in respect to revenge pornography and the adequacy...
Technology-facilitated sexual violence is a violation unique to the digital age that extends the ana...
Broadly speaking, privacy doctrine suggests that the right to privacy is non-existent once one enter...
In this chapter I give a brief explanation of what privacy is, argue that protecting privacy is impo...