Feminist Interaction Techniques: Deterring Non-Consensual Screenshots with Interaction Techniques

Read original: arXiv:2404.18867 - Published 8/7/2024 by Li Qiwei, Francesca Lameiro, Shefali Patel, Cristi-Isaula-Reyes, Eytan Adar, Eric Gilbert, Sarita Schoenebeck
Total Score

0

Feminist Interaction Techniques: Deterring Non-Consensual Screenshots with Interaction Techniques

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • Explores techniques to deter non-consensual screenshots in online interactions
  • Proposes feminist interaction techniques to empower users and prevent abuse
  • Focuses on addressing privacy concerns and power imbalances in social computing environments

Plain English Explanation

This paper discusses ways to prevent non-consensual screenshots in online interactions, which can be a form of abuse and invasion of privacy. The researchers explore feminist interaction techniques to empower users and address power imbalances in social computing environments. The goal is to give users more control over their content and interactions, deterring those who might try to capture screenshots without permission.

The paper draws on principles from feminist HCI to design interactions that center user consent and autonomy. This could involve features like blurring content, disabling screenshot capture, or alerting users when a screenshot is attempted. By incorporating these feminist interaction techniques, the researchers aim to make online spaces more equitable and respectful of individual privacy.

Technical Explanation

The paper proposes several interaction techniques inspired by feminist HCI principles to address the issue of non-consensual screenshots. These include:

  1. Content Blurring: Automatically blurring or obfuscating content in the user interface to make it difficult to capture meaningful screenshots.
  2. Screenshot Blocking: Detecting and disabling screenshot capture attempts, preventing users from taking unauthorized screenshots.
  3. Screenshot Notification: Alerting users when a screenshot is captured, giving them awareness and control over their content.

The researchers conducted a series of user studies to evaluate the effectiveness and user perceptions of these techniques. Participants were asked to engage in simulated online interactions and provide feedback on the various feminist interaction approaches.

The results suggest that these techniques can be effective in deterring non-consensual screenshot-taking and empowering users to maintain control over their digital content and interactions. Users expressed a preference for techniques that provided them with more awareness and autonomy, aligning with the feminist HCI principles of user consent and agency.

Critical Analysis

The paper presents a thoughtful approach to addressing an important issue in social computing, but there are a few areas that could be explored further:

  1. Edge Cases and Usability: While the proposed techniques show promise, the researchers acknowledge that there may be edge cases or unintended consequences that need to be considered, such as accessibility concerns or impact on legitimate screenshot use.
  2. Scalability and Implementation: The feasibility and scalability of implementing these techniques across diverse online platforms and user interfaces could be further investigated.
  3. Broader Societal Implications: The paper focuses on the technical aspects, but the broader societal implications of these feminist interaction techniques, such as their potential to promote more equitable and inclusive online spaces, could be discussed in more depth.

Overall, the paper offers a valuable contribution to the field of feminist HCI and social computing, highlighting the importance of user consent and autonomy in online interactions.

Conclusion

This paper presents a compelling approach to addressing the issue of non-consensual screenshots in online interactions. By drawing on feminist HCI principles, the researchers have proposed a set of interaction techniques that empower users and deter abusive behavior. The study results suggest these techniques can be effective in maintaining user privacy and control over their digital content.

While further research is needed to address potential challenges and scale these approaches, the paper demonstrates the value of incorporating feminist perspectives into the design of social computing systems. By prioritizing user consent and autonomy, these techniques have the potential to create more equitable and respectful online spaces.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

Feminist Interaction Techniques: Deterring Non-Consensual Screenshots with Interaction Techniques
Total Score

0

Feminist Interaction Techniques: Deterring Non-Consensual Screenshots with Interaction Techniques

Li Qiwei, Francesca Lameiro, Shefali Patel, Cristi-Isaula-Reyes, Eytan Adar, Eric Gilbert, Sarita Schoenebeck

Non-consensual Intimate Media (NCIM) refers to the distribution of sexual or intimate content without consent. NCIM is common and causes significant emotional, financial, and reputational harm. We developed Hands-Off, an interaction technique for messaging applications that deters non-consensual screenshots. Hands-Off requires recipients to perform a hand gesture in the air, above the device, to unlock media -- which makes simultaneous screenshotting difficult. A lab study shows that Hands-Off gestures are easy to perform and reduce non-consensual screenshots by 67 percent. We conclude by generalizing this approach and introduce the idea of Feminist Interaction Techniques (FIT), interaction techniques that encode feminist values and speak to societal problems, and reflect on FIT's opportunities and limitations.

Read more

8/7/2024

📊

Total Score

0

The Sociotechnical Stack: Opportunities for Social Computing Research in Non-consensual Intimate Media

Li Qiwei, Allison McDonald, Oliver L. Haimson, Sarita Schoenebeck, Eric Gilbert

Non-consensual intimate media (NCIM) involves sharing intimate content without the depicted person's consent, including revenge porn and sexually explicit deepfakes. While NCIM has received attention in legal, psychological, and communication fields over the past decade, it is not sufficiently addressed in computing scholarship. This paper addresses this gap by linking NCIM harms to the specific technological components that facilitate them. We introduce the sociotechnical stack, a conceptual framework designed to map the technical stack to its corresponding social impacts. The sociotechnical stack allows us to analyze sociotechnical problems like NCIM, and points toward opportunities for computing research. We propose a research roadmap for computing and social computing communities to deter NCIM perpetration and support victim-survivors through building and rebuilding technologies.

Read more

8/7/2024

Reporting Non-Consensual Intimate Media: An Audit Study of Deepfakes
Total Score

0

New!Reporting Non-Consensual Intimate Media: An Audit Study of Deepfakes

Li Qiwei, Shihui Zhang, Andrew Timothy Kasper, Joshua Ashkinaze, Asia A. Eaton, Sarita Schoenebeck, Eric Gilbert

Non-consensual intimate media (NCIM) inflicts significant harm. Currently, victim-survivors can use two mechanisms to report NCIM - as a non-consensual nudity violation or as copyright infringement. We conducted an audit study of takedown speed of NCIM reported to X (formerly Twitter) of both mechanisms. We uploaded 50 AI-generated nude images and reported half under X's non-consensual nudity reporting mechanism and half under its copyright infringement mechanism. The copyright condition resulted in successful image removal within 25 hours for all images (100% removal rate), while non-consensual nudity reports resulted in no image removal for over three weeks (0% removal rate). We stress the need for targeted legislation to regulate NCIM removal online. We also discuss ethical considerations for auditing NCIM on social platforms.

Read more

9/19/2024

Total Score

0

Did They F***ing Consent to That?: Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse

Lucy Qin, Vaughn Hamilton, Sharon Wang, Yigit Aydinalp, Marin Scarlett, Elissa M. Redmiles

As many as 8 in 10 adults share intimate content such as nude or lewd images. Sharing such content has significant benefits for relationship intimacy and body image, and can offer employment. However, stigmatizing attitudes and a lack of technological mitigations put those sharing such content at risk of sexual violence. An estimated 1 in 3 people have been subjected to image-based sexual abuse (IBSA), a spectrum of violence that includes the nonconsensual distribution or threat of distribution of consensually-created intimate content (also called NDII). In this work, we conducted a rigorous empirical interview study of 52 European creators of intimate content to examine the threats they face and how they defend against them, situated in the context of their different use cases for intimate content sharing and their choice of technologies for storing and sharing such content. Synthesizing our results with the limited body of prior work on technological prevention of NDII, we offer concrete next steps for both platforms and security & privacy researchers to work toward safer intimate content sharing through proactive protection. Content Warning: This work discusses sexual violence, specifically, the harms of image-based sexual abuse (particularly in Sections 2 and 6).

Read more

6/17/2024