The Sociotechnical Stack: Opportunities for Social Computing Research in Non-consensual Intimate Media

Read original: arXiv:2405.03585 - Published 8/7/2024 by Li Qiwei, Allison McDonald, Oliver L. Haimson, Sarita Schoenebeck, Eric Gilbert
Total Score

0

📊

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • This paper examines the issue of non-consensual intimate media (NCIM), which involves sharing intimate content without the depicted person's consent, including revenge porn and sexually explicit deepfakes.
  • While NCIM has been studied in legal, psychological, and communication fields, the computing scholarship on this topic has been limited.
  • The paper aims to bridge this gap by linking NCIM harms to the specific technological components that facilitate them.
  • It introduces the "sociotechnical stack," a conceptual framework for mapping the technical stack to its corresponding social impacts.
  • The paper proposes a research roadmap for computing and social computing communities to deter NCIM perpetration and support victim-survivors.

Plain English Explanation

The paper discusses the issue of non-consensual intimate media (NCIM), which refers to the sharing of intimate content without the consent of the person depicted. This can include things like revenge porn and deepfake videos. While NCIM has been studied in other fields, the authors feel that the computing community has not focused on it enough.

The paper introduces a new way of thinking about this problem, called the "sociotechnical stack." This framework helps connect the technical aspects of how NCIM content is created and shared with the real-world harms it causes. By understanding these connections, the authors hope to inspire more computing research that can help prevent NCIM and support those who have been affected by it.

The paper lays out a roadmap for how computing researchers, including those in the social computing field, can tackle this issue. This could involve developing new technologies to deter NCIM perpetration or building tools to help victims cope with the aftermath.

Technical Explanation

The paper begins by highlighting the growing problem of non-consensual intimate media (NCIM), which encompasses revenge porn, deepfakes, and other forms of intimate content shared without a person's consent. While NCIM has been examined in legal, psychological, and communication research, the authors argue that the computing field has not contributed enough to this area.

To address this gap, the paper introduces the "sociotechnical stack" - a conceptual framework that maps the technical components enabling NCIM to the corresponding social harms. This framework allows the authors to analyze NCIM as a sociotechnical problem and identify opportunities for computing research.

The sociotechnical stack consists of several layers, including [internal link: https://aimodels.fyi/papers/arxiv/feminist-interaction-techniques-deterring-non-consensual-screenshots] content creation, [internal link: https://aimodels.fyi/papers/arxiv/cyberbully-online-harassment-issues-associated-digital-wellbeing] content distribution, and [internal link: https://aimodels.fyi/papers/arxiv/public-computing-intellectuals-age-ai-crisis] platform governance. For each layer, the authors discuss the technical components involved and the corresponding social harms, such as emotional distress, reputation damage, and stalking.

Building on this framework, the paper proposes a research roadmap for computing and social computing communities. This includes developing [internal link: https://aimodels.fyi/papers/arxiv/mathematical-framework-problem-security-cognition-neurotechnology] techniques to deter NCIM perpetration, as well as creating tools to [internal link: https://aimodels.fyi/papers/arxiv/illuminating-unseen-investigating-context-induced-harms-behavioral] support victim-survivors.

Critical Analysis

The paper provides a valuable conceptual framework for understanding NCIM as a sociotechnical problem, which is a significant contribution to the field. By linking the technical components to their social impacts, the authors highlight important areas for computing research to address.

However, the paper acknowledges that the sociotechnical stack is a simplification of a complex issue, and there may be other factors and layers that influence NCIM harms. Additionally, the specific research directions outlined in the roadmap may need to be refined and expanded upon based on further investigation and input from diverse stakeholders.

It is also important to note that while the paper focuses on technological solutions, addressing NCIM will likely require a multifaceted approach that also includes legal, educational, and social interventions. The computing community should work in collaboration with other disciplines to develop a comprehensive response to this challenge.

Conclusion

This paper presents a compelling case for the computing community to play a more active role in addressing the issue of non-consensual intimate media (NCIM). By introducing the sociotechnical stack framework, the authors have provided a valuable tool for analyzing NCIM as a complex, technology-enabled problem.

The proposed research roadmap offers a starting point for computing and social computing researchers to develop new techniques and tools to deter NCIM perpetration and support victim-survivors. Implementing these solutions, in conjunction with efforts in other domains, has the potential to make a meaningful impact in mitigating the harms of NCIM and promoting digital safety and well-being.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

📊

Total Score

0

The Sociotechnical Stack: Opportunities for Social Computing Research in Non-consensual Intimate Media

Li Qiwei, Allison McDonald, Oliver L. Haimson, Sarita Schoenebeck, Eric Gilbert

Non-consensual intimate media (NCIM) involves sharing intimate content without the depicted person's consent, including revenge porn and sexually explicit deepfakes. While NCIM has received attention in legal, psychological, and communication fields over the past decade, it is not sufficiently addressed in computing scholarship. This paper addresses this gap by linking NCIM harms to the specific technological components that facilitate them. We introduce the sociotechnical stack, a conceptual framework designed to map the technical stack to its corresponding social impacts. The sociotechnical stack allows us to analyze sociotechnical problems like NCIM, and points toward opportunities for computing research. We propose a research roadmap for computing and social computing communities to deter NCIM perpetration and support victim-survivors through building and rebuilding technologies.

Read more

8/7/2024

Reporting Non-Consensual Intimate Media: An Audit Study of Deepfakes
Total Score

0

New!Reporting Non-Consensual Intimate Media: An Audit Study of Deepfakes

Li Qiwei, Shihui Zhang, Andrew Timothy Kasper, Joshua Ashkinaze, Asia A. Eaton, Sarita Schoenebeck, Eric Gilbert

Non-consensual intimate media (NCIM) inflicts significant harm. Currently, victim-survivors can use two mechanisms to report NCIM - as a non-consensual nudity violation or as copyright infringement. We conducted an audit study of takedown speed of NCIM reported to X (formerly Twitter) of both mechanisms. We uploaded 50 AI-generated nude images and reported half under X's non-consensual nudity reporting mechanism and half under its copyright infringement mechanism. The copyright condition resulted in successful image removal within 25 hours for all images (100% removal rate), while non-consensual nudity reports resulted in no image removal for over three weeks (0% removal rate). We stress the need for targeted legislation to regulate NCIM removal online. We also discuss ethical considerations for auditing NCIM on social platforms.

Read more

9/19/2024

Feminist Interaction Techniques: Deterring Non-Consensual Screenshots with Interaction Techniques
Total Score

0

Feminist Interaction Techniques: Deterring Non-Consensual Screenshots with Interaction Techniques

Li Qiwei, Francesca Lameiro, Shefali Patel, Cristi-Isaula-Reyes, Eytan Adar, Eric Gilbert, Sarita Schoenebeck

Non-consensual Intimate Media (NCIM) refers to the distribution of sexual or intimate content without consent. NCIM is common and causes significant emotional, financial, and reputational harm. We developed Hands-Off, an interaction technique for messaging applications that deters non-consensual screenshots. Hands-Off requires recipients to perform a hand gesture in the air, above the device, to unlock media -- which makes simultaneous screenshotting difficult. A lab study shows that Hands-Off gestures are easy to perform and reduce non-consensual screenshots by 67 percent. We conclude by generalizing this approach and introduce the idea of Feminist Interaction Techniques (FIT), interaction techniques that encode feminist values and speak to societal problems, and reflect on FIT's opportunities and limitations.

Read more

8/7/2024

Total Score

0

Did They F***ing Consent to That?: Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse

Lucy Qin, Vaughn Hamilton, Sharon Wang, Yigit Aydinalp, Marin Scarlett, Elissa M. Redmiles

As many as 8 in 10 adults share intimate content such as nude or lewd images. Sharing such content has significant benefits for relationship intimacy and body image, and can offer employment. However, stigmatizing attitudes and a lack of technological mitigations put those sharing such content at risk of sexual violence. An estimated 1 in 3 people have been subjected to image-based sexual abuse (IBSA), a spectrum of violence that includes the nonconsensual distribution or threat of distribution of consensually-created intimate content (also called NDII). In this work, we conducted a rigorous empirical interview study of 52 European creators of intimate content to examine the threats they face and how they defend against them, situated in the context of their different use cases for intimate content sharing and their choice of technologies for storing and sharing such content. Synthesizing our results with the limited body of prior work on technological prevention of NDII, we offer concrete next steps for both platforms and security & privacy researchers to work toward safer intimate content sharing through proactive protection. Content Warning: This work discusses sexual violence, specifically, the harms of image-based sexual abuse (particularly in Sections 2 and 6).

Read more

6/17/2024