Advertisement

Image-Based Sexual Abuse: A Feminist Criminological Approach

  • Nicola HenryEmail author
  • Asher Flynn
Reference work entry
  • 61 Downloads

Abstract

Contemporary digital society and culture can be characterized by an obsession with both the visual artifact and object. This is evidenced through contemporary voyeurism trends, such as reality television, live streaming, amateur pornography, as well as an increasing demand for “real” or “authentic” visual representations. In addition and related to these contemporary social trends, there is a continual shifting public/private divide, an ongoing fixation on bodies, particularly feminized bodies, as well as pre-existing structural inequalities on the basis of gender, race, sexuality, class, age, and ability. This complex interplay of social, cultural, and technological factors provides the contextual backdrop to understanding the prevalence, nature, and perpetration related to the taking and sharing non-consensual nude or sexual imagery – also known as image-based sexual abuse (IBSA). Further to structural factors underlying IBSA, it is also important to address the performativity of gender and subjectivity in understanding this phenomenon and thereby contribute to more informed responses and prevention interventions. In this chapter, we utilize feminist criminological theory for understanding the complex interplay of individual and structural causes of IBSA.

Keywords

Image-based sexual abuse Technology-faciliated abuse Revenge pornography Nonconsensual pornography 

References

  1. Arora, P., & Scheiber, L. (2017). Slumdog romance: Facebook love and digital privacy at the margins. Media, Culture and Society, 39(3), 408–422.CrossRefGoogle Scholar
  2. Attwood, F. (2018). Porn for women. In K. Harrison & C. A. Ogden (Eds.), Pornographies: Critical positions. Chester: University of Chester Press.Google Scholar
  3. Austria Today. (2002, July 23). Man fined for revenge porn pics. Austria Today.Google Scholar
  4. Bates, S. (2016). Revenge porn and mental health: A qualitative analysis of the mental health effects of revenge porn on female survivors. Feminist Criminology, 12(1), 22–42.CrossRefGoogle Scholar
  5. Belknap, J., & Holsinger, K. (2006). The gendered nature of risk factors for delinquency. Feminist Criminology, 1(1), 48–71.CrossRefGoogle Scholar
  6. Bond, E., & Tyrrell, K. (2018). Understanding revenge pornography: A national survey of police officers and staff in England and Wales. Journal of Interpersonal Violence.  https://doi.org/10.1177/086360518760011.
  7. Bossler, A. M., Holt, T. J., & May, D. C. (2012). Predicting online harassment victimization among a juvenile population. Youth & Society, 44(4), 500–523.CrossRefGoogle Scholar
  8. Branch, K., Hilinski-Rosick, C. M., Johnson, E., & Solano, G. (2017). Revenge porn victimization of college students in the United States: An exploratory analysis. International Journal for Cyber Criminology, 11(1), 128–142.Google Scholar
  9. Braithwaite, J. (1979). Inequality, crime, and public policy. London/Boston: Routledge.Google Scholar
  10. Broidy, L. M., & Agnew, A. (1997). Gender and crime: A general strain theory perspective. Journal of Research in Crime and Delinquency, 34(3), 275–306.CrossRefGoogle Scholar
  11. Brownmiller, S. (1975). Against our will: Men, women and rape. London: Penguin Books.Google Scholar
  12. Burgess-Proctor, A. (2006). Intersections of race, class, gender, and crime: Future directions for feminist criminology. Feminist Criminology, 1(1), 27–47.CrossRefGoogle Scholar
  13. Burkett, M. (2015). Sex(t) talk: A qualitative analysis of young adults’ negotiations of the pleasures and perils of sexting. Sexuality and Culture, 19(4), 835–863.CrossRefGoogle Scholar
  14. Burns, A. (2015). In full view: Involuntary porn and the postfeminist rhetoric of choice. In C. Nally & A. Smith (Eds.), Twenty-first century feminism (pp. 93–118). London: Palgrave Macmillan.Google Scholar
  15. Butler, J. (1988). Performative acts and gender constitution: An essay in phenomenology and theory. Theatre Journal, 40(4), 519–531.CrossRefGoogle Scholar
  16. Carrington, K., & Scott, J. (2008). Masculinity, rurality, and violence. The British Journal of Criminology, 48(5), 641–666.CrossRefGoogle Scholar
  17. Carrington, K., McIntosh, A., & Scott, J. (2010). Globalization, frontier masculinities and violence: Booze, blokes and brawls. British Journal of Criminology, 50, 393–413.CrossRefGoogle Scholar
  18. Chesney, R., & Citron, D. K. (2019). Deep fakes: A looming challenge for privacy, democracy, and national security. California Law Review.  https://doi.org/10.2139/ssrn.3213954.
  19. Citron, D. K. (2014). Hate crimes in cyberspace. Cambridge, MA: Harvard University Press.CrossRefGoogle Scholar
  20. Citron, D. K., & Franks, M. A. (2014). Criminalizing revenge porn. Wake Forest Law Review, 49(2), 345–391.Google Scholar
  21. Cohen, A. K. (1955). Delinquent boys: The culture of the gang. New York: Free Press.Google Scholar
  22. Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588–608.CrossRefGoogle Scholar
  23. Connell, R. W. (1987). Gender and power. Oxford, UK: Polity Press.Google Scholar
  24. Connell, R. W., & Messerschmidt, J. W. (2005). Hegemonic masculinity: Rethinking the concept. Gender & Society, 19(6), 829–859.CrossRefGoogle Scholar
  25. Crofts, T., Lee, M., McGovern, A., & Milivojevic, S. (2015). Sexting and young people. London: Palgrave Macmillan.CrossRefGoogle Scholar
  26. Cyber Civil Rights Initiative (CCRI). (2014). End revenge porn: A campaign of the Cyber Civil Rights Initiative. Retrieved from https://www.cybercivilrights.org/wp-content/uploads/2014/12/RPStatistics.pdf
  27. Daly, K., & Chesney-Lind, M. (1988). Feminism and criminology. Justice Quarterly, 5(4), 497–538.CrossRefGoogle Scholar
  28. DeKeseredy, W. S. (1988). Woman abuse in dating relationships: The relevance of social support theory. Journal of Family Violence, 3, 1–13.CrossRefGoogle Scholar
  29. DeKeseredy, W. S., & Schwartz, M. D. (1993). Male peer support and woman abuse: An expansion of DeKeseredy’s model. Sociological Spectrum, 13, 393–413.CrossRefGoogle Scholar
  30. DeKeseredy, W. S., & Schwartz, M. D. (2010). Friedman economic policies, social exclusion, and crime: Toward a gendered left realist subcultural theory. Crime, Law and Social Change, 54, 159–170.CrossRefGoogle Scholar
  31. DeKeseredy, W. S., & Schwartz, M. D. (2016). Thinking sociologically about image-based sexual abuse: The contribution of male peer support theory. Sexualization, Media & Society, 1–8.Google Scholar
  32. Dir, A., & Cyders, M. (2015). Risks, risk factors, and outcomes associated with phone and Internet sexting among university students in the United States. Archives of Sexual Behaviour, 44(6), 1675–1684.Google Scholar
  33. Drouin, M., & Tobin, E. (2014). Unwanted but consensual sexting among young adults: Relations with attachment and sexual motivations. Computers in Human Behaviour, 31, 412–418.CrossRefGoogle Scholar
  34. Drouin, M., Ross, J., & Tobin, E. (2015). Sexting: A new, digital vehicle for intimate partner aggression? Computers in Human Behavior, 50, 197–204.CrossRefGoogle Scholar
  35. Durkheim, É. (1893/1984). The division of labor in society (trans: Halls, W.D.). New York: The Free Press.Google Scholar
  36. Eaton, A. A., Jacobs, H., & Ruvalcaba, Y. (2018). 2017 Nationwide online study of non-consensual porn victimization and perpetration: A summary report. Retrieved from https://www.cybercivilrights.org/wp-content/uploads/2017/06/CCRI-2017-Research-Report.pdf
  37. Englander, E. (2015). Coerced sexting and revenge porn among teens. Bullying, Teen Aggression & Social Media, 1(2), 19–21.Google Scholar
  38. Franks, M. A. (2011). Unwilling avatars: Idealism and discrimination in cyberspace. Columbia Journal of Gender and Law, 20, 224–244.Google Scholar
  39. Franks, M. A. (2016). “Revenge porn” reform: A view from the front lines. Florida Law Review. University of Miami Legal Studies Research Paper No. 16–43.Google Scholar
  40. Gámez-Guadix, M., Almendros, C., Borrajo, E., & Calvete, E. (2015). Prevalence and association of sexting and online sexual victimization among Spanish adults. Sexuality Research & Social Policy, 12(2), 145–154.CrossRefGoogle Scholar
  41. Garcia, J. R., Gesselman, A. N., Siliman, S. A., Perry, B. L., Coe, K., & Fisher, H. E. (2016). Sexting among singles in the USA: Prevalence of sending, receiving, and sharing sexual messages and images. Sexual Health, 13(5), 428–435.CrossRefGoogle Scholar
  42. Goodard, P. (1993, October 15). Stagecoach gets lost in city. Toronto Star.Google Scholar
  43. Grabosky, P. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10, 243–249.CrossRefGoogle Scholar
  44. Hall, M., & Hearn, J. (2018). Revenge pornography: Gender, sexualities and motivations. New York: Routledge.Google Scholar
  45. Harika, A. (2014). Banning revenge porn: Florida. Nova Law Review, 39, 65–90.Google Scholar
  46. Heise, L. L. (1998). Violence against women: An integrated, ecological framework. Violence Against Women, 4(3), 262–290.Google Scholar
  47. Henry, N., & Flynn, A. (2019). Image-based sexual abuse: Online distribution Channels and illicit communities of support. Violence Against Women.Google Scholar
  48. Henry, N., & Powell, A. (2015). Beyond the sext: Technology-facilitated sexual violence and harassment against adult women. Australian and New Zealand Journal of Criminology, 48(1), 1104–1118.CrossRefGoogle Scholar
  49. Henry, N., Flynn, A., & Powell, A. (2018). Policing image-based sexual abuse: Stakeholder perspectives. Police Practice and Research: An International Journal, 19(6), 565–581.CrossRefGoogle Scholar
  50. Holt, T. J., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1–25.CrossRefGoogle Scholar
  51. Hume, T. (2005, June 5). Ex’s set up with porn PXTs. Sunday Star Times.Google Scholar
  52. Jewkes, R. (2012). Rape perpetration: A review. Pretoria: Sexual Violence Research Initiative.Google Scholar
  53. Kelly, L. (1988). Surviving sexual violence. Minneapolis: University of Minnesota Press.Google Scholar
  54. Langlois, G., & Slane, S. (2017). Economies of reputation: The case of revenge porn. Communication and Critical/Cultural Studies, 14(2), 120–138.CrossRefGoogle Scholar
  55. Lenhart, A., Ybarra, M., & Price-Feeney, M. (2016). Online harassment, digital abuse and cyberstalking in America. Retrieved from https://www.datasociety.net/pubs/oh/Online_Harassment_2016.pdf
  56. Malamuth, N. M., Sockloskie, R. J., Koss, M., & Tanaka, J. S. (1991). Characteristics of aggressors against women: Testing a model using a national sample of college students. Journal of Consulting and Clinical Psychology, 59, 670–681.CrossRefGoogle Scholar
  57. Maras, M. (2016). Cybercriminology. New York: Oxford University Press.Google Scholar
  58. Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2010). Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory. Deviant Behavior, 31(5), 381–410.Google Scholar
  59. Marganski, A., & Melander, L. (2018). Intimate partner violence victimization in the cyber and real word: Examining the extent of cyber aggression experiences and its association with in-person dating violence. Journal of Interpersonal Violence, 33(7), 1071–1095.CrossRefGoogle Scholar
  60. Marshall, W. L., & Barbaree, H. E. (1990). An integrated theory of the etiology of sexual offending. In W. L. Marshall, D. R. Laws, & H. E. Barbaree (Eds.), Handbook of sexual assault: Issues, theories, and treatment of the offender (pp. 257–275). New York: Plenum.CrossRefGoogle Scholar
  61. Martens, T. (2011, December 8). No clothes, no problems? Some rockers don’t mind baring it all on website. Edmonton Journal. Retrieved from https://www.pressreader.com/canada/edmonton-journal/20111208/282948152056978
  62. McAfee. (2013). Lovers beware: Scorned exes may share intimate data and images online. Retrieved from http://www.mcafee.com/au/about/news/2013/q1/20130204-01.aspx
  63. McGlynn, C., & Rackley, E. (2017). Image-based sexual abuse. Oxford Journal of Legal Studies, 37(3), 534–561.CrossRefGoogle Scholar
  64. McGlynn, C., Rackley, E., & Houghton, R. (2017). Beyond “revenge porn”: The continuum of image-based sexual abuse. Feminist Legal Studies, 25(1), 25–46.CrossRefGoogle Scholar
  65. McNair, B. (2017). Porno? Chic!: How pornography changed the world and made it a better place. London: Routeldge.Google Scholar
  66. Merton, R. (1938). Social structure and anomie. American Sociological Review, 3(5), 672–682.CrossRefGoogle Scholar
  67. Mitchell, K. J., Finkelhor, D., Jones, L. M., & Wolak, J. (2012). Prevalence and characteristics of youth sexting: A national study. Pediatrics, 129(1), 13–20.CrossRefGoogle Scholar
  68. Morelli, M., Bianchi, D., Baiocco, R., Pezzuti, L., & Chirumbolo, A. (2016). Sexting, psychological distress and dating violence among adolescents and young adults. Psicothema, 28(2), 137–142.Google Scholar
  69. Navarro, J. N., & Jasinski, J. L. (2012). Going cyber: Using routine activities theory to predict cyberbullying experiences. Sociological Spectrum, 32(1), 81–94.CrossRefGoogle Scholar
  70. Nussbaum, M. C. (2010). Objectification and Internet misogyny. In S. Levmore & M. C. Nussbaum (Eds.), The offensive Internet: Speech, privacy, and reputation (pp. 68–90). Cambridge, MA: Harvard University Press.Google Scholar
  71. Office of the eSafety Commissioner (OeSC). (2017). Image-based Abuse National Survey: Summary report. Retrieved from https://www.esafety.gov.au/image-based-abuse//-/media/15469f65e05e4d02b994010def7af3bb.ashx
  72. Paasonen, S. (2010). Labors of love: Netporn, Web 2.0, and the meanings of amateurism. New Media & Society, 12(8), 1297–1312.Google Scholar
  73. Patrick, K., Heywood, W., Pitts, M., & Mitchell, A. (2015). Demographic and behavioural correlates of six sexting behaviours among Australian secondary school students. Sexual Health, 12(6), 480–487.CrossRefGoogle Scholar
  74. Pinchevsky, G. M., & Wright, E. M. (2012). The impact of neighborhoods on intimate partner violence and victimization. Trauma, Violence & Abuse, 13(2), 112–132.CrossRefGoogle Scholar
  75. Powell, A., & Henry, N. (2017). Sexual violence in a digital age. Basingstoke: Palgrave Macmillan.CrossRefGoogle Scholar
  76. Powell, A., Henry, N., & Flynn, A. (2018). Image-based sexual abuse. In W. S. DeKeseredy & M. Dragiewicz (Eds.), Handbook of critical criminology (pp. 305–315). New York: Routledge.CrossRefGoogle Scholar
  77. Powell, A., Henry, N., Flynn, A., & Scott, A. J. (2019). Image-based sexual abuse: The extent, nature, and predictors of perpetration in a community sample of Australian adults. Computers in Human Behavior, 92, 393–402.CrossRefGoogle Scholar
  78. Rackley, E., & McGlynn, C. (2014, July 23). The law must focus on consent when it tackles revenge porn. Retrieved from http://theconversation.com/the-law-must-focus-on-consent-when-it-tackles-revenge-porn-29501
  79. Reed, L., Tolman, R., & Ward, M. (2016). Snooping and sexting: Digital media as a context for dating aggression and abuse among college students. Violence Against Women, 22(13), 1556–1576.CrossRefGoogle Scholar
  80. Renzetti, C. A. (2013). Feminist criminology. London: Routledge.CrossRefGoogle Scholar
  81. Reyns, B. W., Henson, B., & Fisher, B. S. (2011). Being pursued online: Applying cyberlifestyle-routines activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38(11), 1149–1169.CrossRefGoogle Scholar
  82. Reyns, B. W., Burek, M. W., Henson, B., & Fisher, B. S. (2013). The unintended consequences of digital technology: Exploring the relationship between sexting and cybervictimization. Journal of Crime and Justice, 36(1), 1–17.CrossRefGoogle Scholar
  83. Schwartz, M. D., & Pitts, V. L. (1995). Exploring a feminist routine activities approach to explaining sexual assault. Justice Quarterly, 12(1), 9–31.CrossRefGoogle Scholar
  84. Strohmaier, H., Murphy, M., & DeMatteo, D. (2014). Youth sexting: Prevalence rates, driving motivations, and the deterrent effect of legal consequences. Sexuality Research & Social Policy, 11, 245–255.CrossRefGoogle Scholar
  85. Taylor, A. (2001, September 7). Porn revenge of spurned mistress. The Sun (UK).Google Scholar
  86. Thompson, M. P., & Morrison, D. J. (2013). Prospective predictors of technology-based sexual coercion by college males. Psychology of Violence, 3(3), 233–246.CrossRefGoogle Scholar
  87. Thornhill, R., & Palmer, C. T. (2000). A natural history of rape: Biological bases of sexual coercion. Cambridge, MA: The MIT Press.Google Scholar
  88. Uhl, C. A., Rhyner, K. J., Terrance, C. A., & Lugo, N. R. (2018). An examination of non-consensual pornography websites. Feminism & Psychology, 28(1), 50–68.CrossRefGoogle Scholar
  89. UK Law Reform Commission. (2018). Abusive and offensive online communications: A scoping report. Retrieved from https://s3-eu-west-2.amazonaws.com/lawcom-prod-storage-11jsxou24uy7q/uploads/2018/10/6_5039_LC_Online_Comms_Report_FINAL_291018_WEB.pdf
  90. Van Ouytsel, J., Ponnet, K., & Walrave, M. (2018). Cyber dating abuse victimization among secondary school students from a lifestyle-routine activities theory perspective. Journal of Interpersonal Violence, 33(17), 2767–2776.CrossRefGoogle Scholar
  91. Walker, S., Sanci, L., & Temple-Smith, M. (2013). Sexting: Young women’s and men’s views on its nature and origins. Journal of Adolescent Health, 52, 697–701.CrossRefGoogle Scholar
  92. West, C., & Zimmerman, D. H. (1987). Doing gender. Gender and Society, 1(2), 125–151.CrossRefGoogle Scholar
  93. White, R., Haines, F., & Asquith, N. L. (2017). Crime & criminology. Melbourne: Oxford University Press.Google Scholar
  94. Wittes, B., Poplin, C., Jurecic, C., & Spera, C. (2016). Sextortion: cybersecurity, teenagers, and remote sexual assault. Retrieved from https://www.brookings.edu/research/sextortion-cybersecurity-teenagers-and-remote-sexual-assault/
  95. Wolak, J., & Finkelhor, D. (2016). Sextortion: Findings from an online survey about threats to expose sexual images. Retrieved from http://www.unh.edu/ccrc/Sextortion%20Report%20final%206-22-2016.pdf
  96. Wolfe, S. E., Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2016). Routine cell phone activity and exposure to sext messages: Extending the generality of routine activity theory and exploring the etiology of a risky teenage behavior. Crime & Delinquency, 62(5), 614–644.Google Scholar
  97. Yar, M. (2005). The novelty of “cybercrime”: An assessment in light of routine activity. European Journal of Criminology, 2(4), 407–427.CrossRefGoogle Scholar
  98. Yeung, T., Horyniak, D., Vella, A., Hellard, M., & Lim, M. (2014). Prevalence, correlates and attitudes towards sexting among young people in Melbourne, Australia. Sexual Health, 11(4), 332–339.CrossRefGoogle Scholar

Copyright information

© The Author(s) 2020

Authors and Affiliations

  1. 1.RMIT UniversityMelbourneAustralia
  2. 2.Monash UniversityClaytonAustralia

Personalised recommendations