The Internet Never Forgets: Image-Based Sexual Abuse and the Workplace

The Internet Never Forgets: Image-Based Sexual Abuse and the Workplace

Melody Lee Rood, John Schriner
DOI: 10.4018/978-1-7998-4912-4.ch006
Chapter PDF Download
Open access chapters are freely available for download

Abstract

Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents recommendations from the literature focusing on shifting cultural attitudes, effective legislation, and increased education and training.
Chapter Preview
Top

Introduction

It is estimated that 1.2 trillion photos were taken in 2017; out of those images, 85% were from smartphones (Richter, 2017). In a 2015 survey that looked into “commonly regretted types of social media posts” among adults ages 18 and older in the United States, 14% shared pictures that could potentially impact their reputation at work; 10% sent intimate, sexual messages with a fear that their privacy could be breached (YouGov, 2015). While documentation culture becomes increasingly normalized with popular social media platforms like Instagram, Tik Tok, Twitter, and YouTube, a growing concern is how online presence can impact educational and/or professional prospects. It is commonplace to see social media accounts include prefacing statements in the account’s bio section, declaring thoughts and opinions as one’s own and not a reflection of the views of any institution in which that user is associated. Not only should people be cautious of their individual contributions to their online identities, but there is also the fear of what others can say or do without consent. Cyberbullying only exasperates this concern.

In a survey titled, “Online Hate and Harassment: The American Experience,” 53% of internet users in the U.S. claimed to have experienced some form of harassment; 37% experienced severe harassment from sexual harassment to physical threats and stalking (ADL, 2019). Image-based sexual abuse (IBSA) or what’s commonly known as “revenge pornography” is a type of non-consensual cyberharassment with effects that jeopardize reputation, job security, professional and educational aspirations, mental health, and in some cases, physical safety.

Revenge pornography can be defined as: “Sexually explicit images or videos of an individual, published online without their consent and with the intent to cause them distress” (Chandler & Munday, 2019). Revenge pornography is a type of cyberharassment that often directly impacts the workplace and one’s job prospects. Once an image is uploaded to web platforms, it seems an insurmountable challenge to get it removed. The area of revenge pornography is akin to doxxing, that is, having one’s personal information leaked to websites or forums––also deeply unsettling.

There is much written about cyberharassment and the workplace, although there is currently little to no academic research about specifically IBSA and the workplace. One’s profession is very often the first target of abusers, as the authors explore in depth below. A major issue in dealing with IBSA is that private images can be uploaded by a single individual, but it is often shared so many times anonymously that it is difficult to find all the perpetrators. This type of mob mentality, or cyber mob, is typified by a phenomenon called online disinhibition. Online disinhibition, or more broadly deindividuation as social psychologists term it, is found when an individual experiences loss of self-awareness in a crowd: online disinhibition may be attributable to anonymity in a forum or a collective identity (Barlett & Helmstetter, 2018; Citron, 2016; Suler, 2004). Not all online disinhibition is harmful. The lack of being identified, as well as being physically separated, can help individuals with anxiety open up to strangers in online communities. That type of deindividuation is benign and can be described as the ease of communication online versus in-person, whereas toxic deindividuation is the ease of hurting others due to a perceived anonymity (Barlett & Helmstetter, 2018).

Toxic deindividuation can lead to less concern about social norms, and generally, the well-being of others. When individual accountability is not a concern, people may act differently than when they are identified. “It is these factors that desensitize people such that their social learning is altered to increase their willingness to engage in cyberbullying. Just as alcohol may disinhibit some people and consequently give them the courage (or stupidity) to pick a fight with a member of a biker gang at a bar, anonymity’s disinhibition and deindividuation mechanisms foster acts of online deviance in which people would not normally engage” (Lowry, Zhang, Wang, & Siponen, 2016, p. 970).

Key Terms in this Chapter

Dark Web: Websites that are only accessible via specialized software and networks. A dark web site’s location is obfuscated so it is particularly difficult to apply legal pressure to have non-consensual personal content removed.

Clearnet: The world wide web that is accessible via an internet browser. Usually this term is used as a contradistinction to the dark web.

Deepfakes: Manipulated media using an artificial neural network to replace a video with someone else’s likeness. As computer processing improves, deepfakes will be able to be made by novices with personal computers. Deepfakes can be made of any video genre but are often associated with sexual videos.

Image-Based Sexual Abuse: An intimate or sexual image shared with a third party non-consensually.

Doxxing: To have one’s personal information leaked online. This could include one’s place of employment, social media accounts, social security number, and family information.

Non-Consent Fetishization: Fetishizing acts that are done non-consensually. This can include actions such as sexual assault but also attaining and distributing non-consensual photos for pleasure.

Revenge Pornography: The sharing of sexual media with the motivation of harming the person photographed or filmed. While this terminology is commonly used, it is limiting, and many scholars and activists have critiqued its oversimplification of a much larger issue.

Sextortion: A type of image-based sexual abuse whereby a perpetrator threatens to disseminate intimate images or video. This coercion could also be used to blackmail or obtain more images or videos.

Information Cascade: In this context, this refers to the process of accepting information that others have already shared regardless of what an individual already knows, and then disseminating that information. This forwarding of potentially false or hurtful information makes it difficult to track down the original creators of information.

Complete Chapter List

Search this Book:
Reset