Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Understanding Help-Seeking and Help-Giving
on Social Media for Image-Based Sexual Abuse

Miranda Wei
University of Washington, Google
   Sunny Consolvo
Google
   Patrick Gage Kelley
Google
   Tadayoshi Kohno
University of Washington
   Tara Matthews
Google
   Sarah Meiklejohn
Google
   Franziska Roesner
University of Washington
   Renee Shelby
Google
   Kurt Thomas
Google
   Rebecca Umbach
Google
Abstract

Image-based sexual abuse (IBSA), like other forms of technology-facilitated abuse, is a growing threat to people’s digital safety. Attacks include unwanted solicitations for sexually explicit images, extorting people under threat of leaking their images, or purposefully leaking images to enact revenge or exert control. In this paper, we explore how people seek and receive help for IBSA on social media. Specifically, we identify over 100,000 Reddit posts that engage relationship and advice communities for help related to IBSA. We draw on a stratified sample of 261 posts to qualitatively examine how various types of IBSA unfold, including the mapping of gender, relationship dynamics, and technology involvement to different types of IBSA. We also explore the support needs of victim-survivors experiencing IBSA and how communities help victim-survivors navigate their abuse through technical, emotional, and relationship advice. Finally, we highlight sociotechnical gaps in connecting victim-survivors with important care, regardless of whom they turn to for help.

Warning: This paper includes descriptions and quotes about image-based sexual abuse. Such material is disturbing.

1 Introduction

People increasingly share sexually explicit images with consent in intimate relationships [38], as cultural norms change and image sharing capabilities increase. However, this trend has coincided with a rise in image-based sexual abuse (IBSA): a continuum of harassment and scams involving the receipt, generation, and distribution of sexually explicit images [61, 62]. Examples include unwanted solicitations for sexually explicit images [81, 89], sextortion [23, 73], and nonconsensually sharing sexually explicit images [62]. In terms of scale, one in ten women under the age of 30 in the US has been threatened with or experienced the nonconsensual sharing of their nude images [51], and roughly one in twenty adult men in the US has experienced sextortion [27].

As with other forms of technology-facilitated abuse—including intimate partner abuse [93], stalkerware [34], and interpersonal surveillance [99]—the support needs of people experiencing IBSA (victim-survivors) are complex. Perpetrators can be intimate partners, peers, or strangers. Even against perpetrators with basic technical capabilities, preventing the distribution of sexually explicit images can be daunting. Support available today includes image fingerprint databases used by platforms to take down imagery [67, 90] and institutional guides on how to respond to IBSA [74]. However, victim-survivors may be unaware of these resources or find them ineffective, leading them to seek alternative support.

In this paper, we explore how adults seek and receive help for IBSA on Reddit, a popular social media platform for threaded dialogue. Given the scarcity of victim-survivors who turn to law enforcement or platforms for help [17, 83], social media provides an important avenue for disclosure and support. Expanding on knowledge from prior work studying help-seeking on Reddit for sexual abuse (e.g., rape) [2, 66, 72], we focus on help-seeking on Reddit across the continuum of image-based sexual abuse. Specifically we investigate:

  1. RQ1:

    IBSA types. What types of IBSA do people seek help for on Reddit? What gender and relationship dynamics between perpetrators and victim-survivors do they disclose? How might differences between IBSA types influence the development of supportive solutions?

  2. RQ2:

    Help-seeking. What help do they seek? How do their needs vary across IBSA types? What actions do they share that they have already taken?

  3. RQ3:

    Help-giving. What help do they receive? How supportive is it? What gaps does this help fill compared to other interventions? What gaps remain?

To answer these questions, we used a mixed methods approach to sift through 5.7 million English-language Reddit posts shared on relationship and advice subcommunities over the last 3 years. Leveraging a novel large language model (LLM) data processing pipeline and extensive manual review, we identified more than 100,000 queries for help related to IBSA—roughly 2% of posts on the subcommunities. This method allowed us to analyze a much larger sample than previous qualitative Reddit work. We drew on a stratified sample of these posts to qualitatively explore the continuum of IBSA including financial and nonfinancial sextortion, nonconsensual synthetic explicit imagery, pressurized sexting, cyberflashing, nonconsensual explicit imagery, and recorded sexual assault.

We found that although IBSA covered a wide range of contexts, perpetrators, and harms, victim-survivors nevertheless shared similar needs: to be heard and supported through life-changing experiences of abuse. Across types of IBSA, victim-survivors sought information about their options (technical, legal, or otherwise), advice for coping with distressing emotions, and suggestions for managing relationships. Timely support was crucial: in half of the cases we analyzed, victim-survivors were seeking immediate help for active IBSA. Though the help provided by the Reddit community was sometimes oversimplified and made limited use of institutional support resources, it was also largely empathetic and validated victim-survivors’ experiences, helping to partially address their needs.

Our work characterizes IBSA to chart additional directions to support victim-survivors, in ways that complement the distinct avenues for help that exist today. We reflect on the role of technology in facilitating IBSA and identify opportunities for technologists and platforms to help prevent or mitigate IBSA, while also discussing how our insights can inform advocates in providing support for victim-survivors.

2 Related Work

2.1 Image-based sexual abuse (IBSA)

IBSA is an umbrella term referring to “taking, distributing, and/or making threats to distribute, nude or sexual image[ry]111As with prior work [77], we use “imagery” to include photos and video. without a person’s consent” [77, p. 1] (see also: [25, 61, 62, 75, 76]). For the purposes of our study, we expand this definition to include the unwanted receipt of and synthetic generation of sexually explicit222Sexually explicit imagery can be distinguished from intimate imagery, which also includes images of people in private or sensitive contexts (e.g., sleeping, in states of intoxication, or without religious coverings). images, that is, images portraying nudity or sexual conduct. IBSA is a type of technology-facilitated abuse in which a person leverages technology to exert control over another [11, 25, 41]. We refer to the person enacting IBSA as the perpetrator and the person experiencing IBSA as the victim-survivor.

Continuum of IBSA

IBSA exists on a continuum, occurring in diverse relational contexts, with distinct motivations, and rapidly evolving threats [62]. The types of IBSA that inform our investigation include:

  1. 1.

    Sextortion: a perpetrator makes threats to distribute sexually explicit images of a person unless they comply with the perpetrator’s demands [23, 31, 42, 73].

  2. 2.

    Nonconsensual synthetic explicit imagery (NCSEI): a perpetrator uses software (e.g., photo editing or generative AI tools) to create sexualized depictions of a person (e.g., “deepfakes,” “cheapfakes”) [30, 44, 58, 71, 100].

  3. 3.

    Pressurized sexting (PS): a person experiences unwanted solicitation for explicit images (e.g., “coerced sexting”) [81, 89].

  4. 4.

    Cyberflashing (CF): a person receives an unwanted explicit image [59].

  5. 5.

    Nonconsensual explicit imagery (NCEI): a perpetrator uses explicit imagery for revenge or to enact control [62] (e.g., “revenge porn”); or otherwise nonconsensually creates, retains, or distributes explicit imagery (e.g., “upskirting,” “downblousing”) [7, 52].

  6. 6.

    Recorded sexual assault (RSA): a perpetrator records or distributes imagery from a sexual assault [40].

Role of technology

Technology often plays a role in both the generation and distribution of IBSA. Outside of consensual sharing or nonconsensual recording, methods of obtainment include hacking [32], photoshopping [63], and using generative AI tools to create synthetic imagery [58, 95, 100]. Distribution channels used by perpetrators include—but are not limited to— websites [21, 39, 55, 94], social media platforms [32, 58, 85], and mobile apps [46, 60].

Harms

Harms from IBSA—as with other forms of sexualized violence—are not uniformly experienced, but are nonetheless serious and consequential [6, 10, 49, 83], carrying emotional, physical, financial, and social impacts [45]. When images are distributed, victim-survivors become visually recognizable to friends, family, co-workers, or others [45], and imagery is often shared with other personally identifiable information (e.g., names, social media handles, phone numbers, and/or addresses [20, 32, 91]). The often permanent nature of online material intensifies IBSA harms, as imagery can be repeatedly downloaded, saved, and shared, making “complete" removal challenging, or even impossible [5]. As IBSA often co-occurs with other forms of gender-based violence (e.g., intimate partner abuse, stalking, and sexual harassment) [60], harms may compound with other polyvictimizations.

2.2 IBSA help-seeking and help-giving

Overall, rates of IBSA help-seeking through peers and family, institutional support, and platforms are low [17, 83]. One potential reason is that in contrast to other forms of sexualized violence, targets of IBSA are inherently not granted anonymity, as they are facially (or otherwise) identifiable [45]. Another challenge is that help-givers may hold victim-blaming attitudes, which have been found among the general public [15, 29, 102], law enforcement [12, 103], and victim-survivors’ friends and family [88].

Online help-seekers for topics such as health often look for specific advice or information, acknowledgement, or sympathy [3, 37, 68]. Prior work also studies online help-seeking for sexual abuse (e.g., rape); by contrast, our work considers online help-seeking for image-based sexual abuse. When disclosing online about sexual abuse (that was not image-based), victim-survivors perceived online fora as safer spaces to disclose stigmatized experiences and connect with others, with reduced interpersonal risk [1, 2, 50, 66, 72]. As we show, social media—specifically Reddit—has at least hundreds of thousands of posts related to IBSA help-seeking. Thus it is crucial to understand this support system and how best to enmesh it with other social, institutional, and platform resources.

Refer to caption
Figure 1: Data processing to identify help-seeking posts on Reddit. We relied on recent advances in LLMs to automatically sift through 5.7M Reddit posts to identify 113K posts likely related to help-seeking for IBSA. We automatically labelled each post with one of seven types of IBSA. Coders randomly pulled a sample of these posts to manually validate the LLM-generated metadata and reach a minimum threshold of 40 posts for each of the seven IBSA types. As a post could mention multiple types of IBSA, our Post dataset includes a total of 261 posts.

3 Methodology

We conducted a mixed-methods study of IBSA help-seeking and help-giving experiences on Reddit. We discuss the process we followed to identify IBSA posts, our qualitative coding practices, and the ethics and limitations of our approach.

3.1 Data processing

We built a data processing pipeline that automatically identified help-seeking for several types of IBSA discussed on Reddit. We outline the full pipeline in Figure 1 and discuss each component below.

Dataset

The first step in our data processing pipeline was to identify Reddit posts and subreddits relevant to our research (Figure 1, ❶). Our Reddit dataset originates from a continuous Internet-wide crawl of public URLs in a way that respects robots.txt and other rules for crawlers. In order to reduce the search space for IBSA posts, we focused on 43 popular subreddits related to scams, advice, relationships, dating, and sex—including r/advice, r/askwomen, r/askmen, and r/sextortion—that we identified from an initial manual exploration (see Appendix A.1 for the full list). All of these subreddits had at least 1,000 members. In total, this dataset includes 5.7M English-language posts from 2.9M unique users (i.e., “original posters” on Reddit, posters in this work) published between April 1, 2020 and September 12, 2023.

Title: [TITLE]
Article: [ARTICLE]
Question: Does the title or article discuss any form of image-based sexual abuse, such as sending or receiving unwanted nude images, unwanted flashing, being coerced into sharing nude images, fear of having nsfw or intimate images leaked or hacked, sextortion, nonconsensual image sharing, or revenge porn? Provide both an answer and a summary explaining your reasoning.
Answer:
Figure 2: Initial prompt designed to identify posts that contained any discussion of IBSA.
Type Key Posts Threads
Financial sextortion FS 50 22
Nonfinancial sextortion NFS 46 26
Nonconsensual synthetic explicit imagery NCSEI 51 32
Pressurized sexting PS 45 34
Cyberflashing CF 41 33
Nonconsensual explicit imagery NCEI 45 35
Recorded sexual assault RSA 40 20
Total (Any type of IBSA) 261 160
Table 1: Our qualitative dataset consists of seven distinct types within the continuum of IBSA, as defined in Section 2.1. Prior work largely collapses FS and NFS into the single category sextortion. For our purposes, the differences were meaningful, so we split them into two distinct categories. For each type, we include the total number of stratified posts and comment threads that we analyzed. A single post could describe experiences with more than one IBSA type.
22footnotetext: Prior work largely collapses FS and NFS into the single category sextortion. For our purposes, the differences were meaningful, so we split them into two distinct categories.

Filtering

We analyzed each Reddit post using a suite of LLMs and prompts to identify those likely to be about help-seeking for IBSA (Figure 1, ❷). While we initially explored a keyword-based search, the terminology and context proved too nuanced to capture without a prohibitive number of false positives to manually review. Instead, we queried Google Cloud’s lighter-weight Vertex AI text-bison LLM [35] with a prompt to identify posts generally discussing IBSA (Figure 2), then refined the search by repeating the prompt with a more accurate (but expensive) text-unicorn LLM [35].

We validated this approach using a manually curated test set of 80 posts that discussed IBSA (generated from our initial manual exploration and when exploring the feasibility of keyword matching), and 197 non-IBSA posts. Our chained prompt correctly identified 79 of the 80 IBSA posts (98.8% recall) and 194 of the 197 non-IBSA posts (98.4% specificity). While the final dataset of posts we use is manually validated to remove all errors, this high degree of recall and specificity gave us confidence that we did not incorrectly omit some IBSA concepts from our study, while at the same time reducing the toil of manual validation. When applied at scale, our filtering identified 113K Reddit posts likely discussing IBSA—2% of posts on the subreddits we analyzed.

Categorization

To ensure that our study captured distinct experiences in the continuum of IBSA, we queried text-unicorn to categorize each post by the type(s) of IBSA involved in order to support stratified sampling (Figure 1, ❸). We derived these types—listed in Table 1—based on our preliminary analysis of prior literature (Sections 2.13.2). We found that the LLM struggled with some concepts more than others. For example, sextortion was easy for the LLM to categorize, while recorded sexual assault was more error prone (and also more rare). To counteract this and account for posts that discuss multiple types of IBSA, we also created (more computationally expensive) per-type prompts with multi-stage reasoning to distinguish overlapping concepts (e.g., financial and nonfinancial sextortion). See Appendix A.2 for the general categorization and specialized prompts. We rely on manual review to validate these labels, discussed next. Given the potential for error with automated categorization (absent manual review), we avoid providing a relative breakdown of the types of IBSA at-scale, and focus only on our stratified sample.

Validation

During validation, we selected from the outputs of each categorization prompt and manually vetted the labels (Figure 1, ❹). Here, we corrected for any missed or erroneous labels and discarded any posts that were not related to help-seeking for IBSA. We also removed posts where the victim-survivor appeared to be under the age of 18.333Some posts may originate from minors, but we cannot confirm. The advice we analyzed appeared targeted towards adults. The nuances of help-seeking and giving are fundamentally different for child sexual abuse (e.g., lack of agency, mandatory reporting) and thus beyond the scope of this work. We repeated this until we achieved a minimum of 40 posts for each of the seven types of IBSA,444We sampled independently per IBSA type. Some posts discussed multiple IBSA types, which is why there are more than 40 posts for some types. resulting in a final dataset of 261 posts. We sampled 40 posts per IBSA type to achieve meaning sufficiency [14], balanced with reasonable researcher effort. Some posts involved multiple types of IBSA, thus requiring we label fewer than 280 posts to meet our minimum sample size. Each post in our sample on average contained 285 words (min: 24, max: 2,363).

For each post, we re-crawled the live site for the current state of discussion (i.e., all threads) on December 11, 2023. This yielded 2,159 threads consisting of 4,225 individual comments from 2,298 unique accounts. To allow for a robust qualitative analysis, we filtered this set down to the top three upvoted threads per post, and then randomly sampled 160 of these popular threads. We use posts to understand the types of IBSA for which people were seeking help and what help they were seeking, and threads to understand what help they received. We summarize our qualitative dataset in Table 1.

3.2 Qualitative analysis

We relied on a rigorous, qualitative analysis to describe and identify themes in our 261 posts and 160 threads. We used codebook thematic analysis (TA) that combined inductive and deductive approaches, which aligned to our mixed-methods approach  [28]. We employed a five-stage codebook TA [82]: (1) sourcing initial codes; (2) developing initial codes; (3) codebook design; (4) codebook application; and (5) interpretation. For this study, use of a codebook enabled a refined and focused analysis of qualitative data [22].

Sourcing initial codes

As we developed our research questions, we conducted an initial analysis of IBSA literature and preliminary scan of IBSA help-seeking posts on Reddit – to summarize and identify potential codes [22] relevant to help-seeking needs, help-giving behaviors, and other characteristics of the data that applied to our research questions. Existing literature on IBSA types and risk factors informed our initial deductive codes; codes describing IBSA help-seeking needs and help-giving behaviors were developed inductively, as these are more emergent areas in the literature.

Developing initial codes

Next, one researcher familiarized themselves with the raw data, cumulatively reading thousands of Reddit posts about IBSA during the development of our data processing pipeline (Figure 1). This researcher then applied the initial codes to a random set of 100 posts stratified across IBSA types and then generated new codes from the raw data to identify more useful attributes of the data.

Codebook design

Next we developed the codebook, finalizing labels, definitions, and exclusions. All members of the research team reviewed the codebook; we took note of initial disagreements to iteratively update our codebook to account for these nuances. We segmented our codebook into three sections. The first section focused on the nature of the IBSA: the type of IBSA, the platforms involved, details about the perpetrator and victim-survivor, the origin of the IBSA imagery, and method of distribution. The second section focused on help-seeking: when help-seeking occurred, strategies already attempted, and what help was sought. The third section focused on help-giving: the type of support or advice offered and the interactivity of help-giving. See Appendix A.3 for details on individual codes and definitions.

Codebook application and reliability

Four coders applied the codebook to our posts dataset and three applied the codebook to our threads dataset, with two independently coding each post or thread. For reliability, we used consensus coding [18] for consistent judgment [13]. All coders iteratively discussed disagreements via meetings or online chat. Between discussions, one coder reviewed remaining disagreements, resolved obvious or already-discussed issues, and noted where discussion was still needed. We chose to ensure coding reliability through consensus coding and discussion because our codes were not mutually exclusive and the data were nuanced.

Interpretation

Lastly, we iteratively collated various codes, reviewed the data and memos, and discussed themes. Alongside our thematic analysis, we offer descriptive statistics. We report counts in the results with the notation X of Y, where Y is the total number of posts, threads, or people about which that code is specified, that is, excluding unspecified. In sections where Y is constant, only X is reported for brevity.

3.3 Ethics

Similar to prior work [8, 93, 99], we rely on data shared publicly by users on social media. We excluded all posts where it was clear that the poster/victim-survivor was under the age of 18. Our work does not directly recruit participants, but our study plan was reviewed by experts at our institution in domains including ethics, human subjects research, policy, legal, security, privacy, and anti-abuse. While the institution of the authors who conducted the data analysis does not require IRB approval, we adhere to similarly strict standards.

To mitigate potential harms that may come from victim-survivors’ data being exposed to unexpected audiences, we rephrased all quotes to preserve meaning but obscure the original source. Strategies for disguising the source of content are increasingly common in research fields investigating social media data [26, 78], as well as recommended by digital-safety researchers [9], particularly when obtaining informed consent is not feasible. Scholars emphasize that disguise is an ethical practice for protecting participants’ privacy [57]; additionally, contacting the original posters of the content we studied could unnecessarily re-traumatize victim-survivors. After rephrasing quotes, we searched each rephrasing to ensure the original source was not identifiable in the returned results. To balance protecting posters’ privacy with data integrity, another researcher compared the rephrasing to the original quote to confirm the semantic meaning of the quote was not changed. This rephrasing was post-hoc and did not affect our analysis.

As this project involved sustained engagement with traumatic content, researchers involved in analysis took different measures to support their well-being, including: weekly individual and group check-ins, reading about secondary trauma [54], meeting with trauma-informed experts, having access to therapists, taking breaks (e.g., playing Tetris, which is being explored as a tool for reducing traumatic flashbacks [47, 86]), and restricting reading of traumatic posts to shared or designated workspaces. Our use of LLMs also reduced the amount of manual review required.

3.4 Limitations

As with all research, ours has limitations. Our crawl of Reddit may be incomplete, and our LLM-based search for IBSA help-seeking may miss some concepts. We attempted to minimize biases by validating our prompts on an independent sample of posts and by focusing on qualitative results rather than comprehensive quantitative findings. Additionally, our US-based research team—whose domain expertise includes computer security and privacy, human-computer interaction, criminology, gender-based violence, and social computing—apply our own interpretations to the stories shared on Reddit.

Our visibility into IBSA help-seeking and help-giving is also limited to what people mention when posting to Reddit in English. Reddit users are predominantly in the US, but also in the UK, India, and Canada [101]. Additionally, comments studied in Section 6 do not include those removed by Reddit mods, whose invisible labor contributes valuable content moderation [53]. Percentages are reported in the results for reader ease but should not be interpreted as generalizable to all cases of IBSA, given the limitations of our data collection.

How we report gender

Because IBSA can be a form of gender-based violence, we coded gendered terminology about the victim-survivor(s) and perpetrator(s) when specified.555Gender was unspecified for 26% of perpetrators and 42% of victim-survivors. One challenge inherent in analyzing social media data is that posts do not reliably or consistently provide gender disclosures. We inferred gender in five ways: Reddit conventions to self-identify (e.g., “21F” meaning a 21-year-old female), gendered nouns (e.g., woman, boyfriend, girl), gendered pronouns (e.g., she, he), body parts (e.g., dick pic, breasts), or other (e.g., posting to a gendered subreddit, asking for opinions of “other women”). We most often inferred victim-survivor and perpetrator gender through gendered nouns (24%; 60%) or self-identifications (56%; 23%), but also inferred based on solely pronouns (8%; 17%) and body parts (26%; 1%). To avoid piecemeal reporting, we collapsed sex and gender, such that “man” includes all masculine terms, including gendered nouns and pronouns, and “woman” likewise includes all feminine terms. These codes should be interpreted as researcher inferences based on gendered terms in Reddit’s broadly cisheteronormative context, which may or may not align with the gender identities of the individuals involved.

4 Characterizing IBSA Experiences

We begin by characterizing the IBSA experiences about which posters sought help. While prior work has identified the types of IBSA covered here, we contribute a description of all seven types from the same dataset, highlighting common, co-occurring, and distinguishing patterns across types. This approach provides an expanded understanding of a range of IBSA experiences and sets the stage for how to broadly support help-seeking needs.

In most cases, the poster identified as the victim-survivor (in 237 of 261 posts; 91%); in others (30; 11%), the poster was seeking help on behalf of the victim-survivor, e.g., a friend or intimate partner.666Counts do not sum to 261 because some posters were both a victim-survivor and seeking help on behalf of other victim-survivors of the same perpetrator(s). We synthesize these experiences, examining how abuse unfolded, perpetrators’ apparent motivations, and gendered patterns between perpetrators and victim-survivors.

4.1 Financial sextortion (FS)

Financial sextortion occurred when a perpetrator threatened to expose explicit images of a victim-survivor unless the perpetrator was paid money.

Clear methods to obtain images

To initiate contact for financial sextortion, a perpetrator typically connected with a victim-survivor via a dating or social media app before moving to direct messaging or a communication app, engaging in a conversation with the victim-survivor within minutes to days. The perpetrator then coercively obtained, made claims about, or created explicit images following one or a combination of the following methods: they sent (inauthentic) explicit images to encourage the victim-survivor to reciprocate; they claimed to have an explicit image of the victim-survivor (with or without evidence); and/or they created an explicit image (e.g., by attaching the victim-survivor’s face—such as taken from a profile picture—to someone else’s body; such synthetic images are further discussed in Section 4.3).

Once the perpetrator had established or asserted that they had an explicit image, they issued a threat: either the victim-survivor had to pay or the explicit image would be distributed (e.g., “Send me money or I’ll share your nudes”). Payment demands varied, but were typically the local equivalent of $100–1500 USD (specified in 28 of 50 posts; 56%).

Perpetrator

FS

NFS

NCSEI

PS

CF

NCEI

RSA

Stranger 48 18 31 12 26 6 8
Intimate partner 0 10 8 21 3 15 4
Friend 1 0 5 5 4 7 8
Ex-intimate partner 0 10 1 2 1 8 8
Colleague 0 0 1 2 4 1 4
Family member 0 0 1 1 1 2 0
Other 1 0 0 0 2 0 0
Unspecified 0 8 5 3 0 6 10
Table 2: Relationship of perpetrator(s) to victim-survivor, as described in posts.
Perpetrator

FS

NFS

NCSEI

PS

CF

NCEI

RSA

Woman 21 8 15 2 6 1 3
Man 3 20 16 39 27 31 31
Ambiguous 4 2 3 0 0 0 0
Unspecified 22 15 16 1 8 13 6
Table 3: Gender of the perpetrator(s), as described in posts. Ambiguous refers to posts where the poster initially described the perpetrator with feminine gendered terms but shifted to masculine gendered terms when a false identity was revealed.

Perpetrators were usually strangers, often women; victim-survivors men

Of the 50 posts, 48 identified the perpetrator as a stranger (Table 2). Of the 28 posts that specified the perpetrator’s gender, 21 were believed777Some posters, in line with prior work [31], acknowledged that perpetrators may be using this gender identity as a false persona. to be women (Table 3). Of the 27 posts that specified the victim-survivor’s gender, 26 were men (Table 4).

Fear & self-blame

Perpetrators tried to exploit the victim-survivor’s fear of embarrassment. Posters often emphasized the threatened scale of distribution: “I’ll send these masturbation videos to everyone you know, including your friends, colleagues, and relatives.” Victim-survivors often appeared to be in a state of panic when they posted, and they sometimes partially blamed themselves, claiming that they “messed up” or “feel so stupid.”

Victim-survivor

FS

NFS

NCSEI

PS

CF

NCEI

RSA

Woman 1 13 11 25 18 27 26
Man 26 9 22 3 2 3 9
Unspecified 23 24 19 18 25 18 8
Table 4: Gender of the victim-survivor(s).

What they’ve done; what else could they do

Posters sought help to determine if the threat was credible, prepare for what to expect next, and ask for strategies to cope with their fear. When seeking help, victim-survivors often mentioned technical protections they had already taken, such as blocking the perpetrator, reporting the perpetrator to the platform, or bolstering their social media privacy and security settings. They then asked the community what else they could do.

4.2 Nonfinancial sextortion (NFS)

At a high level, nonfinancial sextortion was similar to financial sextortion except the threats were not financially motivated.

Personalized demands for more images or control

Nonfinancial sextortion tended to be customized to the particular victim-survivor and their situation. Perpetrators—who were often intimate partners—used the threat of exposing an explicit image to demand new images and/or to exert emotional, physical, or sexual control over the victim-survivor: “he was obviously getting mad and eventually exploded and told me he’d send out my nude pics if I didn’t have sex with him.”

Perpetrators often were intimate partners, usually men; victim-survivors women

Nonfinancial sextortion was usually perpetrated by a current (10 of 38 specified; 26%) or former intimate partner (10; 26%) (Table 2).888We coded posts about sextortion that did not mention a demand for payment as NFS. Such posts where the perpetrator was a stranger resembled (and may have been) FS, so we omit them from discussion here. Victim-survivors often noted that the image the perpetrator threatened to expose was obtained with consent in a different context (8 of 43 specified), or nonconsensual secret recording (4). When specified, perpetrators tended to be men (20 of 30; 67%), victim-survivors women (13 of 22; 59%) (Tables 34).

Fear & helplessness

Like financial sextortion, perpetrators of nonfinancial sextortion attempted to control victim-survivors with fear of embarrassment. However, when compared to financial sextortion, posts about nonfinancial sextortion tended to include a more pronounced tone of helplessness: “I feel suffocated with him and I don’t see any type of future with him, but he has the power to ruin my life.”

Relationship & emotional advice

Victim-survivors expressed uncertainty about how to navigate their relationship with the perpetrator: “should I cave to his demands so he doesn’t dump me?” They also asked for help coping with the emotional trauma associated with this type of IBSA.

4.3 Nonconsensual synthetic explicit imagery (NCSEI)

Nonconsensual synthetic explicit imagery involved digitally manipulated explicit images. A majority of cases co-occurred with financial sextortion (27 of 51 posts, 53%; discussed in Section 4.1). Among other cases, a main theme appeared to be about the perpetrator exploring fantasies, especially when the victim-survivor and perpetrator were socially connected.

Simple manipulations

Posters explained that basic editing techniques were used to generate explicit images, using terms like “photoshopped” or “filters with my face.” In cases of financial sextortion, perpetrators often sent victim-survivors a “collage” of explicit images and other media—a list of the victim-survivor’s social media connections, screenshots of messages between the victim-survivor and perpetrator, or calls-to-action from the perpetrator to incriminate the victim-survivor (e.g., calling them a “pedophile”)—to scare the victim-survivor into paying.

In other cases, posters found or learned about explicit images on the perpetrator’s—usually the poster’s intimate partner’s—device, presumably for personal use such as the perpetrator’s sexual gratification or exploration. In these images, victim-survivors’ or other relations’ faces were superimposed into explicit images: “I recently found out [my intimate partner] had tons of pictures with my friends and family where their faces had been photoshopped onto sexually explicit photos to simulate porn scenes.”

The emergence of sophisticated manipulations

The (suspected) use of generative AI to create nonconsensual synthetic explicit imagery was mentioned in 3 of 51 posts (6%). In those cases, victim-survivors found the imagery’s photorealism terrifying: “Someone used a nudifying app to make naked photos of me from my social media pictures. I’m terrified.”

Nonconsent, fear, & disgust

The quality of the synthetic imagery was not a focus of posters; instead, they discussed the harm that even simple manipulations could create. In financial sextortion cases, victim-survivors shared that synthetic imagery might deceive family or peers: “The nudes are fake, but it’s not like my parents can tell that.” In other cases, posters expressed disgust because the synthetic imagery was nonconsensually created by people the poster knew, and the images portrayed people in sexually explicit ways that the poster found inappropriate or offensive. For example, one poster found synthetic images of a friends’ family member, which left the poster “in tears… I’m utterly disgusted and distraught by the situation.” Another poster discovered that their partner had been creating images of their friends and family for years, and despite knowing they were fake, viewed the creation of the images as a grave breach of trust: “The files… were created a few years ago and I cannot believe how blind I was. I trusted him and now I am broken.”

Navigating relationships & feelings

Posters sought help for how to deal with perpetrators (including asking for relationship advice) and to make sense of how they felt about the discovery of nonconsensual synthetic explicit imagery.

4.4 Pressurized sexting (PS)

Pressurized sexting occurred when a perpetrator coerced or demanded that a victim-survivor send explicit imagery. In a majority of these posts (29 of 45; 64%), victim-survivors claimed they had not sent the images; rather, they asked for help mitigating coercion.

Navigating relationship expectations

Pressurized sexting occurred primarily in relationships, that is, by current intimate partners of the victim-survivor (21 of 42 specified; 50%), or between strangers who were prospective partners via online dating or social media apps (12; 29%).

New vs. established relationships

When pressurized sexting occurred in the early stages of a (potential) relationship, posters expressed feelings of being manipulated or “used for nudes”: “I can’t believe someone asks for nude pictures, and their only motivation in talking to me is trying to get nudes.”

When in established relationships, victim-survivors often attempted to resolve conflicts between what they were comfortable with and their intimate partners’ expectations. For example, some asked if pressurized sexting warranted ending a relationship: “My boyfriend asks for nudes and if I refuse he ignores me until I give in. Can someone tell me if we can fix this, or if I should just get therapy to help me break up with him?" This was especially true if the pressurized sexting was perceived as the sole problem in a relationship. “This guy is great except he asks me to send nudes… I don’t want to break up but I hate when he does this. What should I do?”

Perpetrators were usually men, victim-survivors women

Most perpetrators were presumed to be men (40 of 43 specified; 93%); victim-survivors tended to be women (25 of 27 specified; 93%) (Tables 34).

4.5 Cyberflashing (CF)

Cyberflashing occurred when a victim-survivor received unwanted sexually explicit imagery.

Online dating

Cyberflashing commonly occurred in the process of seeking romantic relationships online. Victim-survivors frequently discussed whether they were out-of-step with shifting norms around sending or receiving explicit images: “Can someone please explain why people send unsolicited nudes?” In some cases, cyberflashing occurred as part of pressurized sexting (Section 4.4), where a perpetrator would demand reciprocity after sending unwanted explicit images: “I told him I didn’t want any, but he sent dick pics anyways…he asked for a picture of my breasts but I said no cuz I never send naked pictures of myself.” The tone of these posts was often that of frustration, disgust, and disillusion.

Platonic relationships

Less often, cyberflashing occurred in platonic relationships (e.g., between coworkers or friends). In those cases, the poster was typically concerned about the ongoing relationship and if/how they should address the abuse.

Perpetrators were usually men, victim-survivors women

Most perpetrators were men (27 of 33 specified; 82%), while victim-survivors were women (18 of 20 specified; 90%).

4.6 Nonconsensual explicit imagery (NCEI)

Nonconsensual explicit imagery involved perpetrators producing or distributing explicit images without the victim-survivor’s consent. It often involved abuse by an intimate partner, ranging from a one-time incident to ongoing abuse.

Perpetrators were usually men; often partners, friends, or peers. Victim-survivors were usually women

Victim-survivors were usually women (27 of 30 specified; 90%), while perpetrators were often men (31 of 32 specified; 97%). Most perpetrators were known to the victim-survivor (33 of 39 specified; 85%) rather than strangers (6; 15%).

Images were often recorded without consent

The trusted status many perpetrators had with victim-survivors enabled secret recordings (20 of 38 specified; 53%). Victim-survivors shared how perpetrators recorded them: “took nude photos of me while sleeping” and “recorded me [naked] in my room.” Less frequently, images were recorded through coercion (6; 16%) or shared with consent in a different context (6; 16%).

Navigating relationships; fear of possession & distribution

Nearly half of the posts focused on how to navigate the relationship (e.g., whether and how to confront or break up with the perpetrator). Victim-survivors were concerned about the perpetrator’s possession of the explicit imagery (18 of 41 specified; 44%) or its distribution, e.g., via messaging (14; 34%), social media (9; 22%), or public websites (3; 7%).

Victim-survivors concerned mainly with possession primarily sought help on how to negotiate with the perpetrator, delete any explicit imagery, know if the imagery had been shared, or know how many images existed: “How can I find and delete as many as possible of the naked photos he has of me?” Conversely, victim-survivors contending with distribution focused their help-seeking on what recourse, if any, existed: I dunno what to do. He sent my mom my nudes because I was breaking up with him… Any advice would be appreciated.

4.7 Recorded sexual assault (RSA)

Recorded sexual assault involved the creation or distribution of images of sexual assault. It frequently resulted in victim-survivors experiencing ongoing sexual trauma in addition to trauma from images being created or distributed.

Perpetrators were often known men; victim-survivors tended to be women

Perpetrators were often men (31 of 34 specified; 91%) that victim-survivors identified as former intimate partners (8 of 32 specified; 25%), friends (8; 25%), colleagues (4; 13%), or current intimate partners (4; 13%), but also strangers (8; 25%). Victim-survivors were often women (26 of 35 specified; 74%), but sometimes men (9; 26%).

Co-occurred with other abuse

Victim-survivors shared that their assault was often secretly recorded (23 of 40; 58%), such as when they were unconscious, sleeping, drugged, or under the influence of a substance. Recorded sexual assault often co-occurred with other abuse (13 of 39; 33%)—sometimes prolonged intimate partner abuse—leaving victim-survivors in a state of severe trauma. Most victim-survivors shared that perpetrators retained recordings of the assault (26 of 40; 65%); some perpetrators distributed the recordings via messaging (7; 18%), social media (4; 10%), or websites (4; 10%).

Trauma, processing, & coping

All of these posts were deeply troubling and resulted in trauma to the victim-survivor and typically others who were exposed to the recording. Most victim-survivors asked how to cope with or understand what they had experienced, as a precursor to processing their emotions or taking a step towards remediation: “Was this sexual assault?,” “Did I just make poor decisions or was this wrong?,” “I don’t know how to feel,” and “I’m wondering if any part of this sexual assault was normal.”

4.8 Co-occurring IBSA types

54 posts described more than one IBSA type. Most prominently, of 51 posts on nonconsensual synthetic explicit imagery, 27 co-occurred with financial sextortion and 7 with nonfinancial sextortion, indicating that perpetrators commonly leveraged synthetic images to sextort. Cyberflashing and pressurized sexting co-occurred in 9 posts, indicating that perpetrators sometimes both sent and pressured the victim-survivor for explicit images. Nonconsensual explicit imagery co-occurred with multiple other IBSA types in 9 posts (out of 45 total); these posts mostly described multiple abusive events. One post described three types of IBSA (NCEI, cyberflashing, pressurized sexting), and one described four (NCEI, recorded sexual assault, pressurized sexting, nonfinancial sextortion).

5 Help-Seeking for IBSA

Across IBSA types, posts mentioned prior remediation efforts and included some common patterns of help-seeking questions, such as informational questions (Section 5.3), as well as how to cope with emotions (Section 5.4) or navigate relationships (Section 5.5)—these and other less common help-seeking types are summarized in Table 5.

Help Sought Description FS NFS NCSEI PS CF NCEI RSA
Informational Seeking general advice about options or potential actions. 37 25 29 9 22 20 16
Therapeutic Seeking advice about emotions or other distressing elements. 17 11 16 19 10 7 25
Relational Seeking advice about interpersonal dynamics or managing relationships with others. 3 17 13 25 14 18 5
Legal Seeking legal avenues of recourse or asking legal questions. 5 4 8 3 7 9 7
Technical Seeking advice about mitigating the abuse through technical means, potentially to prevent primary or secondary sharing of the image, or tracking the past sharing of the image. 3 1 2 1 1 4 1
Other Seeking a type of help not listed above. 4 3 2 1 0 0 1
Table 5: Types of help sought across the seven types of IBSA. Some posts discussed multiple forms of IBSA and were counted in multiple cells per row; some posts also included multiple types of help-seeking.

5.1 When posters sought help

Using a theoretical framework [48], we can describe patterns in when people sought help for IBSA. This framework defines four states of users experiencing safety events: prevention, monitoring, crisis, and recovery (see details in Appendix A.3). People may move through the states nonlinearly and experience multiple events at once. When coping with multiple safety events (57 of 257 posts; 22%)999Number of posts here is 257 because four did not specify the user state., posters’ panic and trauma were compounded.

Help was most often sought while the poster was in crisis, that is, when they were actively dealing with abuse (142; 55%). These posters expressed panic and needed immediate reassurance, as well as clear, simple guidance on the most critical steps to stop or limit further damage. Many posters also sought help while recovering from the abuse and feeling traumatized by it (112; 44%). Fewer posters described being in monitoring, for example, watching for new abuse or for images to appear in new places (42; 16%). Rarely, posters sought help preventing victimization (5; 2%).

5.2 Prior attempts at remediation

Posters mentioned prior attempts at remediation (in 176 of 261 posts; 67%), which were only partially successful or failed, prompting them to seek help on Reddit (Table 7 in Appendix B).

(Dis)engaging perpetrators

Of posts that noted prior attempts at remediation, nearly half mentioned engaging with perpetrators through negotiation or mediation (76 of 176 posts; 43%). This strategy often occurred when IBSA was enacted by an intimate partner, including NCEI and pressurized sexting. Another nearly half disclosed that the victim-survivor disengaged from the perpetrator, cutting off communication (82; 47%); some attempted engaging and then disengaging. Disengaging was common when the perpetrator was a catfisher or scammer, including financial sextortion and nonconsensual synthetic explicit imagery.

Technical strategies

Technical strategies, which included securing accounts or devices, platform reports, and deleting content, were sometimes employed (49 of 176 posts; 28%). They were infrequently reported across IBSA types, except for financial sextortion, for which victim-survivors more consistently reported deleting accounts or reporting. Often, sexually explicit images resided on a perpetrator’s personal device or chat history, making it technically challenging for victim-survivors to access and for platforms to respond. As many help-seekers posed open-ended questions (e.g., “what should I do?” as described in Section 5.3), some may not have been aware of what technical strategies were possible.

Social & institutional support

Victim-survivors rarely mentioned seeking or obtaining social support—a common practice used to cope with other forms of abuse [96, 84]—or broader institutional support. The small number of posts that did, mentioned filing police reports (20 of 176; 11%), reaching out to family or peers (19; 11%), or reaching out to the victim-survivors’ workplace (6; 3%). A common reason for not seeking social or institutional support was embarrassment: “I only told a few friends about what happened, but not with any specifics because it’s so humiliating. I really have no one to discuss this with.”

5.3 Information: To understand & stop abuse

Nearly half of posters sought informational help (in 127 of 261 posts; 49%), with questions focused on making sense of the IBSA and determining how to make it stop.

What should I do? Many posts included open-ended requests (“someone help me, i have no idea what to do”), such as from victim-survivors who appeared panicked as they tried to stop or recover from IBSA.

What’s happening to me? Another type of request—especially from those experiencing recorded sexual assault—asked whether their situation constituted assault, abuse, or coercion. These requests sometimes included misunderstandings, such as how intoxication affects consent: “Was I sexually assaulted? I was okay going to his place even though I was totally wasted. When I was there, he made me do things and I consent after he convinces me. Then he takes out his phone to take a video, which I never consented to. Did I make the wrong choice or was it just wrong?”

What can I expect? Posters also asked what to expect in the near and long term. For example, for financial sextortion, victim-survivors asked if perpetrators would follow through on threats to distribute imagery, if they were “safe” after waiting a certain period of time, or how they would know if the abuse was “over.” For nonfinancial sextortion and NCEI especially, victim-survivors asked about what would happen if the explicit imagery were shared. They sought help anticipating and mitigating future harm.

Why did they do this? Questions about perpetrator motivations were common (e.g., why they created synthetic explicit imagery, or pressured people into sexting). Multiple cyberflashing victim-survivors—especially women—asked why it was so common in online dating: “Why is it that within a few days of talking, men always send pen*s pics?”

5.4 Therapeutic: Coping with emotions

About a third of posters sought emotional or therapeutic help (in 86 of 261 posts; 33%).

Trauma

Victim-survivors asked for help coping with intense feelings, particularly in cases of recorded sexual assault and NCEI. They were overwhelmed by emotions like shame (“I’m melting from the shame and guilt”) and disgust (“I’m disgusted and feel so violated”) upon discovering the details of the IBSA, such as who images had been shared with, or who possessed (and thus had control over) the images.

Empathy, self-doubt, & isolation

Posters sought empathy (“Can anyone provide reassurance or share their experience, anything helps”) and help with processing their feelings (“I needed to vent to someone”). Some felt conflicted and experienced self-doubt in understanding their own experiences: “I don’t know how to feel, I don’t trust anything.” For many victim-survivors, experiencing IBSA was an isolating experience. They described being ostracized from social connections: “I only wrote this post because I wanted to talk to someone. I have no friends right now” or not receiving support from institutions like their employer’s human resources department, their school, or law enforcement.

Fear of confronting the perpetrator

Posters recognized that confronting the perpetrator could result in even more harm and asked for help in managing fears while planning next steps: “I’m scared he’ll be mad and share my pics if I confront him.”

5.5 Relational: Navigating relationships

About a third of posters sought relational help (in 84 of 261 posts; 32%) for navigating situations where the victim-survivor was socially connected to the perpetrator.

Romantic relationships

Some victim-survivors experiencing NCEI as part of romantic relationships struggled with whether or not they should stay with their perpetrator-partner. In these posts, “love” was cited as a reason to stay, and victim-survivors questioned their own behavior: “We really love each other. However I also feel bad because he’s always spending time with me. Is he stressed out because we spend so much time together? Would it have been better if I broke up with him?” Posters also cited the central role their intimate partner played in their lives (“he’s my everything” and “everything i’ve done was with his support”).

Victim-survivors experiencing pressurized sexting and cyberflashing—typically when the perpetrator was an intimate partner—also asked about staying in the relationship (e.g., was the perpetrator’s behavior a “red flag” or “deal breaker”?). They also commonly asked for help with how to effectively confront the perpetrator, such as to ask them to stop, resist pressure, or negotiate for images to be deleted.

Nonromantic relationships

When the perpetrator was socially connected to the victim-survivor, but not an intimate partner, such as a work colleague or friend, victim-survivors asked how to manage the relationship moving forward: “My [22M] BFF [22F] flashed me and now won’t talk to me. What should I do?”

6 Help-Giving for IBSA

We now turn to comments on posts about IBSA, that is help-giving. Help-giving appeared to be community-oriented, as 55 help-givers (out of 2,298 total) supported multiple posters in our dataset, and all but seven of these commented within the same subreddit. Help-givers and help-seekers generally did not overlap (or they used throwaway accounts); only one account in our dataset created a post and commented on someone else’s post.

Help Given Description FS NFS NCSEI PS CF NCEI RSA
Informational General details that explain a type of IBSA, a perpetrator’s motives, or directing to a resource for more information. 15 11 17 12 17 14 7
Technical Advice for security and privacy, blocking, reporting, deletion, and whether to engage with a perpetrator’s account. 9 11 12 12 11 11 6
Relational Advice for navigating relationships, whether to inform family and friends, or whether to reason with perpetrators. 4 7 10 16 11 14 5
Therapeutic Advice for taking time for yourself, not to be afraid, that it is not your fault, and that you are not alone. 6 8 11 14 9 13 9
Institutional support Advice around law enforcement, legal options, therapists, support centers, or human resources. 2 2 4 3 9 9 7
Counterproductive Advice that cast blame on the victim-survivor, or otherwise ignored the needs of a victim-survivor. 5 2 4 4 1 2 5
Other Help-giving in other ways not described above. 0 3 0 1 0 4 2
Table 6: Types of help given across the seven types of IBSA. Some threads responded to posts discussing multiple forms of IBSA and were counted in multiple cells per row; some threads also included multiple types of help-giving.

6.1 Types of support and advice

Across our 261 posts, help was almost always given: only 15 posts received no comments, and the median post received five comments authored by four distinct users. However, few help-givers asked for more details to inform or tailor advice (14 of 160 threads). We discuss the most salient forms of help-giving below (Table 6 provides a summary; some posts and associated threads contained multiple IBSA types, so the row totals are greater than the denominators reported below).

Informational

The primary form of help-giving was sharing information (72 of 160 threads; 45%). For financial sextortion, informational advice highlighted the scripted nature of the attack: “This scam is super common. You can’t do anything except block them (and stop sending d*ck pics to randos).” For cyberflashing and pressurized sexting, threads explained the changing norms around sexting and the choices available to victim-survivors (e.g., blocking, reporting). For NCEI and recorded sexual assault, threads instead focused on reinforcing that the experience was abuse: “Revenge porn is pretty much always considered illegal” and “This is definitely sexual assault.” Help-givers’ tone when sharing information, however, was not always comforting: “Even if you told me to imagine the most fucked up thing I could, I still wouldn’t think of that”. Furthermore, help-givers rarely pointed the poster to other communities or resources (5 of 160 threads; 3%). We discuss these limitations more in Section 7.1.

Technical

Technical advice was common across most types of IBSA (52 of 160; 32%). Some threads focused on not engaging with the perpetrator (21) or blocking and reporting a perpetrator’s account (26), e.g., in financial sextortion, pressurized sexting, or cyberflashing, where a perpetrator was a stranger or acquaintance. A less prevalent alternative was telling the victim-survivor to make their own account private to minimize contact (7). Such advice was mostly absent from IBSA involving an intimate partner, like nonfinancial sextortion, NCEI, and recorded sexual assault. Technical advice in these scenarios focused on how to delete photos if the victim-survivor had access to a perpetrator’s accounts or devices (5), how to check for backups (2), or how to find and record evidence of abuse (9): “Screenshot the convo in which your gf got the video before you delete it.” Advice to block or otherwise avoid perpetrators aligns with highly recommended advice by experts to stay safer online from harmful content [98].

Relational

Threads frequently discussed relationship advice (52 of 160; 32%), but not always in well-reasoned ways. Threads commonly directed victim-survivors to end their relationship (29) across all types of IBSA other than financial sextortion, no matter the circumstances shared by the victim-survivor, including their living or financial situation, their desire to make a relationship work (“I love him so much, and I know he loves me too”), or whether or not leaving was a safe option. For example, one victim-survivor clearly stated their desire to stay with their partner, who was not the perpetrator of the IBSA, but was still told to leave: “That’s fucking me up to the point I would dump her.” Furthermore, help-givers at times assumed worse behavior from the perpetrator than was specified in the post: “Any guy who pressures you for nudes will share them with his friends.” Some threads were more nuanced, however, laying out how the victim-survivor had agency in setting boundaries in cases of cyberflashing or pressurized sexting (20). Others advocated engaging with a perpetrator (10), particularly for NCEI and pressurized sexting, to negotiate deleting images or ceasing requests: “Send him a message asking him to delete what he filmed, that he didn’t ask for permission and broke your trust.” Finally, threads discussed creating a support network to prepare for the risk of leaked imagery or to intercede with the perpetrator (12).

Therapeutic

Therapeutic help-giving was also common (52 of 160; 32%), such as reassuring victim-survivors that a situation was not their fault (15) and telling them to not be alarmed (14) or look after themselves (12). Threads also reiterated that a perpetrator was harmful (8) or commiserated with similar experiences (8). In the case of financial sextortion, threads focused on reassuring the victim-survivor that not engaging was the right tactic and to not be afraid: “If you haven’t sent any money, they have no reason to go after you.” Meanwhile, threads responding to NCEI, recorded sexual assault, and nonconsensual synthetic explicit imagery emphasized general support of the victim-survivor as they navigated abuse: “I hope that you heal and find sweet and honest love again.”

Institutional support

While less frequent, help-giving also encouraged seeking institutional support (31 of 160; 19%). This advice focused on contacting law enforcement (15) or accessing legal advice (13), therapists (8), advocacy groups (3), human resources (3), or immediate medical support (1). Such advice was largely given for cases of NCEI (9), cyberflashing (9), or recorded sexual assault (7).

Counterproductive

Not all help-giving was supportive of victim-survivors (19 of 160; 11%). Some community members admonished the victim-survivor for their behavior, asking what they expected by sharing explicit images with others: “Honestly if you’re sending dick pics to online randoms, does it matter that they’re getting leaked?”

Others minimized or de-legitimized victim-survivors, asking “What’s the worst that can happen?” or claimed most recorded sexual assault videos found online are fake. While the majority of upvoted threads were helpful (144 of 160; 90%), these examples show how help seeking on social media can expose victim-survivors to additional shame or risk.

6.2 Victim-survivor reactions to help given

In general, the advice given on Reddit seemed to resonate with the poster. Of the 246 posts with at least one comment, at least 64 had one or more comments from the poster, that is, where the poster engaged in some way with help-givers.101010This number is a lower bound: our quantitative analysis was based on our delayed crawl of the live site and thus could not identify engagement by a poster who had later deleted their account, which was a majority of posters. The median engagement by posters was 50% of threads.

Posters expressed a range of reactions to help given, including providing or requesting more information (20 of 160; 13%), expressing appreciation for the help they received (16; 10%), and outlining a concrete plan of action based on the help they received (9; 6%). These reactions were spread roughly evenly across IBSA types. In many of these comments, the poster offered only a short thanks, even if there was no clear resolution. Some threads seemed to have helped them make sense of their experience: “Thanks for confirming what I thought.” One back-and-forth sextortion thread helped the victim-survivor better understand the nature of the scam and feel reassured as a result: “Thanks for the help and info, I learned something new.” In very few cases (4; 3%), posters expressed feeling hopeless even after receiving support: “It’s just so rough that there’s nothing we can do.”

7 Discussion

We now reflect upon both the challenges in this space (Section 7.1) and possible roles of technology in solutions (Section 7.2). While our results provide insights into help-seeking and help-giving behaviors on Reddit, we argue that it is too early to speak definitively on the full set of challenges or solutions. Thus, we encourage readers to view our discussion here as a results-informed exploration of the possible parameters of the challenge and solution spaces.

7.1 Existing challenges

Limited nuance or formalized advice

Victim-survivors were offered emotional support in the form of concern and empathy (Section 6.1), making it clear informal help-giving on Reddit provides a lifeline to those who might otherwise be unwilling or unable to disclose and seek help. This suggests findings from previous related work on online help-seeking for offline sexual abuse [1, 2, 36, 65, 72] are replicated for technology-facilitated sexual violence. Namely, the anonymity and visibility management often afforded by online spaces facilitates support seeking, both explicit and implicit. As in previous work [66, 97], we also observed the constraints associated with online support, such as help-givers who defaulted to certainty around the situation or the “right” outcome without asking for more details or centering the expressed needs or desires of the victim-survivor, thus overlooking important nuances. For example, the point at which a victim-survivor leaves an abusive partner poses the greatest risk of harm to the victim-survivor [92], so gender-based violence advocates typically scaffold the creation of a safety plan [16, 24]. However, help-givers commonly suggested leaving a relationship without mentioning safety plans or other risk mitigation strategies. Relative to other types of help given, referring to institutional support was the least common (Table 6). Formal organizations111111Examples for tech-facilitated abuse more broadly include https://www.ceta.tech.cornell.edu/ and https://techclinic.cs.wisc.edu/ may be better suited to providing long-term and holistic support, but it is clear that connecting victim-survivors to support outside Reddit remains a challenge.

On the other hand, our work contains hints of why victim-survivors may have sought help on Reddit rather than via institutions. Between the time at which our Reddit snapshot was collected and our crawl of the live site in December 2023, 99 posts and 146 poster accounts had been deleted. Further, 41 posts were from “throwaway” accounts, i.e., accounts not used again on Reddit, suggesting that posters valued Reddit’s perceived anonymity or ephemerality. We also observed in Section 5.1 that posters most often sought help when in active crisis, and may have viewed Reddit as a faster way to get help than finding and reaching out to an advocacy organization. Of course, the fact that posters sought help on Reddit does not preclude them seeking help from other sources as well.

Underscoring challenges in technology-facilitated abuse

Our analysis of IBSA help-seeking on Reddit exemplifies two key challenges from broader technology-facilitated abuse literature. First, prior work emphasizes the weaponization of new technologies to expand the scope of potential targets [69]. For example, in most financial sextortion and cyberflashing posts in our dataset, the perpetrator was someone previously unknown to the victim-survivor before the IBSA (Sections 4.1 and 4.5); perpetrators leveraged new platforms and social discovery algorithms to find new victim-survivors. Another poster asked for preventative strategies against generative AI specifically, because they were concerned: “with all the AI hype, many people around me are making nudes of others, especially of women.” More generally, the imagery was synthetic in all NCSEI cases and victim-survivors expressed distress over the ability of perpetrators to portray them in ways they had not consented to. Perpetrators will continue to leverage new technology, necessitating ongoing research to prevent its misuse. Second, our findings reiterate the occurrence of polyvictimization, as studied in technology-facilitated violence literature [43, 56, 64]. Many victim-survivors described experiencing other types of abuse that co-occurred with the IBSA. Echoing research on intimate partner abuse [33, 93], supporting victim-survivors requires holistic and trauma-informed [19] approaches that do not regard technology as a panacea.

Aligning interventions with sites of harm

While some technological interventions exist for different types of IBSA, our analysis raises challenges for their reach. For example, StopNCII [90] helps victim-survivors get images removed from social media platforms, but in only nine (of 45) NCEI cases did posters mention that images had been posted on social media. More often, posters were concerned about perpetrators nonconsensually retaining images (18 of 45) or distributing them via messaging apps (14 of 45) (Section 4.6). Generally, IBSA incidents in our dataset were most frequently carried out via dedicated communication apps or direct messages on social media (143 of 247, see Table 8 in Appendix B). Fewer cases involved images being posted on one-to-many platforms: social media (72), porn websites (6), or unspecified websites (3). Nevertheless, reporting IBSA to platforms remains one of the few technical mechanisms to remove explicit images stored or shared on a platform, or to potentially take action against a perpetrator’s account and prevent others from being targeted. Thus, while reporting can be an effective intervention in these cases, our findings suggest an additional need to create contextually specific technological interventions.

7.2 Role of technology in solutions

Expanding and integrating the support ecosystem

Our analysis shows IBSA help-seeking on Reddit occurs in hundreds of thousands of posts, some with tens to hundreds of comment threads. This creates a burden for communities to triage and potentially leads to inconsistent advice depending on who responds in the moment. Recent advances in LLM agents could amplify help-giving: triaging incoming queries, requesting additional information as needed, providing guidance where best practices exist (e.g., for financial sextortion), and connecting victim-survivors with relevant advocacy organizations who provide hands-on support. Results from our study could guide the design of such an agent or other interventions, accounting for help-seekers’ common emotional states, questions, and needs (Section 5). Such an agent may not replace the interpersonal therapeutic support that help-seekers received through other people on Reddit, but could be more consistently available while complementing other available help-giving pathways. Early research on a non-generative AI agent is underway,121212See Umibot, https://umi.rmit.edu.au but this remains a ripe area for exploration.

On-device detection and warnings

Given the complexity of remediating IBSA after an explicit image is shared, technology could play a preventative role. Given the privacy sensitivities—particularly around messaging where much of IBSA occurs (Table 8 in Appendix)—this technology would be best on-device to minimize explicit images being sent to platforms. To this end, Apple recently announced opt-in, on-device detection of sensitive (e.g., “nude”) content [4]. While these technologies are in an early stage, they might take the form of nudges against sending explicit images (e.g., pressurized sexting, financial sextortion); or blurring explicit images upon receipt (e.g., cyberflashing). The effectiveness of these nudges—and expanding the detection capabilities to dangerous interactions (e.g., early detection of sextortion patterns)—remain to be explored. Smartphones could also extend current alertness-detection methods (e.g., as used in face biometric systems to assess whether a person is awake) to prevent or make more challenging the taking of nude or explicit imagery of people who are asleep or otherwise unaware.

Expanded controls around explicit content

Technology might also play a role in mediating how, for how long, and with whom explicit images are shared to reduce the risk of IBSA like sextortion and NCEI. Qin et al. discussed options such as disappearing messages, screenshot notifications, and watermarking to prove ownership or track the origin of a leaked image [79]. In practice, the effectiveness of these technologies hinges on the origin of an image (e.g., initially consensual vs. covertly recorded), and the willingness of perpetrators to adhere to tech-mediated norms. However, any increased friction for perpetrators can still reduce harm [80].

Audio-visual alerts around recording

Victim-survivors of NCEI shared that perpetrators often covertly captured explicit imagery. One intervention explored by device manufacturers in Japan and South Korea has been to emit a “shutter” sound whenever a cellphone records imagery [87]. This strategy is similar to the alert emitted by AirTags, intended to prevent stalking [70]. Such a feature could be paired with on-device detection of explicit content. Whether such a feature is acceptable to users, and to what degree it discourages NCEI, requires further investigation.

Preventing generative content

Specific to nonconsensual synthetic explicit imagery, generative AI technologies require safeguards to prevent their use in IBSA. Solutions likely require a combination of preventing harmful model outputs and also detecting synthetic explicit imagery.

8 Conclusion

We examined Reddit conversations about IBSA experiences, exploring the (1) types of IBSA for which people sought help, (2) the help they asked for, and (3) the help they received. After identifying over 100,000 posts through combined LLM and manual review, we qualitatively analyzed a stratified sample of 261 posts about seven types of IBSA: financial sextortion, nonfinancial sextortion, nonconsensual synthetic explicit imagery, pressurized sexting, cyberflashing, nonconsensual explicit imagery, and recorded sexual assault. We synthesized similarities in types of help sought and given, finding that across the seven IBSA types we studied, victim-survivors most often asked for and were offered information, empathy and therapeutic support, and advice about managing existing relationships. Technical, legal, and other institutional support were comparatively less common, indicating opportunities for more comprehensive support. Our work informs existing challenges towards mitigating, preventing, and supporting recovery from IBSA, and we outline the role technology could have towards potential solutions.

Acknowledgements

We thank our anonymous reviewers for their valuable feedback and Nicola Henry for reviewing our search keywords.

References

  • [1] N. Andalibi, O. L. Haimson, M. D. Choudhury, and A. Forte. Social support, reciprocity, and anonymity in responses to sexual abuse disclosures on social media. ACM Trans. Comput.-Hum. Interact., 25(5), Oct 2018.
  • [2] N. Andalibi, O. L. Haimson, M. De Choudhury, and A. Forte. Understanding social media disclosures of sexual abuse through the lenses of support seeking and anonymity. In Proc. CHI Conference on Human Factors in Computing Systems, CHI ’16, page 3906–3918, 2016.
  • [3] N. Andalibi, P. Ozturk, and A. Forte. Sensitive self-disclosures, responses, and social support on instagram: The case of #depression. In Proc. ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW ’17, page 1485–1500, 2017.
  • [4] Apple. About sensitive content warning on Apple devices. https://support.apple.com/en-us/105071, 2024.
  • [5] A. Bartow. Copyright law and pornography. Or. L. Rev., 91:1, 2012.
  • [6] S. Bates. Revenge porn and mental health: A qualitative analysis of the mental health effects of revenge porn on female survivors. Feminist Criminology, 12(1):22–42, 2017.
  • [7] V. Bell, C. Hemmens, and B. Steiner. Up skirts and down blouses: A statutory analysis of legislative responses to video voyeurism. Criminal Justice Studies, 19(3):301–314, 2006.
  • [8] R. Bellini, E. Tseng, N. McDonald, R. Greenstadt, D. McCoy, T. Ristenpart, and N. Dell. “So-called privacy breeds evil”: Narrative justifications for intimate partner surveillance in online forums. Proc. ACM Hum.-Comput. Interact., 4(CSCW3), Jan 2021.
  • [9] R. Bellini, E. Tseng, N. Warford, A. Daffalla, T. Matthews, S. Consolvo, J. P. Woelfer, P. G. Kelley, M. L. Mazurek, D. Cuomo, N. Dell, and T. Ristenpart. Sok: Safer digital-safety research involving at-risk users. In Proc. IEEE Symposium on Security and Privacy, May 2024.
  • [10] S. Bloom. No vengeance for revenge porn victims: Unraveling why this latest female-centric, intimate-partner offense is still legal, and why we should criminalize it. Fordham Urb. LJ, 42:233, 2014.
  • [11] N. Bluett-Boyd, B. Fileborn, A. Quadara, and A. Moore. The role of emerging communication technologies in experiences of sexual violence: A new legal frontier? J. of the Home Economics Institute of Australia, 20(2):25–29, 2013.
  • [12] E. Bond and K. Tyrrell. Understanding revenge pornography: A national survey of police officers and staff in England and Wales. J. of interpersonal violence, 36(5-6):2166–2181, 2021.
  • [13] R. E. Boyatzis. Transforming qualitative information: Thematic analysis and code development. Sage, 1998.
  • [14] V. Braun and V. Clarke. Conceptual and design thinking for thematic analysis. Qualitative Psychology, 9(1):3, 2022.
  • [15] C. Call. Perceptions of Image-Based Sexual Abuse Among the American Public. Criminology, Crim. Just. L & Soc’y, 22:30, 2021.
  • [16] J. Campbell and N. Glass. Safety planning, danger, and lethality assessment. Intimate partner violence: A health-based perspective, pages 319–334, 2009.
  • [17] J. K. Campbell, S. M. Poage, S. Godley, and E. F. Rothman. Social anxiety as a consequence of non-consensually disseminated sexually explicit media victimization. J. of Interpersonal Violence, 37(9-10):NP7268–NP7288, 2022.
  • [18] M. A. Cascio, E. Lee, N. Vaudrin, and D. A. Freedman. A team-based approach to open coding: Considerations for creating intercoder consensus. Field Methods, 31(2):116–130, 2019.
  • [19] J. X. Chen, A. McDonald, Y. Zou, E. Tseng, K. Roundy, A. Tamersoy, F. Schaub, T. Ristenpart, and N. Dell. Trauma-Informed Computing: Towards Safer Technology Experiences for All. In Proc. USENIX Security Symposium, 2020.
  • [20] D. K. Citron and M. A. Franks. Criminalizing revenge porn. Wake Forest L. Rev., 49:345, 2014.
  • [21] E. M. Clancy, M. K. Maas, E. March, D. Howard, and B. Klettke. Just checking it out? Motivations for and behavioral associations with visiting “slutpages” in the United States and Australia. Frontiers in Psychology, 12:671986, 2021.
  • [22] B. F. Crabtree. Doing qualitative research. Sage, Thousand Oaks, CA, 1999.
  • [23] C. Cross, K. Holt, and T. J. Holt. To pay or not to pay: An exploratory analysis of sextortion in the context of romance fraud. Criminology & Criminal Justice, page 17488958221149581, 2023.
  • [24] J. Davies and E. Lyon. Domestic violence advocacy: Complex lives/difficult choices. Sage Publications, 2013.
  • [25] W. S. DeKeseredy and M. D. Schwartz. Thinking sociologically about image-based sexual abuse: The contribution of male peer support theory. Sexualization, Media, & Society, 2(4):2374623816684692, 2016.
  • [26] B. Dym and C. Fiesler. Ethical and privacy considerations for research using online fandom data. Transformative Works and Cultures, 33, 2020.
  • [27] A. A. Eaton, D. Ramjee, and J. F. Saunders. The relationship between sextortion during COVID-19 and pre-pandemic intimate partner violence: A large study of victimization among diverse us men and women. Victims & Offenders, 18(2):338–355, 2023.
  • [28] J. Fereday and E. Muir-Cochrane. Demonstrating rigor using thematic analysis: A hybrid approach of inductive and deductive coding and theme development. Int. J. of Qualitative Methods, 5(1):80–92, 2006.
  • [29] A. Flynn, E. Cama, A. Powell, and A. J. Scott. Victim-blaming and image-based sexual abuse. J. of Criminology, 56(1):7–25, 2023.
  • [30] A. Flynn, A. Powell, A. J. Scott, and E. Cama. Deepfakes and digitally altered imagery abuse: A cross-country exploration of an emerging form of image-based sexual abuse. British J. of Criminology, 62(6):1341–1358, 2022.
  • [31] C. C. for Child Protection (C3P). An analysis of financial sextortion victim posts published on r/sextortion. Technical report, C3P, 2022.
  • [32] Z. Franklin. Justice for revenge porn victims: Legal theories to overcome claims of civil immunity by operators of revenge porn websites. Calif. L. Rev., 102:1303, 2014.
  • [33] D. Freed, S. Havron, E. Tseng, A. Gallardo, R. Chatterjee, T. Ristenpart, and N. Dell. “Is My Phone Hacked?” Analyzing clinical computer security interventions with survivors of intimate partner violence. Proc. ACM Hum.-Comput. Interact., 3(CSCW), Nov. 2019.
  • [34] D. Freed, J. Palmer, D. Minchala, K. Levy, T. Ristenpart, and N. Dell. “A Stalker’s Paradise”: How intimate partner abusers exploit technology. In Proc. CHI Conference on Human Factors in Computing Systems, CHI ’18. ACM, 2018.
  • [35] Google Cloud. PaLM2 for Text. https://cloud.google.com/vertex-ai/docs/generative-ai/model-reference/text, 2024.
  • [36] M. Gorissen. It’s just a distance thing: Affordances and decisions in online disclosure of sexual violence victimization. J. of interpersonal violence, page 08862605241246800, 2024.
  • [37] J. A. Greene, N. K. Choudhry, E. Kilabuk, and W. H. Shrank. Online social networking by patients with diabetes: a qualitative evaluation of communication with facebook. J. of General Internal Medicine, 26:287–292, 2011.
  • [38] S. Harris-Lovett. In survey, 88% of U.S. adults said they had sexted and 96% of them endorsed it. https://www.latimes.com/science/sciencenow/la-sci-sn-sexting-sexual-satisfaction-20150807-story.html, 2015.
  • [39] N. Henry and A. Flynn. Image-based sexual abuse: Online distribution channels and illicit communities of support. Violence against women, 25(16):1932–1955, 2019.
  • [40] N. Henry, A. Flynn, and A. Powell. Policing image-based sexual abuse: Stakeholder perspectives. Police practice and research, 19(6):565–581, 2018.
  • [41] N. Henry, A. Flynn, and A. Powell. Technology-facilitated domestic and sexual violence: A review. Violence against women, 26(15-16):1828–1854, 2020.
  • [42] N. Henry and A. Powell. Beyond the ‘sext’: Technology-facilitated sexual violence and harassment against adult women. Australian & New Zealand J. of Criminology, 48(1):104–118, 2015.
  • [43] N. Henry and A. Powell. Technology-facilitated sexual violence: A literature review of empirical research. Trauma, Violence, & Abuse, 19(2):195–208, 2018.
  • [44] N. Henry, A. Powell, and A. Flynn. AI can now create fake porn, making revenge porn even more complicated. The Conversation, 28, 2018.
  • [45] A. Huber. ‘A shadow of me old self’: The impact of image-based sexual abuse in a digital society. Int. Rev. of Victimology, 29(2):199–216, 2023.
  • [46] A. R. Huber. Image-based sexual abuse: Online communities and the broader misogynistic landscape. British J. of Criminology, 63(4):967–983, 2023.
  • [47] L. Iyadurai, S. E. Blackwell, R. Meiser-Stedman, P. C. Watson, M. B. Bonsall, J. R. Geddes, A. C. Nobre, and E. A. Holmes. Preventing intrusive memories after trauma via a brief intervention involving Tetris computer game play in the emergency department: A proof-of-concept randomized controlled trial. Molecular Psychiatry, 23(3):674–682, Mar. 2018.
  • [48] Jigsaw. Designing for an at-risk world. https://medium.com/jigsaw/designing-for-an-at-risk-world-75081c6fa061, 2016.
  • [49] M. Kamal and W. J. Newman. Revenge pornography: Mental health implications and related legislation. J. of the American Academy of Psychiatry and the Law Online, 44(3):359–367, 2016.
  • [50] N. S. Kamarudin, V. Rakesh, G. Beigi, L. Manikouda, and H. Liu. A Study of Reddit-User’s Response to Rape. In 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pages 591–592, Aug. 2018.
  • [51] A. Lenhart, M. Ybarra, and M. Price-Feeney. Nonconsensual image sharing. Technical report, 2016.
  • [52] R. Lewis and S. Anitha. Upskirting: A systematic literature review. Trauma, Violence, & Abuse, 24(3):2003–2018, 2023.
  • [53] H. Li, B. Hecht, and S. Chancellor. All That’s Happening behind the Scenes: Putting the Spotlight on Volunteer Moderator Labor in Reddit. Proc. of the Int. AAAI Conference on Web and Social Media, 16:584–595, May 2022.
  • [54] L. v. D. Lipsky and C. Burk. Trauma Stewardship: An Everyday Guide to Caring for Self While Caring for Others. Berrett-Koehler Publishers, San Francisco, 2009.
  • [55] M. K. Maas, K. M. Cary, E. M. Clancy, B. Klettke, H. L. McCauley, and J. R. Temple. Slutpage use among us college students: the secret and social platforms of image-based sexual abuse. Archives of Sexual Behavior, 50:2203–2214, 2021.
  • [56] A. J. Marganski, L. A. Melander, and W. S. DeKeseredy. Single, repeat, and poly intimate partner violence victimization among women at a college campus: Extending research through the inclusion of technology-facilitated violence and examining key social determinants for intimate partner violence prevention. Violence Against Women, 28(12-13):3013–3036, 2022.
  • [57] A. Markham. Fabrication as ethical practice: Qualitative inquiry in ambiguous internet contexts. Information, Communication & Society, 15(3):334–353, 2012.
  • [58] A. McCosker. Making sense of deepfakes: Socializing AI and building data literacy on GitHub and YouTube. New Media & Society, page 14614448221093943, 2022.
  • [59] C. McGlynn and K. Johnson. Cyberflashing: Recognising harms, reforming laws. Policy Press, 2021.
  • [60] C. McGlynn, K. Johnson, E. Rackley, N. Henry, N. Gavey, A. Flynn, and A. Powell. ‘It’s torture for the soul’: The harms of image-based sexual abuse. Social & Legal Studies, 30(4):541–562, 2021.
  • [61] C. McGlynn and E. Rackley. Image-based sexual abuse. Oxford J. of Legal Studies, 37(3):534–561, 2017.
  • [62] C. McGlynn, E. Rackley, and R. Houghton. Beyond ‘revenge porn’: The continuum of image-based sexual abuse. Feminist legal studies, 25:25–46, 2017.
  • [63] C. McGlynn, E. Rackley, K. Johnson, N. Henry, A. Flynn, A. Powell, N. Gavey, and A. Scott. Shattering lives and myths: A report on image-based sexual abuse, 2019.
  • [64] K. J. Mitchell, A. Segura, L. M. Jones, and H. A. Turner. Poly-victimization and peer harassment involvement in a technological world. J. of Interpersonal Violence, 33(5):762–788, 2018.
  • [65] D. Moore, G. M. Voelker, and S. Savage. Inferring Internet denial of service activity. In Proc. USENIX Security Symposium, 2001.
  • [66] R. Moors and R. Webber. The dance of disclosure: Online self-disclosure of sexual assault. Qualitative Social Work: Research and Practice, 12(6):799–815, 2013.
  • [67] NCMEC. Take it down. https://takeitdown.ncmec.org/, 2024.
  • [68] M. W. Newman, D. Lauterbach, S. A. Munson, P. Resnick, and M. E. Morris. It’s not that I don’t have problems, I’m just not putting them on Facebook: Challenges and opportunities in using online social networks for health. In Proc. of the ACM 2011 Conference on Computer Supported Cooperative Work, CSCW ’11, page 341–350, 2011.
  • [69] B. Obada-Obieh, Y. Huang, L. Spagnolo, and K. Beznosov. Sok: The dual nature of technology in sexual abuse. In Proc. IEEE Symposium on Security and Privacy, pages 2320–2343, 2022.
  • [70] K. O’Flaherty. Apple AirTags get important anti-stalking upgrade. https://www.forbes.com/sites/kateoflahertyuk/2022/12/22/apple-airtags-get-important-anti-stalking-upgrade/, 2022.
  • [71] C. Okolie. Artificial intelligence-altered videos (deepfakes), image-based sexual abuse, and data privacy concerns. J. of Int. Women’s Studies, 25(2):11, 2023.
  • [72] T. O’Neill. ‘Today I Speak’: Exploring How Victim-Survivors Use Reddit. Int. J. for Crime, Justice & Soc. Democracy, 7(1):44–59, Mar. 2018.
  • [73] R. L. O’Malley and K. M. Holt. Cyber sextortion: An exploratory analysis of different perpetrators engaging in a similar crime. J. of Interpersonal Violence, 37(1-2):258–283, 2022.
  • [74] Patricia Davis. Financial sextortion: “a growing crisis”. https://www.missingkids.org/blog/2023/financial-sextortion-growing-crisis, 2023.
  • [75] A. Powell and N. Henry. Sexual violence and harassment in the digital era. The Palgrave handbook of Australian and New Zealand criminology, crime and justice, pages 205–220, 2017.
  • [76] A. Powell, N. Henry, and A. Flynn. Image-based sexual abuse. Routledge Handbook of Critical Criminology, 2, 2018.
  • [77] A. Powell, N. Henry, A. Flynn, and A. J. Scott. Image-based sexual abuse: The extent, nature, and predictors of perpetration in a community sample of Australian residents. Computers in Human Behavior, 92:393–402, 2019.
  • [78] N. Proferes, N. Jones, S. Gilbert, C. Fiesler, and M. Zimmer. Studying Reddit: A systematic overview of disciplines, approaches, methods, and ethics. Social Media + Society, 7(2), 2021.
  • [79] L. Qin, V. Hamilton, Y. Aydinalp, M. Scarlett, S. Wang, and E. M. Redmiles. Towards safer intimate futures: Recommendations for tech platforms to reduce image based sexual abuse. https://www.eswalliance.org/toward_safer_intimate_futures_recommendations_tech_platforms_reduce_image_based_abuse, 2024.
  • [80] E. M. Redmiles. Friction Matters: Balancing the Pursuit of Perfect Protection With Target Hardening. IEEE Security & Privacy, 22(1):76–75, Jan. 2024.
  • [81] J. Ringrose, K. Regehr, and B. Milne. Understanding and combatting youth experiences of image-based sexual harassment and abuse. 2021.
  • [82] K. Roberts, A. Dowell, and J.-B. Nie. Attempting rigour and replicability in thematic analysis of qualitative research data; a case study of codebook development. BMC Medical Research Methodology, 19:1–8, 2019.
  • [83] Y. Ruvalcaba and A. A. Eaton. Nonconsensual pornography among us adults: A sexual scripts framework on victimization, perpetration, and health correlates for women and men. Psychology of violence, 10(1):68, 2020.
  • [84] N. Sambasivan, A. Batool, N. Ahmed, T. Matthews, K. Thomas, L. S. Gaytán-Lugo, D. Nemer, E. Bursztein, E. Churchill, and S. Consolvo. “They don’t leave us alone anywhere we go”: Gender and digital abuse in south asia. In Proc. CHI Conference on Human Factors in Computing Systems, CHI ’19, 2019.
  • [85] S. Semenzin and L. Bainotti. The use of Telegram for non-consensual dissemination of intimate images: Gendered affordances and the construction of masculinities. Social Media + Society, 6(4), 2020.
  • [86] P. Simons. “Tetris for Trauma” Viral Twitter Thread: A Master Class in Misleading Psych Research. https://www.madinamerica.com/2021/10/tetris-trauma-viral-twitter-thread-master-class-misleading-psych-research/, Oct. 2021.
  • [87] M. Smith. Japan’s noisy iPhone problem. https://www.engadget.com/2016-09-30-japans-noisy-iphone-problem.html, 2016.
  • [88] B. Sparks. A snapshot of image-based sexual abuse (IBSA): Narrating a way forward. Sexuality Research & Soc. Policy, 19(2):689–704, 2022.
  • [89] B. Sparks, S. Stephens, and S. Trendell. Image-based sexual abuse: Victim-perpetrator overlap and risk-related correlates of coerced sexting, non-consensual dissemination of intimate images, and cyberflashing. Computers in Human Behavior, 148:107879, 2023.
  • [90] StopNCII. How StopNCII.org works. https://stopncii.org/how-it-works/, 2024.
  • [91] S. R. Stroud. The dark side of the online self: A pragmatist critique of the growing plague of revenge porn. J. of Mass Media Ethics, 29(3):168–183, 2014.
  • [92] P. G. Tjaden. Extent, nature, and consequences of intimate partner violence. US DOJ, Office of Justice Programs, National Institute of Justice, 2000.
  • [93] E. Tseng, R. Bellini, N. McDonald, M. Danos, R. Greenstadt, D. McCoy, N. Dell, and T. Ristenpart. The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums. In Proc. USENIX Security Symposium, 2020.
  • [94] C. A. Uhl, K. J. Rhyner, C. A. Terrance, and N. R. Lugo. An examination of nonconsensual pornography websites. Feminism & Psychology, 28(1):50–68, 2018.
  • [95] R. Umbach, N. Henry, G. F. Beard, and C. M. Berryessa. Non-consensual synthetic intimate imagery: Prevalence, attitudes, and knowledge in 10 countries. In Proc. CHI Conference on Human Factors in Computing Systems, CHI ’24, 2024.
  • [96] N. Warford, T. Matthews, K. Yang, O. Akgul, S. Consolvo, P. G. Kelley, N. Malkin, M. L. Mazurek, M. Sleeper, and K. Thomas. Sok: A framework for unifying at-risk user research. In Proc. of the IEEE Symposium on Security and Privacy, 2022.
  • [97] R. Webber. Sexual assault in relationships: Seeking help on a Q&A website. Australian Social Work, 67(3):363–376, 2014.
  • [98] M. Wei, S. Consolvo, P. G. Kelley, T. Kohno, F. Roesner, and K. Thomas. “There’s so much responsibility on users right now:” Expert advice for staying safer from hate and harassment. In Proc. CHI Conference on Human Factors in Computing Systems, CHI ’23, 2023.
  • [99] M. Wei, E. Zeng, T. Kohno, and F. Roesner. Anti-privacy and anti-security advice on TikTok: Case studies of technology-enabled surveillance and control in intimate partner and parent-child relationships. In Proc. Symposium on Usable Privacy and Security, SOUPS ’18. USENIX, Aug. 2022.
  • [100] R. Winter and A. Salter. Deepfakes: Uncovering hardcore open source on GitHub. Porn Studies, 7(4):382–397, 2020.
  • [101] World Population Review. Reddit Users by Country 2024. https://worldpopulationreview.com/country-rankings/reddit-users-by-country, 2024.
  • [102] L. Zvi and M. S. Bitton. Perceptions of victim and offender culpability in non-consensual distribution of intimate images. Psychology, Crime & Law, 27(5):427–442, 2021.
  • [103] L. Zvi and M. Shechory-Bitton. Police officer perceptions of non-consensual dissemination of intimate images. Frontiers in Psychology, page 2148, 2020.

Appendix A Additional Methodological Details

A.1 Subreddits used

The subreddits we manually selected, as described in Section 3.1, were: r/advice, r/techsupport, r/legaladvice, r/legaladviceuk, r/legaladviceindia, r/legaladvicecanada, r/legaladviceeurope, r/legaladvicegerman, r/legaladviceNZ, r/legaladviceireland, r/legaladviceeu, r/relationship_advice, r/dating_advice, r/relationships, r/dating, r/marriage, r/sex, r/online_dating_advice, r/indian_datingadvice, r/femaledatingstrategy, r/onlinedating, r/tinder, r/bumble, r/hingeapp, r/grindr, r/onlyfansadvice, r/fansly_advice, r/camgirlproblems, r/antipornography, r/loveafterporn, r/pornfreerelationships, r/pornfree, r/sexualassault, r/sexualassaultsurvivor, r/creepyPMs, r/twoxchromosomes, r/thegirlsurvivalguide, r/askwomen, r/askwomennsfw, r/askmen, r/askgaybros, r/sextortion, r/scams.

Title: [TITLE]
Article: [ARTICLE]
Task: Categorize the Title and Article as either
- 1) Sextortion
- 2) Nude image taken without consent
- 3) Cyberflashing or receiving unwanted nudity
- 4) Manipulated media like deepfakes, photoshopped images, or cheapfakes
- 5) Pressuring someone into sending nude images
- 6) Unwanted attention
- 7) Recording of sexual assault
- 8) Other
Categorization:"""
Figure 3: Categorization prompt designed to identify the most relevant type of IBSA discussed in a Reddit post. IBSA type names and description differ from types shown in Table 1 due to experimental iteration with LLM prompts.
You are a content moderator for safety policies. Your job is to carefully inspect articles and answer each question below using the single word "Yes" or "No". Title: [TITLE] Article: [ARTICLE] Question 1: Does the title or article discuss a threat to expose nude images unless a payment is made? Question 2: Does the title or article discuss a threat to expose nude images unless the person sends more nude images or stays in a relationship? Question 3: Does the title or article discuss taking, recording, or leaking a nude image without consent? Your answer should be in json format seen below, where your answer should replace the “‘ : { “Question 1”: “‘, “Question 2”: “‘, “Question 3”: “‘ }
Figure 4: Categorization prompt to determine whether a post discussed a specific type of IBSA (here, nonfinancial sextortion). A Python parser validated the sequence of Yes and No answers necessary for a category label to apply.

A.2 Filtering: Keywords vs. LLM Prompts

As described in Section 3.1, we initially explored using keywords chosen from prior work, manual searches, discussion with experts, and our own domain expertise. We collected 60+ keywords and developed a three-part formula for surfacing relevant posts: >1 media keyword (e.g., image, nude, screenshot, personal vid), >1 IBSA keyword (e.g., revenge porn, cyberflashing, without consent, sextortion, leak, threat, coerce), >1 help keyword (e.g., help, support, what should i do). However, keyword searches introduced a prohibitive number of false positives to manually review, e.g., discussing IBSA in the news, posts that were not help-seeking.

Therefore, we developed the LLM-based filtering and categorizing approach described in Section 3.1; figures 3 and 4 show additional prompts. All posts were subsequently validated through manual review.

A.3 Codebook

The full list of codes applied to the 261 posts in our post dataset, and the 160 associated threads, with abbreviated definitions for each code. Codes were not mutually exclusive.

1) Codes about the Nature of IBSA

Perpetrator: current partner, ex-partner, friend, family members, colleague (work or school), stranger (unknown to victim-survivor prior to IBSA), other (none of the above), unspecified

Perpetrator(s)’ and victim-survivors’ gender, age, location: in terms used by post

Method of distribution

  • Threat: Perpetrator threatens to share or distribute the image

  • Possession: Perpetrator has possession of the image without threatening to or actually sharing

  • Social media: Perpetrator posted the image to social media

  • Website: Perpetrator posted the image to a website or elsewhere online

  • Messaging: Perpetrator directly messaged the image to others

  • N/A (no content): Perpetrator pressured the VS to send an image, but VS did not

  • Unspecified

Image origin

  • Consented: Shared for a different reason or in a prior context, but consent has been revoked

  • Coerced: Sent or taken under coercion from the perpetrator including: under false pretenses; non-secret, non-consensual image taking; soliciting face images for abuse

  • Coerced (not sent): VS has not sent image, but perpetrator attempted coercion

  • Created: Synthetically created

  • Hacked: Obtained through hacking or unauthorized access

  • Sold: Available for sale by VS, but not for sharing

  • Secretly recorded: Recording not known to VS when recorded

  • Unconsented exposure: VS nonconsensually exposed to someone else’s image

  • Unspecified

2) Codes about Help-Seeking

Self-help: Yes (poster is the person experiencing the abuse), No (poster is NOT the person experiencing the abuse)

Strategies attempted

  • Support: Talking with others in a support network, online or offline; does not include the Reddit post itself

  • Platform report: Using online platform reporting mechanisms

  • Police report: Contacting the police or making a police report

  • Workplace report: Contacting HR or workplace supervisor

  • Engage: Negotiating conditions of abuse with the perpetrator

  • Disengage: Stopping contact or other means of engagement with the perpetrator to try to mitigate the abuse

  • Securing accts: Taking actions to secure online accounts

  • Evidence: Recording evidence of the abuse

  • Delete content: Deleting images, even if not all copies

  • Other

  • Unspecified

Help sought: See Table 5.

When poster sought help: Based on the user states framework [48].

  • Prevention: Aiming to prevent future exposure to digital-safety risks; often but not always during relatively calm state of mind.

  • Monitoring: Watching for digital-safety events to quickly respond; often with low to moderate stress.

  • Crisis / Active event: Actively experiencing a digital-safety event (possibly hours/days); likely want to stop event; often very high stress.

  • Recovery: Digital-safety event stopped or it’s been determined stopping it may not be possible; ready to address damage; possibly much later; often moderate to high stress.

  • Multiple events: Complex cases with multiple or overlapping digital-safety events; often heightened stress and trauma.

3) Codes about Help-Giving: See Table 6.

Appendix B Additional Results

Tables 7 and 8 show, respectively and for each IBSA type, strategies previously attempted by victim-survivors and platform(s) involved.

Strategy

FS

NFS

NCSEI

PS

CF

NCEI

RSA

Disengage 22 18 22 18 10 8 12
Engage 16 10 11 22 8 15 6
Securing accounts 22 9 9 0 2 2 0
Social support 5 5 2 2 0 7 5
Police report 10 0 4 0 2 4 5
Platform report 9 1 6 1 1 2 1
Evidence 7 0 6 0 1 2 1
Delete content 2 1 0 1 0 4 2
Workplace report 0 1 1 2 4 0 0
Other 2 1 2 0 1 1 0
Unspecified 9 14 13 8 17 18 17
Table 7: Strategies attempted before posting on Reddit.
Platform

FS

NFS

NCSEI

PS

CF

NCEI

RSA

Messaging (apps, DMs) 42 26 30 31 32 15 8
Mainstream social media 31 16 23 3 5 10 4
Device 2 11 9 3 0 18 27
Dating app 11 2 5 7 6 0 0
Adult content (websites, apps) 0 1 2 0 0 3 4
Social discovery app 1 1 0 0 1 2 0
Financial / commerce 3 0 1 0 1 1 0
Website 0 1 0 0 0 2 0
Unspecified 0 4 1 7 2 1 1
Table 8: Platforms involved in the IBSA. Messaging also includes messages or images otherwise described in posts as “sent.”