Characterizing Resource Sharing Practices on Underground Internet Forum Synthetic Non-Consensual Intimate Image Content Creation Communities
Pith reviewed 2026-05-10 16:12 UTC · model grok-4.3
The pith
Analysis of 4chan and Reddit shows users of all technical levels share resources for creating and spreading synthetic non-consensual intimate images.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
Through an integrated analysis of 282,154 4chan comments and 78,308 Reddit submissions spanning 165 days, the study characterizes the actors, actions, and resources in SNCII content creation communities. The central finding is that users with differing levels of technical sophistication employ and share a wide range of primary resources facilitating SNCII content creation as well as numerous secondary resources facilitating dissemination, while knowledge transfer between experts and newcomers facilitates propagation of these illicit resources. This empirical basis leads directly to the identification of gaps in existing regulatory infrastructure and the synthesis of critical intervention for
What carries the argument
Integrated multi-community analysis of forum posts that distinguishes primary resources for content creation, secondary resources for dissemination, and the knowledge transfer process between users of varying technical sophistication.
If this is right
- Regulatory infrastructure contains identifiable gaps that can be addressed by focusing on resource flows rather than only final content.
- Distinguishing primary creation resources from secondary dissemination resources enables more precise monitoring and disruption strategies.
- Knowledge transfer channels between experts and newcomers represent actionable targets for reducing propagation of illicit methods.
- Deterrence efforts must account for users at different technical sophistication levels to be effective.
- Multi-platform coordination is required because the ecosystem spans communities with distinct user bases.
Where Pith is reading between the lines
- Disrupting the documented knowledge transfer process could slow the spread of creation techniques more effectively than removing individual images after they appear.
- The same data-driven mapping of resource sharing could be applied to other categories of online illicit activity to reveal common patterns.
- As generative AI tools become easier to use, the role of expert-to-novice knowledge sharing identified here is likely to increase rather than diminish.
- Platform policies that monitor discussions of resources and tutorials, in addition to posted content, may yield earlier detection of emerging practices.
Load-bearing premise
The sampled 4chan comments and Reddit submissions from the 165-day period accurately capture the key actors, actions, and resources across the broader SNCII ecosystem without significant bias from platform dynamics or anonymity.
What would settle it
A follow-up collection of posts from additional forums or a longer time window that finds little or no evidence of primary and secondary resource sharing or expert-to-novice knowledge transfer would contradict the core observations.
Figures
read the original abstract
Many malicious actors responsible for disseminating synthetic non-consensual intimate imagery (SNCII) operate within internet forums to exchange resources, strategies, and generated content across multiple platforms. Technically-sophisticated actors gravitate toward certain communities (e.g., 4chan), while lower-sophistication end-users are more active on others (e.g., Reddit). To characterize key stakeholders in the broader ecosystem, we perform an integrated analysis of multiple communities, analyzing 282,154 4chan comments and 78,308 Reddit submissions spanning 165 days between June and November 2025 to characterize involved actors, actions, and resources. We find: (a) that users with differing levels of technical sophistication employ and share a wide range of primary resources facilitating SNCII content creation as well as numerous secondary resources facilitating dissemination; and (b) that knowledge transfer between experts and newcomers facilitates propagation of these illicit resources. Based on our empirical analysis, we identify gaps in existing SNCII regulatory infrastructure and synthesize several critical intervention points for bolstering deterrence.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript analyzes 282,154 4chan comments and 78,308 Reddit submissions collected over a 165-day window (June–November 2025) to characterize actors, actions, and resources in underground communities engaged in synthetic non-consensual intimate image (SNCII) creation and dissemination. It reports that users of differing technical sophistication share a range of primary resources for content generation and secondary resources for distribution, with expert-to-newcomer knowledge transfer enabling propagation of these resources, and identifies regulatory gaps plus potential intervention points.
Significance. If the empirical patterns hold after addressing sampling limitations, the work supplies large-scale observational data on resource-sharing dynamics across platforms with different user sophistication profiles. This could help map the SNCII ecosystem and guide targeted deterrence. The scale of the collected corpus is a clear asset for an observational study in this domain.
major comments (1)
- [Data collection and analysis sections] The central claims rest on the assumption that the sampled 4chan and Reddit posts accurately capture primary/secondary resources and expert-to-newcomer knowledge transfer across the broader SNCII ecosystem. No validation, cross-platform checks, or explicit discussion of platform-specific biases (anonymity on 4chan versus moderation on Reddit) or temporal limitations of the 165-day window is provided, leaving open the possibility that observed patterns are artifacts of sampling rather than general features.
minor comments (1)
- [Abstract] The abstract states high-level findings on resource types and knowledge transfer but supplies no indication of the concrete analytical procedures (e.g., how resources were classified, how technical sophistication was operationalized, or inter-rater reliability for coding).
Simulated Author's Rebuttal
We thank the referee for the detailed feedback, which highlights important considerations for strengthening the presentation of our observational study. We agree that the manuscript would benefit from more explicit discussion of sampling limitations, platform biases, and the scope of our claims, and we will revise accordingly while preserving the core empirical contributions.
read point-by-point responses
-
Referee: The central claims rest on the assumption that the sampled 4chan and Reddit posts accurately capture primary/secondary resources and expert-to-newcomer knowledge transfer across the broader SNCII ecosystem. No validation, cross-platform checks, or explicit discussion of platform-specific biases (anonymity on 4chan versus moderation on Reddit) or temporal limitations of the 165-day window is provided, leaving open the possibility that observed patterns are artifacts of sampling rather than general features.
Authors: We acknowledge this observation and will add a dedicated Limitations subsection in the revised manuscript. Our study is explicitly scoped to an integrated analysis of 4chan and Reddit as platforms hosting communities with contrasting user sophistication profiles, as described in the abstract and Section 3. The 165-day collection window (June–November 2025) was selected to capture contemporaneous activity following key platform and regulatory developments; we will now explicitly discuss its temporal bounds and potential for missing longer-term trends. Platform-specific biases (e.g., 4chan’s anonymity versus Reddit’s moderation) are inherent to the data sources and will be addressed by noting how they shape observed resource-sharing behaviors rather than claiming they are absent. Cross-platform validation or external checks are not feasible within ethical and legal constraints on accessing additional underground venues, but we will reference prior smaller-scale studies on SNCII communities to contextualize our large-scale corpus. We do not assert that the patterns generalize to the entire ecosystem; instead, we characterize resource dynamics within these prominent venues. Claims will be tempered and the sampling rationale clarified to address the possibility of artifacts. revision: yes
Circularity Check
No circularity: purely observational empirical analysis from forum data
full rationale
The paper performs an integrated analysis of 282,154 4chan comments and 78,308 Reddit submissions over 165 days to characterize actors, actions, and resources in SNCII communities. It reports direct empirical findings on resource sharing and knowledge transfer without any mathematical derivations, fitted parameters, predictions, self-citations, or ansatzes. All claims derive from the collected data itself, with no reduction of outputs to inputs by construction. This is a standard observational study whose central claims rest on the representativeness of the sampled data rather than any self-referential logic.
Axiom & Free-Parameter Ledger
axioms (2)
- domain assumption The collected 4chan and Reddit posts represent the primary activities and stakeholders in SNCII creation communities.
- domain assumption Observed patterns of resource mention and user interactions indicate active sharing and knowledge transfer.
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
We perform an integrated analysis of multiple communities, analyzing 282,154 4chan comments and 78,308 Reddit submissions... develop a codebook of actors, actions, and resources... construct a Neo4j knowledge graph... keyword-based filtering strategy
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
Primary Resources... LoRA... Model... Nudification Product... Secondary Resources... File Sharing Service... Telegram
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
4chan and/b: An Analysis of Anonymity and Ephemer- ality in a Large Online Community
Michael Bernstein, Andrés Monroy-Hernández, Drew Harry, Paul André, Katrina Panovich, and Greg Vargas. 4chan and/b: An Analysis of Anonymity and Ephemer- ality in a Large Online Community. InProceedings of the international AAAI conference on web and social media, volume 5, pages 50–57, 2011
work page 2011
-
[2]
Millions created deep- fake nudes on Telegram as AI tools drive global wave of digital abuse
Priya Bharadia and Aisha Down. Millions created deep- fake nudes on Telegram as AI tools drive global wave of digital abuse. https://www.theguardian.com/gl obal-development/2026/jan/29/millions-cre ating-deepfake-nudes-telegram-ai-digital-a buse, January 2026
work page 2026
-
[3]
Paul Bleakley, Elena Martellozzo, Ruth Spence, and Jef- frey DeMarco. Moderating online child sexual abuse material (csam): Does self-regulation work, or is greater state regulation needed?European Journal of Criminol- ogy, 21(2):231–250, 2024
work page 2024
-
[4]
Petter Bae Brandtzæg. Towards a unified Media-User Typology (MUT): A meta-analysis and review of the research literature on media-user typologies.Computers in Human Behavior, 26(5):940–956, 2010
work page 2010
-
[5]
Natalie Grace Brigham, Miranda Wei, Tadayoshi Kohno, and Elissa M Redmiles. “Violation of my body:” Per- ceptions of AI-generated non-consensual (intimate) im- agery. InTwentieth Symposium on Usable Privacy and Security (SOUPS 2024), pages 373–392, 2024
work page 2024
-
[6]
Marvin Büchel, Tommaso Paladini, Stefano Longari, Michele Carminati, Stefano Zanero, Hodaya Binyamini, Gal Engelberg, Dan Klein, Giancarlo Guizzardi, Marco Caselli, et al. SoK: Automated TTP Extraction from CTI Reports–Are We There Yet? In34th USENIX Security Symposium (USENIX Security 25), pages 4621–4641, 2025
work page 2025
-
[7]
Policy update: Removal of real-person likeness content, May 2025
Civitai. Policy update: Removal of real-person likeness content, May 2025
work page 2025
-
[8]
Stacey Colliver. Porn vilification and age verification: Regulating online pornography and sex work.Feminist Studies, 50(1):40–64, 2024
work page 2024
-
[9]
Laura Cress and Liv McMahon. Ofcom investigates Elon Musk’s X over Grok AI sexual deepfakes.https: //www.bbc.com/news/articles/cwy875j28k0o , January 2026
work page 2026
-
[10]
Deep- fake pornography is resilient to regulatory and platform shocks, 2026
Alejandro Cuevas and Manoel Horta Ribeiro. Deep- fake pornography is resilient to regulatory and platform shocks, 2026. 15
work page 2026
-
[11]
The Data (Use and Access) Act 2025 (Commencement No
Alex Davies-Jones. The Data (Use and Access) Act 2025 (Commencement No. 5) Regulations 2026.https: //www.legislation.gov.uk/uksi/2026/31/made
work page 2025
-
[12]
Michelle L. Ding and Harini Suresh. The Malicious Technical Ecosystem: Exposing Limitations in Techni- cal Governance of AI-Generated Non-Consensual Inti- mate Images of Adults, April 2025. arXiv:2504.17663 [cs]
-
[13]
Remember the Hu- man: A Systematic Review of Ethical Considerations in Reddit Research.Proc
Casey Fiesler, Michael Zimmer, Nicholas Proferes, Sarah Gilbert, and Naiyan Jones. Remember the Hu- man: A Systematic Review of Ethical Considerations in Reddit Research.Proc. ACM Hum.-Comput. Interact., 8(GROUP):5:1–5:33, February 2024
work page 2024
-
[14]
Understanding learn- ers’ interests in cybersecurity competitions on reddit
Brock Floyd, Jared Jackson, Emma Probst, Hong Liu, Nischal Mishra, and Chen Zhong. Understanding learn- ers’ interests in cybersecurity competitions on reddit. InProceedings of the 13th International Conference on Education Technology and Computers, pages 444–449, 2021
work page 2021
-
[15]
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
Jason Franklin, Vern Paxson, Adrian Perrig, and Stefan Savage. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. InProceedings of the 14th ACM Conference on Computer and Communica- tions Security, CCS ’07, page 375–388, New York, NY , USA, 2007. Association for Computing Machinery
work page 2007
-
[16]
An- alyzing the AI nudification application ecosystem
Cassidy Gibson, Daniel Olszewski, Natalie Grace Brigham, Anna Crowder, Kevin RB Butler, Patrick Traynor, Elissa M Redmiles, and Tadayoshi Kohno. An- alyzing the AI nudification application ecosystem. In 34th USENIX Security Symposium (USENIX Security 25), pages 1–20, 2025
work page 2025
-
[17]
Deconstructing the Take It Down Act.Commun
James Grimmelmann. Deconstructing the Take It Down Act.Commun. ACM, 68(9):28–30, August 2025
work page 2025
-
[18]
Characterizing the MrDeepFakes Sexual Deep- fake Marketplace
Catherine Han, Anne Li, Deepak Kumar, and Zakir Du- rumeric. Characterizing the MrDeepFakes Sexual Deep- fake Marketplace. In34th USENIX Security Symposium (USENIX Security 25), pages 5169–5188, 2025
work page 2025
-
[19]
Will Hawkins, Brent Mittelstadt, and Chris Russell. Deepfakes on Demand: The rise of accessible non- consensual deepfake image generators: The rise of ac- cessible non-consensual deepfake image generators. In Proceedings of the 2025 ACM Conference on Fairness, Accountability, and Transparency, pages 1602–1614, 2025
work page 2025
-
[20]
Arthur Heitmann. ArthurHeitmann/arctic_shift. https: //github.com/ArthurHeitmann/arctic_shift , January 2026. original-date: 2023-08-03T08:25:15Z
work page 2026
-
[21]
Trevor Hoppe. Punishing sex: Sex offenders and the missing punitive turn in sexuality studies.Law & Social Inquiry, 41(3):573–594, 2016
work page 2016
-
[22]
Video deepfake abuse: How company choices predictably shape misuse patterns,
Max Kamachee, Stephen Casper, Michelle L. Ding, Rui-Jie Yew, Anka Reuel, Stella Biderman, and Dylan Hadfield-Menell. Video Deepfake Abuse: How Com- pany Choices Predictably Shape Misuse Patterns, Jan- uary 2026. arXiv:2512.11815 [cs]
-
[23]
V oelker, Vern Paxson, and Stefan Savage
Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. V oelker, Vern Paxson, and Stefan Savage. Spamalytics: an empirical analy- sis of spam marketing conversion. InProceedings of the 15th ACM Conference on Computer and Communi- cations Security, CCS ’08, page 3–14, New York, NY , USA, 2008. Association for Computing Machinery
work page 2008
-
[24]
On assess- ing interrater agreement for multiple attribute responses
Lawrence L Kupper and Kerry B Hafner. On assess- ing interrater agreement for multiple attribute responses. Biometrics, pages 957–967, 1989
work page 1989
-
[25]
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs
Damon McCoy, Andreas Pitsillidis, Jordan Grant, Nicholas Weaver, Christian Kreibich, Brian Krebs, Ge- offrey V oelker, Stefan Savage, and Kirill Levchenko. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. In21st USENIX Security Symposium (USENIX Security 12), pages 1–16, Bellevue, W A, August 2012. USENIX Association
work page 2012
-
[26]
Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, and Brendan Dolan-Gavitt. Can deepfakes be created on a whim? InCompanion Proceedings of the ACM Web Conference 2023, WWW ’23 Companion, page 1324–1334, New York, NY , USA, 2023. Associa- tion for Computing Machinery
work page 2023
-
[27]
Unlim- ited Realm of Exploration and Experimentation
Jaron Mink, Lucy Qin, and Elissa M Redmiles. “Unlim- ited Realm of Exploration and Experimentation”: Meth- ods and Motivations of AI-Generated Sexual Content Creators.arXiv preprint arXiv:2601.21028, 2026
work page internal anchor Pith review arXiv 2026
-
[28]
Ariana Mirian, Joe DeBlasio, Stefan Savage, Geof- frey M. V oelker, and Kurt Thomas. Hack for Hire: Ex- ploring the Emerging Market for Account Hijacking. InThe World Wide Web Conference, WWW ’19, page 1279–1289, New York, NY , USA, 2019. Association for Computing Machinery
work page 2019
-
[29]
Taylor Swift AI images prompt US bill to tackle nonconsensual, sexual deepfakes
Blake Montgomery. Taylor Swift AI images prompt US bill to tackle nonconsensual, sexual deepfakes. https: //www.theguardian.com/technology/2024/jan/ 30/taylor-swift-ai-deepfake-nonconsensual -sexual-images-bill, January 2024. 16
work page 2024
-
[30]
Re:{CAPTCHAs—Understanding }{CAPTCHA- Solving} services in an economic context
Marti Motoyama, Kirill Levchenko, Chris Kanich, Da- mon McCoy, Geoffrey M V oelker, and Stefan Sav- age. Re:{CAPTCHAs—Understanding }{CAPTCHA- Solving} services in an economic context. In19th USENIX Security Symposium (USENIX Security 10), 2010
work page 2010
- [31]
-
[32]
Association for Computing Machinery
-
[33]
Apple, Google host dozens of AI ‘nudify’ apps like Grok, report finds
Lola Murti. Apple, Google host dozens of AI ‘nudify’ apps like Grok, report finds. https://www.cnbc.com /2026/01/27/apple-google-host-dozens-of-a i-nudify-apps-like-grok-report-finds.html , January 2026. Section: Technology
work page 2026
-
[34]
Victims, Vigilantes, and Advice Givers: An Analysis of {Scam-Related} Discourse on Reddit
Rajvardhan Oak and Zubair Shafiq. Victims, Vigilantes, and Advice Givers: An Analysis of {Scam-Related} Discourse on Reddit. InTwenty-First Symposium on Usable Privacy and Security (SOUPS 2025), pages 57– 71, 2025
work page 2025
-
[35]
Vittorio Orbinato, Mariarosaria Barbaraci, Roberto Natella, and Domenico Cotroneo. Automatic mapping of unstructured cyber threat intelligence: An experimen- tal study:(practical experience report). In2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE), pages 181–192. IEEE, 2022
work page 2022
-
[36]
Presidência da República Federativa do Brasil. Lei nº 15.123, de 2025. https://www.planalto.gov.br/cc ivil_03/_ato2023-2026/2025/Lei/L15123.htm ,
work page 2025
-
[37]
Accessed: 2026-01-22
work page 2026
-
[38]
The ecosystem of nonconsensual intimate deepfake tools online
Chiara Puglielli and Anne Craanen. The ecosystem of nonconsensual intimate deepfake tools online. https: //www.isdglobal.org/digital_dispatches/the -ecosystem-of-nonconsensual-intimate-deepf ake-tools-online/, October 2025
work page 2025
-
[39]
did they {F*** ing} consent to that?
Lucy Qin, Vaughn Hamilton, Sharon Wang, Yigit Ay- dinalp, Marin Scarlett, and Elissa M Redmiles. " did they {F*** ing} consent to that?": Safer digital intimacy via proactive protection against {Image-Based} sexual abuse. In33rd USENIX Security Symposium (USENIX Security 24), pages 55–72, 2024
work page 2024
-
[40]
Leonard Richardson. Beautiful soup documentation. https://www.crummy.com/software/BeautifulS oup/bs4/doc/, 2007
work page 2007
-
[41]
Classifying cyber-risky clinical notes by employing natural language processing
Suzanna Schmeelk, Martins Samuel Dogo, Yifan Peng, and Braja Gopal Patra. Classifying cyber-risky clinical notes by employing natural language processing. InPro- ceedings of the Annual Hawaii International Conference on System Sciences, page 4140, 2022
work page 2022
-
[42]
Ted [R-TX Sen. Cruz. S.146 - 119th Congress (2025- 2026): TAKE IT DOWN Act. https://www.congre ss.gov/bill/119th-congress/senate-bill/146 , May 2025. Archive Location: 2025-01-16
work page 2025
-
[43]
Zahra Stardust, Abdul Obeid, Alan McKee, and Daniel Angus. Mandatory age verification for pornography access: Why it can’t and won’t ‘save the children’.Big data & society, 11(2):20539517241252129, 2024
work page 2024
-
[44]
Yuan Y . Stevens. Canada Must Do More to Protect Women and Girls from Harmful Deepfakes. https: //www.cigionline.org/articles/canada-mus t-do-more-to-protect-women-and-girls-fro m-harmful-deepfakes/
-
[45]
Your botnet is my botnet: analysis of a botnet takeover
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christo- pher Kruegel, and Giovanni Vigna. Your botnet is my botnet: analysis of a botnet takeover. InProceedings of the 16th ACM Conference on Computer and Commu- nications Security, CCS ’09, page 635–647, New York, NY , USA, 2009. Association for Computin...
work page 2009
-
[46]
Beverly Hills middle school expels 5 students after deepfake nude photos incident
Kat Tenbarge. Beverly Hills middle school expels 5 students after deepfake nude photos incident. https: //www.nbcnews.com/tech/tech-news/beverly-h ills-school-expels-students-deepfake-nud e-photos-rcna142480, March 2024
work page 2024
-
[47]
Dhanaraj Thakur and Varun Nagaraj Rao. Think Twice Before You Search: Deterrence Messaging Designs to Prevent Searches for Non-Consensual Intimate Images. https://cdt.org/insights/think-twice-befor e-you-search-deterrence-messaging-designs -to-prevent-searches-for-non-consensual-i ntimate-images, November 2025
work page 2025
-
[48]
Studying the online deepfake com- munity.Journal of Online Trust and Safety, 2(1), 2023
Brian Timmerman, Pulak Mehta, Progga Deb, Kevin Gallagher, Brendan Dolan-Gavitt, Siddharth Garg, and Rachel Greenstadt. Studying the online deepfake com- munity.Journal of Online Trust and Safety, 2(1), 2023
work page 2023
-
[49]
arXiv preprint arXiv:2209.11055 , year=
Lewis Tunstall, Nils Reimers, Unso Eun Seo Jo, Luke Bates, Daniel Korat, Moshe Wasserblat, and Oren Pereg. Efficient few-shot learning without prompts.arXiv preprint arXiv:2209.11055, 2022
-
[50]
Non-consensual synthetic intimate imagery: Prevalence, attitudes, and knowledge in 10 countries
Rebecca Umbach, Nicola Henry, Gemma Faye Beard, and Colleen M Berryessa. Non-consensual synthetic intimate imagery: Prevalence, attitudes, and knowledge in 10 countries. InProceedings of the 2024 CHI Confer- ence on Human Factors in Computing Systems, pages 1–20, 2024. 17
work page 2024
-
[51]
Understanding Help-Seeking and Help-Giving on social media for Image-Based sexual abuse
Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska Roesner, Renee Shelby, Kurt Thomas, and Rebecca Umbach. Understanding Help-Seeking and Help-Giving on social media for Image-Based sexual abuse. In33rd USENIX Security Symposium (USENIX Security 24), pages 4391–4408, 2024
work page 2024
-
[52]
We’re utterly ill-prepared to deal with something like this
Miranda Wei, Christina Yeung, Franziska Roesner, and Tadayoshi Kohno. “We’re utterly ill-prepared to deal with something like this”: Teachers’ perspectives on student generation of synthetic nonconsensual explicit imagery. InProceedings of the 2025 CHI Conference on Human Factors in Computing Systems, 2025
work page 2025
-
[53]
Qunfang Wu, Louisa Kayah Williams, Ellen Simpson, and Bryan Semaan. Conversations about crime: Re- enforcing and fighting against platformed racism on reddit.Proceedings of the ACM on Human-Computer Interaction, 6(CSCW1):1–38, 2022. Appendix A Methodology We provide here further detail on our data collection and analysis methodologies for reproducibility ...
work page 2022
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.