pith. sign in

arxiv: 2601.21028 · v2 · pith:2CYMBBDKnew · submitted 2026-01-28 · 💻 cs.CY · cs.AI· cs.HC

"Unlimited Realm of Exploration and Experimentation": Methods and Motivations of AI-Generated Sexual Content Creators

Pith reviewed 2026-05-21 14:52 UTC · model grok-4.3

classification 💻 cs.CY cs.AIcs.HC
keywords AI-generated sexual contentcreator motivationsnon-consensual intimate imageryqualitative interviewsonline communitiesAI ethicscontent governance
0
0 comments X

The pith

Interviews with 28 AI-generated sexual content creators reveal motivations spanning personal sexual exploration, creative expression, technical experimentation, and occasional production of non-consensual images.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper sets out to map the reasons why individuals build and share AI-generated sexual content by speaking directly with people active in this space. It identifies a broad range of drivers rather than a single dominant purpose, showing how the same tools support hobbyist creativity, community leadership, and in a few instances harmful uses. A reader might care because understanding these motives can shape rules that distinguish exploratory or expressive activity from non-consensual imagery without over-regulating the entire domain.

Core claim

Through interviews with 28 creators who range from casual hobbyists to entrepreneurs and moderators of large online communities, the work establishes that AI-generated sexual content production serves multiple distinct purposes, including sexual exploration, creative expression, technical experimentation, and in a small number of cases the generation of non-consensual intimate imagery.

What carries the argument

Semi-structured interviews with 28 self-selected AIG-SC creators recruited from online communities, used to surface and categorize their stated methods and motivations.

If this is right

  • Governance efforts should differentiate between the majority of creators focused on exploration or creativity and the minority who produce non-consensual images.
  • Platform policies and AI tool design can target safeguards for non-consensual imagery while preserving space for consensual creative and technical uses.
  • The same foundation models and applications that enable personal experimentation also lower barriers for harmful content, requiring layered rather than blanket restrictions.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The findings imply that future work could test whether similar motivational patterns appear in creators of non-sexual AI-generated imagery.
  • Regulatory discussions might benefit from distinguishing hobbyist communities from commercial operators when setting liability rules.
  • Technical interventions such as consent-verification layers could be explored to reduce NCII without blocking other reported uses.

Load-bearing premise

The people who volunteered for interviews accurately described their own activities and reasons without significant distortion from social pressure or self-presentation concerns.

What would settle it

A larger-scale survey or analysis of public activity logs that finds the majority of AI-generated sexual content production is driven by motives not mentioned in the interviews, such as direct commercial sale of the content itself, would undermine the reported spectrum.

read the original abstract

AI-generated media is radically changing the way content is both consumed and produced on the internet, and in no place is this potentially more visible than in sexual content. AI-generated sexual content (AIG-SC) is increasingly enabled by an ecosystem of individual AI developers, specialized third-party applications, and foundation model providers. AIG-SC raises a number of concerns from older debates about the line between pornography and obscenity to newer debates about fair use and labor displacement (in this case, of sex workers), and has spurred new regulations to curb the spread of non-consensual intimate imagery (NCII) created using the same technology used to create AIG-SC. However, despite the growing prevalence of AIG-SC, little is known about its creators, their motivations, and what types of content they produce. To inform effective governance in this space, we conducted an in-depth study to understand what AIG-SC creators make, along with how and why they make it. Interviews with 28 AIG-SC creators, ranging from hobbyists to entrepreneurs to those who moderate communities of hundreds of thousands of other creators, revealed a wide spectrum of motivations, including sexual exploration, creative expression, technical experimentation, and in a handful of cases, the creation of NCII.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 1 minor

Summary. The paper reports findings from semi-structured interviews with 28 creators of AI-generated sexual content (AIG-SC). It describes the ecosystem of individual developers, third-party tools, and foundation models enabling such content, and identifies a spectrum of motivations including sexual exploration, creative expression, technical experimentation, and in a small number of cases the production of non-consensual intimate imagery (NCII). The work positions these insights as relevant for informing governance and regulation.

Significance. If the methodological limitations are resolved, the study supplies timely qualitative evidence on an emerging domain of AI use that intersects with ongoing policy debates around NCII, fair use, and labor impacts. The range of participant roles (hobbyists to community moderators) provides useful breadth to the reported motivations.

major comments (2)
  1. [Methods] Methods section: the description of recruitment, sampling frame, response rate, interview protocol, and thematic analysis procedures is insufficiently detailed. This leaves the risk of selection bias in the self-selected online-community sample unquantified and weakens the evidential basis for the claimed spectrum of motivations.
  2. [Results and Discussion] Results and Discussion: the finding that NCII creation occurs 'in a handful of cases' rests entirely on self-reported data. No information is provided on anonymity assurances, screening for social desirability bias, or any corroboration steps, which is a load-bearing concern for claims involving potentially illegal activities.
minor comments (1)
  1. [Abstract] The abstract and introduction could more explicitly state the study's qualitative and exploratory scope to manage reader expectations about generalizability.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for their constructive comments, which highlight important areas for improving transparency in our qualitative study. We address each major comment below and have made revisions to the manuscript to incorporate additional methodological details and caveats.

read point-by-point responses
  1. Referee: [Methods] Methods section: the description of recruitment, sampling frame, response rate, interview protocol, and thematic analysis procedures is insufficiently detailed. This leaves the risk of selection bias in the self-selected online-community sample unquantified and weakens the evidential basis for the claimed spectrum of motivations.

    Authors: We agree that the Methods section requires expansion for greater transparency. In the revised manuscript, we will add specifics on recruitment channels (online communities and forums where calls for participants were posted), the purposive sampling strategy used to capture a range of creator roles, the semi-structured interview protocol with its core question domains, and the thematic analysis procedures including codebook development and iterative theme refinement. Because recruitment occurred via open online advertisements without a closed sampling frame, a conventional response rate cannot be computed; we will explicitly state this limitation and describe steps taken to broaden participation across hobbyist, entrepreneurial, and moderator perspectives. These changes will better situate the reported motivations while acknowledging the inherent constraints of studying this population. revision: yes

  2. Referee: [Results and Discussion] Results and Discussion: the finding that NCII creation occurs 'in a handful of cases' rests entirely on self-reported data. No information is provided on anonymity assurances, screening for social desirability bias, or any corroboration steps, which is a load-bearing concern for claims involving potentially illegal activities.

    Authors: We accept that greater detail on data collection safeguards is needed. The revised Methods section will describe the anonymity and confidentiality measures employed, including pseudonym use, non-collection of identifying details, and secure encrypted storage. We did not apply dedicated screening instruments for social desirability bias, a common limitation in qualitative interviews on sensitive topics, and will note this explicitly. Corroboration was not feasible or appropriate under our IRB protocol, as it would risk breaching privacy or requiring access to private content. We will add a Limitations subsection discussing reliance on self-reports for this finding and will qualify the NCII observation more cautiously in Results and Discussion as exploratory and based on a small number of disclosures. revision: yes

Circularity Check

0 steps flagged

No significant circularity; claims rest on primary interview data

full rationale

The paper reports findings from semi-structured interviews with 28 AIG-SC creators recruited via online communities. The central claims about motivations (sexual exploration, creative expression, technical experimentation, and NCII in a handful of cases) are derived directly from thematic analysis of participant accounts rather than any mathematical derivation, fitted parameters, or self-referential predictions. No equations, self-definitional constructs, or load-bearing self-citations appear in the provided abstract or reader's summary. The study is self-contained as an empirical qualitative investigation relying on primary data collection, with no reduction of results to inputs by construction.

Axiom & Free-Parameter Ledger

0 free parameters · 0 axioms · 0 invented entities

This is a qualitative empirical study; it introduces no free parameters, mathematical axioms, or invented entities.

pith-pipeline@v0.9.0 · 5767 in / 1141 out tokens · 49903 ms · 2026-05-21T14:52:39.389225+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Characterizing Resource Sharing Practices on Underground Internet Forum Synthetic Non-Consensual Intimate Image Content Creation Communities

    cs.CY 2026-04 unverdicted novelty 6.0

    An empirical study of 4chan and Reddit data shows that users of varying technical skill share primary resources for SNCII creation and secondary resources for dissemination, with knowledge transfer from experts to new...

Reference graph

Works this paper leans on

151 extracted references · 151 canonical work pages · cited by 1 Pith paper · 4 internal anchors

  1. [1]

    18 U.S.C

    2003. 18 U.S.C. § 1466A Obscene Visual Representations of the Sexual Abuse of Children

  2. [2]

    Enough abuse. 2025. State Laws Criminalizing AI-generated or Computer-Edited CSAM

  3. [3]

    Stability AI. 2025. Acceptable Use Policy

  4. [4]

    Davey Alba and Cecilia D’Anastasio. 2024. Google Works to Reduce Non-Consensual Deepfake Porn in Search. Published: Bloomberg News

  5. [5]

    Apryl A Alexander. 2019. Sex for all: Sex positivity and intersectionality in clinical and counseling psychology.Journal of Black Sexuality and Relationships6, 1 (2019), 49–72

  6. [6]

    American Psychological Association. [n. d.]. Heteronormativity

  7. [7]

    Gramaccia

    Arnaud Anciaux and Julie A. Gramaccia. 2025. Imagining markets and crafting value: the emergence of an AI-generated pornographic content ecosystem.Porn Studies(May 2025), 1–16. doi:10.1080/23268743.2025.2492332

  8. [8]

    Anonymous, Danbooru community, and Gwern Branwen. 2022. Danbooru2021: A Large-Scale Crowdsourced & Tagged Anime Illustration Dataset

  9. [9]

    2023.Identity construction in the furry fandom

    Jessica R Austin. 2023.Identity construction in the furry fandom. PhD Thesis. Anglia Ruskin Research Online (ARRO)

  10. [10]

    Unlimited Realm of Exploration and Experimentation

    Anonymous Authors. 2025. “Unlimited Realm of Exploration and Experimentation”: Methods, Motivations, and Boundaries of Creators of AI-Generated Sexual Content - Replication Package

  11. [11]

    Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng, Qinglong Wang, Zhan Qin, Zhibo Wang, and Kui Ren. 2024. Surrogateprompt: Bypassing the safety filter of text-to-image models via substitution. InProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. 1166–1180

  12. [12]

    Linda R Baggett, Ethan Eisen, Sara Gonzalez-Rivas, Lacy A Olson, Rebecca P Cameron, and Linda R Mona. 2017. Sex-positive assessment and treatment among female trauma survivors.Journal of clinical psychology73, 8 (2017), 965–974

  13. [13]

    Margaret Baldwin. 1984. The sexuality of inequality: The Minneapolis pornography ordinance.Law & Ineq.2 (1984), 629

  14. [14]

    Andrew Beck. 2024. Anti-Abortion Extremists Want to Use the 150-Year-Old Comstock Act to Ban Abortion Nationwide. (May 2024). Published: American Civil Liberties Union

  15. [15]

    Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology.Qualitative research in psychology3, 2 (2006), 77–101

  16. [16]

    Violation of my {body:}

    Natalie Grace Brigham, Miranda Wei, Tadayoshi Kohno, and Elissa M Redmiles. 2024. " Violation of my {body:}" Perceptions of {AI-generated} non-consensual (intimate) imagery. InTwentieth Symposium on Usable Privacy and Security (SOUPS 2024). 373–392

  17. [17]

    Yvette Butler, Chibundo Egwuatu, Matthew Canham, and Ben D. Sawyer. 2025. Sex worker human digital twins and intellectual property: on collaborative futures for sex thinkers, technologists, and lawyers.Porn Studies(April 2025), 1–16. doi:10.1080/23268743.2025.2466612

  18. [18]

    Moira Carmody. 2005. Ethical erotics: Reconceptualizing anti-rape education.Sexualities8, 4 (2005), 465–480

  19. [19]

    Center for Democracy & Technology. 2025. TAKE IT DOWN Act Sign-On Letter: Concerns Regarding S. 146. Published: PDF letter submitted to U.S. Senate

  20. [20]

    Unlimited Realm of Exploration and Experimentation

    Bilva Chandra, Jesse Dunietz, and Kathleen Roberts. 2024. Reducing Risks Posed by Synthetic Content An Overview of Technical Approaches to Digital Content Transparency. doi:10.6028/NIST.AI.100-4 PREPRINT. “Unlimited Realm of Exploration and Experimentation”: Methods and Motivations of AI-Generated Sexual Content Creators 25

  21. [21]

    Cohee and Ross. 2025. SillyTavern. https://sillytavernai.com/

  22. [22]

    Comfy Org. 2025. Comfy UI. https://www.comfy.org/

  23. [23]

    2019.Sex therapy with erotically marginalized clients: Nine principles of clinical support

    Damon Constantinides, Shannon Sennott, and Davis Chandler. 2019.Sex therapy with erotically marginalized clients: Nine principles of clinical support. Routledge

  24. [24]

    2006.Using verbatim quotations in reporting qualitative social research: researchers’ views

    Anne Corden, Roy Sainsbury, and others. 2006.Using verbatim quotations in reporting qualitative social research: researchers’ views. University of York York

  25. [25]

    Gloria Cowan, Carole Lee, Daniella Levy, and Debra Snyder. 1988. Dominance and inequality in X-rated videocassettes.Psychology of Women Quarterly12, 3 (1988), 299–311

  26. [26]

    Malcolm Cowburn. 2005. Confidentiality and public protection: Ethical dilemmas in qualitative research with adult male sex offenders.Journal of sexual aggression11, 1 (2005), 49–63

  27. [27]

    Evaluating Concept Filtering Defenses against Child Sexual Abuse Material Generation by Text-to-Image Models

    Ana-Maria Cretu, Klim Kireev, Amro Abdalla, Wisdom Obinna, Raphael Meier, Sarah Adel Bargal, Elissa M. Redmiles, and Carmela Troncoso. 2025. Evaluating Concept Filtering Defenses against Child Sexual Abuse Material Generation by Text-to-Image Models. https://arxiv.org/abs/2512.05707 _eprint: 2512.05707

  28. [28]

    Iliana Depounti, Paula Saukko, and Simone Natale. 2023. Ideal technologies, ideal women: AI and gender imaginaries in Redditors’ discussions on the Replika bot girlfriend.Media, Culture & Society45, 4 (May 2023), 720–736. doi:10.1177/01634437221119021

  29. [29]

    Brenda Dvoskin. 2023. Speaking Back to Sexual Privacy Invasions.SSRN Electronic Journal(2023). doi:10.2139/ssrn.4380748

  30. [30]

    Nicola M Döring. 2009. The Internet’s impact on sexuality: A critical review of 15 years of research.Computers in Human Behavior25, 5 (2009), 1089–1101

  31. [31]

    Eaton, Adrian J

    Asia A. Eaton, Adrian J. Scott, Asher Flynn, and Anastasia Powell. 2026. Perceptions of sexualized deepfake abuse across three nations: An exploration of how victim gender and race shape attitudes towards deepfake abuse in the United States, the United Kingdom, and Australia. Computers in Human Behavior177 (April 2026), 108899. doi:10.1016/j.chb.2025.108899

  32. [32]

    Benj Edwards. 2025. ChatGPT Can Now Write Erotica as OpenAI Eases Up on AI Paternalism

  33. [33]

    Serge Egelman, Cormac Herley, and Paul C Van Oorschot. 2013. Markets for zero-day exploits: Ethics and implications. InProceedings of the 2013 New Security Paradigms Workshop. 41–46

  34. [34]

    Emanuel Maiberg. 2023. Inside the AI Porn Marketplace Where Everything and Everyone Is for Sale.404 Media(Aug. 2023). https://www.404media. co/inside-the-ai-porn-marketplace-where-everything-and-everyone-is-for-sale/

  35. [35]

    Emanuel Maiberg and Jason Koebler. 2024. Inside the Booming ’AI Pimping’ Industry.404 Media(Nov. 2024). https://www.404media.co/inside- the-booming-ai-pimping-industry-3/

  36. [36]

    FBI. 2024. Child Sexual Abuse Material Created by Generative AI and Similar Online Tools is Illegal

  37. [37]

    Dawn Fisher. 2002. Adult sex offenders: who are they? Why and how do they do it? InSexual offending against children. Routledge, 1–24

  38. [38]

    Asher Flynn, Elena Cama, Anastasia Powell, and Adrian J. Scott. 2023. Victim-blaming and image-based sexual abuse.Journal of Criminology56, 1 (2023), 7–25. doi:10.1177/26338076221135327 _eprint: https://doi.org/10.1177/26338076221135327

  39. [39]

    Asher Flynn, Anastasia Powell, Asia Eaton, and Adrian J. Scott. 2025. Sexualized Deepfake Abuse: Perpetrator and Victim Perspectives on the Motivations and Forms of Non-Consensually Created and Shared Sexualized Deepfake Imagery.Journal of Interpersonal Violence(Sept. 2025), 08862605251368834. doi:10.1177/08862605251368834

  40. [40]

    Agence France-Presse. 2025. OpenAI will allow verified adults to use ChatGPT to generate erotic content

  41. [41]

    A Stalker’s Paradise

    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. “A Stalker’s Paradise”: How Intimate Partner Abusers Exploit Technology. InProceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, Montreal QC Canada, 1–13. doi:10.1145/3173574.3174241

  42. [42]

    P Brooks Fuller, Kyla P Garrett Wagner, and Farnosh Mazandarani. 2019. Porn wars: Serious value, social harm, and the burdens of modern obscenity doctrine.Am. UJ Gender Soc. Pol’y & L.28 (2019), 121

  43. [43]

    Deep Ganguli, Liane Lovitt, Jackson Kernion, Amanda Askell, Yuntao Bai, Saurav Kadavath, Ben Mann, Ethan Perez, Nicholas Schiefer, Kamal Ndousse, and others. 2022. Red teaming language models to reduce harms: Methods, scaling behaviors, and lessons learned.arXiv preprint arXiv:2209.07858(2022)

  44. [44]

    PA Office of Attorney General. 2025. AG Sunday Leads Bipartisan Coalition Urging Search Engine, Payment App Companies to Stop the Spread of ‘Deepfake’ Videos and Photos

  45. [45]

    Cassidy Gibson, Daniel Olszewski, Natalie Grace Brigham, Anna Crowder, Kevin RB Butler, Patrick Traynor, Elissa M Redmiles, and Tadayoshi Kohno. 2025. Analyzing the {AI} Nudification Application Ecosystem. In34th USENIX Security Symposium (USENIX Security 25). 1–20

  46. [46]

    Tarleton Gillespie, Ryland Shaw, Mary L Gray, and Jina Suh. 2024. AI red-teaming is a sociotechnical challenge: on values, labor, and harms.arXiv preprint arXiv:2412.09751(2024)

  47. [47]

    Trystan S Goetze. 2024. AI art is theft: Labour, extraction, and exploitation: Or, on the dangers of stochastic Pollocks. InProceedings of the 2024 ACM Conference on Fairness, Accountability, and Transparency. 186–196

  48. [48]

    Google. 2025. Gemini App Policy Guidelines

  49. [49]

    Joshua B Grubbs, Christopher G Floyd, and Shane W Kraus. 2023. Pornography use and public health: examining the importance of online sexual behavior in the health sciences.American Journal of Public Health113, 1 (2023), 22–26. PREPRINT. Manuscript submitted to ACM 26 Mink et al

  50. [50]

    Joshua B Grubbs and Shane W Kraus. 2021. Pornography use and psychological science: A call for consideration.Current Directions in Psychological Science30, 1 (2021), 68–75. Publisher: Sage Publications Sage CA: Los Angeles, CA

  51. [51]

    Rose E Guingrich and Michael S A Graziano. 2025. Chatbots as Social Companions: How People Perceive Consciousness, Human Likeness, and Social Health Benefits in Machines. InOxford Intersections: AI in Society(1 ed.), Philipp Hacker (Ed.). Oxford University PressOxford. doi:10.1093/9780198945215.003.0011

  52. [52]

    Catherine Han, Anne Li, Deepak Kumar, and Zakir Durumeric. 2025. Characterizing the {MrDeepFakes} Sexual Deepfake Marketplace. In34th USENIX Security Symposium (USENIX Security 25). 5169–5188

  53. [53]

    Replika Removing Erotic Role-Play Is Like Grand Theft Auto Removing Guns or Cars

    Kenneth R. Hanson and Hannah Bolthouse. 2024. “Replika Removing Erotic Role-Play Is Like Grand Theft Auto Removing Guns or Cars”: Reddit Discourse on Artificial Intelligence Chatbots and Sexual Technologies.Socius: Sociological Research for a Dynamic World10 (Jan. 2024), 23780231241259627. doi:10.1177/23780231241259627

  54. [54]

    Guy Harling, Michael M Chanda, Katrina F Ortblad, Magdalene Mwale, Steven Chongo, Catherine Kanchele, Nyambe Kamungoma, Leah G Barresi, Till Bärnighausen, and Catherine E Oldenburg. 2019. The influence of interviewers on survey responses among female sex workers in Zambia. BMC medical research methodology19, 1 (2019), 60

  55. [55]

    Will Hawkins, Brent Mittelstadt, and Chris Russell. 2025. Deepfakes on Demand: The rise of accessible non-consensual deepfake image generators. InProceedings of the 2025 ACM Conference on Fairness, Accountability, and Transparency (FAccT ’25). Association for Computing Machinery, New York, NY, USA, 1602–1614. doi:10.1145/3715275.3732107

  56. [56]

    Jeff Hearn, Kjerstin Andersson, and Malcolm Cowburn. 2007. Background paper on guidelines for researchers on doing research with perpetrators of sexual violence. (2007)

  57. [57]

    Nicola Henry and Gemma Beard. 2024. Image-based sexual abuse perpetration: A scoping review.Trauma, Violence, & Abuse25, 5 (2024), 3981–3998

  58. [58]

    Nicola Henry, Clare McGlynn, Asher Flynn, Kelly Johnson, Anastasia Powell, and Adrian J. Scott. 2021.Image-based sexual abuse: A study on the causes and consequences of non-consensual nude or sexual imagery. Routledge, Abingdon, Oxon

  59. [59]

    Cara Herbitter, Michelle D Vaughan, and David W Pantalone. 2024. Mental health provider bias and clinical competence in addressing asexuality, consensual non-monogamy, and BDSM: A narrative review.Sexual and Relationship Therapy39, 1 (2024), 131–154

  60. [60]

    Leo Herrera. 2025. Synthetic Genres 2. https://leoherrera.substack.com/p/synthetic-genres-2

  61. [61]

    2005.Hacks, cracks, and crime: An examination of the subculture and social organization of computer hackers

    Thomas J Holt. 2005.Hacks, cracks, and crime: An examination of the subculture and social organization of computer hackers. University of Missouri-Saint Louis

  62. [62]

    2017.The cert guide to coordinated vulnerability disclosure

    Allen D Householder, Garret Wassermann, Art Manion, and Chris King. 2017.The cert guide to coordinated vulnerability disclosure. Technical Report

  63. [63]

    Edward J Hu, Yelong Shen, Phillip Wallis, Zeyuan Allen-Zhu, Yuanzhi Li, Shean Wang, Lu Wang, and Weizhu Chen. 2022. Lora: Low-rank adaptation of large language models.ICLR(2022)

  64. [64]

    2012.Ethical and safety recommendations for research on perpetration of sexual violence

    Sexual Violence Research Initiative, Rachel Jewkes, Elizabeth Dartnall, Yandisa Sikweyiya, and others. 2012.Ethical and safety recommendations for research on perpetration of sexual violence. Sexual Violence Research Initiative, Medical Research Council

  65. [65]

    2023.How AI is being abused to create child sexual abuse imagery

    Internet Watch Foundation. 2023.How AI is being abused to create child sexual abuse imagery. Technical Report. Internet Watch Foundation

  66. [66]

    Chantelle Ivanski and Taylor Kohut. 2017. Exploring definitions of sex positivity through thematic analysis.The Canadian Journal of Human Sexuality26, 3 (2017), 216–225

  67. [67]

    Jiang, Lauren Brown, Jessica Cheng, Mehtab Khan, Abhishek Gupta, Deja Workman, Alex Hanna, Johnathan Flowers, and Timnit Gebru

    Harry H. Jiang, Lauren Brown, Jessica Cheng, Mehtab Khan, Abhishek Gupta, Deja Workman, Alex Hanna, Johnathan Flowers, and Timnit Gebru

  68. [68]

    InProceedings of the 2023 AAAI/ACM Conference on AI, Ethics, and Society

    AI Art and its Impact on Artists. InProceedings of the 2023 AAAI/ACM Conference on AI, Ethics, and Society. ACM, Montréal QC Canada, 363–374. doi:10.1145/3600211.3604681

  69. [69]

    Josefina Jiménez Aceves and Laura Tarzia. 2024. Understanding the perspectives and experiences of male perpetrators of sexual violence against women: A scoping review and thematic synthesis.Trauma, Violence, & Abuse25, 4 (2024), 3226–3240

  70. [70]

    2004.Hacktivism and cyberwars: Rebels with a cause?Routledge

    Tim Jordan and Paul Taylor. 2004.Hacktivism and cyberwars: Rebels with a cause?Routledge

  71. [71]

    Yuval Karniel and Haim Wismonsky. 2004. Pornography, Community and the Internet-Freedom of Speech and Obscenity on the Internet.Rutgers Computer & Tech. LJ30 (2004), 105

  72. [72]

    Klim Kireev, Ana-Maria Creţu, Raphael Meier, Sarah Adel Bargal, Elissa Redmiles, and Carmela Troncoso. 2025. A Manually Annotated Image- Caption Dataset for Detecting Children in the Wild.arXiv preprint arXiv:2506.10117(2025)

  73. [73]

    Chuck Kleinhans. 2006. The Change from Film to Video Pornography: Implications for Analysis. InPornography: Film and Culture, Peter Lehman (Ed.). Rutgers University Press, New Brunswick, NJ, 154–167

  74. [74]

    Tadayoshi Kohno, Yasemin Acar, and Wulf Loh. 2023. Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. InUSENIX Security

  75. [75]

    Emmanouela Kokolaki and Paraskevi Fragopoulou. 2025. Unveiling AI’s Threats to Child Protection: Regulatory efforts to Criminalize AI-Generated CSAM and Emerging Children’s Rights Violations.arXiv preprint arXiv:2503.00433(2025)

  76. [76]

    Six Silberman, Reuben Binns, Jun Zhao, and Asia J

    Lin Kyi, Amruta Mahuli, M. Six Silberman, Reuben Binns, Jun Zhao, and Asia J. Biega. 2025. Governance of Generative AI in Creative Work: Consent, Credit, Compensation, and Beyond. InProceedings of the 2025 CHI Conference on Human Factors in Computing Systems. ACM, Yokohama Japan, 1–16. doi:10.1145/3706598.3713799

  77. [77]

    Unlimited Realm of Exploration and Experimentation

    Kyle Wiggers and Amanda Silberling. 2022. Meet Unstable Diffusion, the group trying to monetize AI porn generators.TechCrunch(Nov. 2022). https://techcrunch.com/2022/11/17/meet-unstable-diffusion-the-group-trying-to-monetize-ai-porn-generators/ PREPRINT. “Unlimited Realm of Exploration and Experimentation”: Methods and Motivations of AI-Generated Sexual C...

  78. [78]

    Linnea Laestadius, Andrea Bishop, Michael Gonzalez, Diana Illenčík, and Celeste Campos-Castillo. 2024. Too human and not human enough: A grounded theory analysis of mental health harms from emotional dependence on the social chatbot Replika.New Media & Society26, 10 (Oct. 2024), 5923–5941. doi:10.1177/14614448221142007

  79. [79]

    1984.Hackers: Heroes of the computer revolution

    Steven Levy. 1984.Hackers: Heroes of the computer revolution. Vol. 14. Anchor Press/Doubleday Garden City, NY

  80. [80]

    Li Fe-Fei, Fergus, and Perona. 2003. A Bayesian approach to unsupervised one-shot learning of object categories. InProceedings Ninth IEEE International Conference on Computer Vision. IEEE, Nice, France, 1134–1141 vol.2. doi:10.1109/ICCV.2003.1238476

Showing first 80 references.