465
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Peeping Wang: A Bird’s Eye View on Video Voyeurism among Chinese Men Attracted to Men

ORCID Icon

References

  • American Psychiatric Association. (2013). Diagnostic and statistical manual of mental disorder (5thed.) . Arlington, VA: American Psychiatric Association .
  • Antonopoulos, G., & Winterdyk, J. (2005). Techniques of neutralizing the trafficking of women: A case study of an active trafficker in Greece. European Journal of Crime, Criminal Law and Criminal Justice, 13(2), 136–147. https://doi.org/10.1163/1571817054300602
  • Bates, S. (2017). Revenge porn and mental health: A qualitative analysis of the mental health effects of revenge porn on female survivors. Feminist Criminology, 12(1), 22–42. https://doi.org/10.1177/1557085116654565
  • Bell, V., Hemmens, C., & Steiner, B. (2006). Up skirts and down blouses: A statutory analysis of legislative responses to video voyeurism. Criminal Justice Studies, 19(3), 301–314. https://doi.org/10.1080/14786010600921746
  • Boyle, K. M., & Walker, L. S. (2016). The neutralization and denial of sexual violence in college party subculture. Deviant Behavior, 37(12), 1392–1410. https://doi.org/10.1080/01639625.2016.1185862
  • Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101. https://doi.org/10.1191/1478088706qp063oa
  • Burns, A. (2018). Creepshots and power: Covert sexualised photography, online communities and maintenance of gender inequality. In M. Bohr & B. Sliwinska (Eds.), The evolution of the image: Political action and the digital self (pp. 27–40). Routledge.
  • Calvert, C., & Brown, J. (2000). Video voyeurism, privacy, and the internet: Exposing peeping toms in cyberspace. Cardozo Arts & Entertainment Law Journal, 18 (3) , 469–568 https://heinonline.org/HOL/LandingPage?handle=hein.journals/caelj18&div=19&id=&page=.
  • Carrabine, E. (2014). Seeing things: Violence, voyeurism and the camera. Theoretical Criminology, 18(2), 134–158. https://doi.org/10.1177/1362480613508425
  • Carrillo, H. (2018). Pathways of desire: The sexual migration of Mexican gay men. University of Chicago Press.
  • Chan, J. (2018). Violence or pleasure? Surveillance and the (non-)consensual upskirt. Porn Studies, 5(3), 315–355. https://doi.org/10.1080/23268743.2018.1472035
  • Chen, Y. C., & Tyron, G. S. (2012). Dual minority stress and Asian American gay men’s psychological distress. Journal of Community Psychology, 40(5), 539–554. https://doi.org/10.1002/jcop.21481
  • China Central Television [CCTV] News. (2019, November 21). “无孔不入”的偷拍?抓![“Ubiquitous” video voyeurism? Arrest them!].
  • Choi, K. H., Paul, J., Ayala, G., Boylan, R., & Gregorich, S. E. (2013). Experiences of discrimination and their impact on the mental health among African American, Asian and Pacific Islander, and Latino men who have sex with men. American Journal of Public Health, 103(5), 868–874. https://doi.org/10.2105/AJPH.2012.301052
  • Chou, W. S. (2001). Homosexuality and the cultural politics of tongzhi in Chinese societies. Journal of Homosexuality, 40(3), 27–46. https://doi.org/10.1300/J082v40n03_03
  • Coleman, J. (1987). Toward an integrated theory of white collar crime. American Journal of Sociology, 93(2), 406–439. https://doi.org/10.1086/228750
  • DeYoung, M. (1988). The indignant page: Techniques of neutralization in the publications of paedophile organisations. Child Abuse & Neglect, 12(4), 583–591. https://doi.org/10.1016/0145-2134(88)90076-2
  • Dobson, A. S., & Ringrose, J. (2016). Sext education: Pedagogies of sex, gender and shame in the schoolyards of tagged and exposed. Sex Education, 16(1), 8–21. https://doi.org/10.1080/14681811.2015.1050486
  • Durkin, K. F., & Bryant, C. D. (1995). “Log on to sex”: Some notes on the carnal computer and erotic cyberspace as an emerging research frontier. Deviant Behavior, 16(3), 179–200. https://doi.org/10.1080/01639625.1995.9967998
  • Durkin, K. F., & Bryant, C. D. (1999). Propagandizing pederasty: A thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles. Deviant Behavior, 20(2), 103–127. https://doi.org/10.1080/016396299266524
  • Durkin, K. F. (1997). Misuse of the Internet by pedophiles: Implications for law enforcement and probation practice. Federal Probation, 61 (3) , 14–18 https://heinonline.org/HOL/LandingPage?handle=hein.journals/fedpro61&div=45&id=&page=.
  • Durkin, K. F. (2007). Show me the money: Cybershrews and on-line money masochists. Deviant Behavior, 28(4), 355–378. https://doi.org/10.1080/01639620701233290
  • Eaton, A. A., & McGlynn, C. (2020). The psychology of nonconsensual porn: Understanding and addressing a growing form of sexual violence. Policy Insights from the Behavioral and Brain Sciences, 7(2), 190–197. https://doi.org/10.1177/2372732220941534
  • Fisher, W. A., & Barak, A. (2001). Internet pornography: A social psychological perspective on Internet sexuality. Journal of Sex Research, 38(4), 312–323. https://doi.org/10.1080/00224490109552102
  • Hall, M., & Hearn, J. (2018). Revenge pornography: Gender, sexualities and motivations. Routledge.
  • Han, C. S. (2008). No fats, femmes, or Asians: The unitality of critical race theory in examining the role of gay stock stories in the marginalization of gay Asian men. Contemporary Justice Review, 11(1), 11–22. https://doi.org/10.1080/10282580701850355
  • Henry, N., & Flynn, A. (2019). Image-based sexual abuse: Online distribution channels and illicit communities of support. Violence Against Women, 25(16), 1932–1955. https://doi.org/10.1177/1077801219863881
  • Henry, S. (1990). Degrees of deviance, student accounts of their deviant behavior. Sheffield Publishing.
  • Holt, T. J., Blevins, K. R., & Burkert, N. (2010). Considering the pedophile subculture online. Sexual Abuse: A Journal of Research and Treatment, 22(1), 3–24. https://doi.org/10.1177/1079063209344979
  • Holt, T. J., & Blevins, K. R. (2007). Examining sex work from the client’s perspective: Assessing johns using on-line data. Deviant Behavior, 28(4), 333–354. https://doi.org/10.1080/01639620701233282
  • Holtz, P., Kronberger, N., & Wagner, W. (2012). Analyzing internet forums: A practical guide. Journal of Media Psychology, 24(2), 55–66. https://doi.org/10.1027/1864-1105/a000062
  • Hsieh, H. F., & Shannon, S. E. (2005). Three approaches to qualitative content analysis. Qualitative Health Research, 15(9), 1277–1288. https://doi.org/10.1177/1049732305276687
  • Huang, H. T. (2011). Queer politics and sexual modernity in Taiwan. Hong Kong University Press.
  • Jacobs, K. (2020). Smouldering pornographies on the Chinese internet. Porn Studies, 7(3), 337–345. https://doi.org/10.1080/23268743.2020.1776151
  • Kara, S. (2009). Sex trafficking: Inside the business of modern slavery. Columbia University Press.
  • Klockars, C. B. (1974). The professional fence. Free Press.
  • Kong, T. S. K. (2016). The sexual in Chinese sociology: Homosexuality studies in contemporary China. The Sociological Review, 64(3), 495–514. https://doi.org/10.1111/1467-954X.12372
  • Kong, T. S. K. (2019). Oral histories of older gay men in Hong Kong: Unspoken but unforgotten.
  • Långström, N., & Seto, M. C. (2006). Exhibitionistic and voyeuristic behavior in a Swedish national population survey. Archives of Sexual Behavior, 35(4), 427–435. https://doi.org/10.1007/s10508-006-9042-6
  • Långström, N. (2010). The DSM diagnostic criteria for exhibitionism, voyeurism, and frotteurism. Archives of Sexual Behavior, 39(2), 317–324. https://doi.org/10.1007/s10508-009-9577-4
  • Lim, S. J., & Cheah, S. X. (2020). Do you know how to Cheong? Neutralization techniques adopted by new clients of sex workers. Sexologies, 29(1), e1–e9. https://doi.org/10.1016/j.sexol.2019.10.003
  • Lin, K., Button, D. M., Su, M., & Chen, S. (2016). Chinese college students’ attitudes toward homosexuality: Exploring the effects of traditional culture and modernizing factors. Sexuality Research and Social Policy, 13(2), 158–172. https://doi.org/10.1007/s13178-016-0223-3
  • Liu, G., & Xian, F. (2005). Techniques of neutralization theory and study of juvenile delinquency. Journal of Yantai University (Philosophy and Social Science), 18(4), 384–487 https://en.cnki.com.cn/Article_en/CJFDTotal-YTXS200504004.htm.
  • Lu, H., & Liu, Y. (2017). 大学生厌学现象矫正——基于中和技术理论与惩罚理论视角 [Correcting college students’ school-weariness: On techniques of neutralization and Pratt and Cullen’s expansion of the general theory of crime]. China Youth Study, (11) , 92–98 https://www.cnki.com.cn/Article/CJFDTOTAL-ZGQL201711015.htm.
  • Maruna, S., & Copes, H. (2005). What have we learned from five decades of neutralization research? Crime and Justice, 32, 221–320. https://doi.org/10.1086/655355
  • McCann, W., Pedneault, A., Stohr, M. K., & Hemmens, C. (2018). Upskirting: A statutory analysis of legislative responses to video voyeurism 10 years down the road. Criminal Justice Review, 43(4), 399–418. https://doi.org/10.1177/0734016817741342
  • McGlynn, C., Johnson, K., Rackley, E., Henry, N., Gavey, N., Flynn, A., & Powell, A. (2021). “It’s torture for the soul”: The harms of image-based sexual abuse. Social & Legal Studies, 30(4), 541–562. https://doi.org/10.1177/0964663920947791
  • McGlynn, C., & Rackley, E. (2017a). Image-based sexual abuse. Oxford Journal of Legal Studies, 37(3), 534–561. https://doi.org/10.1093/ojls/gqw033
  • McGlynn, C., & Rackley, E. (2017b). More than “revenge porn”: Image-based sexual abuse and the reform of Irish law. Irish Probation Journal, 14, 38–51 http://www.probation.ie/EN/PB/0/12D6F4D1961C4695802581D0003D92D9/$File/ClareMcGlynn_ErikaRackley_IPJ.pdf.
  • Merritt, A. C., Effron, D. A., & Monin, B. (2010). Moral self-licensing: When being good frees us to be bad. Social and Personality Psychology Compass, 4(5), 344–357. https://doi.org/10.1111/j.1751-9004.2010.00263.x
  • Mitchell, K. J., Finkelhor, D., & Wolak, J. (2003). The exposure of youth to unwanted sexual material on the Internet: A national survey of risk, impact, and prevention. Youth & Society, 34(3), 330–358. https://doi.org/10.1177/0044118X02250123
  • O’Halloran, E., & Quayle, E. (2010). A content analysis of a “boy love” support forum: Revisiting Durkin and Bryant. Journal of Sexual Aggression, 16(1), 71–85. https://doi.org/10.1080/13552600903395319
  • Peretti-Watel, P. (2003). Neutralization theory of the denial of risk: Some evidence from cannabis use among French adolescents. British Journal of Sociology, 54(1), 21–42. https://doi.org/10.1080/0007131032000045888
  • Piquero, N. L., Tibbetts, S. G., & Blakenship, M. B. (2005). Examining the role of differential association and techniques of neutralization in explaining corporate crime. Deviant Behavior, 26(2), 159–188. https://doi.org/10.1080/01639620590881930
  • Quinn, J. F., & Forsyth, C. J. (2005). Describing sexual behavior in the era of the Internet: A typology for empirical research. Deviant Behavior, 26(3), 191–207. https://doi.org/10.1080/01639620590888285
  • Rolfe, S. M., & Schroeder, R. D. (2017). “Sticks and stones may break my bones, but words will never hurt me”: Verbal sexual harassment among middle school students. Journal of Interpersonal Violence, 35(17/18), 3462–3486. https://doi.org/10.1177/0886260517709802
  • Scott, M. B., & Lyman, S. (1968). Accounts. American Sociological Review, 33(1), 46–62. https://doi.org/10.2307/2092239
  • Stroud, S. R. (2014). The dark side of the online self: A pragmatist critique of the growing plague of revenge porn. Journal of Mass Media Ethics, 29(3), 168–183. https://doi.org/10.1080/08900523.2014.917976
  • Sykes, G., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670. https://doi.org/10.2307/2089195
  • Templeman, T. L., & Stinnett, R. D. (1991). Patterns of sexual arousal and history in a “normal” sample of young men. Archives of Sexual Behavior, 20(2), 137–150. https://doi.org/10.1007/BF01541940
  • Tewksbury, R., & Lapsey, D. (2018). It’s more than just a big dick: Desires, experiences, and how male escorts satisfy their customers. Deviant Behavior, 39(1), 126–135. https://doi.org/10.1080/01639625.2016.1263076
  • Tewksbury, R. (2003). Bareback sex and the quest for HIV: Assessing the relationship in internet personal advertisements of men who have sex with men. Deviant Behavior, 24(5), 467–482. https://doi.org/10.1080/713840245
  • Thompson, C., & Wood, M. A. (2018). A media archaeology of the creepshot. Feminist Media Studies, 18(4), 560–574. h ttps://d#x2006;oi.org/14680777.20#x2006;18.1447429. https://doi.org/10.1080/14680777.2018.1447429
  • Winder, B., Gough, B., & Seymour-Smith, S. (2015). Stumbling into sexual crime: The passive perpetrator in accounts by male internet sex offenders. Archives of Sexual Behavior, 44(1), 167–180. https://doi.org/10.1007/s10508-014-0302-6
  • Yu, S. (2013). Digital piracy justification: Asian students versus American students. International Criminal Justice Review, 23(2), 185–196. https://doi.org/10.1177/1057567713485416
  • Zhang, H., Ding, M., & Zhang, Z. (2018). 领导非权变惩罚, 员工道德推脱与越轨行为——基于中和技术理论 [Leader’s non-contingent punishment, employee’s moral disengagement and deviant behaviors: Based on neutralization techniques theory]. Contemporary Finance & Economics, (11) , 68–77 http://www.ncpssd.org/Literature/articleinfo.aspx?id=NjEwMDAzNjA5Mw==&type=am91cm5hbEFydGljbGU=&datatype=am91cm5hbEFydGljbGU=&typename=5Lit5paH5pyf5YiK5paH56ug&nav=0&barcodenum=.
  • Zheng, T. (2015). Tongzhi living: Men attracted to men in postsocialist China. University of Minnesota Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.