References
- Bates, S. (2017). Revenge porn and mental health: A qualitative analysis of the mental health effects of revenge porn on female survivors. Feminist Criminology, 12(1), 22–42. doi:10.1177/1557085116654565
- Belot, H. (2017, January 24). Cyber security ‘the new frontier of warfare, espionage’, Malcolm Turnbull says. ABC News. Retrieved March 27, 2018, from http://www.abc.net.au/news/2017-01-24/turnbull-declares-cyber-security-the-new-frontier-of-warfare/8207494
- Bond, E., & Tyrrell, K. (2018). Understanding revenge pornography: A national survey of police officers and staff in England and Wales. Journal of Interpersonal Violence, Online. Retrieved from https://doi.org/10.1177/0886260518760011
- Bossler, A. M., & Holt, T. J. (2012). Patrol officers’ perceived role in responding to cybercrime. Policing: an International Journal of Police Strategies & Management, 35(1), 165–181.
- Branch, K., Hilinski-Rosick, C. M., Johnson, E., & Solano, G. (2017). Revenge porn victimization of college students in the United States: An exploratory analysis. International Journal of Cyber Criminology, 11(1), 128–142.
- Broadhurst, R. (2006). Developments in the global law enforcement of cyber-crime. Policing: an International Journal of Police Strategies & Management, 29(3), 408–433.
- Brown, C. (2015). Investigating and prosecuting cybercrime: Forensic dependencies and barriers to justice. International Journal of Cyber Criminology, 9(1), 55–119.
- Center, P. R. (2017, August). Globally, people point to ISIS and climate change as leading security threats (Research Report No. 202.419.4372). Retrieved March 27, 2018, from http://www.pewglobal.org/2017/08/01/globally-people-point-to-isis-and-climate-change-as-leading-security-threats/
- Citron, D. K., & Franks, M. A. (2014). Criminalizing revenge porn. Wake Forest Law Review, 49(2): 345–391.
- Crenshaw, K. (1991). Mapping the margins: Intersectionality, identity politics, and violence against women of color. Stanford Law Review, 43(6), 1241–1299.
- Davidson, J. C., & Martellozzo, E. (2008). Protecting vulnerable young people in cyberspace from sexual abuse: Raising awareness and responding globally. Police Practice and Research: an International Journal, 9(4): 277–289.
- Dir, A. L., & Cyders, M. A. (2015). Risks, risk factors, and outcomes associated with phone and Internet sexting among university students in the United States. Archives of Sexual Behavior, 44(6), 1675–1684.
- Franks, M. A. (2015, June 22). How to defeat ‘revenge porn’: First, recognize it’s about privacy, not revenge. Huffington Post. Retrieved March 27, 2018, from http://www.huffingtonpost.com/mary-anne-franks/how-to-defeat-revenge-porn_b_7624900.html
- Hanmer, J., Ratford, J., & Stanko, E. A. (1989). Women, policing, and male violence: International perspectives. London, New York: Routledge.
- Henry, N., & Powell, A. (2016). Sexual violence in the digital age: The scope and limits of criminal law. Social & Legal Studies, 25(4), 397–418.
- Henry, N., Powell, A., & Flynn, A. (2017). Not just ‘revenge pornography’: Australians’ experiences of image-based abuse: A summary report. Melbourne: RMIT University.
- Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20–40.
- Jordan, J. (2008). Perfect victims, perfect policing? Improving rape complainant’s experiences of police investigations. Public Administration, 86(3), 699–719.
- Kelly, L. (1988). Surviving sexual violence. Cambridge, UK: Polity Press.
- McGlynn, C., & Rackley, E. (2016, February 15). Not ‘revenge porn,’ but abuse: Let’s call it image-based sexual abuse. Inherently Human. Retrieved March 27, 2018, from https://inherentlyhuman.wordpress.com/2016/02/15/not-revenge-porn-but-abuse-lets-call-it-image-based-sexual-abuse/
- Menjívar, C., & Salcido, O. (2002). Immigrant women and domestic violence: Common experiences in different countries. Gender & Society, 16(6), 898–920.
- Office of the eSafety Commissioner (OeSC) (2017). National Survey on image-based abuse in Australia. Report prepared for the Office of the eSafety Commissioner. Melbourne: RMIT University.
- Powell, A., Henry, N., & Flynn, A. (2018). Image-based sexual abuse. In W. S. DeKeseredy & M. Dragiewicz (Eds.), Handbook of critical criminology. New York, NY: Routledge.
- Powell, A., & Henry, N. (2016). Policing technology-facilitated sexual violence against adult victims: Police and service sector perspectives. Policing & Society. Online. doi: 10.1080/10439463.2016.1154964
- Powell, A., & Henry, N. (2017). Sexual violence in a digital age. Basingstoke, UK: Palgrave Macmillan.
- Ringrose, J., & Renold, E. (2012). Slut-shaming, girl power and ‘sexualisation’: Thinking through the politics of the international SlutWalks with teen girls. Gender and Education, 24(3), 333–343.
- Venema, R. M. (2016). Making judgments: How blame mediates the influence of rape myth acceptance in police response to sexual assault. Journal of Interpersonal Violence, Online. doi: 10.1177/0886260516662437
- Vincze, E. A. (2016). Challenges in digital forensics. Police Practice and Research, 17(2), 183–194.
- Wall, D. (2007). Cybercrime: The transformation of crime in the information age (Vol. 4). Cambridge, UK: Polity.
- Wolak, J., & Finkelhor, D. (2016). Sextortion: Findings from an online survey about threats to expose sexual images. Crimes Against Children Research Centre, University of New Hampshire. Retrieved March 27, 2018, from http://www.unh.edu/ccrc/Sextortion%20Report%20final%206-22-2016.pdf
Legislation cited
- Crimes (Intimate Image Abuse) Amendment Act 2017 (ACT)
- Crimes Amendment (Intimate Images) Act 2017 (NSW)
- Criminal Code 1995 (Cth)
- Restraining Orders Act 1997 (WA)
- Summary Offences Act 1966 (Vic)