7,829
Views
8
CrossRef citations to date
0
Altmetric
Articles

Policing image-based sexual abuse: stakeholder perspectives

ORCID Icon, & ORCID Icon

References

  • Bates, S. (2017). Revenge porn and mental health: A qualitative analysis of the mental health effects of revenge porn on female survivors. Feminist Criminology, 12(1), 22–42. doi:10.1177/1557085116654565
  • Belot, H. (2017, January 24). Cyber security ‘the new frontier of warfare, espionage’, Malcolm Turnbull says. ABC News. Retrieved March 27, 2018, from http://www.abc.net.au/news/2017-01-24/turnbull-declares-cyber-security-the-new-frontier-of-warfare/8207494
  • Bond, E., & Tyrrell, K. (2018). Understanding revenge pornography: A national survey of police officers and staff in England and Wales. Journal of Interpersonal Violence, Online. Retrieved from https://doi.org/10.1177/0886260518760011
  • Bossler, A. M., & Holt, T. J. (2012). Patrol officers’ perceived role in responding to cybercrime. Policing: an International Journal of Police Strategies & Management, 35(1), 165–181.
  • Branch, K., Hilinski-Rosick, C. M., Johnson, E., & Solano, G. (2017). Revenge porn victimization of college students in the United States: An exploratory analysis. International Journal of Cyber Criminology, 11(1), 128–142.
  • Broadhurst, R. (2006). Developments in the global law enforcement of cyber-crime. Policing: an International Journal of Police Strategies & Management, 29(3), 408–433.
  • Brown, C. (2015). Investigating and prosecuting cybercrime: Forensic dependencies and barriers to justice. International Journal of Cyber Criminology, 9(1), 55–119.
  • Center, P. R. (2017, August). Globally, people point to ISIS and climate change as leading security threats (Research Report No. 202.419.4372). Retrieved March 27, 2018, from http://www.pewglobal.org/2017/08/01/globally-people-point-to-isis-and-climate-change-as-leading-security-threats/
  • Citron, D. K., & Franks, M. A. (2014). Criminalizing revenge porn. Wake Forest Law Review, 49(2): 345–391.
  • Crenshaw, K. (1991). Mapping the margins: Intersectionality, identity politics, and violence against women of color. Stanford Law Review, 43(6), 1241–1299.
  • Davidson, J. C., & Martellozzo, E. (2008). Protecting vulnerable young people in cyberspace from sexual abuse: Raising awareness and responding globally. Police Practice and Research: an International Journal, 9(4): 277–289.
  • Dir, A. L., & Cyders, M. A. (2015). Risks, risk factors, and outcomes associated with phone and Internet sexting among university students in the United States. Archives of Sexual Behavior, 44(6), 1675–1684.
  • Franks, M. A. (2015, June 22). How to defeat ‘revenge porn’: First, recognize it’s about privacy, not revenge. Huffington Post. Retrieved March 27, 2018, from http://www.huffingtonpost.com/mary-anne-franks/how-to-defeat-revenge-porn_b_7624900.html
  • Hanmer, J., Ratford, J., & Stanko, E. A. (1989). Women, policing, and male violence: International perspectives. London, New York: Routledge.
  • Henry, N., & Powell, A. (2016). Sexual violence in the digital age: The scope and limits of criminal law. Social & Legal Studies, 25(4), 397–418.
  • Henry, N., Powell, A., & Flynn, A. (2017). Not just ‘revenge pornography’: Australians’ experiences of image-based abuse: A summary report. Melbourne: RMIT University.
  • Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20–40.
  • Jordan, J. (2008). Perfect victims, perfect policing? Improving rape complainant’s experiences of police investigations. Public Administration, 86(3), 699–719.
  • Kelly, L. (1988). Surviving sexual violence. Cambridge, UK: Polity Press.
  • McGlynn, C., & Rackley, E. (2016, February 15). Not ‘revenge porn,’ but abuse: Let’s call it image-based sexual abuse. Inherently Human. Retrieved March 27, 2018, from https://inherentlyhuman.wordpress.com/2016/02/15/not-revenge-porn-but-abuse-lets-call-it-image-based-sexual-abuse/
  • Menjívar, C., & Salcido, O. (2002). Immigrant women and domestic violence: Common experiences in different countries. Gender & Society, 16(6), 898–920.
  • Office of the eSafety Commissioner (OeSC) (2017). National Survey on image-based abuse in Australia. Report prepared for the Office of the eSafety Commissioner. Melbourne: RMIT University.
  • Powell, A., Henry, N., & Flynn, A. (2018). Image-based sexual abuse. In W. S. DeKeseredy & M. Dragiewicz (Eds.), Handbook of critical criminology. New York, NY: Routledge.
  • Powell, A., & Henry, N. (2016). Policing technology-facilitated sexual violence against adult victims: Police and service sector perspectives. Policing & Society. Online. doi: 10.1080/10439463.2016.1154964
  • Powell, A., & Henry, N. (2017). Sexual violence in a digital age. Basingstoke, UK: Palgrave Macmillan.
  • Ringrose, J., & Renold, E. (2012). Slut-shaming, girl power and ‘sexualisation’: Thinking through the politics of the international SlutWalks with teen girls. Gender and Education, 24(3), 333–343.
  • Venema, R. M. (2016). Making judgments: How blame mediates the influence of rape myth acceptance in police response to sexual assault. Journal of Interpersonal Violence, Online. doi: 10.1177/0886260516662437
  • Vincze, E. A. (2016). Challenges in digital forensics. Police Practice and Research, 17(2), 183–194.
  • Wall, D. (2007). Cybercrime: The transformation of crime in the information age (Vol. 4). Cambridge, UK: Polity.
  • Wolak, J., & Finkelhor, D. (2016). Sextortion: Findings from an online survey about threats to expose sexual images. Crimes Against Children Research Centre, University of New Hampshire. Retrieved March 27, 2018, from http://www.unh.edu/ccrc/Sextortion%20Report%20final%206-22-2016.pdf

Legislation cited

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.