TFGBV Taxonomy

Bibliography

Bibliography

  • Abreu, R. L., & Kenny, M. C. (2017). Cyberbullying and LGBTQ Youth: A Systematic Literature Review and Recommendations for Prevention and Intervention. Journal of Child & Adolescent Trauma, 11(1), 81–97. https://doi.org/10.1007/s40653-017-0175-7
  • Anti-Bullying Alliance. (n.d.). What is online bullying? Anti-Bullying Alliance. https://anti-bullyingalliance.org.uk/tools-information/all-about-bullying/online-bullying/what-online-bullying
  • Aslett, K., Guess, A. M., Bonneau, R., Nagler, J., & Tucker, J. A. (2022). News credibility labels have limited average effects on news diet quality and fail to reduce misperceptions. Science Advances, 8(18). https://doi.org/10.1126/sciadv.abl3844
  • Australian eSafety Commissioner. (2022, February 14). Parental awareness of children’s exposure to risks online. ESafety Commissioner. https://www.esafety.gov.au/research/mind-gap-parental-awareness-childrens-exposure-risks-online/parental-awareness
  • Australian eSafety Commissioner. (2023). Technology-facilitated abuse: family, domestic and sexual violence literature scan. https://www.esafety.gov.au/sites/default/files/2023-10/Technology-facilitated-abuse-family-domestic-sexual-violence-literature-scan.pdf
  • Australian eSafety Commissioner. (2024, September). Technology, gendered violence and Safety by Design: An industry guide for addressing technology-facilitated gender-based violence through Safety by Design. Australian ESafety Commissioner. https://www.esafety.gov.au/sites/default/files/2024-09/SafetyByDesign-technology-facilitated-gender-based-violence-industry-guide.pdf
  • Australian eSafety Commissioner. (2025). Gendered violence. ESafety Commissioner. https://www.esafety.gov.au/key-topics/gendered-violence
  • Australian eSafety Commissioner, & Australian Communications and Media Authority. (2024, October). Annual report 2023-24. Australian ESafety Commissioner. https://www.esafety.gov.au/sites/default/files/2024-10/ACMA-eSafety-annual-report-2023-24.pdf
  • Baekgaard, K. (2024). Technology-facilitated gender-based violence: An emerging issue in Women, Peace and Security. https://giwps.georgetown.edu/wp-content/uploads/2024/06/Technology-Facilitated-Gender-Based-Violence.pdf
  • Basuroy, T. (2024, June 24). Number of online impersonation offenses reported across India in 2022, by leading state. Statista. https://www.statista.com/statistics/1097572/india-number-of-online-impersonation-offences-by-leading-state/
  • Bermudez, T., Esposito, M., & Neuner, J. (2020). Mapping the State of Knowledge on the Use of Stalkerware in Intimate Partner Violence. University College London. https://www.genderandtech.net/s/mapping_the_state_of_knowledge_on_the_use_of_stalkerware_in_intimate_partner_violence-1.pdf
  • Break the Cycle, & The Cyber Abuse Project. (2018a, December). Digital Evidence Collection Guide. End Tech Abuse across Generations (ETAG). http://www.endtechabuse.org/wp-content/uploads/2018/12/CAP-Tool-3-DIGITAL-EVIDENCE.pdf
  • Break the Cycle, & The Cyber Abuse Project. (2018b, December). Non-Consensual Sharing of Intimate Images Guide. End Tech Abuse across Generations (ETAG). http://www.endtechabuse.org/wp-content/uploads/2018/12/CAP-Tool-4-NCSI-Guide.pdf
  • Brown, A., Harkin, D., & Tanczer, L. M. (2025). Safeguarding the “Internet of Things” for Victim-Survivors of Domestic and Family Violence: Anticipating Exploitative Use and Encouraging Safety-by-Design. Violence against Women, 31(5), 1039–1062. https://doi.org/10.1177/10778012231222486
  • Canadian Centre for Child Protection (C3P). (2022, November). Resources & Research: An Analysis of Financial Sextortion Victim Posts Published on r/Sextortion. Canadian Centre for Child Protection (C3P). https://protectchildren.ca/en/resources-research/an-analysis-of-financial-sextortion-victim-posts-published-on-sextortion/
  • Centers for Disease Control and Prevention (CDC). (2023). 1991-2023 High School Youth Risk Behavior Survey Data. Centers for Disease Control and Prevention (CDC). http://yrbs-explorer.services.cdc.gov/
  • Centre for International Governance Innovation (CIGI), Canada. (2023, March 1). Final Technical Report: Supporting a Safer Internet: Global Survey of Gender Based Violence Online. IDRC Digital Library. https://idl-bnc-idrc.dspacedirect.org/server/api/core/bitstreams/4b2265e1-f259-49b5-8301-b35a5e02aa69/content
  • Chang, J. P., Schluger, C., & Danescu-Niculescu-Mizil, C. (2022). Thread With Caution: Proactively Helping Users Assess and Deescalate Tension in Their Online Discussions. Proceedings of the ACM on Human-Computer Interaction, 6(CSCW2), 1–37. https://doi.org/10.1145/3555603
  • Claypoole, V. L., & Szalma, J. L. (2019). Electronic Performance Monitoring and sustained attention: Social facilitation for modern applications. Computers in Human Behavior, 94(94), 25–34. https://doi.org/10.1016/j.chb.2019.01.001
  • Cloudflare. (2024). What is rate limiting? | Rate limiting and bots. Cloudflare.com. https://www.cloudflare.com/learning/bots/what-is-rate-limiting/
  • Common Thread. (2022, June 1). How Twitter is nudging users to have healthier conversations. X.com. https://blog.x.com/common-thread/en/topics/stories/2022/how-twitter-is-nudging-users-healthier-conversations
  • Council of Europe. (1950). European Convention on Human Rights. In European Convention on Human Rights. Council of Europe. https://www.echr.coe.int/documents/d/echr/Convention_ENG
  • Datta Burton, S., Tanczer, L., Vasudevan, S., Hailes, S., & Carr, M. (2021). The UK Code of Practice for Consumer IoT Cybersecurity: where we are and what next. The PETRAS National Centre of Excellence for IoT Systems Cybersecurity. https://doi.org/10.14324/000.rp.10117734
  • Department for Digital, Culture, Media & Sport, & Department for Science, Innovation and Technology. (2018, October 13). Code of Practice for Consumer IoT Security. GOV.UK. https://www.gov.uk/government/publications/code-of-practice-for-consumer-iot-security
  • Dhrodia, A. (2021, April 13). To stop online abuse against women, we must reform digital spaces. World Wide Web Foundation. https://webfoundation.org/2021/04/to-stop-online-abuse-against-women-we-must-reform-digital-spaces/
  • Djuric, R., & Jovic, N. (2021). Online Attacks on Female Journalists. Independent Journalists’ Association of Serbia (NUNS). https://nuns.rs/media/2021/02/onlajn-napadi-na-novinarke-EN.pdf
  • Durham University. (n.d.). What is online harassment? Report and Support - Durham University. https://reportandsupport.durham.ac.uk/support/what-is-online-harassment
  • European Union Agency for Fundamental Rights. (2015, April 25). EU Charter of Fundamental Rights, Title II: Freedoms, Article 6 - Right to liberty and security. European Union Agency for Fundamental Rights. https://fra.europa.eu/en/eu-charter/article/6-right-liberty-and-security?page=1
  • Evelyn, S., Clancy, E. M., Klettke, B., & Tatnell, R. (2022). A Phenomenological Investigation into Cyberbullying as Experienced by People Identifying as Transgender or Gender Diverse. International Journal of Environmental Research and Public Health, 19(11), 6560. https://doi.org/10.3390/ijerph19116560
  • FBI National Press Office. (2022, December 19). FBI and Partners Issue National Public Safety Alert on Financial Sextortion Schemes. Federal Bureau of Investigation. https://www.fbi.gov/news/press-releases/fbi-and-partners-issue-national-public-safety-alert-on-financial-sextortion-schemes
  • Federal Trade Commission. (2024, February 9). As Nationwide Fraud Losses Top $10 Billion in 2023, FTC Steps Up Efforts to Protect the Public. Federal Trade Commission. https://www.ftc.gov/news-events/news/press-releases/2024/02/nationwide-fraud-losses-top-10-billion-2023-ftc-steps-efforts-protect-public
  • Franks, M. A. (2021). Drafting an effective “revenge porn” law: a guide for legislators. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2468823
  • Gaozhao, D. (2021). Flagging fake news on social media: An experimental study of media consumers’ identification of fake news. Government Information Quarterly, 38(3), 101591. https://doi.org/10.1016/j.giq.2021.101591
  • GCF Global. (2019). Digital Media Literacy: How Filter Bubbles Isolate You. GCFGlobal.org. https://edu.gcfglobal.org/en/digital-media-literacy/how-filter-bubbles-isolate-you/1/
  • Ghaffary, S. (2022, October 20). Instagram’s surprising strategy for bullies: Tell them to be nice. Vox. https://www.vox.com/recode/2022/10/20/23413581/instagram-nudging-meta-creators-wellbeing-bullying-harassment
  • Giannelis, M. (2022, January 3). Fake Facebook accounts is an ongoing problem. Tech Business News. https://www.techbusinessnews.com.au/news/fake-facebook-accounts-is-an-ongoing-problem/
  • Goodwin, J. (2020, December 14). Mastercard, Visa and Discover cut ties with Pornhub following allegations of child abuse. CNN. https://www.cnn.com/2020/12/14/business/mastercard-visa-discover-pornhub
  • Gurumurthy, A., Vasudevan, A., & Chami, N. (2019). Born digital, Born free? A socio-legal study on young women’s experiences of online violence in South India. IT for Change. https://itforchange.net/sites/default/files/1662/Born-Digital_Born-Free_SynthesisReport.pdf
  • Henry, N., Flynn, A., & Powell, A. (2019). Responding to “revenge pornography”: Prevalence, nature and impacts. https://www.aic.gov.au/sites/default/files/2020-05/CRG_08_15-16-FinalReport.pdf
  • Humane Intelligence. (2025). Digital violence, real world harm: Evaluating survivor-centric tools for intimate image abuse in the age of gen AI. Humane Intelligence.
  • Hussain, H., Haved, A., Jethwa, N., Meher, E., & Naidoo, N. (2022). Orbits - A global field guide to advance intersectional, survivor-centred, and traumainformed interventions to technology-facilitated gender-based violence. Chayn. https://chayn.notion.site/Orbits-a-global-field-guide-to-advance-intersectional-survivor-centred-and-trauma-informed-interv-8d8dc6a1436543b8b25af63ddafaa409
  • India Ministry of Home Affairs, National Crime Records Bureau. (2022). Crime in India 2022 - Statistics Volume-I. https://www.ncrb.gov.in/uploads/nationalcrimerecordsbureau/custom/1701607577CrimeinIndia2022Book1.pdf
  • Janickyj, M., & Tanczer, L. M. (2025). Tech Abuse Personas: Exploring Help-Seeking Behaviours and Support Needs of Victim/Survivors of Technology-Facilitated Abuse
  • -
  • UCL Discovery. Ucl.ac.uk. https://discovery.ucl.ac.uk/id/eprint/10208803/
  • Jankowicz, N., Gomez-O’Keefe, I., Hoffman, L., & Becker, A. (2024). It’s Everyone’s Problem: Mainstreaming Responses to Technology-Facilitated Gender-Based Violence. https://igp.sipa.columbia.edu/sites/igp/files/2024-09/IGP_TFGBV_Its_Everyones_Problem_090524.pdf
  • Johnston, M., & Meger, S. (n.d.). Policy brief: The linkages between violent misogyny and violent extremism and radicalization that lead to terrorism. In Organization for Security and Co-operation in Europe. https://www.osce.org/files/f/documents/d/c/525297.pdf
  • Joyful Heart Foundation. (2024). Image-Based Abuse. Joyfulheartfoundation.org. https://www.joyfulheartfoundation.org/learn/image-based-abuse
  • Kamran, H. (2019, October). Hostile Bytes - A study of online violence against women journalists. Digital Rights Monitor; Media Matters for Democracy. https://digitalrightsmonitor.pk/wp-content/uploads/2019/11/Hostile-Bytes.pdf
  • Kaspersky. (2019, October). The State of Stalkerware in 2019. Kaspersky; Coalition Against Stalkerware. https://media.kasperskycontenthub.com/wp-content/uploads/sites/100/2020/03/18084439/Kaspersky_The-State-of-Stalkerware-in-2019_Updated.pdf
  • Kaspersky. (2024). The Naked Truth - How intimate image sharing is reshaping our world. https://media.kasperskydaily.com/wp-content/uploads/sites/86/2024/07/15164921/The-Naked-Truth-Kaspersky.pdf
  • Koukopoulos, N., Janickyj, M., & Tanczer, L. M. (2025). Defining and Conceptualizing Technology-Facilitated Abuse (“Tech Abuse”): Findings of a Global Delphi Study. Journal of Interpersonal Violence. https://doi.org/10.1177/08862605241310465
  • Kristof, N. (2025, May 10). Opinion | What People at Pornhub Were Thinking When It Shared Videos of Child Rape. The New York Times. https://www.nytimes.com/2025/05/10/opinion/pornhub-children-documents.html
  • Lee, E., Schulz, P., & Lee, H. E. (2023). The Impact of COVID-19 and Exposure to Violent Media Content on Cyber Violence Victimization among Adolescents in South Korea: National Population-Based Study (Preprint). JMIR. Journal of Medical Internet Research/Journal of Medical Internet Research, 26:e45563. https://doi.org/10.2196/45563
  • Li, L., Neubauer, L., Stewart, R., & Roberts, A. (2023). Characterizing the Differences in Descriptions of Violence on Reddit During the COVID-19 Pandemic. Journal of Interpersonal Violence, 38(15-16), 9290–9314. https://doi.org/10.1177/08862605231163885
  • Lopez-Neira, I., Patel, T., Parkin, S., Danezis, G., & Tanczer, L. (2019). “Internet of Things”: How abuse is getting smarter.. Safe – the Domestic Abuse Quarterly, 63, 22–26. https://discovery.ucl.ac.uk/id/eprint/10070024/1/Safe%20Article%20FINAL.pdf
  • Maier, E.-M., Tanczer, L. M., & Klausner, L. D. (2025). Surveillance Disguised as Protection: A Comparative Analysis of Sideloaded and In-Store Parental Control Apps. Proceedings on Privacy Enhancing Technologies, 2025(2), 107–124. https://doi.org/10.56553/popets-2025-0052
  • Mao, F., Ng, K., & Zubair, M. (2023, November 28). Pakistan: Woman killed after being seen with man in viral photo. BBC News. https://www.bbc.com/news/world-asia-67551554
  • McManus, S., Bebbington, P. E., Tanczer, L., Scott, S., & Howard, L. M. (2021). Receiving threatening or obscene messages from a partner and mental health, self-harm and suicidality: results from the Adult Psychiatric Morbidity Survey. Social Psychiatry and Psychiatric Epidemiology. https://doi.org/10.1007/s00127-021-02113-w
  • McQue, K. (2025, February). A man stalked a professor for six years. Then he used AI chatbots to lure strangers to her home. The Guardian; The Guardian. https://www.theguardian.com/technology/2025/feb/01/stalking-ai-chatbot-impersonator
  • Michalec, Ol., Barker, K., Coopamootoo, K., Coventry, L., Duppresoir, F., Edwards, M., Johnson, S., Johnstone, E., Jurasz, O., Mehrnezhad, M., Moncur, W., Ridout, F., Stevens, F., Strothmayer, A., & Tanczer, L. (2023). Towards a research agenda: Tackling violence against women and girls online. Rephrain. https://www.genderandtech.net/s/Research-Agenda-Report-Towards-a-research-agenda-tackling-violence-against-women-and-girls-online.pdf
  • Mingus, M. (2011, May 11). Access Intimacy: The Missing Link. Leaving Evidence. https://leavingevidence.wordpress.com/2011/05/05/access-intimacy-the-missing-link/
  • Morales, F., Sharma, S., Doan, C., Levine, B., Robin Bay Consulting, & Rescue Lab, University of Massachusetts Amherst. (2024). PHVSpec: A Benchmark-based Analysis of Perceptual Hash Systems for Videos. In Tech Coalition. https://www.technologycoalition.org/knowledge-hub/phvspec-a-benchmark-based-analysis-of-perceptual-hash-systems-for-videos
  • Morgan, R., & Truman, J. (2022). Stalking Victimization, 2019. In Bureau of Justice Statistics. https://bjs.ojp.gov/content/pub/pdf/sv19.pdf
  • Murphy, S. (2019, October 31). Diane Abbott speaks out on online abuse as female MPs step down. The Guardian. https://www.theguardian.com/politics/2019/oct/31/diane-abbott-speaks-out-on-online-abuse-as-female-mps-step-down
  • NCA National Assessments Centre. (2025). National Strategic Assessment (NSA) 2025 - Overview of Serious and Organized Crime (SOC) . National Crime Agency. https://www.nationalcrimeagency.gov.uk/nsa-overview-of-soc-2025
  • Neubauer, L., Straw, I., Mariconti, E., & Tanczer, L. M. (2023). A Systematic Literature Review of the Use of Computational Text Analysis Methods in Intimate Partner Violence Research. Journal of Family Violence, 21, 1–20. https://doi.org/10.1007/s10896-023-00517-7
  • Online Harassment Field Manual. (2025). Managing Your Online Footprint and Protecting from Doxing. Online Harassment Field Manual. https://onlineharassmentfieldmanual.pen.org/protecting-information-from-doxing/
  • Paananen, A., & Reichl, A. J. (2019). Gendertrolls just want to have fun, too. Personality and Individual Differences, 141(94), 152–156. https://doi.org/10.1016/j.paid.2019.01.011
  • Papachristou, K. (2023). Revenge Porn Helpline 2023 Report. In Revenge Porn Helpline. https://revengepornhelpline.org.uk/assets/documents/revenge-porn-helpline-report-2023.pdf
  • Parkin, S., Patel, T., Lopez-Neira, I., & Tanczer, L. (2019). Usability analysis of shared device ecosystem security. Proceedings of the New Security Paradigms Workshop, 1–15. https://doi.org/10.1145/3368860.3368861
  • Pew Research Center. (2021, January 13). The state of online harassment. Pew Research Center. https://www.pewresearch.org/internet/2021/01/13/the-state-of-online-harassment/
  • Plan International. (2020). The State of the Worlds Girls 2020 - Free to be online? Girls’ and young women’s experiences of online harassment. https://plan-international.org/uploads/2022/02/sotwgr2020-execsummary-en-3.pdf
  • Pless, M. (2016, July 19). Kiwi Farms, the Web’s Biggest Community of Stalkers. Intelligencer; New York Magazine. https://nymag.com/intelligencer/2016/07/kiwi-farms-the-webs-biggest-community-of-stalkers.html
  • Posetti, J., Maynard, D., & Shabbir, N. (2023). Guidelines for monitoring online violence against female journalists. https://www.osce.org/files/f/documents/b/0/554098_1.pdf
  • Posetti, J., & Shabbir, N. (2022). The Chilling: a Global Study of Online Violence against Women Journalists. https://www.icfj.org/sites/default/files/2023-02/ICFJ%20Unesco_TheChilling_OnlineViolence.pdf
  • Powell, A., Flynn, A., & Hindes, S. (2022, December). Technology-facilitated abuse: National survey of Australian adults’ experiences. ANROWS - Australia’s National Research Organisation for Women’s Safety. https://www.anrows.org.au/publication/technology-facilitated-abuse-national-survey-of-australian-adults-experiences/
  • Radware. (n.d.). What is rate limiting and how does it work? Radware. https://www.radware.com/cyberpedia/bot-management/rate-limiting/
  • Refuge. (2020, January 9). 72% of Refuge service users identify experiencing tech abuse – Refuge. Refuge.org.uk. https://refuge.org.uk/news/72-of-refuge-service-users-identify-experiencing-tech-abuse/
  • Refuge. (2022). Marked as unsafe: How online platforms are failing domestic abuse survivors. https://refuge.org.uk/wp-content/uploads/2022/11/Marked-as-Unsafe-report-FINAL.pdf
  • Revenge Porn Helpline. (2024, April 18). Reports to the Revenge Porn Helpline Increased by 106% in 2023 | Revenge Porn Helpline. Revenge Porn Helpline. https://revengepornhelpline.org.uk/news/reports-to-the-revenge-porn-helpline-increased-by-106-in-2023/
  • Robertson, A. (2018, June 29). Five newspaper staff killed by man who sued them for covering his online threats and harassment. The Verge. https://www.theverge.com/2018/6/29/17516748/annapolis-capital-gazette-newsroom-shooting-deaths-online-harassment-lawsuit-suspect
  • Ronen, E., & Shamir, A. (2016, March 1). Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. IEEE Xplore. https://doi.org/10.1109/EuroSP.2016.13
  • Rosenblatt, K. (2020, December 24). The year of the stan: How the internet’s super fans went from pop stars to politics. NBC News. https://www.nbcnews.com/pop-culture/pop-culture-news/year-stan-how-internet-s-super-fans-went-pop-stars-n1252115
  • Rowa, J. Y., & Saltman, E. (2022). The Contextuality of Lone Wolf Algorithms: An Examination of (Non)Violent Extremism in the Cyber-Physical Space. In Global Internet Forum to Counter Terrorism (GIFCT). https://gifct.org/wp-content/uploads/2022/09/GIFCT-22WG-ContextualityIntros-1.1.pdf
  • Ruvalcaba, Y., & Eaton, A. A. (2019). Nonconsensual pornography among U.S. Adults: A sexual scripts framework on victimization, perpetration, and health correlates for women and men. Psychology of Violence, 10(1). https://doi.org/10.1037/vio0000233
  • Schiffer, Z. (2021, March 5). Timnit Gebru was fired from Google — then the harassers arrived. The Verge. https://www.theverge.com/22309962/timnit-gebru-google-harassment-campaign-jeff-dean
  • Security Hero. (2023). 2023 State Of Deepfakes: Realities, Threats, And Impact. Security Hero. https://www.securityhero.io/state-of-deepfakes/#overview-of-current-state
  • Sirena, B. (2025, May 12). 75% of Users Face Cyberbullying on Social Media. Views4You. https://views4you.com/blog/cyberbullying-on-social-media/
  • Slachmuijlder, L., & Bonilla, S. (2025). Prevention by design: A roadmap for tackling TFGBV at the source. https://techandsocialcohesion.org/wp-content/uploads/2025/03/Prevention-by-Design-A-Roadmap-for-Tackling-TFGBV-at-the-Source.pdf
  • Slupska, J., & Tanczer, L. M. (2021). Threat Modeling Intimate Partner Violence: Tech Abuse as a Cybersecurity Challenge in the Internet of Things. The Emerald International Handbook of Technology-Facilitated Violence and Abuse, 663–688. https://doi.org/10.1108/978-1-83982-848-520211049
  • Soldner, F., Tanczer, L., Hammocks, D., Lopez-Neira, I., & Johnson, S. D. (2022, January 31). Using Machine Learning Methods to Study Technology-Facilitated Abuse: Evidence from the Analysis of UK CrimeStoppers’ Text Data. Ssrn.com. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4022708
  • Stephenson, S., Gupta, N., Polamarasetty, A., Huang, K., Youssef, D., Ceccio, R., Cowan, K., Zinkus, M., & Chatterjee, R. (2024). A Case Study on Legal Evidence of Technology-Facilitated Abuse in Wisconsin. In USENIX Symposium on Usable Privacy and Security (SOUPS) (pp. 1–4). https://www.usenix.org/system/files/soups2024_poster44_abstract-stephenson_final.pdf
  • Stevens, F., Tanczer, L., Ridout, F., & Johnson, S. (2021). The Applicability of the UK Computer Misuse Act 1990 onto Cases of Technology- Facilitated Domestic Violence and Abuse. In Domestic Abuse Perpetrators Research Fund RQ3: Method of Abuse. https://www.genderandtech.net/s/the_applicability_of_the_uk_computer_misuse_act_1990_onto_cases_of_technology_facilitated_domestic_v.pdf
  • Straw, I., & Tanczer, L. (2023). Safeguarding patients from technology-facilitated abuse in clinical settings: A narrative review. PLOS Digital Health, 2(1), e0000089. https://doi.org/10.1371/journal.pdig.0000089
  • Tanczer, L. (2023). Technology-Facilitated Abuse and the Internet of Things (IoT): The Implication of Smart, Internet-Connected Devices on Domestic Violence and Abuse. Technology and Domestic and Family Violence, 76–87. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4508732
  • Tanczer, L., Lopez, I., Simon, N., Trupti, P., George, P., & London, D. (2018). Gender and IoT research report: The rise of the Internet of Things and implications for technology-facilitated abuse. https://www.ucl.ac.uk/steapp/sites/steapp/files/giot-report.pdf
  • Tanczer, L., Lopez-Neira, I., & Parkin, S. (2021). I Feel Like We’re Really Behind the Game’: Perspectives of the United Kingdom’s Intimate Partner Violence Support Sector on the Rise of Technology-Facilitated Abuse. SSRN Electronic Journal, 5(3), 431–450. https://doi.org/10.2139/ssrn.3931045
  • Tech Coalition. (2021). Child Sexual Exploitation and Abuse Imagery (CSEAI): The Next Frontier of Reporting. In Tech Coalition. https://www.technologycoalition.org/newsroom/child-sexual-exploitation-and-abuse-imagery-cseai-the-next-frontier-of-reporting
  • Tech Coalition. (2022a). Online Grooming: Considerations for Detection, Response, and Prevention. Tech Coalition. https://www.technologycoalition.org/knowledge-hub/research-paper-considerations-for-detection-response-and-prevention-of-online-grooming
  • Tech Coalition. (2022b, January). Child Sexual Abuse Material (CSAM): Identification and Reporting for U.S. Based Companies. Tech Coalition. https://www.technologycoalition.org/knowledge-hub/identification-and-reporting-for-u-s-based-companies
  • Tech Coalition. (2022c). The Fourth Amendment and the Internet: Legal Limits on Digital Searches for Child Sexual Abuse Material. In Tech Coalition. https://www.technologycoalition.org/knowledge-hub/the-fourth-amendment-and-the-internet-legal-limits-on-digital-searches-for-child-sexual-abuse-material
  • Tech Coalition. (2023). Assessing Online Child Sexual Exploitation and Abuse (OCSEA) Harms in Product Development. Tech Coalition. https://www.technologycoalition.org/knowledge-hub/assessing-ocsea-harms-in-product-development
  • Tech Coalition. (2024a). Annual Report 2024. https://www.technologycoalition.org/knowledge-hub/2024-annual-report
  • Tech Coalition. (2024b). Lantern 2024 Transparency Report. In Tech Coalition. https://www.technologycoalition.org/knowledge-hub/lantern-2024-transparency-report
  • Tech Coalition. (2025a). Child Safety Best Practices. Tech Coalition. https://www.technologycoalition.org/child-safety-best-practices
  • Tech Coalition. (2025b). Developer Good Practices: Combating Online Child Sexual Exploitation and Abuse. Tech Coalition. https://www.technologycoalition.org/developer-good-practices-combating-online-child-sexual-exploitation-and-abuse
  • Tenbarge, K. (2023, March 27). Found through Google, bought with Visa and Mastercard: Inside the deepfake porn economy. NBC News. https://www.nbcnews.com/tech/internet/deepfake-porn-ai-mr-deep-fake-economy-google-visa-mastercard-download-rcna75071
  • The Office of Justice Programs (OJP), the Office of Juvenile Justice and Delinquency Prevention (OJJDP). (2022). 2022 Report to the Committees on Appropriations National Center for Missing and Exploited Children (NCMEC) Transparency. https://www.missingkids.org/content/dam/missingkids/pdfs/OJJDP-NCMEC-Transparency_2022-Calendar-Year.pdf
  • Thorn. (2017). Sextortion: Summary findings from a 2017 survey of 2,097 survivors. https://www.thorn.org/wp-content/uploads/2019/12/Sextortion_Wave2Report_121919.pdf
  • Thorn. (2022). Online grooming: Examining risky encounters amid everyday digital socialization. Thorn. https://info.thorn.org/hubfs/Research/2022_Online_Grooming_Report.pdf
  • Thorn and National Center for Missing and Exploited Children (NCMEC). (2024). Trends in Financial Sextortion An investigation of sextortion reports in NCMEC CyberTipline data. https://info.thorn.org/hubfs/Research/Thorn_TrendsInFinancialSextortion_June2024.pdf
  • Todd, P. R., & Melancon, J. (2019). Gender Differences in Perceptions of Trolling in Livestream Video Broadcasting. Cyberpsychology, Behavior, and Social Networking, 22(7), 472–476. https://doi.org/10.1089/cyber.2018.0560
  • UK Police. (2025). Advice and information - Stalking and harassment. Police.UK. https://www.police.uk/advice/advice-and-information/beta-stalking-and-harassment/what-is-stalking-harassment/
  • UN Women. (2021). Violence against women in the online space: insights from a multi-country study in the Arab States. UN Women – Arab States. https://arabstates.unwomen.org/en/digital-library/publications/2021/11/violence-against-women-in-the-online-space
  • UN Women. (2023a). The dark side of digitalization: Technology-facilitated violence against women in Eastern Europe and Central Asia. UN Women – Europe and Central Asia. https://eca.unwomen.org/en/digital-library/publications/2023/11/the-dark-side-of-digitalization-technology-facilitated-violence-against-women-in-eastern-europe-and-central-asia
  • UN Women. (2023b, November 13). Creating safe digital spaces free of trolls, doxing, and hate speech. UN Women – Headquarters. https://www.unwomen.org/en/news-stories/explainer/2023/11/creating-safe-digital-spaces-free-of-trolls-doxing-and-hate-speech
  • UN Women. (2024). Frequently Asked questions: Tech-facilitated gender-based Violence. UN Women – Headquarters. https://www.unwomen.org/en/what-we-do/ending-violence-against-women/faqs/tech-facilitated-gender-based-violence
  • UNESCO, & IRCAI. (2024). Challenging systematic prejudices: an investigation into Gender Bias in Large Language Models. United Nations Educational, Scientific and Cultural Organization (UNESCO). https://unesdoc.unesco.org/ark:/48223/pf0000388971
  • UNFPA Technical Division, Gender and Human Rights Branch. (2021, December 1). Technology-facilitated gender-based violence: Making all spaces safe. United Nations Population Fund (UNFPA). https://www.unfpa.org/publications/technology-facilitated-gender-based-violence-making-all-spaces-safe
  • UNITED NATIONS. (2023, June 12). 2023 Gender Social Norms Index (GSNI). UN Human Development Reports. https://hdr.undp.org/content/2023-gender-social-norms-index-gsni#/indicies/GSNI
  • United Nations. (1948, December 10). Universal Declaration of Human Rights. United Nations. https://www.un.org/en/about-us/universal-declaration-of-human-rights
  • United Nations Human Rights Council. (2015). Human Rights Council Twenty-ninth session RES/29/14 Accelerating efforts to eliminate all forms of violence against women: eliminating domestic violence / RightDocs - Where human rights resolutions count. Right Docs. https://www.right-docs.org/doc/a-hrc-res-29-14/
  • United Nations Human Rights Council. (2022). Human Rights Council Fifty-first session RES/51/10 12 September-7 October 2022 Agenda item 3 Promotion and protection of all human rights, civil, political, economic, social and cultural rights, including the right to development. https://ecnl.org/sites/default/files/2022-10/Res3.pdf
  • United Nations Office on Drugs and Crime (UNODC). (2015). The International Classification of Crime for Statistical Purposes (ICCS). https://www.unodc.org/documents/data-and-analysis/statistics/crime/ICCS/ICCS_English_2016_web.pdf
  • United Nations Population Fund (UNFPA). (2017). 16 DAYS OF ACTIVISM AGAINST GENDER-BASED VIOLENCE. United Nations Population Fund. https://www.unfpa.org/thevirtualisreal-background
  • Vailshery, L. S. (2024, June 4). Internet of Things (IoT) - statistics & facts. Statista. https://www.statista.com/topics/2637/internet-of-things/#topicOverview
  • Vassilev, A., Oprea, A., Fordyce, A., Anderson, H., Davies, X., & Hamin, M. (2025). Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. National Institute of Standards and Technology (NIST), Trustworthy and Responsible AI, 100-2e2025. https://doi.org/10.6028/nist.ai.100-2e2025
  • Vengattil, M., & Kalra, A. (2022, July 21). Facebook’s growth woes in India: too much nudity, not enough women. Reuters; Reuters. https://www.reuters.com/technology/facebooks-growth-woes-india-too-much-nudity-not-enough-women-2022-07-21/
  • Verma, P., & Zakrzewski, C. (2024, April 23). AI deepfakes threaten to upend global elections. No one can stop them. Washington Post. https://www.washingtonpost.com/technology/2024/04/23/ai-deepfake-election-2024-us-india/
  • Woodlock, D., Bentley, K., Schulze, D., Mahoney, N., Chung, D., & Pracilio, A. (2020). Second National Survey of Technology Abuse and Domestic Violence in Australia. WESNET. https://wesnet.org.au/wp-content/uploads/sites/3/2020/11/Wesnet-2020-2nd-National-Survey-Report-72pp-A4-FINAL.pdf
  • World Economic Forum. (2023, August 4). Toolkit for Digital Safety Design Interventions and Innovations: Typology of Online Harms. World Economic Forum. https://www.weforum.org/publications/toolkit-for-digital-safety-design-interventions-and-innovations-typology-of-online-harms/
  • World Economic Forum. (2025, March 25). The Intervention Journey: A Roadmap to Effective Digital Safety Measures. World Economic Forum. https://www.weforum.org/publications/the-intervention-journey-a-roadmap-to-effective-digital-safety-measures/
About This SiteGet InvolvedContactCopyrightPrivacy
Loading...