1: Introduction

Restricted access
Rights and permissions Cite this chapter

The chapter defines ‘non-consensual intimate images’ and highlights the potential contribution of platforms and viewers to the breach of privacy of those depicted in non-consensual intimate images. It explains the theoretical framework informing the project; the project’s genealogy; and the book’s contributions in terms of policy, private law theory and tort doctrine.

  • Abraham, Kenneth and White, Edward. (2019). The Puzzle of the Dignitary Torts. Cornell Law Review, 104(2): 31780.

  • Adler, Matthew. (2012). Well-Being and Fair Distribution: Beyond Cost-Benefit Analysis, Oxford: Oxford University Press.

  • Adler Matthew and Posner, Eric. (1999). Rethinking Cost-Benefit Analysis. Yale Law Journal, 109(2): 165248.

  • Ahlert, Christian, Marsden, Chris and Yung, Chester. (2004). How Liberty Disappeared from Cyberspace: The Mystery Shopper Tests Internet Content Self-Regulation. Academia, [Online] 1 January. Available from: https://www.academia.edu/686683/How_Liberty_Disappeared_from_Cyberspace_The_Mystery_Shopper_Tests_Internet_Content_Self-Regulation [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Allen, Anita. (2010). Privacy Torts: Unreliable Remedies for LGBT Plaintiffs. California Law Review, 98(6): 171164.

  • Allen, Anita. (2011). Unpopular Privacy: What Must We Hide? Oxford: Oxford University Press.

  • Alter, Charlotte. (2014). Clicking on Jennifer Lawrence’s Nude Photos Is Sleazy, but Is It Really Sexual Assault? Time, [Online] 2 September. Available from: https://time.com/3258898/jennifer-lawrence-kate-upton-naked-photos-icloud-hacking/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Angelopopulos, Christina. (2015). Delfi v Estonia: ISPs and the Freedom to Impart Information. The IPKAT, [Blog] 24 June. Available from: http://ipkitten.blogspot.nl/2015/06/delfi-v-estonia-isps-and-freedom-to.html [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Angelopoulos, Christina. (2020). Primary and Accessory Liability in EU Copyright Law, in Rosati, Elenora (ed) The Routledge Handbook of European Copyright Law, Abingdon: Routledge, 193214.

    • Search Google Scholar
    • Export Citation
  • Angelopoulos, Christina and Smet, Stijn. (2016). Notice-and-Fair-Balance: How to Reach a Compromise Between Fundamental Rights in European Intermediary Liability. Journal of Media Law, 8(2): 266301.

    • Search Google Scholar
    • Export Citation
  • AP News. (2019). Sandy Hook Lawsuit against Gun-Maker Set for Trial in 2021. AP News, [Online] 11 December. Available from: https://apnews.com/7105329aaf8f039abab83c2836c288af [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Arnold, Carrie. (2016). Life after Rape: The Sexual Assault Issue No One’s Talking About. Women’s Health, [Online] 13 September. Available from: https://www.womenshealthmag.com/life/a19899018/ptsd-after-rape/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Atiyah, Patrick. (1967). Vicarious Liability in the Law of Torts, London: Butterworths.

  • Baker, Berenice. (2013). The Internet Wouldn’t Exist without Porn. New Statesman, [Online] 17 June. Available from: https://www.newstatesman.com/politics/2013/06/internet-wouldn-t-exist-without-porn [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Bambauer, Derek. (2014). Exposed .Minnesota Law Review, 98(6): 2025102.

  • Banta, Natalie. (2016). Death and Privacy in the Digital Age. North Carolina Law Review, 94: 92790.

  • Bar-Gill, Oren and Porat, Ariel. (2014). Harm-Benefit Interactions. American Law and Economics Review, 16(1): 86116.

  • Barendt, Eric. (2015). An Overlap of Defamation and Privacy? Journal of Media Law, 7(1): 8591.

  • Bari, Shahidha. (2016). Female Nudity Is Powerful – But Not Necessarily Empowering. Aeon, [Online] 12 September. Available from: www.aeon.co/ideas/female-nudity-is-powerful-but-not-necessarily-empowering [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Barnett, Katy. (2018). Gain-Based Relief for Breach of Privacy, in Varuhas, Jason and Moreham, Nicole (eds) Remedies for Breach of Privacy, Oxford: Hart, 183204.

    • Search Google Scholar
    • Export Citation
  • Barrett, Paul. (2020). Who Moderates the Social Media Giants? A Call to End Outsourcing. NYU Stern Center for Business and Human Rights. [Online] Available from: https://www.stern.nyu.edu/experience-stern/faculty-research/who-moderates-social-media-giants-call-end-outsourcing [Accessed 30 September 2022].

    • Search Google Scholar
    • Export Citation
  • Bartow, Ann. (2009). Internet Defamation as Profit Center: The Monetization of Online Harassment. Harvard Journal of Law & Gender, 32(2): 10247.

    • Search Google Scholar
    • Export Citation
  • Bates, Samantha. (2017). Revenge Porn and Mental Health: A Qualitative Analysis of the Mental Health Effects of Revenge Porn on Female Survivors. Feminist Criminology, 12(1): 2242.

    • Search Google Scholar
    • Export Citation
  • BBC. (2014). Man Charged in Netherlands in Amanda Todd Suicide Case. BBC News, [Online] 18 April. Available from: https://www.bbc.co.uk/news/world-europe-27076991 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • BBC. (2016). Tiziana Cantone: Suicide Following Years of Humiliation Online Stuns Italy. BBC News, [Online] 16 September. Available from: https://www.bbc.co.uk/news/world-europe-37380704 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Beever, Allan. (2015). What Does Tort Law Protect? Singapore Academy of Law Journal, Special Issue: 626–42.

  • Beever, Allan. (2016). A Theory of Tort Liability .London: Hart.

  • Ben-Shahar, Omri. (1998). Should Products Liability Be Based on Hindsight? Journal of Law, Economics, and Organization, 14(2): 32557.

    • Search Google Scholar
    • Export Citation
  • Benn, I. Stanley. (1971). Privacy, Freedom, and Respect for Persons, in Pennock, J. Ronald and Chapman, John W. (eds) Nomos XIII: Privacy, New York: Atherton Press, 126.

    • Search Google Scholar
    • Export Citation
  • Bennett, Theodore. (2016). Not so Straight-Talking: How Defamation Law Should Treat Imputations of Homosexuality. University of Queensland Law Journal, 35(2): 31330.

    • Search Google Scholar
    • Export Citation
  • Bennett, Thomas. (2018). Why Sir Cliff Richard’s Case Was Rightly Decided: Part 2: The Public Interest Balance. INFORRM, [Online] 2 August. Available from: https://inforrm.org/2018/08/02/why-sir-cliff-richards-case-was-rightly-decided-part-2-the-public-interest-balance-thomas-bennett/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Bennett, Thomas and Wragg, Paul. (2018). Was Richard v BBC Correctly Decided? Communications Law, 23(3): 15165.

  • Benzanson, Randall. (1986). The Libel Suit in Retrospect: What Plaintiffs Want and What Plaintiffs Get, the Symposium: New Perspectives in the Law of Defamation. California Law Review, 74(3): 789808.

    • Search Google Scholar
    • Export Citation
  • Berry, Andrew. (1984). Beshada v Johns-Manville Products Corp: Revolution-Or-Aberration-In Products Liability Law. Fordham Law Review, 52(5): 786803.

    • Search Google Scholar
    • Export Citation
  • Berryman, Jeff. (2018). Remedies for Breach of Privacy in Canada, in Varuhas, Jason and Moreham, Nicole (eds) Remedies for Breach of Privacy, Oxford: Hart, 323–48.

    • Search Google Scholar
    • Export Citation
  • Bickert, Monika and Fishman, Brian. (2018). Hard Questions: What Are We Doing to Stay Ahead of Terrorists? Facebook Newsroom, [Online] 8 November. Available from: https://about.fb.com/news/2018/11/staying-ahead-of-terrorists/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Birnhack, Michael. (2020). Personalized Privacy. Tel Aviv University Law Review, 42(2): 381404.

  • Bitton, Yifat. (2010). Liability of Bias: A Comparative Study of Gender-Related Interests in Negligence Law. Annual Survey of International & Comparative Law, 16(1): 63128.

    • Search Google Scholar
    • Export Citation
  • Bjorkegren, Alex. (2020). DCMS. Email correspondence to Tsachi Keren-Paz, 12 Feb.

  • Blackman, Josh. (2009). Omniveillance, Google, Privacy in Public, and the Right to Your Digital Identity: A Tort for Recording and Disseminating an Individual’s Image Over the Internet. Santa Clara Law Review, 49(2): 31392.

    • Search Google Scholar
    • Export Citation
  • Bloom, Sarah. (2014). No Vengeance for Revenge Porn Victims: Unravelling Why This Latest Female-Centric, Intimate-Partner Offense Is Still Legal, and Why We Should Criminalize It. Fordham Urban Law Journal, 42(1): 23489.

    • Search Google Scholar
    • Export Citation
  • Boerding, Andreas, Culik, Nicolai, Doepke, Christian and Hoeren, Thomas. (2018). Data Ownership: A Property Rights Approach from a European Perspective. Journal of Civil Law Studies, 11(2): 32370.

    • Search Google Scholar
    • Export Citation
  • Boyle, Karen. (2014). Feminism and Pornography, in Evans, Mary, Hemmings, Clare, Henry, Marsha, Johnstone, Hazel, Madhok, Sumi, Plomien, Ania and Wearing, Sadie (eds) The SAGE Handbook of Feminist Theory, London: SAGE, 21529.

    • Search Google Scholar
    • Export Citation
  • Brannon, Valerie. (2019). Liability for Content Hosts: An Overview of the Communications Decency Act’s Section 230. Congressional Research Service.

    • Search Google Scholar
    • Export Citation
  • Brown, Jonathan. (2018). ‘Revenge Porn’ and the Actio Iniuriarum: Using ‘Old Law’ to Solve ‘New Problems’. Legal Studies, 38(3): 396410.

    • Search Google Scholar
    • Export Citation
  • Brownmiller, Susan. (1975). Against Our Will: Men, Women, and Rape, New York: Simon & Schuster.

  • Brunner, Lisl. (2016). The Liability of an Online Intermediary for Third Party Content: The Watchdog Becomes the Monitor: Intermediary Liability after Delfi v Estonia. Human Rights Law Review, 16: 16374.

    • Search Google Scholar
    • Export Citation
  • Buchanan, James and Yoon, Yong. (2000). Symmetric Tragedies: Commons and Anti-Commons. Journal of Law and Economics, 43(1): 114.

  • Bushard, Brian. (2022). Pornhub CEO And COO Resign amid Blowback over Nonconsensual Videos of Minors. Forbes, [Online] 21 June. Available from: https://www.forbes.com/sites/brianbushard/2022/06/21/pornhub-ceo-and-coo-resign-amid-blowback-over-nonconsensual-videos-of-minors/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Calabresi, Guido and Hirschoff, Jon. (1972). Toward a Test of Strict Liability in Tort. Yale Law Journal, 81(6): 105585.

  • Calabresi, Guido. and Klevorick, Alvin. (1985). Four Tests for Liability in Torts. Journal of Legal Studies, 14(3): 585627.

  • Campbell, John. (2011). An Anomaly: Special Damages for Libel. Journal of Media Law, 3(2): 1938.

  • Cane, Peter. (1991). Tort Law and Economic Interests, Oxford: Oxford University Press.

  • Cane, Peter. (1997). The Anatomy of Tort Law, London: Hart.

  • Cardi, Julia. (2020). Denver Judge Awards Damages in Civil Revenge Porn Lawsuit. Law Week Colorado, [Online] 26 August. Available from: https://lawweekcolorado.com/2020/08/denver-judge-awards-damages-in-civil-revenge-porn-lawsuit/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Carotte, Elise, Davis, Angela and Lim, Megan. (2020). Sexual Behaviours and Violence in Pornography: Systematic Review and Narrative Synthesis of Video Content Analyses. Journal of Medical Internet Research, 22(5): e16702.

    • Search Google Scholar
    • Export Citation
  • Carroll, Robyn and Witzleb, Normann. (2011). ‘It’s Not Just about the Money’ Enhancing the Vindicatory Effect of Private Law Remedies. Monash University Law Review, 37(1): 21640.

    • Search Google Scholar
    • Export Citation
  • Cheer, Ursula. (2016). Divining the Dignity Torts: A Possible Future for Defamation and Privacy, in Kenyon, Andrew. (ed) Comparative Defamation and Privacy Law, Cambridge: Cambridge University Press, 30930.

    • Search Google Scholar
    • Export Citation
  • Chesney, Robert and Citron, Danielle. (2019). Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security. California Law Review, 107: 1753820.

    • Search Google Scholar
    • Export Citation
  • Chisala-Tempelhoff, Sarai and Twesiime Kirya, Monica. (2016). Gender, Law and Revenge Porn in Sub-Saharan Africa: A Review of Malawi and Uganda. Palgrave Communications 2: 16069.

    • Search Google Scholar
    • Export Citation
  • Chouliaraki, Lillie. (2006). The Spectatorship of Suffering, London: SAGE.

  • Citron, Danielle. (2009). Cyber Civil Rights. Boston University Law Review, 89(1): 61125.

  • Citron, Danielle. (2016). Hate Crimes in Cyberspace, Cambridge: Harvard University Press.

  • Citron, Danielle. (2019). Sexual Privacy. Yale Law Journal, 128(7): 1870961.

  • Citron, Danielle and Franks, Mary Ann. (2014). Criminalizing Revenge Porn. Wake Forest Law Review, 49(2): 34592.

  • Citron, Danielle and Wittes, Benjamin. (2017). The Internet Will Not Break: Denying Bad Samaritans Section 230. Immunity Fordham Law Review, 86(2): 40123.

    • Search Google Scholar
    • Export Citation
  • Cloud, Morgan. (2018). Property Is Privacy: Locke and Brandeis in the Twenty-First Century. American Criminal Law Review, 55(1): 3775.

    • Search Google Scholar
    • Export Citation
  • Cohen, Felix. (1935). Transcendental Nonsense and the Functional Approach. Columbia Law Review, 35(6): 80949.

  • Cohen, Lloyd. (1991). Holdouts and Free Riders. Journal of Legal Studies, 20(2): 35162.

  • Cox, Joseph. (2015). How the FBI Located Suspected Admins of the Dark Web’s Largest Child Porn Site. Vice, [Online] 2 March. Available from: https://www.vice.com/en/article/jpgm7d/how-the-fbi-identified-suspects-behind-the-dark-webs-largest-child-porn-site-playpen [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Cox, Joseph. (2018). Inside the Private Forums Where Men Illegally Trade Upskirt Photos. Vice, [Online] 8 May. Available from: https://www.vice.com/en/article/gykxvm/upskirt-creepshot-site-the-candid-forum?utm_source=mbtwitter [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Croucher, Stephen. (2011). Social Networking and Cultural Adaptation: A Theoretical Model. Journal of International & Intercultural Communication, 4(4): 25964.

    • Search Google Scholar
    • Export Citation
  • Crown Prosecution Service. (2020). Indecent and Prohibited Images of Children. CPS, [Online]. Available from: https://www.cps.gov.uk/legal-guidance/indecent-and-prohibited-images-children [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Crown Prosecution Service (2022). Hate Crime. CPS, [Online]. Available from: https://www.cps.gov.uk/hate-crime [Accessed 22 July 2022].

  • Cyber Civil Rights Initiative. (2014). End Revenge Porn. Cyber Civil Rights, [Online]. Available from: https://www.cybercivilrights.org/wp-content/uploads/2014/12/RPStatistics.pdf [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Dagan, Hanoch. (1999). Takings and Distributive Justice. Virginia Law Review, 85(5): 741804.

  • Dagan, Hanoch. (2002). Market Overt as Insurance, in Lerner, Shalom and Lewinsohn-Zamir, Daphna. (eds) Essays in Honour of Joshua Weisman, Jerusalem: Harry and Michael Sacher Institute for Legislative Research and Comparative Law, 1542.

    • Search Google Scholar
    • Export Citation
  • Dagan, Hanoch. (2007). The Realist Conception of Law. University of Toronto Law Journal, 57(3): 60760.

  • Dagan, Hanoch and Heller, Michael. (2001). The Liberal Commons. Yale Law Journal, 110(4): 549624.

  • Data & Society Research Institute. (2016). Nonconsensual Image Sharing: One in 25 Americans Has Been a Victim of “Revenge Porn”. Data Society, [Online] 13 December. Available from: https://datasociety.net/pubs/oh/Nonconsensual_Image_Sharing_2016.pdf [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Davey, Tina. (2020). Until Death Do Us Part: Post-Mortem Privacy Rights for the Ante-Mortem Person. University of East Anglia: Doctoral Thesis.

    • Search Google Scholar
    • Export Citation
  • Davidson, Julia, Livingstone, Sonia, Jenkins, Sam, Gekoski, Anna, Choak, Clare, Ike, Tarela et al (2019). Adult Online Hate, Harassment and Abuse. UK Council for Internet Safety, [Online] June. Available from: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/811450/Adult_Online_Harms_Report_2019.pdf [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Davies, Caroline. (2015a). Revenge Porn Cases Increase Considerably, Police Figures Reveal. The Guardian, [Online] 15 July. Available from: www.theguardian.com/technology/2015/jul/15/revenge-porn-cases-increase-police-figures-reveal [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Davies, Paul. (2011). Accessory Liability for Assisting Torts Cambridge Law Journal, 70(2): 35380.

  • Davies, Paul. (2015). Accessory Liability. Oxford: Hart.

  • Davies, Paul. (2016). Accessory Liability in Tort. Law Quarterly Review, 132: 1519.

  • Davis, Antigone. (2019). Detecting Non-Consensual Intimate Images and Supporting Victims. Facebook, [Online] 15 March. Available from: https://about.fb.com/news/2019/03/detecting-non-consensual-intimate-images/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Deakin, Simon. (2012). Markesinis & Deakin on Tort Law, 7th edn. Oxford: Oxford University Press.

  • Department for Digital, Culture, Media & Sport. (2019). Online Harms White Paper (CP 57). Available from: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/973939/Online_Harms_White_Paper_V2.pdf [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Descheemaeker, Eric. (2015). The Harms of Privacy. Journal of Media Law, 7(2): 278306.

  • Descheemaeker, Eric. (2018). Claimant-Focused Damages in the Law of Privacy, in Varuhas, Jason and Moreham, Nicole (eds) Remedies for Breach of Privacy, Oxford: Hart, 14363.

    • Search Google Scholar
    • Export Citation
  • Determann, Lothar. (2018). No One Owns Data. Hastings Law Journal, 70(1): 144.

  • Dillof, Anthony. (2017). Possession, Child Pornography, and Proportionality: Criminal Liability for Aggregate Harm Offenses. Florida State University Law Review, 44(4): 133154.

    • Search Google Scholar
    • Export Citation
  • Dodd, Vikram. (2019). Targeting of Supt Robyn Williams ‘Example of Met Institutional Racism’. The Guardian, [Online] 26 November. Available from: https://www.theguardian.com/uk-news/2019/nov/26/police-officer-robyn-williams-sentenced-unpaid-work-possessing-child-abuse-video [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Dodge, Alexa. (2018). Cyber Harm, ‘Real’ Harm, Emotional Harm: Legal Conceptions of the Harm Caused by Non-Consensual Intimate Image Sharing. American Law and Society Association, 9 June, Toronto.

    • Search Google Scholar
    • Export Citation
  • Dori, Roni. (2018). I’m Going to Be a Revenge Porn Victim for the Rest of My Life. Haaretz, [Online] 4 January. Available from: https://www.haaretz.com/world-news/europe/2018-01-17/ty-article-magazine/.premium/im-going-to-be-a-revenge-porn-victim-for-the-rest-of-my-life/0000017f-e540-d7b2-a77f-e7474d740000 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Douglas, Simon and Goold, Imogen. (2016). Property in Human Biomaterials: A New Methodology. Cambridge Law Journal, 75(3): 478504.

  • Duch-Brown, Nestor, Martens, Bertin and Mueller-Langer, Frank. (2017). The Economies of Ownership, Access and Trade in Digital Data .Seville: European Commission.

    • Search Google Scholar
    • Export Citation
  • Dworkin, Andrea. (1981). Pornography: Men Possessing Women .London: The Women’s Press.

  • Dworkin, Ronald. (1977). Taking Rights Seriously. Cambridge: Harvard University Press.

  • Dworkin, Ronald. (1986). Law’s Empire .London: Fontana Press.

  • Eaton, Asia, Jacobs, Holly and Ruvalcaba, Yanet. (2017). Nationwide Online Study of Nonconsensual Porn Victimization and Perpetration: A Summary Report. CCRI, [Online] June. Available from: https://www.cybercivilrights.org/wp-content/uploads/2017/06/CCRI-2017-Research-Report.pdf [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Edwards, Lillian. (2009). The Rise and Fall of Intermediary Liability Online, in Edwards, L. and Waelde, C. (eds) Law and the Internet, 3rd edn. London: Hart, 4788.

    • Search Google Scholar
    • Export Citation
  • Edwards, Lillian. (2018). With Great Power Comes Great Responsibility? The Rise of Platform Liability, in Edwards, L. (ed) Law, Policy and Internet, London: Bloomsbury. 25390.

    • Search Google Scholar
    • Export Citation
  • Edwards, Lilian and Harbinja, Edina. (2013). Protecting Post-Mortem Privacy: Reconsidering the Privacy Interests of the Deceased in a Digital World. Cardozo Arts & Entertainment Law, 32(1): 83130.

    • Search Google Scholar
    • Export Citation
  • Edwards, Valerie. (2018b). Student Whose Girlfriend Killed Herself after He Threatened Her with Revenge Porn Could Face Trial. NZ Herald, [Online] 11 June. Available from: https://www.nzherald.co.nz/world/news/article.cfm?c_id=2&objectid=12068489 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Electoral Commission. (2018). Analysis of Cases of Alleged Electoral Fraud in the UK in 2017: Summary of Data Recorded by Police Forces 2018. Available from: https://www.electoralcommission.org.uk/__data/assets/pdf_file/0006/239973/Fraud-allegations-data-report-2017.pdf [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Electronic Frontier Foundation. (2015). Manila Principles on Intermediary Liability. Manila Principles, [Online]. Available from: https://www.manilaprinciples.org [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Electronic Frontier Foundation. (2018). The Santa Clara Principles on Transparency and Accountability in Content Moderation. Santa Clara Principles, [Online]. Available from: https://santaclaraprinciples.org [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Elyachar, Jacob. (2018). Young Social Media Users Ignore Facebook, Embrace WhatsApp as Primary News Source. Tech Times, [Online] 14 June. Available from: www.techtimes.com/articles/230255/20180614/young-social-media-users-ignore-facebook-embrace-whatsapp-as-primary-news-source.htm [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Englehardt, Steven. (2019). No Boundaries: Exfiltration of Personal Data by Session-Replay Scripts. Freedom to Tinker, [Online] 15 November. Available from: https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • European Commission. (2017). Tackling Illegal Content Online: Towards an Enhanced Responsibility of Online Platforms, Brussels: European Commission.

    • Search Google Scholar
    • Export Citation
  • European Commission. (2018a). Overview of the Legal Framework of Notice-and-Action Procedures in Member States SMART 2016/0039 – Final Report, Brussels: Directorate-General for Communication Network, Content and Technology.

    • Search Google Scholar
    • Export Citation
  • European Commission. (2018b). Proposal for a Regulation of the European Parliament and of the Council on Preventing the Dissemination of Terrorist Content Online, Brussels: Directorate-General for Migration and Home Affairs.

    • Search Google Scholar
    • Export Citation
  • Facebook. (2018–current). Transparency Reports. Facebook, [Online]. Available from: https://transparency.facebook.com [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Facebook. (2019). 2019 Community Standards Report. Facebook, [Online]. Available from: https://transparency.facebook.com/community-standards-enforcement [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Facebook. (2020). Facebook Reports First Quarter 2020 Results. Facebook, [Online] 29 April. Available from: https://investor.fb.com/investor-news/press-release-details/2020/Facebook-Reports-First-Quarter-2020-Results/default.aspx [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Farber, Daniel and McDonnell, Brett. (2003). Why (and How): Fairness Matters at the IP/Antitrust Interface. Minnesota Law Review, 87: 181770.

    • Search Google Scholar
    • Export Citation
  • Fight the New Drug. (2020a). Can the Line between Consent and Coercion Get Blurred during Porn Production? Fight the New Drug, [Online] 15 July. Available from: https://fightthenewdrug.org/consent-and-coercion-blurred-in-porn-production/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Fight the New Drug. (2020b). Pornhub Reportedly Refused to Remove Videos of This Minor’s Sexual Assault – until She Posed as Her Own Lawyer. Fight the New Drug, [Online] 14 July. Available from: https://fightthenewdrug.org/pornhub-refused-to-remove-videos-of-this-minors-sexual-assault/ (link no longer accessible) [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Fight the New Drug. (2020c). Are Porn Sites Protecting Victims of Nonconsensual Content? We Investigated, Here’s What We Found. Fight the New Drug, [Online] 14 July. Available from: https://fightthenewdrug.org/what-porn-sites-could-be-doing-to-protect-victims/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Fight the New Drug. (2020d). Their Private Videos Were Nonconsensually Uploaded to Pornhub, and Now These Women Are Fighting Back. Fight the New Drug, [Online] 10 April. Available from: https://fightthenewdrug.org/their-private-photos-were-shared-non-consensually-to-pornhub-and-now-these-women-are-fighting-back/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Fight the New Drug. (2021). 7 Cases of Nonconsensual Porn and Rape Tapes Pornhub Doesn’t Want Consumers to Know About. Fight the New Drug, [Online] 3 February. Available from: https://fightthenewdrug.org/pornhub-reportedly-profits-from-nonconsensual-videos/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Fletcher, George. (1972). Fairness and Utility in Tort Theory. Harvard Law Review, 85(3): 53773.

  • Fortin, Francis. (2011). Usenet Newsgroups, Child Pornography and the Role of Participants. The International Centre for Comp. Criminology, Panel Presentation at the Third Annual Illicit Networks Workshop (3 October).

    • Search Google Scholar
    • Export Citation
  • Franks, Mary Ann. (2013a). Why We Need a Federal Criminal Law Response to Revenge Porn. Concurring Opinions, [Online] 15 February. Available from: http://www.concurringopinions.com/archives/2013/02/why-we-need-a-federal-criminal-law-response-to-revenge-porn.html (link no longer accessible) [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Franks, Mary Ann. (2013b). Adventures in Victim Blaming: Revenge Porn Edition. Concurring Opinions, [Online] 1 February. Available from: www.concurringopinions.com/archives/2013/02/adventures-in-victim-blaming-revenge-porn-edition.html (link no longer accessible) [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Franks, Marie Ann. (2017). Revenge Porn Reform: A View from the Front Lines. Florida Law Review, 69(5): 1251338.

  • Friedman, Jonathan and Buono, Francis. (2000). Limiting Tort Liability for Online Third-Party Content under Section 230 of the Communications Act. Federal Communications Law Journal, 52(3): 64766.

    • Search Google Scholar
    • Export Citation
  • Friedmann, Daniel. (1989). The Efficient Breach Fallacy. Journal of Legal Studies, 18(1): 124.

  • Frosio, Giancarlo. (2017a). Internet Intermediary Liability: WILMap, Theory and Trends. International Journal of Learning Technology, 13(1): 1638.

    • Search Google Scholar
    • Export Citation
  • Frosio, Giancarlo. (2017b). Death of ‘No Monitoring Obligations’: A Story of Untameable Monsters. Journal of Intellectual Property, Information Technology and Electronic Commerce, 8(3): 199215.

    • Search Google Scholar
    • Export Citation
  • Frosio, Giancarlo. (2017c). From Horizontal to Vertical: An Intermediary Liability Earthquake in Europe. Journal of Intellectual Property Law & Practice 12(7): 56575.

    • Search Google Scholar
    • Export Citation
  • Frosio, Giancarlo. (2017d). Reforming Intermediary Liability in the Platform Economy: A European Digital Single Market Strategy. Northwestern Law Review, 112: 1946.

    • Search Google Scholar
    • Export Citation
  • Frosio, Giancarlo. (2020). Email correspondence to Tsachi Keren-Paz, 8 February.

  • Frosio, Giancarlo and Mendis, S. (2020). Monitoring and Filtering: European Reform or Global Trend? in Frosio, Giancarlo. (ed) The Oxford Handbook of Online Intermediary Liability, Oxford: Oxford University Press, 54465.

    • Search Google Scholar
    • Export Citation
  • Fuller, Lon and Perdue, William. (1936). The Reliance Interest in Contract Damages. Yale Law Journal, 46(3): 373420.

  • Garrahan, Matthew and Croft, Jane. (2018). Philip Green Case Brings NDAs Back into the Spotlight. Financial Times, [Online] 26 October. Available from: https://www.ft.com/content/fa225f02-d873-11e8-ab8e-6be0dcf18713 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Gauntlett, David. (1997). Ten Things Wrong with the Effects Model, in Dickinson, Roger, Harindranath, Ramaswami and Linné, Olga (eds) Approaches to Audiences: A Reader, London: Arnold, 12030.

    • Search Google Scholar
    • Export Citation
  • Gavin, Jeff and Scott, Adrian. (2019). Attributions of Victim Responsibility in Revenge Pornography. Journal of Aggression, Conflict and Peace Research, 11(4): 26372.

    • Search Google Scholar
    • Export Citation
  • Gavison, Ruth. (1980). Privacy and the Limits of Law. Yale Law Journal, 89(3): 42171.

  • Gebhart, Gennie. (2019). Who Has Your Back? Censorship Edition 2019. Electronic Frontiers Foundation, [Online] 12 June. Available from: https://www.eff.org/wp/who-has-your-back-2019#provides-meaningful-notice [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Gee, Steven. (2010). Commercial Injunctions, 6th edn. London: Sweet & Maxwell.

  • Georgaki, Konstania. Rollo, Alessandro and Giakoumakis, Emmanuel. (2016). Escaping the Slippery Slope: Freedom of Expression and Cyberspace Regulation after the Delfi Case. CUSPE Communications, [Online]. Available from: https://doi.org/10.17863/CAM.25630 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Gewirtz-Meydan, Ateret, Walsh, Wendy, Wolak, Janis and Finkelhor, David. (2018). The Complex Experience of Child Pornography Survivors. Child Abuse and Neglect, 80: 23848.

    • Search Google Scholar
    • Export Citation
  • Gilles, Stephen. (2002). The Emergence of Cost-Benefit Balancing in English Negligence Law. University of Chicago-Kent Law Review, 77(2): 489586.

    • Search Google Scholar
    • Export Citation
  • Gilmore, Lauren. (2016). Porn Pioneers: How Adult Entertainment Boosts Technology. The Next Web, [Online] 30 August. Available from: https://thenextweb.com/news/porn-pioneers-adult-entertainment-boosts-technology [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Glassman, Jordan. (2020). Too Dangerous to Exist: Holding Compromised Internet Platforms Strictly Liable under the Doctrine of Abnormally Dangerous Activities. North Carolina Journal of Law and Technology, 22(2): 293333.

    • Search Google Scholar
    • Export Citation
  • Goldman, Eric. (2008). The Sex Tape Problem … and a Possible Legislative Solution? Technology & Marketing Law, [Blog] 11 July. Available from: https://blog.ericgoldman.org/archives/2008/07/the_sex_tape_pr.htm [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Goldman, Eric. (2010). Ripoff Report Isn’t Bound by Injunction against User Post–Blockowicz v Williams. Technology & Marketing Law, [Blog] 28 December. Available from: www.blog.ericgoldman.org/archives/2010/12/ripoff_report_d.htm [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Goldman, Eric. (2012). Online User Account Termination and 47 USC § 230(c)(2). UC Irvine Law Review, 2(2): 659674.

  • Goldman, Eric. (2013). What Should We Do about Revenge Porn Sites Like Texxxan? Forbes, [Online] 28 January. Available from: www.forbes.com/sites/ericgoldman/2013/01/28/what-should-we-do-about-revenge-porn-sites-like-texxxan/#5cf7fe2c7eff [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Goldman, Eric. (2014). Revenge Porn Is Bad, But It’s Not GoDaddy’s Fault. Forbes, [Online] 10 April. Available from: https://www.forbes.com/sites/ericgoldman/2014/04/10/revenge-porn-is-bad-but-its-not-godaddys-fault/#61ca3d243f6e [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Goldman, Eric. (2016). Facebook Isn’t Liable for Fake User Account Containing Non-Consensual Pornography. Forbes, [Online] 8 March. Available from: www.forbes.com/sites/ericgoldman/2016/03/08/facebook-isnt-liable-for-fake-user-account-containing-non-consensual-pornography/#33a30d7a79b2 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Goldman, Eric. (2017). Ten Worst Section 230 Rulings of 2016 (Plus the Five Best). Technology & Marketing Law Blog, [Blog] 4 January. Available from: https://blog.ericgoldman.org/archives/2017/01/ten-worst-section-230-rulings-of-2016-plus-the-five-best.htm [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Goldman, Eric and Jin, Angie. (2018). Judicial Resolution of Nonconsensual Pornography Dissemination Cases. I/S: A Journal of Law and Policy for the Information Society, 14(2): 283352.

    • Search Google Scholar
    • Export Citation
  • Government Equalities Office. (2015). Hundreds of Victims of Revenge Porn Seek Support from Helpline. Government Equalities Office, [Online] 23 August. Available from: https://www.gov.uk/government/news/hundreds-of-victims-of-revenge-porn-seek-support-from-helpline [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Gray, Anthony. (2018). Vicarious Liability: Critique and Reform, Oxford: Hart.

  • Green, Sarah and Randall, John. (2009). The Tort of Conversion, Oxford: Hart.

  • Greenberg, Andy. (2014). Hacked Celeb Pics Made Reddit Enough Cash to Run Its Servers for a Month. Wired, [Online] 10 September. Available from: https://www.wired.com/2014/09/celeb-pics-reddit-gold/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Guo, Richard. (2008). Stranger Danger and the Online Social Network. Berkley Tech Law Journal, 23(1): 61744.

  • Haber, Eldar. (2016). Privatization of the Judiciary. Seattle University Law Review, 40(1): 11572.

  • Halley, Janet. (2006). Split Decisions: How and Why to Take a Break from Feminism, New Jersey: Princeton University Press.

  • Halliday, Josh. (2015). Revenge Porn: 175 Cases Reported to Police in Six Months. The Guardian, [Online] 11 October. Available from: https://www.theguardian.com/uk-news/2015/oct/11/revenge-porn-175-cases-reported-to-police-in-six-months [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Hamilton, Fiona. (2021). Police Officer Robyn Williams Sacked over Child Abuse Video Wins Her Job Back. The Times, [Online] 17 June. Available from: https://www.thetimes.co.uk/article/police-officer-sacked-over-child-abuse-video-wins-her-job-back-after-appeal-g7g0dhrfp [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Hamilton, Melissa. (2012). The Child Pornography Crusade and Its Net-Widening Effect. Cardozo Law Review, 33(4): 16791729.

  • Harari, Yuval Noah. (2016). Homo Deus: A Brief History of Tomorrow, London: Penguin.

  • Harn Lee, Yin. (2019). Delivering (Up). A Copyright-Based Remedy for Revenge Porn. Journal of International Property Law & Practice, 14(2): 99111.

    • Search Google Scholar
    • Export Citation
  • Hartshorne, John. (2012). An Appropriate Remedy for the Publication of False Private Information. Journal of Media Law, 4(1): 93116.

  • Hedley, Steve. (2009). Looking Outward or Looking Inward? Obligations Scholarship in the Early 21st Century, in Robertson, Andrew and Tang, Hang Wu. (eds) The Goals of Private Law, London: Hart, 193214.

    • Search Google Scholar
    • Export Citation
  • Helman, Lital and Parchomovsky, Gideon. (2011). The Best Available Technology Standard. Columbia Law Review, 111(6): 1194242.

  • Henry, Nicola and Powell, Anastasia. (2018). Technology-Facilitated Sexual Violence: A Literature Review of Empirical Research. Trauma, Violence & Abuse, 19(2): 195208.

    • Search Google Scholar
    • Export Citation
  • Henry, Nicola, Powell, Anastasia and Flynn, Asher. (2017). Not Just ‘Revenge Pornography’: Australians Experiences of Image-Based Abuse: A Summary Report. RMIT University, [Online] May. Available from: https://researchmgt.monash.edu/ws/portalfiles/portal/214045352/revenge_porn_report_2017.pdf [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Henry, Nicola, Flynn, Asher and Powell, Anastasia. (2019). Responding to Revenge Pornography: Prevalence, Nature and Impacts, Melbourne: Criminology Research Advisory Council.

    • Search Google Scholar
    • Export Citation
  • Hepburn, Carol L. (2021). Savage Lawyers, Seattle. Email correspondence to Tsachi Keren-Paz, 8 September.

  • Hern, Alex. (2019). Revealed: Catastrophic Effects of Working as a Facebook Moderator. The Guardian, [Online] 17 September. Available from: https://www.theguardian.com/technology/2019/sep/17/revealed-catastrophic-effects-working-facebook-moderator [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Hessick, Carissa B. (ed) (2016). Refining Child Pornography Law, Ann Arbor: University of Michigan Press.

  • Hill, Rachel. (2015). Cyber-Misogyny: Should Revenge Porn Be Regulated in Scotland and if So How? SCRIPT-ed, 12(2): 11740.

  • Hoboken, Joris and Keller, Daphne. (2019). Design Principles for Intermediary Liability Laws. Transatlantic Working Group, [Online] 8 October. Available from: https://www.ivir.nl/publicaties/download/Intermediary_liability_Oct_2019.pdf [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Holland, David. (2014). Remedies after Coventry v Lawrence: Shelfer Shelved? Landmark Chambers, [Online]. Available from: https://www.landmarkchambers.co.uk/wp-content/uploads/2018/07/DMH-CovLawrence.pdf. [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Holten, Emma. (2020). Consent. Frikson, [Online] 14 June. Available from: https://friktionmagasin.dk/consent-86fe7b14282f [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Horwitz, Morton. (1977). The Transformation of American Law 1780–1860, Cambridge: Harvard University Press.

  • Howden, Spence. (2019). Text Messages Are Property: Why You Don’t Own Your Text Messages, but It’d Be a Lot Cooler if You Did. Washington and Lee Law Review, 76(2): 1074126.

    • Search Google Scholar
    • Export Citation
  • Hunt, Chris. (2011). Conceptualizing Privacy and Elucidating Its Importance: Foundational Considerations for the Development of Canada’s Fledgling Privacy Tort. Queen’s Law Journal, 37(1): 16799.

    • Search Google Scholar
    • Export Citation
  • Husovec, Marti and Peguera, Miquel. (2015). Much Ado about Little: Privately Litigated Internet Disconnection Injunctions. International Review of Intellectual Property and Competition Law, 46(1): 1037.

    • Search Google Scholar
    • Export Citation
  • Ibbetson, David. (2001). A Historical Introduction to the Law of Obligations, Oxford: Oxford University Press.

  • ICF Consulting Services Limited. (2019). Research into Online Platforms Operating Models and Management of Online Harms, London: Department for Digital, Culture, Media & Sport.

    • Search Google Scholar
    • Export Citation
  • Irish News. (2018). Facebook in Legal Settlement over Naked Picture of Northern Ireland Girl (14). Irish News, [Online] 9 January. Available from: www.irishnews.com/news/northernirelandnews/2018/01/09/news/facebook-in-legal-settlement-over-naked-picture-of-northern-ireland-girl-14--1228484/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Isaac, Mike. (2019). Facebook’s Profits and Revenue Climb as It Gains More Users. New York Times, [Online] 30 January. Available from: https://www.nytimes.com/2019/01/30/technology/facebook-earnings-revenue-profit.html [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Isaacs, Kate. (2019). Pornhub: The Ongoing Revenge Porn Investigation. Open Access Government, [Online] 29 October. Available from: https://www.openaccessgovernment.org/revenge-porn-investigation/76810/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Isaacs, Kate. (2020). Pornhub Needs to Change – or Shut Down. The Guardian, [Online] 9 March. Available from: https://www.theguardian.com/global-development/2020/mar/09/pornhub-needs-to-change-or-shut-down [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Ivanova, Yordanka. (2020). Data Controller, Processor, or Joint Controller: Towards Reaching GDPR Compliance in a Data- and Technology Driven World, in Tzanou, Maria. (ed) Personal Data Protection and Legal Developments in the European Union, Hershey: IGI Global, 6184.

    • Search Google Scholar
    • Export Citation
  • Jacob, Assaf. (2012). Daaka’s Ache and the Evolution of ‘Harm to Plaintiff’s Autonomy’. Hebrew University Law Review, 42: 585.

    • Search Google Scholar
    • Export Citation
  • Jenkins, Phillip. (2001). Beyond Tolerance: Child Pornography on the Internet, New York: New York University Press.

  • Jinana, Haider. (2020). The English Torts of Defamation and (False) Privacy: Analysing the Impact of the Overlap on Defences, Interim Injunctions and Damages. Keele: PhD Dissertation.

    • Search Google Scholar
    • Export Citation
  • Kamal, Mudasir and Newman, William. (2016). Revenge Pornography: Mental Health Implications and Related Legislation. Journal of the American Academy of Psychiatry and the Law, 44(3): 35967.

    • Search Google Scholar
    • Export Citation
  • Kanecek, Vaclav. (2018). Ownership of Personal Data in the Internet of Things. Computer Law & Security Review, 34(5): 103952.

  • Kaplow, Louis and Shavell, Steven. (1996). Accuracy in the Assessment of Damages. Journal of Law and Economics, 39(1): 191210.

  • Karanian, Lara. (2019). Stripped of Dignity? Humiliation, Privacy and the Punishment of Revenge Porn. LSA Annual Conference, 31 May, Toronto.

    • Search Google Scholar
    • Export Citation
  • Keating, Gregory. (2000). Distributive and Corrective Justice in the Tort Law of Accidents. Southern California Law Review, 74(1): 193224.

    • Search Google Scholar
    • Export Citation
  • Keating, Gregory. (2001). The Theory of Enterprise Liability and Common Law Strict Liability. Vanderbilt Law Review, 54(3): 1285336.

  • Keating, Gregory. (2003a). Irreparable Injury and Extraordinary Precaution: The Safety and Feasibility Norms in American Accident Law. Theoretical Inquiries in Law, 4(1): 188.

    • Search Google Scholar
    • Export Citation
  • Keating, Gregory. (2003b). Pressing Precaution beyond the Point of Cost-Justification. Vanderbilt Law Review, 56(3): 653750.

  • Keating, Gregory. (2012). The Priority of Respect over Repair. Legal Theory, 18(3): 293338.

  • Keating, Gregory. (2018). Principles of Risk Imposition and the Priority of Avoiding Harm. Revus, 36: 130.

  • Keating, Gregory. (2019). Justice for Guinea Pigs. Law Innovation and Technology, 11(1): 7592.

  • Keller, Daphne. (2017a). SESTA and the Teachings of Intermediary Liability. SSRN, [Online] 2 November. Available from: www.ssrn.com/abstract=3121296 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Keller, Daphne. (2017b). Problems with Filters in the European Commission’s Platforms Proposal. CIS Blog, [Blog] 5 October. Available from: http://cyberlaw.stanford.edu/blog/2017/10/problems-filters-european-commissions-platforms-proposal [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Keller, Daphne and Leersen, Paddy. (2020). Facts and Where to Find Them: Empirical Research on Internet Platforms and Content Moderation, in Persily, Nathaniel and Tucker, Joshua. (eds) Social Media and Democracy: The State of the Field and Prospects for Reform, Cambridge: Cambridge University Press, 22051.

    • Search Google Scholar
    • Export Citation
  • Kennedy, Duncan. (1982). Distributive and Paternalist Motives in Contract and Tort Law, with Special Reference to Compulsory Terms and Unequal Bargaining Power. Maryland Law Review, 41(4): 563635.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2003). Egalitarianism as Justification: Why and How Should Egalitarian Considerations Reshape the Standard of Care in Negligence Law. Theoretical Inquiries in Law, 4(1): 160.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2007a). Torts, Egalitarianism and Distributive Justice, Farnham: Ashgate.

  • Keren-Paz, Tsachi. (2007b). Compensating Injury to Autonomy: Normative Evaluation, Recent Developments and Future Tendencies. Colman Law Review 22: 187266.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2010). Poetic Justice: Why Sex-Slaves Should Be Allowed to Sue Ignorant Clients in Conversion. Law & Philosophy, 29: 30736.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2013). Sex Trafficking: A Private Law Response, Abingdon: Routledge.

  • Keren-Paz, Tsachi. (2014). Injuries from Unforeseeable Risks which Advance Medical Knowledge: Restitution-Based Justification for Strict Liability. Journal of European Tort Law, 5(3): 275309.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2016). Liability for Consequences, Duty of Care and the Limited Relevance of Specific Reliance: New Insights on Bhamra v Dubb .Journal of Professional Negligence, 32(1): 4865.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2017). Compensating Injury to Autonomy: A Conceptual and Normative Analysis, in Barker, Kit, Fairweather, Karen and Grantham, Ross. (eds) Private Law in the Twenty-First Century, Oxford: Hart, 41137.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2018). Compensating Injury to Autonomy in English Negligence Law: Inconsistent Recognition. Medical Law Review, 26(4): 585609.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2019a). No-fault (strict): Liability for Injuries from Innovative Treatments: Fairness or also Efficiency? Law, Innovation and Technology, 11(4): 5574.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2019b). Gender Injustice in Compensating Injury to Autonomy in English and Singaporean Negligence Law. Feminist Legal Studies, 27(1): 3356.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi. (2020). The Uncreditworthy’s Tale: Personalized Default Rules and the Problem of Tracking. Tel Aviv University Law Review, 42(2): 42146.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi and Cockburn, Tina. (eds) (2019). Regulating Innovative Treatments: Information, Risk Allocation and Redress. Law, Innovation and Technology, Special Issue, 11(1): 1174.

    • Search Google Scholar
    • Export Citation
  • Keren-Paz, Tsachi and Wright, Richard. (2019). Liability for Mass Sexual Abuse. American Criminal Law Review, 56(1): 185234.

  • Kleeman, Jenny. (2018). YouTube Star Wins Damages in Landmark UK ‘Revenge Porn’ Case. The Guardian, [Online] 17 January. Available from: www.theguardian.com/technology/2018/jan/17/youtube-star-chrissy-chambers-wins-damages-in-landmark-uk-revenge-porn-case [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Knight, Lewis. (2021). Sharon Stone Says She Was Not Warned about Explicit Shot in Basic Instinct Scene. The Mirror, [Online] 18 March. Available from: https://www.mirror.co.uk/3am/celebrity-news/sharon-stone-says-not-warned-23756519 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Kosseff, Jeff. (2010). Defending Section 230: The Value of Intermediary Immunity. Journal of Technology Law and Policy, 15(2): 12358.

    • Search Google Scholar
    • Export Citation
  • Kowalski, Robin, Limber, Susan and Agatson, Patricia. (2008). Cyberbullying: Bullying in the Digital Age, Oxford: Oxford University Press.

    • Search Google Scholar
    • Export Citation
  • Kristof, Nicholas. (2020). The Children of Pornhub. New York Times, [Online] 4 December. Available from: https://www.nytimes.com/2020/12/04/opinion/sunday/pornhub-rape-trafficking.html [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Kronman, Anthony. (1978). Mistake, Disclosure, Information, and the Law of Contracts. Journal of Legal Studies, 7(1): 134.

  • Kuwert, Phillipp, Glaesmer, Heide, Eichhorn, Svenja, Grundke, Elena, Pietrzak, Robert H. and Freyberger, Harald J. et al (2014). Long-Term Effects of Conflict-Related Sexual Violence Compared with Non-Sexual War Trauma in Female World War II Survivors: A Matched Pairs Study. Archives of Sexual Behaviour 43(6): 105964.

    • Search Google Scholar
    • Export Citation
  • La, Lynn. (2018). YouPorn’s Cringey Revenge Porn Video Is a Step in the Right Direction. CNET, [Online] 27 March. Available from: https://www.cnet.com/news/revenge-porn-youporn-reporting-tool/#.

    • Search Google Scholar
    • Export Citation
  • Laidlaw, Emily and Young, Hilary. (2017). Internet Intermediary Liability in Defamation: Proposals for Statutory Reform, Ontario: Law Commission of Ontario.

    • Search Google Scholar
    • Export Citation
  • Laidlaw, Emily and Young, Hilary. (2019). Internet Intermediary Liability in Defamation. Osgoode Hall Law Journal, 56(1): 153202.

  • Laidlaw, Emily and Young, Hilary. (2020). Creating a Revenge Porn Tort for Canada. Supreme Court Law Review, 96(2): 14787.

  • Lanier, Jaron. (2018). Ten Arguments for Deleting your Social Media Accounts Right Now, New York: Random House.

  • Larusdottir, Jónína Sigrún. (2010). Liability of Intermediaries for Copyright Infringement in the Case of Hosting on the Internet. Stockholm Institute for Scandinavian Law, 472–88.

    • Search Google Scholar
    • Export Citation
  • Law Commission. (2021). Intimate Image Abuse: Consultation Paper (CP 253), London: Stationary Office.

  • Law Commission. (2022). Intimate Image Abuse: A Final Report (Law Com No 407), London: Stationary Office.

  • Lessig, Larry. (2002). Privacy as Property. Social Research, 69(1): 24769.

  • Lippman, Julia and Campbell, Scott. (2014). Damned if You Do, Damned if You Don’t … if You’re a Girl: Relational and Normative Contexts of Adolescent Sexting in the United States. Journal of Children and Media, 8(4): 37186.

    • Search Google Scholar
    • Export Citation
  • Lipton, Jacqueline. (2011). Combating Cyber-Victimization. Berkeley Tech Law Review, 26(2): 110454.

  • Llewellyn, Karl. (1931). Some Realism about Realism: Responding to Dean Pound. Harvard Law Review, 44(8): 122264.

  • Lollar, E Cortney. (2013). Child Pornography and the Restitution Revolution. The Journal of Criminal Law and Criminology, 103(2): 34383.

    • Search Google Scholar
    • Export Citation
  • Lopez, Tess, Allenbaugh, Mark and Ellis, Alan. (2012). Trends and Practice Tips for Representing Child Pornography Offenders at Sentencing. Criminal Justice, 27(3): 312.

    • Search Google Scholar
    • Export Citation
  • LoPiano, James. (2018). Public For a Purpose: Analyzing Viewpoint Discrimination on the President’s Twitter Account. Fordham Intellectual Property, Media & Entertainment Law Journal, 28(3): 51170.

    • Search Google Scholar
    • Export Citation
  • Lunney, Mark, Nolan, Donal and Oliphant, Ken. (2017). Tort Law, 6th edn. Oxford: Oxford University Press.

  • Lytton, Timothy. (ed) (2005). Suing the Gun Industry, Ann Arbor: University of Michigan Press.

  • Mabie, Margaret E. (2021). Email correspondence to Tsachi Keren-Paz, 8 September.

  • Mackie, Jeannie. (2014). Jennifer Lawrence’s Nude Photo Leak Was a Scandal, but Legally Speaking It Was Not a Sex Crime. The Independent, [Online] 10 October. Available from: https://www.independent.co.uk/voices/comment/jennifer-lawrence-s-nude-photo-leak-was-scandal-legally-speaking-it-was-not-sex-crime-9786886.html [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Mackinnon, Catharine. (2011). Trafficking, Prostitution, and Inequality. Harvard Civil Rights Civil Liberties Law Review, 46(2): 271310.

    • Search Google Scholar
    • Export Citation
  • Mangan, David. (2017). The Relationship between Defamation, Breach of Privacy and Other Legal Claims Involving Offensive Internet Content, Toronto: Law Commission of Ontario.

    • Search Google Scholar
    • Export Citation
  • Marshall, Jojo. (2014). Why We All Need to Worry about Revenge Porn. Elle, [Online] 24 September. Available from: https://www.elle.com/life-love/sex-relationships/news/a15497/what-is-revenge-porn/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Marshall, Tom. (2016). YouTube Star in £22,000 Crowdfunding Bid to Finance Revenge Porn Legal Battle. The Evening Standard, [Online] 28 February. Available from: https://www.standard.co.uk/news/crime/youtube-star-in-ps22-000-crowdfunding-bid-to-finance-revenge-porn-claim-a3190901.html [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Marwick, Alice. (2017). Scandal or Sex Crime? Gendered Privacy and the Celebrity Nude Photo Leaks. Ethics and Information Technology, 19: 17791.

    • Search Google Scholar
    • Export Citation
  • Mautner, Menachem. (1991). The Eternal Triangles of the Law: Toward a Theory of Priorities in Conflicts Involving Remote Parties. Michigan Law Review, 90(1): 95154.

    • Search Google Scholar
    • Export Citation
  • McAteer, Oliver. (2017). Anthony Weiner Jailed for Sexting Underage Girl Photos of his Penis. Metro, [Online] 25 September. Available from: www.metro.co.uk/2017/09/25/anthony-weiner-jailed-for-sexting-underage-girl-photos-of-his-penis-6954415/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • McBride, Nicolas. (2019). The Humanity of Private Law: Explanation, London: Hart.

  • McGlynn, Clare and Rackley, Erica. (2017). Image-Based Sexual Abuse. OJLS, 37(3): 53461.

  • McGlynn, Clare, Rackley, Erica and Houghton, Ruth. (2017). Beyond ‘Revenge Porn’: The Continuum of Image-Based Sexual Abuse. Feminist Legal Studies, 25: 2546.

    • Search Google Scholar
    • Export Citation
  • McGlynn, Clare, Johnson, Kelly, Rackley, Erika, Henry, Nicola,Gavey, Nicola and Flynn, Asher et al (2021). It’s Torture for the Soul’: The Harms of Image-Based Sexual Abuse. Social & Legal Studies, 30(4): 54162.

    • Search Google Scholar
    • Export Citation
  • McIntyre, T.J. (2018). Internet Censorship in the United Kingdom: National Schemes and European Norms, in Edwards, Lillian (ed) Law, Policy and the Internet, 3rd edn. London: Hart, 291331.

    • Search Google Scholar
    • Export Citation
  • McPhail, Beverly. (2015). Feminist Framework Plus: Knitting Feminist Theories of Rape Etiology into a Comprehensive Model. Trauma, Violence, & Abuse, 17(3): 31429.

    • Search Google Scholar
    • Export Citation
  • Merrill, Thomas. (1986). The Economics of Public Use. Cornell Law Review 72(1): 61116.

  • Merrill, Thomas. (1998). Property and the Right to Exclude. Nebraska Law Review, 77(4): 73055.

  • Meta. (2021). Facebook Community Standards; Part III Objectionable Content; Adult Nudity and Sexual Activity. Meta, [Online]. Available from https://www.facebook.com/communitystandards/adult_nudity_sexual_activity [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Michels, Johan and Millard, Christopher. (2019). Mind the Gap: The Status of Digital Files under Property Law. Queen Mary School of Law Legal Studies Research Paper No 317/2019, [Online]. Available from: https://ssrn.com/abstract=3387400 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Mohan, Megha. (2020). I was Raped at 14, and the Video Ended Up on a Porn Site. BBC, [Online] 10 February. Available from: https://www.bbc.co.uk/news/stories-51391981 [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Mooney, Annabelle (2014). Restoring Trust: Plachimada, the Human Trust and Anticipatory Negligence as Restorative Justice. International Journal for the Semiotics of Law, 27(2): 24361.

    • Search Google Scholar
    • Export Citation
  • Moore, Caitlin. (2014). Jennifer Lawrence on Hacked Photos: Anybody Who Looked at Those Pictures, You’re Perpetuating a Sexual Offence. Washington Post, [Online] 7 October. Available from: https://www.washingtonpost.com/news/arts-and-entertainment/wp/2014/10/07/jennifer-lawrence-on-hacked-photos-anybody-who-looked-at-those-pictures-youre-perpetuating-a-sexual-offense/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Moosavian, Rebecca. (2018). ‘Stealing Souls’? Article 8 and Photographic Intrusion. Northern Ireland Law Quarterly, 69(4): 53158.

    • Search Google Scholar
    • Export Citation
  • Moosavian, Rebecca. (2022). Pavesich v New England Insurance Co (1905), in Wragg, P. and Coe, P. (eds) Landmark Cases in Privacy, Oxford: Hart, chapter 3.

    • Search Google Scholar
    • Export Citation
  • Moreham, Nicole. (2005). Privacy in the Common Law: A Doctrinal and Theoretical Analysis. Law Quarterly Review, 121: 62836.

  • Moreham, Nicole. (2018a). Compensating for Loss of Dignity and Autonomy, in Varuhas, Jason and Moreham, Nicole (eds) Remedies for Breach of Privacy, Oxford: Hart, 12542.

    • Search Google Scholar
    • Export Citation
  • Moreham, Nicole. (2018b). Unpacking the Reasonable Expectation of Privacy Test. Law Quarterly Review, 134: 65174.

  • Moreham, Nicole (2019). Privacy, Reputation and Alleged Wrongdoing: Why Police Investigations Should Not Be Regarded as Private. Journal of Media Law, 11(2): 14262.

    • Search Google Scholar
    • Export Citation
  • Morgan, Bronwen. (2007). The Intersection of Rights and Regulation .Farnham: Ashgate.

  • Mullis, Alistair, Parkes, Richard and Busuttil, Godwin. (eds) (2013). Gately on Libel and Slander, 12th edn. London: Sweet & Maxwell.

  • Murphy, John. (2007). Rethinking Injunctions in Tort Law. Oxford Journal of Legal Studies, 27(3): 50936.

  • Murphy, John. (2022). The Province and Politics of the Economic Torts, Oxford: Hart.

  • Nehushtan, Yossi. (2007). The Limits of Tolerance: A Substantive-Liberal Perspective. Ratio Juris, 20(2): 23057.

  • Netanel, Neil W. (2000). Market Hierarchy and Copyright in Our System of Free Expression. Vanderbilt Law Review, 53(6): 1879932.

  • Newton, Casey. (2019). The Trauma Floor. The Verge, [Online] 25 February. Available from: https://www.theverge.com/2019/2/25/18229714/cognizant-facebook-content-moderator-interviews-trauma-working-conditions-arizona. [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Nicklin, Matthew and Strong, Chloe. (2016). Remedies and Sanctions, in Moreham, Nicole and Warby, Mark (eds) Tugendhat and Christie: The Law of Privacy and The Media, 3rd edn. Oxford: Oxford University Press, 555–619.

    • Search Google Scholar
    • Export Citation
  • North, Anna. (2018). The Disturbing Story Behind the Rape Scene in Bernardo Bertolucci’s Last Tango in Paris, explained. Vox, [Online] 26 November. Available from: https://www.vox.com/2018/11/26/18112531/bernardo-bertolucci-maria-schneider-last-tango-in-paris [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • O’Brien, Ashley Sara. (2018). Woman Awarded $6.45 Million in Revenge Porn Case. CNN [Online] 9 April. Available from: https://money.cnn.com/2018/04/09/technology/revenge-porn-judgment/index.html [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • O’Connell, Aislin and Bakina, Ksenia. (2020). Using IP Rights to Protect Human Rights: Copyright for Revenge Porn Removal. Legal Studies, 40(3): 44257.

    • Search Google Scholar
    • Export Citation
  • Oliver, Kelly. (2016). Rape as Spectator Sport and Creepshot Entertainment: Social Media and the Valorization of Lack of Consent. American Studies Journal, [Online]. Available from: http://www.asjournal.org/61-2016/rape-spectator-sport-creepshot-entertainment-social-media-valorization-lack-consent/ [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Oltermann, Phillip. (2014). Revenge Porn Victims Receive Boost from German Court Ruling. The Guardian, [Online] 22 May. Available from: www.theguardian.com/technology/2014/may/22/revenge-porn-victims-boost-german-court-ruling [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • OneLogin. (2022). What Is Multi-Factor Authentication (MFA)? OneLogin, [Online]. Available from: https://www.onelogin.com/learn/what-is-mfa [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Oster, Jan. (2015). Communication, Defamation and Liability of Intermediaries. Legal Studies, 35(2): 34868.

  • Ottenweller, Cara. (2007). Cyberbullying: The Interactive Playground Cries for a Clarification of the Communications Decency Act. Valparaiso University Law Review, 41(3): 1285334.

    • Search Google Scholar
    • Export Citation
  • Palmer, Craig. (1988). Twelve Reasons Why Rape Is Not Sexually Motivated: A Skeptical Examination. The Journal of Sex Research, 25(4): 51230.

    • Search Google Scholar
    • Export Citation
  • Parkes, Richard. (2016). Privacy, Defamation and False Facts, in Moreham, Nicole and Warby, Mark. (eds) Tugendhat and Christie: The Law of Privacy and The Media, 3rd edn. Oxford: Oxford University Press, 34985.

    • Search Google Scholar
    • Export Citation
  • Pasquale, Frank. (2016). Platform Neutrality: Enhancing Freedom of Expression in Spheres of Private Power. Theoretical Inquiries in Law, 17(2): 487514.

    • Search Google Scholar
    • Export Citation
  • Pattella-Ray, P.J. (2018). Beyond Privacy: Bodily Integrity as an Alternative Framework for Understanding Non-Consensual Pornography. Information, Communication and Society, 21(5): 78691.

    • Search Google Scholar
    • Export Citation
  • Paul, Kari. (2020). Pornhub Removes Millions of Videos after Investigation Finds Child Abuse Content. The Guardian, [Online] 14 December. Available from: https://www.theguardian.com/technology/2020/dec/14/pornhub-purge-removes-unverified-videos-investigation-child-abuse [Accessed 22 July 2022].

    • Search Google Scholar
    • Export Citation
  • Peersman, Claudia, Schulze, Christian, Rashid, Awais, Brennan, Margaret and Fischer, Carl. (2016). iCOP: Live Forensics to Reveal Previously Unknown Criminal Media on P2P networks. Digital Investigation, 18: 5064.

    • Search Google Scholar
    • Export Citation
  • Peters, Jonathan. (2017). The Sovereigns of Cyberspace and State Action: The First Amendment’s Application – or Lack Thereof – to Third-Party Platforms. Berkeley Technology Law Journal, 32(2): 9891026.

    • Search Google Scholar
    • Export Citation
  • Peterson, Devon. (2002). Child Pornography on the Internet: The Effect of Section 230 of the Communications Decency Act of 1996 on Tort Recovery for Victims against Internet Service Providers. University of Hawaii Law Review, 24(2): 76396.

    • Search Google Scholar
    • Export Citation
  • Phillipson, Gavin. (2016). Press Freedom, Public Interest and Privacy, in Kenyon, Andrew (ed) Comparative Defamation and Privacy Law, Cambridge: Cambridge University Press, 13663.