G2TT
来源类型Report
规范类型报告
DOIhttps://doi.org/10.7249/RRA108-3
来源IDRR-A108-3
Countering Technology-Facilitated Abuse: Criminal Justice Strategies for Combating Nonconsensual Pornography, Sextortion, Doxing, and Swatting
Amanda R. Witwer; Lynn Langton; Michael J. D. Vermeer; Duren Banks; Dulani Woods; Brian A. Jackson
发表日期2020-06-18
出版年2020
页码25
语种英语
结论

Raising awareness about the prevalence, costs, and harms of TFA is critical

  • Participants suggested developing a conceptual framework of TFA behaviors and providing school-based public education around internet safety. Participants determined that legislation, measurements of the harms and costs of TFA behaviors, and prioritization by leadership are key to ensuring that TFA cases are prioritized by law enforcement and courts.

Approaches to investigating TFA cases should acknowledge the harm done to victims

  • Increased coordination among law enforcement, lawyers, victims' rights organizations, and service providers would encourage TFA victims to come forward with their cases and would empower them to make decisions about what path of recourse to take.

Criminal justice practitioners often lack the tools to address TFA cases effectively

  • Standards and training around the identification, collection, and processing of digital evidence would enable law enforcement to conduct thorough investigations of TFA crimes. Instituting statutes specific to TFA behaviors, accompanied by sentencing guidelines that acknowledge the harms to and vulnerabilities of TFA victims, would allow prosecutors to ensure that TFA sentences are commensurate with harm and that victims' needs are met.

Participants reported the critical importance of efforts to mitigate the significant, irreparable, and persistent harm experienced by TFA victims

  • There is a need for research to evaluate the extent to which existing remedies mitigate harm, tools for the early detection of TFA, and methods for mitigating the effects of TFA and empowering victims.

Deterrence must be at the core of efforts to address TFA

  • Statutes that criminalize TFA behaviors might serve as a deterrent for some types of TFA perpetrators, although research is needed to better understand TFA perpetrators and the effectiveness of deterrence approaches.
摘要

The proliferation of websites, social media platforms, and applications that enable users to interact virtually and often anonymously has given rise to new modes and methods of perpetrating harassment, abuse, and other criminal behaviors that compromise victims' privacy and safety. These types of acts, termed technology-facilitated abuse (TFA), can involve the use or distribution of the victim's personal information, which compromises the victim's privacy and poses a threat to their safety. Efforts to combat these profoundly harmful acts are limited by a lack of awareness among the general public and criminal justice practitioners, impediments to investigation and adjudication presented by digital spaces, and laws and policies that have not kept pace with advancements in digital technologies. To examine this issue, RTI International and the RAND Corporation convened an expert workshop. The participants discussed the challenges, opportunities, and complexities faced by law enforcement and criminal justice practitioners in TFA cases. Using these discussions, the panel members identified and ranked needs for the public, law enforcement, and criminal justice practitioners to successfully identify and prosecute TFA cases. This report provides the prioritized list of needs and accompanying context from the discussion that resulted from this effort.

目录 Countering Technology-Facilitated Abuse: Criminal Justice Strategies for Combating Nonconsensual Pornography, Sextortion, Doxing, and Swatting | RAND
Loading…
主题Crime and Violence Prevention ; Cybercrime ; Data Privacy ; The Internet ; Law Enforcement ; Sexual Harassment
URLhttps://www.rand.org/pubs/research_reports/RRA108-3.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/524125
推荐引用方式
GB/T 7714
Amanda R. Witwer,Lynn Langton,Michael J. D. Vermeer,et al. Countering Technology-Facilitated Abuse: Criminal Justice Strategies for Combating Nonconsensual Pornography, Sextortion, Doxing, and Swatting. 2020.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
RAND_RRA108-3.pdf(417KB)智库出版物 限制开放CC BY-NC-SA浏览
1592484465436.jpg(10KB)智库出版物 限制开放CC BY-NC-SA缩略图
浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Amanda R. Witwer]的文章
[Lynn Langton]的文章
[Michael J. D. Vermeer]的文章
百度学术
百度学术中相似的文章
[Amanda R. Witwer]的文章
[Lynn Langton]的文章
[Michael J. D. Vermeer]的文章
必应学术
必应学术中相似的文章
[Amanda R. Witwer]的文章
[Lynn Langton]的文章
[Michael J. D. Vermeer]的文章
相关权益政策
暂无数据
收藏/分享
文件名: RAND_RRA108-3.pdf
格式: Adobe PDF
文件名: 1592484465436.jpg
格式: JPEG

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。