2015
DOI: 10.1215/10407391-3145937
|View full text |Cite
|
Sign up to set email alerts
|

Habits of Leaking: Of Sluts and Network Cards

Abstract: This essay attempts to disable the “ruinous” logic that has fueled recent slut-shaming on Web 2.0 by making visible the ways in which our machines are promiscuous—routinely “leaking.” The authors present the leak as a habit so as to disrupt the illusion of privacy and sealed subjectivity that enables the possibility of being a “victim” of slut-shaming, revenge porn, and similar dangers of Web 2.0. They argue that blaming the user for leaks only detracts from the systematic vulnerabilities of Web 2.0. The essay… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
51
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 65 publications
(51 citation statements)
references
References 7 publications
0
51
0
Order By: Relevance
“…Rather than siding with a particular framing of NCIID, I argue for a contextual non-essentialist 4 reading of individual cases and provide critical analysis of the stakes and hazards of taking up particular framings in law. In Chapter 4, I further support the argument for a non-essentialist and contextual understanding of NCIID by demonstrating that, contrary to the belief that all victims of NCIID are "ruined" (Chun and Friedland 2015) by this act, the harm of NCIID is experienced in a variety of ways (i.e. as relatively harmless).…”
Section: Introductionmentioning
confidence: 84%
See 3 more Smart Citations
“…Rather than siding with a particular framing of NCIID, I argue for a contextual non-essentialist 4 reading of individual cases and provide critical analysis of the stakes and hazards of taking up particular framings in law. In Chapter 4, I further support the argument for a non-essentialist and contextual understanding of NCIID by demonstrating that, contrary to the belief that all victims of NCIID are "ruined" (Chun and Friedland 2015) by this act, the harm of NCIID is experienced in a variety of ways (i.e. as relatively harmless).…”
Section: Introductionmentioning
confidence: 84%
“…While relying prominently on feminist theory, I am careful not to utilize feminist theories dogmatically and to bring in additional theoretical approaches (e.g. queer theory) when dynamics arise in primarily utilize theories of digital technology (Mayer-Schonberger 2009, boyd 2011, Baym 2010, Chun andFriedland 2015, Bivens andFairbairn 2015) and photography (Hand, Persistent Traces 2016, Hand, Ubiquitous Photography 2012, Sontag 2003 deriving from science and technology studies and communication studies to attend to the impacts and interpretations of technology in NCIID cases. These theories are hugely important to the study of NCIID as they allow for a critical examination of how the affordances of digital technology and our changing relationship to images in the digital age have impacted experiences of and responses to NCIID.…”
Section: Theoretical Frameworkmentioning
confidence: 99%
See 2 more Smart Citations
“…Further important questions for those working with building such oppositional infrastructures involve the notable quality of "leakiness" in networked technologies for connecting and sharing, a leakiness that has both powerful and potentially dangerous effects (Chun and Friedland 2015). As technologically-informed activist movements of recent years have continually experienced, a transmission and its signal is always at risk of being intercepted or reverse-engineered in ways that can be traced back to its source.…”
Section: Oppositional Infrastructuresmentioning
confidence: 99%