SlideShare a Scribd company logo
1 of 23
Download to read offline
“Sexting”
Noah Levin
Pittsburgh, PA | April 25th, 2009
Carnegie Mellon University


Style of this presentation borrowed with love
from Garrett Dimon’s presentation:
“Improving Interface Design”, 2007
1
Background
Problem, Case Studies, Current Legislation




Pittsburgh, PA | April 25th, 2009            2
“     Sexting is the act of sending
      sexually explicit messages or
                                       “
      photos electronically, primarily
      between cell phones.



Wikipedia
http://en.wikipedia.org/wiki/Sexting
“     All you look at is, is this a nude or
      seminude or suggestive
      photograph, and is the person
      depicted in it a minor? And that is
      enough to warrant a criminal
                                                      “
      prosecution for child pornography.


MARK RASCH
http://www.onthemedia.org/transcripts/2009/01/23/05
A Few Case Studies
13 year olds from PA. three girls charged with
child pornography from sending photos of
themselves in bra’s
14 year old from NJ. charged with child
pornography for posting 30 myspace photos
17 students in PA. charged with distributing
photos of nude female classmates
18 year old from OH. committed suicide after
a nude photo was spread around her high school
“     This section shall not apply if the person is less
      than 19 years old, the child is at least 13 years old,
      and the child knowingly and voluntarily and
      without threat or coercion used an electronic
      communication device to transmit an image of
                                                             “
      himself or herself to the person.



Vermont Legislation
http://www.leg.state.vt.us/docs/2010/bills/intro/S-125.pdf
“     It would make sexting a first-degree
      misdemeanor for minors. They could
      still face jail time, but more likely the
      teens would receive counseling or
                                                “
      some kind of probation.



ohio Legislation
http://www.ohio.com/news/nation/43019527.html
2
Teleological Approach
Utilitarianism, Situational Ethics, Public Scrutiny




Pittsburgh, PA | April 25th, 2009                     8
Public Scrutiny
Legal Paternalism




0   5   10   15   20   25     30    35   40   45   50   55   60

                            A G E
Expectation of Privacy
75% of teens understood the negative
consequences of sexting before they did it
40% of teens send suggestive text messages, 20%
sent nude or semi-nude text messages
45% of teens say its common for the messages to
be shared outside of intended recipients




http://www.thenationalcampaign.org/sextech/ - 653 teens surveyed
3
Deontological Approach
Kantian Ethics, Right-Based, Absolutist




Pittsburgh, PA | April 25th, 2009         12
Absolutist
What’s wrong is wrong.
At what age do people begin face
consequences?
In Vermont, an 18 year old can be hit with
5-week sessions, but maybe 5 days later on
his 19th birthday he’s a ‘sex offender’.
Categorical Imperative
Interesting gender difference issues; would
a male be bullied the same way?
If all cases of pictures under the category
of child pornography should be handled
the same way, are all pictures actually
created equal?
Bennett Haselton’s Idea
http://news.slashdot.org/article.pl?sid=09/03/30/1249237
Obligations
We have a duty to respect other individuals
and ourselves, and transmitting messages
is disrespecting both of these parties.
Under this line of reason, sexting should
not be tolerated, but what about the
punishment?
Is treating everyone the same way by
placing child pornography accurate?
4
My Argument
One possible solution to teen sexting




Pittsburgh, PA | April 25th, 2009       17
Education.
In light of this technology, we need to pass
legislation at the House that lessens the
charges for lewd teen to teen cell phone
communications.
They should under very few circumstances
be charged with child pornography, but
rather promote educational programming
and probationary periods.
We must also push for nationwide
advertising to keep family’s informed.
Responsibility.
I also believe that those taking the
compromising photos are just as
responsible, even with the consent of the
‘subject’, because they are aware of the
consequences. Again:
Creation, Transmission, and Reception of
teen “sexting” must be observed.
“    We are talking about teens acting
     carelessly with technology…teen
     sexting is not child pornography.
                                                                 “

EDWARD GREENSPAN
http://www.edmontonsun.com/Comment/2009/04/27/9257671-sun.html
FYI
May 23, 2009
Pittsburgh Pundits
Late Night - Cabaret Theater
A comedy show with a panel discussion on
sexting and other matters of sex and law.
412.325.6769
Thank you!
ANY QUESTIONS?

More Related Content

What's hot

What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointHannahMorrell
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingbl03cook
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017N F
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
 
Cyberbulling
CyberbullingCyberbulling
Cyberbullingeborges
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 

What's hot (20)

What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingCyber bullying vs traditional bullying
Cyber bullying vs traditional bullying
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
ICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfICT, the Self, and Society.pdf
ICT, the Self, and Society.pdf
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbulling
CyberbullingCyberbulling
Cyberbulling
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 

Viewers also liked

Caso real de sexting y consejos para el ciberacoso
Caso real de sexting y consejos para el ciberacosoCaso real de sexting y consejos para el ciberacoso
Caso real de sexting y consejos para el ciberacosoJeffry Ramos
 
Sexting (sexteo)
Sexting (sexteo) Sexting (sexteo)
Sexting (sexteo) prilechuza
 
Sexting powerpoint
Sexting powerpoint Sexting powerpoint
Sexting powerpoint dee12
 
Sexting y sextorcion
Sexting y sextorcionSexting y sextorcion
Sexting y sextorcionSexting
 
Sexting en Latinoamérica - Una amenaza desconocida
Sexting en Latinoamérica - Una amenaza desconocidaSexting en Latinoamérica - Una amenaza desconocida
Sexting en Latinoamérica - Una amenaza desconocidaPantallasAmigas
 
Sexting en Latinoamérica - Una amenaza desconocida
Sexting en Latinoamérica - Una amenaza desconocidaSexting en Latinoamérica - Una amenaza desconocida
Sexting en Latinoamérica - Una amenaza desconocidaeCGlobal
 

Viewers also liked (16)

Sexting
SextingSexting
Sexting
 
Sexting
SextingSexting
Sexting
 
Sexting
SextingSexting
Sexting
 
Sexting
SextingSexting
Sexting
 
Caso real de sexting y consejos para el ciberacoso
Caso real de sexting y consejos para el ciberacosoCaso real de sexting y consejos para el ciberacoso
Caso real de sexting y consejos para el ciberacoso
 
NO AL GROOMING
NO AL GROOMINGNO AL GROOMING
NO AL GROOMING
 
Sexting (sexteo)
Sexting (sexteo) Sexting (sexteo)
Sexting (sexteo)
 
Sexting powerpoint
Sexting powerpoint Sexting powerpoint
Sexting powerpoint
 
Sexting y sextorcion
Sexting y sextorcionSexting y sextorcion
Sexting y sextorcion
 
Presentació sexting
Presentació sextingPresentació sexting
Presentació sexting
 
Prevención sexting
Prevención sextingPrevención sexting
Prevención sexting
 
Sexting
SextingSexting
Sexting
 
El sexting
El sextingEl sexting
El sexting
 
Sexting en Latinoamérica - Una amenaza desconocida
Sexting en Latinoamérica - Una amenaza desconocidaSexting en Latinoamérica - Una amenaza desconocida
Sexting en Latinoamérica - Una amenaza desconocida
 
Sexting en Latinoamérica - Una amenaza desconocida
Sexting en Latinoamérica - Una amenaza desconocidaSexting en Latinoamérica - Una amenaza desconocida
Sexting en Latinoamérica - Una amenaza desconocida
 
El sexting
El sextingEl sexting
El sexting
 

Similar to Understanding Teen Sexting

2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying2012 06 Sexting and Cyberbullying
2012 06 Sexting and CyberbullyingRaleigh ISSA
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentationjpl17
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
SafetyNET Sexting
SafetyNET SextingSafetyNET Sexting
SafetyNET SextingJoel Adkins
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletLockley
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
I want to be a Criminal when I grow up
I want to be a Criminal when I grow upI want to be a Criminal when I grow up
I want to be a Criminal when I grow upJamie Butcher
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
Textual harassment and sexting FINAL
Textual harassment and sexting FINALTextual harassment and sexting FINAL
Textual harassment and sexting FINALPaul Cuaresma
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the LawSuna Gurol
 
persuasive campaign presentation
persuasive campaign presentationpersuasive campaign presentation
persuasive campaign presentationredmondke
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 

Similar to Understanding Teen Sexting (20)

Sexting
SextingSexting
Sexting
 
Teens and Sexting
Teens and SextingTeens and Sexting
Teens and Sexting
 
2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
SafetyNET Sexting
SafetyNET SextingSafetyNET Sexting
SafetyNET Sexting
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
The Most Common Juvenile Crimes Essay
The Most Common Juvenile Crimes EssayThe Most Common Juvenile Crimes Essay
The Most Common Juvenile Crimes Essay
 
I want to be a Criminal when I grow up
I want to be a Criminal when I grow upI want to be a Criminal when I grow up
I want to be a Criminal when I grow up
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Presentation1
Presentation1Presentation1
Presentation1
 
Textual harassment and sexting FINAL
Textual harassment and sexting FINALTextual harassment and sexting FINAL
Textual harassment and sexting FINAL
 
Sexting
SextingSexting
Sexting
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
persuasive campaign presentation
persuasive campaign presentationpersuasive campaign presentation
persuasive campaign presentation
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Understanding Teen Sexting

  • 1. “Sexting” Noah Levin Pittsburgh, PA | April 25th, 2009 Carnegie Mellon University Style of this presentation borrowed with love from Garrett Dimon’s presentation: “Improving Interface Design”, 2007
  • 2. 1 Background Problem, Case Studies, Current Legislation Pittsburgh, PA | April 25th, 2009 2
  • 3. Sexting is the act of sending sexually explicit messages or “ photos electronically, primarily between cell phones. Wikipedia http://en.wikipedia.org/wiki/Sexting
  • 4. All you look at is, is this a nude or seminude or suggestive photograph, and is the person depicted in it a minor? And that is enough to warrant a criminal “ prosecution for child pornography. MARK RASCH http://www.onthemedia.org/transcripts/2009/01/23/05
  • 5. A Few Case Studies 13 year olds from PA. three girls charged with child pornography from sending photos of themselves in bra’s 14 year old from NJ. charged with child pornography for posting 30 myspace photos 17 students in PA. charged with distributing photos of nude female classmates 18 year old from OH. committed suicide after a nude photo was spread around her high school
  • 6. This section shall not apply if the person is less than 19 years old, the child is at least 13 years old, and the child knowingly and voluntarily and without threat or coercion used an electronic communication device to transmit an image of “ himself or herself to the person. Vermont Legislation http://www.leg.state.vt.us/docs/2010/bills/intro/S-125.pdf
  • 7. It would make sexting a first-degree misdemeanor for minors. They could still face jail time, but more likely the teens would receive counseling or “ some kind of probation. ohio Legislation http://www.ohio.com/news/nation/43019527.html
  • 8. 2 Teleological Approach Utilitarianism, Situational Ethics, Public Scrutiny Pittsburgh, PA | April 25th, 2009 8
  • 10. Legal Paternalism 0 5 10 15 20 25 30 35 40 45 50 55 60 A G E
  • 11. Expectation of Privacy 75% of teens understood the negative consequences of sexting before they did it 40% of teens send suggestive text messages, 20% sent nude or semi-nude text messages 45% of teens say its common for the messages to be shared outside of intended recipients http://www.thenationalcampaign.org/sextech/ - 653 teens surveyed
  • 12. 3 Deontological Approach Kantian Ethics, Right-Based, Absolutist Pittsburgh, PA | April 25th, 2009 12
  • 13. Absolutist What’s wrong is wrong. At what age do people begin face consequences? In Vermont, an 18 year old can be hit with 5-week sessions, but maybe 5 days later on his 19th birthday he’s a ‘sex offender’.
  • 14. Categorical Imperative Interesting gender difference issues; would a male be bullied the same way? If all cases of pictures under the category of child pornography should be handled the same way, are all pictures actually created equal?
  • 16. Obligations We have a duty to respect other individuals and ourselves, and transmitting messages is disrespecting both of these parties. Under this line of reason, sexting should not be tolerated, but what about the punishment? Is treating everyone the same way by placing child pornography accurate?
  • 17. 4 My Argument One possible solution to teen sexting Pittsburgh, PA | April 25th, 2009 17
  • 18.
  • 19. Education. In light of this technology, we need to pass legislation at the House that lessens the charges for lewd teen to teen cell phone communications. They should under very few circumstances be charged with child pornography, but rather promote educational programming and probationary periods. We must also push for nationwide advertising to keep family’s informed.
  • 20. Responsibility. I also believe that those taking the compromising photos are just as responsible, even with the consent of the ‘subject’, because they are aware of the consequences. Again: Creation, Transmission, and Reception of teen “sexting” must be observed.
  • 21. We are talking about teens acting carelessly with technology…teen sexting is not child pornography. “ EDWARD GREENSPAN http://www.edmontonsun.com/Comment/2009/04/27/9257671-sun.html
  • 22. FYI May 23, 2009 Pittsburgh Pundits Late Night - Cabaret Theater A comedy show with a panel discussion on sexting and other matters of sex and law. 412.325.6769