{"id":"https://openalex.org/W7081950970","doi":"https://doi.org/10.1109/msec.2025.3577741","title":"Are Deepfakes \u201cAb\u201dNormal Enough? On Using Norm Shifts in Gender and Sexuality Safety Measures","display_name":"Are Deepfakes \u201cAb\u201dNormal Enough? On Using Norm Shifts in Gender and Sexuality Safety Measures","publication_year":2025,"publication_date":"2025-07-01","ids":{"openalex":"https://openalex.org/W7081950970","doi":"https://doi.org/10.1109/msec.2025.3577741"},"language":"en","primary_location":{"id":"doi:10.1109/msec.2025.3577741","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msec.2025.3577741","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Sara M. Abdulla","orcid":"https://orcid.org/0000-0003-3097-4634"},"institutions":[{"id":"https://openalex.org/I111979921","display_name":"Northwestern University","ror":"https://ror.org/000e0be47","country_code":"US","type":"education","lineage":["https://openalex.org/I111979921"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sara M. Abdulla","raw_affiliation_strings":["Northwestern University, Evanston, IL, USA"],"affiliations":[{"raw_affiliation_string":"Northwestern University, Evanston, IL, USA","institution_ids":["https://openalex.org/I111979921"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I111979921"],"apc_list":null,"apc_paid":null,"fwci":2.8414,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.937135,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"23","issue":"4","first_page":"15","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.6694999933242798,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.6694999933242798,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13067","display_name":"Geological Modeling and Analysis","score":0.02539999969303608,"subfield":{"id":"https://openalex.org/subfields/1906","display_name":"Geochemistry and Petrology"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14311","display_name":"Electrical and Electromagnetic Research","score":0.019300000742077827,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sociotechnical-system","display_name":"Sociotechnical system","score":0.6219000220298767},{"id":"https://openalex.org/keywords/human-sexuality","display_name":"Human sexuality","score":0.5834000110626221},{"id":"https://openalex.org/keywords/norm","display_name":"Norm (philosophy)","score":0.5206999778747559},{"id":"https://openalex.org/keywords/sexual-abuse","display_name":"Sexual abuse","score":0.41519999504089355},{"id":"https://openalex.org/keywords/poison-control","display_name":"Poison control","score":0.3402000069618225},{"id":"https://openalex.org/keywords/human-factors-and-ergonomics","display_name":"Human factors and ergonomics","score":0.3147999942302704}],"concepts":[{"id":"https://openalex.org/C127627568","wikidata":"https://www.wikidata.org/wiki/Q1639361","display_name":"Sociotechnical system","level":2,"score":0.6219000220298767},{"id":"https://openalex.org/C53813258","wikidata":"https://www.wikidata.org/wiki/Q154136","display_name":"Human sexuality","level":2,"score":0.5834000110626221},{"id":"https://openalex.org/C191795146","wikidata":"https://www.wikidata.org/wiki/Q3878446","display_name":"Norm (philosophy)","level":2,"score":0.5206999778747559},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.48809999227523804},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.48739999532699585},{"id":"https://openalex.org/C2992354236","wikidata":"https://www.wikidata.org/wiki/Q43414","display_name":"Sexual abuse","level":4,"score":0.41519999504089355},{"id":"https://openalex.org/C3017944768","wikidata":"https://www.wikidata.org/wiki/Q1450463","display_name":"Poison control","level":2,"score":0.3402000069618225},{"id":"https://openalex.org/C166735990","wikidata":"https://www.wikidata.org/wiki/Q1750812","display_name":"Human factors and ergonomics","level":3,"score":0.3147999942302704},{"id":"https://openalex.org/C2994210853","wikidata":"https://www.wikidata.org/wiki/Q673281","display_name":"Sexual assault","level":4,"score":0.30079999566078186},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.2946000099182129},{"id":"https://openalex.org/C2777996642","wikidata":"https://www.wikidata.org/wiki/Q558075","display_name":"Sexual violence","level":2,"score":0.28040000796318054},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.27970001101493835},{"id":"https://openalex.org/C526869908","wikidata":"https://www.wikidata.org/wiki/Q3298118","display_name":"Suicide prevention","level":3,"score":0.26899999380111694},{"id":"https://openalex.org/C2776307086","wikidata":"https://www.wikidata.org/wiki/Q1165905","display_name":"Sexual identity","level":3,"score":0.263700008392334},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.2623000144958496},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25540000200271606},{"id":"https://openalex.org/C137403100","wikidata":"https://www.wikidata.org/wiki/Q41710","display_name":"Ethnic group","level":2,"score":0.25440001487731934},{"id":"https://openalex.org/C138496976","wikidata":"https://www.wikidata.org/wiki/Q175002","display_name":"Developmental psychology","level":1,"score":0.2538999915122986}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/msec.2025.3577741","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msec.2025.3577741","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7911938428878784,"id":"https://metadata.un.org/sdg/5","display_name":"Gender equality"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1055111137","https://openalex.org/W3021582373","https://openalex.org/W3038025956","https://openalex.org/W3090322396","https://openalex.org/W3139130199","https://openalex.org/W3177464736","https://openalex.org/W4213304224","https://openalex.org/W4254848244"],"related_works":[],"abstract_inverted_index":{"Nonconsensual":[0],"deepfakes":[1],"represent":[2],"the":[3],"latest":[4],"evolution":[5],"in":[6],"image-based":[7],"sexual":[8],"abuse.":[9,14],"Sociotechnical":[10],"factors":[11],"may":[12],"enable":[13],"This":[15],"article":[16],"suggests":[17],"a":[18],"norm-shifting":[19],"framework":[20],"to":[21],"mitigate":[22],"abuse":[23],"through":[24],"policy,":[25],"design,":[26],"and":[27],"community-based":[28],"interventions.":[29]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
