SlideShare a Scribd company logo
1 of 23
Download to read offline
“Sexting”
Noah Levin
Pittsburgh, PA | April 25th, 2009
Carnegie Mellon University


Style of this presentation borrowed with love
from Garrett Dimon’s presentation:
“Improving Interface Design”, 2007
1
Background
Problem, Case Studies, Current Legislation




Pittsburgh, PA | April 25th, 2009            2
“     Sexting is the act of sending
      sexually explicit messages or
                                       “
      photos electronically, primarily
      between cell phones.



Wikipedia
http://en.wikipedia.org/wiki/Sexting
“     All you look at is, is this a nude or
      seminude or suggestive
      photograph, and is the person
      depicted in it a minor? And that is
      enough to warrant a criminal
                                                      “
      prosecution for child pornography.


MARK RASCH
http://www.onthemedia.org/transcripts/2009/01/23/05
A Few Case Studies
13 year olds from PA. three girls charged with
child pornography from sending photos of
themselves in bra’s
14 year old from NJ. charged with child
pornography for posting 30 myspace photos
17 students in PA. charged with distributing
photos of nude female classmates
18 year old from OH. committed suicide after
a nude photo was spread around her high school
“     This section shall not apply if the person is less
      than 19 years old, the child is at least 13 years old,
      and the child knowingly and voluntarily and
      without threat or coercion used an electronic
      communication device to transmit an image of
                                                             “
      himself or herself to the person.



Vermont Legislation
http://www.leg.state.vt.us/docs/2010/bills/intro/S-125.pdf
“     It would make sexting a first-degree
      misdemeanor for minors. They could
      still face jail time, but more likely the
      teens would receive counseling or
                                                “
      some kind of probation.



ohio Legislation
http://www.ohio.com/news/nation/43019527.html
2
Teleological Approach
Utilitarianism, Situational Ethics, Public Scrutiny




Pittsburgh, PA | April 25th, 2009                     8
Public Scrutiny
Legal Paternalism




0   5   10   15   20   25     30    35   40   45   50   55   60

                            A G E
Expectation of Privacy
75% of teens understood the negative
consequences of sexting before they did it
40% of teens send suggestive text messages, 20%
sent nude or semi-nude text messages
45% of teens say its common for the messages to
be shared outside of intended recipients




http://www.thenationalcampaign.org/sextech/ - 653 teens surveyed
3
Deontological Approach
Kantian Ethics, Right-Based, Absolutist




Pittsburgh, PA | April 25th, 2009         12
Absolutist
What’s wrong is wrong.
At what age do people begin face
consequences?
In Vermont, an 18 year old can be hit with
5-week sessions, but maybe 5 days later on
his 19th birthday he’s a ‘sex offender’.
Categorical Imperative
Interesting gender difference issues; would
a male be bullied the same way?
If all cases of pictures under the category
of child pornography should be handled
the same way, are all pictures actually
created equal?
Bennett Haselton’s Idea
http://news.slashdot.org/article.pl?sid=09/03/30/1249237
Obligations
We have a duty to respect other individuals
and ourselves, and transmitting messages
is disrespecting both of these parties.
Under this line of reason, sexting should
not be tolerated, but what about the
punishment?
Is treating everyone the same way by
placing child pornography accurate?
4
My Argument
One possible solution to teen sexting




Pittsburgh, PA | April 25th, 2009       17
Education.
In light of this technology, we need to pass
legislation at the House that lessens the
charges for lewd teen to teen cell phone
communications.
They should under very few circumstances
be charged with child pornography, but
rather promote educational programming
and probationary periods.
We must also push for nationwide
advertising to keep family’s informed.
Responsibility.
I also believe that those taking the
compromising photos are just as
responsible, even with the consent of the
‘subject’, because they are aware of the
consequences. Again:
Creation, Transmission, and Reception of
teen “sexting” must be observed.
“    We are talking about teens acting
     carelessly with technology…teen
     sexting is not child pornography.
                                                                 “

EDWARD GREENSPAN
http://www.edmontonsun.com/Comment/2009/04/27/9257671-sun.html
FYI
May 23, 2009
Pittsburgh Pundits
Late Night - Cabaret Theater
A comedy show with a panel discussion on
sexting and other matters of sex and law.
412.325.6769
Thank you!
ANY QUESTIONS?

More Related Content

What's hot

Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableKhy Amigable
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
Social Media: Risks and Benefits
Social Media: Risks and BenefitsSocial Media: Risks and Benefits
Social Media: Risks and BenefitsSteve Young
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Bullying in social media presentation
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentationmitchell_shannon
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Resourceful Nonprofit
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingQuirky Kid
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 

What's hot (20)

Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Social Media: Risks and Benefits
Social Media: Risks and BenefitsSocial Media: Risks and Benefits
Social Media: Risks and Benefits
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying in social media presentation
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentation
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 

Viewers also liked

Caso real de sexting y consejos para el ciberacoso
Caso real de sexting y consejos para el ciberacosoCaso real de sexting y consejos para el ciberacoso
Caso real de sexting y consejos para el ciberacosoJeffry Ramos
 
Sexting (sexteo)
Sexting (sexteo) Sexting (sexteo)
Sexting (sexteo) prilechuza
 
Sexting powerpoint
Sexting powerpoint Sexting powerpoint
Sexting powerpoint dee12
 
Sexting y sextorcion
Sexting y sextorcionSexting y sextorcion
Sexting y sextorcionSexting
 
Sexting en Latinoamérica - Una amenaza desconocida
Sexting en Latinoamérica - Una amenaza desconocidaSexting en Latinoamérica - Una amenaza desconocida
Sexting en Latinoamérica - Una amenaza desconocidaPantallasAmigas
 
Sexting en Latinoamérica - Una amenaza desconocida
Sexting en Latinoamérica - Una amenaza desconocidaSexting en Latinoamérica - Una amenaza desconocida
Sexting en Latinoamérica - Una amenaza desconocidaeCGlobal
 

Viewers also liked (16)

Sexting
SextingSexting
Sexting
 
Sexting
SextingSexting
Sexting
 
Sexting
SextingSexting
Sexting
 
Sexting
SextingSexting
Sexting
 
Caso real de sexting y consejos para el ciberacoso
Caso real de sexting y consejos para el ciberacosoCaso real de sexting y consejos para el ciberacoso
Caso real de sexting y consejos para el ciberacoso
 
NO AL GROOMING
NO AL GROOMINGNO AL GROOMING
NO AL GROOMING
 
Sexting (sexteo)
Sexting (sexteo) Sexting (sexteo)
Sexting (sexteo)
 
Sexting powerpoint
Sexting powerpoint Sexting powerpoint
Sexting powerpoint
 
Sexting y sextorcion
Sexting y sextorcionSexting y sextorcion
Sexting y sextorcion
 
Presentació sexting
Presentació sextingPresentació sexting
Presentació sexting
 
Prevención sexting
Prevención sextingPrevención sexting
Prevención sexting
 
Sexting
SextingSexting
Sexting
 
El sexting
El sextingEl sexting
El sexting
 
Sexting en Latinoamérica - Una amenaza desconocida
Sexting en Latinoamérica - Una amenaza desconocidaSexting en Latinoamérica - Una amenaza desconocida
Sexting en Latinoamérica - Una amenaza desconocida
 
Sexting en Latinoamérica - Una amenaza desconocida
Sexting en Latinoamérica - Una amenaza desconocidaSexting en Latinoamérica - Una amenaza desconocida
Sexting en Latinoamérica - Una amenaza desconocida
 
El sexting
El sextingEl sexting
El sexting
 

Similar to Understanding Teen Sexting

2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying2012 06 Sexting and Cyberbullying
2012 06 Sexting and CyberbullyingRaleigh ISSA
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentationjpl17
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
SafetyNET Sexting
SafetyNET SextingSafetyNET Sexting
SafetyNET SextingJoel Adkins
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletLockley
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
I want to be a Criminal when I grow up
I want to be a Criminal when I grow upI want to be a Criminal when I grow up
I want to be a Criminal when I grow upJamie Butcher
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
Textual harassment and sexting FINAL
Textual harassment and sexting FINALTextual harassment and sexting FINAL
Textual harassment and sexting FINALPaul Cuaresma
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the LawSuna Gurol
 
persuasive campaign presentation
persuasive campaign presentationpersuasive campaign presentation
persuasive campaign presentationredmondke
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 

Similar to Understanding Teen Sexting (20)

Sexting
SextingSexting
Sexting
 
Teens and Sexting
Teens and SextingTeens and Sexting
Teens and Sexting
 
2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
SafetyNET Sexting
SafetyNET SextingSafetyNET Sexting
SafetyNET Sexting
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
The Most Common Juvenile Crimes Essay
The Most Common Juvenile Crimes EssayThe Most Common Juvenile Crimes Essay
The Most Common Juvenile Crimes Essay
 
I want to be a Criminal when I grow up
I want to be a Criminal when I grow upI want to be a Criminal when I grow up
I want to be a Criminal when I grow up
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Presentation1
Presentation1Presentation1
Presentation1
 
Textual harassment and sexting FINAL
Textual harassment and sexting FINALTextual harassment and sexting FINAL
Textual harassment and sexting FINAL
 
Sexting
SextingSexting
Sexting
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
persuasive campaign presentation
persuasive campaign presentationpersuasive campaign presentation
persuasive campaign presentation
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Understanding Teen Sexting

  • 1. “Sexting” Noah Levin Pittsburgh, PA | April 25th, 2009 Carnegie Mellon University Style of this presentation borrowed with love from Garrett Dimon’s presentation: “Improving Interface Design”, 2007
  • 2. 1 Background Problem, Case Studies, Current Legislation Pittsburgh, PA | April 25th, 2009 2
  • 3. Sexting is the act of sending sexually explicit messages or “ photos electronically, primarily between cell phones. Wikipedia http://en.wikipedia.org/wiki/Sexting
  • 4. All you look at is, is this a nude or seminude or suggestive photograph, and is the person depicted in it a minor? And that is enough to warrant a criminal “ prosecution for child pornography. MARK RASCH http://www.onthemedia.org/transcripts/2009/01/23/05
  • 5. A Few Case Studies 13 year olds from PA. three girls charged with child pornography from sending photos of themselves in bra’s 14 year old from NJ. charged with child pornography for posting 30 myspace photos 17 students in PA. charged with distributing photos of nude female classmates 18 year old from OH. committed suicide after a nude photo was spread around her high school
  • 6. This section shall not apply if the person is less than 19 years old, the child is at least 13 years old, and the child knowingly and voluntarily and without threat or coercion used an electronic communication device to transmit an image of “ himself or herself to the person. Vermont Legislation http://www.leg.state.vt.us/docs/2010/bills/intro/S-125.pdf
  • 7. It would make sexting a first-degree misdemeanor for minors. They could still face jail time, but more likely the teens would receive counseling or “ some kind of probation. ohio Legislation http://www.ohio.com/news/nation/43019527.html
  • 8. 2 Teleological Approach Utilitarianism, Situational Ethics, Public Scrutiny Pittsburgh, PA | April 25th, 2009 8
  • 10. Legal Paternalism 0 5 10 15 20 25 30 35 40 45 50 55 60 A G E
  • 11. Expectation of Privacy 75% of teens understood the negative consequences of sexting before they did it 40% of teens send suggestive text messages, 20% sent nude or semi-nude text messages 45% of teens say its common for the messages to be shared outside of intended recipients http://www.thenationalcampaign.org/sextech/ - 653 teens surveyed
  • 12. 3 Deontological Approach Kantian Ethics, Right-Based, Absolutist Pittsburgh, PA | April 25th, 2009 12
  • 13. Absolutist What’s wrong is wrong. At what age do people begin face consequences? In Vermont, an 18 year old can be hit with 5-week sessions, but maybe 5 days later on his 19th birthday he’s a ‘sex offender’.
  • 14. Categorical Imperative Interesting gender difference issues; would a male be bullied the same way? If all cases of pictures under the category of child pornography should be handled the same way, are all pictures actually created equal?
  • 16. Obligations We have a duty to respect other individuals and ourselves, and transmitting messages is disrespecting both of these parties. Under this line of reason, sexting should not be tolerated, but what about the punishment? Is treating everyone the same way by placing child pornography accurate?
  • 17. 4 My Argument One possible solution to teen sexting Pittsburgh, PA | April 25th, 2009 17
  • 18.
  • 19. Education. In light of this technology, we need to pass legislation at the House that lessens the charges for lewd teen to teen cell phone communications. They should under very few circumstances be charged with child pornography, but rather promote educational programming and probationary periods. We must also push for nationwide advertising to keep family’s informed.
  • 20. Responsibility. I also believe that those taking the compromising photos are just as responsible, even with the consent of the ‘subject’, because they are aware of the consequences. Again: Creation, Transmission, and Reception of teen “sexting” must be observed.
  • 21. We are talking about teens acting carelessly with technology…teen sexting is not child pornography. “ EDWARD GREENSPAN http://www.edmontonsun.com/Comment/2009/04/27/9257671-sun.html
  • 22. FYI May 23, 2009 Pittsburgh Pundits Late Night - Cabaret Theater A comedy show with a panel discussion on sexting and other matters of sex and law. 412.325.6769