{"id":436101,"date":"2012-06-01T00:00:16","date_gmt":"2012-06-01T07:00:16","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-research-item&p=436101"},"modified":"2018-10-16T20:22:50","modified_gmt":"2018-10-17T03:22:50","slug":"sexting-consent-and-young-peoples-ethics-beyond-megans-story","status":"publish","type":"msr-research-item","link":"https:\/\/www.microsoft.com\/en-us\/research\/publication\/sexting-consent-and-young-peoples-ethics-beyond-megans-story\/","title":{"rendered":"Sexting, Consent and Young People’s Ethics: Beyond “Megan’s Story”"},"content":{"rendered":"

This article contrasts the Megan\u2019s Story<\/em> campaign, a recent Australian media and policy response to sexting (the act of taking and transmitting naked or semi naked pictures via mobile phones) with interview responses drawn from an Australian study that has asked young people about mobiles and sexting. It considers local and international responses to sexting as \u2018child pornography,\u2019 raising questions about the adequacy and appropriateness of criminalizing young people\u2019s sexual self\u00a0representation and communication. Based on young people\u2019s responses to sexting, the authors argue that there is an emerging ethics around the issue of consent being developed by young people. However, considerations of consent cannot be accounted\u00a0for by the laws as they are presently framed, as under 18-year-olds currently are not allowed to consent to any form of sexting. This disconnection between the law and uses of technology by consenting teenagers generates problems both for policy, education and legal systems. This paper suggests a response that would recognize the seriousness of incidents of bullying, harassment or abuse, and would also take into account the meaning that sexting has for young people in specific contexts and cultures.<\/p>\n","protected":false},"excerpt":{"rendered":"

This article contrasts the Megan\u2019s Story campaign, a recent Australian media and policy response to sexting (the act of taking and transmitting naked or semi naked pictures via mobile phones) with interview responses drawn from an Australian study that has asked young people about mobiles and sexting. It considers local and international responses to sexting […]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"msr-content-type":[3],"msr-research-highlight":[],"research-area":[13551,13559],"msr-publication-type":[193715],"msr-product-type":[],"msr-focus-area":[],"msr-platform":[],"msr-download-source":[],"msr-locale":[268875],"msr-post-option":[],"msr-field-of-study":[],"msr-conference":[],"msr-journal":[],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-436101","msr-research-item","type-msr-research-item","status-publish","hentry","msr-research-area-graphics-and-multimedia","msr-research-area-social-sciences","msr-locale-en_us"],"msr_publishername":"Taylor & Francis","msr_edition":"","msr_affiliation":"","msr_published_date":"2012-06-01","msr_host":"","msr_duration":"","msr_version":"","msr_speaker":"","msr_other_contributors":"","msr_booktitle":"","msr_pages_string":"463-473","msr_chapter":"","msr_isbn":"","msr_journal":"Continuum: Journal of Media & Cultural Studies","msr_volume":"26","msr_number":"","msr_editors":"","msr_series":"","msr_issue":"3","msr_organization":"","msr_how_published":"","msr_notes":"","msr_highlight_text":"","msr_release_tracker_id":"","msr_original_fields_of_study":"","msr_download_urls":"","msr_external_url":"","msr_secondary_video_url":"","msr_longbiography":"","msr_microsoftintellectualproperty":1,"msr_main_download":"436104","msr_publicationurl":"","msr_doi":"http:\/\/dx.doi.org\/10.1080\/10304312.2012.665840","msr_publication_uploader":[{"type":"file","title":"Crawford_2012_Sexting","viewUrl":"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2017\/10\/Crawford_2012_Sexting.pdf","id":436104,"label_id":0},{"type":"doi","title":"http:\/\/dx.doi.org\/10.1080\/10304312.2012.665840","viewUrl":false,"id":false,"label_id":0}],"msr_related_uploader":"","msr_attachments":[],"msr-author-ordering":[{"type":"text","value":"Kath Albury","user_id":0,"rest_url":false},{"type":"user_nicename","value":"kate","user_id":32494,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=kate"}],"msr_impact_theme":[],"msr_research_lab":[],"msr_event":[],"msr_group":[],"msr_project":[],"publication":[],"video":[],"download":[],"msr_publication_type":"article","related_content":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/436101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-research-item"}],"version-history":[{"count":4,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/436101\/revisions"}],"predecessor-version":[{"id":436638,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/436101\/revisions\/436638"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=436101"}],"wp:term":[{"taxonomy":"msr-content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-content-type?post=436101"},{"taxonomy":"msr-research-highlight","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-highlight?post=436101"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=436101"},{"taxonomy":"msr-publication-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-publication-type?post=436101"},{"taxonomy":"msr-product-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-product-type?post=436101"},{"taxonomy":"msr-focus-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-focus-area?post=436101"},{"taxonomy":"msr-platform","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-platform?post=436101"},{"taxonomy":"msr-download-source","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-download-source?post=436101"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=436101"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=436101"},{"taxonomy":"msr-field-of-study","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-field-of-study?post=436101"},{"taxonomy":"msr-conference","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-conference?post=436101"},{"taxonomy":"msr-journal","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-journal?post=436101"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=436101"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=436101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}