Algorithmic Abuse: How Social Platforms Amplify Revenge Porn, digital grooming and Sexual Coercion
Abstract
The proliferation of digital technologies has transformed intimate relationships, introducing new forms of abuse that operate at the intersection of technology, psychology, and criminal behavior. Intimate image abuse commonly known as revenge porn has emerged as a significant form of technology-facilitated sexual violence, with live streaming platforms creating novel opportunities for exploitation, blackmail, and coercion. This research examines how ostensibly “normal” relationship behaviors such as sexting, digital monitoring, and online flirtation can escalate into intimate image abuse, blackmail, and sexual violence within the context of monetized live streaming platforms like Bigolive. The study employs a qualitative systematic review methodology, synthesizing peer-reviewed literature from 2012-2025 across psychology, criminology, and media studies. Using a social constructionist framework and attribution theory, the research analyzes the psychological mechanisms (online disinhibition effect, dehumanization) and platform design features (monetization, anonymity) that facilitate this escalation. Findings reveal that approximately 38% of individuals do not recognize intimate partner cyber abuse as abusive, normalizing behaviors that can precede severe harm. Live streaming platforms’ monetization structures virtual gifting, real-time payment systems create financial incentives that directly reward boundary violation and coercion. The online disinhibition effect enables toxic behaviors, while attribution patterns frequently blame victims for “provoking” their own exploitation. The normalization of digital monitoring and intimate image sharing in romantic relationships creates a continuum where “ordinary” behaviors can escalate into criminal acts. Platform accountability mechanisms and prevention strategies must address structural incentives that reward exploitation.
Keywords
References
Similar Articles
- Dr. Ahmed Saeed Al-Mansoori, Detection of Malicious Query Attack Weaknesses within Online Software Systems Using Byte-Level Pattern Matching , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 04 (2026): Volume 03 Issue 04
- Dr. Amara Ndlovu, Dr. Faisal Khan, CYBERSECURITY IN VIRTUAL GATHERINGS: RISKS AND REMEDIAL STRATEGIES FOR VIDEO CONFERENCING SOFTWARE , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 04 (2025): Volume 02 Issue 04
- Prof. Hans-Peter Vogel, Dr. Farah Al-Dabbagh, UNINTENDED CONSEQUENCES AND SPILLOVER EFFECTS IN OFFENSIVE CYBER OPERATIONS: A SYSTEMATIC LITERATURE REVIEW , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Dr. Wei-Lin Cheng, COLLATERAL EFFECTS AND UNINTENDED REPERCUSSIONS IN OFFENSIVE CYBER OPERATIONS: A SYSTEMATIC LITERATURE REVIEW , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 03 (2025): Volume 02 Issue 03
- Dr. Alistair Finch, Navigating the Digital Battlefield: A Systematic Review of Collateral Effects in Offensive Cyber Operations , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 08 (2025): Volume 02 Issue 08
You may also start an advanced similarity search for this article.