<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "http://jats.nlm.nih.gov/publishing/1.0/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">IR</journal-id>
<journal-title-group>
<journal-title>Information Research</journal-title>
</journal-title-group>
<issn pub-type="epub">1368-1613</issn>
<publisher>
<publisher-name>University of Bor&#x00E5;s</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">ir30iConf47569</article-id>
<article-id pub-id-type="doi">10.47989/ir30iConf47569</article-id>
<article-categories>
<subj-group xml:lang="en">
<subject>Research article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Safety anchors and deflected desires: generative AI and the production of sexualities</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author"><name><surname>Carter</surname><given-names>Daniel</given-names></name>
<xref ref-type="aff" rid="aff0001"/></contrib>
<aff id="aff0001"><bold>Daniel Carter</bold> is an Associate Professor in the School of Journalism and Mass Communication at Texas State University. They can be contacted at <email xlink:href="dcarter@txstate.edu">dcarter@txstate.edu</email>.</aff>
</contrib-group>
<pub-date pub-type="epub"><day>06</day><month>05</month><year>2025</year></pub-date>
<pub-date pub-type="collection"><year>2025</year></pub-date>
<volume>30</volume>
<issue>i</issue>
<fpage>142</fpage>
<lpage>149</lpage>
<permissions>
<copyright-year>2025</copyright-year>
<copyright-holder>&#x00A9; 2025 The Author(s).</copyright-holder>
<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by-nc/4.0/">
<license-p>This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by-nc/4.0/">http://creativecommons.org/licenses/by-nc/4.0/</ext-link>), permitting all non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<abstract xml:lang="en">
<title>Abstract</title>
<p><bold>Introduction.</bold> Many images generated by AI appear sexual in nature, and a great deal of attention is paid in computer science to preventing systems from producing some forms of sexual content. Yet, despite the fact that sex seems to be everywhere in generative AI, we are saying little about how AI might intervene in our sexualities.</p>
<p><bold>Approach.</bold> This exploratory essay argues for the need to consider sexuality in relation to generative AI and draws on broad arguments contained in Michel Foucault&#x2019;s work on sexuality to set the stage for future work. Drawing on Rieder&#x2019;s concept of algorithmic techniques, it considers current methods of prohibiting the generation of sexual content and uses these as a base for discussing the ways that AI might play a role in the formation of sexualities.</p>
<p><bold>Conclusion.</bold> This essay aims to provoke future work by sketching out some aspects of generative AI that might be relevant to studies of sexuality. Primarily, it highlights the processes of evasion and denial as potentially drawing attention to and concretizing material or concepts that are considered taboo. These observations are not intended to be validated or generalizable; they are instead intended only to illustrate the potential of future work.</p>
</abstract>
</article-meta>
</front>
<body>
<sec id="sec1">
<title>Introduction</title>
<p>This essay is prompted by the curious situation in which much of the actual output of generative AI systems represents idealized, sexualized female bodies while at the same time researchers in the field of machine learning produce volumes of work intending to prevent these same systems from producing images that might be seen as overly sexual, inappropriate or pornographic. We are, in a sense, saying a great deal about sex&#x2014;whether through the production of images or through the production of texts that intend to circumvent such production&#x2014;while at the same time saying quite little about the ways in which generative AI intervenes in our sexualities. While considerable research exists on pornography from the perspective of media reception, the technical specifics of generative AI warrant asking these questions about sexuality from a perspective that accounts for what Rieder (<xref rid="R21" ref-type="bibr">2020</xref>) calls <italic>&#x2018;algorithmic techniques.&#x2019;</italic> This short essay sets the ground for future work in this area by placing generative AI in conversation with Foucault&#x2019;s work on sexuality, for example by prompting questions related to the experiences of evasion and denial.</p>
<p>To orient this exploratory essay, I first review several broad points from Michel Foucault&#x2019;s work on sexuality before summarizing the engagement that media studies and information studies has had with the topic. I then highlight thematic algorithmic techniques related to the prohibition of undesired content in AI systems, discussing how these might provoke future work.</p>
</sec>
<sec id="sec2">
<title>Foucault&#x2019;s theory of sexuality</title>
<p>In searching for a theoretical grounding on sexuality as a basis for examining generative AI systems, I turn to Michel Foucault&#x2019;s work due to its profound influence and its analysis of the complex networks of institutions, discourses, and technologies that constitute and regulate subjectivities. Particularly relevant is Foucault&#x2019;s attention to the dynamics of regulation, control, and prohibition concerning sex and sexual content, primarily developed in <italic>&#x2018;the history of sexuality&#x2019;</italic> (2012a, 2012b). Rather than attempting a comprehensive survey of theoretical approaches to sexuality or an exhaustive account of Foucault&#x2019;s contributions and their ongoing reception, this brief review adopts an abductive approach suitable for an exploratory essay, intending to highlight directions that may prove fruitful for future work. I focus on two key arguments from Foucault&#x2019;s work that are especially generative for understanding and conceptualizing algorithmic techniques related to the formation of sexualities:</p>
<p>First, a person&#x2019;s sexuality is not an innate characteristic that is either repressed or liberated. Instead, it is a set of practices, desires, and identities produced through interaction with a historically contingent apparatus composed of discourses, institutions, laws, and social norms that define some identities and behaviors as acceptable while marking others as inappropriate or taboo. By critiquing the repressive hypothesis&#x2014;which would posit, for example, a reduction in sex and talk of sex during repressive periods such as the Victorian era&#x2014;Foucault argues that prohibiting certain sexual acts or identities does not erase them from society but instead gives rise to a proliferation of discourses about them, which reinforce their presence and create new possibilities for individuals to identify as, for example, deviant or sick.</p>
<p>Second, Foucault claims that, since the 18th century, the formation of individual sexualities has been closely tied to <italic>&#x2019;sex-writing&#x2019;</italic>&#x2014;the ways in which sexuality is inscribed, whether through professional texts, personal confessions, or broader mechanisms of discourse and governance. This &#x2019;endless discourse&#x2019; on sex has become a central means by which individuals come to understand and express their own desires. Alongside professional, scientific, and juridical discourses, the rise of personal confessions, diaries, and therapeutic dialogues has compelled individuals to <italic>&#x2019;speak of their sex,&#x2019;</italic> turning private thoughts and behaviors into objects of scrutiny and regulation. By narrating their intimate experiences, individuals respond to and internalize societal norms, allowing power to operate not just from above but within the very processes of self-description, self-disclosure and self-formation. Consequently, sexuality becomes both a target and an instrument of power, as the act of speaking about sex&#x2014;whether in private or public&#x2014; along with the various ways in which it is regulated and categorized, contributes to the continuous production of sexual identities, whether aligned with or resistant to dominant norms.</p>
</sec>
<sec id="sec3">
<title>Sexuality and sexual content in information systems and media studies research</title>
<p>This section presents a brief review of the ways that sexuality and sexual content have been approached in the fields of information systems and media studies. In the context of generative AI systems, both fields of knowledge are relevant, as media studies, through its engagement with pornography, has had a greater historical interest in people&#x2019;s interactions with sexual content, while information systems researchers have an obvious engagement with technical features of systems such as algorithms and taxonomies, despite only less historical interest in how these influence the formation of sexualities.</p>
<p>Regarding sexuality, early approaches in both media studies and information systems often treat the concept as an innate and stable characteristic. In media studies, this perspective is evident in research focused on the biological or psychological effects of sexual content, where sexuality is framed as a natural drive influenced by external stimuli. For example, studies on the impact of pornography often assume a direct, measurable effect on behavior, operating on the premise that sexual desires are inherent and can be either stimulated or suppressed by media exposure. Similarly, in the field of information systems, early research on online behavior frequently relied on user profiling that treated sexuality as a fixed variable.</p>
<p>Following the turn, in media studies, to consider more individual and situated uses of media (e.g., <xref rid="R1" ref-type="bibr">Ang, 1991</xref>; <xref rid="R11" ref-type="bibr">Jenkins, 2005</xref>; <xref rid="R20" ref-type="bibr">Radway, 1984</xref>), more recent research has explored how sexuality is negotiated through or produced in conjunction with available media. For example, Spigel&#x2019;s (<xref rid="R25" ref-type="bibr">1992</xref>) work on postwar television and domesticity demonstrates how TV programs played a role in shaping gendered and sexual norms within the private sphere, reinforcing traditional ideas of family and heteronormativity. Similarly, the field of information systems has examined how technical features such as platform affordances or taxonomic categories shape the representation of sexualities (<xref rid="R14" ref-type="bibr">Light, 2007</xref>; <xref rid="R15" ref-type="bibr">Light et al., 2008</xref>; <xref rid="R23" ref-type="bibr">Ruberg &#x0026; Ruelos, 2020</xref>; <xref rid="R28" ref-type="bibr">Watson, 2020</xref>) and, to a lesser extent, the enactment of desire (<xref rid="R19" ref-type="bibr">Paasonen et al., 2019</xref>). Still, there is far more work in both fields that focuses on gender than on sexuality, perhaps mirroring the pattern discussed, below, of researchers avoiding the topic of pleasure, especially as it relates to sexual content.</p>
<p>Research on sexual content, the most prominent example of which being pornography, follows a similar course, with early interest (e.g., <xref rid="R4" ref-type="bibr">Dworkin, 1981</xref>; <xref rid="R16" ref-type="bibr">MacKinnon, 1996</xref>) focusing on the effects of sexual content. This work, much of which had the goal of enacting legal restrictions, argued that pornography was inherently chauvinistic and that it had the effect of encouraging oppressive and violent versions of male sexuality. Later theorists such as Williams (<xref rid="R29" ref-type="bibr">1999</xref>) critiqued these attacks on pornography as overly simplistic, arguing that they assumed direct and consistent effects rather than acknowledging individuals&#x2019; various uses and negotiations of sexual content.</p>
<p>While there has been less attention given to pornography in the information sciences, scholars have shown a keen interest in the moderation of sexual content from online platforms. Research in this area has critically examined how platforms enforce content guidelines from the perspective of both labor (<xref rid="R22" ref-type="bibr">Roberts, 2019</xref>) and algorithms (<xref rid="R9" ref-type="bibr">Gillespie, 2022</xref>), with the bulk of attention paid to the processes that lead sexual content to disappear from digital spaces.</p>
<p>While studies of algorithms and content moderation do examine the ways that power acts to shape the content that is made available, much less work has enquired into the ways that the presence or non-presence of sexual content shapes sexualities, specifically in relation to the experience of pleasures and identification of objects of pleasure, although notable exceptions to this trend exist (e.g., <xref rid="R12" ref-type="bibr">Keilty, 2012</xref>; <xref rid="R13" ref-type="bibr">Keilty &#x0026; Leazer, 2018</xref>). Indeed, researchers in the field of human-computer interaction (HCI) have repeatedly remarked on the paradox of pornography&#x2019;s ubiquity and the lack of research that asks about the gratifying uses of such content (<xref rid="R3" ref-type="bibr">Blythe &#x0026; Jones, 2004</xref>; <xref rid="R26" ref-type="bibr">Su et al., 2019</xref>). It&#x2019;s also notable that, while HCI researchers have been more responsive to calls to focus on pleasure, they have been far more likely to consider objects such as sex toys (Bardzell &#x0026; <xref rid="R2" ref-type="bibr">Bardzell, 2011</xref>; <xref rid="R10" ref-type="bibr">Hua et al., 2022</xref>) or sex robots (<xref rid="R5" ref-type="bibr">Fosch-Villaronga &#x0026; Poulsen, 2021</xref>; <xref rid="R26" ref-type="bibr">Su et al., 2019</xref>) than to study sexual images or videos.</p>
<p>As a consequence, the discourse around sexual content and sexuality remains largely constrained to concerns over harm and regulation, rather than expanding to consider the formation of diverse experiences of desire. While information systems research has only started to engage in this area, its contributions are especially relevant given the technical differences between older media technologies and generative AI systems that make accessible the production of sexual content in addition to its widespread dissemination. While it seems likely that the most common interaction that people have is viewing AI-generated content (as opposed to generating such content), the possibility of future technologies that use generative AI to create personalized experiences warrants an investigation, now, into the ways that sexualities form in interaction with what Rieder (<xref rid="R21" ref-type="bibr">2020</xref>) refers to as algorithmic techniques. As Rieder argues, these techniques exist between software studies&#x2019; interest in specific code manifestations and media studies&#x2019; focus on content and products. As standardized implementations of knowledge that exists in archives such as scholarly papers and online discussion forums, algorithmic techniques offer a way in to the black box of software and present researchers with a tool with which to comment on the functioning of commercial software without access to its code.</p>
<p>In the following sections, I draw on basic tenets of Foucault&#x2019;s theory of sexuality and ask how the algorithmic techniques underlying current generative AI systems might influence the formation of sexualities and the identification of objects of desire. Appropriate for a short, exploratory essay, these remarks are intended to function only as short provocations for future work, tracing paths that could be followed rather than arguing for validity or generalisability.</p>
</sec>
<sec id="sec4">
<title>Erased concepts, safety anchors, coded confessions, and deflected desires</title>
<p>I focus in this section on algorithmic techniques that attempt to preclude the creation by image-generating AI systems of content that is deemed unacceptable and that operate on pre-trained models; that is, these techniques intervene in models that have already been trained and are capable of producing content deemed sexual or undesirable, as opposed to training a model that has been explicitly designed to exclude such information from its training data. While there are various broad categories of relevant techniques, including post-generation techniques that classify or censor content after it is produced, I focus here on technique that identify specific vectors or regions within the model&#x2019;s latent space&#x2014;mathematical structures that correspond to the representation of certain types of content, such as sexual or undesirable material and which can then be manipulated to guide the generation process away from producing such content. While specific implementations of this technique vary in their technical details in ways that certainly affect the produced content, the broad concepts of <italic>&#x2018;safe&#x2019;</italic> and <italic>&#x2018;forbidden&#x2019;</italic> zones, introduced below, offer provocative ways to consider the formation of sexualities.</p>
<p>For example, Schramowski et al.&#x2019;s (2023) safe latent diffusion (SLD) approach identifies a <italic>&#x2018;general inappropriate safety concept&#x2019;</italic> using the text prompt, <italic>&#x2018;hate, harassment, violence, suffering, humiliation, harm, suicide, sexual, nudity, bodily fluids, blood, obscene gestures, illegal activity, drug use, theft, vandalism, weapons, child abuse, brutality, cruelty,&#x2019;</italic> and notes that this approach is inspired by existing techniques used in commercial models such as DALL-E. At each step of the diffusion process, SLD modifies the vector represented by the original prompt in order to move it away from the vector representing the <italic>&#x2018;general inappropriate safety concept&#x2019;</italic> and toward a safety anchor or point in latent space that is dynamically calculated in relation to the entered prompt. An exemplary result of the process, given in Schramowski et al.&#x2019;s paper, is the generation of an image of a woman wearing a dress when, without intervention, the model would have generated an image of a nude woman.</p>
<p>A related approach, concept erasure, attempts to identify broad concepts within a pre-trained model in order to remove them from the model weights. For example, Gandikota et al. (<xref rid="R8" ref-type="bibr">2023</xref>) demonstrate that concepts such as nudity, artistic styles such as that of Van Gogh or entire classes of objects such as cars can be erased from a pre-trained model, resulting in a modified model that does not include the information to produce relevant images. This approach differs from the application of safety anchors, described above, in that the authors argue that, rather than a model that could potentially produce unwanted images but does not, they produce a model that does not have the ability to produce such images.</p>
<p>Relevant adversarial techniques in this area include the modification of prompts to avoid prohibited terms while still producing a vector that results in the generation of an image that would be considered inappropriate. Tsai et al. (2024), for example, demonstrate a technique for generating text prompts that correspond to concepts that have been suppressed (by a technique described above, for example). The assumption made is that models contain implicit text-concept associations that can be discovered, and the authors demonstrate that prompts including strings such as <italic>&#x2018;nucropsexynipples&#x2019;, &#x2018;nakedcougarscenery&#x2019;,</italic> as well as terms whose semantic meaning is more inscrutable, can be used to evade the safety mechanisms in current software.</p>
<p>Notably, Tsai et al. argue that their technique is practical and briefly describe a use case in which their tool would be run offline in order to translate prompts that would then be entered into an existing software product to evade censoring. This note brings attention to the experience of users who attempt to, and perhaps succeed in, generating sexual content that is marked as undesirable by current systems. Here I briefly focus on two experiences that appear provocative in relation to Foucault&#x2019;s work on sexuality.</p>
<p>First, the translation of one&#x2019;s desires into a new and obscured language, such as with Hsu et al.&#x2019;s technique, might be seen as a kind of technologically mediated <italic>&#x2018;sex writing&#x2019;,</italic> drawing attention to one&#x2019;s existing desires and their taboo status. This process exists in a similar form in observed practice, as users have noted that phonemes and similar word parts appear to have consistent meaning and can be used to generate desired images (e.g., &#x2018;Odd Little Spots in Midjourney Latent Space,&#x2019; 2023). As a form of sex writing, or of externalizing one&#x2019;s desires, this translation inserts both new rituals and also new semantics into the formation of sexualities, producing phrases that in many ways behave as magic spells: sequences of largely nonsensical words that produce an effect in the world that is otherwise prohibited. While power operates at the level of law, science and industry to forbid the depiction of nude bodies, possessing the knowledge and capacity to circumvent that power gives to the produced images a special status as contraband. Following a media studies approach such as would be advocated by McLuhan (<xref rid="R17" ref-type="bibr">2013</xref>) and which might argue for the transference of erotic desire from the content of a pornographic film to its media qualities (e.g., cuts and transitions), in the ritual of translating an expressed desire into an esoteric language that has the power of evading censorship and summoning forbidden images, we might also imagine a similar transference.</p>
<p>Second, Foucault&#x2019;s insistence that repression does not banish desire but instead constructs it suggests the merits of attending carefully to the moment at which a user of an AI system is denied what was requested. Here the dynamics of the algorithms described above seem quite relevant, as the experience is specifically of expecting one thing and &#x2014; rather than receiving nothing &#x2014; receiving the thing that was requested, with as much fidelity to the original request as possible but with the exception of a concept such as nudity removed. Relevant pre-AI experiences that serve as useful cognates here include, perhaps, searching for a pornographic image and seeing blurred rectangles returned or watching a film in anticipation of a sexual scene that does not appear. As Foucault would argue, such experiences do not erase the object of desire; rather, they likely concretize the object and the user&#x2019;s conception of self, creating a moment of drama in which one waits for their request to be revealed as acceptable or taboo.</p>
<p>While these brief sketches warrant greater elaboration, and engagement with both theories of sexuality as well as empirical data related to users&#x2019; interactions with AI systems, they suggest the directions that such work might take and the novel ways that such work might expand the study of information systems to include how these impact the formation of sexualities and the selection of objects of desire.</p>
</sec>
<sec id="sec5">
<title>Conclusion</title>
<p>This essay aims to provoke future work by sketching out some aspects of generative AI that might be relevant to studies of sexualities. Primarily, it highlights the processes of evasion and denial as drawing attention to material or concepts that are considered taboo. These observations not intended to be validated or generalizable; they are instead intended only to illustrate to potential of future work.</p>
</sec>
</body>
<back>
<ref-list>
<title>References</title>
<ref id="R1"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Ang</surname><given-names>I.</given-names></name></person-group> <year>(1991)</year> <source>Desperately Seeking the Audience</source><publisher-name>Routledge</publisher-name></element-citation></ref>
<ref id="R2"><element-citation publication-type="other"><person-group person-group-type="author"><name><surname>Bardzell</surname><given-names>J.</given-names></name><name><surname>Bardzell</surname><given-names>S.</given-names></name></person-group> <year>(2011)</year> <article-title>Pleasure is your birthright: Digitally enabled designer sex toys as a case of third-wave HCI</article-title><source>Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source><fpage>257</fpage><lpage>266</lpage></element-citation></ref>
<ref id="R3"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Blythe</surname><given-names>M.</given-names></name><name><surname>Jones</surname><given-names>M.</given-names></name></person-group> <year>(2004)</year> <article-title>Human computer (sexual) interactions</article-title><source>Interactions</source><volume>11</volume><issue>5</issue><fpage>75</fpage><lpage>76</lpage></element-citation></ref>
<ref id="R4"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Dworkin</surname><given-names>A.</given-names></name></person-group> <year>(1981)</year> <source>Pornography: Men Possessing Women</source><comment>(First Perigee Printing edition)</comment><publisher-name>The Women&#x2019;s Press Ltd</publisher-name></element-citation></ref>
<ref id="R5"><element-citation publication-type="other"><person-group person-group-type="author"><name><surname>Fosch-Villaronga</surname><given-names>E.</given-names></name><name><surname>Poulsen</surname><given-names>A.</given-names></name></person-group> <year>(2021)</year> <article-title>Sex robots in care: Setting the stage for a discussion on the potential use of sexual robot technologies for persons with disabilities</article-title><source>Companion of the 2021 ACM/IEEE International Conference on Human-Robot Interaction</source><fpage>1</fpage><lpage>9</lpage></element-citation></ref>
<ref id="R6"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Foucault</surname><given-names>M.</given-names></name></person-group> <year>(2012)</year> <comment>a</comment><source>The History of Sexuality: An Introduction</source><publisher-name>Knopf Doubleday Publishing Group</publisher-name></element-citation></ref>
<ref id="R7"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Foucault</surname><given-names>M.</given-names></name></person-group> <year>(2012)</year> <comment>b</comment><source>The History of Sexuality, Vol. 2: The Use of Pleasure</source><publisher-name>Knopf Doubleday Publishing Group</publisher-name></element-citation></ref>
<ref id="R8"><element-citation publication-type="other"><person-group person-group-type="author"><name><surname>Gandikota</surname><given-names>R.</given-names></name><name><surname>Materzynska</surname><given-names>J.</given-names></name><name><surname>Fiotto-Kaufman</surname><given-names>J.</given-names></name><name><surname>Bau</surname><given-names>D.</given-names></name></person-group> <year>(2023)</year> <article-title>Erasing concepts from diffusion models</article-title><source>Proceedings of the IEEE/CVF International Conference on Computer Vision</source><fpage>2426</fpage><lpage>2436</lpage></element-citation></ref>
<ref id="R9"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Gillespie</surname><given-names>T.</given-names></name></person-group> <year>(2022)</year> <article-title>Do Not Recommend? Reduction as a Form of Content Moderation</article-title><source>Social Media + Society</source><volume>8</volume><issue>3</issue><fpage>20563051221117552</fpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/20563051221117552">https://doi.org/10.1177/20563051221117552</ext-link></element-citation></ref>
<ref id="R10"><element-citation publication-type="other"><person-group person-group-type="author"><name><surname>Hua</surname><given-names>D. M.</given-names></name><name><surname>Jones</surname><given-names>R.</given-names></name><name><surname>Bardzell</surname><given-names>J.</given-names></name><name><surname>Bardzell</surname><given-names>S.</given-names></name></person-group> <year>(2022)</year> <article-title>The Hidden Language of Vibrators: A Politico-Ontological Reading</article-title><source>Proceedings of the 2022 ACM Designing Interactive Systems Conference</source><fpage>400</fpage><lpage>414</lpage></element-citation></ref>
<ref id="R11"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Jenkins</surname><given-names>H.</given-names></name></person-group> <year>(2005)</year> <source>Textual Poachers: Television Fans &#x0026; Participatory Culture</source><publisher-name>Routledge: Taylor &#x0026; Francis</publisher-name><ext-link ext-link-type="uri" xlink:href="http://www.UTXA.eblib.com/EBLWeb/patron?target=patron&#x0026;extendedid=P1809690&#x0026;">http://www.UTXA.eblib.com/EBLWeb/patron?target=patron&#x0026;extendedid=P1809690&#x0026;</ext-link></element-citation></ref>
<ref id="R12"><element-citation publication-type="other"><person-group person-group-type="author"><name><surname>Keilty</surname><given-names>P.</given-names></name></person-group> <year>(2012)</year> <article-title>Embodiment and desire in browsing online pornography</article-title><source>Proceedings of the 2012 iConference</source><fpage>41</fpage><lpage>47</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/2132176.2132182">https://doi.org/10.1145/2132176.2132182</ext-link></element-citation></ref>
<ref id="R13"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Keilty</surname><given-names>P.</given-names></name><name><surname>Leazer</surname><given-names>G.</given-names></name></person-group> <year>(2018)</year> <article-title>Feeling documents: Toward a phenomenology of information seeking</article-title><source>Journal of Documentation</source><volume>74</volume><issue>3</issue><fpage>462</fpage><lpage>489</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/JD-09-2016-0113">https://doi.org/10.1108/JD-09-2016-0113</ext-link></element-citation></ref>
<ref id="R14"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Light</surname><given-names>B.</given-names></name></person-group> <year>(2007)</year> <article-title>Introducing masculinity studies to information systems research: The case of Gaydar</article-title><source>European Journal of Information Systems</source><volume>16</volume><issue>5</issue><fpage>658</fpage><lpage>665</lpage></element-citation></ref>
<ref id="R15"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Light</surname><given-names>B.</given-names></name><name><surname>Fletcher</surname><given-names>G.</given-names></name><name><surname>Adam</surname><given-names>A.</given-names></name></person-group> <year>(2008)</year> <article-title>Gay men, Gaydar and the commodification of difference</article-title><source>Information Technology &#x0026; People</source><volume>21</volume><issue>3</issue><fpage>300</fpage><lpage>314</lpage></element-citation></ref>
<ref id="R16"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>MacKinnon</surname><given-names>C. A.</given-names></name></person-group> <year>(1996)</year> <source>Only Words</source><publisher-name>Harvard University Press</publisher-name></element-citation></ref>
<ref id="R17"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>McLuhan</surname><given-names>M.</given-names></name></person-group> <year>(2013)</year> <source>Understanding Media: The Extensions of Man</source><publisher-name>Gingko Press</publisher-name></element-citation></ref>
<ref id="R18"><element-citation publication-type="other"><person-group person-group-type="author"><collab>Odd little spots in Midjourney latent space</collab></person-group> <year>(2023)</year> <comment>March 27</comment><source>Ceoln</source><ext-link ext-link-type="uri" xlink:href="https://ceoln.wordpress.com/2023/03/27/odd-little-spots-in-midjourney-latent-space/">https://ceoln.wordpress.com/2023/03/27/odd-little-spots-in-midjourney-latent-space/</ext-link></element-citation></ref>
<ref id="R19"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Paasonen</surname><given-names>S.</given-names></name><name><surname>Light</surname><given-names>B.</given-names></name><name><surname>Jarrett</surname><given-names>K.</given-names></name></person-group> <year>(2019)</year> <article-title>The dick pic: Harassment, curation, and desire</article-title><source>Social Media+ Society</source><volume>5</volume><issue>2</issue><fpage>2056305119826126</fpage></element-citation></ref>
<ref id="R20"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Radway</surname><given-names>J.</given-names></name></person-group> <year>(1984)</year> <source>Reading the romance: Women, patriarchy, and popular literature</source><publisher-name>University of North Carolina Press</publisher-name></element-citation></ref>
<ref id="R21"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Rieder</surname><given-names>B.</given-names></name></person-group> <year>(2020)</year> <source>Engines of order: A mechanology of algorithmic techniques</source><publisher-name>Amsterdam University Press</publisher-name></element-citation></ref>
<ref id="R22"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Roberts</surname><given-names>S. T.</given-names></name></person-group> <year>(2019)</year> <source>Behind the Screen</source><publisher-name>Yale University Press</publisher-name></element-citation></ref>
<ref id="R23"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ruberg</surname><given-names>B.</given-names></name><name><surname>Ruelos</surname><given-names>S.</given-names></name></person-group> <year>(2020)</year> <article-title>Data for queer lives: How LGBTQ gender and sexuality identities challenge norms of demographics</article-title><source>Big Data &#x0026; Society</source><volume>7</volume><issue>1</issue><fpage>2053951720933286</fpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/2053951720933286">https://doi.org/10.1177/2053951720933286</ext-link></element-citation></ref>
<ref id="R24"><element-citation publication-type="other"><person-group person-group-type="author"><name><surname>Schramowski</surname><given-names>P.</given-names></name><name><surname>Brack</surname><given-names>M.</given-names></name><name><surname>Deiseroth</surname><given-names>B.</given-names></name><name><surname>Kersting</surname><given-names>K.</given-names></name></person-group> <year>(2023)</year> <article-title>Safe latent diffusion: Mitigating inappropriate degeneration in diffusion models</article-title><source>Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition</source><fpage>22522</fpage><lpage>22531</lpage></element-citation></ref>
<ref id="R25"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Spigel</surname><given-names>L.</given-names></name></person-group> <year>(1992)</year> <source>Make Room for TV: Television and the Family Ideal in Postwar America</source><publisher-name>University of Chicago Press</publisher-name><ext-link ext-link-type="uri" xlink:href="https://press.uchicago.edu/ucp/books/book/chicago/M/bo3624766.html">https://press.uchicago.edu/ucp/books/book/chicago/M/bo3624766.html</ext-link></element-citation></ref>
<ref id="R26"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Su</surname><given-names>N. M.</given-names></name><name><surname>Lazar</surname><given-names>A.</given-names></name><name><surname>Bardzell</surname><given-names>J.</given-names></name><name><surname>Bardzell</surname><given-names>S.</given-names></name></person-group> <year>(2019)</year> <article-title>Of dolls and men: Anticipating sexual intimacy with robots</article-title><source>ACM Transactions on Computer-Human Interaction (TOCHI)</source><volume>26</volume><issue>3</issue><fpage>1</fpage><lpage>35</lpage></element-citation></ref>
<ref id="R27"><element-citation publication-type="other"><person-group person-group-type="author"><name><surname>Tsai</surname><given-names>Y.-L.</given-names></name><name><surname>Hsu</surname><given-names>C.-Y.</given-names></name><name><surname>Xie</surname><given-names>C.</given-names></name><name><surname>Lin</surname><given-names>C.-H.</given-names></name><name><surname>Chen</surname><given-names>J.-Y.</given-names></name><name><surname>Li</surname><given-names>B.</given-names></name><name><surname>Chen</surname><given-names>P.-Y.</given-names></name><name><surname>Yu</surname><given-names>C.-M.</given-names></name><name><surname>Huang</surname><given-names>C.-Y.</given-names></name></person-group> <year>(2024)</year> <source>Ring-A-Bell! How Reliable are Concept Removal Methods for Diffusion Models?</source><comment>(No. arXiv:2310.10012). arXiv</comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.48550/arXiv.2310.10012">https://doi.org/10.48550/arXiv.2310.10012</ext-link></element-citation></ref>
<ref id="R28"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Watson</surname><given-names>B. M.</given-names></name></person-group> <year>(2020)</year> <article-title>&#x2018;There was Sex but no Sexuality*:&#x2019; Critical Cataloguing and the Classification of Asexuality in LCSH</article-title><source>Cataloging &#x0026; Classification Quarterly</source><volume>58</volume><issue>6</issue><fpage>547</fpage><lpage>565</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/01639374.2020.1796876">https://doi.org/10.1080/01639374.2020.1796876</ext-link></element-citation></ref>
<ref id="R29"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Williams</surname><given-names>L.</given-names></name></person-group> <year>(1999)</year> <source>Hard Core: Power, Pleasure, and the &#x201C;Frenzy of the Visible&#x201D;, Expanded edition</source><comment>(First Edition)</comment><publisher-name>University of California Press</publisher-name></element-citation></ref>
</ref-list>
</back>
</article>
