skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


This content will become publicly available on October 18, 2026

Title: Beyond Affirmative Consent: Creating Alternative Models for Consent to Computer-Mediated Sexual Activity Through Social VR for Online Dating
Despite the absence of consent being a defining quality of computer-mediated sexual harm, there is an absence of consent models that explicitly prescribe how consent to sexual activity should be asked for, given, and denied when mediated by technology. HCI literature has advocated for the adoption of affirmative consent (''yes means yes''); however, this model was created in 1991 without consideration for computers and has been historically underutilized. Through a speculative study of VR dating with 16 women and LGBTQIA+ stakeholders, we contribute archetypes of four new computer-mediated consent models for sexual activity. These include 1) visual consent through AR/VR rather than verbal dialogue, 2) agent-mediated consent where AI agents communicate consent on behalf of sexual partners, 3) a two-layer consent process called consent-to-stimulus, and 4) environmental consent where virtual environments scaffold behaviors that can(not) be consented to. We conclude by reflecting on which models could potentially supplant affirmative consent to better mitigate computer-mediated sexual violence and harassment. Content warning: This paper discusses forms of sexual violence including rape.  more » « less
Award ID(s):
2339431 2426230 2401775 2349350 2211896
PAR ID:
10657968
Author(s) / Creator(s):
; ; ; ;
Publisher / Repository:
ACM
Date Published:
Journal Name:
Proceedings of the ACM on Human-Computer Interaction
Volume:
9
Issue:
7
ISSN:
2573-0142
Page Range / eLocation ID:
1 to 34
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. As social Virtual Reality (VR) grows in prevalence, new possibilities for embodied and immersive social interaction emerge, including varied forms of interpersonal harm. Yet, challenges remain regarding defining, identifying, and mitigating said harm in social VR. In this paper, we take an alternative approach to understanding and designing solutions for interpersonal harm in social VR through the lens of consent, which circumvents the lack of consensus and social norms on what should be defined as harm in social VR and reflects the embodied, immersive, and offline-world-like nature of harm in social VR. Through interviews with 39 social VR users, we offer one of the first empirical explorations on how social VR users understand consent as boundaries, (re)purpose existing social VR features for practicing consent as boundary setting, and envision the design of future consent mechanics in social VR to balance protection and interaction expectations to mitigate interpersonal harm as boundary violations in social VR. This work makes significant contributions to CSCW and HCI research by (1) uncovering how social VR users craft novel conceptualizations of consent as boundaries and harm as unwanted boundary violations, and (2) providing three foundational principles for designing future consent mechanics in social VR informed by actual social VR users. 
    more » « less
  2. This paper focuses on a dynamic aspect of responsible autonomy, namely, to make intelligent agents be responsible at run time. That is, it considers settings where decision making by agents impinges upon the outcomes perceived by other agents. For an agent to act responsibly, it must accommodate the desires and other attitudes of its users and, through other agents, of their users.The contribution of this paper is twofold. First, it provides a conceptual analysis of consent, its benefits and misuses, and how understanding consent can help achieve responsible autonomy. Second, it outlines challenges for AI (in particular, for agents and multiagent systems) that merit investigation to form as a basis for modeling consent in multiagent systems and applying consent to achieve responsible autonomy. 
    more » « less
  3. null (Ed.)
    User engagement with data privacy and security through consent banners has become a ubiquitous part of interacting with internet services. While previous work has addressed consent banners from either interaction design, legal, and ethics-focused perspectives, little research addresses the connections among multiple disciplinary approaches, including tensions and opportunities that transcend disciplinary boundaries. In this paper, we draw together perspectives and commentary from HCI, design, privacy and data protection, and legal research communities, using the language and strategies of “dark patterns” to perform an interaction criticism reading of three different types of consent banners. Our analysis builds upon designer, interface, user, and social context lenses to raise tensions and synergies that arise together in complex, contingent, and conflicting ways in the act of designing consent banners. We conclude with opportunities for transdisciplinary dialogue across legal, ethical, computer science, and interactive systems scholarship to translate matters of ethical concern into public policy. 
    more » « less
  4. The social impacts of computer technology are often glorified in public discourse, but there is growing concern about its actual effects on society. In this article, we ask: how does “consent” as an analytical framework make visible the social dynamics and power relations in the capture, extraction, and labor of data science knowledge production? We hypothesize that a form of boundary violation in data science workplaces—gender harassment—may correlate with the ways humans’ lived experiences are extracted to produce Big Data. The concept of consent offers a useful way to draw comparisons between gender relations in data science and the means by which machines are trained to learn and reason. Inspired by how Big Tech leaders describe unsupervised machine learning, and the co-optation of “revolutionary” rhetoric they use to do so, we introduce a concept we call “techniques of invisibility.” Techniques of invisibility are the ways in which an extreme imbalance between exposure and opacity, demarcated along fault lines of power, are fabricated and maintained, closing down the possibility for bidirectional transparency in the production and applications of algorithms. Further, techniques of invisibility, which we group into two categories—epistemic injustice and the Brotherhood—include acts of subjection by powerful actors in data science designed to quell resistance to exploitative relations. These techniques may be useful in making further connections between epistemic violence, sexism, and surveillance, sussing out persistent boundary violations in data science to render the social in data science visible, and open to scrutiny and debate. 
    more » « less
  5. Sexual exploration is a natural part of adolescent development; yet, unmediated internet access has enabled teens to engage in a wider variety of potentially riskier sexual interactions than previous generations, from normatively appropriate sexual interactions to sexually abusive situations. Teens have turned to online peer support platforms to disclose and seek support about these experiences. Therefore, we analyzed posts (N=45,955) made by adolescents (ages 13--17) on an online peer support platform to deeply examine their online sexual risk experiences. By applying a mixed methods approach, we 1) accurately (average of AUC = 0.90) identified posts that contained teen disclosures about online sexual risk experiences and classified the posts based on level of consent (i.e., consensual, non-consensual, sexual abuse) and relationship type (i.e., stranger, dating/friend, family) between the teen and the person in which they shared the sexual experience, 2) detected statistically significant differences in the proportions of posts based on these dimensions, and 3) further unpacked the nuance in how these online sexual risk experiences were typically characterized in the posts. Teens were significantly more likely to engage in consensual sexting with friends/dating partners; unwanted solicitations were more likely from strangers and sexual abuse was more likely when a family member was involved. We contribute to the HCI and CSCW literature around youth online sexual risk experiences by moving beyond the false dichotomy of "safe" versus "risky". Our work provides a deeper understanding of technology-mediated adolescent sexual behaviors from the perspectives of sexual well-being, risk detection, and the prevention of online sexual violence toward youth. 
    more » « less