
This research paper investigates through mixed methods how vulnerable individuals residing in the U.S. can actively remove personal data from online platforms to defend against cyber threats. Through statutory analysis, manual opt-outs, and third-party removal services, this paper identifies realistic tactics and limitations in removing the digital shadow. For instance, kanary's removal tool only operates on iPhone operation system devices. Likewise, manual inputs to remove personal information from data broker websites can result in retaliation by data broker websites including psychological warfare and reposting of personal information. While free tools offer partial coverage, paid agencies like Norton Reputation Defender present the most comprehensive solutions, particularly against noncompliant data brokers.
The emergence of generative artificial intelligence has transformed online sexual abuse, facilitating the creation of non-consensual sexual content with extreme speed and realism. Through three case studies—Blaire (QTCinderella), Elliston Berry, and Elijah Heacock—this research paper defines the artificial sextortion abuse ecosystem, from initial exposure to coercion and distribution, and its profound psychological consequences, ranging from anxiety and body dysmorphia to, in extreme cases, suicide. Likewise, this research paper helps erase artificial sextortion, through methods including digital footprint health and reporting mechanisms.
Hello, ResearcherCollab community! It's with great pleasure to announce that I have established my own lab for new researchers seeking e…