Title Classification of Reddit Posts: Predicting “Not Safe for Work” Content

Total Page:16

File Type:pdf, Size:1020Kb

Title Classification of Reddit Posts: Predicting “Not Safe for Work” Content Title Classification of Reddit posts: predicting “Not Safe For Work” content Anonymous Authors University of British Columbia Abstract On average, six percent of posts from the social news website www.Reddit.com are of mature content and are tagged Not Safe For Work (NSFW). Given the inher- ent difference in content of Safe For Work (SFW) and NSFW posts, we sought out to a build an efficient classifier to predict if a post has NSFW content given only the title of the posts. We tested three different classifiers: Naive Bayes, Bernouilli Naive Bayes, Stocastic Gradient descent. We implemented a bag of words rep- resentation and tested different feature selection and extraction methods such as bigrams, Tf-Idf weighing, and χ2 scoring. With a dataset of over 4 million posts we succeeded in classifying the Reddit posts with a class weighted F-score of 0.56 and a false negative rate of 40%. Introduction Reddit is a socially driven news and entertainment website. Registered users can post pictures or texts, as well as comment on these posts, which are then up or down voted. The popularity of a post is typically measured by the number of up and down votes as well as the number of comments. Posts are created on a large variety of topics (see Figure 1 and 3), and posts which are considered to contain nudity, profanity, pornography, anything generally offensive or only suitable to a mature audience are tagged as “Not Safe for Work” or NSFW. Figure 1: A word cloud of the top subreddits of 10 000 posts randomly scrapped from the front page of Reddit [1] Two online tools currently exist to identify NSFW content given a link to a website or a Reddit post: www.isthatSFW.com and RedditSFWCheck, respectively [2]. These tools use the content of the website or the comments posted on Reddit to evaluate if the website or post is NSFW. Similarly,we wanted to evaluate if it is possible to classify a post as NSFW given only the title of the post. In addition, we hypothesize that the difference in content of SFW and NSFW posts should be reflected in the title of a post. On the other hand, given the frequent occurence of sarcasm and humour in titles of posts, many posts which seem to be “Safe For Work” (SFW) a priori and turn out to be offensive 1 and NSFW. For example, the title “I was chopping an onion when all of a sudden...” could link to the cartoon of a man crying from chopping the onion or a gory picture of a man with his finger cut off, some chopped onion, and blood everywhere. We tackled this challenging classification task using three different benchmark classifiers: Naive Bayes, Bernoulli Naive Bayes and Stochastic Gradient Descent. Following typical procedures and parameters used by natural language processing tools and document classifers, we organized the training and testing data in a “Bag of words” and implemented bigram feature extraction, Tf-Idf weighing, χ2 scoring and selection. Finally we evaluated the different classifiers by calculating their F-score and their rate of missclassifying NSFW posts as SFW. 1 What is a NSFW Reddit post? A typical Reddit post is somewhere between 3 to 20 words long and is usually a sentence, statement or a question. The title of the post will usually link to a website, a picture or text. The word cloud in Figure 2(top) shows the most reccurent words found in a sample of 10; 000 posts’titles from January 2013 which were not tagged as NSFW and are thus assumed to be SFW. The word cloud in Figure 1 shows the main subreddits where these posts were published. Figure 2: Word clouds of the top words occuring in 1000 NSFW posts’titles (bottom) and 10 000 SFW posts’titles (top) randomly scrapped from the front page of Reddit [1] Figures 2(top) and 3 are word clouds showing the most frequent terms used in the NSFW post’s title and the name of the subreddit these posts came from. Comparing the SFW and NSFW word clouds, we observe that most words occur mainly in one type of content and not the other while other words are common to both types of posts’ titles. For example, the words V alentine0s; day; boobs; like; today; know; anyone; and time are found in both word clouds. Therefore word occurence is a good feature for our classifier but may not be sufficient to classify certain posts. 2 Figure 3: A word cloud of the top subreddits of 1 000 NSFW posts randomly scrapped from the front page of Reddit [1] 2 Methods This section describes the different methods implemented. Our classification pipeline includes the extraction of Reddit’ posts’ metadata, the organisation of this data into a dataset, the selection of relevant features in our datatset, the classification of the training data, and the evaluation of the classifiers on the test data. 2.1 Scrapping Reddit The Reddit website is currently written in Python and is easy to scrape with a Python script. We extracted the metadata of 4 million posts from January 2013 including the title, date, number of votes (up and down votes), subreddit, user, NSFW binary tag, etc. 2.2 Creating an outlier free dataset There are two ways that a post can be tagged as NSFW on the Reddit website. Either the post was published in a subreddit with mature content where all posts are automatically tagged as NSFW, for example www.reddit.com/r/NSFWfunny, or the users which moderate the website tag the post as NSFW. The latter will naturally only occur if the post is popular enough that many users will have viewed the post and messaged the moderators that the post is in fact NSFW. Therefor to prevent the collection of posts mistakenly untagged, we scrapped in March the posts from January to make sure that they were on the website for about 2 months thus giving ample time for the posts to be viewed by several viewers. In addition, we eliminated from our dataset posts which were not popular by filtering out the posts whose total number of votes was less than 30. 2.3 Bag of words and bigrams Most document classifiers use a bag of words representation to organize the documents’ contents into a set of tokens [3, 4, 5]. The vocabulary of a dataset is the set of all tokens occuring in the documents. The 300 most common english words such as “the, and, I, because” better known as stopwords are removed from the list of possible tokens. This representation ignores the structure of each document and characterizes a document by the number occurences of a word in the document. For example, let our dataset contain only two posts: “The sky is blue and green” “Oh look look! The beautiful sky!” We first set the words to lower case and then extract all the words occuring in the title which we denote as tokens. After removing stopwords, we obtain a vocabulary of four tokens: “sky, blue, green, oh, look, beautiful”. We then build our feature matrix X where a row represents a post’s title and a column represents a feature or token. The entries of the matrix denote the number of occurences of the token in the post’s title: ( ) 1 1 1 0 0 0 X = 1 0 0 1 2 1 The dimensions of the feature vector are N ∗ M where N are the number of posts in our dataset and M the number of tokens in the vocabulary. 3 In order to preserve some local structure when selecting the features, we chose to store consecutive occurences of words or bigrams. In our example, the vocabulary of of unigrams and bigrams is “sky, blue, green, oh, look, beautiful, sky blue, blue green, oh look, look look, beautiful sky”. 2.4 Feature Selection 2.4.1 Tf-Idf weighing of tokens Term frequency - inverse document frequency (tf-idf) method measures the local and global impor- tance of a word or token in a collection of documents [5]. It assigns a weight to each token using the frequency of the token in a dataset and the frequency of a token in each document. The tf-idf of a token is measured using the equation tfidf(t) = tf(t; p) ∗ idf(t) where tf is the term frequency per post: the number of times a token t occurs in the post p. Similarly, Idf is the inverse docment frequency of the token: N idf(t) = log (1) ni where ni is the number of posts where the token occurs and N is the total number of posts in the dataset [5]. A token in a post with a high tf-idf is a token which appears many times in that post and is present in not many posts. In our example above, the word sky would have the lowest tf-idf and the word look would have the highest. We then obtain a new feature matrix X with weighted entries which are normalized for each post using L2 or Euler normalization [6]. 2.4.2 χ2 weighing and feature selection 2 The χ measures the association betweent the occurence of a token t and a category ci. For our two 2 categories cnsfw and csfw, the χ measure becomes [4, 5]: ∗ ¯ − ¯ 2 2 N [P (t; cnsfw)P (t; csfw) P (t; csfw)P (t; cnsfw)] χ (t; cnsfw) = (2) P (t) ∗ P (t¯)P (cnsfw)P (csfw) where P (t; cnsfw) is the probability of token t to belong to a post which is NSFW and P (t;¯ csfw) is the probability that token t is absent from a post which is SFW.
Recommended publications
  • Participatory Porn Culture Feminist Positions and Oppositions in the Internet Pornosphere Allegra W
    from Paul G. Nixon and Isabel K. Düsterhöft (Eds.) Sex in the Digital Age. New York: Rougledge, 2018. CHAPTER 2 Participatory porn culture Feminist positions and oppositions in the internet pornosphere Allegra W. Smith Introductions: pornography, feminisms, and ongoing debate Though first-wave feminists had engaged in debate and advocacy surrounding sexual knowledge and obscenity since the late-19th century (Horowitz, 2003), American advocates did not begin to address pornography as a feminist concern until the 1970s, ostensibly beginning with the formation of the activist group Women Against Violence in Pornography and Media (WAVPM) in 1978. WAVPM was a reactionary response to the mainstreaming of hardcore pornography in the wake of American sexual liberation, which many second wave feminists claimed “…encouraged rape and other acts of violence, threatening women’s safety and establishing a climate of terror that silenced women and perpetuated their oppression… [thus helping] create and maintain women’s subordinate status” (Bronstein, 2011, pp. 178–179). The resulting “porn wars” (or, more broadly, “sex wars”) of the 1980s and 1990s polarized second- and third-wave feminists into two camps: (1) anti-porn feminists, such as writer Andrea Dworkin (1981) and legal scholar Catharine MacKinnon (1984), who opposed the creation and distribution of pornographic images and videos on moral and political grounds; and (2) pro-porn or sex-positive feminists, such as anthropologist Gayle Rubin and feminist pornographer Candida Royalle, who advocated for freedom of sexual expression and representation. The rhetoric surrounding the social and cultural ills perpetuated by pornography was duly acrimonious, with one prominent feminist writing, “pornography is the theory, rape is the practice” (Morgan, 1978, p.
    [Show full text]
  • Criminalization Downloads Evil: Reexamining the Approach to Electronic Possession When Child Pornography Goes International
    \\jciprod01\productn\B\BIN\34-2\BIN203.txt unknown Seq: 1 2-JUN-16 14:19 CRIMINALIZATION DOWNLOADS EVIL: REEXAMINING THE APPROACH TO ELECTRONIC POSSESSION WHEN CHILD PORNOGRAPHY GOES INTERNATIONAL Asaf Harduf* INTRODUCTION ................................................... 280 R I. THE LADDER OF CRIMINALIZATION ....................... 281 R A. The Matter of Criminalization ......................... 282 R B. The Rungs of the Ladder of Criminalization ........... 284 R 1. First Rung: Identifying the Conduct, Causation, and Harm ......................................... 285 R 2. Second Rung: Examining the Ability to Achieve Goals ............................................. 286 R 3. Third Rung: Examining Alternatives to Criminalization .................................... 287 R 4. Fourth Rung: Assessing the Social Costs of Solutions and Striking a Balance .................. 288 R C. Towards an Analysis of Child Pornography Possession ............................................. 288 R II. APPLICATION TO THE ELECTRONIC POSSESSION OF CHILD PORNOGRAPHY ............................................ 289 R A. First Rung: The Offensive Conduct of Electronic Possession ............................................. 292 R 1. Conduct of Electronic Possession .................. 292 R 2. Harms to Children ................................ 294 R 3. Causation: Four Possible Links .................... 295 R 4. Offensiveness: Summation ......................... 302 R B. Second Rung: Criminal Law’s Ability to Reduce Harm to Children ...........................................
    [Show full text]
  • Why Stonewall Still Matters…
    PrideLife Magazine 2019 / pridelifemagazine 2019 @pridelife YOUR ESSENTIAL th 2020 ELECTION 50 PRIMER stonewall P.68 anniversaryspecial issue STEP INSIDE THE NIGHT OF WHY THE RIOTS STONEWALL P.50 STILL MATTERS… THE FIERCE WITH EXCLUSIVE AND TRIBUTES FROM FABULOUS Asia Kate Dillon Jesse Tyler Ferguson Madonna Christian Siriano Kamala Harris Indigo Girls Gus Kenworthy Bethany Meyers George Takei BILLY Margaret Cho Rufus Wainwright Carson Kressley Adore Delano Daya And more... PORTERP.46 PLUS! INTRODUCING THE INTERPRIDELIFE SEAL OF APPROVAL P.14 B:17.375” T:15.75” S:14.75” Important Facts About DOVATO Tell your healthcare provider about all of your medical conditions, This is only a brief summary of important information about including if you: (cont’d) This is only a brief summary of important information about DOVATO and does not replace talking to your healthcare provider • are breastfeeding or plan to breastfeed. Do not breastfeed if you SO MUCH GOES about your condition and treatment. take DOVATO. You should not breastfeed if you have HIV-1 because of the risk of passing What is the Most Important Information I Should ° You should not breastfeed if you have HIV-1 because of the risk of passing What is the Most Important Information I Should HIV-1 to your baby. Know about DOVATO? INTO WHO I AM If you have both human immunodeficiency virus-1 (HIV-1) and ° One of the medicines in DOVATO (lamivudine) passes into your breastmilk. hepatitis B virus (HBV) infection, DOVATO can cause serious side ° Talk with your healthcare provider about the best way to feed your baby.
    [Show full text]
  • The Role of Torts in the Fight Against Nonconsensual Pornography
    University of Pennsylvania Carey Law School Penn Law: Legal Scholarship Repository Published Articles Student Papers 2021 The Role of Torts in the Fight Against Nonconsensual Pornography Lindsay Holcomb University of Pennsylvania Follow this and additional works at: https://scholarship.law.upenn.edu/published_articles Part of the Law and Society Commons Repository Citation Holcomb, Lindsay, "The Role of Torts in the Fight Against Nonconsensual Pornography" (2021). Published Articles. 1. https://scholarship.law.upenn.edu/published_articles/1 This Article is brought to you for free and open access by the Student Papers at Penn Law: Legal Scholarship Repository. It has been accepted for inclusion in Published Articles by an authorized administrator of Penn Law: Legal Scholarship Repository. For more information, please contact [email protected]. LINDSAY HOLCOMB VOLUME 27: ISSUE II SPRING 2021 THE ROLE OF TORTS IN THE FIGHT AGAINST NONCONSENSUAL PORNOGRAPHY Lindsay Holcomb† TABLE OF CONTENTS I. INTRODUCTION ............................................................................... 262 II. DEFINING NONCONSENSUAL PORN ................................................ 265 A. Micro Level Analysis—Experiences of Victims and Perpetrators….. ...................................................................... .267 B. Meso Level Analysis—Cultures of Shame ............................... 270 C. Macro Level Analysis—The Digital Landscape ...................... 272 III. EFFORTS TO CRIMINALIZE REVENGE PORN ...................................
    [Show full text]
  • A Critical Case Study on Pornography 2.0
    ‘‘I’ll bet I’m having more fun than you are.” A critical case study on pornography 2.0 Asher Boersma Master Thesis Film and Television Studies, Utrecht University Supervisor: prof. dr. Frank Kessler Cohort February 2006-2007 / August 29, 2008 17.814 words main body / 22.651 words total honey, close the curtains. Contents Acknowledgements 3 0. Introduction 4 . Key concepts 6 . Metaphors, myths and discourse 6 .. Web 2.0 6 ..2 Pornography 2.0 7 .2 Theory of pornography 9 .2. The early years of the discourse 0 .2.2 Problematic binary .2.3 Porn Studies 2 .2.4 Narrative sets the tone 3 .2.5 Internet and pornography 4 .3 The case 7 .4 Method 8 2. Case study 20 2. Representation versus real? 20 2.. Shady divide 2 2.2 Discerned and yet connected 24 2.2. Continuity 24 2.2.2 Home is where... 26 2.2.3 Money shot 29 2.2.4 Female solo performance 30 2.2.5 Division of labour 33 2.3 A long story short 34 3. Conclusion 36 Works cited 38 Websites 42 Audiovisual 43 3 Acknowledgements I am indebted to Prof. Dr. Frank Kessler for critical guidance and to Joost Broeren, MPhil, and Henry Allen for unstinting feedback. Furthermore, the love and support from Florence, friends, and family were imperative – thank you. 0. Introduction A great sexual sermon – which has had its subtle theologians and its popular voices – has swept through our societies over the last decades; it has chastised the old order, denounced hypocrisy, and praised the rights of the immediate and the real; it has made people dream of a New City.
    [Show full text]
  • January 20, 2019 Brynne O'neal Professor Nathaniel Persily Free
    January 20, 2019 Brynne O’Neal Professor Nathaniel Persily Free Speech, Democracy, and the Internet Autumn 2018-2019 FOSTA, Explicit Content Bans, and Free Speech 1. Introduction Despite jokes about the nature of the internet, sexual content has been one of the most limited types of speech online. Mechanisms that govern broad subsets of U.S. internet platforms and services set limits on sexual content that trickle down to individual transactions, website closures, and social media explicit content policies. The most notable of these mechanisms is a bill passed in March 2018, the Allow States and Victims to Fight Online Sex Trafficking Act (FOSTA), which incorporated portions of an earlier bill, the Stop Enabling Sex Traffickers Act (SESTA). FOSTA makes internet companies liable for sex trafficking content — defined extremely broadly — on their platforms. The purpose of this paper is to provide an overview on the changes to platform policies and the site closures that have occurred in response to FOSTA and to tie them into a longer history of restrictions stemming from payment processor policies, the iOS App Store, and law enforcement action targeted at human trafficking and sex work. While platforms are free to make choices to create spaces for speech without sexual content, legislation and policies that underpin the entire internet can have an undue influence on those choices. Moreover, restrictions on content frequently turn into restrictions on the people associated with the content. Sex workers and members of LGBTQ+ communities have had their legal speech severely impacted by these policies. While this pattern has been pointed out by the affected communities and advocacy groups, it is often forgotten in the broader conversation around internet censorship — even though these laws and policies have much greater reach than many of the criticized moves the platforms have taken around, for instance, hate speech.
    [Show full text]
  • Alternative Pornographies, Regulatory Fantasies and Resistance Politics
    Alternative Pornographies, Regulatory Fantasies and Resistance Politics Zahra Zsuzsanna Stardust Bachelor of Arts (History) (University of Sydney) Bachelor of Laws (Hons) (University of Sydney) Master of Arts (Gender and Cultural Studies) (University of Sydney) Thesis submitted to fulfil requirements of a Doctor of Philosophy in the School of Arts and Media at the University of New South Wales. March 2019. Supervised by Professor Ramaswami Harindranath, Dr Daniel Joyce and Professor Kath Albury. 1 Contents Dissertation sheet ............................................................................................................................................ 5 Originality Statement ....................................................................................................................................... 6 Inclusion of Publications Statement .................................................................................................................. 7 Copyright and Authenticity Statement .............................................................................................................. 8 Abstract ........................................................................................................................................................... 9 Acknowledgements ........................................................................................................................................ 10 Relevant Publications and Presentations Arising from this Research ..............................................................
    [Show full text]
  • Organizing Pornography, Organizing Desire
    Fesnak, Matt Organizing Pornography, Organizing Desire Organizing pornography, Organizing desire Matt Fesnak Abstract - While libraries and librarians pride themselves on their classification systems and their ability to use cat aloguing systems to organize and access information, new technologies have forced changes onto the knowledge management landscape. Tagging and “trending topics” have become ubiquitous ways to organize the web, and give users a sense of control over the content presented to them. On websites like facebook.com, pornhub.com, and xhamster.com, users upload content and add tags in order for other people to find it, but are often restricted in the categories available to them. This leads to what Jodi Dean (2012) calls “communicative capitalism”, wherein- users are given the feelings of freedom and democracy, but actually come across many Foucaultian surveillance mechanisms and limitations. This paper specifically focuses on the role of categories and tags for the discoverabil ity of pornographic web content, and the impact that hegemonic categorization practices have on marginalized Keywordsbodies, desires, and ideas. knowledge organization, cataloguing, pornography, porn, web categories - Sexuality is an important aspect of life, and has the awards shows and associated industries are and- been represented in one way or another in many differ- have been in terms of those nominated. In contrast, ent media formats. However, while everyday television, pornography is a medium that provides artistic repre movies, radio, and video games provide regular repre- sentations of identities, desires, and scenarios that are sentations of sexuality, they usually adhere to clichés. not shown in any depth or with any regularity in other For instance, popular movies and television are just re popular media, allowing consumers to explore aspects cently being celebrated for and challenged to provide of themselves or their interests that might otherwise be more diverse sexual representations.
    [Show full text]
  • Useful Online Terms and References for Parents and Carers to Know
    DIGITAL READY HUB USEFUL ONLINE TERMS AND REFERENCES FOR PARENTS/CARERS TO KNOW The online world is fast-paced and ever-changing. So much so that trying to keep up with it can sometimes feel impossible. This cheat sheet is designed to help you get to grips with some of the more popular online terms and references that may be unfamiliar to you. Hacking Sexting/Sharing Nudes The gaining of unauthorised access to data in a system, computer or account. The sending of sexually explicit messages or photos. So-called ‘Revenge Porn’ Grooming The public sharing of a sexually explicit photograph or video of someone without their consent, with or without the intention to humiliate or cause Building a relationship, trust and emotional connection with a child or them harm. The ISPCC does not advocate the use of this term as it can young person by an older person so they can manipulate, exploit and diminish the impact such an action has on the person impacted. abuse them. There are now laws in place that prohibit this type of behaviour. Finsta Sharenting Short for a “Fake Instagram”, it refers to an account made so that a user The overuse of social media by parents to share content based on their can post images and interact with other accounts in a more private way. children, such as baby pictures or details of their children's activities. Doomscrolling Livestream The act of consuming a large quantity of negative online news at once. A live transmission of an event like a concert over the internet.
    [Show full text]
  • Bishop Fox Cybersecurity Style Guide
    BISHOP FOX CYBERSECURITY STYLE GUIDE VERSION 1.1 JUNE 27, 2018 This work is licensed under a Creative Commons Attribution-ShareAlike 2.0 Generic License. Bishop Fox Contact Information: +1 (480) 621-8967 [email protected] 8240 S. Kyrene Road Suite A-113 Tempe, AZ 85284 Contributing Technical Editors: Brianne Hughes, Erin Kozak, Lindsay Lelivelt, Catherine Lu, Amanda Owens, Sarah Owens We want to thank all of our Bishop Fox consultants, especially Dan Petro, for reviewing and improving the guide’s technical content. Bishop Fox™ 2018/06/27 2 TABLE OF CONTENTS Welcome! ................................................................................................................................. 4 Advice on Technical Formatting ........................................................................................................ 5 What to Expect in the Guide .............................................................................................................. 6 The Cybersecurity Style Guide .............................................................................................. 7 A-Z .......................................................................................................................................................... 7 Appendix A: Decision-making Notes .................................................................................. 96 How We Choose Our Terms ............................................................................................................96 How to Codify Your Own Terms ......................................................................................................97
    [Show full text]
  • Reddit out to Tame Its Wild Side 17 July 2015
    Reddit out to tame its wild side 17 July 2015 to be passionate about the bulletin board being an online venue for saying whatever users want no matter how inane, outrageous, or offensive. "As Reddit has grown, we've seen additional examples of how unfettered free speech can make Reddit a less enjoyable place to visit, and can even cause people harm outside of Reddit," Huffman said in a message opening his AMA. The talk of restrictions comes in the wake of the departure of Ellen Pao, who headed the company until disgruntled users called for her departure. A number of people on the site posted sexist and inflammatory comments about Pao. The talk of restrictions at Reddit comes in the wake of Revenge porn ban the departure of Ellen Pao (pictured), who headed the company until disgruntled users called for her departure He noted that earlier this year Reddit banned non- consensual pornography referred to as revenge porn because it typically involves former romantic partners who have not given permission for sharing Popular online bulletin board Reddit is mulling content. ways to make its free-for-all discussions more civil by restraining what people can post, a move that "This was largely accepted by the community, and could anger some of the site's most passionate the world is a better place as a result," Huffman members. said. Steve "spez" Huffman, co-founder of the website "Therefore, today we're announcing that we're self-titled "the front page of the Internet," used an considering a set of additional restrictions on what Ask Me Anything (AMA) session on the site people can say on Reddit-or at least say on our Thursday to let fans know that curbs could be public pages-in the spirit of our mission." coming.
    [Show full text]
  • Dr Helen Pringle: Submission
    DR HELEN PRINGLE: SUBMISSION Senate Environment and Communications References Committee Inquiry, 2016 Harm being done to Australian children through access to pornography on the Internet Introduction The main recommendation of this submission is that government measures in understanding and responding to pornography and its harms to children should be formulated as part of a broad-based approach that addresses Violence against Women and Girls (VAWG). The approach recommended here is on the model of the strategy adopted by the Crown Prosecution Service (CPS) in England, and set out in the Equally Safe strategy of the Scottish Government/Riaghaltas na h-Alba.1 I acknowledge that pornography and associated practices also do harm to boys and young men (as the mother of a son, I am acutely concerned with such risks and dangers), and I have no wish to neglect, or counsel neglect of, the problem of violence to boys and young men, whether it be perpetrated by boys or girls, men or women. However, the need for a comprehensive strategy in terms of VAWG arises because of the systematically gendered patterns of sexual abuse and violence in our society, and the role of pornography and the sex industry more broadly in constructing and reflecting those patterns. My submission to this Inquiry focuses on the impact of pornography on the autonomy, equality and dignity of children, and of other parts of the sex industry like prostitution with which it is intertwined. I understand and respect the framework of ‘public health and morality’ within which the questions of this Inquiry are often placed.
    [Show full text]