Misplaced Pages

Downblouse: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editContent deleted Content addedVisualWikitext
Revision as of 13:16, 15 November 2017 editJzG (talk | contribs)Edit filter managers, Autopatrolled, Extended confirmed users, Page movers, New page reviewers, Pending changes reviewers, Rollbackers155,082 edits rm. redundant cite to academic vanity press IGI Global← Previous edit Latest revision as of 14:25, 2 October 2024 edit undoPolly Tunnel (talk | contribs)Extended confirmed users20,309 edits Rcat shell added 
(10 intermediate revisions by 9 users not shown)
Line 1: Line 1:
#redirect ]
{{Use dmy dates|date=July 2013}}
{{more footnotes|date=June 2014}}
]
'''Downblouse''' is a form of ] or ] involving watching female breasts while looking down a woman's dress.<ref>Tom Dalzell and Terry Victor, ''Sex Slang'', page 51, Routledge, 2007, {{ISBN|9781134194926}}</ref> It may take the form of making ] down the top of a female's ], ] or other garment, capturing an image of her breasts or ].


{{Rcat shell|
The practice is regarded as a form of sexual fetishism or voyeurism and is similar in nature to ]ing. With the advances in digital photography, such as the ]s, covert photography of cleavage became popular with some websites becoming dedicated to such photos.<ref>Lisa Guerin, ''Smart Policies for Workplace Technologies'', page 215, Nolo, 2013, {{ISBN|9781413318432}}</ref><ref>Anil Aggrawal, ''Forensic and Medico-legal Aspects of Sexual Crimes and Unusual Sexual Practices'', page 134, CRC Press, 2008, {{ISBN|9781420043099}}</ref> A number of American and Australian states and Germany have specific statutes that prohibit such photography.<ref>Lance E Rothenberg, "", ''American University Law Review'', Washington College of Law</ref>
{{R from merge}}

{{R to section}}
For ethical and legal issues relating to similar types of photography, see ]. The practice is regarded as an invasion of privacy of the woman observed or photographed in this manner, as harassment and as an attack on her dignity.
}}

==See also==
* ]
* ]
* ]

==References==
{{reflist}}

==Further reading==
* ''The Future of Reputation, Gossip, Rumour and Privacy on the Internet'', Daniel J. Solove, Yale University Press, 2007, {{ISBN|978-0-300-12498-9}}, p.&nbsp;166
* ''Sex in Consumer Culture'', Tom Reichert, Jacqueline Lambiase, Routledge, 2006, {{ISBN|0-8058-5090-2}}
* ''Sex Crimes Investigation: Catching and Prosecuting the Perpetrators'', Robert L. Snow, Greenwood Publishing Group, 2006, {{ISBN|0-275-98934-8}}, p.&nbsp;146

==External links==
{{Commons category}}
* {{Cite web| url=http://www.epic.org/privacy/gender/ | title=Gender and Electronic Privacy | publisher= Electronic Privacy Resource Center}}
* {{Cite web| url=http://the.honoluluadvertiser.com/article/2004/Jan/18/ln/ln20a.html | title=Privacy issues plague picture phones | publisher= The Honolulu Advertiser}}
* {{Cite web| url=http://www.caslon.com.au/photonote1.htm | title=Unauthorized photos | publisher= Caslon Analytics}}
* {{Cite web | url=http://www.businessweek.com/magazine/content/05_32/b3946008_mz001.htm | title=Surveillance Society: The Experts Speak | publisher=Business Week Online | deadurl=yes | archiveurl=https://web.archive.org/web/20110526003912/http://www.businessweek.com/magazine/content/05_32/b3946008_mz001.htm | archivedate=26 May 2011 | df=dmy-all }}

{{Sexual slang}}

]
]

Latest revision as of 14:25, 2 October 2024

Redirect to:

This page is a redirect. The following categories are used to track and monitor this redirect:
  • From a merge: This is a redirect from a page that was merged into another page. This redirect was kept in order to preserve the edit history of this page after its content was merged into the content of the target page. Please do not remove the tag that generates this text (unless the need to recreate content on this page has been demonstrated) or delete this page.
When appropriate, protection levels are automatically sensed, described and categorized.