You can find discussions on this in papers related to human factors in cybersecurity and user susceptibility to phishing. 2. P2P (Peer-to-Peer) Network Security
Specifically, it is frequently cited as a classic "honeypot" or "clickbait" filename used to study how users can be lured into downloading malicious content. While there may not be a single "foundational" paper with this exact title, it appears across various research contexts: 1. Social Engineering & Human Psychology Hot Girls (259) mp4
If you are writing a paper or looking for a deep dive, I recommend searching academic databases for these broader terms where this specific filename is used as a case study: "Social engineering through malicious file naming" "User behavior and deceptive downloads in P2P networks" "The role of curiosity in malware propagation" You can find discussions on this in papers