Conference Paper

A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

This paper describes a qualitative study with 89 participants that details how abusers in intimate partner violence (IPV) contexts exploit technologies to intimidate, threaten, monitor, impersonate, harass, or otherwise harm their victims. We show that, at their core, many of the attacks in IPV contexts are technologically unsophisticated from the perspective of a security practitioner or researcher. For example, they are often carried out by a UI-bound adversary - an adversarial but authenticated user that interacts with a victim»s device or account via standard user interfaces - or by downloading and installing a ready-made application that enables spying on a victim. Nevertheless, we show how the sociotechnical and relational factors that characterize IPV make such attacks both extremely damaging to victims and challenging to counteract, in part because they undermine the predominant threat models under which systems have been designed. We discuss the nature of these new IPV threat models and outline opportunities for HCI research and design to mitigate these attacks.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... A growing body of research in computer security & privacy (S&P) and human-computer interaction (HCI) is drawing attention to the digital security, privacy, and safety (i.e., digital safety) needs and experiences of at-risk users [23,117,148]. These works cover users facing a spectrum of risks, including those who face an immediate threat of experiencing a digital attack (survivors of intimate partner violence (IPV) [44], political activists [38]); an increased likelihood to be targeted (LGBTQIA+ people [39], political campaigners [34]); or disproportionate harm from an attack (children [108], people experiencing homelessness [124]). ...
... Data collected may be compromised if researchers do not consider the potential for participants to self-censor if, e.g., they are intimidated by adversaries or consider the research site unsafe [6]. Participants may even be compelled to attend research encounters with adversaries such as partners [44,45], family members [88], or caregivers [90]. ...
... Digital-safety research may also distress or re-traumatize at-risk participants, by asking them to recount some of their most sensitive experiences [12,44], or inadvertently triggering feelings of judgment or shame that they did not take "better steps" to protect themselves from their adversaries [56,137] (c.f., [31]). Researchers may wish to help by sharing guidance on S&P best practices, but this must be done carefully, as improperly advising participants can withhold benefit from them or even cause additional harm. ...
Preprint
Full-text available
Research involving at-risk users -- that is, users who are more likely to experience a digital attack or to be disproportionately affected when harm from such an attack occurs -- can pose significant safety challenges to both users and researchers. Nevertheless, pursuing research in computer security and privacy is crucial to understanding how to meet the digital-safety needs of at-risk users and to design safer technology for all. To standardize and bolster safer research involving such users, we offer an analysis of 196 academic works to elicit 14 research risks and 36 safety practices used by a growing community of researchers. We pair this inconsistent set of reported safety practices with oral histories from 12 domain experts to contribute scaffolded and consolidated pragmatic guidance that researchers can use to plan, execute, and share safer digital-safety research involving at-risk users. We conclude by suggesting areas for future research regarding the reporting, study, and funding of at-risk user research
... Some of them are powerful spyware apps designed solely for spying, while others are "dual-use" apps that can be repurposed for IPS. Other studies [54], [23], [24], [11] have explored and analyzed digital tools and resources available for abusers and how they can affect survivors. ...
... Finally, since smartphones are frequently shared between intimate partners, abusers have ample opportunities to implement tracking techniques. Since not all survivors seek help from advocates immediately after abuse [1], they try to prevent and stop IPS by themselves, with social support in the form of technology-savvy friends and family or with the assistance from online help resources [25], [23], [38], [39]. Thus, we ask the following questions: ...
... A. Abusing technology to conduct IPV Prior works [39], [23] show that abusers rely on a variety of methods to to spy on their partners. Many methods require simple interaction with survivor's smartphone user interface. ...
... Gender-based violence has been studied broadly within HCI [85]. Specifically, domestic violence (DV) or Intimate Partner Violence (IPV) has been addressed by multiple scholars from the perspectives of: the role of technology in the US IPV ecosystem [47], DV service provision and prevention [17][18][19]85], technology exploitation for abuse [45,46,76,111], agency practices addressing DV [94], designing within patriarchal systems [109], for survivors' security, privacy, and safety [13,35,58,112], and life-repair after DV [30]. Scholars have shown their concern around conventional technological and non-technological approaches that tend to burden the survivor with coping and healing while excluding abusers from the process [18,76]. ...
... The second category emphasized by our participants was the need to maintain survivors' safety. Safety here warrants being physically and digitally safe (i.e., away from technology-enabled abuse [46]) from the abuser and potential enablers of abuse, the ability to securely document, share, and report abuse, and to interact with empathetic and capable law enforcement and service providers. ...
... Participants stated the need to alert victim-survivors of their abusers' physical proximity and if there is potential technology abuse, and learn how to maintain their safety online, which aligns with prior HCI work [45,46]. An example is raised by P12: "If there's a way to set up some kind of an alarm to say (it looks like there's an added device on your system, or it looks like somebody is gathering your information). ...
Preprint
Full-text available
While domestic violence (DV) is prevalent in all socioeconomic settings, identity highly impacts how one experiences and recovers from abuse. This work examines US-based Muslim women's challenges when seeking help and healing from domestic violence. Through participatory interviews with 23 participants within the DV ecosystem, we find that victim-survivors' autonomy is compromised throughout the abuse, within their immediate communities, and when involving the criminal justice system. To address such harms, we adapt a survivor-centered transformative justice (SCTJ) approach, a framework to discern individual and systemic harm, to understand how to design alongside victim-survivors, and to focus on victim-survivors' autonomy. We explain under what conditions an SCTJ approach may be productive for designers. We use insights from our interviews to highlight intervention areas for reducing harm, repairing harm, and promoting healing for victim-survivors. Lastly, we offer guidelines to design for harm reduction, accountability, and systemic change.
... Through emails, texts, social media, and more, people reveal information to one another, to the government, or to commercial entities, making the line between private and public increasingly vague [5]. The massive flows of information, while providing numerous benefits, also fuel institutional discrimination [8], behavioral manipulation [605], harassment and abuse [167,513], and many other negative consequences. ...
... In the US, nearly 20 people per minute are physically abused by an intimate partner, which equates to more than 10 million abuse victims annually [509]. A growing body of literature on tech-enabled IPV has documented the many ways abusers maliciously use technology [165,167,215,291,292,296,305,478,585] and how IPV survivors struggle to protect their privacy and security [122,127,168,325]. The complex socio-technical and relational factors due to the intimacy of the relationship differentiate tech-enabled IPV from abuse in other contexts such as online harassment [513], doxxing [541], and cyberbullying [569]. ...
... Survivors may still share residences, parental responsibilities, and social networks with their abusers, meaning that abusers could have physical access to the survivor and their devices while possessing an intimate knowledge of the survivor's routines and preferences [168,291]. Using privacy controls to block abusers on social media or phones could escalate the abuse from online harassment to physical violence [167,168]. Stopping using specific technologies could improve the survivor's privacy but simultaneously prevents evidence collection for legal procedures [168]. ...
Thesis
As much as consumers express desires to safeguard their online privacy, they often fail to do so effectively in reality. In my dissertation, I combine qualitative, quantitative, and design methods to uncover the challenges consumers face in adopting online privacy behaviors, then develop and evaluate different context-specific approaches to encouraging adoption. By examining consumer reactions to data breaches, I find how consumers' assessment of risks and decisions to take action could be subject to bounded rationality and potential biases. My analysis of data breach notifications provides another lens for interpreting inaction: unclear risk communications and overwhelming presentations of recommended actions in these notifications introduce more barriers to action. I then turn to investigate a broader set of privacy, security, and identity theft protection practices; the findings further illuminate individual differences in adoption and how impractical advice could lead to practice abandonment. Leveraging these insights, I investigate how to help consumers adopt online privacy-protective behaviors in three studies: (1) a user-centered design process that identified icons to help consumers better find and exercise privacy controls, (2) a qualitative study with multiple stakeholders to reimagine computer security customer support for serving survivors of intimate partner violence, and (3) a longitudinal experiment to evaluate nudges that encourage consumers to change passwords after data breaches, taking inspiration from the Protection Motivation Theory. These three studies demonstrate how developing support solutions for consumers requires varying approaches to account for the specific context and population studied. My dissertation further suggests the importance of critically reflecting on when and how to encourage adoption. While inaction could be misguided sometimes, it could also result from rational cost-benefit deliberations or resignation in the face of practical constraints.
... Content moderation heavily relies on manual content assessment toward community guidelines (Seering, 2020) and on platform users who flag content they regard as violating guidelines (Crawford & Gillespie, 2016). Concerning forms of netspeak, such content moderation practices are necessary because linguistic variations or coded language are frequently used with bad intention to avoid algorithmic detection, for example, by political extremists to spread hate (Ben-David & Fernández, 2016;Bhat & Klein, 2020), to advocate controversial health information, for example, in pro-eating disorder communities (Chancellor et al., 2016), or as forms of online harassment, hate speech, and threat (Freed et al., 2018). ...
... For this, we specifically wanted to talk with TikTok users who demonstrated experience using algospeak when creating and sharing videos. We followed a qualitative research process (Flick, 2008) to analyze the creation and sharing of video content on TikTok as a way to interpret user data that emerges from everyday settings (Jensen, 2013). We first compiled a list of algospeak terms, and then used these terms to search for potential participants to ensure that we would talk to video creators who used algospeak in its intended meaning on TikTok. ...
Article
Full-text available
Social media users have long been aware of opaque content moderation systems and how they shape platform environments. On TikTok, creators increasingly utilize algospeak to circumvent unjust content restriction, meaning, they change or invent words to prevent TikTok’s content moderation algorithm from banning their video (e.g., “le$bean” for “lesbian”). We interviewed 19 TikTok creators about their motivations and practices of using algospeak in relation to their experience with TikTok’s content moderation. Participants largely anticipated how TikTok’s algorithm would read their videos, and used algospeak to evade unjustified content moderation while simultaneously ensuring target audiences can still find their videos. We identify non-contextuality, randomness, inaccuracy, and bias against marginalized communities as major issues regarding freedom of expression, equality of subjects, and support for communities of interest. Using algospeak, we argue for a need to improve contextually informed content moderation to valorize marginalized and tabooed audiovisual content on social media.
... A common strategy used by perpetrators of domestic violence to assert power over their victims involves constantly tracking, stalking, and forcefully exerting control over their activities [83]. This strategy is executed by using techniques such as installing GPS trackers in the victims' vehicles and employing tracking and mirroring software on their mobile phones. ...
... On the other hand, these approaches face risks such as malicious attacks such as hacking and data sniffing. Anti-stalking Tools Detection and Intervention Identification of tracking; detection of spyware; detection of hidden devices; discovery of visual surveillance; detection of keylogging [83][84][85][86][87][88][89][90][91][92][93][94][95][96][97][98] Virtual Reality Platforms Rehabilitation and Support Education; encouragement of empathy; training of personnel; rehabilitation of survivor; creating of virtual communities [99][100][101][102] This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and content may change prior to final publication. ...
Article
Full-text available
Domestic violence is an issue of great importance that transcends socioeconomic backgrounds and cultural boundaries. It stems from factors such as power struggle, mental health issue, financial hardship, substance abuse, among others. Technology can play a vital role in not only detecting and mitigating instances of domestic violence, but also providing essential support and resources to its victims. This review paper examines the latest technological innovations in tackling domestic violence. It describes a range of technology platforms and tools, and discusses their capabilities and shortcomings. Firstly, the review methodology is given including aims and objectives of the review, search strategy, and selection of sources. Next, technological innovations in the context of domestic violence are defined. Then, the paper presents technological approaches developed to tackle domestic violence through: (i) analysis of data shared through digital platforms is presented, (ii) analysis of data captured by ambient sensors, (iii) analysis of data captured by smartphones, (iv) analysis of data captured by wearable sensors, (v) protecting online activities, (vi) preventing non-contact harassment, (vii) anti-stalking and monitoring measures, and (viii) virtual reality approaches. Next, discussions on the capabilities and applications of these technological innovations across different aspects of domestic violence are presented. The paper also addresses the challenges and limitations associated with these innovations, and gives future directions and recommendations for further research and development.
... The use of digital technologies in violating and abusing intimate (ex-) partners-DIPV-has been well studied in prior work on IPV (Al-Alosi, 2017;Douglas et al., 2019;Dragiewicz et al., 2018;Duerksen & Woodin, 2019;Freed et al., 2017Freed et al., , 2018Freed et al., , 2019Gámez-Guadix et al., 2018;Henry et al., 2020;Mathews et al., 2017;Taylor & Xia, 2018). Much of that work has been mainly directed to personal, domestic, and social life, less to the challenges for business and workplaces. ...
... It is difficult to be precise regarding DIPV prevalence rates (Hall & Hearn, 2017); however, we know that common features of abusive behaviour such as stalking and harassment (Freed et al., 2018;Lenhart et al., 2016) are increasingly enacted via digital technologies (Harris & Woodlock, 2019). A survey of 442 frontline Australian domestic violence (DV) practitioners on perpetrators' use of technology found a 28% increase in text messaging 2015-2020, 183% increase in video camera use, and 131% increase in global positioning system (GPS) tracking device use (Woodlock et al., 2020, p. 2). ...
Article
Full-text available
In recent decades, huge technological changes have opened up possibilities and potentials for new socio-technological forms of violence, violation and abuse, themselves intersectionally gendered, that form part of and extend offline intimate partner violence (IPV). Digital IPV (DIPV)-the use of digital technologies in and for IPV-takes many forms, including: cyber-stalking, internet-based abuse, non-consensual intimate imagery, and reputation abuse. IPV is thus now in part digital, and digital and non-digital violence may merge and reinforce each other. At the same time, technological and other developments have wrought significant changes in the nature of work, such as the blurring of work/life boundaries and routine use of digital technologies. Building on feminist theory and research on violence, and previous research on the ethics of digitalisation, this paper examines the ethical challenges raised for business, workplaces, employers and management by digital IPV. This includes the ethical challenges arising from the complexity and variability of DIPV across work contexts, its harmful impacts on employees, productivity, and security, and the prospects for proactive ethical responses in workplace policy and practice for victim/survivors, perpetrators, colleagues, managers, and stakeholders. The paper concludes with contributions made and key issues for the future research agenda.
... In these cases, the spyware program sends the installer regular email reports with information on their partner's computer activities. Furthermore, instead of or in addition to installing spyware on their partner's computer, some partners create a second purpose ("dual-use"; Freed et al., 2018) for legitimate smartphone applications such as "Find My Friends" apps to spy on their partner's activities (Freed et al., 2018). ...
... In these cases, the spyware program sends the installer regular email reports with information on their partner's computer activities. Furthermore, instead of or in addition to installing spyware on their partner's computer, some partners create a second purpose ("dual-use"; Freed et al., 2018) for legitimate smartphone applications such as "Find My Friends" apps to spy on their partner's activities (Freed et al., 2018). ...
... The risks of technology-facilitated abuse can consequently be severe, with online harassment having been linked to increased rates of victim homicide and suicide [7,[12][13]. Furthermore, the use of electronic surveillance and Global Positioning System-tools (GPS; e.g., in vehicles and baby monitors) has been shown to compromise victim's safety when accessing support services [7,[14][15]. ...
... Yet, while these tools are advertised for their proposed safety and convenience, they are also providing new avenues for violence and domestic abuse [6,12,14]. Voice controlled assistants, smart light bulbs, and video-capturing doorbells have all been manipulated for the purpose of monitoring and controlling the communication and behavior of abuse victims [6,9,15]. Riley reports the dangers of Internet-connected locks (by restricting movement within the home), the use of smart thermostats to abuse partners (by imposing extremes of temperature) and the harm caused by smart speakers (by blasting loud noise in the night) [6,14]. ...
Article
Full-text available
Safeguarding vulnerable patients is a key responsibility of healthcare professionals. Yet, existing clinical and patient management protocols are outdated as they do not address the emerging threats of technology-facilitated abuse. The latter describes the misuse of digital systems such as smartphones or other Internet-connected devices to monitor, control and intimidate individuals. The lack of attention given to how technology-facilitated abuse may affect patients in their lives, can result in clinicians failing to protect vulnerable patients and may affect their care in several unexpected ways. We attempt to address this gap by evaluating the literature that is available to healthcare practitioners working with patients impacted by digitally enabled forms of harm. A literature search was carried out between September 2021 and January 2022, in which three academic databases were probed using strings of relevant search terms, returning a total of 59 articles for full text review. The articles were appraised according to three criteria: (a) the focus on technology-facilitated abuse; (b) the relevance to clinical settings; and (c) the role of healthcare practitioners in safeguarding. Of the 59 articles, 17 articles met at least one criterion and only one article met all three criteria. We drew additional information from the grey literature to identify areas for improvement in medical settings and at-risk patient groups. Technology-facilitated abuse concerns healthcare professionals from the point of consultation to the point of discharge, as a result clinicians need to be equipped with the tools to identify and address these harms at any stage of the patient’s journey. In this article, we offer recommendations for further research within different medical subspecialities and highlight areas requiring policy development in clinical environments.
... When [71], cyberstalking [72], [73], excessive parental control [74]- [76], voyeurism [77], [78], and bugging [77], [78]. In previous studies, privacy abuse has been researched in cooperation with professional organizations by means of closed questionnaires and interviews [68], [70], [71]. Surprisingly, we found a non-negligible number of questions on privacy abuse posted on the open Q&A site. ...
Article
Although security and privacy technologies are incorporated into every device and service, the complexity of these concepts confuses non-expert users. Prior research has shown that non-expert users ask strangers for advice about digital media use online. In this study, to clarify the security and privacy concerns of non-expert users in their daily lives, we investigated security- and privacy-related question posts on a Question-and-Answer (Q&A) site for non-expert users. We conducted a thematic analysis of 445 question posts. We identified seven themes among the questions and found that users asked about cyberattacks the most, followed by authentication and security software. We also found that there was a strong demand for answers, especially for questions related to privacy abuse and account/device management. Our findings provide key insights into what non-experts are struggling with when it comes to privacy and security and will help service providers and researchers make improvements to address these concerns.
... This runs counter to fears (particularly in the news 3 ) that the adoption of voice assistants could destabilise the social order of the home e.g. by answering requests by children that would be considered rude if posed to a person. There is a risk, however, that already problematic power imbalances could be exacerbated by VAs, especially when devices are not controlled by the people that use them (e.g. in intimate partner violence and surveillance in offices, student halls, rental accommodation, etc. [50,75,125,129]). ...
Conference Paper
Full-text available
Since Siri’s release in 2011 there have been a growing number of AI-driven domestic voice assistants that are increasingly being integrated into devices such as smartphones and TVs. But as their presence has expanded, a range of ethical concerns have been identified around the use of voice assistants, such as the privacy implications of having devices that are always listening and the ways that these devices are integrated into the existing social order of the home. This has created a burgeoning area of research across a range of fields including computer science, social science, and psychology. This paper takes stock of the foundations and frontiers of this work through a systematic literature review of 117 papers on ethical concerns with voice assistants. In addition to analysis of nine specific areas of concern, the review measures the distribution of methods and participant demographics across the literature. We show how some concerns, such as privacy, are operationalized to a much greater extent than others like accessibility, and how study participants are overwhelmingly drawn from a small handful of Western nations. In so doing we hope to provide an outline of the rich tapestry of work around these concerns and highlight areas where current research efforts are lacking
... For instance, individuals in abusive and coercive relationships, refugees, or political activists have nuanced privacy and information control needs [3,30]. While a monitoring app may be supportive in certain settings, such as healthcare, it can become a means of oppression for these user groups [7,15]. EP also recognises that the design of privacy mechanisms, lack of transparency, accessibility or accountability in how data is utilised, often leads to distrust and disenfranchisement. ...
Preprint
Full-text available
Ensuring equitable privacy experiences remains a challenge, especially for marginalised and vulnerable populations (MVPs) who often hesitate to participate or use digital services due to concerns about the privacy of their sensitive information. In response, security research has emphasised the importance of inclusive security and privacy practices to facilitate meaningful engagement of MVPs online. However, research in this area is still in its early stages, with other MVPs yet to be considered (such as low-income groups, and refugees), novel engagement methods yet to be explored, and limited support for software developers in building applications and services for MVPs. In 2022, we initiated a UK Research Council funded Equitable Privacy project to address these gaps. Our goal is to prioritise the privacy needs and requirements of MVPs in the design and development of software applications and services. We design and implement a new participatory research approach -- community studybeds -- in collaboration with third-sector organisations that support MVPs to identify and tackle the challenges these groups encounter. In this paper, we share the initial reflections and experiences of the Equitable Privacy project, particularly emphasising the utilisation of our community studybeds.
... We use the term vulnerable identities to refer to those with one or more facets that put them at increased risk for privacy-related harm. These facets might include minority status, low socio-economic status [62,78], sexual identity or gender [13,32,42,53,75,82], a history of houselessness [58,96] or domestic abuse [36,64], undocumented immigration status [44], a criminal record [92] or stigmatized illnesses like HIV [91] as well as the very young [6,95] and very old [50] and those who are disabled and depend on assistive technologies [46,93]. In addition to privacy vulnerabilities, we find that librarians also consider the discriminations of low-income, black and brown, immigrant, houseless, and LGBTQ communities by police [5, 31, 81? ], the government [30], and online [48,73,86]. ...
Article
Full-text available
This qualitative study examines the privacy challenges perceived by librarians who afford access to physical and electronic spaces and are in a unique position of safeguarding the privacy of their patrons. As internet “service providers,” librarians represent a bridge between the physical and internet world, and thus offer a unique sight line to the convergence of privacy, identity, and social disadvantage. Drawing on interviews with 16 librarians, we describe how they often interpret or define their own rules when it comes to privacy to protect patrons who face challenges that stem from structures of inequality outside their walls. We adopt the term “intersectional thinking” to describe how librarians reported thinking about privacy solutions, which is focused on identity and threats of structural discrimination (the rules, norms, and other determinants of discrimination embedded in institutions and other societal structures that present barriers to certain groups or individuals), and we examine the role that low/no-tech strategies play in ameliorating these threats. We then discuss how librarians act as "privacy intermediaries" for patrons, the potential analogue for this role for developers of systems, the power of low/no-tech strategies, and implications for design and research of privacy-enhancing technologies (PETs).
... For Scenario B, we sought a scenario related to stolen data but with content that, by itself, is more sensitive than usernames and passwords. We explored numerous possibilities, including (for example) scenarios related to data from victims of intimate partner violence (motivated by, e.g., [13,42] from within the security community and earlier works in adjacent areas, e.g., [30,31,61]), scenarios related to face recognition systems created from scraping "public" images (motivated by, e.g., [26,75]), and scenarios related to stolen data about activists during a revolution (motivated by, e.g., [18]). Motivated in part by past computer security research on biases and vulnerabilities remote proctoring software [11] as well past concerns about biases in job-applicant matching systems, e.g., [92], we chose to focus on an AI job-applicant matching system: a system for which job applicants might submit an extensive amount of private information. ...
Preprint
The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to be "morally good" or at least "morally allowed / acceptable". Among philosophy's contributions are (1) frameworks for evaluating the morality of actions -- including the well-established consequentialist and deontological frameworks -- and (2) scenarios (like trolley problems) featuring moral dilemmas that can facilitate discussion about and intellectual inquiry into different perspectives on moral reasoning and decision-making. In a classic trolley problem, consequentialist and deontological analyses may render different opinions. In this research, we explicitly make and explore connections between moral questions in computer security research and ethics / moral philosophy through the creation and analysis of trolley problem-like computer security-themed moral dilemmas and, in doing so, we seek to contribute to conversations among security researchers about the morality of security research-related decisions. We explicitly do not seek to define what is morally right or wrong, nor do we argue for one framework over another. Indeed, the consequentialist and deontological frameworks that we center, in addition to coming to different conclusions for our scenarios, have significant limitations. Instead, by offering our scenarios and by comparing two different approaches to ethics, we strive to contribute to how the computer security research field considers and converses about ethical questions, especially when there are different perspectives on what is morally right or acceptable.
... Attacks are more likely to be perpetuated by privileged groups such as men with a greater social dominance orientation [77]. Attacks may also narrowly target at-risk users in an attempt to silence voices-such as journalists, gamers, and creators [18,47,76,80]-or coerce and control individuals as in intimate partner abuse [28,29,50]. The broad reach of online hate and harassment, and the reality that many individuals are unaware of the risks until they experience an attack, underscores the need to provide generally applicable advice for staying safe as a precursor to tailored advice. ...
Preprint
Full-text available
Online hate and harassment poses a threat to the digital safety of people globally. In light of this risk, there is a need to equip as many people as possible with advice to stay safer online. We interviewed 24 experts to understand what threats and advice internet users should prioritize to prevent or mitigate harm. As part of this, we asked experts to evaluate 45 pieces of existing hate-and-harassment-specific digital-safety advice to understand why they felt advice was viable or not. We find that experts frequently had competing perspectives for which threats and advice they would prioritize. We synthesize sources of disagreement, while also highlighting the primary threats and advice where experts concurred. Our results inform immediate efforts to protect users from online hate and harassment, as well as more expansive socio-technical efforts to establish enduring safety.
... In our vignettes, when the threat occurred in person, participants were less likely to agree that the female character should contact the police, compared with if the threat occurred over voicemail. Recent scholarship has detailed how abusers exploit digital technologies to intimidate, threaten, or stalk victims (Freed et al. 2018), but little attention has been paid to how the general public evaluates such behaviors. As abusive behaviors shift online, evidence of threats and harassment over social media also increases. ...
Article
Full-text available
Most Americans view intimate partner violence as wrong. Less is known, however, about how the general population evaluates threats from romantic partners. When do third parties support interventions such as police involvement, restraining orders, or prohibiting the abuser from owning a gun? Through a survey-based experiment, participants reacted to a separated dating relationship scenario in which three elements were manipulated: the race of the couple, the medium of communication between the perpetrator and the victim, and whether the male character referenced a gun. Using a structural equation model, the authors find that the inclusion of a gun dramatically increases concern, which in turn fosters support for interventions. However, participants’ race and gender and the race of the couple shape these effects. When the victims in the separated dating scenario are Black, participants were less likely to call for the abuser to be prohibited from owning a gun, even when they have expressed concern about the situation. This suggests that although a gun has a clear and strong effect, racial and gender effects are more complex.
... In the context of a person with a history of trauma, technology might create triggers, and feelings of powerlessness especially in situations that are unexpected. Evidence suggests that those suffering from intimate partner violence (which is often viewed as a traumatizing experience) may be at risk of being re-traumatized through the technology, for example, being monitored or harassed [30]. ...
Conference Paper
Full-text available
Trauma-informed design is an important yet challenging area due to required expertise for careful engagement with the vulnerable and traumatized person, particularly with children. While technologies have the potential to generate value for the person with experience of trauma, the risk of exposing them to additional trauma due to research and design has ethical implications. We explore this space by engaging with therapists and social workers as dyads of proxies for parents and children with a history of trauma. We conducted a study as a participatory workshop with proxies to understand how technology could support parents in coaching social-emotional learning during episodes of high intensity emotion and difficult behavior by the child. Our findings identified design qualities to embed in SEL technology, and three roles that parents can play in implementing SEL strategies at home. We contribute a set of seven methodological guidelines for dyadic trauma-informed participatory design with proxies.
... 41% of Americans and 40% of those globally have reported experiencing bullying or harassment online [32,109]. Online toxicity takes many forms including intimate partner violence, sexual harassment, doxing, cyberstalking, coordinated bullying, political incivility, and account takeovers [40,41,78,109]. Toxic comments, in particular, are one of the most common forms of hate and harassment online [109]. Similar to our definition (Section 2.1), Vargo et al. [114] describe toxic comments as those that utilize "extremely vulgar, abusive, or hurtful language". ...
Preprint
How do users and communities respond to news from unreliable sources? How does news from these sources change online conversations? In this work, we examine the role of misinformation in sparking political incivility and toxicity on the social media platform Reddit. Utilizing the Google Jigsaw Perspective API to identify toxicity, hate speech, and other forms of incivility, we find that Reddit comments posted in response to misinformation articles are 71.4% more likely to be toxic than comments responding to authentic news articles. Identifying specific instances of commenters' incivility and utilizing an exponential random graph model, we then show that when reacting to a misinformation story, Reddit users are more likely to be toxic to users of different political beliefs than in other settings. Finally, utilizing a zero-inflated negative binomial regression, we identify that as the toxicity of subreddits increases, users are more likely to comment on misinformation-related Reddit submissions.
... The approach elaborated a theory combining feminist, legal, and HCI literature. Related research discussed strategies for implementing legal requirements in the design [34] and demonstrated that a victim-centred perspective could contribute to abuse prevention and mitigation [32]. ...
Article
Full-text available
According to recent legislative initiatives, non-consensual pornography is a crime in several countries and social media providers have a duty to provide their users easy to use mechanisms to report abuses. In this paper, we analyse the state of the art of the interfaces for reporting non-consensual pornography from the victim’s perspective. Firstly, we analysed 45 content sharing platforms where aggressors might post non-consensual pornography. The analysis identified three distinct interaction styles for reporting the crime: Scriptum (a text-field where the user verbally describes the abuse), Bonam (a multilayered menu that includes a correct option), and Malam (a multilayered menu that does not include a correct option). Secondly, we conducted a within-subject study to evaluate the experience elicited by these interaction styles. Participants (N = 39) were given a scenario and asked to report six blurred images as non-consensual pornography using a medium-fidelity prototype. The results exposed complex trade-offs between clarity, efficiency, and distress among the different interaction styles. These trade-offs open foundational research directions transcending boundaries between human-computer interaction and multimedia studies and interfacing computer science research with the law.
... Also related, but orthogonal, is work focused on identifying and detecting spyware apps, both industrial reports listing such apps [18,19,92] and academic efforts to characterize and build detection algorithms for them [3,89,[93][94][95][96][97][98][99][100]. Yet another related body of work examines spyware apps' presence in different contexts such as intimate partner violence and cyberstalking [4,[101][102][103][104][105][106][107][108][109][110][111][112]. We believe our findings, particularly characterizing the data access mechanisms used by spyware, will be of use to those implementing detectors, but detection is not itself a goal of our work. ...
Article
Full-text available
Consumer mobile spyware apps covertly monitor a user's activities (i.e., text messages, phone calls, e-mail, location, etc.) and transmit that information over the Internet to support remote surveillance. Unlike conceptually similar apps used for state espionage, so-called "stalkerware" apps are mass-marketed to consumers on a retail basis and expose a far broader range of victims to invasive monitoring. Today the market for such apps is large enough to support dozens of competitors, with individual vendors reportedly monitoring hundreds of thousands of phones. However, while the research community is well aware of the existence of such apps, our understanding of the mechanisms they use to operate remains ad hoc. In this work, we perform an in-depth technical analysis of 14 distinct leading mobile spyware apps targeting Android phones. We document the range of mechanisms used to monitor user activity of various kinds (e.g., photos, text messages, live microphone access) — primarily through the creative abuse of Android APIs. We also discover previously undocumented methods these apps use to hide from detection and to achieve persistence. Additionally, we document the measures taken by each app to protect the privacy of the sensitive data they collect, identifying a range of failings on the part of spyware vendors (including privacy-sensitive data sent in the clear or stored in the cloud with little or no protection).
... At the same time, research participants may be lenient with research-purpose data collection because they may be acquainted with the researchers or have commitments to assist with the academic work that the research is part of. Thus, considerable damage can potentially result from any malpractice that takes place in the application of data-enabled objects, for example, through the leakage or misuse of such data, even unintentionally [23,55,56]. Consequently, people involved in the research might experience anxiety contemplating the likelihood of such events [57], rightfully attributed to the presence of the data-enabled objects in the home. ...
Article
Full-text available
Increasing amounts of sensor-augmented research objects have been used in design research. We call these objects Data-Enabled Objects, which can be integrated into daily activities capturing data about people’s detailed whereabouts, behaviours and routines. These objects provide data perspectives on everyday life for contextual design research. However, data-enabled objects are still computational devices with limited privacy awareness and nuanced data sharing. To better design data-enabled objects, we explore privacy design spaces by inviting 18 teams of undergraduate design students to re-design the same type of sensor-enabled home research camera. We developed the Connected Peekaboo Toolkit (CPT) to support the design teams in designing, building, and directly deploying their prototypes in real home studies. We conducted Thematic Analysis to analyse their outcomes which led us to interpret that privacy is not just an obstacle but can be a driver by unfolding an exploration of possible design spaces for data-enabled objects.
... At the same time, research participants may be lenient with researchpurpose data collection because they may be acquainted with the researchers or have commitments to assist with the academic work that the research is part of. Thus, considerable damage can potentially result from any malpractice that takes place in the application of data-enabled objects, for example, through the leakage or misuse of such data, even unintentionally [23,55,56]. Consequently, people involved in the research might experience anxiety contemplating the likelihood of such events [57], rightfully attributed to the presence of the data-enabled objects in the home. ...
Preprint
Full-text available
Increasing amounts of sensor-augmented research objects have been used in design research. We call these objects Data-Enabled Objects, which can be integrated into daily activities capturing data about people's detailed whereabouts, behaviours and routines. These objects provide data perspectives on everyday life for contextual design research. However, data-enabled objects are still computational devices with limited privacy awareness and nuanced data sharing. To better design data-enabled objects, we explore privacy design spaces by inviting 18 teams of undergraduate design students to re-design the same type of sensor-enabled home research camera. We developed the Connected Peekaboo Toolkit (CPT) to support the design teams in designing, building, and directly deploying their prototypes in real home studies. We conducted Thematic Analysis to analyse their outcomes which led us to interpret that privacy is not just an obstacle but can be a driver by unfolding an exploration of possible design spaces for data-enabled objects.
... Technology-facilitated abuse, so-called "tech abuse", encompasses the ways in which technologies can be exploited to harass or control individuals [1] [2]. These include unwanted (sexual) attention, speech acts that cause fear and intimidation, imagebased violations, and physical offenses [3]. ...
Article
The COVID-19 pandemic highlighted the harm reduction potential of virtual sex work (VSW) such as video or audio calls with clients. VSW limits exposure to COVID-19 and STIs. However, sex workers using digital technologies face high risks of technology-facilitated intimate partner violence (IPV), such as non-consensual distribution of intimate images. This study explored perceived risks and benefits of VSW, including the salience of STI harm reduction. Ethnographic interviews and participant observation with self-identified cis women sex workers in Dakar between January 2018 and August 2019 informed a further period of focused data collection in June 2022, in which two key research participants and the author devised a goal of concrete community benefit: a list of contextually relevant digital privacy precautions and resources. Brainstorming this list during workshops with 18 sex workers provided prompts for participant perspectives. While participants generally preferred VSW, citing STI prevention as a key reason, most resumed in-person sex work after COVID-19 curfews lifted; social risks of digital privacy breach and potential outing outweighed physical risks of contracting STIs. Participants proposed privacy features for mobile applications to make VSW viable and benefit from STI prevention. Their reflections call on tech companies to embed values of informed consent and privacy into platform design, shifting the burden of protecting privacy from individuals to companies. This study addresses a gap in technology-facilitated IPV research, which has concentrated on Euro-American contexts. Participant perspectives can inform action in technology policy sectors to advance criminalised communities' rights to sexual health, privacy, and autonomy.
Conference Paper
A number of technology companies have introduced personal item tracking devices to allow people to locate and keep track of items such as keys and phones. However, these devices are not always used for their intended purpose: they have been used in cases of domestic abuse and stalking to track others without their consent. In response, manufacturers introduced a range of anti-stalking features designed to detect and mitigate misuse of their products. In this paper, we explore common implementations of these anti-stalking features and analyse their limitations. In other research, we identified that very few people use anti-stalking features, even when they know that someone might be tracking them and are incentivised to evade them. In this paper, we additionally identify several failures of the features that prevent them from performing their intended purpose even if they were in use. It is impossible for anti-stalking features to identify the difference between ‘bad’ tracking and ‘good’ tracking. Furthermore, some features work on some types of phones for some types of tracking devices, but not all work on all phones for all trackers. Some anti-stalking features are not enabled by default, and some require manual intervention to scan for devices. We provide suggestions for how these features could be improved, as well as ideas for additional anti-stalking features that could help mitigate the issues discussed in this paper.
Chapter
Full-text available
A variety of methods and techniques are used in usable privacy and security (UPS) to study users’ experiences and behaviors. When applying empirical methods, researchers in UPS face specific challenges, for instance, to represent risk to research participants. This chapter provides an overview of the empirical research methods used in UPS and highlights associated opportunities and challenges. This chapter also draws attention to important ethical considerations in UPS research with human participants and highlights possible biases in study design.
Chapter
This chapter introduces readers to the role of technology in facilitating and enhancing stalking and coercive and controlling practices. By way of introduction, the chapter details how a growing range of internet enabled digital devices have facilitated greater interconnectivity that transcends physical boundaries. Discussion develops to explore the ways in which young people engage with information and communication technologies and how this enhances the capabilities of individuals to engage in, and be a victim of, stalking and coercive and controlling behaviours. Drawing on studies centred on survivor and practitioner testimony, the chapter illustrates how the unique characteristics of information communication can be weaponised. Discussion develops to critically consider the implications of technology facilitated stalking and coercive and controlling behaviour for policy and practice. Legal, technological and educational responses to prevent and mitigate harm are given consideration, as is the role of state agencies, private organisations and citizenry.KeywordsStalkingCoercive controlCyber stalkingICT facilitated abuseImage based abuseSurveillanceVictims and survivors
Article
The phenomenon of the non-consensual distribution of intimate or sexually explicit digital images of adults, a.k.a. non-consensual pornography (NCP) or revenge pornography is under the spotlight for the toll is taking on society. Law enforcement statistics confirm a dramatic global rise in abuses. For this reason, the research community is investigating different strategies to fight and mitigate the abuses and their effects. Since the phenomenon involves different aspects of personal and social interaction among users of social media and content sharing platforms, in the literature it is addressed under different academic disciplines. However, while most of the literature reviews focus on non-consensual pornography either from a social science or psychological perspective, to the best of our knowledge a systematic review of the research on the technical aspects of the problem is still missing. In this work, we present a Systematic Mapping Study (SMS) of the literature, looking at this interdisciplinary phenomenon through a technical lens. Therefore, we focus on the cyber side of the crime of non-consensual pornography with the aim of describing the state-of-the-art and the future lines of research from a technical and quantitative perspective.
Conference Paper
Full-text available
A myriad of security challenges has accompanied the rapid proliferation of internet-of-things (IoT) smart-home devices. While smart-home security cameras, locks, digital speakers , and thermostats offer the promise of security, their naive implementations often introduce vulnerability into our digitally connected lives. We argue that the consumer demand for inexpensive IoT has led to a supply of grossly insecure devices. To examine this hypothesis, we examine the security of five inexpensive IoT devices from three separate vendors. In all five devices, our work uncovers immature software security efforts. Our findings discover new vulnerabilities, document legacy vulnerabilities due to software bill of materials (SBOM) issues, explore security mitigations in firmware, and examine the unsecured communication within the ecosystems of the devices. Our analysis discusses the root causes of these vulnerabilities. While these results indicate a snapshot of an immature and naive state of IoT software, there are several software development lifecycle processes that vendors can immediately implement to overcome the root causes of these vulnerabilities. Index Terms-internet of things, security and privacy, secure software development
Article
Now that the protections of Roe v. Wade are no longer available throughout the United States, the free flow of personal data can be used by legal authorities to provide evidence of felony. However, we know little about how impacted individuals approach their reproductive privacy in this new landscape. We conducted interviews with 15 individuals who may get/were pregnant to address this gap. While nearly all reported deleting period tracking apps, they were not willing to go much further, even while acknowledging the risks of generating data. Quite a few considered a more inhospitable, Handmaid's Tale like climate in which their medical history and movements would put them in legal peril but felt that, by definition, this reality was insuperable, and also that they were not the target—the notion that privileged location, stage of life did not make them the focus of government or vigilante efforts. We also found that certain individuals (often younger and/or with reproductive risks) were more attuned to the need to modify their technology or equipped to employ high and low-tech strategies. Using an intersectional lens, we discuss implications for media advocacy and propose privacy intermediation to frame our thinking about reproductive privacy.
Preprint
Full-text available
An app user can access information of other users or third parties. We define rogue mobile apps as those that enable a user (abuser) to access information of another user or third party (victim), in a way that violates the victim's privacy expectations. Such apps are dual-use and their identification is nontrivial. We propose iRogue, an approach for identifying rogue apps based on their reviews, posted by victims, abusers, and others. iRogue involves training on deep learning features extracted from their 1,884 manually labeled reviews. iRogue first identifies how alarming a review is with respect to rogue behavior and, second, generates a rogue score for an app. iRogue predicts 100 rogue apps from a seed dataset curated following a previous study. Also, iRogue examines apps in other datasets of scraped reviews, and predicts an additional 139 rogue apps. On labeled ground truth, iRogue achieves the highest recall, and outperforms baseline approaches that leverage app descriptions and reviews. A qualitative analysis of alarming reviews reveals rogue functionalities. App users, platforms, and developers should be aware of such apps and their functionalities and take measures to curb privacy risk.
Article
Properties of practices in industrial use are rarely studied. Security workers satisfice, selecting a tool that’s “good enough,” and in practice, that turns out to be nothing at all. This article advocates valuing lightweight methods and presents studies and evaluation criteria for such tools.
Preprint
Full-text available
Engineering techniques to address the endless parade of security issues are an important area of research. Properties of practices in industrial use are rarely studied. Security workers satisfice. There is a widespread perception that security work must be cumbersome, and thus there's no value to assessing levels of effort. This is complemented by a belief that the nth day of work will produce value equal to the first. These perceptions impact both practice and research. This paper expands the acceptable paradigms for security analysis to include the fast, cheap and good enough. "Nothing" is often enough for industry. This paper makes a case for valuing lightweight ("fast and cheap") methods, presents a set of case studies and evaluation criteria for such tools, including card decks and role playing games.
Chapter
This chapter looks at the normative and applied ethical standpoint and application of real-world technology challenges, with regard to Big Data (BD) and Artificial Intelligence (AI) domains and use-cases. In particular, how ethical technology design and utility can aid government policy makers, senior-management, software developers, and academic researchers in the quest for new knowledge and effective solutions. We discuss how biases are introduced by design in the workplace through technology and policy decision-making, how legal protections can become ambiguous through lack of definition, thus enhancing cyber-criminality, and demonstrate weakness in how the General Data Protection Regulations (GDPR) may adapt in light of new social phenomena and cultural change. We then propose legal applications with technical solutions that benefit societies in the addressing of core social operational/organisational themes and objectives, such as equality, diversity, gender pay-gap, racism, and the encouragement in the recruitment of women. This is undertaken from a combination of BD and AI ethical application perspectives, with a set of amalgamated criteria, the findings of which help identify factors for utilising in the design of a more ethically sound User Interface (UI). Three additional key socially controversial use-cases are presented (i.e., cyberstalking, sharenting, and, recruitment bias) and assessed alongside the set criteria to highlight current techno-social challenges, metrics, and applications that augment swift action in the mitigation of individual user risk. Thus, an ethically based UI Data Pipeline (VDaaS) is proposed in ensuring ethical, legal, technical objectives, and operations are met from a user perspective.KeywordsEthicsAIBig DataGDPRBiasPrivacy
Article
The design of social matching and dating apps has changed continually through the years, marked notably by a shift to mobile devices, and yet user safety has not historically been a driver of design despite mounting evidence of sexual and other harms. This paper presents a participatory design study with women-a demographic at disproportionate risk of harm through app-use-about how mobile social matching apps could be designed to foreground their safety. Findings indicate that participants want social matching apps to augment women's abilities for self-protection, reflected in three new app roles: 1) the cloaking device, through which the social matching app helps women dynamically manage visibility to geographically nearby users, 2) the informant, through which the app helps women predict risk of harm associated with a recommended social opportunity, and 3) the guardian, through which the app monitors a user's safety during face-to-face meetings and augments their response to risk.
Article
Increasing attention has been placed to the societal downsides of social media, and appropriately so. Less attention has been paid to the qualities to which social media should aspire. We contend that this is critically important. Not only must social media, and social media scholars, identify and reduce negative outcomes, but we must also critically engage with what is desirable. The purpose of this theoretical essay is to propose a normative framework for digital public spaces. We lay out four categories, and 14 sub-categories, of normative ideals to which social media could aspire. It is our hope that chronicling these qualities will allow scholars to more critically reflect on their normative assumptions when they research social media and will encourage practitioners to think about how social media could be built with these ideals in mind.
Conference Paper
Full-text available
The popularity, availability, and ubiquity of information and communication technologies create new opportunities for online harassment. The present study evaluates factors associated with young adult women's online harassment experiences through a multi-factor measure accounting for the frequency and severity of negative events. Findings from a survey of 659 undergraduate and graduate students highlight the relationship between harassment, well-being, and engagement in strategies to manage one's online identity. We further identify differences in harassment experiences across three popular social media platforms: Facebook, Twitter, and Instagram. We conclude by discussing this study's contribution to feminist theory and describing five potential design interventions derived from our data that may minimize these negative experiences, mitigate the psychological harm they cause, and provide women with more proactive ways to regain agency when using communication technologies.
Article
Full-text available
Objectives Approaches to measuring intimate partner violence (IPV) in populations often privilege physical violence, with poor assessment of other experiences. This has led to underestimating the scope and impact of IPV. The aim of this study was to develop a brief, reliable and valid self-report measure of IPV that adequately captures its complexity. Design Mixed-methods instrument development and psychometric testing to evolve a brief version of the Composite Abuse Scale (CAS) using secondary data analysis and expert feedback. Setting Data from 5 Canadian IPV studies; feedback from international IPV experts. Participants 31 international IPV experts including academic researchers, service providers and policy actors rated CAS items via an online survey. Pooled data from 6278 adult Canadian women were used for scale development. Primary/secondary outcome measures Scale reliability and validity; robustness of subscales assessing different IPV experiences. Results A 15-item version of the CAS has been developed (Composite Abuse Scale (Revised)—Short Form, CASR-SF), including 12 items developed from the original CAS and 3 items suggested through expert consultation and the evolving literature. Items cover 3 abuse domains: physical, sexual and psychological, with questions asked to assess lifetime, recent and current exposure, and abuse frequency. Factor loadings for the final 3-factor solution ranged from 0.81 to 0.91 for the 6 psychological abuse items, 0.63 to 0.92 for the 4 physical abuse items, and 0.85 and 0.93 for the 2 sexual abuse items. Moderate correlations were observed between the CASR-SF and measures of depression, post-traumatic stress disorder and coercive control. Internal consistency of the CASR-SF was 0.942. These reliability and validity estimates were comparable to those obtained for the original 30-item CAS. Conclusions The CASR-SF is brief self-report measure of IPV experiences among women that has demonstrated initial reliability and validity and is suitable for use in population studies or other studies. Additional validation of the 15-item scale with diverse samples is required.
Article
Full-text available
Doxing is the intentional public release onto the Internet of personal information about an individual by a third party, often with the intent to humiliate, threaten, intimidate, or punish the identified individual. In this paper I present a conceptual analysis of the practice of doxing and how it differs from other forms of privacy violation. I distinguish between three types of doxing: deanonymizing doxing, where personal information establishing the identity of a formerly anonymous individual is released; targeting doxing, that discloses personal information that reveals specific details of an individual’s circumstances that are usually private, obscure, or obfuscated; and delegitimizing doxing, which reveals intimate personal information that damages the credibility of that individual. I also describe how doxing differs from blackmail and defamation. I argue that doxing may be justified in cases where it reveals wrongdoing (such as deception), but only if the information released is necessary to reveal that such wrongdoing has occurred and if it is in the public interest to reveal such wrongdoing. Revealing additional information, such as that which allows an individual to be targeted for harassment and intimidation, is unjustified. I illustrate my discussion with the examples of the alleged identification of the creator of Bitcoin, Satoshi Nakamoto, by Newsweek magazine, the identification of the notorious Reddit user Violentacrez by the blog Gawker, and the harassment of game developer Zoe Quinn in the ‘GamerGate’ Internet campaign.
Conference Paper
Full-text available
While social media platforms enable individuals to easily communicate and share experiences, they have also emerged as a tool for cyberbullying. Teenagers represent an especially vulnerable population for negative emotional responses to cyberbullying. At the same time, attempts to mitigate or prevent cyberbullying from occurring in these networked spaces have largely failed because of the complexity and nuance with which young people bully others online. To address challenges related to designing for cyberbullying intervention and mitigation, we detail findings from participatory design work with two groups of high school students in spring 2015. Over the course of five design sessions spanning five weeks, participants shared their experiences with cyberbullying and iteratively designed potential solutions. We provide an in-depth discussion of the range of cyberbullying mitigation solutions participants designed. We focus on challenges participants' identified in designing for cyberbullying support and prevention and present a set of five potential cyberbullying mitigation solutions based on the results of the design sessions.
Article
Full-text available
The killing of a satellite-tagged male lion by a trophy hunter in Zimbabwe in July 2015 provoked an unprecedented media reaction. We analyse the global media response to the trophy hunting of the lion, nicknamed "Cecil", a study animal in a long-term project run by Oxford University's Wildlife Conservation Research Unit (WildCRU). We collaborated with a media-monitoring company to investigate the development of the media coverage spatially and temporally. Relevant articles were identified using a Boolean search for the terms Cecil AND lion in 127 languages. Stories about Cecil the Lion in the editorial media increased from approximately 15 per day to nearly 12,000 at its peak, and mentions of Cecil the Lion in social media reached 87,533 at its peak. We found that, while there were clear regional differences in the level of media saturation of the Cecil story, the patterns of the development of the coverage of this story were remarkably similar across the globe, and that there was no evidence of a lag between the social media and the editorial media. Further, all the main social media platforms appeared to react in synchrony. This story appears to have spread synchronously across media channels and geographically across the globe over the span of about two days. For lion conservation in particular, and perhaps for wildlife conservation more generally, we speculate that the atmosphere may have been changed significantly. We consider the possible reasons why this incident provoked a reaction unprecedented in the conservation sector.
Conference Paper
Full-text available
Online harassment is a continuing problem, endemic to many social media platforms and other means of web-based communications, and few means exist to analyze web content for instances of verbal violence and aggression. We are developing a scale of online aggression that can be applied to Twitter posts (tweets) and that is based on existing measures of trait aggression and cyberbullying. For the purpose of testing and validating our scale, we are relying on Mechanical Turk, an Amazon Web Service, through which we can enlist and pay workers to code our dataset of tweets. Preliminary results suggest that aggression in tweets is difficult for human coders to identify and that we have not reached consensus about what constitutes harassment online. We discuss our preliminary results and propose next steps such as scale modification and automated classifier development.
Article
Full-text available
Most mobile phones and tablets support only two access control device states: locked and unlocked. We investigated how well all or-nothing device access control meets the need of users by interviewing 20 participants who had both a smartphone and tablet. We find all-or-nothing device access control to be a remarkably poor fit with users' preferences. On both phones and tablets, participants wanted roughly half their applications to be available even when their device was locked and half protected by authentication. We also solicited participants' interest in new access control mechanisms designed specifically to facilitate device sharing. Fourteen participants out of 20 preferred these controls to existing security locks alone. Finally, we gauged participants' interest in using face and voice biometrics to authenticate to their mobile phone and tablets; participants were surprisingly receptive to biometrics, given that they were also aware of security and reliability limitations.
Article
Full-text available
Homicide is an important cause of premature mortality globally, but evidence for the magnitude of homicides by intimate partners is scarce and hampered by the large amount of missing information about the victim-offender relationship. The objective of the study was to estimate global and regional prevalence of intimate partner homicide. A systematic search of five databases (Medline, Global Health, Embase, Social Policy, and Web of Science) yielded 2167 abstracts, and resulted in the inclusion of 118 full-text articles with 1122 estimates of the prevalence of intimate partner homicide after double-blind screening. All studies were included that reported the number or proportion of women or men who were murdered by an intimate partner in a country, province, or town, using an inclusive definition of an intimate partner. Additionally, a survey of official sources of 169 countries provided a further 53 estimates. We selected one estimate per country-year using a quality assessment decision algorithm. The median prevalence of intimate partner homicide was calculated by country and region overall, and for women and men separately. Data were obtained for 66 countries. Overall 13·5% (IQR 9·2-18·2) of homicides were committed by an intimate partner, and this proportion was six times higher for female homicides than for male homicides (38·6%, 30·8-45·3, vs 6·3%, 3·1-6·3). Median percentages for all (male and female) and female intimate partner homicide were highest in high-income countries (all, 14·9%, 9·2-18·2; female homicide, 41·2%, 30·8-44·5) and in southeast Asia (18·8%, 11·3-18·8; 58·8%, 58·8-58·8). Adjustments to account for unknown victim-offender relationships generally increased the prevalence, suggesting that results presented are conservative. At least one in seven homicides globally and more than a third of female homicides are perpetrated by an intimate partner. Such violence commonly represents the culmination of a long history of abuse. Strategies to reduce homicide risk include increased investment in intimate partner violence prevention, risk assessments at different points of care, support for women experiencing intimate partner violence, and control of gun ownership for people with a history of violence. Improvements in country-level data collection and monitoring systems are also essential, because data availability and quality varied strongly across regions. WHO, Sigrid Rausing Trust, and the UK Economic and Social Research Council.
Article
Full-text available
Data from 81 countries was used to estimate global prevalence of intimate partner violence against women.
Article
Full-text available
Associations between intimate partner violence (IPV) and poor physical and mental health of women have been demonstrated in the international and national literature across numerous studies. This paper presents a review of the literature on this topic. The 75 papers included in this review cover both original research studies and those which undertook secondary analyses of primary data sources. The reviewed research papers published from 2006 to 2012 include quantitative and qualitative studies from Western and developing countries. The results show that while there is variation in prevalence of IPV across various cultural settings, IPV was associated with a range of mental health issues including depression, PTSD, anxiety, self-harm, and sleep disorders. In most studies, these effects were observed using validated measurement tools. IPV was also found to be associated with poor physical health including poor functional health, somatic disorders, chronic disorders and chronic pain, gynaecological problems, and increased risk of STIs. An increased risk of HIV was reported to be associated with a history of sexual abuse and violence. The implications of the study findings in relation to methodological issues, clinical significance, and future research direction are discussed.
Article
Full-text available
Our research seeks to understand the current usability situation of email encryption software, particularly PGP 9 in comparison to previous studies of PGP 5. We designed a pilot study to find current problems in the following areas: create a key pair, get public keys, verify public keys, encrypt an email, sign an email, decrypt an email, verify a digital signature, and save a backup of public and private keys.
Conference Paper
Full-text available
Mobile phones are becoming increasingly personalized in terms of the data they store and the types of services they provide. At the same time, field studies have reported that there are a variety of situations in which it is natural for people to share their phones with others. However, most mobile phones support a binary security model that offers all-or-nothing access to the phone. We interviewed 12 smartphone users to explore how security and data privacy concerns affected their willingness to share their mobile phones. The diversity of guest user categorizations and associated security constraints expressed by the participants suggests the need for a security model richer than today's binary model. Author Keywords Mobile phone sharing, phone privacy, phone security.
Conference Paper
Full-text available
As digital content becomes more prevalent in the home, non-technical users are increasingly interested in sharing that content with others and accessing it from multiple devices. Not much is known about how these users think about controlling access to this data. To better understand this, we conducted semi-structured, in-situ interviews with 33 users in 15 households. We found that users create ad-hoc access-control mechanisms that do not always work; that their ideal policies are complex and multi-dimensional; that a priori policy specification is often insufficient; and that people's mental models of access control and security are often misaligned with current systems. We detail these findings and present a set of associated guidelines for designing usable access-control systems for the home environment.
Conference Paper
Full-text available
Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with others. This is especially true as mobile phones are integrating features conventionally provided by other dedicated devices, from MP3 players to games consoles. Unfortunately, when we lend our phones to others, we give away complete access because existing phones assume a single user and provide little protection for private data and applications. In this work, we present xShare, a protection solution to address this problem. xShare allows phone owners to rapidly specify what they want to share and place the phone into a restricted mode where only the data and applications intended for sharing can be accessed. We first present findings from two motivational user studies based on which we provide the design requirements of xShare. We then present the design of xShare based on file-level access control. We describe the implementation of xShare on Windows Mobile and report a comprehensive usability evaluation of the implementation, including mea-surements and user studies. The evaluation demonstrates that our xShare implementation has negligible overhead for interactive phone usage, is extremely favored by mobile users, and provides robust protection against attacks by experienced Windows Mobile users and developers.
Conference Paper
Full-text available
In this paper we present Family Accounts, a new user account model for shared home computers. We conducted a study with sixteen families, eight who used individual profiles at home, and eight who shared a single profile. Our results demonstrate that Family Accounts is a good compromise between a single shared profile and individual profiles for each family member. In particular, we observed that because Family Accounts allowed individuals to switch profiles without forcing them to interrupt their tasks, family members tended to switch to their own profiles only when a task required some degree of privacy or personalization.
Article
Full-text available
Logging in by typing usernames and passwords is by far the most common way to access modern computer systems. However, such contemporary user authentication mechanisms are inappropriate in a ubiquitous computing environment, where users constantly are accessing a wide range of different devices. This paper introduces new concepts for user authentication in ubiquitous computing, such as the notion of proximity-based user authentication and silent login. The design of these new mechanisms is part of the design of a ubiquitous computing infrastructure for hospitals, which is grounded in field studies of medical work in hospitals. The paper reports from field studies of clinicians using an electronic patient record (EPR) and describes severe usability problems associated with its login procedures. The EPR’s login mechanisms do not recognize the nature of medical work as being nomadic, interrupted, and cooperative around sharing common material. The consequence is that login is circumvented and security is jeopardized.
Article
Full-text available
When counseling women experiencing intimate partner violence (IPV), healthcare providers can benefit from understanding the factors contributing to a women's motivation to change her situation. We wished to examine the various factors and situations associated with turning points and change seeking in the IPV situation. We performed qualitative analysis on data from 7 focus groups and 20 individual interviews with women (61 participants) with past and/or current histories of IPV. The turning points women identified fell into 5 major themes: (1) protecting others from the abuse/abuser; (2) increased severity/humiliation with abuse; (3) increased awareness of options/access to support and resources; (4) fatigue/recognition that the abuser was not going to change; and (5) partner betrayal/infidelity. Women experiencing IPV can identify specific factors and events constituting turning points or catalyst to change in their IPV situation. These turning points are dramatic shifts in beliefs and perceptions of themselves, their partners, and/or their situation that alter the women's willingness to tolerate the situation and motivate them to consider change. When counseling women experiencing IPV, health providers can incorporate understanding of turning points to motivate women to move forward in their process of changing their IPV situation.
Article
Full-text available
This 11-city study sought to identify risk factors for femicide in abusive relationships. Proxies of 220 intimate partner femicide victims identified from police or medical examiner records were interviewed, along with 343 abused control women. Preincident risk factors associated in multivariate analyses with increased risk of intimate partner femicide included perpetrator's access to a gun and previous threat with a weapon, perpetrator's stepchild in the home, and estrangement, especially from a controlling partner. Never living together and prior domestic violence arrest were associated with lowered risks. Significant incident factors included the victim having left for another partner and the perpetrator's use of a gun. Other significant bivariate-level risks included stalking, forced sex, and abuse during pregnancy. There are identifiable risk factors for intimate partner femicides.
Article
Digital technologies, including mobile devices, cloud computing services, and social networks, play a nuanced role in intimate partner violence (IPV) settings, including domestic abuse, stalking, and surveillance of victims by abusive partners. However, the interactions among victims of IPV, abusers, law enforcement, counselors, and others --- and the roles that digital technologies play in these interactions --- are poorly understood. We present a qualitative study that analyzes the role of digital technologies in the IPV ecosystem in New York City. Findings from semi-structured interviews with 40 IPV professionals and nine focus groups with 32 survivors of IPV reveal a complex set of socio-technical challenges that stem from the intimate nature of the relationships involved and the complexities of managing shared social circles. Both IPV professionals and survivors feel that they do not possess adequate expertise to be able to identify or cope with technology-enabled IPV, and there are currently insufficient best practices to help them deal with abuse via technology. We also reveal a number of tensions and trade-offs in negotiating technology's role in social support and legal procedures. Taken together, our findings contribute a nuanced understanding of technology's role in the IPV ecosystem and yield recommendations for HCI and technology experts interested in aiding victims of abuse.
Article
The Internet age has brought with it a slew of tools and research which allow stalkers, from ex-lovers to complete strangers, to follow a person's life in great detail without their consent. The converse side of the issue, the ability of a target to detect and track stalking behaviour, has not received nearly as much attention, with privacy and security research largely discussing other threat models. This article reviews the current literature on the subject and explores the disparity between technologies used by stalkers and technologies used against stalkers, then suggests some research avenues which may help correct this imbalance.
Conference Paper
We present a qualitative study of the digital privacy and security motivations, practices, and challenges of survivors of intimate partner abuse (IPA). This paper provides a framework for organizing survivors' technology practices and challenges into three phases: physical control, escape, and life apart. This three-phase framework combines technology practices with three phases of abuse to provide an empirically sound method for technology creators to consider how survivors of IPA can leverage new and existing technologies. Overall, our results suggest that the usability of and control over privacy and security functions should be or continue to be high priorities for technology creators seeking ways to better support survivors of IPA.
Article
We focus on an emerging trend in the context of domestic violence—the use of technology to facilitate stalking and other forms of abuse. Surveys with 152 domestic violence advocates and 46 victims show that technology—including phones, tablets, computers, and social networking websites—is commonly used in intimate partner stalking. Technology was used to create a sense of the perpetrator’s omnipresence, and to isolate, punish, and humiliate domestic violence victims. Perpetrators also threatened to share sexualized content online to humiliate victims. Technology-facilitated stalking needs to be treated as a serious offense, and effective practice, policy, and legal responses must be developed.
Conference Paper
Many technologies assume a single user will use an account or device. But account and device sharing situations (when 2+ people use a single device or account) may arise during everyday life. We present results from a multiple-methods study of device and account sharing practices among household members and their relations. Among our findings are that device and account sharing was common, and mobile phones were often shared despite being considered "personal" devices. Based on our study results, we organize sharing practices into a taxonomy of six sharing types--distinct patterns of what, why, and how people shared. We also present two themes that cut across sharing types: that (1) trust in sharees and (2) convenience highly influenced sharing practices. Based on these findings, we discuss implications for study and technology design.
Conference Paper
In our study, 68 teens spend two months reflecting on their weekly online experiences and report 207 separate risk events involving information breaches, online harassment, sexual solicitations, and exposure to explicit content. We conduct a structured, qualitative analysis to characterize the salient dimensions of their risk experiences, such as severity, level of agency, coping strategies, and whether the teens felt like the situation had been resolved. Overall, we found that teens can potentially benefit from lower risk online situations, which allow them to develop crucial interpersonal skills, such as boundary setting, conflict resolution, and empathy. We can also use the dimensions of risk described in this paper to identify potentially harmful risk trajectories before they become high-risk situations. Our end goal is to find a way to empower and protect teens so that they can benefit from online engagement.
Article
This study seeks to understand and critique the growing online trend of “revenge porn,” or the intentional embarrassment of identifiable individuals through the posting of nude images online. This posting of intimate pictures, often done out of motives of revenge for perceived relational scorn, is enhanced by the varying levels of online anonymity. Using the theoretical framework of John Dewey's pragmatism, this study both analyzes this understudied but complex new problem precipitated by the conditions of the online self and establishes the groundwork for the use of pragmatist ethics in other areas of communication ethics.
Article
Cyberbullying (harassment on social networks) is widely recognized as a serious social problem, especially for adolescents. It is as much a threat to the viability of online social networks for youth today as spam once was to email in the early days of the Internet. Current work to tackle this problem has involved social and psychological studies on its prevalence as well as its negative effects on adolescents. While true solutions rest on teaching youth to have healthy personal relationships, few have considered innovative design of social network software as a tool for mitigating this problem. Mitigating cyberbullying involves two key components: robust techniques for effective detection and reflective user interfaces that encourage users to reflect upon their behavior and their choices. Spam filters have been successful by applying statistical approaches like Bayesian networks and hidden Markov models. They can, like Google’s GMail, aggregate human spam judgments because spam is sent nearly identically to many people. Bullying is more personalized, varied, and contextual. In this work, we present an approach for bullying detection based on state-of-the-art natural language processing and a common sense knowledge base, which permits recognition over a broad spectrum of topics in everyday life. We analyze a more narrow range of particular subject matter associated with bullying (e.g. appearance, intelligence, racial and ethnic slurs, social acceptance, and rejection), and construct BullySpace, a common sense knowledge base that encodes particular knowledge about bullying situations. We then perform joint reasoning with common sense knowledge about a wide range of everyday life topics. We analyze messages using our novel AnalogySpace common sense reasoning technique. We also take into account social network analysis and other factors. We evaluate the model on real-world instances that have been reported by users on Formspring, a social networking website that is popular with teenagers. On the intervention side, we explore a set of reflective user-interaction paradigms with the goal of promoting empathy among social network participants. We propose an “air traffic control”-like dashboard, which alerts moderators to large-scale outbreaks that appear to be escalating or spreading and helps them prioritize the current deluge of user complaints. For potential victims, we provide educational material that informs them about how to cope with the situation, and connects them with emotional support from others. A user evaluation shows that in-context, targeted, and dynamic help during cyberbullying situations fosters end-user reflection that promotes better coping strategies.
Article
Data confidentiality can be effectively preserved through encryption. In certain situations, this is inadequate, as users may be coerced into disclosing their decryption keys. Steganographic techniques and deniable encryption algorithms have been devised to hide the very existence of encrypted data. We examine the feasibility and efficacy of deniable encryption for mobile devices. To address obstacles that can compromise plausibly deniable encryption (PDE) in a mobile environment, we design a system called Mobiflage. Mobiflage enables PDE on mobile devices by hiding encrypted volumes within random data in a devices free storage space. We leverage lessons learned from deniable encryption in the desktop environment, and design new countermeasures for threats specific to mobile systems. We provide two implementations for the Android OS, to assess the feasibility and performance of Mobiflage on different hardware profiles. MF-SD is designed for use on devices with FAT32 removable SD cards. Our MF-MTP variant supports devices that instead share a single internal partition for both apps and user accessible data. MF-MTP leverages certain Ext4 file system mechanisms and uses an adjusted data-block allocator. These new techniques for soring hidden volumes in Ext4 file systems can also be applied to other file systems to enable deniable encryption for desktop OSes and other mobile platforms.
Suggests the construct of learned helplessness (LH) as a psychological rationale for why battered women become victims. Published literature and the author's clinical experiences in the US and Great Britain provide material for analysis and treatment recommendations. The LH theory has 3 basic components: (a) information about what should happen (the contingency), (b) cognitive representation about the contingency, and (c) behavior. It is suggested that the sex-role socialization process may be responsible for the LH behavior seen in adult women, specifically battered women. The LH theory proposes that the only successful treatment to reverse the cognitive, emotional, and motivational deficits is to learn under which conditions responses will be effective in producing results. The existence of a 3-phase cycle of violence has been isolated from the stories of battered women: tension-building, explosion of acute battering incidents, and calm, loving respite. The phases vary in time and intensity both within the same couple and between different couples. (33 ref) (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Article
Technology has led to tremendous advancements in our society but has also brought more danger to victims of stalking and given more tools for stalkers to use. New technology has made it more difficult for prosecutors and judges to hold stalkers accountable for their crimes, and without an understanding of how technology is misused by stalkers to track and monitor their victims, many victims don't get the justice they deserve. This article addresses the tremendous impact of technology on stalking, especially within the context of intimate partner stalking.
Conference Paper
Domestic technologies have been a popular area of study for ubiquitous computing researchers, however there is relatively little recent data on how families currently use and share technologies in domestic environments. This paper presents results from an empirical study of 15 families in the U.S in early 2007. We examined the types of technologies families own, including TVs, music players, phones and computers; where they were situated within the home; and the degree of shared ownership and use. Our results call attention to the prevalence of shared usage of technology in domestic environments and also suggest opportunistic spaces for ubiquitous computing technology. While not all ubiquitous computing technologies for domestic environments will be shared, the diverse ways families chose to share their computers suggest that future devices might better match how families wish to use shared technology by supporting both the shared usage model of appliances and the ability to access a personal profile.
Conference Paper
Due to increased input and output capabilities, mobile phones hold many different kinds of (mostly private) data. The need for finer grained profiles and integrated data security on mobile phones has already been documented extensively (e.g. [1]). However, there are no appropriate concepts and implementations yet to handle and limit access to data on mobile phones. TreasurePhone has been designed to address this specific problem. It protects the users’ mobile phone data based on their current context. Privacy protection is realized by spheres, which represent the users’ context-specific need for privacy. That is, users can define which data and services are accessible in which sphere. TreasurePhone exploits context information to support authentication and automatic activation of spheres by locations and actions. We conducted a user study with 20 participants to gain insights on how well users accept such a concept. One of the main goals was to find out whether such privacy features are appreciated by the users even though they make interaction slower and might hinder fast access to specific data. Additionally, we showed that integration of context information significantly increases ease-of-use of the system.
Article
Physical violence against women is pervasive through out the world and domestic violence has been a longstanding issue in feminist activism and research. Yet, these experiences are often not represented in technological research or design. In the move to consider HCI at the margins, in this paper, we ask: how have ICTs affected the experiences of domestic violence survivors? We interviewed female survivors living in a domestic violence shelter about their experiences with technology. Participants reported that they were harassed with mobile phones, experienced additional harassment (but also support) via social networking sites, and tried to resist using their knowledge of security and privacy.
Conference Paper
Usability specialists were better than non-specialists at performing heuristic evaluation, and “double experts” with specific expertise in the kind of interface being evaluated performed even better. Major usability problems have a higher probability than minor problems of being found in a heuristic evaluation, but more minor problems are found in absolute numbers. Usability heuristics relating to exits and user errors were more difficult to apply than the rest, and additional measures should be taken to find problems relating to these heuristics. Usability problems that relate to missing interface elements that ought to be introduced were more difficult to find by heuristic evaluation in interfaces implemented as paper prototypes but were as easy as other problems to find in running systems.
Article
Intimate partner violence (IPV) screening remains controversial. Major medical organizations mandate screening, whereas the U.S. Preventive Services Task Force (USPSTF) cautions that there is insufficient evidence to recommend for or against screening. An effective IPV screening program must include a screening tool with sound psychometric properties. A systematic review was conducted to summarize IPV screening tools tested in healthcare settings, providing a discussion of existing psychometric data and an assessment of study quality. From the end of 2007 through 2008, three published literature databases were searched from their start through December 2007; this search was augmented with a bibliography search and expert consultation. Eligible studies included English-language publications describing the psychometric testing of an IPV screening tool in a healthcare setting. Study quality was judged using USPSTF criteria for diagnostic studies. Of 210 potentially eligible studies, 33 met inclusion criteria. The most studied tools were the Hurt, Insult, Threaten, and Scream (HITS, sensitivity 30%-100%, specificity 86%-99%); the Woman Abuse Screening Tool (WAST, sensitivity 47%, specificity 96%); the Partner Violence Screen (PVS, sensitivity 35%-71%, specificity 80%-94%); and the Abuse Assessment Screen (AAS, sensitivity 93%-94%, specificity 55%-99%). Internal reliability (HITS, WAST); test-retest reliability (AAS); concurrent validity (HITS, WAST); discriminant validity (WAST); and predictive validity (PVS) were also assessed. Overall study quality was fair to good. No single IPV screening tool had well-established psychometric properties. Even the most common tools were evaluated in only a small number of studies. Sensitivities and specificities varied widely within and between screening tools. Further testing and validation are critically needed.
Article
This research note describes the use of a broad range of technologies in intimate partner stalking, including cordless and cellular telephones, fax machines, e-mail, Internet-based harassment, global positioning systems, spy ware, video cameras, and online databases. The concept of "stalking with technology" is reviewed, and the need for an expanded definition of cyberstalking is presented. Legal issues and advocacy-centered responses, including training, legal remedies, public policy issues, and technology industry practices, are discussed.
Conference Paper
. Cryptographic file systems provide little protection against legal or illegal instruments that force the owner of data to release decryption keys for stored data once the presence of encrypted data on an inspected computer has been established. We are interested in how cryptographic file systems can be extended to provide additional protection for such a scenario and we have extended the standard Linux file system (Ext2fs) with a plausible-deniability encryption function. Even though it is obvious that our computer has harddisk encryption software installed and might contain some encrypted data, an inspector will not be able to determine whether we have revealed the access keys to all security levels or only those to a few selected ones. We describe the design of our freely available implementation of this steganographic file system and discuss its security and performance characteristics. 1 Introduction Various implementations of cryptographic file systems have been ma...
Article
User errors cause or contribute to most computer security failures, yet user interfaces for security still tend to be clumsy, confusing, or near-nonexistent. Is this simply due to a failure to apply standard user interface design techniques to security? We argue that, on the contrary, effective security requires a different usability standard, and that it will not be achieved through the user interface design techniques appropriate to other types of consumer software. To test this hypothesis, we performed a case study of a security program which does have a good user interface by general standards: PGP 5.0. Our case study used a cognitive walkthrough analysis together with a laboratory user test to evaluate whether PGP 5.0 can be successfully used by cryptography novices to achieve effective electronic mail security. The analysis found a number of user interface design flaws that may contribute to security failures, and the user test demonstrated that when our test participants were g...
Thematic analysis. In Encyclopedia of critical psychology
  • Victoria Clarke
  • Virginia Braun
Victoria Clarke and Virginia Braun. 2014. Thematic analysis. In Encyclopedia of critical psychology. Springer, 1947-1952.
Family accounts: a new paradigm for user accounts within the home environment
  • Serge Egelman
  • Kori M Brush
  • Inkpen
Pathways: How women leave violent men
  • Shirley Patton
Shirley Patton. 2003. Pathways: How women leave violent men. (2003).
Through a feminist lens. Current controversies in family violence
  • A Kersti
  • Yllo
  • Yllo Kersti A
Kersti A Yllo. 2005. Through a feminist lens. Current controversies in family violence (2005).
The global prevalence of intimate partner violence against women
  • M Karen
  • Joelle Yt Devries
  • Claudia Mak
  • Max Garcia-Moreno
  • Petzold
  • C James
  • Gail Child
  • Stephen Falder
  • Lim
Karen M Devries, Joelle YT Mak, Claudia Garcia-Moreno, Max Petzold, James C Child, Gail Falder, Stephen Lim, Loraine J Bacchus, Rebecca E Engell, Lisa Rosenfeld, and others. 2013. The global prevalence of intimate partner violence against women. Science 340, 6140 (2013), 1527-1528.
Cyber-stalking: the Regulation of Harassment on the Internet
  • Louise Ellison
  • Yaman Akdeniz
  • Ellison Louise
Louise Ellison and Yaman Akdeniz. 1998. Cyber-stalking: the Regulation of Harassment on the Internet. Criminal Law Review 29 (1998), 29-48.
Intimate partner violence screening tools: a systematic review
  • Jacky M Rebecca F Rabin
  • Jacquelyn C Jennings
  • Megan H Campbell
  • Bair-Merritt
Rebecca F Rabin, Jacky M Jennings, Jacquelyn C Campbell, and Megan H Bair-Merritt. 2009. Intimate partner violence screening tools: a systematic review. American journal of preventive medicine 36, 5 (2009), 439-445.
Domestic violence in the digital age: Towards the creation of a comprehensive cyberstalking statute
  • Aily Shimizu
  • Shimizu Aily
Aily Shimizu. 2013. Domestic violence in the digital age: Towards the creation of a comprehensive cyberstalking statute. Berkeley J. Gender L. & Just. 28 (2013), 116.