-
Notifications
You must be signed in to change notification settings - Fork 3
/
Copy pathreferences.bib
770 lines (693 loc) · 39.2 KB
/
references.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
@INPROCEEDINGS {ceta2020,
author = {K. A. Roundy and P. Barmaimon Mendelberg and N. Dell and D. McCoy and D. Nissani and T. Ristenpart and A. Tamersoy},
booktitle = {2020 IEEE Symposium on Security and Privacy (SP)},
title = {The Many Kinds of Creepware Used for Interpersonal Attacks},
year = {2020},
volume = {},
issn = {2375-1207},
pages = {626-643},
keywords = {creepware;stalkerware;surveillance;interpersonal-attacks;intimate-partner-violence;android;threats;spoofing;harassment;measurement-study},
doi = {10.1109/SP40000.2020.00069},
url = {http://damonmccoy.com/papers/Creepware_SP.pdf},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
month = {may}
}
@article{ceta2019_2,
author = {Freed, Diana and Havron, Sam and Tseng, Emily and Gallardo, Andrea and Chatterjee, Rahul and Ristenpart, Thomas and Dell, Nicola},
title = {“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence},
year = {2019},
issue_date = {November 2019},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {3},
number = {CSCW},
url = {https://www.havron.dev/pubs/freed-cscw19.pdf},
doi = {10.1145/3359304},
journal = {Proc. ACM Hum.-Comput. Interact.},
month = nov,
articleno = {202},
numpages = {24},
keywords = {intimate partner violence, gender-based violence, security, privacy, empirical studies in hci}
}
@inproceedings{ceta2019,
author = {Sam Havron and
Diana Freed and
Rahul Chatterjee and
Damon McCoy and
Nicola Dell and
Thomas Ristenpart},
editor = {Nadia Heninger and Patrick Traynor},
title = {Clinical Computer Security for Victims of Intimate Partner Violence},
booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
CA, USA, August 14-16, 2019},
pages = {105--122},
publisher = {{USENIX} Association},
year = {2019},
url = { https://www.havron.dev/pubs/clinicalsec.pdf}
}
@article{ceta2017,
author = {Freed, Diana and Palmer, Jackeline and Minchala, Diana and Levy, Karen and Ristenpart, Thomas and Dell, Nicola},
year = {2017},
month = {12},
pages = {1-22},
title = {Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders},
volume = {1},
journal = {Proceedings of the ACM on Human-Computer Interaction},
doi = {10.1145/3134681},
url = {http://nixdell.com/papers/a046-freed.pdf}
}
@INPROCEEDINGS{spyware_8418618,
author={R. {Chatterjee} and P. {Doerfler} and H. {Orgad} and S. {Havron} and J. {Palmer} and D. {Freed} and K. {Levy} and N. {Dell} and D. {McCoy} and T. {Ristenpart}},
booktitle={2018 IEEE Symposium on Security and Privacy (SP)},
title={The Spyware Used in Intimate Partner Violence},
year={2018},
volume={},
number={},
pages={441-458},
url = {http://nixdell.com/papers/spyware.pdf}
}
@inproceedings{stories_46080,
title = {Stories from survivors: Privacy & security practices when coping with intimate partner abuse},
author = {Tara Matthews and Kathleen O’Leary and Anna Turner and Manya Sleeper and Jill Palzkill Woelfer and Martin Shelton and Cori Manthorne and Elizabeth F. Churchill and Sunny Consolvo},
year = {2017},
URL = {https://mshelt.onl/p/matthews_et_al_2017.pdf},
pages = {2189-2201},
address = {New York, NY, USA}
}
@misc{citizenlab,
title = {The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry},
author = {Christopher Parsons and Adam Molnar and Jakub Dalek and Jeffrey Knockel and Miles Kenyon and Bennett Haselton and Cynthia Khoo and Ron Deibert},
year = {2019},
url = {https://citizenlab.ca/docs/stalkerware-holistic.pdf}
}
@misc{citizenlab_legal,
title = {Installing Fear - A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications},
author = {Cynthia Khoo and Kate Robertson and Ronald Deibert},
year = {2019},
url = {https://citizenlab.ca/docs/stalkerware-legal.pdf}
}
@article{Levy2020PrivacyTI,
title={Privacy threats in intimate relationships},
author={Karen Levy and Bruce Schneier},
journal={ArXiv},
year={2020},
volume={abs/2006.03907},
url={https://www.schneier.com/academic/paperfiles/Privacy_Threats_in_Intimate_Relationships.pdf}
}
@inproceedings{stalkers-paradise,
author = {Freed, Diana and Palmer, Jackeline and Minchala, Diana and Levy, Karen and Ristenpart, Thomas and Dell, Nicola},
year = {2018},
month = {04},
pages = {1-13},
title = {A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology},
doi = {10.1145/3173574.3174241},
booktitle = {ACM Conference on Human Factors in Computing Systems},
url = {https://rist.tech.cornell.edu/papers/stalkers-paradise-intimate.pdf}
}
@article{sensible_privacy,
author = {Arief, Budi and Coopamootoo, Kovila and Emms, Martin and van Moorsel, Aad},
year = {2014},
month = {11},
pages = {201-204},
title = {Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse},
journal = {Proceedings of the ACM Conference on Computer and Communications Security},
doi = {10.1145/2665943.2665965},
url = { https://www.cs.kent.ac.uk/people/staff/ba284/Papers/WPES2014.pdf }
}
@ARTICLE{dimond2011,
author={J. P. {Dimond} and C. {Fiesler} and A. S. {Bruckman}},
journal={Interacting with Computers},
title={Domestic violence and information communication technologies},
year={2011},
volume={23},
number={5},
pages={413-421},
url = { https://sci-hub.tw/10.1016/j.intcom.2011.04.006 }
}
@online{npr,
author = {NPR},
title = {Smartphones Are Used To Stalk, Control Domestic Abuse Victims},
year = 2014,
url = {https://www.npr.org/sections/alltechconsidered/2014/09/15/346149979/smartphones-are-used-to-stalk-control-domestic-abuse-victims},
}
@misc{avtest,
author = {AV Comparatives},
title = {Stalkerware Test 2020},
year = 2020,
url = {https://www.av-comparatives.org/wp-content/uploads/2020/06/avc_stalkerware_2020.pdf}
}
@article{fraser2010,
author = {Fraser, Cynthia and Olsen, Erica and Lee, Kaofeng and Southworth, Cindy and Tucker, Sarah},
year = {2010},
month = {11},
pages = {39 - 55},
title = {The New Age of Stalking: Technological Implications for Stalking},
volume = {61},
journal = {Juvenile and Family Court Journal},
doi = {10.1111/j.1755-6988.2010.01051.x},
url = {https://sci-hub.tw/10.1111/j.1755-6988.2010.01051.x}
}
@article{southworth2007,
author = {Southworth, Cynthia and Finn, Jerry and Dawson, Shawndell and Fraser, Cynthia and Tucker, Sarah},
year = {2007},
month = {09},
pages = {842-56},
title = {Intimate Partner Violence, Technology, and Stalking},
volume = {13},
journal = {Violence against women},
doi = {10.1177/1077801207302045}
}
@misc{smartsafe,
author = {Woodlock, Delanie},
year = {2013},
month = {01},
pages = {},
title = {Technology-facilitated stalking: findings and resources from the SmartSafe project},
doi = {10.13140/2.1.4106.9764},
url = {https://www.dvrcv.org.au/sites/default/files/SmartSafe_0.pdf}
}
@misc{bcsth,
author = { British Columbia Society of Transition Houses },
title = { Assessing Technology in the Context of Violence Against Women & Children: Examining Benefits & Risks },
year = 2013,
url = {https://bcsth.ca/wp-content/uploads/2016/10/Assessing-Technology-in-the-Context-of-Violence-Against-Women-Children.-Examining-Benefits-Risks..pdf}
}
@online{stalkerware,
author = {Vice Motherboard},
title = {Inside the 'Stalkerware' Surveillance Market, Where Ordinary People Tap Each Other's Phones},
year = 2017,
url = {https://www.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x}
}
@article{woodlock2016,
author = {Woodlock, Delanie},
year = {2016},
month = {05},
pages = {},
title = {The Abuse of Technology in Domestic Violence and Stalking},
volume = {23},
journal = {Violence Against Women},
doi = {10.1177/1077801216646277},
url = {https://sci-hub.tw/10.1177/1077801216646277}
}
@article{melton2007,
author = {Melton, Heather},
year = {2007},
month = {10},
pages = {347-363},
title = {Stalking in the Context of Intimate Partner AbuseIn the Victims' Words},
volume = {2},
journal = {Feminist Criminology - FEM CRIMINOL},
doi = {10.1177/1557085107306517},
url = {https://sci-hub.tw/10.1177/1557085107306517}
}
@article{harkin2019,
author = {Harkin, Diarmaid and Molnar, Adam and Vowles, Erica},
year = {2019},
month = {01},
pages = {174165901882056},
title = {The commodification of mobile phone surveillance: An analysis of the consumer spyware industry},
journal = {Crime, Media, Culture: An International Journal},
doi = {10.1177/1741659018820562},
url = {https://sci-hub.tw/10.1177/1741659018820562}
}
@inproceedings{sharealike2018,
author = {Park, Cheul Young and Faklaris, Cori and Zhao, Siyan and Sciuto, Alex and Dabbish, Laura and Hong, Jason},
title = {Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships},
year = {2018},
isbn = {9781931971454},
publisher = {USENIX Association},
address = {USA},
booktitle = {Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security},
pages = {83–102},
numpages = {20},
location = {Baltimore, MD, USA},
series = {SOUPS ’18},
url = {https://www.usenix.org/system/files/conference/soups2018/soups2018-park.pdf}
}
@misc{hubertine,
author = { Centre Hubertine Auclert },
title = {Rapport sur les cyber-violences conjugales},
year = 2018,
url = {https://m.centre-hubertine-auclert.fr/sites/default/files/fichiers/rapport-cyberviolences-conjugales-web.pdf},
language = {french}
}
@inproceedings{levy2015,
author = { Karen E.C. Levy },
title = { Intimate Surveillance},
booktitle = { Idaho Law Review 50 },
year = 2015,
pages = "679-93",
url = {https://www.uidaho.edu/-/media/UIdaho-Responsive/Files/law/law-review/articles/volume-51/51-3-levy-karen-ec.pdf }
}
@inproceedings {tseng2020,
author = {Emily Tseng and Rosanna Bellini and Nora McDonald and Matan Danos and Rachel Greenstadt and Damon McCoy and Nicola Dell and Thomas Ristenpart},
title = {The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums},
booktitle = {29th {USENIX} Security Symposium ({USENIX} Security 20)},
year = {2020},
isbn = {978-1-939133-17-5},
pages = {1893--1909},
url = {https://www.usenix.org/system/files/sec20-tseng.pdf},
publisher = {{USENIX} Association},
month = aug,
}
@article{leitao2019,
author = {Roxanne Leitão},
title = {Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums},
journal = {Human–Computer Interaction},
volume = {0},
number = {0},
pages = {1-40},
year = {2019},
publisher = {Taylor & Francis},
doi = {10.1080/07370024.2019.1685883},
URL = {https://scihub.to/10.1080/07370024.2019.1685883},
eprint = {https://doi.org/10.1080/07370024.2019.1685883}
}
@article{yardley2020,
author = {Elizabeth Yardley},
title ={Technology-Facilitated Domestic Abuse in Political Economy: A New Theoretical Framework},
journal = {Violence Against Women},
volume = {0},
number = {0},
pages = {1077801220947172},
year = {2020},
doi = {10.1177/1077801220947172},
note ={PMID: 32757887},
url = { https://sci-hub.st/10.1177/1077801220947172 },
eprint = { https://doi.org/10.1177/1077801220947172},
abstract = { This article presents a new theoretical framework around technology-facilitated domestic abuse (TFDA) in identifying four distinct types of omnipresent behavior. Perpetrators are increasingly drawing upon networked technologies like smartphones, social media, and GPS trackers in monitoring, controlling, and abusing survivors. There is considerable academic literature developing in response to this. While this scholarship is valuable, this article argues that TFDA must be understood as a neoliberal manifestation of patriarchal legacies of misogyny and sexism. A failure to recognize this will serve to prioritize abusers’ freedom to do harm over rights of survivors to be protected from harm. }
}
@misc{white2019,
title={Women, Domestic Violence Service Providers, and Knowledge of Technology-Related Abuse},
author={Nadine E White},
year={2019},
url = {https://scholarworks.waldenu.edu/cgi/viewcontent.cgi?article=7982&context=dissertations}
}
@article{harris2018,
author = {Harris, Bridget and Woodlock, Delanie},
year = {2018},
month = {11},
pages = {},
title = {Digital Coercive Control: Insights from Two Landmark Domestic Violence Studies},
volume = {59},
journal = {British Journal of Criminology},
doi = {10.1093/bjc/azy052},
url = {https://academic.oup.com/bjc/article/59/3/530/5172990}
}
@article{douglas2019,
author = {Douglas, Heather and Harris, Bridget and Dragiewicz, Molly},
year = {2019},
month = {04},
pages = {551-570},
title = {Technology-facilitated Domestic and Family Violence: Women’s Experiences},
volume = {59},
journal = {British Journal of Criminology},
doi = {10.1093/bjc/azy068},
url = {https://academic.oup.com/bjc/article-abstract/59/3/551/5281174}
}
@article{woodlock2020,
author = { Delanie Woodlock and Mandy McKenzie and Deborah Western and Bridget Harris },
title = {Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control},
journal = {Australian Social Work},
volume = {73},
number = {3},
pages = {368-380},
year = {2020},
publisher = {Routledge},
doi = {10.1080/0312407X.2019.1607510},
url = {https://www.tandfonline.com/doi/pdf/10.1080/0312407X.2019.1607510},
}
@incollection{harris2020,
pages = {317--336},
title = {Technology and violence against women},
publisher = {Emerald},
address = {United Kingdom},
editor = {S. Walklate and K. Fitz-Gibbon and J. McCulloch and J.M. Maher},
author = {Bridget Harris},
booktitle = {The Emerald Handbook of Feminism, Criminology and Social Change},
series = {Emerald Studies In Criminology, Feminism and Social Change},
year = {2020},
doi = {10.1108/978-1-78769-955-720201026},
abstract = {As the role and uptake of digital media, devices and other technologies increases, so has their presence in our lives. Technology has revolutionised the speed, type and extent of communication and contact between individuals and groups, transforming temporal, geographic and personal boundaries. There have undoubtedly been benefits associated with such shifts, but technologies have also exacerbated existing patterns of gendered violence and introduced new forms of intrusion, abuse and surveillance. In order to understand and combat harm and, protect and empower women, criminologists must investigate these practices. This chapter discusses how technology has transformed the enactment of violence against women.},
url = {https://eprints.qut.edu.au/202652/}
}
@inproceedings{Hand2009TheUO,
title={The Use of Information and Communication Technologies to Coerce and Control in Domestic Violence and Following Separation},
author={T. Hand and D. Chung and M. Peters},
year={2009},
url = {https://pdfs.semanticscholar.org/c4ce/8b1b3bd958da4320ee65ec5bc4f271862a86.pdf}
}
@misc{ybarra2017,
title = {Intimate Partner Digital Abuse},
author = {Michelle Ybarra and Myeshia Price-Feeney and Amanda Lenhart and Kathryn Zickuhr},
year = {2017},
url = {https://datasociety.net/pubs/oh/Intimate_Partner_Digital_Abuse_2017.pdf}
}
@article{burke2011,
author = {Burke, Sloane and Wallen, Michele and Vail-Smith, Karen and Knox, David},
year = {2011},
month = {05},
pages = {1162-1167},
title = {Using technology to control intimate partners: An exploratory study of college undergraduates},
volume = {27},
journal = {Computers in Human Behavior},
doi = {10.1016/j.chb.2010.12.010},
url = {https://sci-hub.tw/10.1016/j.chb.2010.12.010}
}
@inproceedings{parkin2019,
author = {Parkin, Simon and Patel, Trupti and Lopez-Neira, Isabel and Tanczer, Leonie},
year = {2019},
month = {09},
pages = {1-15},
title = {Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse},
doi = {10.1145/3368860.3368861},
url = {https://discovery.ucl.ac.uk/id/eprint/10083266/7/NSPW_2019-author_version.pdf}
}
@inproceedings{leitao2019_2,
author = {Leitão, Roxanne},
year = {2019},
month = {06},
pages = {527-539},
title = {Anticipating Smart Home Security and Privacy Threats with Survivors of Intimate Partner Abuse},
isbn = {978-1-4503-5850-7},
doi = {10.1145/3322276.3322366},
url = {https://sci-hub.tw/10.1145/3322276.3322366}
}
@article{lopezneira2019,
author = {Lopez-Neira, Isabel and Patel, Trupti and Parkin, Simon and Danezis, George and Tanczer, Leonie},
year = {2019},
month = {03},
pages = {},
title = {‘Internet of Things’: How Abuse is Getting Smarter},
volume = {63},
journal = {SSRN Electronic Journal},
doi = {10.2139/ssrn.3350615},
url = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3350615}
}
@inproceedings{tanczer2018,
title={Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse},
author={Leonie Tanczer and Isabel Neira and Simon Edward Parkin and Trupti N Patel and George Danezis},
year={2018},
url = {https://www.ucl.ac.uk/steapp/sites/steapp/files/giot-report.pdf}
}
@article{mcfarlane2002,
author = {Judith McFarlane and Jacquelyn Campbell and Kathy Jacquelyn},
year = {2002},
month = {04},
pages = {51 - 68},
title = {Intimate partner stalking and femicide: urgent implications for women's safety},
volume = {20},
journal = {Behavioral Sciences & the Law},
doi = {10.1002/bsl.477},
url = { https://sci-hub.st/10.1002/bsl.477 }
}
@inproceedings{bellini2020,
title={“So-called privacy breeds evil”: Narrative Justifications for Intimate Partner Surveillance in Online Forums},
author={Rosanna Bellini and Emily Tseng},
year={2020},
url = { http://damonmccoy.com/papers/IPS_CSCW.pdf }
}
@article{fox2015,
author = {Jesse Fox and Robert Tokunaga},
year = {2015},
month = {09},
pages = {491-498},
title = {Romantic Partner Monitoring After Breakups: Attachment, Dependence, Distress, and Post-Dissolution Online Surveillance via Social Networking Sites},
volume = {18},
journal = {Cyberpsychology, Behavior, and Social Networking},
doi = {10.1089/cyber.2015.0123},
url = {https://www.researchgate.net/profile/Jesse_Fox3/publication/281113727_Romantic_Partner_Monitoring_After_Breakups_Attachment_Dependence_Distress_and_Post-Dissolution_Online_Surveillance_via_Social_Networking_Sites/links/580e760108ae51b863966f8f/Romantic-Partner-Monitoring-After-Breakups-Attachment-Dependence-Distress-and-Post-Dissolution-Online-Surveillance-via-Social-Networking-Sites.pdf}
}
@article{alalosi2018,
author = {al-alosi, Hadeel},
year = {2018},
month = {11},
pages = {},
title = {Cyber-Violence: Digital Abuse in the Context of Domestic Violence},
url = { https://www.researchgate.net/profile/Hadeel_Al-Alosi/publication/328813010_Cyber-Violence_Digital_Abuse_in_the_Context_of_Domestic_Violence/links/5be4c477299bf1124fc41c6a/Cyber-Violence-Digital-Abuse-in-the-Context-of-Domestic-Violence.pdf }
}
@article{uganda2018,
author = {Wougnet and APC and Sida},
year = {2018},
title = {Technology Related Violence Aganst Women - Investigating Tech Related Violence Against Women in Peri-Urban Areas of Uganda },
url = { https://www.apc.org/sites/default/files/Research_Report_on_Tech_Related_VAW_2018.pdf }
}
@article{tseng2021,
author = {Freed, Diana and Tseng, Emily and Ristenpart, Thomas and Dell, Nicola and Engle, Kristen},
year = {2021},
month = {01},
pages = {},
title = {A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19},
url = {https://emtseng.me/assets/Tseng-2021-CHI_Digital-Safety-Dilemma_cam-ready.pdf}
}
@inproceedings{randall2020,
author = {Randall, Audrey and Liu, Enze and Akiwate, Gautam and Padmanabhan, Ramakrishna and Voelker, Geoffrey M. and Savage, Stefan and Schulman, Aaron},
title = {Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers},
year = {2020},
isbn = {9781450381383},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
doi = {10.1145/3419394.3423640},
abstract = {This paper presents and evaluates Trufflehunter, a DNS cache snooping tool for estimating the prevalence of rare and sensitive Internet applications. Unlike previous efforts that have focused on small, misconfigured open DNS resolvers, Trufflehunter models the complex behavior of large multi-layer distributed caching infrastructures (e.g., such as Google Public DNS). In particular, using controlled experiments, we have inferred the caching strategies of the four most popular public DNS resolvers (Google Public DNS, Cloudflare Quad1, OpenDNS and Quad9). The large footprint of such resolvers presents an opportunity to observe rare domain usage, while preserving the privacy of the users accessing them. Using a controlled testbed, we evaluate how accurately Trufflehunter can estimate domain name usage across the U.S. Applying this technique in the wild, we provide a lower-bound estimate of the popularity of several rare and sensitive applications (most notably smartphone stalkerware) which are otherwise challenging to survey.},
booktitle = {Proceedings of the ACM Internet Measurement Conference},
pages = {50–64},
numpages = {15},
location = {Virtual Event, USA},
series = {IMC '20},
url = { https://dl.acm.org/doi/pdf/10.1145/3419394.3423640 }
}
@article{slupska2021,
author = {Slupska, Julia and Tanczer, Leonie Maria},
year = {2021},
month = {06},
pages = {},
title = {Threat Modeling Intimate Partner Violence: Tech Abuse as a Cybersecurity Challenge in the Internet of Things},
url = {https://www.emerald.com/insight/content/doi/10.1108/978-1-83982-848-520211049/full/pdf?title=threat-modeling-intimate-partner-violence-tech-abuse-as-a-cybersecurity-challenge-in-the-internet-of-things}
}
@article{tanczer2021,
author = {Tanczer, Leonie and López-Neira, Isabel and Parkin, Simon},
year = {2021},
month = {01},
pages = {},
title = {‘I feel like we’re really behind the game’: perspectives of the United Kingdom’s intimate partner violence support sector on the rise of technology-facilitated abuse},
journal = {Journal of Gender-Based Violence},
doi = {10.1332/239868021X16290304343529},
url = { https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3931045_code2534469.pdf }
}
@inproceedings {zou2021,
author = {Yixin Zou and Allison McDonald and Julia Narakornpichit and Nicola Dell and Thomas Ristenpart and Kevin Roundy and Florian Schaub and Acar Tamersoy},
title = {The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence},
booktitle = {30th USENIX Security Symposium (USENIX Security 21)},
year = {2021},
isbn = {978-1-939133-24-3},
pages = {429--446},
url = {https://www.usenix.org/system/files/sec21-zou.pdf},
publisher = {USENIX Association},
month = aug,
}
@book{strohmayer2021,
title = "Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions",
abstract = "If you care about security, you care about safety. So you need to care about abusability and trust. This toolkit will provide information about why centering peoples{\textquoteright} safety in our digital technologies is important. We present the concepts of abusability and trust as two important tenets of building such safer technologies, followed by resources that can help us build safer technologies.",
author = "Angelika Strohmayer and Julia Slupska and Rosanna Bellini and Lynne Coventry and Tara Hairston and Adam Dodge",
note = "Funding information: This toolkit was funded by UK Research and Innovation{\textquoteright}s Engineering and Physical Sciences Research Council{\textquoteright}s Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).",
year = "2021",
month = oct,
language = "English",
url = { https://nrl.northumbria.ac.uk/id/eprint/47508/1/TrustAndAbusabilityToolkit.pdf }
}
@article {Seewald12,
author = {Seewald, Laura and Walsh, Tova B. and Tolman, Richard M. and Lee, Shawna J. and Reed, Lauren A. and Ngo, Quyen and Singh, Vijay},
title = {Technology-Facilitated Abuse Prevalence and Associations Among a Nationally Representative Sample of Young Men},
volume = {20},
number = {1},
pages = {12--17},
year = {2022},
doi = {10.1370/afm.2758},
publisher = {The Annals of Family Medicine},
abstract = {PURPOSE We undertook a study to determine the prevalence and associations of technology-facilitated abuse (TFA){\textemdash}insults, harassment, coercion, or threats carried out using digital tools such as smartphones and computers{\textemdash}among a US nationally representative sample of young men.METHODS Analyses were based on 1,079 men aged 18 to 35 years who completed questionnaires during August and September of 2014 and reported ever having been in a romantic relationship. We used validated measures to assess demographics, health service use, mental health and substance use, and TFA delivered to and received from partners in the past year. We calculated survey-weighted descriptive statistics and conducted multinomial logistic regression analysis.RESULTS Overall, 4.1\% of men reported delivering TFA only, 8.0\% receiving TFA only, and 25.6\% both delivering and receiving TFA. Men were more likely to report only delivering TFA if they identified as Hispanic (adjusted odds ratio [AOR] = 2.72; 95\% CI, 1.13 to 6.57), used marijuana (AOR = 1.31; 95\% CI, 1.02 to 1.68), and used prescription opioids for nonmedical reasons (AOR 2.86; 95\% CI, 1.48 to 5.54). Men were more likely to report only receiving TFA if they identified as Hispanic (AOR = 2.55; 95\% CI, 1.01 to 6.43) and used prescription opioids for nonmedical reasons (AOR = 2.43; 95\% CI, 1.34 to 4.39), whereas a primary care connection appeared protective (AOR = 0.43; 95\% CI, 0.22 to 0.86). Men were more likely to report both delivering and receiving TFA if they identified as non-Hispanic Black (AOR = 2.83; 95\% CI, 1.44 to 5.58), owned a smartphone (AOR = 1.80; 95\% CI, 1.05 to 3.09), had ever had mental health care visits (AOR = 1.86; 95\% CI, 1.16 to 2.98), misused alcohol (AOR = 1.10; 95\% CI, 1.04 to 1.17), and used prescription opioids for nonmedical reasons (AOR = 1.79; 95\% CI, 1.04 to 3.08).CONCLUSIONS We found that TFA was prevalent among young men, with 1 in 25 reporting delivery only, 1 in 12 reporting receipt only, and 1 in 4 reporting both. Primary care physicians can consider assessing TFA among male patients and developing interventions to mitigate this behavior.VISUAL ABSTRACT},
issn = {1544-1709},
URL = {https://www.annfammed.org/content/annalsfm/20/1/12.full.pdf},
journal = {The Annals of Family Medicine}
}
@article{rogers2022,
author = {Michaela M. Rogers and Colleen Fisher and Parveen Ali and Peter Allmark and Lisa Fontes},
title ={Technology-Facilitated Abuse in Intimate Relationships: A Scoping Review},
journal = {Trauma, Violence, \& Abuse},
pages = {15248380221090218},
year = {2022},
doi = {10.1177/15248380221090218},
note ={PMID: 35537445},
URL = {https://journals.sagepub.com/doi/pdf/10.1177/15248380221090218},
eprint = {https://doi.org/10.1177/15248380221090218},
abstract = { Technology-facilitated abuse (TFA) is a significant, harmful phenomenon and emerging trend in intimate partner violence. TFA encompasses a range of behaviours and is facilitated in online spaces (on social media and networking platforms) and through the misuse of everyday technology (e.g. mobile phone misuse, surveillance apps, spyware, surveillance via video cameras and so on). The body of work on TFA in intimate relationships is emerging, and so this scoping review set out to establish what types of abuse, impacts and forms of resistance are reported in current studies. The scoping review examined studies between 2000 and 2020 that focused on TFA within intimate partnerships (adults aged 18+) within the setting of any of these countries: the UK and Ireland, USA, Canada, New Zealand and Australia. The databases MEDLINE, CINAHL and Scopus were searched in December 2020. A total of 22 studies were included in the review. The main findings were that TFA is diverse in its presentation and tactics, but can be typed according to the eight domains of the Duluth Power \& Control Wheel. Impacts are not routinely reported across studies but broadly fall into the categories of social, mental health and financial impacts and omnipresence. Similarly, modes of resistance are infrequently reported in studies. In the few studies that described victim/survivor resistance, this was in the context of direct action, access to legal or professional support or in the identification of barriers to resistance. }
}
@Book{berg2014,
author = { Berg, Chris, and Breheny, Simon, and Institute of Public Affairs (Australia), },
title = { A social problem, not a technological problem : bullying, cyberbulling and public policy},
publisher = { Institute of Public Affairs [Melbourne] },
year = {2014},
type = { Book, Online },
url = { https://ipa.org.au/wp-content/uploads/archive/submission_V6.pdf },
language = { English },
subjects = { Cyberbullying -- Australia.; Cyberbullying -- Government policy -- Australia.; Australian },
catalogue-url = { https://nla.gov.au/nla.cat-vn6539645 },
}
@inproceedings {gibson2022,
author = {Cassidy Gibson and Vanessa Frost and Katie Platt and Washington Garcia and Luis Vargas and Sara Rampazzi and Vincent Bindschaedler and Patrick Traynor and Kevin R. B. Butler},
title = {Analyzing the Monetization Ecosystem of Stalkerware},
booktitle = {Privacy Enhancing Technologies Symposium},
year = {2022},
url = {https://petsymposium.org/2022/files/papers/issue4/popets-2022-0101.pdf},
month = jul,
}
@inproceedings {almansoori2022,
author = {Majed Almansoori and Andrea Gallardo and Julio Poveda and Adil Ahmed and Rahul Chatterjee},
title = {A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance},
booktitle = {Privacy Enhancing Technologies Symposium},
year = {2022},
url = {https://petsymposium.org/2022/files/papers/issue4/popets-2022-0102.pdf},
month = jul,
pages = {120 -- 139},
}
@article{harkin2022,
author = {Diarmaid Harkin and Robert Merkel},
title ={Technology-Based Responses to Technology-Facilitated Domestic and Family Violence: An Overview of the Limits and Possibilities of Tech-Based “Solutions”},
journal = {Violence Against Women},
pages = {10778012221088310},
year = {2022},
month = jun,
doi = {10.1177/10778012221088310},
note ={PMID: 35763542},
URL = {
https://doi.org/10.1177/10778012221088310},
eprint = {https://doi.org/10.1177/10778012221088310}
}
@misc{ecuador2020,
title = {Diagnóstico de violencia de género digital en Ecuador},
author = {Navegando libres por la red},
year = {2020},
url = {https://www.navegandolibres.org/images/navegando/Diagnostico_navegando_libres_f.pdf}
}
@inproceedings {liu2023,
author = {Enze Liu and Sumanth Rao and Sam Havron and Grant Ho abd Stefan Savage and Geoffrey M. Voelker and, Damon McCoy},
title = {No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps},
booktitle = {Privacy Enhancing Technologies Symposium},
year = {2023},
url = {https://cseweb.ucsd.edu/~savage/papers/PETS23.pdf},
month = jul,
}
@inproceedings{guptaReallyJustLeaned,
title = {'I Really Just Leaned on My Community for Support': {{Barriers}}, {{Challenges}}, and {{Coping Mechanisms Used}} by {{Survivors}} of {{Technology-Facilitated Abuse}} to {{Seek Social Support}}},
booktitle = {{{USENIX Security}} 2024},
author = {Gupta, Naman and Walsh, Kate and Das, Sanchari and Chatterjee, Rahul},
year = {2024},
address = {Philadelphia},
url = {https://www.usenix.org/system/files/usenixsecurity24-gupta.pdf},
}
@inproceedings{guptaChilbw2024,
author = {Naman Gupta and Sanchari Das and Kate Walsh and Rahul Chatterjee},
booktitle = {ACM CHI Conference on Human Factors in Computing Systems (Late Breaking Work) 2024},
month = {February},
title = {A Critical Analysis of the Prevalence of Technology-Facilitated
Abuse in US College Students},
url = {https://naman.github.io/assets/files/papers/chilbw24.pdf},
year = {2024}
}
@inproceedings{ceccioAnalyzingPatternsBehavior2023,
title = {Analyzing the {{Patterns}} and {{Behavior}} of {{Users When Detecting}} and {{Preventing Tech-enabled Stalking}}},
author = {Ceccio, Rose and Gupta, Naman and Almansoori, Majed and Chatterjee, Rahul},
year = {2023},
doi = {10/gr8rnx},
booktitle = {Symposium on Usable Security and Privacy (USEC), Network and Distributed System Security (NDSS) 2023},
url = {https://naman.github.io/assets/files/papers/usec23.pdf},
}
@article{almansooriWebAbuseComprehensive,
title = {The {{Web}} of {{Abuse}}: {{A Comprehensive Analysis}} of {{Online Resource}} in the {{Context}} of {{Technology-Enabled Intimate Partner Surveillance}}},
author = {Almansoori, Majed and Islam, Mazharul and Ghosh, Saptarshi and Mondal, Mainack and Chatterjee, Rahul},
journal={2024 IEEE European Symposium on Security and Privacy (EuroS\&P)},
year={2024},
organization={IEEE},
url = {https://majedalmansoori.com/papers/EuroS&P24_WebOfAbuse.pdf},
}
@inproceedings{bellini2023paying,
title = {{Paying the Price: When Intimate Partners Use Technology for Financial Harm}},
author = {Bellini, Rosanna},
booktitle = {Proc. {{CHI}}},
url = {https://www.rosiebellini.com/wp-content/uploads/2023/04/paying.pdf},
year = {2023}
}
@inproceedings{stephenson2023abuse,
title = {{Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse}},
author = {Sophie Stephenson and Majed Almansoori and Pardis Emami-Naeini and Danny Yuxing Huang and Rahul Chatterjee},
booktitle = {Proc. {{USENIX Security}}},
url = {https://pages.cs.wisc.edu/~srstephenso2/publications/usenix23_abusevectors.pdf},
year = {2023}
}
@inproceedings{stephenson2023lessons,
title = {{“It’s the Equivalent of Feeling Like You’re in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse}},
author = {Sophie Stephenson and Majed Almansoori and Pardis Emami-Naeini and Rahul Chatterjee},
booktitle = {Proc. {{USENIX Security}}},
url = {https://pages.cs.wisc.edu/~srstephenso2/publications/usenix23_abusevectors.pdf},
year = {2023}
}
@inproceedings{ceccio2023,
title = {{Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices}},
author = {Rose Ceccio and Sophie Stephenson and Varun Chadha and Danny Yuxing Huang and Rahul Chatterjee},
booktitle = {Proc. {{USENIX Security}}},
url = {https://pages.cs.wisc.edu/~srstephenso2/publications/usenix23_spydevices.pdf},
year = {2023}
}
@article{neubauer2023systematic,
title = {{A Systematic Literature Review of the Use of Computational Text Analysis Methods in Intimate Partner Violence Research}},
author = {Neubauer, Lilly and Straw, Isabel and Mariconti, Enrico and Tanczer, Leonie Maria},
journal = {Journal of Family Violence},
pages = {1--20},
url = {https://discovery.ucl.ac.uk/id/eprint/10167282/1/s10896-023-00517-7%20%281%29.pdf},
year = {2023}
}
@article{straw2023safeguarding,
title = {{Safeguarding patients from technology-facilitated abuse in clinical settings: A narrative review}},
author = {Straw, Isabel and Tanczer, Leonie},
journal = {PLOS Digital Health},
volume = {2},
number = {1},
url = {https://journals.plos.org/digitalhealth/article?id=10.1371/journal.pdig.0000089},
year = {2023}
}
@inproceedings{turk2023can,
title = {{Can’t Keep Them Away: The Failures of Anti-Stalking Protocols in Personal Item Tracking Devices}},
author = {Kieron Ivy Turk and Alice Hutchings and Alastair R. Beresford},
booktitle = {Proc. {{Security Protocols Workshop}}},
url = {https://www.cl.cam.ac.uk/~kst36/documents/cant-keep-them-away-spw-postproc.pdf},
year = {2023}
}
@inproceedings{tseng2022,
author = {Tseng, Emily and Sabet, Mehrnaz and Bellini, Rosanna and Sodhi, Harkiran Kaur and Ristenpart, Thomas and Dell, Nicola},
title = {Care Infrastructures for Digital Security in Intimate Partner Violence},
year = {2022},
isbn = {9781450391573},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://dl.acm.org/doi/pdf/10.1145/3491102.3502038},
doi = {10.1145/3491102.3502038},
abstract = {Survivors of intimate partner violence (IPV) face complex threats to their digital privacy and security. Prior work has established protocols for directly helping them mitigate these harms; however, there remains a need for flexible and pluralistic systems that can support survivors’ long-term needs. This paper describes the design and development of sociotechnical infrastructure that incorporates feminist notions of care to connect IPV survivors experiencing technology abuse with volunteer computer security consultants. We present findings from a mixed methods study that draws on data from an 8-month, real-world deployment, as well as interviews with 7 volunteer technology consultants and 18 IPV professionals. Our findings illuminate emergent challenges in safely and adaptively providing computer security advice as care. We discuss implications of these findings for feminist approaches to computer security and privacy, and provide broader lessons for interventions that aim to directly assist at-risk and marginalized people experiencing digital insecurity.},
booktitle = {Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems},
articleno = {123},
numpages = {20},
keywords = {care, computer security and privacy, gender-based violence, intimate partner violence},
location = {New Orleans, LA, USA},
series = {CHI '22}
}
@inproceedings {279942,
author = {Julia Slupska and Angelika Strohmayer},
title = {Networks of Care: Tech Abuse Advocates{\textquoteright} Digital Security Practices},
booktitle = {31st USENIX Security Symposium (USENIX Security 22)},
year = {2022},
isbn = {978-1-939133-31-1},
address = {Boston, MA},
pages = {341--358},
url = {https://www.usenix.org/system/files/sec22-slupska-networks.pdf},
publisher = {USENIX Association},
month = aug,
}