-
'I Really Just Leaned on My Community for Support': Barriers, Challenges, and Coping Mechanisms Used by Survivors of Technology-Facilitated Abuse to Seek Social Support



Naman Gupta, Kate Walsh, Sanchari Das, Rahul Chatterjee
In Proc. of: USENIX Security 2024, 2024,
-
A Critical Analysis of the Prevalence of Technology-Facilitated Abuse in US College Students



Naman Gupta, Sanchari Das, Kate Walsh, Rahul Chatterjee
In Proc. of: ACM CHI Conference on Human Factors in Computing Systems (Late Breaking Work) 2024, 2024,
-
The Web of Abuse: A Comprehensive Analysis of Online Resource in the Context of Technology-Enabled Intimate Partner Surveillance



Majed Almansoori, Mazharul Islam, Saptarshi Ghosh, Mainack Mondal, Rahul Chatterjee
Article in: 2024 IEEE European Symposium on Security and Privacy (EuroS\&P) ., 2024,
-
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps



Enze Liu, Sumanth Rao, Sam Havron, Grant Ho Stefan Savage, Damon McCoy Geoffrey M. Voelker and
In Proc. of: Privacy Enhancing Technologies Symposium, 2023,
-
Analyzing the Patterns and Behavior of Users When Detecting and Preventing Tech-enabled Stalking



Rose Ceccio, Naman Gupta, Majed Almansoori, Rahul Chatterjee
In Proc. of: Symposium on Usable Security and Privacy (USEC), Network and Distributed System Security (NDSS) 2023, 2023,
-
Paying the Price: When Intimate Partners Use Technology for Financial Harm



Rosanna Bellini
In Proc. of: Proc. CHI, 2023,
-
Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse



Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
“It’s the Equivalent of Feeling Like You’re in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse



Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices



Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
A Systematic Literature Review of the Use of Computational Text Analysis Methods in Intimate Partner Violence Research



Lilly Neubauer, Isabel Straw, Enrico Mariconti, Leonie Maria Tanczer
Article in: Journal of Family Violence ., 2023,
-
Safeguarding patients from technology-facilitated abuse in clinical settings: A narrative review



Isabel Straw, Leonie Tanczer
Article in: PLOS Digital Health 2.1, 2023,
-
Can’t Keep Them Away: The Failures of Anti-Stalking Protocols in Personal Item Tracking Devices



Kieron Ivy Turk, Alice Hutchings, Alastair R. Beresford
In Proc. of: Proc. Security Protocols Workshop, 2023,
-
Technology-Facilitated Abuse Prevalence and Associations Among a Nationally Representative Sample of Young Men



Laura Seewald, Tova B. Walsh, Richard M. Tolman, Shawna J. Lee, Lauren A. Reed, Quyen Ngo, Vijay Singh
Article in: The Annals of Family Medicine 20.1, 2022, The Annals of Family Medicine
-
Technology-Facilitated Abuse in Intimate Relationships: A Scoping Review



Michaela M. Rogers, Colleen Fisher, Parveen Ali, Peter Allmark, Lisa Fontes
Article in: Trauma, Violence, \& Abuse ., 2022,
PMID: 35537445
-
Analyzing the Monetization Ecosystem of Stalkerware



Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance



Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, Rahul Chatterjee
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
Technology-Based Responses to Technology-Facilitated Domestic and Family Violence: An Overview of the Limits and Possibilities of Tech-Based “Solutions”



Diarmaid Harkin, Robert Merkel
Article in: Violence Against Women ., 2022,
PMID: 35763542
-
Care Infrastructures for Digital Security in Intimate Partner Violence



Emily Tseng, Mehrnaz Sabet, Rosanna Bellini, Harkiran Kaur Sodhi, Thomas Ristenpart, Nicola Dell
In Proc. of: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, 2022, Association for Computing Machinery
-
Networks of Care: Tech Abuse Advocates\textquoteright Digital Security Practices



Julia Slupska, Angelika Strohmayer
In Proc. of: 31st USENIX Security Symposium (USENIX Security 22), 2022, USENIX Association
-
A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19



Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
Article in: ., 2021,
-
Threat Modeling Intimate Partner Violence: Tech Abuse as a Cybersecurity Challenge in the Internet of Things



Julia Slupska, Leonie Maria Tanczer
Article in: ., 2021,
-
‘I feel like we’re really behind the game’: perspectives of the United Kingdom’s intimate partner violence support sector on the rise of technology-facilitated abuse



Leonie Tanczer, Isabel López-Neira, Simon Parkin
Article in: Journal of Gender-Based Violence ., 2021,
-
The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence



Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, Acar Tamersoy
In Proc. of: 30th USENIX Security Symposium (USENIX Security 21), 2021, USENIX Association
-
Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions



Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
Book, , 2021
Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
-
The Many Kinds of Creepware Used for Interpersonal Attacks



K. A. Roundy, P. Barmaimon Mendelberg, N. Dell, D. McCoy, D. Nissani, T. Ristenpart, A. Tamersoy
In Proc. of: 2020 IEEE Symposium on Security and Privacy (SP), 2020, IEEE Computer Society
-
Privacy threats in intimate relationships



Karen Levy, Bruce Schneier
Article in: ArXiv abs/2006.03907., 2020,
-
Stalkerware Test 2020



AV Comparatives
Miscellaneous, 2020
-
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums



Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
-
Technology-Facilitated Domestic Abuse in Political Economy: A New Theoretical Framework



Elizabeth Yardley
Article in: Violence Against Women 0.0, 2020,
PMID: 32757887
-
Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control



Delanie Woodlock, Mandy McKenzie, Deborah Western, Bridget Harris
Article in: Australian Social Work 73.3, 2020, Routledge
-
Technology and violence against women


Bridget Harris
In Coll. of: The Emerald Handbook of Feminism, Criminology and Social Change, 2020, Emerald
-
“So-called privacy breeds evil”: Narrative Justifications for Intimate Partner Surveillance in Online Forums



Rosanna Bellini, Emily Tseng
In Proc. of: , 2020,
-
Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers



Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
-
Diagnóstico de violencia de género digital en Ecuador



Navegando red
Miscellaneous, 2020
-
“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence



Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
-
Clinical Computer Security for Victims of Intimate Partner Violence



Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
-
The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry



Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
Miscellaneous, 2019
-
Installing Fear - A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications



Cynthia Khoo, Kate Robertson, Ronald Deibert
Miscellaneous, 2019
-
The commodification of mobile phone surveillance: An analysis of the consumer spyware industry



Diarmaid Harkin, Adam Molnar, Erica Vowles
Article in: Crime, Media, Culture: An International Journal ., 2019,
-
Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums



Roxanne Leitão
Article in: Human–Computer Interaction 0.0, 2019, Taylor & Francis
-
Women, Domestic Violence Service Providers, and Knowledge of Technology-Related Abuse



Nadine E White
Miscellaneous, 2019
-
Technology-facilitated Domestic and Family Violence: Women’s Experiences



Heather Douglas, Bridget Harris, Molly Dragiewicz
Article in: British Journal of Criminology 59., 2019,
-
Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse



Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
In Proc. of: , 2019,
-
Anticipating Smart Home Security and Privacy Threats with Survivors of Intimate Partner Abuse



Roxanne Leitão
In Proc. of: , 2019,
-
‘Internet of Things’: How Abuse is Getting Smarter



Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
Article in: SSRN Electronic Journal 63., 2019,
-
The Spyware Used in Intimate Partner Violence



R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology



Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
-
Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships



Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason Hong
In Proc. of: Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, 2018, USENIX Association
-
Rapport sur les cyber-violences conjugales



Centre Hubertine Auclert
Miscellaneous (french), 2018
-
Digital Coercive Control: Insights from Two Landmark Domestic Violence Studies



Bridget Harris, Delanie Woodlock
Article in: British Journal of Criminology 59., 2018,
-
Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse



Leonie Tanczer, Isabel Neira, Simon Edward Parkin, Trupti N Patel, George Danezis
In Proc. of: , 2018,
-
Cyber-Violence: Digital Abuse in the Context of Domestic Violence



Hadeel al-alosi
Article in: ., 2018,
-
Technology Related Violence Aganst Women - Investigating Tech Related Violence Against Women in Peri-Urban Areas of Uganda



Wougnet, APC, Sida
Article in: ., 2018,
-
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders



Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse



Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
Inside the 'Stalkerware' Surveillance Market, Where Ordinary People Tap Each Other's Phones


Vice Motherboard
Webpage, https://www.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x, 2017
-
Intimate Partner Digital Abuse



Michelle Ybarra, Myeshia Price-Feeney, Amanda Lenhart, Kathryn Zickuhr
Miscellaneous, 2017
-
Intimate Surveillance



Karen E.C. Levy
In Proc. of: Idaho Law Review 50, 2015,
-
Romantic Partner Monitoring After Breakups: Attachment, Dependence, Distress, and Post-Dissolution Online Surveillance via Social Networking Sites



Jesse Fox, Robert Tokunaga
Article in: Cyberpsychology, Behavior, and Social Networking 18., 2015,
-
Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse



Budi Arief, Kovila Coopamootoo, Martin Emms, Aad Moorsel
Article in: Proceedings of the ACM Conference on Computer and Communications Security ., 2014,
-
Smartphones Are Used To Stalk, Control Domestic Abuse Victims


NPR
Webpage, https://www.npr.org/sections/alltechconsidered/2014/09/15/346149979/smartphones-are-used-to-stalk-control-domestic-abuse-victims, 2014
-
A social problem, not a technological problem : bullying, cyberbulling and public policy



Berg, Breheny, Public Affairs (Australia)
Book, Institute of Public Affairs [Melbourne], 2014
-
Intimate Partner Violence, Technology, and Stalking


Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
Article in: Violence against women 13., 2007,
-
Stalking in the Context of Intimate Partner AbuseIn the Victims' Words



Heather Melton
Article in: Feminist Criminology - FEM CRIMINOL 2., 2007,