Selected Research Papers on Technology used in Intimate Partner Violence

open access logo

Content Warning: this page contains content related to intimate partner violence


IPVTechBib is an online archive of selected research papers on Technology used in Intimate Partner violence. The icons next to each paper make it easy to download, cite, and link to papers. If you think I missed a paper, let me know. This page was largely inspired by the great Censorbib webpage. You can sort papers by year, reverse year (default), author, and reverse author.


If you are victim of surveillance in an intimate relationship, you can get support from organisations such as the National Network to End Domestic Violence in the US, the Refuge for women and children against domestic violence in UK, or la fédération nationale Solidarité France en France.

source code book 59 Papers
source code icon IPVTechBib code
update icon Last update: 2022-10-12
donate icon About Me
  • A social problem, not a technological problem : bullying, cyberbulling and public policy PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Berg, Breheny, Public Affairs (Australia)
    Book, Institute of Public Affairs [Melbourne], 2014
  • Technology Related Violence Aganst Women - Investigating Tech Related Violence Against Women in Peri-Urban Areas of Uganda PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Wougnet, APC, Sida
    Article in: ., 2018,
  • A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, Rahul Chatterjee
    In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
  • Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers File download iconCached PDF download iconBibTeX download iconLink to paper
    Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
    In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
  • Technology-Facilitated Abuse in Intimate Relationships: A Scoping Review File download iconCached PDF download iconBibTeX download iconLink to paper
    Michaela M. Rogers, Colleen Fisher, Parveen Ali, Peter Allmark, Lisa Fontes
    Article in: Trauma, Violence, \& Abuse ., 2022, PMID: 35537445
  • Technology-Facilitated Abuse in Intimate Relationships: A Scoping Review File download iconCached PDF download iconBibTeX download iconLink to paper
    Michaela M. Rogers, Colleen Fisher, Parveen Ali, Peter Allmark, Lisa Fontes
    Article in: Trauma, Violence, \& Abuse ., 2022, PMID: 35537445
  • A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, Rahul Chatterjee
    In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
  • Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Budi Arief, Kovila Coopamootoo, Martin Emms, Aad Moorsel
    Article in: Proceedings of the ACM Conference on Computer and Communications Security ., 2014,
  • Rapport sur les cyber-violences conjugales PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Centre Hubertine Auclert
    Miscellaneous (french), 2018
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • “So-called privacy breeds evil”: Narrative Justifications for Intimate Partner Surveillance in Online Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Rosanna Bellini, Emily Tseng
    In Proc. of: , 2020,
  • Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
    Book, , 2021 Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
  • A social problem, not a technological problem : bullying, cyberbulling and public policy PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Berg, Breheny, Public Affairs (Australia)
    Book, Institute of Public Affairs [Melbourne], 2014
  • Analyzing the Monetization Ecosystem of Stalkerware PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
    In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
  • A social problem, not a technological problem : bullying, cyberbulling and public policy PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Berg, Breheny, Public Affairs (Australia)
    Book, Institute of Public Affairs [Melbourne], 2014
  • Using technology to control intimate partners: An exploratory study of college undergraduates File download iconCached PDF download iconBibTeX download iconLink to paper
    Sloane Burke, Michele Wallen, Karen Vail-Smith, David Knox
    Article in: Computers in Human Behavior 27., 2011,
  • Analyzing the Monetization Ecosystem of Stalkerware PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
    In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
  • Intimate partner stalking and femicide: urgent implications for women's safety File download iconCached PDF download iconBibTeX download iconLink to paper
    Judith McFarlane, Jacquelyn Campbell, Kathy Jacquelyn
    Article in: Behavioral Sciences & the Law 20., 2002,
  • “Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
    Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
  • Clinical Computer Security for Victims of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
  • A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, Rahul Chatterjee
    In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
  • The Use of Information and Communication Technologies to Coerce and Control in Domestic Violence and Following Separation PDF download iconCached PDF download iconBibTeX download iconLink to paper
    T. Hand, D. Chung, M. Peters
    In Proc. of: , 2009,
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • Stalkerware Test 2020 PDF download iconCached PDF download iconBibTeX download iconLink to paper
    AV Comparatives
    Miscellaneous, 2020
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Budi Arief, Kovila Coopamootoo, Martin Emms, Aad Moorsel
    Article in: Proceedings of the ACM Conference on Computer and Communications Security ., 2014,
  • Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
    Book, , 2021 Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
  • Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason Hong
    In Proc. of: Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, 2018, USENIX Association
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • ‘Internet of Things’: How Abuse is Getting Smarter File download iconCached PDF download iconBibTeX download iconLink to paper
    Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
    Article in: SSRN Electronic Journal 63., 2019,
  • Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Leonie Tanczer, Isabel Neira, Simon Edward Parkin, Trupti N Patel, George Danezis
    In Proc. of: , 2018,
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • Intimate Partner Violence, Technology, and Stalking Cached PDF download iconBibTeX download iconLink to paper
    Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
    Article in: Violence against women 13., 2007,
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • Installing Fear - A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Khoo, Kate Robertson, Ronald Deibert
    Miscellaneous, 2019
  • The Many Kinds of Creepware Used for Interpersonal Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    K. A. Roundy, P. Barmaimon Mendelberg, N. Dell, D. McCoy, D. Nissani, T. Ristenpart, A. Tamersoy
    In Proc. of: 2020 IEEE Symposium on Security and Privacy (SP), 2020, IEEE Computer Society
  • “Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
    Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
  • Clinical Computer Security for Victims of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
  • Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
  • A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19 PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
    Article in: ., 2021,
  • The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, Acar Tamersoy
    In Proc. of: 30th USENIX Security Symposium (USENIX Security 21), 2021, USENIX Association
  • Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
    Book, , 2021 Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
  • Technology-facilitated Domestic and Family Violence: Women’s Experiences File download iconCached PDF download iconBibTeX download iconLink to paper
    Heather Douglas, Bridget Harris, Molly Dragiewicz
    Article in: British Journal of Criminology 59., 2019,
  • Technology-facilitated Domestic and Family Violence: Women’s Experiences File download iconCached PDF download iconBibTeX download iconLink to paper
    Heather Douglas, Bridget Harris, Molly Dragiewicz
    Article in: British Journal of Criminology 59., 2019,
  • Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Budi Arief, Kovila Coopamootoo, Martin Emms, Aad Moorsel
    Article in: Proceedings of the ACM Conference on Computer and Communications Security ., 2014,
  • A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19 PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
    Article in: ., 2021,
  • Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason Hong
    In Proc. of: Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, 2018, USENIX Association
  • Intimate Partner Violence, Technology, and Stalking Cached PDF download iconBibTeX download iconLink to paper
    Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
    Article in: Violence against women 13., 2007,
  • Technology-Facilitated Abuse in Intimate Relationships: A Scoping Review File download iconCached PDF download iconBibTeX download iconLink to paper
    Michaela M. Rogers, Colleen Fisher, Parveen Ali, Peter Allmark, Lisa Fontes
    Article in: Trauma, Violence, \& Abuse ., 2022, PMID: 35537445
  • Technology and violence against women File download iconBibTeX download iconLink to paper
    Bridget Harris
    In Coll. of: The Emerald Handbook of Feminism, Criminology and Social Change, 2020, Emerald
  • Technology-Facilitated Abuse in Intimate Relationships: A Scoping Review File download iconCached PDF download iconBibTeX download iconLink to paper
    Michaela M. Rogers, Colleen Fisher, Parveen Ali, Peter Allmark, Lisa Fontes
    Article in: Trauma, Violence, \& Abuse ., 2022, PMID: 35537445
  • Romantic Partner Monitoring After Breakups: Attachment, Dependence, Distress, and Post-Dissolution Online Surveillance via Social Networking Sites PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jesse Fox, Robert Tokunaga
    Article in: Cyberpsychology, Behavior, and Social Networking 18., 2015,
  • The New Age of Stalking: Technological Implications for Stalking File download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, Sarah Tucker
    Article in: Juvenile and Family Court Journal 61., 2010,
  • Intimate Partner Violence, Technology, and Stalking Cached PDF download iconBibTeX download iconLink to paper
    Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
    Article in: Violence against women 13., 2007,
  • “Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
    Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
  • Clinical Computer Security for Victims of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
  • Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
  • A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
  • A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19 PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
    Article in: ., 2021,
  • Analyzing the Monetization Ecosystem of Stalkerware PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
    In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
  • “Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
    Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
  • A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, Rahul Chatterjee
    In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
  • Analyzing the Monetization Ecosystem of Stalkerware PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
    In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
  • Analyzing the Monetization Ecosystem of Stalkerware PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
    In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
    Book, , 2021 Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
  • The Use of Information and Communication Technologies to Coerce and Control in Domestic Violence and Following Separation PDF download iconCached PDF download iconBibTeX download iconLink to paper
    T. Hand, D. Chung, M. Peters
    In Proc. of: , 2009,
  • The commodification of mobile phone surveillance: An analysis of the consumer spyware industry File download iconCached PDF download iconBibTeX download iconLink to paper
    Diarmaid Harkin, Adam Molnar, Erica Vowles
    Article in: Crime, Media, Culture: An International Journal ., 2019,
  • Technology-Based Responses to Technology-Facilitated Domestic and Family Violence: An Overview of the Limits and Possibilities of Tech-Based “Solutions” File download iconCached PDF download iconBibTeX download iconLink to paper
    Diarmaid Harkin, Robert Merkel
    Article in: Violence Against Women ., 2022, PMID: 35763542
  • Digital Coercive Control: Insights from Two Landmark Domestic Violence Studies File download iconCached PDF download iconBibTeX download iconLink to paper
    Bridget Harris, Delanie Woodlock
    Article in: British Journal of Criminology 59., 2018,
  • Technology-facilitated Domestic and Family Violence: Women’s Experiences File download iconCached PDF download iconBibTeX download iconLink to paper
    Heather Douglas, Bridget Harris, Molly Dragiewicz
    Article in: British Journal of Criminology 59., 2019,
  • Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control File download iconCached PDF download iconBibTeX download iconLink to paper
    Delanie Woodlock, Mandy McKenzie, Deborah Western, Bridget Harris
    Article in: Australian Social Work 73.3, 2020, Routledge
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • “Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
    Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
  • Clinical Computer Security for Victims of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
  • No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Enze Liu, Sumanth Rao, Sam Havron, Grant Ho Stefan Savage, Damon McCoy Geoffrey M. Voelker and
    In Proc. of: Privacy Enhancing Technologies Symposium, 2023,
  • Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason Hong
    In Proc. of: Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, 2018, USENIX Association
  • Assessing Technology in the Context of Violence Against Women & Children: Examining Benefits & Risks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    British Columbia Society Transition Houses
    Miscellaneous, 2013
  • Intimate partner stalking and femicide: urgent implications for women's safety File download iconCached PDF download iconBibTeX download iconLink to paper
    Judith McFarlane, Jacquelyn Campbell, Kathy Jacquelyn
    Article in: Behavioral Sciences & the Law 20., 2002,
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • Installing Fear - A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Khoo, Kate Robertson, Ronald Deibert
    Miscellaneous, 2019
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • Using technology to control intimate partners: An exploratory study of college undergraduates File download iconCached PDF download iconBibTeX download iconLink to paper
    Sloane Burke, Michele Wallen, Karen Vail-Smith, David Knox
    Article in: Computers in Human Behavior 27., 2011,
  • The New Age of Stalking: Technological Implications for Stalking File download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, Sarah Tucker
    Article in: Juvenile and Family Court Journal 61., 2010,
  • Technology-Facilitated Abuse Prevalence and Associations Among a Nationally Representative Sample of Young Men PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Laura Seewald, Tova B. Walsh, Richard M. Tolman, Shawna J. Lee, Lauren A. Reed, Quyen Ngo, Vijay Singh
    Article in: The Annals of Family Medicine 20.1, 2022, The Annals of Family Medicine
  • Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums File download iconCached PDF download iconBibTeX download iconLink to paper
    Roxanne Leitão
    Article in: Human–Computer Interaction 0.0, 2019, Taylor & Francis
  • Anticipating Smart Home Security and Privacy Threats with Survivors of Intimate Partner Abuse File download iconCached PDF download iconBibTeX download iconLink to paper
    Roxanne Leitão
    In Proc. of: , 2019,
  • Intimate Partner Digital Abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Michelle Ybarra, Myeshia Price-Feeney, Amanda Lenhart, Kathryn Zickuhr
    Miscellaneous, 2017
  • Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
  • Privacy threats in intimate relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Karen Levy, Bruce Schneier
    Article in: ArXiv abs/2006.03907., 2020,
  • A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
  • Intimate Surveillance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Karen E.C. Levy
    In Proc. of: Idaho Law Review 50, 2015,
  • Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers File download iconCached PDF download iconBibTeX download iconLink to paper
    Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
    In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
  • No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Enze Liu, Sumanth Rao, Sam Havron, Grant Ho Stefan Savage, Damon McCoy Geoffrey M. Voelker and
    In Proc. of: Privacy Enhancing Technologies Symposium, 2023,
  • Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
    In Proc. of: , 2019,
  • ‘Internet of Things’: How Abuse is Getting Smarter File download iconCached PDF download iconBibTeX download iconLink to paper
    Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
    Article in: SSRN Electronic Journal 63., 2019,
  • ‘I feel like we’re really behind the game’: perspectives of the United Kingdom’s intimate partner violence support sector on the rise of technology-facilitated abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Leonie Tanczer, Isabel López-Neira, Simon Parkin
    Article in: Journal of Gender-Based Violence ., 2021,
  • Technology and violence against women File download iconBibTeX download iconLink to paper
    Bridget Harris
    In Coll. of: The Emerald Handbook of Feminism, Criminology and Social Change, 2020, Emerald
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • The Many Kinds of Creepware Used for Interpersonal Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    K. A. Roundy, P. Barmaimon Mendelberg, N. Dell, D. McCoy, D. Nissani, T. Ristenpart, A. Tamersoy
    In Proc. of: 2020 IEEE Symposium on Security and Privacy (SP), 2020, IEEE Computer Society
  • Clinical Computer Security for Victims of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • Technology and violence against women File download iconBibTeX download iconLink to paper
    Bridget Harris
    In Coll. of: The Emerald Handbook of Feminism, Criminology and Social Change, 2020, Emerald
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, Acar Tamersoy
    In Proc. of: 30th USENIX Security Symposium (USENIX Security 21), 2021, USENIX Association
  • Intimate partner stalking and femicide: urgent implications for women's safety File download iconCached PDF download iconBibTeX download iconLink to paper
    Judith McFarlane, Jacquelyn Campbell, Kathy Jacquelyn
    Article in: Behavioral Sciences & the Law 20., 2002,
  • Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control File download iconCached PDF download iconBibTeX download iconLink to paper
    Delanie Woodlock, Mandy McKenzie, Deborah Western, Bridget Harris
    Article in: Australian Social Work 73.3, 2020, Routledge
  • Stalking in the Context of Intimate Partner AbuseIn the Victims' Words File download iconCached PDF download iconBibTeX download iconLink to paper
    Heather Melton
    Article in: Feminist Criminology - FEM CRIMINOL 2., 2007,
  • The Many Kinds of Creepware Used for Interpersonal Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    K. A. Roundy, P. Barmaimon Mendelberg, N. Dell, D. McCoy, D. Nissani, T. Ristenpart, A. Tamersoy
    In Proc. of: 2020 IEEE Symposium on Security and Privacy (SP), 2020, IEEE Computer Society
  • Technology-Based Responses to Technology-Facilitated Domestic and Family Violence: An Overview of the Limits and Possibilities of Tech-Based “Solutions” File download iconCached PDF download iconBibTeX download iconLink to paper
    Diarmaid Harkin, Robert Merkel
    Article in: Violence Against Women ., 2022, PMID: 35763542
  • Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
  • A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • The commodification of mobile phone surveillance: An analysis of the consumer spyware industry File download iconCached PDF download iconBibTeX download iconLink to paper
    Diarmaid Harkin, Adam Molnar, Erica Vowles
    Article in: Crime, Media, Culture: An International Journal ., 2019,
  • Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Budi Arief, Kovila Coopamootoo, Martin Emms, Aad Moorsel
    Article in: Proceedings of the ACM Conference on Computer and Communications Security ., 2014,
  • Inside the 'Stalkerware' Surveillance Market, Where Ordinary People Tap Each Other's Phones File download iconBibTeX download iconLink to paper
    Vice Motherboard
    Webpage, https://www.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x, 2017
  • Smartphones Are Used To Stalk, Control Domestic Abuse Victims File download iconBibTeX download iconLink to paper
    NPR
    Webpage, https://www.npr.org/sections/alltechconsidered/2014/09/15/346149979/smartphones-are-used-to-stalk-control-domestic-abuse-victims, 2014
  • The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, Acar Tamersoy
    In Proc. of: 30th USENIX Security Symposium (USENIX Security 21), 2021, USENIX Association
  • Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Leonie Tanczer, Isabel Neira, Simon Edward Parkin, Trupti N Patel, George Danezis
    In Proc. of: , 2018,
  • Technology-Facilitated Abuse Prevalence and Associations Among a Nationally Representative Sample of Young Men PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Laura Seewald, Tova B. Walsh, Richard M. Tolman, Shawna J. Lee, Lauren A. Reed, Quyen Ngo, Vijay Singh
    Article in: The Annals of Family Medicine 20.1, 2022, The Annals of Family Medicine
  • The Many Kinds of Creepware Used for Interpersonal Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    K. A. Roundy, P. Barmaimon Mendelberg, N. Dell, D. McCoy, D. Nissani, T. Ristenpart, A. Tamersoy
    In Proc. of: 2020 IEEE Symposium on Security and Privacy (SP), 2020, IEEE Computer Society
  • The New Age of Stalking: Technological Implications for Stalking File download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, Sarah Tucker
    Article in: Juvenile and Family Court Journal 61., 2010,
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers File download iconCached PDF download iconBibTeX download iconLink to paper
    Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
    In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
  • Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
  • A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
  • Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason Hong
    In Proc. of: Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, 2018, USENIX Association
  • Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
    In Proc. of: , 2019,
  • ‘Internet of Things’: How Abuse is Getting Smarter File download iconCached PDF download iconBibTeX download iconLink to paper
    Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
    Article in: SSRN Electronic Journal 63., 2019,
  • ‘I feel like we’re really behind the game’: perspectives of the United Kingdom’s intimate partner violence support sector on the rise of technology-facilitated abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Leonie Tanczer, Isabel López-Neira, Simon Parkin
    Article in: Journal of Gender-Based Violence ., 2021,
  • Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Leonie Tanczer, Isabel Neira, Simon Edward Parkin, Trupti N Patel, George Danezis
    In Proc. of: , 2018,
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
    In Proc. of: , 2019,
  • ‘Internet of Things’: How Abuse is Getting Smarter File download iconCached PDF download iconBibTeX download iconLink to paper
    Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
    Article in: SSRN Electronic Journal 63., 2019,
  • Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Leonie Tanczer, Isabel Neira, Simon Edward Parkin, Trupti N Patel, George Danezis
    In Proc. of: , 2018,
  • The Use of Information and Communication Technologies to Coerce and Control in Domestic Violence and Following Separation PDF download iconCached PDF download iconBibTeX download iconLink to paper
    T. Hand, D. Chung, M. Peters
    In Proc. of: , 2009,
  • Analyzing the Monetization Ecosystem of Stalkerware PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
    In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
  • A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, Rahul Chatterjee
    In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
  • Intimate Partner Digital Abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Michelle Ybarra, Myeshia Price-Feeney, Amanda Lenhart, Kathryn Zickuhr
    Miscellaneous, 2017
  • Analyzing the Monetization Ecosystem of Stalkerware PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
    In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
  • Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers File download iconCached PDF download iconBibTeX download iconLink to paper
    Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
    In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
  • No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Enze Liu, Sumanth Rao, Sam Havron, Grant Ho Stefan Savage, Damon McCoy Geoffrey M. Voelker and
    In Proc. of: Privacy Enhancing Technologies Symposium, 2023,
  • Technology-Facilitated Abuse Prevalence and Associations Among a Nationally Representative Sample of Young Men PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Laura Seewald, Tova B. Walsh, Richard M. Tolman, Shawna J. Lee, Lauren A. Reed, Quyen Ngo, Vijay Singh
    Article in: The Annals of Family Medicine 20.1, 2022, The Annals of Family Medicine
  • The Many Kinds of Creepware Used for Interpersonal Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    K. A. Roundy, P. Barmaimon Mendelberg, N. Dell, D. McCoy, D. Nissani, T. Ristenpart, A. Tamersoy
    In Proc. of: 2020 IEEE Symposium on Security and Privacy (SP), 2020, IEEE Computer Society
  • “Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
    Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
  • Clinical Computer Security for Victims of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
  • Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
  • A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19 PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
    Article in: ., 2021,
  • The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, Acar Tamersoy
    In Proc. of: 30th USENIX Security Symposium (USENIX Security 21), 2021, USENIX Association
  • Installing Fear - A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Khoo, Kate Robertson, Ronald Deibert
    Miscellaneous, 2019
  • Technology-Facilitated Abuse in Intimate Relationships: A Scoping Review File download iconCached PDF download iconBibTeX download iconLink to paper
    Michaela M. Rogers, Colleen Fisher, Parveen Ali, Peter Allmark, Lisa Fontes
    Article in: Trauma, Violence, \& Abuse ., 2022, PMID: 35537445
  • The Many Kinds of Creepware Used for Interpersonal Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    K. A. Roundy, P. Barmaimon Mendelberg, N. Dell, D. McCoy, D. Nissani, T. Ristenpart, A. Tamersoy
    In Proc. of: 2020 IEEE Symposium on Security and Privacy (SP), 2020, IEEE Computer Society
  • The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, Acar Tamersoy
    In Proc. of: 30th USENIX Security Symposium (USENIX Security 21), 2021, USENIX Association
  • Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers File download iconCached PDF download iconBibTeX download iconLink to paper
    Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
    In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
  • No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Enze Liu, Sumanth Rao, Sam Havron, Grant Ho Stefan Savage, Damon McCoy Geoffrey M. Voelker and
    In Proc. of: Privacy Enhancing Technologies Symposium, 2023,
  • The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, Acar Tamersoy
    In Proc. of: 30th USENIX Security Symposium (USENIX Security 21), 2021, USENIX Association
  • Privacy threats in intimate relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Karen Levy, Bruce Schneier
    Article in: ArXiv abs/2006.03907., 2020,
  • Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers File download iconCached PDF download iconBibTeX download iconLink to paper
    Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
    In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
  • Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason Hong
    In Proc. of: Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, 2018, USENIX Association
  • Technology-Facilitated Abuse Prevalence and Associations Among a Nationally Representative Sample of Young Men PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Laura Seewald, Tova B. Walsh, Richard M. Tolman, Shawna J. Lee, Lauren A. Reed, Quyen Ngo, Vijay Singh
    Article in: The Annals of Family Medicine 20.1, 2022, The Annals of Family Medicine
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • Technology Related Violence Aganst Women - Investigating Tech Related Violence Against Women in Peri-Urban Areas of Uganda PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Wougnet, APC, Sida
    Article in: ., 2018,
  • Technology-Facilitated Abuse Prevalence and Associations Among a Nationally Representative Sample of Young Men PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Laura Seewald, Tova B. Walsh, Richard M. Tolman, Shawna J. Lee, Lauren A. Reed, Quyen Ngo, Vijay Singh
    Article in: The Annals of Family Medicine 20.1, 2022, The Annals of Family Medicine
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • Threat Modeling Intimate Partner Violence: Tech Abuse as a Cybersecurity Challenge in the Internet of Things File download iconCached PDF download iconBibTeX download iconLink to paper
    Julia Slupska, Leonie Maria Tanczer
    Article in: ., 2021,
  • Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
    Book, , 2021 Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
  • The New Age of Stalking: Technological Implications for Stalking File download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, Sarah Tucker
    Article in: Juvenile and Family Court Journal 61., 2010,
  • Intimate Partner Violence, Technology, and Stalking Cached PDF download iconBibTeX download iconLink to paper
    Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
    Article in: Violence against women 13., 2007,
  • Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
    Book, , 2021 Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
  • The Many Kinds of Creepware Used for Interpersonal Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    K. A. Roundy, P. Barmaimon Mendelberg, N. Dell, D. McCoy, D. Nissani, T. Ristenpart, A. Tamersoy
    In Proc. of: 2020 IEEE Symposium on Security and Privacy (SP), 2020, IEEE Computer Society
  • The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, Acar Tamersoy
    In Proc. of: 30th USENIX Security Symposium (USENIX Security 21), 2021, USENIX Association
  • Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
    In Proc. of: , 2019,
  • ‘Internet of Things’: How Abuse is Getting Smarter File download iconCached PDF download iconBibTeX download iconLink to paper
    Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
    Article in: SSRN Electronic Journal 63., 2019,
  • Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Leonie Tanczer, Isabel Neira, Simon Edward Parkin, Trupti N Patel, George Danezis
    In Proc. of: , 2018,
  • ‘I feel like we’re really behind the game’: perspectives of the United Kingdom’s intimate partner violence support sector on the rise of technology-facilitated abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Leonie Tanczer, Isabel López-Neira, Simon Parkin
    Article in: Journal of Gender-Based Violence ., 2021,
  • Threat Modeling Intimate Partner Violence: Tech Abuse as a Cybersecurity Challenge in the Internet of Things File download iconCached PDF download iconBibTeX download iconLink to paper
    Julia Slupska, Leonie Maria Tanczer
    Article in: ., 2021,
  • Romantic Partner Monitoring After Breakups: Attachment, Dependence, Distress, and Post-Dissolution Online Surveillance via Social Networking Sites PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jesse Fox, Robert Tokunaga
    Article in: Cyberpsychology, Behavior, and Social Networking 18., 2015,
  • Technology-Facilitated Abuse Prevalence and Associations Among a Nationally Representative Sample of Young Men PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Laura Seewald, Tova B. Walsh, Richard M. Tolman, Shawna J. Lee, Lauren A. Reed, Quyen Ngo, Vijay Singh
    Article in: The Annals of Family Medicine 20.1, 2022, The Annals of Family Medicine
  • Analyzing the Monetization Ecosystem of Stalkerware PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
    In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
  • “Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
    Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • “So-called privacy breeds evil”: Narrative Justifications for Intimate Partner Surveillance in Online Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Rosanna Bellini, Emily Tseng
    In Proc. of: , 2020,
  • A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19 PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
    Article in: ., 2021,
  • The New Age of Stalking: Technological Implications for Stalking File download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, Sarah Tucker
    Article in: Juvenile and Family Court Journal 61., 2010,
  • Intimate Partner Violence, Technology, and Stalking Cached PDF download iconBibTeX download iconLink to paper
    Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
    Article in: Violence against women 13., 2007,
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • Using technology to control intimate partners: An exploratory study of college undergraduates File download iconCached PDF download iconBibTeX download iconLink to paper
    Sloane Burke, Michele Wallen, Karen Vail-Smith, David Knox
    Article in: Computers in Human Behavior 27., 2011,
  • Analyzing the Monetization Ecosystem of Stalkerware PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
    In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
  • Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers File download iconCached PDF download iconBibTeX download iconLink to paper
    Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
    In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
  • The commodification of mobile phone surveillance: An analysis of the consumer spyware industry File download iconCached PDF download iconBibTeX download iconLink to paper
    Diarmaid Harkin, Adam Molnar, Erica Vowles
    Article in: Crime, Media, Culture: An International Journal ., 2019,
  • Technology and violence against women File download iconBibTeX download iconLink to paper
    Bridget Harris
    In Coll. of: The Emerald Handbook of Feminism, Criminology and Social Change, 2020, Emerald
  • Using technology to control intimate partners: An exploratory study of college undergraduates File download iconCached PDF download iconBibTeX download iconLink to paper
    Sloane Burke, Michele Wallen, Karen Vail-Smith, David Knox
    Article in: Computers in Human Behavior 27., 2011,
  • Technology-Facilitated Abuse Prevalence and Associations Among a Nationally Representative Sample of Young Men PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Laura Seewald, Tova B. Walsh, Richard M. Tolman, Shawna J. Lee, Lauren A. Reed, Quyen Ngo, Vijay Singh
    Article in: The Annals of Family Medicine 20.1, 2022, The Annals of Family Medicine
  • Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control File download iconCached PDF download iconBibTeX download iconLink to paper
    Delanie Woodlock, Mandy McKenzie, Deborah Western, Bridget Harris
    Article in: Australian Social Work 73.3, 2020, Routledge
  • Women, Domestic Violence Service Providers, and Knowledge of Technology-Related Abuse File download iconCached PDF download iconBibTeX download iconLink to paper
    Nadine E White
    Miscellaneous, 2019
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • Technology-facilitated stalking: findings and resources from the SmartSafe project PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Delanie Woodlock
    Miscellaneous, 2013
  • The Abuse of Technology in Domestic Violence and Stalking File download iconCached PDF download iconBibTeX download iconLink to paper
    Delanie Woodlock
    Article in: Violence Against Women 23., 2016,
  • Digital Coercive Control: Insights from Two Landmark Domestic Violence Studies File download iconCached PDF download iconBibTeX download iconLink to paper
    Bridget Harris, Delanie Woodlock
    Article in: British Journal of Criminology 59., 2018,
  • Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control File download iconCached PDF download iconBibTeX download iconLink to paper
    Delanie Woodlock, Mandy McKenzie, Deborah Western, Bridget Harris
    Article in: Australian Social Work 73.3, 2020, Routledge
  • Technology Related Violence Aganst Women - Investigating Tech Related Violence Against Women in Peri-Urban Areas of Uganda PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Wougnet, APC, Sida
    Article in: ., 2018,
  • Technology-Facilitated Domestic Abuse in Political Economy: A New Theoretical Framework File download iconCached PDF download iconBibTeX download iconLink to paper
    Elizabeth Yardley
    Article in: Violence Against Women 0.0, 2020, PMID: 32757887
  • Intimate Partner Digital Abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Michelle Ybarra, Myeshia Price-Feeney, Amanda Lenhart, Kathryn Zickuhr
    Miscellaneous, 2017
  • Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason Hong
    In Proc. of: Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, 2018, USENIX Association
  • Intimate Partner Digital Abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Michelle Ybarra, Myeshia Price-Feeney, Amanda Lenhart, Kathryn Zickuhr
    Miscellaneous, 2017
  • The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, Acar Tamersoy
    In Proc. of: 30th USENIX Security Symposium (USENIX Security 21), 2021, USENIX Association
  • Cyber-Violence: Digital Abuse in the Context of Domestic Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Hadeel al-alosi
    Article in: ., 2018,
  • No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Enze Liu, Sumanth Rao, Sam Havron, Grant Ho Stefan Savage, Damon McCoy Geoffrey M. Voelker and
    In Proc. of: Privacy Enhancing Technologies Symposium, 2023,
  • Diagnóstico de violencia de género digital en Ecuador PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Navegando red
    Miscellaneous, 2020
  • Domestic violence and information communication technologies File download iconCached PDF download iconBibTeX download iconLink to paper
    J. P. Dimond, C. Fiesler, A. S. Bruckman
    Article in: Interacting with Computers 23.5, 2011,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • Domestic violence and information communication technologies File download iconCached PDF download iconBibTeX download iconLink to paper
    J. P. Dimond, C. Fiesler, A. S. Bruckman
    Article in: Interacting with Computers 23.5, 2011,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • Domestic violence and information communication technologies File download iconCached PDF download iconBibTeX download iconLink to paper
    J. P. Dimond, C. Fiesler, A. S. Bruckman
    Article in: Interacting with Computers 23.5, 2011,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
Icons taken without modification from Font Awesome.