-
A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance
Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, Rahul Chatterjee
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
Analyzing the Patterns and Behavior of Users When Detecting and Preventing Tech-enabled Stalking
Rose Ceccio, Naman Gupta, Majed Almansoori, Rahul Chatterjee
In Proc. of: Symposium on Usable Security and Privacy (USEC), Network and Distributed System Security (NDSS) 2023, 2023,
-
The Web of Abuse: A Comprehensive Analysis of Online Resource in the Context of Technology-Enabled Intimate Partner Surveillance
Majed Almansoori, Mazharul Islam, Saptarshi Ghosh, Mainack Mondal, Rahul Chatterjee
Article in: 2024 IEEE European Symposium on Security and Privacy (EuroS\&P) ., 2024,
-
Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse
Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
“It’s the Equivalent of Feeling Like You’re in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse
Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums
Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
-
“So-called privacy breeds evil”: Narrative Justifications for Intimate Partner Surveillance in Online Forums
Rosanna Bellini, Emily Tseng
In Proc. of: , 2020,
-
Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions
Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
Book, , 2021
Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
-
Paying the Price: When Intimate Partners Use Technology for Financial Harm
Rosanna Bellini
In Proc. of: Proc. CHI, 2023,
-
Care Infrastructures for Digital Security in Intimate Partner Violence
Emily Tseng, Mehrnaz Sabet, Rosanna Bellini, Harkiran Kaur Sodhi, Thomas Ristenpart, Nicola Dell
In Proc. of: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, 2022, Association for Computing Machinery
-
Analyzing the Monetization Ecosystem of Stalkerware
Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
Analyzing the Monetization Ecosystem of Stalkerware
Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
Analyzing the Patterns and Behavior of Users When Detecting and Preventing Tech-enabled Stalking
Rose Ceccio, Naman Gupta, Majed Almansoori, Rahul Chatterjee
In Proc. of: Symposium on Usable Security and Privacy (USEC), Network and Distributed System Security (NDSS) 2023, 2023,
-
Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices
Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence
Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
-
Clinical Computer Security for Victims of Intimate Partner Violence
Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
-
A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance
Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, Rahul Chatterjee
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
``I Really Just Leaned on My Community for Support'': Barriers, Challenges, and Coping Mechanisms Used by Survivors of Technology-Facilitated Abuse to Seek Social Support
Naman Gupta, Kate Walsh, Sanchari Das, Rahul Chatterjee
In Proc. of: USENIX Security 2024, 2024,
-
A Critical Analysis of the Prevalence of Technology-Facilitated Abuse in US College Students
Naman Gupta, Sanchari Das, Kate Walsh, Rahul Chatterjee
In Proc. of: ACM CHI Conference on Human Factors in Computing Systems (Late Breaking Work) 2024, 2024,
-
Analyzing the Patterns and Behavior of Users When Detecting and Preventing Tech-enabled Stalking
Rose Ceccio, Naman Gupta, Majed Almansoori, Rahul Chatterjee
In Proc. of: Symposium on Usable Security and Privacy (USEC), Network and Distributed System Security (NDSS) 2023, 2023,
-
The Web of Abuse: A Comprehensive Analysis of Online Resource in the Context of Technology-Enabled Intimate Partner Surveillance
Majed Almansoori, Mazharul Islam, Saptarshi Ghosh, Mainack Mondal, Rahul Chatterjee
Article in: 2024 IEEE European Symposium on Security and Privacy (EuroS\&P) ., 2024,
-
Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse
Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
“It’s the Equivalent of Feeling Like You’re in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse
Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices
Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse
Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse
Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions
Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
Book, , 2021
Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
-
‘Internet of Things’: How Abuse is Getting Smarter
Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
Article in: SSRN Electronic Journal 63., 2019,
-
Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse
Leonie Tanczer, Isabel Neira, Simon Edward Parkin, Trupti N Patel, George Danezis
In Proc. of: , 2018,
-
``I Really Just Leaned on My Community for Support'': Barriers, Challenges, and Coping Mechanisms Used by Survivors of Technology-Facilitated Abuse to Seek Social Support
Naman Gupta, Kate Walsh, Sanchari Das, Rahul Chatterjee
In Proc. of: USENIX Security 2024, 2024,
-
A Critical Analysis of the Prevalence of Technology-Facilitated Abuse in US College Students
Naman Gupta, Sanchari Das, Kate Walsh, Rahul Chatterjee
In Proc. of: ACM CHI Conference on Human Factors in Computing Systems (Late Breaking Work) 2024, 2024,
-
“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence
Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
-
Clinical Computer Security for Victims of Intimate Partner Violence
Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
-
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
-
A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
-
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums
Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
-
A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19
Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
Article in: ., 2021,
-
The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence
Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, Acar Tamersoy
In Proc. of: 30th USENIX Security Symposium (USENIX Security 21), 2021, USENIX Association
-
Care Infrastructures for Digital Security in Intimate Partner Violence
Emily Tseng, Mehrnaz Sabet, Rosanna Bellini, Harkiran Kaur Sodhi, Thomas Ristenpart, Nicola Dell
In Proc. of: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, 2022, Association for Computing Machinery
-
Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions
Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
Book, , 2021
Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
-
Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse
Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
“It’s the Equivalent of Feeling Like You’re in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse
Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
The New Age of Stalking: Technological Implications for Stalking
Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, Sarah Tucker
Article in: Juvenile and Family Court Journal 61., 2010,
-
Intimate Partner Violence, Technology, and Stalking
Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
Article in: Violence against women 13., 2007,
-
“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence
Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
-
Clinical Computer Security for Victims of Intimate Partner Violence
Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
-
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
-
A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
-
A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19
Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
Article in: ., 2021,
-
Analyzing the Monetization Ecosystem of Stalkerware
Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence
Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
-
A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance
Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, Rahul Chatterjee
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
Analyzing the Monetization Ecosystem of Stalkerware
Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
Analyzing the Monetization Ecosystem of Stalkerware
Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
``I Really Just Leaned on My Community for Support'': Barriers, Challenges, and Coping Mechanisms Used by Survivors of Technology-Facilitated Abuse to Seek Social Support
Naman Gupta, Kate Walsh, Sanchari Das, Rahul Chatterjee
In Proc. of: USENIX Security 2024, 2024,
-
A Critical Analysis of the Prevalence of Technology-Facilitated Abuse in US College Students
Naman Gupta, Sanchari Das, Kate Walsh, Rahul Chatterjee
In Proc. of: ACM CHI Conference on Human Factors in Computing Systems (Late Breaking Work) 2024, 2024,
-
Analyzing the Patterns and Behavior of Users When Detecting and Preventing Tech-enabled Stalking
Rose Ceccio, Naman Gupta, Majed Almansoori, Rahul Chatterjee
In Proc. of: Symposium on Usable Security and Privacy (USEC), Network and Distributed System Security (NDSS) 2023, 2023,
-
Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions
Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
Book, , 2021
Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
-
Digital Coercive Control: Insights from Two Landmark Domestic Violence Studies
Bridget Harris, Delanie Woodlock
Article in: British Journal of Criminology 59., 2018,
-
Technology-facilitated Domestic and Family Violence: Women’s Experiences
Heather Douglas, Bridget Harris, Molly Dragiewicz
Article in: British Journal of Criminology 59., 2019,
-
Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control
Delanie Woodlock, Mandy McKenzie, Deborah Western, Bridget Harris
Article in: Australian Social Work 73.3, 2020, Routledge
-
“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence
Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
-
Clinical Computer Security for Victims of Intimate Partner Violence
Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
-
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps
Enze Liu, Sumanth Rao, Sam Havron, Grant Ho Stefan Savage, Damon McCoy Geoffrey M. Voelker and
In Proc. of: Privacy Enhancing Technologies Symposium, 2023,
-
Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse
Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices
Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry
Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
Miscellaneous, 2019
-
Installing Fear - A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications
Cynthia Khoo, Kate Robertson, Ronald Deibert
Miscellaneous, 2019
-
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
-
Privacy threats in intimate relationships
Karen Levy, Bruce Schneier
Article in: ArXiv abs/2006.03907., 2020,
-
A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
-
Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers
Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
-
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps
Enze Liu, Sumanth Rao, Sam Havron, Grant Ho Stefan Savage, Damon McCoy Geoffrey M. Voelker and
In Proc. of: Privacy Enhancing Technologies Symposium, 2023,
-
Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse
Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
In Proc. of: , 2019,
-
‘Internet of Things’: How Abuse is Getting Smarter
Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
Article in: SSRN Electronic Journal 63., 2019,
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse
Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse
Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
Clinical Computer Security for Victims of Intimate Partner Violence
Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
-
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums
Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
-
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
-
A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
-
The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry
Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
Miscellaneous, 2019
-
The commodification of mobile phone surveillance: An analysis of the consumer spyware industry
Diarmaid Harkin, Adam Molnar, Erica Vowles
Article in: Crime, Media, Culture: An International Journal ., 2019,
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse
Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
-
A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
-
Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse
Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
In Proc. of: , 2019,
-
‘Internet of Things’: How Abuse is Getting Smarter
Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
Article in: SSRN Electronic Journal 63., 2019,
-
‘I feel like we’re really behind the game’: perspectives of the United Kingdom’s intimate partner violence support sector on the rise of technology-facilitated abuse
Leonie Tanczer, Isabel López-Neira, Simon Parkin
Article in: Journal of Gender-Based Violence ., 2021,
-
Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse
Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
In Proc. of: , 2019,
-
‘Internet of Things’: How Abuse is Getting Smarter
Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
Article in: SSRN Electronic Journal 63., 2019,
-
Analyzing the Monetization Ecosystem of Stalkerware
Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
Analyzing the Monetization Ecosystem of Stalkerware
Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence
Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
-
Clinical Computer Security for Victims of Intimate Partner Violence
Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
-
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
-
A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
-
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums
Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
-
A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19
Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
Article in: ., 2021,
-
The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence
Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, Acar Tamersoy
In Proc. of: 30th USENIX Security Symposium (USENIX Security 21), 2021, USENIX Association
-
Care Infrastructures for Digital Security in Intimate Partner Violence
Emily Tseng, Mehrnaz Sabet, Rosanna Bellini, Harkiran Kaur Sodhi, Thomas Ristenpart, Nicola Dell
In Proc. of: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, 2022, Association for Computing Machinery
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse
Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse
Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
Threat Modeling Intimate Partner Violence: Tech Abuse as a Cybersecurity Challenge in the Internet of Things
Julia Slupska, Leonie Maria Tanczer
Article in: ., 2021,
-
Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions
Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
Book, , 2021
Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
-
Networks of Care: Tech Abuse Advocates\textquoteright Digital Security Practices
Julia Slupska, Angelika Strohmayer
In Proc. of: 31st USENIX Security Symposium (USENIX Security 22), 2022, USENIX Association
-
Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse
Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
“It’s the Equivalent of Feeling Like You’re in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse
Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices
Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions
Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
Book, , 2021
Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
-
Networks of Care: Tech Abuse Advocates\textquoteright Digital Security Practices
Julia Slupska, Angelika Strohmayer
In Proc. of: 31st USENIX Security Symposium (USENIX Security 22), 2022, USENIX Association
-
Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse
Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
In Proc. of: , 2019,
-
‘Internet of Things’: How Abuse is Getting Smarter
Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
Article in: SSRN Electronic Journal 63., 2019,
-
Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse
Leonie Tanczer, Isabel Neira, Simon Edward Parkin, Trupti N Patel, George Danezis
In Proc. of: , 2018,
-
‘I feel like we’re really behind the game’: perspectives of the United Kingdom’s intimate partner violence support sector on the rise of technology-facilitated abuse
Leonie Tanczer, Isabel López-Neira, Simon Parkin
Article in: Journal of Gender-Based Violence ., 2021,
-
Safeguarding patients from technology-facilitated abuse in clinical settings: A narrative review
Isabel Straw, Leonie Tanczer
Article in: PLOS Digital Health 2.1, 2023,
-
Analyzing the Monetization Ecosystem of Stalkerware
Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence
Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
-
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums
Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
-
“So-called privacy breeds evil”: Narrative Justifications for Intimate Partner Surveillance in Online Forums
Rosanna Bellini, Emily Tseng
In Proc. of: , 2020,
-
A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19
Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
Article in: ., 2021,
-
Care Infrastructures for Digital Security in Intimate Partner Violence
Emily Tseng, Mehrnaz Sabet, Rosanna Bellini, Harkiran Kaur Sodhi, Thomas Ristenpart, Nicola Dell
In Proc. of: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, 2022, Association for Computing Machinery
-
The New Age of Stalking: Technological Implications for Stalking
Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, Sarah Tucker
Article in: Juvenile and Family Court Journal 61., 2010,
-
Intimate Partner Violence, Technology, and Stalking
Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
Article in: Violence against women 13., 2007,
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse
Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
Analyzing the Monetization Ecosystem of Stalkerware
Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
``I Really Just Leaned on My Community for Support'': Barriers, Challenges, and Coping Mechanisms Used by Survivors of Technology-Facilitated Abuse to Seek Social Support
Naman Gupta, Kate Walsh, Sanchari Das, Rahul Chatterjee
In Proc. of: USENIX Security 2024, 2024,
-
A Critical Analysis of the Prevalence of Technology-Facilitated Abuse in US College Students
Naman Gupta, Sanchari Das, Kate Walsh, Rahul Chatterjee
In Proc. of: ACM CHI Conference on Human Factors in Computing Systems (Late Breaking Work) 2024, 2024,
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse
Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
Technology-facilitated stalking: findings and resources from the SmartSafe project
Delanie Woodlock
Miscellaneous, 2013
-
The Abuse of Technology in Domestic Violence and Stalking
Delanie Woodlock
Article in: Violence Against Women 23., 2016,
-
Digital Coercive Control: Insights from Two Landmark Domestic Violence Studies
Bridget Harris, Delanie Woodlock
Article in: British Journal of Criminology 59., 2018,
-
Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control
Delanie Woodlock, Mandy McKenzie, Deborah Western, Bridget Harris
Article in: Australian Social Work 73.3, 2020, Routledge
-
The Spyware Used in Intimate Partner Violence
R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence
R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence
R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence
R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence
R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence
R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence
R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence
R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence
R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence
R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,