-
The Spyware Used in Intimate Partner Violence



R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence



R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence



R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence



R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence



R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence



R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence



R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence



R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence



R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
The Spyware Used in Intimate Partner Violence



R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
-
Technology-facilitated stalking: findings and resources from the SmartSafe project



Delanie Woodlock
Miscellaneous, 2013
-
The Abuse of Technology in Domestic Violence and Stalking



Delanie Woodlock
Article in: Violence Against Women 23., 2016,
-
Digital Coercive Control: Insights from Two Landmark Domestic Violence Studies



Bridget Harris, Delanie Woodlock
Article in: British Journal of Criminology 59., 2018,
-
Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control



Delanie Woodlock, Mandy McKenzie, Deborah Western, Bridget Harris
Article in: Australian Social Work 73.3, 2020, Routledge
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse



Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
'I Really Just Leaned on My Community for Support': Barriers, Challenges, and Coping Mechanisms Used by Survivors of Technology-Facilitated Abuse to Seek Social Support



Naman Gupta, Kate Walsh, Sanchari Das, Rahul Chatterjee
In Proc. of: USENIX Security 2024, 2024,
-
A Critical Analysis of the Prevalence of Technology-Facilitated Abuse in US College Students



Naman Gupta, Sanchari Das, Kate Walsh, Rahul Chatterjee
In Proc. of: ACM CHI Conference on Human Factors in Computing Systems (Late Breaking Work) 2024, 2024,
-
Analyzing the Monetization Ecosystem of Stalkerware



Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse



Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
The New Age of Stalking: Technological Implications for Stalking



Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, Sarah Tucker
Article in: Juvenile and Family Court Journal 61., 2010,
-
Intimate Partner Violence, Technology, and Stalking


Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
Article in: Violence against women 13., 2007,
-
“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence



Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
-
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums



Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
-
“So-called privacy breeds evil”: Narrative Justifications for Intimate Partner Surveillance in Online Forums



Rosanna Bellini, Emily Tseng
In Proc. of: , 2020,
-
A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19



Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
Article in: ., 2021,
-
Care Infrastructures for Digital Security in Intimate Partner Violence



Emily Tseng, Mehrnaz Sabet, Rosanna Bellini, Harkiran Kaur Sodhi, Thomas Ristenpart, Nicola Dell
In Proc. of: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, 2022, Association for Computing Machinery
-
Analyzing the Monetization Ecosystem of Stalkerware



Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse



Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
In Proc. of: , 2019,
-
‘Internet of Things’: How Abuse is Getting Smarter



Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
Article in: SSRN Electronic Journal 63., 2019,
-
Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse



Leonie Tanczer, Isabel Neira, Simon Edward Parkin, Trupti N Patel, George Danezis
In Proc. of: , 2018,
-
‘I feel like we’re really behind the game’: perspectives of the United Kingdom’s intimate partner violence support sector on the rise of technology-facilitated abuse



Leonie Tanczer, Isabel López-Neira, Simon Parkin
Article in: Journal of Gender-Based Violence ., 2021,
-
Safeguarding patients from technology-facilitated abuse in clinical settings: A narrative review



Isabel Straw, Leonie Tanczer
Article in: PLOS Digital Health 2.1, 2023,
-
Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions



Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
Book, , 2021
Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
-
Networks of Care: Tech Abuse Advocates\textquoteright Digital Security Practices



Julia Slupska, Angelika Strohmayer
In Proc. of: 31st USENIX Security Symposium (USENIX Security 22), 2022, USENIX Association
-
Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse



Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
“It’s the Equivalent of Feeling Like You’re in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse



Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices



Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
Threat Modeling Intimate Partner Violence: Tech Abuse as a Cybersecurity Challenge in the Internet of Things



Julia Slupska, Leonie Maria Tanczer
Article in: ., 2021,
-
Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions



Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
Book, , 2021
Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
-
Networks of Care: Tech Abuse Advocates\textquoteright Digital Security Practices



Julia Slupska, Angelika Strohmayer
In Proc. of: 31st USENIX Security Symposium (USENIX Security 22), 2022, USENIX Association
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse



Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse



Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence



Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
-
Clinical Computer Security for Victims of Intimate Partner Violence



Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
-
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders



Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
-
A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology



Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
-
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums



Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
-
A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19



Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
Article in: ., 2021,
-
The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence



Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, Acar Tamersoy
In Proc. of: 30th USENIX Security Symposium (USENIX Security 21), 2021, USENIX Association
-
Care Infrastructures for Digital Security in Intimate Partner Violence



Emily Tseng, Mehrnaz Sabet, Rosanna Bellini, Harkiran Kaur Sodhi, Thomas Ristenpart, Nicola Dell
In Proc. of: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, 2022, Association for Computing Machinery
-
Analyzing the Monetization Ecosystem of Stalkerware



Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
Analyzing the Monetization Ecosystem of Stalkerware



Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse



Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
In Proc. of: , 2019,
-
‘Internet of Things’: How Abuse is Getting Smarter



Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
Article in: SSRN Electronic Journal 63., 2019,
-
Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse



Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
In Proc. of: , 2019,
-
‘Internet of Things’: How Abuse is Getting Smarter



Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
Article in: SSRN Electronic Journal 63., 2019,
-
‘I feel like we’re really behind the game’: perspectives of the United Kingdom’s intimate partner violence support sector on the rise of technology-facilitated abuse



Leonie Tanczer, Isabel López-Neira, Simon Parkin
Article in: Journal of Gender-Based Violence ., 2021,
-
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders



Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
-
A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology



Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse



Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry



Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
Miscellaneous, 2019
-
The commodification of mobile phone surveillance: An analysis of the consumer spyware industry



Diarmaid Harkin, Adam Molnar, Erica Vowles
Article in: Crime, Media, Culture: An International Journal ., 2019,
-
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders



Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
-
A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology



Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
-
Clinical Computer Security for Victims of Intimate Partner Violence



Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
-
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums



Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse



Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse



Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse



Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
In Proc. of: , 2019,
-
‘Internet of Things’: How Abuse is Getting Smarter



Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
Article in: SSRN Electronic Journal 63., 2019,
-
Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers



Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
-
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps



Enze Liu, Sumanth Rao, Sam Havron, Grant Ho Stefan Savage, Damon McCoy Geoffrey M. Voelker and
In Proc. of: Privacy Enhancing Technologies Symposium, 2023,
-
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders



Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
-
Privacy threats in intimate relationships



Karen Levy, Bruce Schneier
Article in: ArXiv abs/2006.03907., 2020,
-
A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology



Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
-
The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry



Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
Miscellaneous, 2019
-
Installing Fear - A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications



Cynthia Khoo, Kate Robertson, Ronald Deibert
Miscellaneous, 2019
-
Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse



Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices



Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence



Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
-
Clinical Computer Security for Victims of Intimate Partner Violence



Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
-
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps



Enze Liu, Sumanth Rao, Sam Havron, Grant Ho Stefan Savage, Damon McCoy Geoffrey M. Voelker and
In Proc. of: Privacy Enhancing Technologies Symposium, 2023,
-
Digital Coercive Control: Insights from Two Landmark Domestic Violence Studies



Bridget Harris, Delanie Woodlock
Article in: British Journal of Criminology 59., 2018,
-
Technology-facilitated Domestic and Family Violence: Women’s Experiences



Heather Douglas, Bridget Harris, Molly Dragiewicz
Article in: British Journal of Criminology 59., 2019,
-
Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control



Delanie Woodlock, Mandy McKenzie, Deborah Western, Bridget Harris
Article in: Australian Social Work 73.3, 2020, Routledge
-
Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions



Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
Book, , 2021
Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
-
'I Really Just Leaned on My Community for Support': Barriers, Challenges, and Coping Mechanisms Used by Survivors of Technology-Facilitated Abuse to Seek Social Support



Naman Gupta, Kate Walsh, Sanchari Das, Rahul Chatterjee
In Proc. of: USENIX Security 2024, 2024,
-
A Critical Analysis of the Prevalence of Technology-Facilitated Abuse in US College Students



Naman Gupta, Sanchari Das, Kate Walsh, Rahul Chatterjee
In Proc. of: ACM CHI Conference on Human Factors in Computing Systems (Late Breaking Work) 2024, 2024,
-
Analyzing the Patterns and Behavior of Users When Detecting and Preventing Tech-enabled Stalking



Rose Ceccio, Naman Gupta, Majed Almansoori, Rahul Chatterjee
In Proc. of: Symposium on Usable Security and Privacy (USEC), Network and Distributed System Security (NDSS) 2023, 2023,
-
Analyzing the Monetization Ecosystem of Stalkerware



Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
Analyzing the Monetization Ecosystem of Stalkerware



Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence



Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
-
A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance



Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, Rahul Chatterjee
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
Analyzing the Monetization Ecosystem of Stalkerware



Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence



Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
-
Clinical Computer Security for Victims of Intimate Partner Violence



Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
-
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders



Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
-
A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology



Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
-
A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19



Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
Article in: ., 2021,
-
The New Age of Stalking: Technological Implications for Stalking



Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, Sarah Tucker
Article in: Juvenile and Family Court Journal 61., 2010,
-
Intimate Partner Violence, Technology, and Stalking


Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
Article in: Violence against women 13., 2007,
-
Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse



Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
“It’s the Equivalent of Feeling Like You’re in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse



Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions



Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
Book, , 2021
Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
-
“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence



Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
-
Clinical Computer Security for Victims of Intimate Partner Violence



Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
-
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders



Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
-
A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology



Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
-
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums



Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
-
A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19



Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
Article in: ., 2021,
-
The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence



Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, Acar Tamersoy
In Proc. of: 30th USENIX Security Symposium (USENIX Security 21), 2021, USENIX Association
-
Care Infrastructures for Digital Security in Intimate Partner Violence



Emily Tseng, Mehrnaz Sabet, Rosanna Bellini, Harkiran Kaur Sodhi, Thomas Ristenpart, Nicola Dell
In Proc. of: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, 2022, Association for Computing Machinery
-
'I Really Just Leaned on My Community for Support': Barriers, Challenges, and Coping Mechanisms Used by Survivors of Technology-Facilitated Abuse to Seek Social Support



Naman Gupta, Kate Walsh, Sanchari Das, Rahul Chatterjee
In Proc. of: USENIX Security 2024, 2024,
-
A Critical Analysis of the Prevalence of Technology-Facilitated Abuse in US College Students



Naman Gupta, Sanchari Das, Kate Walsh, Rahul Chatterjee
In Proc. of: ACM CHI Conference on Human Factors in Computing Systems (Late Breaking Work) 2024, 2024,
-
‘Internet of Things’: How Abuse is Getting Smarter



Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
Article in: SSRN Electronic Journal 63., 2019,
-
Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse



Leonie Tanczer, Isabel Neira, Simon Edward Parkin, Trupti N Patel, George Danezis
In Proc. of: , 2018,
-
Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions



Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
Book, , 2021
Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse



Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
Stories from survivors: Privacy & security practices when coping with intimate partner abuse



Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
In Proc. of: , 2017,
-
“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence



Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
-
Clinical Computer Security for Victims of Intimate Partner Violence



Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
-
A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance



Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, Rahul Chatterjee
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
'I Really Just Leaned on My Community for Support': Barriers, Challenges, and Coping Mechanisms Used by Survivors of Technology-Facilitated Abuse to Seek Social Support



Naman Gupta, Kate Walsh, Sanchari Das, Rahul Chatterjee
In Proc. of: USENIX Security 2024, 2024,
-
A Critical Analysis of the Prevalence of Technology-Facilitated Abuse in US College Students



Naman Gupta, Sanchari Das, Kate Walsh, Rahul Chatterjee
In Proc. of: ACM CHI Conference on Human Factors in Computing Systems (Late Breaking Work) 2024, 2024,
-
Analyzing the Patterns and Behavior of Users When Detecting and Preventing Tech-enabled Stalking



Rose Ceccio, Naman Gupta, Majed Almansoori, Rahul Chatterjee
In Proc. of: Symposium on Usable Security and Privacy (USEC), Network and Distributed System Security (NDSS) 2023, 2023,
-
The Web of Abuse: A Comprehensive Analysis of Online Resource in the Context of Technology-Enabled Intimate Partner Surveillance



Majed Almansoori, Mazharul Islam, Saptarshi Ghosh, Mainack Mondal, Rahul Chatterjee
Article in: 2024 IEEE European Symposium on Security and Privacy (EuroS\&P) ., 2024,
-
Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse



Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
“It’s the Equivalent of Feeling Like You’re in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse



Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices



Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
Analyzing the Patterns and Behavior of Users When Detecting and Preventing Tech-enabled Stalking



Rose Ceccio, Naman Gupta, Majed Almansoori, Rahul Chatterjee
In Proc. of: Symposium on Usable Security and Privacy (USEC), Network and Distributed System Security (NDSS) 2023, 2023,
-
Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices



Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
Analyzing the Monetization Ecosystem of Stalkerware



Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
Analyzing the Monetization Ecosystem of Stalkerware



Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums



Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
-
“So-called privacy breeds evil”: Narrative Justifications for Intimate Partner Surveillance in Online Forums



Rosanna Bellini, Emily Tseng
In Proc. of: , 2020,
-
Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions



Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
Book, , 2021
Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
-
Paying the Price: When Intimate Partners Use Technology for Financial Harm



Rosanna Bellini
In Proc. of: Proc. CHI, 2023,
-
Care Infrastructures for Digital Security in Intimate Partner Violence



Emily Tseng, Mehrnaz Sabet, Rosanna Bellini, Harkiran Kaur Sodhi, Thomas Ristenpart, Nicola Dell
In Proc. of: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, 2022, Association for Computing Machinery
-
A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance



Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, Rahul Chatterjee
In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
-
Analyzing the Patterns and Behavior of Users When Detecting and Preventing Tech-enabled Stalking



Rose Ceccio, Naman Gupta, Majed Almansoori, Rahul Chatterjee
In Proc. of: Symposium on Usable Security and Privacy (USEC), Network and Distributed System Security (NDSS) 2023, 2023,
-
The Web of Abuse: A Comprehensive Analysis of Online Resource in the Context of Technology-Enabled Intimate Partner Surveillance



Majed Almansoori, Mazharul Islam, Saptarshi Ghosh, Mainack Mondal, Rahul Chatterjee
Article in: 2024 IEEE European Symposium on Security and Privacy (EuroS\&P) ., 2024,
-
Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse



Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,
-
“It’s the Equivalent of Feeling Like You’re in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse



Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Rahul Chatterjee
In Proc. of: Proc. USENIX Security, 2023,