Selected Research Papers on Technology used in Intimate Partner Violence

open access logo

Content Warning: this page contains content related to intimate partner violence


IPVTechBib is an online archive of selected research papers on Technology used in Intimate Partner violence. The icons next to each paper make it easy to download, cite, and link to papers. If you think I missed a paper, let me know. This page was largely inspired by the great Censorbib webpage. You can sort papers by year, reverse year (default), author, and reverse author.


If you are victim of surveillance in an intimate relationship, you can get support from organisations such as the National Network to End Domestic Violence in the US, the Refuge for women and children against domestic violence in UK, or la fédération nationale Solidarité France en France.

source code book 47 Papers
source code icon IPVTechBib code
update icon Last update: 2021-02-04
donate icon About Me
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • Domestic violence and information communication technologies File download iconCached PDF download iconBibTeX download iconLink to paper
    J. P. Dimond, C. Fiesler, A. S. Bruckman
    Article in: Interacting with Computers 23.5, 2011,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • Domestic violence and information communication technologies File download iconCached PDF download iconBibTeX download iconLink to paper
    J. P. Dimond, C. Fiesler, A. S. Bruckman
    Article in: Interacting with Computers 23.5, 2011,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • Domestic violence and information communication technologies File download iconCached PDF download iconBibTeX download iconLink to paper
    J. P. Dimond, C. Fiesler, A. S. Bruckman
    Article in: Interacting with Computers 23.5, 2011,
  • Cyber-Violence: Digital Abuse in the Context of Domestic Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Hadeel al-alosi
    Article in: ., 2018,
  • Intimate Partner Digital Abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Michelle Ybarra, Myeshia Price-Feeney, Amanda Lenhart, Kathryn Zickuhr
    Miscellaneous, 2017
  • Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason Hong
    In Proc. of: Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, 2018, USENIX Association
  • Intimate Partner Digital Abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Michelle Ybarra, Myeshia Price-Feeney, Amanda Lenhart, Kathryn Zickuhr
    Miscellaneous, 2017
  • Technology-Facilitated Domestic Abuse in Political Economy: A New Theoretical Framework File download iconCached PDF download iconBibTeX download iconLink to paper
    Elizabeth Yardley
    Article in: Violence Against Women 0.0, 2020, PMID: 32757887
  • Technology Related Violence Aganst Women - Investigating Tech Related Violence Against Women in Peri-Urban Areas of Uganda PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Wougnet, APC, Sida
    Article in: ., 2018,
  • Technology-facilitated stalking: findings and resources from the SmartSafe project PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Delanie Woodlock
    Miscellaneous, 2013
  • The Abuse of Technology in Domestic Violence and Stalking File download iconCached PDF download iconBibTeX download iconLink to paper
    Delanie Woodlock
    Article in: Violence Against Women 23., 2016,
  • Digital Coercive Control: Insights from Two Landmark Domestic Violence Studies File download iconCached PDF download iconBibTeX download iconLink to paper
    Bridget Harris, Delanie Woodlock
    Article in: British Journal of Criminology 59., 2018,
  • Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control File download iconCached PDF download iconBibTeX download iconLink to paper
    Delanie Woodlock, Mandy McKenzie, Deborah Western, Bridget Harris
    Article in: Australian Social Work 73.3, 2020, Routledge
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • Women, Domestic Violence Service Providers, and Knowledge of Technology-Related Abuse File download iconCached PDF download iconBibTeX download iconLink to paper
    Nadine E White
    Miscellaneous, 2019
  • Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control File download iconCached PDF download iconBibTeX download iconLink to paper
    Delanie Woodlock, Mandy McKenzie, Deborah Western, Bridget Harris
    Article in: Australian Social Work 73.3, 2020, Routledge
  • Using technology to control intimate partners: An exploratory study of college undergraduates File download iconCached PDF download iconBibTeX download iconLink to paper
    Sloane Burke, Michele Wallen, Karen Vail-Smith, David Knox
    Article in: Computers in Human Behavior 27., 2011,
  • Technology and violence against women File download iconBibTeX download iconLink to paper
    Bridget Harris
    In Coll. of: The Emerald Handbook of Feminism, Criminology and Social Change, 2020, Emerald
  • The commodification of mobile phone surveillance: An analysis of the consumer spyware industry File download iconCached PDF download iconBibTeX download iconLink to paper
    Diarmaid Harkin, Adam Molnar, Erica Vowles
    Article in: Crime, Media, Culture: An International Journal ., 2019,
  • Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers File download iconCached PDF download iconBibTeX download iconLink to paper
    Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
    In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
  • Using technology to control intimate partners: An exploratory study of college undergraduates File download iconCached PDF download iconBibTeX download iconLink to paper
    Sloane Burke, Michele Wallen, Karen Vail-Smith, David Knox
    Article in: Computers in Human Behavior 27., 2011,
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • The New Age of Stalking: Technological Implications for Stalking File download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, Sarah Tucker
    Article in: Juvenile and Family Court Journal 61., 2010,
  • Intimate Partner Violence, Technology, and Stalking Cached PDF download iconBibTeX download iconLink to paper
    Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
    Article in: Violence against women 13., 2007,
  • “Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
    Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • “So-called privacy breeds evil”: Narrative Justifications for Intimate Partner Surveillance in Online Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Rosanna Bellini, Emily Tseng
    In Proc. of: , 2020,
  • A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19 PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
    Article in: ., 2021,
  • Romantic Partner Monitoring After Breakups: Attachment, Dependence, Distress, and Post-Dissolution Online Surveillance via Social Networking Sites PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jesse Fox, Robert Tokunaga
    Article in: Cyberpsychology, Behavior, and Social Networking 18., 2015,
  • Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
    In Proc. of: , 2019,
  • ‘Internet of Things’: How Abuse is Getting Smarter File download iconCached PDF download iconBibTeX download iconLink to paper
    Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
    Article in: SSRN Electronic Journal 63., 2019,
  • Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Leonie Tanczer, Isabel Neira, Simon Edward Parkin, Trupti N Patel, George Danezis
    In Proc. of: , 2018,
  • The Many Kinds of Creepware Used for Interpersonal Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    K. A. Roundy, P. Barmaimon Mendelberg, N. Dell, D. McCoy, D. Nissani, T. Ristenpart, A. Tamersoy
    In Proc. of: 2020 IEEE Symposium on Security and Privacy (SP), 2020, IEEE Computer Society
  • The New Age of Stalking: Technological Implications for Stalking File download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, Sarah Tucker
    Article in: Juvenile and Family Court Journal 61., 2010,
  • Intimate Partner Violence, Technology, and Stalking Cached PDF download iconBibTeX download iconLink to paper
    Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
    Article in: Violence against women 13., 2007,
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • Technology Related Violence Aganst Women - Investigating Tech Related Violence Against Women in Peri-Urban Areas of Uganda PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Wougnet, APC, Sida
    Article in: ., 2018,
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason Hong
    In Proc. of: Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, 2018, USENIX Association
  • Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers File download iconCached PDF download iconBibTeX download iconLink to paper
    Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
    In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
  • Privacy threats in intimate relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Karen Levy, Bruce Schneier
    Article in: ArXiv abs/2006.03907., 2020,
  • Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers File download iconCached PDF download iconBibTeX download iconLink to paper
    Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
    In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
  • The Many Kinds of Creepware Used for Interpersonal Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    K. A. Roundy, P. Barmaimon Mendelberg, N. Dell, D. McCoy, D. Nissani, T. Ristenpart, A. Tamersoy
    In Proc. of: 2020 IEEE Symposium on Security and Privacy (SP), 2020, IEEE Computer Society
  • Installing Fear - A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Khoo, Kate Robertson, Ronald Deibert
    Miscellaneous, 2019
  • The Many Kinds of Creepware Used for Interpersonal Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    K. A. Roundy, P. Barmaimon Mendelberg, N. Dell, D. McCoy, D. Nissani, T. Ristenpart, A. Tamersoy
    In Proc. of: 2020 IEEE Symposium on Security and Privacy (SP), 2020, IEEE Computer Society
  • “Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
    Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
  • Clinical Computer Security for Victims of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
  • Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
  • A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19 PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
    Article in: ., 2021,
  • Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers File download iconCached PDF download iconBibTeX download iconLink to paper
    Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
    In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
  • Intimate Partner Digital Abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Michelle Ybarra, Myeshia Price-Feeney, Amanda Lenhart, Kathryn Zickuhr
    Miscellaneous, 2017
  • The Use of Information and Communication Technologies to Coerce and Control in Domestic Violence and Following Separation PDF download iconCached PDF download iconBibTeX download iconLink to paper
    T. Hand, D. Chung, M. Peters
    In Proc. of: , 2009,
  • Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
    In Proc. of: , 2019,
  • ‘Internet of Things’: How Abuse is Getting Smarter File download iconCached PDF download iconBibTeX download iconLink to paper
    Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
    Article in: SSRN Electronic Journal 63., 2019,
  • Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Leonie Tanczer, Isabel Neira, Simon Edward Parkin, Trupti N Patel, George Danezis
    In Proc. of: , 2018,
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
    In Proc. of: , 2019,
  • ‘Internet of Things’: How Abuse is Getting Smarter File download iconCached PDF download iconBibTeX download iconLink to paper
    Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
    Article in: SSRN Electronic Journal 63., 2019,
  • Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Leonie Tanczer, Isabel Neira, Simon Edward Parkin, Trupti N Patel, George Danezis
    In Proc. of: , 2018,
  • Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason Hong
    In Proc. of: Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, 2018, USENIX Association
  • Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
  • A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
  • Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers File download iconCached PDF download iconBibTeX download iconLink to paper
    Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
    In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • The New Age of Stalking: Technological Implications for Stalking File download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, Sarah Tucker
    Article in: Juvenile and Family Court Journal 61., 2010,
  • The Many Kinds of Creepware Used for Interpersonal Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    K. A. Roundy, P. Barmaimon Mendelberg, N. Dell, D. McCoy, D. Nissani, T. Ristenpart, A. Tamersoy
    In Proc. of: 2020 IEEE Symposium on Security and Privacy (SP), 2020, IEEE Computer Society
  • Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Leonie Tanczer, Isabel Neira, Simon Edward Parkin, Trupti N Patel, George Danezis
    In Proc. of: , 2018,
  • Smartphones Are Used To Stalk, Control Domestic Abuse Victims File download iconBibTeX download iconLink to paper
    NPR
    Webpage, https://www.npr.org/sections/alltechconsidered/2014/09/15/346149979/smartphones-are-used-to-stalk-control-domestic-abuse-victims, 2014
  • Inside the 'Stalkerware' Surveillance Market, Where Ordinary People Tap Each Other's Phones File download iconBibTeX download iconLink to paper
    Vice Motherboard
    Webpage, https://www.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x, 2017
  • Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Budi Arief, Kovila Coopamootoo, Martin Emms, Aad Moorsel
    Article in: Proceedings of the ACM Conference on Computer and Communications Security ., 2014,
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • The commodification of mobile phone surveillance: An analysis of the consumer spyware industry File download iconCached PDF download iconBibTeX download iconLink to paper
    Diarmaid Harkin, Adam Molnar, Erica Vowles
    Article in: Crime, Media, Culture: An International Journal ., 2019,
  • Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
  • A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
  • The Many Kinds of Creepware Used for Interpersonal Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    K. A. Roundy, P. Barmaimon Mendelberg, N. Dell, D. McCoy, D. Nissani, T. Ristenpart, A. Tamersoy
    In Proc. of: 2020 IEEE Symposium on Security and Privacy (SP), 2020, IEEE Computer Society
  • Stalking in the Context of Intimate Partner AbuseIn the Victims' Words File download iconCached PDF download iconBibTeX download iconLink to paper
    Heather Melton
    Article in: Feminist Criminology - FEM CRIMINOL 2., 2007,
  • Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control File download iconCached PDF download iconBibTeX download iconLink to paper
    Delanie Woodlock, Mandy McKenzie, Deborah Western, Bridget Harris
    Article in: Australian Social Work 73.3, 2020, Routledge
  • Intimate partner stalking and femicide: urgent implications for women's safety File download iconCached PDF download iconBibTeX download iconLink to paper
    Judith McFarlane, Jacquelyn Campbell, Kathy Jacquelyn
    Article in: Behavioral Sciences & the Law 20., 2002,
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • Technology and violence against women File download iconBibTeX download iconLink to paper
    Bridget Harris
    In Coll. of: The Emerald Handbook of Feminism, Criminology and Social Change, 2020, Emerald
  • The Many Kinds of Creepware Used for Interpersonal Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    K. A. Roundy, P. Barmaimon Mendelberg, N. Dell, D. McCoy, D. Nissani, T. Ristenpart, A. Tamersoy
    In Proc. of: 2020 IEEE Symposium on Security and Privacy (SP), 2020, IEEE Computer Society
  • Clinical Computer Security for Victims of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • Technology and violence against women File download iconBibTeX download iconLink to paper
    Bridget Harris
    In Coll. of: The Emerald Handbook of Feminism, Criminology and Social Change, 2020, Emerald
  • Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
    In Proc. of: , 2019,
  • ‘Internet of Things’: How Abuse is Getting Smarter File download iconCached PDF download iconBibTeX download iconLink to paper
    Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
    Article in: SSRN Electronic Journal 63., 2019,
  • Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers File download iconCached PDF download iconBibTeX download iconLink to paper
    Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
    In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
  • Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
  • Privacy threats in intimate relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Karen Levy, Bruce Schneier
    Article in: ArXiv abs/2006.03907., 2020,
  • A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
  • Intimate Surveillance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Karen E.C. Levy
    In Proc. of: Idaho Law Review 50, 2015,
  • Intimate Partner Digital Abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Michelle Ybarra, Myeshia Price-Feeney, Amanda Lenhart, Kathryn Zickuhr
    Miscellaneous, 2017
  • Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums File download iconCached PDF download iconBibTeX download iconLink to paper
    Roxanne Leitão
    Article in: Human–Computer Interaction 0.0, 2019, Taylor & Francis
  • Anticipating Smart Home Security and Privacy Threats with Survivors of Intimate Partner Abuse File download iconCached PDF download iconBibTeX download iconLink to paper
    Roxanne Leitão
    In Proc. of: , 2019,
  • The New Age of Stalking: Technological Implications for Stalking File download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, Sarah Tucker
    Article in: Juvenile and Family Court Journal 61., 2010,
  • Using technology to control intimate partners: An exploratory study of college undergraduates File download iconCached PDF download iconBibTeX download iconLink to paper
    Sloane Burke, Michele Wallen, Karen Vail-Smith, David Knox
    Article in: Computers in Human Behavior 27., 2011,
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • Installing Fear - A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Khoo, Kate Robertson, Ronald Deibert
    Miscellaneous, 2019
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • Intimate partner stalking and femicide: urgent implications for women's safety File download iconCached PDF download iconBibTeX download iconLink to paper
    Judith McFarlane, Jacquelyn Campbell, Kathy Jacquelyn
    Article in: Behavioral Sciences & the Law 20., 2002,
  • Assessing Technology in the Context of Violence Against Women & Children: Examining Benefits & Risks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    British Columbia Society Transition Houses
    Miscellaneous, 2013
  • Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason Hong
    In Proc. of: Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, 2018, USENIX Association
  • “Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
    Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
  • Clinical Computer Security for Victims of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • Digital Coercive Control: Insights from Two Landmark Domestic Violence Studies File download iconCached PDF download iconBibTeX download iconLink to paper
    Bridget Harris, Delanie Woodlock
    Article in: British Journal of Criminology 59., 2018,
  • Technology-facilitated Domestic and Family Violence: Women’s Experiences File download iconCached PDF download iconBibTeX download iconLink to paper
    Heather Douglas, Bridget Harris, Molly Dragiewicz
    Article in: British Journal of Criminology 59., 2019,
  • Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control File download iconCached PDF download iconBibTeX download iconLink to paper
    Delanie Woodlock, Mandy McKenzie, Deborah Western, Bridget Harris
    Article in: Australian Social Work 73.3, 2020, Routledge
  • The commodification of mobile phone surveillance: An analysis of the consumer spyware industry File download iconCached PDF download iconBibTeX download iconLink to paper
    Diarmaid Harkin, Adam Molnar, Erica Vowles
    Article in: Crime, Media, Culture: An International Journal ., 2019,
  • The Use of Information and Communication Technologies to Coerce and Control in Domestic Violence and Following Separation PDF download iconCached PDF download iconBibTeX download iconLink to paper
    T. Hand, D. Chung, M. Peters
    In Proc. of: , 2009,
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • “Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
    Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
  • “Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
    Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
  • Clinical Computer Security for Victims of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
  • Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
  • A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
  • A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19 PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
    Article in: ., 2021,
  • The New Age of Stalking: Technological Implications for Stalking File download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, Sarah Tucker
    Article in: Juvenile and Family Court Journal 61., 2010,
  • Intimate Partner Violence, Technology, and Stalking Cached PDF download iconBibTeX download iconLink to paper
    Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
    Article in: Violence against women 13., 2007,
  • Romantic Partner Monitoring After Breakups: Attachment, Dependence, Distress, and Post-Dissolution Online Surveillance via Social Networking Sites PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jesse Fox, Robert Tokunaga
    Article in: Cyberpsychology, Behavior, and Social Networking 18., 2015,
  • Technology and violence against women File download iconBibTeX download iconLink to paper
    Bridget Harris
    In Coll. of: The Emerald Handbook of Feminism, Criminology and Social Change, 2020, Emerald
  • Intimate Partner Violence, Technology, and Stalking Cached PDF download iconBibTeX download iconLink to paper
    Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
    Article in: Violence against women 13., 2007,
  • Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason Hong
    In Proc. of: Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, 2018, USENIX Association
  • A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19 PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
    Article in: ., 2021,
  • Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Budi Arief, Kovila Coopamootoo, Martin Emms, Aad Moorsel
    Article in: Proceedings of the ACM Conference on Computer and Communications Security ., 2014,
  • Technology-facilitated Domestic and Family Violence: Women’s Experiences File download iconCached PDF download iconBibTeX download iconLink to paper
    Heather Douglas, Bridget Harris, Molly Dragiewicz
    Article in: British Journal of Criminology 59., 2019,
  • Technology-facilitated Domestic and Family Violence: Women’s Experiences File download iconCached PDF download iconBibTeX download iconLink to paper
    Heather Douglas, Bridget Harris, Molly Dragiewicz
    Article in: British Journal of Criminology 59., 2019,
  • The Many Kinds of Creepware Used for Interpersonal Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    K. A. Roundy, P. Barmaimon Mendelberg, N. Dell, D. McCoy, D. Nissani, T. Ristenpart, A. Tamersoy
    In Proc. of: 2020 IEEE Symposium on Security and Privacy (SP), 2020, IEEE Computer Society
  • “Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
    Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
  • Clinical Computer Security for Victims of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
  • Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
  • A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19 PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
    Article in: ., 2021,
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • Installing Fear - A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Khoo, Kate Robertson, Ronald Deibert
    Miscellaneous, 2019
  • Intimate Partner Violence, Technology, and Stalking Cached PDF download iconBibTeX download iconLink to paper
    Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
    Article in: Violence against women 13., 2007,
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • ‘Internet of Things’: How Abuse is Getting Smarter File download iconCached PDF download iconBibTeX download iconLink to paper
    Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
    Article in: SSRN Electronic Journal 63., 2019,
  • Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Leonie Tanczer, Isabel Neira, Simon Edward Parkin, Trupti N Patel, George Danezis
    In Proc. of: , 2018,
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason Hong
    In Proc. of: Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, 2018, USENIX Association
  • Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Budi Arief, Kovila Coopamootoo, Martin Emms, Aad Moorsel
    Article in: Proceedings of the ACM Conference on Computer and Communications Security ., 2014,
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • Stalkerware Test 2020 PDF download iconCached PDF download iconBibTeX download iconLink to paper
    AV Comparatives
    Miscellaneous, 2020
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • The Use of Information and Communication Technologies to Coerce and Control in Domestic Violence and Following Separation PDF download iconCached PDF download iconBibTeX download iconLink to paper
    T. Hand, D. Chung, M. Peters
    In Proc. of: , 2009,
  • “Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
    Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
  • Clinical Computer Security for Victims of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
  • Intimate partner stalking and femicide: urgent implications for women's safety File download iconCached PDF download iconBibTeX download iconLink to paper
    Judith McFarlane, Jacquelyn Campbell, Kathy Jacquelyn
    Article in: Behavioral Sciences & the Law 20., 2002,
  • Using technology to control intimate partners: An exploratory study of college undergraduates File download iconCached PDF download iconBibTeX download iconLink to paper
    Sloane Burke, Michele Wallen, Karen Vail-Smith, David Knox
    Article in: Computers in Human Behavior 27., 2011,
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • “So-called privacy breeds evil”: Narrative Justifications for Intimate Partner Surveillance in Online Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Rosanna Bellini, Emily Tseng
    In Proc. of: , 2020,
  • Rapport sur les cyber-violences conjugales PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Centre Hubertine Auclert
    Miscellaneous (french), 2018
  • Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Budi Arief, Kovila Coopamootoo, Martin Emms, Aad Moorsel
    Article in: Proceedings of the ACM Conference on Computer and Communications Security ., 2014,
  • Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers File download iconCached PDF download iconBibTeX download iconLink to paper
    Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
    In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
  • Technology Related Violence Aganst Women - Investigating Tech Related Violence Against Women in Peri-Urban Areas of Uganda PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Wougnet, APC, Sida
    Article in: ., 2018,
Icons taken without modification from Font Awesome.