@inproceedings{ceta2020, author = {K. A. Roundy and P. Barmaimon Mendelberg and N. Dell and D. McCoy and D. Nissani and T. Ristenpart and A. Tamersoy}, booktitle = {2020 IEEE Symposium on Security and Privacy (SP)}, title = {The Many Kinds of Creepware Used for Interpersonal Attacks}, year = {2020}, volume = {}, issn = {2375-1207}, pages = {626-643}, keywords = {creepware;stalkerware;surveillance;interpersonal-attacks;intimate-partner-violence;android;threats;spoofing;harassment;measurement-study}, doi = {10.1109/SP40000.2020.00069}, url = {http://damonmccoy.com/papers/Creepware_SP.pdf}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, month = {may}, }
@article{ceta2019_2, author = {Diana Freed and Sam Havron and Emily Tseng and Andrea Gallardo and Rahul Chatterjee and Thomas Ristenpart and Nicola Dell}, title = {“Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence}, year = {2019}, issue_date = {November 2019}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, volume = {3}, number = {CSCW}, url = {https://www.havron.dev/pubs/freed-cscw19.pdf}, doi = {10.1145/3359304}, journal = {Proc. ACM Hum.-Comput. Interact.}, month = {November}, articleno = {202}, numpages = {24}, keywords = {intimate partner violence, gender-based violence, security, privacy, empirical studies in hci}, }
@inproceedings{ceta2019, author = {Sam Havron and Diana Freed and Rahul Chatterjee and Damon McCoy and Nicola Dell and Thomas Ristenpart}, title = {Clinical Computer Security for Victims of Intimate Partner Violence}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {105--122}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.havron.dev/pubs/clinicalsec.pdf}, }
@article{ceta2017, author = {Diana Freed and Jackeline Palmer and Diana Minchala and Karen Levy and Thomas Ristenpart and Nicola Dell}, year = {2017}, month = {12}, pages = {1-22}, title = {Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders}, volume = {1}, journal = {Proceedings of the ACM on Human-Computer Interaction}, doi = {10.1145/3134681}, url = {http://nixdell.com/papers/a046-freed.pdf}, }
@inproceedings{spyware_8418618, author = {R. {Chatterjee} and P. {Doerfler} and H. {Orgad} and S. {Havron} and J. {Palmer} and D. {Freed} and K. {Levy} and N. {Dell} and D. {McCoy} and T. {Ristenpart}}, booktitle = {2018 IEEE Symposium on Security and Privacy (SP)}, title = {The Spyware Used in Intimate Partner Violence}, year = {2018}, volume = {}, number = {}, pages = {441-458}, url = {http://nixdell.com/papers/spyware.pdf}, }
@inproceedings{stories_46080, author = {Tara Matthews and Kathleen O’Leary and Anna Turner and Manya Sleeper and Jill Palzkill Woelfer and Martin Shelton and Cori Manthorne and Elizabeth F. Churchill and Sunny Consolvo}, title = {Stories from survivors: Privacy & security practices when coping with intimate partner abuse}, year = {2017}, URL = {https://mshelt.onl/p/matthews_et_al_2017.pdf}, pages = {2189-2201}, address = {New York, NY, USA}, }
@misc{citizenlab, author = {Christopher Parsons and Adam Molnar and Jakub Dalek and Jeffrey Knockel and Miles Kenyon and Bennett Haselton and Cynthia Khoo and Ron Deibert}, title = {The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry}, year = {2019}, url = {https://citizenlab.ca/docs/stalkerware-holistic.pdf}, }
@misc{citizenlab_legal, author = {Cynthia Khoo and Kate Robertson and Ronald Deibert}, title = {Installing Fear - A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications}, year = {2019}, url = {https://citizenlab.ca/docs/stalkerware-legal.pdf}, }
@article{Levy2020PrivacyTI, author = {Karen Levy and Bruce Schneier}, title = {Privacy threats in intimate relationships}, journal = {ArXiv}, year = {2020}, volume = {abs/2006.03907}, url = {https://www.schneier.com/academic/paperfiles/Privacy_Threats_in_Intimate_Relationships.pdf}, }
@inproceedings{stalkers-paradise, author = {Diana Freed and Jackeline Palmer and Diana Minchala and Karen Levy and Thomas Ristenpart and Nicola Dell}, year = {2018}, month = {04}, pages = {1-13}, title = {A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology}, doi = {10.1145/3173574.3174241}, booktitle = {ACM Conference on Human Factors in Computing Systems}, url = {https://rist.tech.cornell.edu/papers/stalkers-paradise-intimate.pdf}, }
@article{sensible_privacy, author = {Budi Arief and Kovila Coopamootoo and Martin Emms and Aad Moorsel}, year = {2014}, month = {11}, pages = {201-204}, title = {Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse}, journal = {Proceedings of the ACM Conference on Computer and Communications Security}, doi = {10.1145/2665943.2665965}, url = {https://www.cs.kent.ac.uk/people/staff/ba284/Papers/WPES2014.pdf}, }
@article{dimond2011, author = {J. P. {Dimond} and C. {Fiesler} and A. S. {Bruckman}}, journal = {Interacting with Computers}, title = {Domestic violence and information communication technologies}, year = {2011}, volume = {23}, number = {5}, pages = {413-421}, url = {https://sci-hub.tw/10.1016/j.intcom.2011.04.006}, }
@online{npr, author = {NPR}, title = {Smartphones Are Used To Stalk, Control Domestic Abuse Victims}, year = {2014}, url = {https://www.npr.org/sections/alltechconsidered/2014/09/15/346149979/smartphones-are-used-to-stalk-control-domestic-abuse-victims}, }
@misc{avtest, author = {AV Comparatives}, title = {Stalkerware Test 2020}, year = {2020}, url = {https://www.av-comparatives.org/wp-content/uploads/2020/06/avc_stalkerware_2020.pdf}, }
@article{fraser2010, author = {Cynthia Fraser and Erica Olsen and Kaofeng Lee and Cindy Southworth and Sarah Tucker}, year = {2010}, month = {11}, pages = {39 - 55}, title = {The New Age of Stalking: Technological Implications for Stalking}, volume = {61}, journal = {Juvenile and Family Court Journal}, doi = {10.1111/j.1755-6988.2010.01051.x}, url = {https://sci-hub.tw/10.1111/j.1755-6988.2010.01051.x}, }
@article{southworth2007, author = {Cynthia Southworth and Jerry Finn and Shawndell Dawson and Cynthia Fraser and Sarah Tucker}, year = {2007}, month = {09}, pages = {842-56}, title = {Intimate Partner Violence, Technology, and Stalking}, volume = {13}, journal = {Violence against women}, doi = {10.1177/1077801207302045}, }
@misc{smartsafe, author = {Delanie Woodlock}, year = {2013}, month = {01}, pages = {}, title = {Technology-facilitated stalking: findings and resources from the SmartSafe project}, doi = {10.13140/2.1.4106.9764}, url = {https://www.dvrcv.org.au/sites/default/files/SmartSafe_0.pdf}, }
@misc{bcsth, author = {British Columbia Society Transition Houses}, title = {Assessing Technology in the Context of Violence Against Women & Children: Examining Benefits & Risks}, year = {2013}, url = {https://bcsth.ca/wp-content/uploads/2016/10/Assessing-Technology-in-the-Context-of-Violence-Against-Women-Children.-Examining-Benefits-Risks..pdf}, }
@online{stalkerware, author = {Vice Motherboard}, title = {Inside the 'Stalkerware' Surveillance Market, Where Ordinary People Tap Each Other's Phones}, year = {2017}, url = {https://www.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x}, }
@article{woodlock2016, author = {Delanie Woodlock}, year = {2016}, month = {05}, pages = {}, title = {The Abuse of Technology in Domestic Violence and Stalking}, volume = {23}, journal = {Violence Against Women}, doi = {10.1177/1077801216646277}, url = {https://sci-hub.tw/10.1177/1077801216646277}, }
@article{melton2007, author = {Heather Melton}, year = {2007}, month = {10}, pages = {347-363}, title = {Stalking in the Context of Intimate Partner AbuseIn the Victims' Words}, volume = {2}, journal = {Feminist Criminology - FEM CRIMINOL}, doi = {10.1177/1557085107306517}, url = {https://sci-hub.tw/10.1177/1557085107306517}, }
@article{harkin2019, author = {Diarmaid Harkin and Adam Molnar and Erica Vowles}, year = {2019}, month = {01}, pages = {174165901882056}, title = {The commodification of mobile phone surveillance: An analysis of the consumer spyware industry}, journal = {Crime, Media, Culture: An International Journal}, doi = {10.1177/1741659018820562}, url = {https://sci-hub.tw/10.1177/1741659018820562}, }
@inproceedings{sharealike2018, author = {Cheul Young Park and Cori Faklaris and Siyan Zhao and Alex Sciuto and Laura Dabbish and Jason Hong}, title = {Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships}, year = {2018}, isbn = {9781931971454}, publisher = {USENIX Association}, address = {USA}, booktitle = {Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security}, pages = {83–102}, numpages = {20}, location = {Baltimore, MD, USA}, series = {SOUPS ’18}, url = {https://www.usenix.org/system/files/conference/soups2018/soups2018-park.pdf}, }
@misc{hubertine, author = {Centre Hubertine Auclert}, title = {Rapport sur les cyber-violences conjugales}, year = {2018}, url = {https://m.centre-hubertine-auclert.fr/sites/default/files/fichiers/rapport-cyberviolences-conjugales-web.pdf}, language = {french}, }
@inproceedings{levy2015, author = {Karen E.C. Levy}, title = {Intimate Surveillance}, booktitle = {Idaho Law Review 50}, year = {2015}, pages = {679-93}, url = {https://www.uidaho.edu/-/media/UIdaho-Responsive/Files/law/law-review/articles/volume-51/51-3-levy-karen-ec.pdf}, }
@inproceedings{tseng2020, author = {Emily Tseng and Rosanna Bellini and Nora McDonald and Matan Danos and Rachel Greenstadt and Damon McCoy and Nicola Dell and Thomas Ristenpart}, title = {The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums}, booktitle = {29th {USENIX} Security Symposium ({USENIX} Security 20)}, year = {2020}, isbn = {978-1-939133-17-5}, pages = {1893--1909}, url = {https://www.usenix.org/system/files/sec20-tseng.pdf}, publisher = {{USENIX} Association}, month = {August}, }
@article{leitao2019, author = {Roxanne Leitão}, title = {Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums}, journal = {Human–Computer Interaction}, volume = {0}, number = {0}, pages = {1-40}, year = {2019}, publisher = {Taylor & Francis}, doi = {10.1080/07370024.2019.1685883}, URL = {https://scihub.to/10.1080/07370024.2019.1685883}, eprint = {https://doi.org/10.1080/07370024.2019.1685883}, }
@article{yardley2020, author = {Elizabeth Yardley}, title = {Technology-Facilitated Domestic Abuse in Political Economy: A New Theoretical Framework}, journal = {Violence Against Women}, volume = {0}, number = {0}, pages = {1077801220947172}, year = {2020}, doi = {10.1177/1077801220947172}, note = {PMID: 32757887}, url = {https://sci-hub.st/10.1177/1077801220947172}, eprint = {https://doi.org/10.1177/1077801220947172}, abstract = {This article presents a new theoretical framework around technology-facilitated domestic abuse (TFDA) in identifying four distinct types of omnipresent behavior. Perpetrators are increasingly drawing upon networked technologies like smartphones, social media, and GPS trackers in monitoring, controlling, and abusing survivors. There is considerable academic literature developing in response to this. While this scholarship is valuable, this article argues that TFDA must be understood as a neoliberal manifestation of patriarchal legacies of misogyny and sexism. A failure to recognize this will serve to prioritize abusers’ freedom to do harm over rights of survivors to be protected from harm.}, }
@misc{white2019, author = {Nadine E White}, title = {Women, Domestic Violence Service Providers, and Knowledge of Technology-Related Abuse}, year = {2019}, url = {https://scholarworks.waldenu.edu/cgi/viewcontent.cgi?article=7982&context=dissertations}, }
@article{harris2018, author = {Bridget Harris and Delanie Woodlock}, year = {2018}, month = {11}, pages = {}, title = {Digital Coercive Control: Insights from Two Landmark Domestic Violence Studies}, volume = {59}, journal = {British Journal of Criminology}, doi = {10.1093/bjc/azy052}, url = {https://academic.oup.com/bjc/article/59/3/530/5172990}, }
@article{douglas2019, author = {Heather Douglas and Bridget Harris and Molly Dragiewicz}, year = {2019}, month = {04}, pages = {551-570}, title = {Technology-facilitated Domestic and Family Violence: Women’s Experiences}, volume = {59}, journal = {British Journal of Criminology}, doi = {10.1093/bjc/azy068}, url = {https://academic.oup.com/bjc/article-abstract/59/3/551/5281174}, }
@article{woodlock2020, author = {Delanie Woodlock and Mandy McKenzie and Deborah Western and Bridget Harris}, title = {Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control}, journal = {Australian Social Work}, volume = {73}, number = {3}, pages = {368-380}, year = {2020}, publisher = {Routledge}, doi = {10.1080/0312407X.2019.1607510}, url = {https://www.tandfonline.com/doi/pdf/10.1080/0312407X.2019.1607510}, }
@incollection{harris2020, author = {Bridget Harris}, pages = {317--336}, title = {Technology and violence against women}, publisher = {Emerald}, address = {United Kingdom}, booktitle = {The Emerald Handbook of Feminism, Criminology and Social Change}, series = {Emerald Studies In Criminology, Feminism and Social Change}, year = {2020}, doi = {10.1108/978-1-78769-955-720201026}, abstract = {As the role and uptake of digital media, devices and other technologies increases, so has their presence in our lives. Technology has revolutionised the speed, type and extent of communication and contact between individuals and groups, transforming temporal, geographic and personal boundaries. There have undoubtedly been benefits associated with such shifts, but technologies have also exacerbated existing patterns of gendered violence and introduced new forms of intrusion, abuse and surveillance. In order to understand and combat harm and, protect and empower women, criminologists must investigate these practices. This chapter discusses how technology has transformed the enactment of violence against women.}, url = {https://eprints.qut.edu.au/202652/}, }
@inproceedings{Hand2009TheUO, author = {T. Hand and D. Chung and M. Peters}, title = {The Use of Information and Communication Technologies to Coerce and Control in Domestic Violence and Following Separation}, year = {2009}, url = {https://pdfs.semanticscholar.org/c4ce/8b1b3bd958da4320ee65ec5bc4f271862a86.pdf}, }
@misc{ybarra2017, author = {Michelle Ybarra and Myeshia Price-Feeney and Amanda Lenhart and Kathryn Zickuhr}, title = {Intimate Partner Digital Abuse}, year = {2017}, url = {https://datasociety.net/pubs/oh/Intimate_Partner_Digital_Abuse_2017.pdf}, }
@article{burke2011, author = {Sloane Burke and Michele Wallen and Karen Vail-Smith and David Knox}, year = {2011}, month = {05}, pages = {1162-1167}, title = {Using technology to control intimate partners: An exploratory study of college undergraduates}, volume = {27}, journal = {Computers in Human Behavior}, doi = {10.1016/j.chb.2010.12.010}, url = {https://sci-hub.tw/10.1016/j.chb.2010.12.010}, }
@inproceedings{parkin2019, author = {Simon Parkin and Trupti Patel and Isabel Lopez-Neira and Leonie Tanczer}, year = {2019}, month = {09}, pages = {1-15}, title = {Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse}, doi = {10.1145/3368860.3368861}, url = {https://discovery.ucl.ac.uk/id/eprint/10083266/7/NSPW_2019-author_version.pdf}, }
@inproceedings{leitao2019_2, author = {Roxanne Leitão}, year = {2019}, month = {06}, pages = {527-539}, title = {Anticipating Smart Home Security and Privacy Threats with Survivors of Intimate Partner Abuse}, isbn = {978-1-4503-5850-7}, doi = {10.1145/3322276.3322366}, url = {https://sci-hub.tw/10.1145/3322276.3322366}, }
@article{lopezneira2019, author = {Isabel Lopez-Neira and Trupti Patel and Simon Parkin and George Danezis and Leonie Tanczer}, year = {2019}, month = {03}, pages = {}, title = {‘Internet of Things’: How Abuse is Getting Smarter}, volume = {63}, journal = {SSRN Electronic Journal}, doi = {10.2139/ssrn.3350615}, url = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3350615}, }
@inproceedings{tanczer2018, author = {Leonie Tanczer and Isabel Neira and Simon Edward Parkin and Trupti N Patel and George Danezis}, title = {Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse}, year = {2018}, url = {https://www.ucl.ac.uk/steapp/sites/steapp/files/giot-report.pdf}, }
@article{mcfarlane2002, author = {Judith McFarlane and Jacquelyn Campbell and Kathy Jacquelyn}, year = {2002}, month = {04}, pages = {51 - 68}, title = {Intimate partner stalking and femicide: urgent implications for women's safety}, volume = {20}, journal = {Behavioral Sciences & the Law}, doi = {10.1002/bsl.477}, url = {https://sci-hub.st/10.1002/bsl.477}, }
@inproceedings{bellini2020, author = {Rosanna Bellini and Emily Tseng}, title = {“So-called privacy breeds evil”: Narrative Justifications for Intimate Partner Surveillance in Online Forums}, year = {2020}, url = {http://damonmccoy.com/papers/IPS_CSCW.pdf}, }
@article{fox2015, author = {Jesse Fox and Robert Tokunaga}, year = {2015}, month = {09}, pages = {491-498}, title = {Romantic Partner Monitoring After Breakups: Attachment, Dependence, Distress, and Post-Dissolution Online Surveillance via Social Networking Sites}, volume = {18}, journal = {Cyberpsychology, Behavior, and Social Networking}, doi = {10.1089/cyber.2015.0123}, url = {https://www.researchgate.net/profile/Jesse_Fox3/publication/281113727_Romantic_Partner_Monitoring_After_Breakups_Attachment_Dependence_Distress_and_Post-Dissolution_Online_Surveillance_via_Social_Networking_Sites/links/580e760108ae51b863966f8f/Romantic-Partner-Monitoring-After-Breakups-Attachment-Dependence-Distress-and-Post-Dissolution-Online-Surveillance-via-Social-Networking-Sites.pdf}, }
@article{alalosi2018, author = {Hadeel al-alosi}, year = {2018}, month = {11}, pages = {}, title = {Cyber-Violence: Digital Abuse in the Context of Domestic Violence}, url = {https://www.researchgate.net/profile/Hadeel_Al-Alosi/publication/328813010_Cyber-Violence_Digital_Abuse_in_the_Context_of_Domestic_Violence/links/5be4c477299bf1124fc41c6a/Cyber-Violence-Digital-Abuse-in-the-Context-of-Domestic-Violence.pdf}, }
@article{uganda2018, author = {Wougnet and APC and Sida}, year = {2018}, title = {Technology Related Violence Aganst Women - Investigating Tech Related Violence Against Women in Peri-Urban Areas of Uganda}, url = {https://www.apc.org/sites/default/files/Research_Report_on_Tech_Related_VAW_2018.pdf}, }
@article{tseng2021, author = {Diana Freed and Emily Tseng and Thomas Ristenpart and Nicola Dell and Kristen Engle}, year = {2021}, month = {01}, pages = {}, title = {A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19}, url = {https://emtseng.me/assets/Tseng-2021-CHI_Digital-Safety-Dilemma_cam-ready.pdf}, }
@inproceedings{randall2020, author = {Audrey Randall and Enze Liu and Gautam Akiwate and Ramakrishna Padmanabhan and Geoffrey M. Voelker and Stefan Savage and Aaron Schulman}, title = {Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers}, year = {2020}, isbn = {9781450381383}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, doi = {10.1145/3419394.3423640}, abstract = {This paper presents and evaluates Trufflehunter, a DNS cache snooping tool for estimating the prevalence of rare and sensitive Internet applications. Unlike previous efforts that have focused on small, misconfigured open DNS resolvers, Trufflehunter models the complex behavior of large multi-layer distributed caching infrastructures (e.g., such as Google Public DNS). In particular, using controlled experiments, we have inferred the caching strategies of the four most popular public DNS resolvers (Google Public DNS, Cloudflare Quad1, OpenDNS and Quad9). The large footprint of such resolvers presents an opportunity to observe rare domain usage, while preserving the privacy of the users accessing them. Using a controlled testbed, we evaluate how accurately Trufflehunter can estimate domain name usage across the U.S. Applying this technique in the wild, we provide a lower-bound estimate of the popularity of several rare and sensitive applications (most notably smartphone stalkerware) which are otherwise challenging to survey.}, booktitle = {Proceedings of the ACM Internet Measurement Conference}, pages = {50–64}, numpages = {15}, location = {Virtual Event, USA}, series = {IMC '20}, url = {https://dl.acm.org/doi/pdf/10.1145/3419394.3423640}, }
@article{slupska2021, author = {Julia Slupska and Leonie Maria Tanczer}, year = {2021}, month = {06}, pages = {}, title = {Threat Modeling Intimate Partner Violence: Tech Abuse as a Cybersecurity Challenge in the Internet of Things}, url = {https://www.emerald.com/insight/content/doi/10.1108/978-1-83982-848-520211049/full/pdf?title=threat-modeling-intimate-partner-violence-tech-abuse-as-a-cybersecurity-challenge-in-the-internet-of-things}, }
@article{tanczer2021, author = {Leonie Tanczer and Isabel López-Neira and Simon Parkin}, year = {2021}, month = {01}, pages = {}, title = {‘I feel like we’re really behind the game’: perspectives of the United Kingdom’s intimate partner violence support sector on the rise of technology-facilitated abuse}, journal = {Journal of Gender-Based Violence}, doi = {10.1332/239868021X16290304343529}, url = {https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3931045_code2534469.pdf}, }
@inproceedings{zou2021, author = {Yixin Zou and Allison McDonald and Julia Narakornpichit and Nicola Dell and Thomas Ristenpart and Kevin Roundy and Florian Schaub and Acar Tamersoy}, title = {The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence}, booktitle = {30th USENIX Security Symposium (USENIX Security 21)}, year = {2021}, isbn = {978-1-939133-24-3}, pages = {429--446}, url = {https://www.usenix.org/system/files/sec21-zou.pdf}, publisher = {USENIX Association}, month = {August}, }
@book{strohmayer2021, author = {Angelika Strohmayer and Julia Slupska and Rosanna Bellini and Lynne Coventry and Tara Hairston and Adam Dodge}, title = {Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions}, abstract = {If you care about security, you care about safety. So you need to care about abusability and trust. This toolkit will provide information about why centering peoples{\textquoteright} safety in our digital technologies is important. We present the concepts of abusability and trust as two important tenets of building such safer technologies, followed by resources that can help us build safer technologies.}, note = {Funding information: This toolkit was funded by UK Research and Innovation{\textquoteright}s Engineering and Physical Sciences Research Council{\textquoteright}s Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).}, year = {2021}, month = {October}, language = {English}, url = {https://nrl.northumbria.ac.uk/id/eprint/47508/1/TrustAndAbusabilityToolkit.pdf}, }
@article{Seewald12, author = {Laura Seewald and Tova B. Walsh and Richard M. Tolman and Shawna J. Lee and Lauren A. Reed and Quyen Ngo and Vijay Singh}, title = {Technology-Facilitated Abuse Prevalence and Associations Among a Nationally Representative Sample of Young Men}, volume = {20}, number = {1}, pages = {12--17}, year = {2022}, doi = {10.1370/afm.2758}, publisher = {The Annals of Family Medicine}, abstract = {PURPOSE We undertook a study to determine the prevalence and associations of technology-facilitated abuse (TFA){\textemdash}insults, harassment, coercion, or threats carried out using digital tools such as smartphones and computers{\textemdash}among a US nationally representative sample of young men.METHODS Analyses were based on 1,079 men aged 18 to 35 years who completed questionnaires during August and September of 2014 and reported ever having been in a romantic relationship. We used validated measures to assess demographics, health service use, mental health and substance use, and TFA delivered to and received from partners in the past year. We calculated survey-weighted descriptive statistics and conducted multinomial logistic regression analysis.RESULTS Overall, 4.1\% of men reported delivering TFA only, 8.0\% receiving TFA only, and 25.6\% both delivering and receiving TFA. Men were more likely to report only delivering TFA if they identified as Hispanic (adjusted odds ratio [AOR] = 2.72; 95\% CI, 1.13 to 6.57), used marijuana (AOR = 1.31; 95\% CI, 1.02 to 1.68), and used prescription opioids for nonmedical reasons (AOR 2.86; 95\% CI, 1.48 to 5.54). Men were more likely to report only receiving TFA if they identified as Hispanic (AOR = 2.55; 95\% CI, 1.01 to 6.43) and used prescription opioids for nonmedical reasons (AOR = 2.43; 95\% CI, 1.34 to 4.39), whereas a primary care connection appeared protective (AOR = 0.43; 95\% CI, 0.22 to 0.86). Men were more likely to report both delivering and receiving TFA if they identified as non-Hispanic Black (AOR = 2.83; 95\% CI, 1.44 to 5.58), owned a smartphone (AOR = 1.80; 95\% CI, 1.05 to 3.09), had ever had mental health care visits (AOR = 1.86; 95\% CI, 1.16 to 2.98), misused alcohol (AOR = 1.10; 95\% CI, 1.04 to 1.17), and used prescription opioids for nonmedical reasons (AOR = 1.79; 95\% CI, 1.04 to 3.08).CONCLUSIONS We found that TFA was prevalent among young men, with 1 in 25 reporting delivery only, 1 in 12 reporting receipt only, and 1 in 4 reporting both. Primary care physicians can consider assessing TFA among male patients and developing interventions to mitigate this behavior.VISUAL ABSTRACT}, issn = {1544-1709}, URL = {https://www.annfammed.org/content/annalsfm/20/1/12.full.pdf}, journal = {The Annals of Family Medicine}, }
@article{rogers2022, author = {Michaela M. Rogers and Colleen Fisher and Parveen Ali and Peter Allmark and Lisa Fontes}, title = {Technology-Facilitated Abuse in Intimate Relationships: A Scoping Review}, journal = {Trauma, Violence, \& Abuse}, pages = {15248380221090218}, year = {2022}, doi = {10.1177/15248380221090218}, note = {PMID: 35537445}, URL = {https://journals.sagepub.com/doi/pdf/10.1177/15248380221090218}, eprint = {https://doi.org/10.1177/15248380221090218}, abstract = {Technology-facilitated abuse (TFA) is a significant, harmful phenomenon and emerging trend in intimate partner violence. TFA encompasses a range of behaviours and is facilitated in online spaces (on social media and networking platforms) and through the misuse of everyday technology (e.g. mobile phone misuse, surveillance apps, spyware, surveillance via video cameras and so on). The body of work on TFA in intimate relationships is emerging, and so this scoping review set out to establish what types of abuse, impacts and forms of resistance are reported in current studies. The scoping review examined studies between 2000 and 2020 that focused on TFA within intimate partnerships (adults aged 18+) within the setting of any of these countries: the UK and Ireland, USA, Canada, New Zealand and Australia. The databases MEDLINE, CINAHL and Scopus were searched in December 2020. A total of 22 studies were included in the review. The main findings were that TFA is diverse in its presentation and tactics, but can be typed according to the eight domains of the Duluth Power \& Control Wheel. Impacts are not routinely reported across studies but broadly fall into the categories of social, mental health and financial impacts and omnipresence. Similarly, modes of resistance are infrequently reported in studies. In the few studies that described victim/survivor resistance, this was in the context of direct action, access to legal or professional support or in the identification of barriers to resistance.}, }
@book{berg2014, author = {Berg and Breheny and Public Affairs (Australia)}, title = {A social problem, not a technological problem : bullying, cyberbulling and public policy}, publisher = {Institute of Public Affairs [Melbourne]}, year = {2014}, type = {Book, Online}, url = {https://ipa.org.au/wp-content/uploads/archive/submission_V6.pdf}, language = {English}, subjects = {Cyberbullying -- Australia.; Cyberbullying -- Government policy -- Australia.; Australian}, catalogue-url = {https://nla.gov.au/nla.cat-vn6539645}, }
@inproceedings{gibson2022, author = {Cassidy Gibson and Vanessa Frost and Katie Platt and Washington Garcia and Luis Vargas and Sara Rampazzi and Vincent Bindschaedler and Patrick Traynor and Kevin R. B. Butler}, title = {Analyzing the Monetization Ecosystem of Stalkerware}, booktitle = {Privacy Enhancing Technologies Symposium}, year = {2022}, url = {https://petsymposium.org/2022/files/papers/issue4/popets-2022-0101.pdf}, month = {July}, }
@inproceedings{almansoori2022, author = {Majed Almansoori and Andrea Gallardo and Julio Poveda and Adil Ahmed and Rahul Chatterjee}, title = {A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance}, booktitle = {Privacy Enhancing Technologies Symposium}, year = {2022}, url = {https://petsymposium.org/2022/files/papers/issue4/popets-2022-0102.pdf}, month = {July}, pages = {120 -- 139}, }
@article{harkin2022, author = {Diarmaid Harkin and Robert Merkel}, title = {Technology-Based Responses to Technology-Facilitated Domestic and Family Violence: An Overview of the Limits and Possibilities of Tech-Based “Solutions”}, journal = {Violence Against Women}, pages = {10778012221088310}, year = {2022}, month = {June}, doi = {10.1177/10778012221088310}, note = {PMID: 35763542}, URL = {https://doi.org/10.1177/10778012221088310}, eprint = {https://doi.org/10.1177/10778012221088310}, }
@misc{ecuador2020, author = {Navegando red}, title = {Diagnóstico de violencia de género digital en Ecuador}, year = {2020}, url = {https://www.navegandolibres.org/images/navegando/Diagnostico_navegando_libres_f.pdf}, }
@inproceedings{liu2023, author = {Enze Liu and Sumanth Rao and Sam Havron and Grant Ho Stefan Savage and Damon McCoy Geoffrey M. Voelker and}, title = {No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps}, booktitle = {Privacy Enhancing Technologies Symposium}, year = {2023}, url = {https://cseweb.ucsd.edu/~savage/papers/PETS23.pdf}, month = {July}, }
@inproceedings{guptaReallyJustLeaned, author = {Naman Gupta and Kate Walsh and Sanchari Das and Rahul Chatterjee}, title = {``{{I}} Really Just Leaned on My Community for Support'': {{Barriers}}, {{Challenges}}, and {{Coping Mechanisms Used}} by {{Survivors}} of {{Technology-Facilitated Abuse}} to {{Seek Social Support}}}, booktitle = {{{USENIX Security}} 2024}, year = {2024}, address = {Philadelphia}, url = {https://naman.github.io/uploads/usenix24.pdf}, }
@inproceedings{guptaChilbw2024, author = {Naman Gupta and Sanchari Das and Kate Walsh and Rahul Chatterjee}, booktitle = {ACM CHI Conference on Human Factors in Computing Systems (Late Breaking Work) 2024}, month = {February}, title = {A Critical Analysis of the Prevalence of Technology-Facilitated Abuse in US College Students}, url = {https://naman.github.io/uploads/chilbw24.pdf}, year = {2024}, }
@inproceedings{ceccioAnalyzingPatternsBehavior2023, author = {Rose Ceccio and Naman Gupta and Majed Almansoori and Rahul Chatterjee}, title = {Analyzing the {{Patterns}} and {{Behavior}} of {{Users When Detecting}} and {{Preventing Tech-enabled Stalking}}}, year = {2023}, doi = {10/gr8rnx}, booktitle = {Symposium on Usable Security and Privacy (USEC), Network and Distributed System Security (NDSS) 2023}, url = {https://naman.github.io/uploads/usec.pdf}, }
@article{almansooriWebAbuseComprehensive, author = {Majed Almansoori and Mazharul Islam and Saptarshi Ghosh and Mainack Mondal and Rahul Chatterjee}, title = {The {{Web}} of {{Abuse}}: {{A Comprehensive Analysis}} of {{Online Resource}} in the {{Context}} of {{Technology-Enabled Intimate Partner Surveillance}}}, journal = {2024 IEEE European Symposium on Security and Privacy (EuroS\&P)}, year = {2024}, organization = {IEEE}, url = {https://majedalmansoori.com/papers/EuroS&P24_WebOfAbuse.pdf}, }
@inproceedings{bellini2023paying, author = {Rosanna Bellini}, title = {{Paying the Price: When Intimate Partners Use Technology for Financial Harm}}, booktitle = {Proc. {{CHI}}}, url = {https://www.rosiebellini.com/wp-content/uploads/2023/04/paying.pdf}, year = {2023}, }
@inproceedings{stephenson2023abuse, author = {Sophie Stephenson and Majed Almansoori and Pardis Emami-Naeini and Danny Yuxing Huang and Rahul Chatterjee}, title = {{Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse}}, booktitle = {Proc. {{USENIX Security}}}, url = {https://pages.cs.wisc.edu/~srstephenso2/publications/usenix23_abusevectors.pdf}, year = {2023}, }
@inproceedings{stephenson2023lessons, author = {Sophie Stephenson and Majed Almansoori and Pardis Emami-Naeini and Rahul Chatterjee}, title = {{“It’s the Equivalent of Feeling Like You’re in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse}}, booktitle = {Proc. {{USENIX Security}}}, url = {https://pages.cs.wisc.edu/~srstephenso2/publications/usenix23_abusevectors.pdf}, year = {2023}, }
@inproceedings{ceccio2023, author = {Rose Ceccio and Sophie Stephenson and Varun Chadha and Danny Yuxing Huang and Rahul Chatterjee}, title = {{Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices}}, booktitle = {Proc. {{USENIX Security}}}, url = {https://pages.cs.wisc.edu/~srstephenso2/publications/usenix23_spydevices.pdf}, year = {2023}, }
@article{neubauer2023systematic, author = {Lilly Neubauer and Isabel Straw and Enrico Mariconti and Leonie Maria Tanczer}, title = {{A Systematic Literature Review of the Use of Computational Text Analysis Methods in Intimate Partner Violence Research}}, journal = {Journal of Family Violence}, pages = {1--20}, url = {https://discovery.ucl.ac.uk/id/eprint/10167282/1/s10896-023-00517-7%20%281%29.pdf}, year = {2023}, }
@article{straw2023safeguarding, author = {Isabel Straw and Leonie Tanczer}, title = {{Safeguarding patients from technology-facilitated abuse in clinical settings: A narrative review}}, journal = {PLOS Digital Health}, volume = {2}, number = {1}, url = {https://journals.plos.org/digitalhealth/article?id=10.1371/journal.pdig.0000089}, year = {2023}, }
@inproceedings{turk2023can, author = {Kieron Ivy Turk and Alice Hutchings and Alastair R. Beresford}, title = {{Can’t Keep Them Away: The Failures of Anti-Stalking Protocols in Personal Item Tracking Devices}}, booktitle = {Proc. {{Security Protocols Workshop}}}, url = {https://www.cl.cam.ac.uk/~kst36/documents/cant-keep-them-away-spw-postproc.pdf}, year = {2023}, }
@inproceedings{tseng2022, author = {Emily Tseng and Mehrnaz Sabet and Rosanna Bellini and Harkiran Kaur Sodhi and Thomas Ristenpart and Nicola Dell}, title = {Care Infrastructures for Digital Security in Intimate Partner Violence}, year = {2022}, isbn = {9781450391573}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://dl.acm.org/doi/pdf/10.1145/3491102.3502038}, doi = {10.1145/3491102.3502038}, abstract = {Survivors of intimate partner violence (IPV) face complex threats to their digital privacy and security. Prior work has established protocols for directly helping them mitigate these harms; however, there remains a need for flexible and pluralistic systems that can support survivors’ long-term needs. This paper describes the design and development of sociotechnical infrastructure that incorporates feminist notions of care to connect IPV survivors experiencing technology abuse with volunteer computer security consultants. We present findings from a mixed methods study that draws on data from an 8-month, real-world deployment, as well as interviews with 7 volunteer technology consultants and 18 IPV professionals. Our findings illuminate emergent challenges in safely and adaptively providing computer security advice as care. We discuss implications of these findings for feminist approaches to computer security and privacy, and provide broader lessons for interventions that aim to directly assist at-risk and marginalized people experiencing digital insecurity.}, booktitle = {Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems}, articleno = {123}, numpages = {20}, keywords = {care, computer security and privacy, gender-based violence, intimate partner violence}, location = {New Orleans, LA, USA}, series = {CHI '22}, }
@inproceedings{279942, author = {Julia Slupska and Angelika Strohmayer}, title = {Networks of Care: Tech Abuse Advocates{\textquoteright} Digital Security Practices}, booktitle = {31st USENIX Security Symposium (USENIX Security 22)}, year = {2022}, isbn = {978-1-939133-31-1}, address = {Boston, MA}, pages = {341--358}, url = {https://www.usenix.org/system/files/sec22-slupska-networks.pdf}, publisher = {USENIX Association}, month = {August}, }