Examining technology-facilitated intimate partner violence: A systematic review of journal articles

C Kim, R Ferraresso - Trauma, Violence, & Abuse, 2023 - journals.sagepub.com
As intimate partner violence in a cyber world is increasing, scholars have started to pay
attention to this phenomenon. This study aims to provide a systematic review of empirical …

Sok: Hate, harassment, and the changing landscape of online abuse

K Thomas, D Akhawe, M Bailey… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
We argue that existing security, privacy, and antiabuse protections fail to address the
growing threat of online hate and harassment. In order for our community to understand and …

Who's in control? Interactions in multi-user smart homes

C Geeng, F Roesner - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
Adoption of commercial smart home devices is rapidly increasing, allowing in-situ research
in people's homes. As these technologies are deployed in shared spaces, we seek to …

Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication

SG Lyastani, M Schilling, M Neumayr… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The newest contender for succeeding passwords as the incumbent web authentication
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …

Sok: A framework for unifying at-risk user research

N Warford, T Matthews, K Yang, O Akgul… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
At-risk users are people who experience risk factors that augment or amplify their chances of
being digitally attacked and/or suffering disproportionate harms. In this systematization work …

Care infrastructures for digital security in intimate partner violence

E Tseng, M Sabet, R Bellini, HK Sodhi… - Proceedings of the …, 2022 - dl.acm.org
Survivors of intimate partner violence (IPV) face complex threats to their digital privacy and
security. Prior work has established protocols for directly helping them mitigate these harms; …

Sok: Safer digital-safety research involving at-risk users

R Bellini, E Tseng, N Warford, A Daffalla… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Research involving at-risk users—that is, users who are more likely to experience a digital
attack or to be disproportionately affected when harm from such an attack occurs—can pose …

Human rights by design: The responsibilities of social media platforms to address gender‐based violence online

N Suzor, M Dragiewicz, B Harris, R Gillett… - Policy & …, 2019 - Wiley Online Library
Gender‐based violence online is rampant, ranging from harassment of women who are
public figures on social media to stalking intimate partners using purpose‐built apps. This is …

Clinical computer security for victims of intimate partner violence

S Havron, D Freed, R Chatterjee, D McCoy… - 28th USENIX Security …, 2019 - usenix.org
Digital insecurity in the face of targeted, persistent attacks increasingly leaves victims in
debilitating or even life-threatening situations. We propose an approach to helping victims …

" Is My Phone Hacked?" Analyzing Clinical Computer Security Interventions With Survivors of Intimate Partner Violence

D Freed, S Havron, E Tseng, A Gallardo… - Proceedings of the …, 2019 - dl.acm.org
Intimate partner abusers use technology to track, monitor, harass, and otherwise harm their
victims, and prior work reports that victims have few resources for obtaining help with such …