Examining technology-facilitated intimate partner violence: A systematic review of journal articles
C Kim, R Ferraresso - Trauma, Violence, & Abuse, 2023 - journals.sagepub.com
As intimate partner violence in a cyber world is increasing, scholars have started to pay
attention to this phenomenon. This study aims to provide a systematic review of empirical …
attention to this phenomenon. This study aims to provide a systematic review of empirical …
Sok: Hate, harassment, and the changing landscape of online abuse
We argue that existing security, privacy, and antiabuse protections fail to address the
growing threat of online hate and harassment. In order for our community to understand and …
growing threat of online hate and harassment. In order for our community to understand and …
Who's in control? Interactions in multi-user smart homes
Adoption of commercial smart home devices is rapidly increasing, allowing in-situ research
in people's homes. As these technologies are deployed in shared spaces, we seek to …
in people's homes. As these technologies are deployed in shared spaces, we seek to …
Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication
SG Lyastani, M Schilling, M Neumayr… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The newest contender for succeeding passwords as the incumbent web authentication
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …
Sok: A framework for unifying at-risk user research
At-risk users are people who experience risk factors that augment or amplify their chances of
being digitally attacked and/or suffering disproportionate harms. In this systematization work …
being digitally attacked and/or suffering disproportionate harms. In this systematization work …
Care infrastructures for digital security in intimate partner violence
Survivors of intimate partner violence (IPV) face complex threats to their digital privacy and
security. Prior work has established protocols for directly helping them mitigate these harms; …
security. Prior work has established protocols for directly helping them mitigate these harms; …
Sok: Safer digital-safety research involving at-risk users
Research involving at-risk users—that is, users who are more likely to experience a digital
attack or to be disproportionately affected when harm from such an attack occurs—can pose …
attack or to be disproportionately affected when harm from such an attack occurs—can pose …
Human rights by design: The responsibilities of social media platforms to address gender‐based violence online
Gender‐based violence online is rampant, ranging from harassment of women who are
public figures on social media to stalking intimate partners using purpose‐built apps. This is …
public figures on social media to stalking intimate partners using purpose‐built apps. This is …
Clinical computer security for victims of intimate partner violence
Digital insecurity in the face of targeted, persistent attacks increasingly leaves victims in
debilitating or even life-threatening situations. We propose an approach to helping victims …
debilitating or even life-threatening situations. We propose an approach to helping victims …
" Is My Phone Hacked?" Analyzing Clinical Computer Security Interventions With Survivors of Intimate Partner Violence
Intimate partner abusers use technology to track, monitor, harass, and otherwise harm their
victims, and prior work reports that victims have few resources for obtaining help with such …
victims, and prior work reports that victims have few resources for obtaining help with such …