Abuse Vectors: A Framework for Conceptualizing {IoT-Enabled} Interpersonal Abuse
Tech-enabled interpersonal abuse (IPA) is a pervasive problem. Abusers, often intimate
partners, use tools such as spyware to surveil and harass victim-survivors. Unfortunately …
partners, use tools such as spyware to surveil and harass victim-survivors. Unfortunately …
" It's the Equivalent of Feeling Like You're in {Jail”}: Lessons from Firsthand and Secondhand Accounts of {IoT-Enabled} Intimate Partner Abuse
Victim-survivors of intimate partner violence (IPV) are facing a new technological threat:
Abusers are leveraging IoT devices such as smart thermostats, hidden cameras, and GPS …
Abusers are leveraging IoT devices such as smart thermostats, hidden cameras, and GPS …
Mobile Spyware Identification and Categorization: A Systematic Review
Smartphones have revolutionized the way we live, work, and interact with the world. They
have become indispensable companions, seamlessly integrating into our daily routines …
have become indispensable companions, seamlessly integrating into our daily routines …
Sneaky spy devices and defective detectors: the ecosystem of intimate partner surveillance with covert devices
R Ceccio, S Stephenson, V Chadha… - 32nd USENIX Security …, 2023 - usenix.org
Recent anecdotal evidence suggests that abusers have begun to use covert spy devices
such as nanny cameras, item trackers, and audio recorders to spy on and stalk their …
such as nanny cameras, item trackers, and audio recorders to spy on and stalk their …
No privacy among spies: Assessing the functionality and insecurity of consumer android spyware apps
Consumer mobile spyware apps covertly monitor a user's activities (ie, text messages,
phone calls, e-mail, location, etc.) and transmit that information over the Internet to support …
phone calls, e-mail, location, etc.) and transmit that information over the Internet to support …
Navigating traumatic stress reactions during computer security interventions
L Ramjit, N Dolci, F Rossi, R Garcia… - 33rd USENIX Security …, 2024 - usenix.org
At-risk populations need direct support from computer security and privacy consultants, what
we refer to as a security intervention. However, at-risk populations often face security threats …
we refer to as a security intervention. However, at-risk populations often face security threats …
The Web of Abuse: A Comprehensive Analysis of Online Resource in the Context of Technology-Enabled Intimate Partner Surveillance
Previous research has shown that abusers in an intimate relationship can find plenty of
technical advice, tools, and how-to guides online for covertly conducting intimate partner …
technical advice, tools, and how-to guides online for covertly conducting intimate partner …
" I Had Sort of a Sense that I Was Always Being Watched... Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications
Continuous location sharing (CLS) applications are widely used for safety and social
convenience. However, these applications have privacy concerns that can be used for …
convenience. However, these applications have privacy concerns that can be used for …
Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR
Virtual Reality (VR) has witnessed a rising issue of harassment, prompting the integration of
safety controls like muting and blocking in VR applications. However, the lack of …
safety controls like muting and blocking in VR applications. However, the lack of …
[PDF][PDF] Analyzing the Patterns and Behavior of Users When Detecting and Preventing Tech-enabled Stalking
Intimate partner violence (IPV) is a prevalent societal issue that affects many people
globally. Unfortunately, abusers rely on technology to spy on their partners. Prior works …
globally. Unfortunately, abusers rely on technology to spy on their partners. Prior works …