Artificial intelligence and crime: A primer for criminologists

KJ Hayward, MM Maas - Crime, Media, Culture, 2021 - journals.sagepub.com
This article introduces the concept of Artificial Intelligence (AI) to a criminological audience.
After a general review of the phenomenon (including brief explanations of important cognate …

Technology-based mental health interventions for domestic violence victims amid COVID-19

Z Su, A Cheshmehzangi, D McDonnell, H Chen… - International journal of …, 2022 - mdpi.com
Introduction: Domestic violence is a threat to human dignity and public health. Mounting
evidence shows that domestic violence erodes personal and public health, spawning issues …

No privacy among spies: Assessing the functionality and insecurity of consumer android spyware apps

E Liu, S Rao, S Havron, G Ho, S Savage… - Proceedings on …, 2023 - petsymposium.org
Consumer mobile spyware apps covertly monitor a user's activities (ie, text messages,
phone calls, e-mail, location, etc.) and transmit that information over the Internet to support …

Technology-facilitated domestic abuse in political economy: A new theoretical framework

E Yardley - Violence against women, 2021 - journals.sagepub.com
This article presents a new theoretical framework around technology-facilitated domestic
abuse (TFDA) in identifying four distinct types of omnipresent behavior. Perpetrators are …

Navigating traumatic stress reactions during computer security interventions

L Ramjit, N Dolci, F Rossi, R Garcia… - 33rd USENIX Security …, 2024 - usenix.org
At-risk populations need direct support from computer security and privacy consultants, what
we refer to as a security intervention. However, at-risk populations often face security threats …

Is it actually violence? Framing technology-facilitated abuse as violence

S Dunn - The Emerald international handbook of technology …, 2021 - emerald.com
When discussing the term “technology-facilitated violence”(TFV) it is often asked:“Is it
actually violence?” While international human rights standards, such as the United Nations' …

Account security interfaces: important, unintuitive, and untrustworthy

A Daffalla, M Bohuk, N Dell, R Bellini… - 32nd USENIX Security …, 2023 - usenix.org
Online services increasingly rely on user-facing interfaces to communicate important
security-related account information—for example, which devices are logged into a user's …

Comparing User Perceptions of {Anti-Stalkerware} Apps with the Technical Reality

M Fassl, S Anell, S Houy, M Lindorfer… - … Symposium on Usable …, 2022 - usenix.org
Every year an increasing number of users face stalkerware on their phones. Many of them
are victims of intimate partner surveillance (IPS) who are unsure how to identify or remove …

Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection

A Heinrich, L Würsching, M Hollick - Proceedings on Privacy …, 2024 - petsymposium.org
While designed to locate lost items, Bluetooth trackers are increasingly exploited for malign
purposes, such as unwanted location tracking. This study probes deeper into this issue …

Detecting {iPhone} security compromise in simulated stalking scenarios: Strategies and obstacles

A Gallardo, H Kim, T Li, L Bauer, L Cranor - Eighteenth Symposium on …, 2022 - usenix.org
Mobile phones can be abused for stalking, through methods such as location tracking,
account compromise, and remote surveillance. We conducted eighteen remote semi …