Artificial intelligence and crime: A primer for criminologists
KJ Hayward, MM Maas - Crime, Media, Culture, 2021 - journals.sagepub.com
This article introduces the concept of Artificial Intelligence (AI) to a criminological audience.
After a general review of the phenomenon (including brief explanations of important cognate …
After a general review of the phenomenon (including brief explanations of important cognate …
Technology-based mental health interventions for domestic violence victims amid COVID-19
Introduction: Domestic violence is a threat to human dignity and public health. Mounting
evidence shows that domestic violence erodes personal and public health, spawning issues …
evidence shows that domestic violence erodes personal and public health, spawning issues …
No privacy among spies: Assessing the functionality and insecurity of consumer android spyware apps
Consumer mobile spyware apps covertly monitor a user's activities (ie, text messages,
phone calls, e-mail, location, etc.) and transmit that information over the Internet to support …
phone calls, e-mail, location, etc.) and transmit that information over the Internet to support …
Technology-facilitated domestic abuse in political economy: A new theoretical framework
E Yardley - Violence against women, 2021 - journals.sagepub.com
This article presents a new theoretical framework around technology-facilitated domestic
abuse (TFDA) in identifying four distinct types of omnipresent behavior. Perpetrators are …
abuse (TFDA) in identifying four distinct types of omnipresent behavior. Perpetrators are …
Navigating traumatic stress reactions during computer security interventions
L Ramjit, N Dolci, F Rossi, R Garcia… - 33rd USENIX Security …, 2024 - usenix.org
At-risk populations need direct support from computer security and privacy consultants, what
we refer to as a security intervention. However, at-risk populations often face security threats …
we refer to as a security intervention. However, at-risk populations often face security threats …
Is it actually violence? Framing technology-facilitated abuse as violence
S Dunn - The Emerald international handbook of technology …, 2021 - emerald.com
When discussing the term “technology-facilitated violence”(TFV) it is often asked:“Is it
actually violence?” While international human rights standards, such as the United Nations' …
actually violence?” While international human rights standards, such as the United Nations' …
Account security interfaces: important, unintuitive, and untrustworthy
Online services increasingly rely on user-facing interfaces to communicate important
security-related account information—for example, which devices are logged into a user's …
security-related account information—for example, which devices are logged into a user's …
Comparing User Perceptions of {Anti-Stalkerware} Apps with the Technical Reality
Every year an increasing number of users face stalkerware on their phones. Many of them
are victims of intimate partner surveillance (IPS) who are unsure how to identify or remove …
are victims of intimate partner surveillance (IPS) who are unsure how to identify or remove …
Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection
While designed to locate lost items, Bluetooth trackers are increasingly exploited for malign
purposes, such as unwanted location tracking. This study probes deeper into this issue …
purposes, such as unwanted location tracking. This study probes deeper into this issue …
Detecting {iPhone} security compromise in simulated stalking scenarios: Strategies and obstacles
Mobile phones can be abused for stalking, through methods such as location tracking,
account compromise, and remote surveillance. We conducted eighteen remote semi …
account compromise, and remote surveillance. We conducted eighteen remote semi …