[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2665943.2665965acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse

Published: 03 November 2014 Publication History

Abstract

Privacy is a concept with real life ties and implications. Privacy infringement has the potential to lead to serious consequences for the stakeholders involved, hence researchers and organisations have developed various privacy enhancing techniques and tools. However, there is no solution that fits all, and there are instances where privacy solutions could be misused, for example to hide nefarious activities. Therefore, it is important to provide suitable measures and to make necessary design tradeoffs in order to avoid such misuse. This short paper aims to make a case for the need of careful consideration when designing a privacy solution, such that the design effectively addresses the user requirements while at the same time minimises the risk of inadvertently assisting potential offenders. In other words, this paper strives to promote "sensible privacy" design, which deals with the complex challenges in balancing privacy, usability and accountability. We illustrate this idea through a case study involving the design of privacy solutions for domestic violence survivors. This is the main contribution of the paper. The case study presents specific user requirements and operating conditions, which coupled with the attacker model, provide a complex yet interesting scenario to explore. One example of our solutions is described in detail to demonstrate the feasibility of our approach.

References

[1]
Abadi, M. 2003. Private Authentication. Privacy Enhancing Technologies, 2482: 27--40.
[2]
Anonymiser, http://www.anonymizer.com, last accessed 2 Sep 14.
[3]
Boyd, D. and Ellison, N.B. 2008. Social Network Sites: Definition, History and Scholarship. Journal of Computer-mediated communication, 13: 210--230.
[4]
Crump, C. 2003. Data retention: privacy, anonymity and accountability online. Stanford Law review.
[5]
Dimond, J.P., Fiesler, C., and Bruckman, A.S. 2011. Domestic violence and information communication technologies. Interacting with Computers, 23(5): 413--421.
[6]
Dingledine, R., Freedman, M.J. and Molnar, D. 2000. The free haven project: Distributed anonymous storage service. In Procs. of the Workshop on Design Issues in Anonymity and Unobservability: 67--95.
[7]
Dingledine, R., Mathewson, N. and Syverson, P. 2004. Tor: The second-generation onion router. In Procs. 13th USENIX Security Symposium, San Diego, CA, USA: 303--320.
[8]
Emms, M., Arief, B., and van Moorsel, A. 2014. Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors. Privacy Technologies and Policy, Springer Berlin Heidelberg, LNCS 8319: 203--214.
[9]
Flegel, U. 2002. Pseudonymizing Unix Log Files. Infrastructure Security, 2437: 162--179.
[10]
Goldschlag, D.M., Reed, M.G and Syverson, P.F. 1996. Hiding routing information. Information Hiding: 137--150.
[11]
Greenwald, G., MacAskill, E., and Poitras, L. 2013. Edward Snowden: The Whistleblower Behind the Surveillance Revelations. The Guardian. 10 June 2013. Available at http://www.chebayadkard.com/uploadfile/english-article574.pdf, last accessed 2 Sep 14.
[12]
Hann, I., Hui, K., Lee, T. and Png, I. 2002. Online information privacy: measuring the cost-benefit trade-off. In Procs. Int'l Conf. on Inf. Sys. (ICIS 2002).
[13]
Horejsi, J. 2014. Android Forensics, Part 1: How we recovered (supposedly) erased data. Avast Blog 9 July 14. http://blog.avast.com/2014/07/09/android-foreniscs-pt-2-how-we-recovered-erased-data/, last accessed 2 Sep 14.
[14]
Kristol, D.M. 2001. Http cookies: Standards, privacy, and politics. ACM Trans. on Internet Technology, 1(2): 151--198.
[15]
Levine, B.N. and Shields, C. 2002. Hordes: a multicast based protocol for anonymity. J. of Comp. Sec., 10(3): 213--240.
[16]
Li, T. and Li, N. 2009. On the tradeoff between privacy and utility in data publishing. In Procs. ACM Int'l Conf. on Knowledge Discovery and Data mining (KDD'09), 517--526.
[17]
Logan, T. and Walker, R. 2009. Partner stalking: Psychological dominance or business as usual? Trauma Violence Abuse, 10(3): 247--270.
[18]
Mansfield-Devine, S. 2009. Darknets. Computer Fraud & Security, 2009(12): 4--6.
[19]
mixmaster, http://mixmaster.sourceforge.net/, last accessed 2 Sep 14.
[20]
Nissenbaum, H. F. 2004. Privacy as Contextual Integrity. Washington Law Review, 79(1): 119--158.
[21]
Palen, L. and Dourish, P. 2003. Unpacking "privacy" for a networked world. In Procs. SIGCHI Conference on Human Factors in Computing Systems, ACM: 129--136.
[22]
Pfitzmann, A. and Hansen, M. 2008. Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management -- A Consolidated Proposal for Terminology. Available at http://dud.inf.tu-dresden.de/Anon_Terminology.shtml, v0.31, last accessed: 2 Sep 14.
[23]
PGP, http://www.pgpi.org/, last accessed 16 July 13.
[24]
Raya, M., Shokri, R. and Hubaux, J. 2010. On the tradeoff between trust and privacy in wireless ad hoc networks. In Procs. ACM Conf. on Wireless network Security (WiSec'10).
[25]
Reiter, M.K. and Rubin, A.D.1998. Crowds: anonymity for web transactions. ACM Trans. on Inf. Sys. Sec., 1(1): 66--92.
[26]
Smith, G. 2013. Digital currency seized in alleged drug law violation in Charleston, The Post and Courier, available at http://www.postandcourier.com/article/20130707/PC16/130709585/1177/digital-currency-seized-in-alleged-drug-law-violation-in-charleston. 7 July 13, last accessed: 2 Sep 14.
[27]
Solove D. 2011. Nothing to hide: the false tradeoff between privacy and security. Yale University Press.
[28]
Southworth, C., Finn, J., Dawson, S., Fraser, C., and Tucker, S. 2007. Intimate Partner Violence, Technology, and Stalking. Violence Against Women. 13(8): 842--856.
[29]
Spiekermann, S., and Cranor, L.F. 2009. Engineering Privacy. IEEE Trans. on Soft. Eng., 35(1): 67--82.
[30]
Tails: The Amnesic Incognito Life System. https://tails.boum.org/, last accessed: 2 Sep 14.
[31]
van Moorsel, A., Emms, M., Rendall, G., and Arief, B. 2011. Digital Strategy for the Social Inclusion of Survivors of Domestic Violence. Technical Report CS-TR-1277, School of Computing Science, Newcastle University. September.
[32]
Westmarland, N., Hardey, M., Bows, H., Branley, D., Chowdhury, M., Wheatley, K. and Wistow, R. 2013. Protecting Women's Safety? The use of smartphone "apps" in relation to domestic and sexual violence. Available at https://www.dur.ac.uk/resources/sass/research/briefings/ResearchBriefing12-ProtectingWomensSafety.pdf, last accessed 2 Sep 14.

Cited By

View all
  • (2024)'Women just have to accept it when the man wants it': An Investigation of the Practice of Forced Marriage and the Potential for Design InterventionsProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685371(1-14)Online publication date: 13-Oct-2024
  • (2023)Survivor-Centered Transformative Justice: An Approach to Designing Alongside Domestic Violence Stakeholders in US Muslim CommunitiesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3580648(1-19)Online publication date: 19-Apr-2023
  • (2022)SoK: The Dual Nature of Technology in Sexual Abuse2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833663(2320-2343)Online publication date: May-2022
  • Show More Cited By

Index Terms

  1. Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic Society
        November 2014
        218 pages
        ISBN:9781450331487
        DOI:10.1145/2665943
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 03 November 2014

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. accountability
        2. domestic violence
        3. investigations
        4. privacy
        5. privacy enhancing technologies
        6. privacy threats.
        7. survivors
        8. tradeoffs

        Qualifiers

        • Research-article

        Funding Sources

        Conference

        CCS'14
        Sponsor:

        Upcoming Conference

        CCS '25

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)48
        • Downloads (Last 6 weeks)6
        Reflects downloads up to 11 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)'Women just have to accept it when the man wants it': An Investigation of the Practice of Forced Marriage and the Potential for Design InterventionsProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685371(1-14)Online publication date: 13-Oct-2024
        • (2023)Survivor-Centered Transformative Justice: An Approach to Designing Alongside Domestic Violence Stakeholders in US Muslim CommunitiesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3580648(1-19)Online publication date: 19-Apr-2023
        • (2022)SoK: The Dual Nature of Technology in Sexual Abuse2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833663(2320-2343)Online publication date: May-2022
        • (2021)Exploring Transformative Justice Principles to Inform Survivor-Centered Design for Muslim Women in the United StatesCompanion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing10.1145/3462204.3481797(291-294)Online publication date: 23-Oct-2021
        • (2021)Daughters of MenProceedings of the ACM on Human-Computer Interaction10.1145/34329234:CSCW3(1-31)Online publication date: 5-Jan-2021
        • (2020)Towards understanding privacy and trust in online reporting of sexual assaultProceedings of the Sixteenth USENIX Conference on Usable Privacy and Security10.5555/3488905.3488914(145-164)Online publication date: 10-Aug-2020
        • (2020)Technology-Facilitated Domestic Abuse in Political Economy: A New Theoretical FrameworkViolence Against Women10.1177/107780122094717227:10(1479-1498)Online publication date: 6-Aug-2020
        • (2020)Mechanisms of Moral Responsibility: Rethinking Technologies for Domestic Violence Prevention WorkProceedings of the 2020 CHI Conference on Human Factors in Computing Systems10.1145/3313831.3376693(1-13)Online publication date: 21-Apr-2020
        • (2019)Usability analysis of shared device ecosystem securityProceedings of the New Security Paradigms Workshop10.1145/3368860.3368861(1-15)Online publication date: 23-Sep-2019
        • (2019)"Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner ViolenceProceedings of the ACM on Human-Computer Interaction10.1145/33593043:CSCW(1-24)Online publication date: 7-Nov-2019
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media