[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Safer Algorithmically-Mediated Offline Introductions: Harms and Protective Behaviors

Published: 08 November 2024 Publication History

Abstract

People are increasingly introduced to each other offline thanks to online platforms that make algorithmically-mediated introductions between their users. Such platforms include dating apps (e.g., Tinder) and in-person gig work websites (e.g., TaskRabbit, Care.com). Protecting the users of these online-offline systems requires answering calls from prior work to consider 'post-digital' orientations of safety: shifting from traditional technological security thinking to consider algorithm-driven consequences that emerge throughout online and offline contexts rather than solely acknowledging online threats. To support post-digital safety in platforms that make algorithmically-mediated offline introductions (AMOIs), we apply a mixed-methods approach to identify the core harms that AMOI users experience, the protective safety behaviors they employ, and the prevalence of those behaviors. First, we systematically review existing work (n=93), synthesizing the harms that threaten AMOIs and the protective behaviors people employ to combat these harms. Second, we validate prior work and fill gaps left by primarily qualitative inquiry through a survey of respondents' definitions of safety in AMOI and the prevalence and implementation of their protective behaviors. We focus on two exemplar populations who engage in AMOIs: online daters (n=476) and in-person gig workers (n=451). We draw on our systematization and prevalence data to identify several directions for designers and researchers to reimagine defensive tools to support safety in AMOIs.

References

[1]
Kendra Albert, Emily Armbruster, Elizabeth Brundige, Elizabeth Denning, Kimberly Kim, Lorelei Lee, Lindsey Ruff, Korica Simon, and Yueyu Yang. 2020. FOSTA in legal context. Columbia Human Rights Law Review, Vol. 52 (2020), 1084.
[2]
Martin R Albrecht, Jorge Blasco, Rikke Bjerg Jensen, and Lenka Mareková. 2021. Collective Information Security in Large-Scale Urban Protests: The Case of Hong Kong. In 30th USENIX Security Symposium (USENIX Security 21). 3363--3380.
[3]
Kath Albury and Paul Byron. 2016. Safe on My Phone? Same-Sex Attracted Young People's Negotiations of Intimacy, Visibility, and Risk on Digital Hook-Up Apps. Social Media Society, Vol. 2, 4 (Oct. 2016), 2056305116672887. https://doi.org/10.1177/2056305116672887
[4]
Kath Albury, Paul Byron, Anthony McCosker, Tinonee Pym, Jarrod Walshe, Kane Race, Doreen Salon, Tim Wark, Jessica Botfield, Daniel Reeders, and Christopher Dietzel. 2019. Safety, risk and wellbeing on dating apps: Final report. Report. Swinburne University of Technology. https://apo.org.au/node/268156
[5]
Kath Albury, Anthony McCosker, Tinonee Pym, and Paul Byron. 2020. Dating apps as public health ?problems?: Cautionary tales and vernacular pedagogies in news media. Health Sociology Review, Vol. 29, 3 (Sept. 2020), 232--248. https://doi.org/10.1080/14461242.2020.1777885
[6]
Hanan Khalid Aljasim and Douglas Zytko. 2023. Foregrounding Women's Safety in Mobile Social Matching and Dating Apps: A Participatory Design Study. Proceedings of the ACM on Human-Computer Interaction, Vol. 7, GROUP (2023), 1--25.
[7]
Mashael Yousef Almoqbel and Donghee Yvette Wohn. 2019. Individual and Collaborative Behaviors of Rideshare Drivers in Protecting their Safety. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (Nov. 2019), 217:1--217:21. https://doi.org/10.1145/3359319
[8]
Micah Altman, Alexandra Wood, and Effy Vayena. 2018. A harm-reduction framework for algorithmic fairness. IEEE Security & Privacy, Vol. 16, 3 (2018), 34--45.
[9]
Ira Anjali Anwar, Joyojeet Pal, and Julie Hui. 2021. Watched, but Moving: Platformization of Beauty Work and Its Gendered Mechanisms of Control. Proceedings of the ACM on Human-Computer Interaction, Vol. 4, CSCW3 (Jan. 2021), 250:1--250:20. https://doi.org/10.1145/3432949
[10]
Kofi Annan. 2001. Definitions of human security. https://www.gdrc.org/.
[11]
Avi Asher-Schapiro. 2022. U.S. gig worker murders expose apps' safety gaps, says labor group. https://news.trust.org/item/20220406101735-ixk5v/.
[12]
Noah Ashman. 2020. Outed by Advertisements: How LGBTQ Internet Users Present a Case for Federal Data Privacy Legislation. Or. L. Rev., Vol. 99 (2020), 523.
[13]
Australia eSafety Commissioner. 2021. Principles and background. https://www.esafety.gov.au/industry/safety-by-design/principles-and-background. (Accessed on 07/17/2023).
[14]
Hanna Barakat and Elissa M Redmiles. 2022. Community under surveillance: Impacts of marginalization on an online labor forum. In Proceedings of the International AAAI Conference on Web and Social Media, Vol. 16. 12--21.
[15]
John A Bargh, Katelyn YA McKenna, and Grainne M Fitzsimons. 2002. Can you see the real me? Activation and expression of the 'true self' on the Internet. Journal of social issues, Vol. 58, 1 (2002), 33--48.
[16]
Catherine Barwulor, Allison McDonald, Eszter Hargittai, and Elissa M Redmiles. 2021. “Disadvantaged in the American-dominated internet”: Sex, Work, and Technology. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1--16.
[17]
Ruha Benjamin. 2016. Informed refusal: Toward a justice-based bioethics. Science, Technology, & Human Values, Vol. 41, 6 (2016), 967--990.
[18]
Danielle Blunt and Ariel Wolf. 2020. Erased: The impact of FOSTA-SESTA and the removal of Backpage on sex workers. Anti-trafficking Review 14 (2020), 117--121.
[19]
Danielle Blunt, Ariel Wolf, Emily Coombes, and Shanelle Mullin. 2020. Posting into the void: Studying the impact of shadowbanning on sex workers and activists. https://hackinghustling.org/posting-into-the-void-content-moderation/.
[20]
Jessica E Bodford, Cameron J Bunker, and Virginia SY Kwan. 2021. Does perceived social networking site security arise from actual and perceived physical safety? Computers in Human Behavior, Vol. 121 (2021), 106779.
[21]
Julie Boesen, Jennifer A Rode, and Clara Mancini. 2010. The domestic panopticon: Location tracking in families. In Proceedings of the 12th ACM International Conference on Ubiquitous Computing. 65--74.
[22]
Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology, Vol. 3, 2 (2006), 77--101.
[23]
Cristian Bravo-Lillo, Lorrie Faith Cranor, Julie Downs, and Saranga Komanduri. 2010. Bridging the gap in computer security warnings: A mental model approach. IEEE Security & Privacy, Vol. 9, 2 (2010), 18--26.
[24]
Carolyn Bronstein. 2021. Deplatforming sexual speech in the age of FOSTA/SESTA. Porn Studies, Vol. 8, 4 (2021), 367--380.
[25]
Kellen Browning. 2022. At least 50 people have been killed doing gig driving since 2017, report says. https://www.nytimes.com/2022/04/06/business/uber-lyft-driver-deaths.html.
[26]
Jed R Brubaker, Mike Ananny, and Kate Crawford. 2016. Departing glances: A sociotechnical account of `leaving? Grindr. New Media & Society, Vol. 18, 3 (2016), 373--390.
[27]
Caroline Bull, Hanan Aljasim, and Douglas Zytko. 2021. Designing Opportunistic Social Matching Systems for Women's Safety During Face-to-Face Social Encounters. In CSCW '21: Companion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing (Virtual Event, USA). 23--26. https://doi.org/10.1145/3462204.3481751
[28]
United States Census Bureau. 2020. 2020 Census Demographic Profile. https://www.census.gov/data/tables/2023/dec/2020-census-demographic-profile.html#data.
[29]
Jenna Burrell. 2016. How the machine 'thinks': Understanding opacity in machine learning algorithms. Big data & society, Vol. 3, 1 (2016), 2053951715622512.
[30]
Yvette Butler. 2020. Aligned: Sex Workers' Lessons for the Gig Economy. Michigan Journal of Race & Law, Vol. 26 (2020), 337.
[31]
Mark Button, Carol McNaughton Nicholls, Jane Kerr, and Rachael Owen. 2014. Online frauds: Learning from victims why they fall for these scams. Australian & New Zealand Journal of Criminology, Vol. 47, 3 (2014), 391--408.
[32]
Lindsey D Cameron, Bobbi Thomason, and Vanessa M Conzon. 2021. Risky business: Gig workers and the navigation of ideal worker expectations during the COVID-19 pandemic. Journal of Applied Psychology, Vol. 106, 12 (2021), 1821.
[33]
Lauren F Cardoso, Susan B Sorenson, Olivia Webb, and Sara Landers. 2019. Recent and emerging technologies: Implications for women's safety. Technology in Society, Vol. 58 (2019), 101108.
[34]
Bronwyn Carlson. 2020. Love and hate at the cultural interface: Indigenous Australians and dating apps. Journal of Sociology, Vol. 56, 2 (2020), 133--150.
[35]
Avner Caspi and Paul Gorsky. 2006. Online deception: Prevalence, motivation, and emotion. CyberPsychology & Behavior, Vol. 9, 1 (2006), 54--59.
[36]
Stevie Chancellor, Jessica Annette Pater, Trustin Clear, Eric Gilbert, and Munmun De Choudhury. 2016. # thyghgapp: Instagram content moderation and lexical variation in pro-eating disorder communities. In Proceedings of the 19th ACM conference on computer-supported cooperative work & social computing. 1201--1213.
[37]
Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, and Thomas Ristenpart. 2018. The spyware used in intimate partner violence. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 441--458.
[38]
Janet X Chen, Allison McDonald, Yixin Zou, Emily Tseng, Kevin A Roundy, Acar Tamersoy, Florian Schaub, Thomas Ristenpart, and Nicola Dell. 2022. Trauma-informed computing: Towards safer technology experiences for all. In Proceedings of the 2022 CHI conference on human factors in computing systems. 1--20.
[39]
Edmond Pui Hang Choi, Janet Yuen Ha Wong, and Daniel Yee Tak Fong. 2018. An emerging risk factor of sexual abuse: The use of smartphone dating applications. Sexual Abuse, Vol. 30, 4 (2018), 343--366.
[40]
Nicola Christie and Heather Ward. 2019. The health and safety risks for people who drive for work in the gig economy. Journal of Transport & Health, Vol. 13 (2019), 115--127.
[41]
Angèle Christin. 2020. The ethnographer and the algorithm: beyond the black box. Theory and Society, Vol. 49, 5--6 (2020), 897--918.
[42]
Danielle Keats Citron and Daniel J Solove. 2022. Privacy harms. BUL Rev., Vol. 102 (2022), 793.
[43]
Camille Cobb and Tadayoshi Kohno. 2017. How Public Is My Private Life? Privacy in Online Dating. In Proceedings of the 26th International Conference on World Wide Web (WWW '17). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 1231--1240. https://doi.org/10.1145/3038912.3052592
[44]
Lizzie Coles-Kemp, Rikke Bjerg Jensen, and Claude P. R. Heath. 2020. Too Much Information: Questioning Security in a Post-Digital Society. Association for Computing Machinery, New York, NY, USA, 1--14. https://doi.org/10.1145/3313831.3376214
[45]
Jessica Colnago, Lorrie Faith Cranor, and Alessandro Acquisti. 2023. Is there a reverse privacy paradox? an exploratory analysis of gaps between privacy perspectives and privacy-seeking behaviors. Proceedings on Privacy Enhancing Technologies, Vol. 1 (2023), 455--476.
[46]
Larry Conklin. 2024. Threat Modeling Process. https://owasp.org/www-community/Threat_Modeling_Process.
[47]
Karen Corteen. 2002. Lesbian safety talk: Problematizing definitions and experiences of violence, sexuality and space. Sexualities, Vol. 5, 3 (2002), 259--280.
[48]
Danielle Couch and Pranee Liamputtong. 2007. Online dating and mating: Perceptions of risk and health among online users. Health, Risk & Society, Vol. 9, 3 (2007), 275--294.
[49]
Danielle Couch, Pranee Liamputtong, and Marian Pitts. 2012. What are the real and perceived risks and dangers of online dating? Perspectives from online daters: Health risks in the media. Health, Risk & Society, Vol. 14, 7--8 (2012), 697--714.
[50]
Rachel Cummings, Gabriel Kaptchuk, and Elissa M Redmiles. 2021. " I need a better description": An Investigation Into User Expectations For Differential Privacy. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 3037--3052.
[51]
Maria Dinzeo. 2018. Ninth Circuit Takes New Look at Duty to Warn in Match Gone Bad. https://www.courthousenews.com/ninth-circuit-takes-new-look-at-duty-to-warn-in-match-gone-bad/. (Accessed on 07/16/2023).
[52]
Periwinkle Doerfler, Andrea Forte, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn, and Damon McCoy. 2021. “I'm a Professor, which isn't usually a dangerous job”: Internet-facilitated Harassment and Its Impact on Researchers. Proceedings of the ACM on Human-Computer Interaction, Vol. 5, CSCW2 (2021), 1--32.
[53]
Stefanie Duguay. 2016. “He has a way gayer Facebook than I do”: Investigating sexual identity disclosure and context collapse on a social networking site. New media & society, Vol. 18, 6 (2016), 891--907.
[54]
Stefanie Duguay, Jean Burgess, and Nicolas Suzor. 2020. Queer women's experiences of patchwork platform governance on Tinder, Instagram, and Vine. Convergence, Vol. 26, 2 (2020), 237--252.
[55]
Brianna Dym and Casey Fiesler. 2020. Social norm vulnerability and its consequences for privacy and safety in an online community. Proceedings of the ACM on Human-Computer Interaction, Vol. 4, CSCW2 (2020), 1--24.
[56]
Josh Dzieza. 2021. Revolt of the Delivery Workers. https://www.curbed.com/article/nyc-delivery-workers.html.
[57]
Nicole B Ellison, Jeffrey T Hancock, and Catalina L Toma. 2012. Profile as promise: A framework for conceptualizing veracity in online dating self-presentations. New media & society, Vol. 14, 1 (2012), 45--62.
[58]
Sheena Erete, Yolanda A Rankin, and Jakita O Thomas. 2021. I can't breathe: Reflections from Black women in CSCW and HCI. Proceedings of the ACM on Human-Computer Interaction, Vol. 4, CSCW3 (2021), 1--23.
[59]
Australia eSafety Commissioner. 2024. eSafety Commissioner. https://www.esafety.gov.au/.
[60]
Kimberly Fairchild. 2015. “But look at what she was wearing!”: Victim blaming and street harassment. In Gender, Sex, and Politics. Routledge, 22--32.
[61]
Julia R. Fernandez and Jeremy Birnholtz. 2019. “I Don't Want Them to Not Know”: Investigating Decisions to Disclose Transgender Identity on Dating Platforms. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (Nov. 2019), 226:1--226:21. https://doi.org/10.1145/3359328
[62]
Lauren S Ferro, Andrea Marrella, and Tiziana Catarci. 2021. A Human Factor Approach to Threat Modeling. In International Conference on Human-Computer Interaction. Springer, 139--157.
[63]
Nataliia Filatova-Bilous. 2021. Once again platform liability: On the edge of the" Uber" and" Airbnb" cases. Internet Policy Review, Vol. 10, 2 (2021), 1--27.
[64]
Eric Filice, Kavishka D Abeywickrama, Diana C Parry, and Corey W Johnson. 2022. Sexual violence and abuse in online dating: A scoping review. Aggression and violent behavior, Vol. 67 (2022), 101781.
[65]
Eli J Finkel, Paul W Eastwick, Benjamin R Karney, Harry T Reis, and Susan Sprecher. 2012. Online dating: A critical analysis from the perspective of psychological science. Psychological Science in the Public Interest, Vol. 13, 1 (2012), 3--66.
[66]
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. “A Stalker's Paradise”: How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--13.
[67]
Andrea Gallardo, Hanseul Kim, Tianying Li, Lujo Bauer, and Lorrie Cranor. 2022. Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and Obstacles. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). 291--312.
[68]
Kira M Geary. 2020. Section 230 of the Communications Decency Act, Product Liability, and a Proposal for Preventing Dating-App Harassment. Penn St. L. Rev., Vol. 125 (2020), 501.
[69]
Jennifer L Gibbs, Nicole B Ellison, and Chih-Hui Lai. 2011. First comes love, then comes Google: An investigation of uncertainty reduction strategies and self-disclosure in online dating. Communication Research, Vol. 38, 1 (2011), 70--100.
[70]
Louisa Gilbert, Aaron L Sarvet, Melanie Wall, Kate Walsh, Leigh Reardon, Patrick Wilson, John Santelli, Shamus Khan, Martie Thompson, Jennifer S Hirsch, et al. 2019. Situational contexts and risk factors associated with incapacitated and nonincapacitated sexual assaults among college women. Journal of Women's Health, Vol. 28, 2 (2019), 185--193.
[71]
Eden Gillespie and Tamsin Rose. 2022. Call for dating apps to require criminal checks as Australian government plans summit on safety | Australian police and policing. https://www.theguardian.com/australia-news/2022/dec/24/call-for-dating-apps-to-require-criminal-checks-as-australian-government-plans-summit-on-safety. (Accessed on 07/16/2023).
[72]
Rosalie Gillett. 2018. Intimate intrusions online: Studying the normalisation of abuse in dating apps. In Women's Studies International Forum, Vol. 69. Elsevier, 212--219.
[73]
Rosalie Gillett. 2021. “This is not a nice safe space”: Investigating women's safety work on Tinder. Feminist Media Studies, Vol. 23, 1 (2021), 1--17.
[74]
Nancy Glass, Amber Clough, James Case, Ginger Hanson, Jamie Barnes-Hoyt, Amy Waterbury, Jeanne Alhusen, Miriam Ehrensaft, Karen Trister Grace, and Nancy Perrin. 2015. A safety app to respond to dating violence for college women and their friends: The MyPlan study randomized controlled trial protocol. BMC Public Health, Vol. 15, 1 (2015), 1--13.
[75]
Paul Glavin, Alex Bierman, and Scott Schieman. 2021. Über-alienated: Powerless and alone in the gig economy. Work and Occupations, Vol. 48, 4 (2021), 399--431.
[76]
Mark Graham, Isis Hjorth, and Vili Lehdonvirta. 2017. Digital labour and development: Impacts of global digital labour platforms and the gig economy on worker livelihoods. Transfer: European Review of Labour and Research, Vol. 23, 2 (2017), 135--162.
[77]
Mary L Gray and Siddharth Suri. 2019. Ghost work: How to stop Silicon Valley from building a new global underclass. Eamon Dolan Books.
[78]
Ana M Giménez Gualdo, Simon C Hunter, Kevin Durkin, Pilar Arnaiz, and Javier J Maquilón. 2015. The emotional impact of cyberbullying: Differences in perceptions and experiences as a function of role. Computers & Education, Vol. 82 (2015), 228--235.
[79]
Cheng Guo, Brianne Campbell, Apu Kapadia, Michael K Reiter, and Kelly Caine. 2021. Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication. In 30th USENIX Security Symposium (USENIX Security 21). 1--18.
[80]
Shruti Gupta. 2020. Gendered Gigs: Understanding the Gig Economy in New Delhi from a Gendered Perspective. In Proceedings of the 2020 International Conference on Information and Communication Technologies and Development (Guayaquil, Ecuador) (ICTD2020). Article 7, 10 pages. https://doi.org/10.1145/3392561.3394635
[81]
Oliver L Haimson, Justin Buss, Zu Weinger, Denny L Starks, Dykee Gorrell, and Briar Sweetbriar Baron. 2020. Trans Time: Safety, Privacy, and Content Warnings on a Transgender-Specific Social Media Site. Proceedings of the ACM on Human-Computer Interaction, Vol. 4, CSCW2 (2020), 1--27.
[82]
Oliver L. Haimson, Dykee Gorrell, Denny L. Starks, and Zu Weinger. 2020. Designing Trans Technology: Defining Challenges and Envisioning Community-Centered Solutions. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--13. https://doi.org/10.1145/3313831.3376669
[83]
Vaughn Hamilton, Hanna Barakat, and Elissa M Redmiles. 2022. Risk, Resilience and Reward: Impacts of Shifting to Digital Sex Work. Proceedings of the ACM on Human-Computer Interaction, Vol. 6, CSCW (2022), 1--37.
[84]
Kenneth R. Hanson. 2021. Becoming a (Gendered) Dating App User: An Analysis of How Heterosexual College Students Navigate Deception and Interactional Ambiguity on Dating Apps. Sexuality & Culture, Vol. 25, 1 (Feb. 2021), 75--92. https://doi.org/10.1007/s12119-020-09758-w
[85]
Bridget A Harris and Delanie Woodlock. 2019. Digital coercive control: Insights from two landmark domestic violence studies. The British Journal of Criminology, Vol. 59, 3 (2019), 530--550.
[86]
Steven Hick, Edward Halpin, and Eric Hoskins. 2016. Human rights and the Internet. Springer.
[87]
Kashmir Hill. 2020. I Tried to Live Without the Tech Giants. It was Impossible. https://www.nytimes.com/2020/07/31/technology/blocking-the-tech-giants.html.
[88]
Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M Voelker, and David Wagner. 2019. Detecting and characterizing lateral phishing at scale. In 28th USENIX Security Symposium (USENIX Security 19). 1273--1290.
[89]
Karen Holtzblatt and Hugh Beyer. 1997. Contextual Design: Defining Customer-centered Systems. Elsevier.
[90]
Sarah Homewood. 2019. Inaction as a Design Decision: Reflections on Not Designing Self-Tracking Tools for Menopause. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI EA '19). 1--12. https://doi.org/10.1145/3290607.3310430
[91]
Julie Hui, Kentaro Toyama, Joyojeet Pal, and Tawanna Dillahunt. 2018. Making a Living My Way: Necessity-Driven Entrepreneurship in Resource-Constrained Communities. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW, Article 71 (Nov 2018), 24 pages. https://doi.org/10.1145/3274340
[92]
Abigail Hunt, Emma Samman, Sherry Tapfuma, Grace Mwaura, Rhoda Omenya, Kay Kim, Sara Stevano, and Aida Roumer. 2019. Women in the gig economy: Paid work, care and flexibility in Kenya and South Africa. Technical Report. ODI. https://odi.org/en/publications/women-in-the-gig-economy-paid-work-care-and-flexibility-in-kenya-and-south-africa/
[93]
Mohammad Hossein Jarrahi and Will Sutherland. 2019. Algorithmic management and algorithmic competencies: Understanding and appropriating algorithms in gig work. In International Conference on Information. Springer, 578--589.
[94]
Mohammad Hossein Jarrahi, Will Sutherland, Sarah Beth Nelson, and Steve Sawyer. 2020. Platformic management, boundary resources for gig work, and worker autonomy. Computer supported cooperative work (CSCW), Vol. 29, 1 (2020), 153--189.
[95]
Jialun Aaron Jiang, Morgan Klaus Scheuerman, Casey Fiesler, and Jed R Brubaker. 2021. Understanding international perceptions of the severity of harmful content online. PloS one, Vol. 16, 8 (2021), e0256762.
[96]
Carrie Ann Johnson. 2023. The purpose of whisper networks: a new lens for studying informal communication channels in organizations. Frontiers in Communication, Vol. 8 (2023), 1089335.
[97]
Nicole Kalms. 2017. Digital technology and the safety of women and girls in urban space: Personal safety Apps or crowd-sourced activism tools? In Architecture and Feminisms. Routledge, 112--121.
[98]
Naveena Karusala and Neha Kumar. 2017. Women's Safety in Public Spaces: Examining the Efficacy of Panic Buttons in New Delhi. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 3340--3351. https://doi.org/10.1145/3025453.3025532
[99]
Douglas T. Kenrick, Vladas Griskevicius, Steven L. Neuberg, and Mark Schaller. 2010. Renovating the Pyramid of Needs: Contemporary Extensions Built upon Ancient Foundations. Perspectives on Psychological Science, Vol. 5, 3 (2010), 292--314. https://doi.org/10.1177/1745691610369469
[100]
Os Keyes, Josephine Hoy, and Margaret Drouhard. 2019. Human-Computer Insurrection: Notes on an Anarchist HCI. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI '19). Association for Computing Machinery, New York, NY, USA, 1--13. https://doi.org/10.1145/3290605.3300569
[101]
Alfred Kobsa, Sameer Patil, and Bertolt Meyer. 2012. Privacy in instant messaging: An impression management model. Behaviour & Information Technology, Vol. 31, 4 (2012), 355--370.
[102]
Roman Kuhar and Mojca Pajnik. 2019. Negotiating professional identities: Male sex workers in Slovenia and the impact of online technologies. Sexuality Research and Social Policy, Vol. 16, 2 (2019), 227--238.
[103]
Isak Ladegaard, Alexandrea J Ravenelle, and Juliet Schor. 2022. `God Is Protecting Me? And I Have Mace?: Defensive Labour In Precarious Workplaces. The British Journal of Criminology, Vol. 62, 3 (2022), 773--789.
[104]
Daniele Lain, Kari Kostiainen, and Srdjan vCapkun. 2022. Phishing in organizations: Findings from a large-scale and long-term study. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 842--859.
[105]
Min Kyung Lee, Daniel Kusbit, Evan Metsky, and Laura Dabbish. 2015. Working with machines: The impact of algorithmic and data-driven management on human workers. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1603--1612.
[106]
Rachel Lerman. 2021. Tinder's upcoming feature for singles? A criminal background check on potential dates. https://www.washingtonpost.com/technology/2021/03/16/tinder-match-background-check/.
[107]
Karen Levy and Solon Barocas. 2017. Designing against discrimination in online markets. Berkeley Technology Law Journal, Vol. 32, 3 (2017), 1183--1238.
[108]
Ruth Lewis, Elizabeth Sharp, Jenni Remnant, and Rhiannon Redpath. 2015. `Safe spaces?: Experiences of feminist women-only space. Sociological Research Online, Vol. 20, 4 (2015), 105--118.
[109]
Calvin Liang, Jevan Hutson, and Os Keyes. 2020. Surveillance, stigma & sociotechnical design for HIV. arXiv preprint arXiv:2006.04882 (2020).
[110]
Jennifer Hickes Lundquist and Celeste Vaughan Curington. 2019. Love me Tinder, love me sweet. Contexts, Vol. 18, 4 (2019), 22--27.
[111]
Peter Lynn. 2009. Methodology of Longitudinal Surveys. Wiley Online Library.
[112]
Ning F. Ma, Veronica A. Rivera, Zheng Yao, and Dongwook Yoon. 2022. “Brush It Off”: How Women Workers Manage and Cope with Bias and Harassment in Gender-Agnostic Gig Platforms. In CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI '22). Article 397, 13 pages. https://doi.org/10.1145/3491102.3517524
[113]
Zhuang Ma, Woon Kian Chong, and Linpei Song. 2022. How Arousing Benefits and Ethical Misgivings Affect AI-Based Dating App Adoption: The Roles of Perceived Autonomy and Perceived Risks. In International Conference on Human-Computer Interaction. Springer, 160--170.
[114]
Michael Maffie and Allison Elias. 2019. Platform design as a managerial act: Analyzing sexual harassment in the gig economy. LERA For Libraries, Vol. 23, 2 (2019), 18--23.
[115]
Sridhar Mandapati, Sravya Pamidi, and Sriharitha Ambati. 2015. A mobile based women safety application (I Safe Apps). IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 17, 1 (2015), 29--34.
[116]
Alice E. Marwick. 2023. The Private is Political: Networked Privacy and Social Media. Yale University Press.
[117]
Christina Masden and W Keith Edwards. 2015. Understanding the role of community in online dating. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 535--544.
[118]
Sarah Maslen. 2021. (Dis) connected parenting: Other-tracking in the more-than-human sensorium. The Senses and Society, Vol. 16, 1 (2021), 67--79.
[119]
A. H. Maslow. 1943. A Theory of Human Motivation. Psychological Review, Vol. 50, 4 (1943), 370--396. https://doi.org/10.1037/h0054346
[120]
Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F Churchill, and Sunny Consolvo. 2017. Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 2189--2201.
[121]
Lucy Maxwell, Alex Sanders, Jason Skues, and Lisa Wise. 2020. A content analysis of personal safety apps: Are they keeping us safe or making us more vulnerable? Violence Against Women, Vol. 26, 2 (2020), 233--248.
[122]
Bronwyn McBride, Kate Shannon, Brittany Bingham, Melissa Braschel, Steffanie Strathdee, and Shira M Goldenberg. 2020. Underreporting of violence to police among women sex workers in Canada: Amplified inequities for im/migrant and in-call workers prior to and following end-demand legislation. Health and Human Rights, Vol. 22, 2 (2020), 257.
[123]
Bronwyn McBride, Kate Shannon, Alka Murphy, Sherry Wu, Margaret Erickson, Shira M Goldenberg, and Andrea Krüsi. 2021. Harms of third party criminalisation under end-demand legislation: Undermining sex workers? safety and rights. Culture, Health & Sexuality, Vol. 23, 9 (2021), 1165--1181.
[124]
Allison McDonald, Catherine Barwulor, Michelle L Mazurek, Florian Schaub, and Elissa M Redmiles. 2021. “It's stressful having all these phones”: Investigating Sex Workers' Safety Goals, Risks, and Practices Online. In 30th USENIX Security Symposium (USENIX Security 21). 375--392.
[125]
Metropolitan Police. n.d. Request information under Clare's Law: Make a Domestic Violence Disclosure Scheme (DVDS) application. https://www.met.police.uk/advice/advice-and-information/daa/domestic-abuse/alpha2/request-information-under-clares-law/. (Accessed on 08/31/2022).
[126]
Ruth Milkman, Luke Elliott-Negri, Kathleen Griesbach, and Adam Reich. 2021. Gender, Class, and the Gig Economy: The Case of Platform-Based Food Delivery. Critical Sociology, Vol. 47, 3 (May 2021), 357--372. https://doi.org/10.1177/0896920520949631 Publisher: SAGE Publications Ltd.
[127]
Jaron Mink, Licheng Luo, Nat a M Barbosa, Olivia Figueira, Yang Wang, and Gang Wang. 2022. DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks. In Proc. of USENIX Security.
[128]
Eva Moog. 2021. Design for Safety. A Book Apart.
[129]
Max Morris. 2021. The limits of labelling: Incidental sex work among gay, bisexual, and queer young men on social media. Sexuality Research and Social Policy, Vol. 18, 4 (2021), 855--868.
[130]
Tatenda Mpofu, Pitso Tsibolane, Richard Heeks, and Jean-Paul Van Belle. 2020. Risks and Risk-Mitigation Strategies of Gig Economy Workers in the Global South: The Case of Ride-Hailing in Cape Town. In Information and Communication Technologies for Development (IFIP Advances in Information and Communication Technology), Julian M. Bass and P. J. Wall (Eds.). Springer International Publishing, Cham, 26--38. https://doi.org/10.1007/978--3-030--65828--1_3
[131]
Katie Myhill, James Richards, and Kate Sang. 2021. Job quality, fair work and gig work: The lived experience of gig workers. The International Journal of Human Resource Management, Vol. 32, 19 (2021), 4110--4135.
[132]
National Sex Offender Database. n.d. Keeping Children Safe from Sexual Offenders. https://www.meganslaw.com/. (Accessed on 08/31/2022).
[133]
Rory T Newlands, Dominic M Denning, Kaiya S Massey, and Lorraine T Benuto. 2022. Safe dating in the digital era: Protective behavioral strategies in dating behaviors facilitated by dating applications. Violence and Victims, Vol. 37, 2 (2022), 185--200.
[134]
Borke Obada-Obieh, Sonia Chiasson, and Anil Somayaji. 2017. “Don't Break My Heart!”: User Security Strategies for Online Dating. In Workshop on Usable Security (USEC).
[135]
Jonathan A Obar and Anne Oeldorf-Hirsch. 2020. The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society, Vol. 23, 1 (2020), 128--147.
[136]
UN Office of the High Commissioner. 2017. UN experts urge States and companies to address online gender-based abuse but warn against censorship. https://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=21317
[137]
Yok-Fong Paat and Christine Markham. 2021. Digital crime, trauma, and abuse: Internet safety and cyber risks for adolescents and emerging adults in the 21st century. Social Work in Mental Health, Vol. 19, 1 (2021), 18--40.
[138]
Xinru Page, Pamela Wisniewski, Bart P Knijnenburg, and Moses Namara. 2018. Social media's have-nots: an era of social disenfranchisement. Internet Research, Vol. 28, 5 (2018), 1253--1274.
[139]
Jessica A Pater, Moon K Kim, Elizabeth D Mynatt, and Casey Fiesler. 2016. Characterizations of online harassment: Comparing policies across social media platforms. In Proceedings of the 2016 ACM International Conference on Supporting Group Work. 369--374.
[140]
Kun Peng, Wan-Ying Lin, and Hexin Chen. 2022. Consequences of deceptive self-presentation in online dating. Chinese Journal of Communication, Vol. 15, 4 (2022), 1--29.
[141]
Maria Verena Peters. 2020. From the Whisper Network to #MeToo'Framing Gender, Gossip and Sexual Harassment. European Journal of American Studies, Vol. 15, 4 (Dec. 2020). https://doi.org/10.4000/ejas.16587
[142]
Anh Phan, Kathryn Seigfried-Spellar, and Kim-Kwang Raymond Choo. 2021. Threaten me softly: A review of potential dating app risks. Computers in human behavior reports, Vol. 3 (2021), 100055.
[143]
Kamarah Pooley and Hayley Boxall. 2020. Mobile dating applications and sexual and violent offending. Trends and Issues in Crime and Criminal Justice 612 (2020), 1--16.
[144]
Bob Poston. 2009. Maslow's hierarchy of needs. The surgical technologist, Vol. 41, 8 (2009), 347--353.
[145]
Urszula Pruchniewska. 2020. “I Like That It's My Choice a Couple Different Times”: Gender, Affordances, and User Experience on Bumble Dating. International Journal of Communication, Vol. 14 (April 2020), 18. https://ijoc.org/index.php/ijoc/article/view/12657
[146]
Tinonee Pym, Paul Byron, and Kath Albury. 2021. `I still want to know they?re not terrible people?: Negotiating `queer community? on dating apps. International Journal of Cultural Studies, Vol. 24, 3 (May 2021), 398--413. https://doi.org/10.1177/1367877920959332
[147]
Emilee Rader, Rick Wash, and Brandon Brooks. 2012. Stories as informal lessons about security. In Proceedings of the Eighth Symposium on Usable Privacy and Security. 1--17.
[148]
Giulia Ranzini and Christoph Lutz. 2017. Love at first swipe? Explaining Tinder self-presentation and motives. Mobile Media & Communication, Vol. 5, 1 (2017), 80--101.
[149]
Noopur Raval and Paul Dourish. 2016. Standing Out from the Crowd: Emotional Labor, Body Labor, and Temporal Labor in Ridesharing. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (San Francisco, California, USA) (CSCW '16). 97--107. https://doi.org/10.1145/2818048.2820026
[150]
Alexandrea J Ravenelle, Erica Janko, and Ken Cai Kowalski. 2022. Good jobs, scam jobs: Detecting, normalizing, and internalizing online job scams during the COVID-19 pandemic. New Media & Society, Vol. 24, 7 (2022), 1591--1610.
[151]
Elissa M Redmiles, Yasemin Acar, Sascha Fahl, and Michelle L Mazurek. 2017. A summary of survey methodology best practices for security and privacy researchers. Technical Report. University of Maryland.
[152]
Elissa M Redmiles, Jessica Bodford, and Lindsay Blackwell. 2019. “I just want to feel safe”: A Diary Study of Safety Perceptions on Social Media. In Proceedings of the International AAAI Conference on Web and Social Media, Vol. 13. 405--416.
[153]
Larry D Rosen, Nancy A Cheever, Cheyenne Cummings, and Julie Felt. 2008. The impact of emotionality and self-disclosure on online dating versus traditional dating. Computers in Human Behavior, Vol. 24, 5 (2008), 2124--2157.
[154]
Janine Rowse, Caroline Bolt, and Sanjeev Gaya. 2020. Swipe right: The emergence of dating-app facilitated sexual assault. A descriptive retrospective audit of forensic examination caseload in an Australian metropolitan service. Forensic Science, Medicine and Pathology, Vol. 16, 1 (2020), 71--77.
[155]
Legacy Russell. 2020. Glitch feminism: A manifesto. London: Verso, Vol. 11 (2020), 29--29.
[156]
Teela Sanders and Rosie Campbell. 2007. Designing out vulnerability, building in respect: violence, safety and sex work policy. The British journal of sociology, Vol. 58, 1 (2007), 1--19.
[157]
Shruti Sannon, Natalya N. Bazarova, and Dan Cosley. 2018. Privacy Lies: Understanding How, When, and Why People Lie to Protect Their Privacy in Multiple Online Contexts. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI '18). 1--13. https://doi.org/10.1145/3173574.3173626
[158]
Shruti Sannon and Dan Cosley. 2018. “It was a shady HIT”: Navigating Work-Related Privacy Concerns on MTurk. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. 1--6.
[159]
Shruti Sannon and Dan Cosley. 2019. Privacy, Power, and Invisible Labor on Amazon Mechanical Turk. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI '19). 1--12. https://doi.org/10.1145/3290605.3300512
[160]
Shruti Sannon and Dan Cosley. 2022. Toward a More Inclusive Gig Economy: Risks and Opportunities for Workers with Disabilities. Proceedings of the ACM on Human-Computer Interaction, Vol. 6, CSCW2 (2022), 1--31.
[161]
Shruti Sannon, Billie Sun, and Dan Cosley. 2022. Privacy, Surveillance, and Power in the Gig Economy. In CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI '22). Article 619, 15 pages. https://doi.org/10.1145/3491102.3502083
[162]
Morgan Klaus Scheuerman, Stacy M. Branham, and Foad Hamidi. 2018. Safe Spaces and Safe Places: Unpacking Technology-Mediated Experiences of Safety and Harm with Transgender People. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (Nov. 2018), 155:1--155:27. https://doi.org/10.1145/3274424
[163]
Morgan Klaus Scheuerman, Jialun Aaron Jiang, Casey Fiesler, and Jed R Brubaker. 2021. A framework of severity for harmful content online. Proceedings of the ACM on Human-Computer Interaction, Vol. 5, CSCW2 (2021), 1--33.
[164]
Bhavani Seetharaman, Joyojeet Pal, and Julie Hui. 2021. Delivery Work and the Experience of Social Isolation. Proceedings of the ACM on Human-Computer Interaction, Vol. 5, CSCW1 (April 2021), 64:1--64:17. https://doi.org/10.1145/3449138
[165]
Liesel L Sharabi and John P Caughlin. 2019. Deception in online dating: Significance and implications for the first offline date. New Media & Society, Vol. 21, 1 (2019), 229--247.
[166]
Liesel L Sharabi and Tiffany A Dykstra-DeVette. 2019. From first email to first date: Strategies for initiating relationships in online dating. Journal of Social and Personal Relationships, Vol. 36, 11--12 (2019), 3389--3407.
[167]
Adam Shostack. 2014. Threat Modeling: Designing for Security. John Wiley & Sons.
[168]
Mariah Simmons and Joon Suk Lee. 2020. Catfishing: a look into online dating and impersonation. In Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis: 12th International Conference, SCSM 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19--24, 2020, Proceedings, Part I 22. Springer, 349--358.
[169]
Julia Slupska and Leonie Maria Tanczer. 2021. Threat modeling intimate partner violence: Tech abuse as a cybersecurity challenge in the Internet of Things. In The Emerald International Handbook of Technology-Facilitated Violence and Abuse. Emerald Publishing Limited.
[170]
Ashley Southall. 2018. He Used Tinder to Hunt the Women He Raped and Killed, Police Say. The New York Times (2018).
[171]
Elizabeth Anne Stanko. 2003. The Meanings of Violence. Routledge London.
[172]
Zahra Stardust, Rosalie Gillett, and Kath Albury. 2022. Surveillance does not equal safety: Police, data and consent on dating apps. Crime, Media, Culture (2022), 17416590221111827.
[173]
Zahra Stardust, Carla Treloar, Elena Cama, and Jules Kim. 2021. `I wouldn't call the cops if I was being bashed to death': Sex work, whore stigma and the criminal legal system. International Journal for Crime, Justice and Social Democracy, Vol. 10, 3 (2021), 142--157.
[174]
Jake M L Stein, Vidminas Vizgirda, Max Van Kleek, Reuben Binns, Jun Zhao, Rui Zhao, Naman Goel, George Chalhoub, Wael S Albayaydh, and Nigel Shadbolt. 2023. 'You Are You and the App. There's Nobody Else.': Building Worker-Designed Data Institutions within Platform Hegemony. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (Hamburg, Germany) (CHI '23). Association for Computing Machinery, New York, NY, USA, Article 281, 26 pages. https://doi.org/10.1145/3544548.3581114
[175]
Rock Stevens, Daniel Votipka, Elissa M Redmiles, Colin Ahern, Patrick Sweeney, and Michelle L Mazurek. 2018. The battle for New York: A case study of applied digital threat modeling at the enterprise level. In 27th USENIX Security Symposium (USENIX Security 18). 621--637.
[176]
Maria Stoicescu and Cosima Rughinis. 2021. Perils of digital intimacy. A classification framework for privacy, security, and safety risks on dating apps. In 2021 23rd International Conference on Control Systems and Computer Science (CSCS). 457--462. https://doi.org/10.1109/CSCS52396.2021.00081
[177]
Elisabetta Stringhi. 2022. Addressing gendered affordances of the platform economy: The case of UpWork. Internet Policy Review, Vol. 11, 1 (2022), 1--28.
[178]
Angelika Strohmayer, Rosanna Bellini, and Julia Slupska. 2022. Safety as a Grand Challenge in Pervasive Computing: Using Feminist Epistemologies to Shift the Paradigm From Security to Safety. IEEE Pervasive Computing (2022).
[179]
Angelika Strohmayer, Jenn Clamen, and Mary Laing. 2019. Technologies for Social Justice: Lessons from Sex Workers on the Front Lines. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI '19). 1--14. https://doi.org/10.1145/3290605.3300882
[180]
Angelika Strohmayer, Mary Laing, and Rob Comber. 2017. Technologies and Social Justice Outcomes in Sex Work Charities: Fighting Stigma, Saving Lives. In 2017 ACM SIGCHI Conference on Human Factors in Computing Systems. https://doi.org/10.1145/3025453.3025615
[181]
Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, and Adam Dodge. 2021. Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions. Northumbria University.
[182]
Chiu-Ping Su and Tsung-Chiung Wu. 2020. The Dark Side of Solo Female Travel: Negative Encounters with Male Strangers. Leisure Sciences, Vol. 42, 3--4 (July 2020), 375--392. https://doi.org/10.1080/01490400.2020.1712277
[183]
Lisa Sugiura and April Smith. 2020. Victim blaming, responsibilization and resilience in online sexual abuse and harassment. In Victimology. Springer, 45--79.
[184]
Jacob Thebault-Spieker, Stevie Chancellor, Michael Ann DeVito, Niloufar Salehi, Alex Leavitt, David Karger, and Katta Spiel. 2021. Do We Fix it or Burn it Down? Towards Practicable Critique at CSCW. In Companion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing. 234--237.
[185]
Jacob Thebault-Spieker, Loren G. Terveen, and Brent Hecht. 2015. Avoiding the South Side and the Suburbs: The Geography of Mobile Crowdsourcing Markets. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (Vancouver, BC, Canada) (CSCW '15). 265--275. https://doi.org/10.1145/2675133.2675278
[186]
Kurt Thomas, Devdatta Akhawe, Michael Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, et al. 2021. SoK: Hate, harassment, and the changing landscape of online abuse. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 247--267.
[187]
Kurt Thomas, Patrick Gage Kelley, Sunny Consolvo, Patrawat Samermit, and Elie Bursztein. 2022. “It's common and a part of being a content creator”: Understanding How Creators Experience and Cope with Hate and Harassment Online. In CHI Conference on Human Factors in Computing Systems. 1--15.
[188]
Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, and Vern Paxson. 2013. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In 22nd USENIX Security Symposium (USENIX Security 13). 195--210.
[189]
ThreatModeler. 2019. How to Process Flow Diagram for Threat Modeling. https://threatmodeler.com/how-to-process-flow-diagram-for-threat-modeling/.
[190]
Juhu Thukral. 2005. Behind closed doors: An analysis of indoor sex work in New York City. Siecus Report, Vol. 33, 2 (2005), 3.
[191]
Julia Ticona. 2015. Strategies of control: Workers? use of ICTs to shape knowledge and service work. Information, Communication & Society, Vol. 18, 5 (2015), 509--523.
[192]
Julia Ticona. 2022. Red flags, sob stories, and scams: The contested meaning of governance on carework labor platforms. New Media & Society, Vol. 24, 7 (2022), 1548--1566.
[193]
Julia Ticona and Alexandra Mateescu. 2018. How Domestic Workers Wager Safety in the Platform Economy. Fast Company (2018). https://www.fastcompany.com/40541050/how-domestic-workers-wager-safety-in-the-platform-economy
[194]
Julia Ticona and Alexandra Mateescu. 2018. Trusted strangers: Carework platforms? cultural entrepreneurship in the on-demand economy. New Media & Society, Vol. 20, 11 (Nov. 2018), 4384--4404. https://doi.org/10.1177/1461444818773727
[195]
Julia Ticona, Alexandra Mateescu, and Alex Rosenblat. 2018. Beyond disruption: How tech shapes labor across domestic work and ridehailing. Technical Report.
[196]
Catalina L Toma and Jeffrey T Hancock. 2010. Looks and lies: The role of physical attractiveness in online dating self-presentation and deception. Communication Research, Vol. 37, 3 (2010), 335--351.
[197]
Catalina L Toma, Jeffrey T Hancock, and Nicole B Ellison. 2008. Separating fact from fiction: An examination of deceptive self-presentation in online dating profiles. Personality and Social Psychology Bulletin, Vol. 34, 8 (2008), 1023--1036.
[198]
Molly Tran and Rosemary K Sokas. 2017. The gig economy and contingent work: An occupational health assessment. Journal of Occupational and Environmental Medicine, Vol. 59, 4 (2017), e63.
[199]
Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2020. The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums. In 29th USENIX Security Symposium (USENIX Security 20). 1893--1909.
[200]
Emily Tseng, Diana Freed, Kristen Engel, Thomas Ristenpart, and Nicola Dell. 2021. A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI '21). Article 71, 17 pages. https://doi.org/10.1145/3411764.3445589
[201]
Huahong Tu, Adam Doupé, Ziming Zhao, and Gail-Joon Ahn. 2019. Users really do answer telephone scams. In 28th USENIX Security Symposium (USENIX Security 19). 1327--1340.
[202]
Deborah Tuerkheimer. 2019. Unofficial Reporting in the #MeToo Era Law in the Era of #MeToo. University of Chicago Legal Forum, Vol. 2019 (2019), 273--298. https://heinonline.org/HOL/P?h=hein.journals/uchclf2019&i=277
[203]
Zeynep Tufekci. 2017. Security in the Wild for Low-Profile Activists. https://www.usenix.org/conference/enigma2017/conference-program/presentation/tufekci.
[204]
Chad Van De Wiele and Stephanie Tom Tong. 2014. Breaking boundaries: The uses & gratifications of Grindr. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. 619--630.
[205]
Jessica Vitak. 2015. Balancing privacy concerns and impression management strategies on Facebook. In Symposium on Usable Privacy and Security (SOUPS). 22--24.
[206]
Jessica Vitak, Kalyani Chadha, Linda Steiner, and Zahra Ashktorab. 2017. Identifying women's experiences with and strategies for mitigating negative effects of online harassment. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. 1231--1245.
[207]
Stephen Walcott. 2020. Victimisation and Fear of Crime in the Gig Economy. Technical Report. The Police Foundation.
[208]
Matthias Waldkirch, Eliane Bucher, Peter Kalum Schou, and Eduard Grünwald. 2021. Controlled by the algorithm, coached by the crowd--how HRM activities take shape on digital work platforms in the gig economy. The International Journal of Human Resource Management, Vol. 32, 12 (2021), 2643--2682.
[209]
Ari Ezra Waldman. 2019. Law, privacy, and online dating: “Revenge porn” in gay online communities. Law & Social Inquiry, Vol. 44, 4 (2019), 987--1018.
[210]
Ari Ezra Waldman. 2021. Navigating Privacy on Gay-Oriented Mobile Dating Applications. In The Emerald international handbook of technology-facilitated violence and abuse. Emerald Publishing Limited, 369--381.
[211]
Gang Wang, Tianyi Wang, Haitao Zheng, and Ben Y Zhao. 2014. Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers. In 23rd USENIX Security Symposium (USENIX Security 14). 239--254.
[212]
Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L Mazurek, Manya Sleeper, and Kurt Thomas. 2022. SoK: A framework for unifying at-risk user research. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 2344--2360.
[213]
Mark Warner, Andreas Gutmann, M. Angela Sasse, and Ann Blandford. 2018. Privacy Unraveling Around Explicit HIV Status Disclosure Fields in the Online Geosocial Hookup App Grindr. Proceedings of the ACM Conference on Human-Computer Interaction, Vol. 2, CSCW, Article 181 (Nov 2018), 22 pages. https://doi.org/10.1145/3274450
[214]
Mark Warner, Agnieszka Kitkowska, Jo Gibbs, Juan F. Maestre, and Ann Blandford. 2020. Evaluating `Prefer Not to Say' Around Sensitive Disclosures. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI '20). 1--13. https://doi.org/10.1145/3313831.3376150
[215]
Mark Warner, Juan F. Maestre, Jo Gibbs, Chia-Fang Chung, and Ann Blandford. 2019. Signal Appropriation of Explicit HIV Status Disclosure Fields in Sex-Social Apps Used by Gay and Bisexual Men. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI '19). 1--15. https://doi.org/10.1145/3290605.3300922
[216]
Elizabeth Anne Watkins. 2022. “Have you learned your lesson?” Communities of practice under algorithmic competition. New Media & Society, Vol. 24, 7 (2022), 1567--1590.
[217]
Monica T Whitty and Tom Buchanan. 2016. The online dating romance scam: The psychological impact on victims--both financial and non-financial. Criminology & Criminal Justice, Vol. 16, 2 (2016), 176--194.
[218]
Sarah Widmer and Anders Albrechtslund. 2021. The ambiguities of surveillance as care and control: Struggles in the domestication of location-tracking applications by Danish parents. Nordicom Review, Vol. 42 (2021).
[219]
Daricia Wilkinson and Bart Knijnenburg. 2022. Many Islands, Many Problems: An Empirical Examination of Online Safety Behaviors in the Caribbean. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems. 1--25.
[220]
Mark A Wood, Stuart Ross, and Diana Johns. 2021. Primary crime prevention apps: A typology and scoping review. Trauma, Violence, & Abuse (2021), 1524838020985560.
[221]
Jane E Workman and Robin L Orr. 1996. Clothing, sex of subject, and rape myth acceptance as factors affecting attributions about an incident of acquaintance rape. Clothing and Textiles Research Journal, Vol. 14, 4 (1996), 276--284.
[222]
Yuxi Wu, W Keith Edwards, and Sauvik Das. 2022. SoK: Social Cybersecurity. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 1863--1879.
[223]
Shuzhe Yang and Andreas Albers. 2013. Overcoming information overload in online reputation management: A systematic literature review. In ECIS 2013 - Proceedings of the 21st European Conference on Information Systems.
[224]
Stella Zaryan. 2017. Truth and Trust: How audiences are making sense of Fake News. (student paper).
[225]
Angie Zhang, Alexander Boltz, Chun Wei Wang, and Min Kyung Lee. 2022. Algorithmic Management Reimagined For Workers and By Workers: Centering Worker Well-Being in Gig Work. In CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI '22). Article 14, 20 pages. https://doi.org/10.1145/3491102.3501866
[226]
Tianqing Zhu, Dayong Ye, Wei Wang, Wanlei Zhou, and S Yu Philip. 2020. More than privacy: Applying differential privacy in key areas of artificial intelligence. IEEE Transactions on Knowledge and Data Engineering, Vol. 34, 6 (2020), 2824--2843.
[227]
Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, and Acar Tamersoy. 2021. The role of computer security customer support in helping survivors of intimate partner violence. In 30th USENIX Security Symposium (USENIX Security 21). 429--446.
[228]
Douglas Zytko and Hanan Aljasim. 2022. Designing AI for Online-to-Offline Safety Risks with Young Women: The Context of Social Matching. arXiv preprint arXiv:2204.00688 (2022).
[229]
Douglas Zytko, Nicholas Furlo, Bailey Carlin, and Matthew Archer. 2021. Computer-Mediated Consent to Sex: The Context of Tinder. In Proceedings of the ACM on Human-Computer Interaction. 189:1--189:26. https://doi.org/10.1145/3449288
[230]
Douglas Zytko, Sukeshini A. Grandhi, and Quentin Jones. 2014. Impression Management Struggles in Online Dating. In Proceedings of the 18th International Conference on Supporting Group Work (Sanibel Island, Florida, USA) (GROUP '14). 53--62. https://doi.org/10.1145/2660398.2660410

Index Terms

  1. Safer Algorithmically-Mediated Offline Introductions: Harms and Protective Behaviors

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Human-Computer Interaction
    Proceedings of the ACM on Human-Computer Interaction  Volume 8, Issue CSCW2
    CSCW
    November 2024
    5177 pages
    EISSN:2573-0142
    DOI:10.1145/3703902
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 November 2024
    Published in PACMHCI Volume 8, Issue CSCW2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. algorithmically-mediated interactions
    2. gig work
    3. online dating
    4. safety
    5. security
    6. tech-facilitated abuse

    Qualifiers

    • Research-article

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 95
      Total Downloads
    • Downloads (Last 12 months)95
    • Downloads (Last 6 weeks)95
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media