[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3173574.3174241acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Public Access

“A Stalker's Paradise”: How Intimate Partner Abusers Exploit Technology

Published: 21 April 2018 Publication History

Abstract

This paper describes a qualitative study with 89 participants that details how abusers in intimate partner violence (IPV) contexts exploit technologies to intimidate, threaten, monitor, impersonate, harass, or otherwise harm their victims. We show that, at their core, many of the attacks in IPV contexts are technologically unsophisticated from the perspective of a security practitioner or researcher. For example, they are often carried out by a UI-bound adversary - an adversarial but authenticated user that interacts with a victim»s device or account via standard user interfaces - or by downloading and installing a ready-made application that enables spying on a victim. Nevertheless, we show how the sociotechnical and relational factors that characterize IPV make such attacks both extremely damaging to victims and challenging to counteract, in part because they undermine the predominant threat models under which systems have been designed. We discuss the nature of these new IPV threat models and outline opportunities for HCI research and design to mitigate these attacks.

References

[1]
2014. TrueCrypt. (2014). http://truecrypt.sourceforge.net/.
[2]
Zahra Ashktorab and Jessica Vitak. 2016. Designing Cyberbullying Mitigation and Prevention Solutions through Participatory Design With Teenagers. In ACM Conference on Human Factors in Computing Systems. ACM, 3895--3905.
[3]
Julian Assange, Suelette Dreyfus, and Ralf Weinmann. 1997. Rubberhose. (1997). https://web.archive.org/web/20100915130330/http: //iq.org/~proff/rubberhose.org/.
[4]
Jakob E Bardram. 2005. The trouble with login: On usability and computer security in ubiquitous computing. Personal and Ubiquitous Computing 9, 6 (2005), 357--367.
[5]
danah boyd. 2012. Truth, Lies, and 'Doxxing': The Real Moral of the Gawker/Reddit Story. Wired (2012).
[6]
AJ Bernheim Brush and Kori Inkpen. 2007. Yours, mine and ours? Sharing and use of technology in domestic environments. In UbiComp, Vol. 7. Springer, 109--126.
[7]
Jacquelyn C Campbell, Daniel Webster, Jane Koziol-McLain, Carolyn Block, Doris Campbell, Mary Ann Curry, Faye Gary, Nancy Glass, Judith McFarlane, Carolyn Sachs, and others. 2003. Risk factors for femicide in abusive relationships: Results from a multisite case control study. American journal of public health 93, 7 (2003), 1089--1097.
[8]
Judy C Chang, Diane Dado, Lynn Hawker, Patricia A Cluss, Raquel Buranosky, Leslie Slagel, Melissa McNeil, and Sarah Hudson Scholle. 2010. Understanding turning points in intimate partner violence: factors and circumstances leading women victims toward change. Journal of women's health 19, 2 (2010), 251--259.
[9]
Victoria Clarke and Virginia Braun. 2014. Thematic analysis. In Encyclopedia of critical psychology. Springer, 1947--1952.
[10]
MR Cooley, SM Turner, and DC Beidel. 2014. Composite Abuse Scale (CAS). Measures of Violence (2014), 175.
[11]
Karen M Devries, Joelle YT Mak, Claudia Garcia-Moreno, Max Petzold, James C Child, Gail Falder, Stephen Lim, Loraine J Bacchus, Rebecca E Engell, Lisa Rosenfeld, and others. 2013. The global prevalence of intimate partner violence against women. Science 340, 6140 (2013), 1527--1528.
[12]
Gina Dillon, Rafat Hussain, Deborah Loxton, and Saifur Rahman. 2013. Mental and physical health and intimate partner violence against women: A review of the literature. International journal of family medicine 2013 (2013).
[13]
Jill P Dimond, Casey Fiesler, and Amy S Bruckman. 2011. Domestic violence and information communication technologies. Interacting with Computers 23, 5 (2011), 413--421.
[14]
Karthik Dinakar, Birago Jones, Catherine Havasi, Henry Lieberman, and Rosalind Picard. 2012. Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Transactions on Interactive Intelligent Systems (TiiS) 2, 3 (2012), 18.
[15]
David M Douglas. 2016. Doxing: a conceptual analysis. Ethics and information technology 18, 3 (2016), 199--210.
[16]
Serge Egelman, AJ Brush, and Kori M Inkpen. 2008. Family accounts: a new paradigm for user accounts within the home environment. In Proceedings of the 2008 ACM conference on Computer supported cooperative work. ACM, 669--678.
[17]
Louise Ellison and Yaman Akdeniz. 1998. Cyber-stalking: the Regulation of Harassment on the Internet. Criminal Law Review 29 (1998), 29--48.
[18]
Brett Eterovic-Soric, Kim-Kwang Raymond Choo, Helen Ashman, and Sameera Mubarak. 2017. Stalking the stalkers--detecting and deterring stalking behaviours using technology: A review. Computers & Security 70 (2017), 278--289.
[19]
Marilyn Ford-Gilboe, C Nadine Wathen, Colleen Varcoe, Harriet L MacMillan, Kelly Scott-Storey, Tara Mantler, Kelsey Hegarty, and Nancy Perrin. 2016. Development of a brief measure of intimate partner violence experiences: the Composite Abuse Scale (Revised) Short Form (CAS R-SF). BMJ open 6, 12 (2016), e012824.
[20]
Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, and Sarah Tucker. 2010. The new age of stalking: technological implications for stalking. Juvenile and family court journal 61, 4 (2010), 39--55.
[21]
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2017. Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders. PACM: Human-Computer Interaction: Computer-Supported Cooperative Work and Social Computing (CSCW) Vol. 1, No. 2 (2017), Article 46.
[22]
Joshua Guberman, Carol Schmitz, and Libby Hemphill. 2016. Quantifying toxicity and verbal violence on Twitter. In Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion. ACM, 277--280.
[23]
Eiji Hayashi, Oriana Riva, Karin Strauss, AJ Brush, and Stuart Schechter. 2012. Goldilocks and the two mobile devices: Going beyond all-or-nothing access to a device's applications. In Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM, 2.
[24]
Amy Karlson, AJ Brush, and Stuart Schechter. 2009. Can I borrow your phone?: Understanding concerns when sharing mobile phones. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1647--1650.
[25]
Yunxin Liu, Ahmad Rahmati, Yuanhe Huang, Hyukjae Jang, Lin Zhong, Yongguang Zhang, and Shensheng Zhang. 2009. xShare: Supporting impromptu sharing of mobile phones. In Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services. ACM, 15--28.
[26]
David W Macdonald, Kim S Jacobsen, Dawn Burnham, Paul J Johnson, and Andrew J Loveridge. 2016. Cecil: a moment or a movement? Analysis of media coverage of the death of a lion, Panthera leo. Animals 6, 5 (2016), 26.
[27]
Tara Matthews, Kerwell Liao, Anna Turner, Marianne Berkovich, Robert Reeder, and Sunny Consolvo. 2016. She'll just grab any device that's closer: A Study of Everyday Device & Account Sharing in Households. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 5921--5932.
[28]
Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F Churchill, and Sunny Consolvo. 2017. Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 2189--2201.
[29]
Michelle Mazurek, J. P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, Richard Shay, Kami Vaniea, Lujo Bauer, Lorrie Cranor, Gregory Ganger, and Michael Reiter. 2010. Access Control for Home Data Sharing: Attitudes, Needs and Practices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, New York, NY, USA, 645--654.
[30]
Andrew D McDonald and Markus G Kuhn. 1999. StegFS: A steganographic file system for Linux. In International Workshop on Information Hiding. Springer, 463--477.
[31]
Jakob Nielsen. 1992. Finding usability problems through heuristic evaluation. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 373--380.
[32]
Shirley Patton. 2003. Pathways: How women leave violent men. (2003).
[33]
Ellen Pence and Michael Paymar. 1990. Power and control: Tactics of men who batter: An educational curriculum. Minnesota Program Development Incorporated.
[34]
Rebecca F Rabin, Jacky M Jennings, Jacquelyn C Campbell, and Megan H Bair-Merritt. 2009. Intimate partner violence screening tools: a systematic review. American journal of preventive medicine 36, 5 (2009), 439--445.
[35]
Scott Ruoti, Jeff Andersen, Daniel Zappala, and Kent Seamons. 2015. Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client. arXiv preprint arXiv:1510.08555 (2015).
[36]
Julian Seifert, Alexander De Luca, Bettina Conradi, and Heinrich Hussmann. 2010. Treasurephone: Context-sensitive user data protection on mobile phones. Pervasive Computing (2010), 130--137.
[37]
Steve Sheng, Levi Broderick, Colleen Alison Koranda, and Jeremy J Hyland. 2006. Why Johnny still can't encrypt: Evaluating the usability of email encryption software. In Symposium On Usable Privacy and Security. 3--4.
[38]
Aily Shimizu. 2013. Domestic violence in the digital age: Towards the creation of a comprehensive cyberstalking statute. Berkeley J. Gender L. & Just. 28 (2013), 116.
[39]
Adam Skillen and Mohammad Mannan. 2014. Mobiflage: Deniable storage encryption for mobile devices. IEEE Transactions on Dependable and Secure Computing 11, 3 (2014), 224--237.
[40]
Sharon G Smith, Kathleen C Basile, Leah K Gilbert, Melissa T Merrick, Nimesh Patel, Margie Walling, and Anurag Jain. 2017. National Intimate Partner and Sexual Violence Survey (NISVS): 2010--2012 state report. (2017).
[41]
Cindy Southworth, Shawndell Dawson, Cynthia Fraser, and Sarah Tucker. 2005. A high-tech twist on abuse: Technology, intimate partner stalking, and advocacy. Violence Against Women (2005).
[42]
Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, and Sarah Tucker. 2007. Intimate partner violence, technology, and stalking. Violence against women 13, 8 (2007), 842--856.
[43]
Cindy Southworth and Sarah Tucker. 2006. Technology, stalking and domestic violence victims. Miss. LJ 76 (2006), 667.
[44]
Heidi Stöckl, Karen Devries, Alexandra Rotstein, Naeemah Abrahams, Jacquelyn Campbell, Charlotte Watts, and Claudia Garcia Moreno. 2013. The global prevalence of intimate partner homicide: a systematic review. The Lancet 382, 9895 (2013), 859--865.
[45]
Scott R Stroud. 2014. The dark side of the online self: A pragmatist critique of the growing plague of revenge porn. Journal of Mass Media Ethics 29, 3 (2014), 168--183.
[46]
National Network to End Domestic Violence and Facebook. 2014. Privacy & Safety on Facebook: A Guide for Survivors of Abuse. (2014). http://nnedv.org/downloads/SafetyNet/NNEDV_FB_Privacy_and_Safety_Guide_2014.pdf.
[47]
Jessica Vitak, Kalyani Chadha, Linda Steiner, and Zahra Ashktorab. 2017. Identifying Women's Experiences With and Strategies for Mitigating Negative Effects of Online Harassment. In ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, 1231--1245.
[48]
Lenore E Walker. 1977. Battered women and learned helplessness. Victimology (1977).
[49]
Cathleen Wharton, John Rieman, Clayton Lewis, and Peter Polson. 1994. The cognitive walkthrough method: A practitioner's guide. In Usability inspection methods. John Wiley & Sons, Inc., 105--140.
[50]
Alma Whitten and J Doug Tygar. 1999. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In USENIX Security Symposium, Vol. 348.
[51]
Pamela Wisniewski, Heng Xu, Mary Beth Rosson, Daniel F Perkins, and John M Carroll. 2016. Dear Diary: Teens Reflect on Their Weekly Online Risk Experiences. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 3919--3930.
[52]
Delanie Woodlock. 2016. The abuse of technology in domestic violence and stalking. Violence against women (2016), 1077801216646277.
[53]
Kersti A Yllo. 2005. Through a feminist lens. Current controversies in family violence (2005).

Cited By

View all
  • (2024)Wykorzystanie teleopieki w przeciwdziałaniu przemocy domowej i poseparacyjnejFamily Forum10.25167/FF/524413(351-371)Online publication date: 27-Jan-2024
  • (2024)Trust and Safety work: internal governance of technology risks and harmsJournal of Integrated Global STEM10.1515/jigs-2024-0003Online publication date: 24-Oct-2024
  • (2024)The technification of domestic abuse: Methods, tools and criminal justice responsesCriminology & Criminal Justice10.1177/17488958241266760Online publication date: 13-Aug-2024
  • Show More Cited By

Index Terms

  1. “A Stalker's Paradise”: How Intimate Partner Abusers Exploit Technology

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems
    April 2018
    8489 pages
    ISBN:9781450356206
    DOI:10.1145/3173574
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 April 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Badges

    • Best Paper

    Author Tags

    1. domestic abuse
    2. domestic violence
    3. intimate partner violence
    4. ipv
    5. privacy
    6. safety
    7. security
    8. violence against women

    Qualifiers

    • Research-article

    Funding Sources

    • NSF
    • Sloan Fellowship
    • Engaged Cornell Grant

    Conference

    CHI '18
    Sponsor:

    Acceptance Rates

    CHI '18 Paper Acceptance Rate 666 of 2,590 submissions, 26%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1,655
    • Downloads (Last 6 weeks)216
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Wykorzystanie teleopieki w przeciwdziałaniu przemocy domowej i poseparacyjnejFamily Forum10.25167/FF/524413(351-371)Online publication date: 27-Jan-2024
    • (2024)Trust and Safety work: internal governance of technology risks and harmsJournal of Integrated Global STEM10.1515/jigs-2024-0003Online publication date: 24-Oct-2024
    • (2024)The technification of domestic abuse: Methods, tools and criminal justice responsesCriminology & Criminal Justice10.1177/17488958241266760Online publication date: 13-Aug-2024
    • (2024)Help-Seeking and Service Utilization Among Survivors of Intimate Partner Violence in Michigan During the COVID-19 PandemicViolence Against Women10.1177/10778012231222491Online publication date: 5-Feb-2024
    • (2024)The Leaky Home: Conceptualizing the Remote Control of Smart Technologies in the Domestic SphereTheory, Culture & Society10.1177/02632764241281871Online publication date: 22-Oct-2024
    • (2024)Threat Modeling Healthcare Privacy in the United StatesACM Transactions on Computer-Human Interaction10.1145/3704634Online publication date: 18-Nov-2024
    • (2024)Stop Following Me! Evaluating the Malicious Uses of Personal Item Tracking Devices and Their Anti-Stalking FeaturesProceedings of the 2024 European Symposium on Usable Security10.1145/3688459.3688477(277-289)Online publication date: 30-Sep-2024
    • (2024)Healing Structures: Sociotechnical Mechanisms for Centering Survivors of Domestic Violence within US-Based Marginalized CommunitiesProceedings of the ACM on Human-Computer Interaction10.1145/36870398:CSCW2(1-43)Online publication date: 8-Nov-2024
    • (2024)Safer Algorithmically-Mediated Offline Introductions: Harms and Protective BehaviorsProceedings of the ACM on Human-Computer Interaction10.1145/36869488:CSCW2(1-43)Online publication date: 8-Nov-2024
    • (2024)The Sociotechnical Stack: Opportunities for Social Computing Research in Non-Consensual Intimate MediaProceedings of the ACM on Human-Computer Interaction10.1145/36869148:CSCW2(1-21)Online publication date: 8-Nov-2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media