Sneaky spy devices and defective detectors: the ecosystem of intimate partner surveillance with covert devices

R Ceccio, S Stephenson, V Chadha… - 32nd USENIX Security …, 2023 - usenix.org
Recent anecdotal evidence suggests that abusers have begun to use covert spy devices
such as nanny cameras, item trackers, and audio recorders to spy on and stalk their …

" It's the Equivalent of Feeling Like You're in {Jail”}: Lessons from Firsthand and Secondhand Accounts of {IoT-Enabled} Intimate Partner Abuse

S Stephenson, M Almansoori, P Emami-Naeini… - 32nd USENIX Security …, 2023 - usenix.org
Victim-survivors of intimate partner violence (IPV) are facing a new technological threat:
Abusers are leveraging IoT devices such as smart thermostats, hidden cameras, and GPS …

Enabling Developers, Protecting Users: Investigating Harassment and Safety in {VR}

SB Abhinaya, A Sabir, A Das - 33rd USENIX Security Symposium …, 2024 - usenix.org
Virtual Reality (VR) has witnessed a rising issue of harassment, prompting the integration of
safety controls like muting and blocking in VR applications. However, the lack of …

Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection

A Heinrich, L Würsching, M Hollick - Proceedings on Privacy …, 2024 - petsymposium.org
While designed to locate lost items, Bluetooth trackers are increasingly exploited for malign
purposes, such as unwanted location tracking. This study probes deeper into this issue …

Designing Human-centered Artificial Intelligence to Assist with Domestic Abuse Recovery: Mitigating Technology Enabled Coercive Control

CL Crooks, S Talwalkar, T Sharma, K Arora… - SoutheastCon …, 2024 - ieeexplore.ieee.org
Human-centered artificial intelligence (HAI) is at the forefront of current AI research efforts.
Although several known challenges related to the use of AI are discussed in the present …

Contextualizing interpersonal data sharing in smart homes

W He, N Reitinger, A Almogbil, YS Chiang… - 2024 - digitalcommons.dartmouth.edu
A key feature of smart home devices is monitoring the environment and recording data.
These devices provide security via motion-detection video alerts, cost-savings via thermostat …

A critical analysis of the prevalence of technology-facilitated abuse in us college students

N Gupta, S Das, K Walsh, R Chatterjee - Extended Abstracts of the CHI …, 2024 - dl.acm.org
The ubiquitous use of technology by college students makes them vulnerable to
harassment, harm, and intimidation via technological means. We evaluate the prevalence of …

" I Had Sort of a Sense that I Was Always Being Watched... Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications

K Childs, C Gibson, A Crowder, K Warren… - Proceedings of the …, 2024 - dl.acm.org
Continuous location sharing (CLS) applications are widely used for safety and social
convenience. However, these applications have privacy concerns that can be used for …

DeTagTive: Linking MACs to protect against malicious BLE trackers

T Despres, N Davis, P Dutta, D Wagner - Proceedings of the Second …, 2023 - dl.acm.org
Bluetooth Low Energy (BLE) location trackers are popular and useful for finding misplaced
keys, devices, and other items. However, they can also be used to track people and enable …

The PET Paradox: How Amazon Instrumentalises PETs in Sidewalk to Entrench Its Infrastructural Power

T van Gend, DJ Bertulfo, S Gürses - arxiv preprint arxiv:2412.09994, 2024 - arxiv.org
Recent applications of Privacy Enhancing Technologies (PETs) reveal a paradox. PETs aim
to alleviate power asymmetries, but can actually entrench the infrastructural power of …