Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems 2018
DOI: 10.1145/3173574.3174241
|View full text |Cite
|
Sign up to set email alerts
|

“A Stalker's Paradise”

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
102
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 189 publications
(112 citation statements)
references
References 25 publications
2
102
0
Order By: Relevance
“…We suggest that the next steps in a multifaceted response to online GBV requires open discussion and debate as well as empirical research to better understand peoples' lived experiences of online GBV. While excellent work is emerging (see e.g., Chatterjee et al, 2018;Dragiewicz et al, 2018;Freed et al, 2017Freed et al, , 2018Lewis et al, 2017;Salter, 2017;Woodlock, 2017), more research is needed to understand the landscape of GBV and responses to it online. In particular, empirical research is needed in order to produce evidence to guide international efforts to modify and use Internet architecture to address GBV.…”
Section: Resultsmentioning
confidence: 99%
“…We suggest that the next steps in a multifaceted response to online GBV requires open discussion and debate as well as empirical research to better understand peoples' lived experiences of online GBV. While excellent work is emerging (see e.g., Chatterjee et al, 2018;Dragiewicz et al, 2018;Freed et al, 2017Freed et al, , 2018Lewis et al, 2017;Salter, 2017;Woodlock, 2017), more research is needed to understand the landscape of GBV and responses to it online. In particular, empirical research is needed in order to produce evidence to guide international efforts to modify and use Internet architecture to address GBV.…”
Section: Resultsmentioning
confidence: 99%
“…Abusers gain privileged access to survivors' accounts and devices, legitimated by traditional models of androcentric authority within family life. They are often the account holders for family phone plans and purchase devices for survivors, conferring authority to set up passwords and security information (Douglas et al, 2019;Dragiewicz et al, 2019;Freed et al, 2017Freed et al, , 2018Kleinman, 2017;Matthews et al, 2017). Survivors who are financially dependent upon their abuser are particularly vulnerable, emphasising the interrelated nature of economic and technology-facilitated abuse (Freed et al, 2017(Freed et al, , 2018.…”
Section: Establishing Omnipresencementioning
confidence: 99%
“…When survivors are away from their device, abusers check text messages without permission (Freed et al, 2017(Freed et al, , 2018Gilchrist et al 2017) and install spyware on their phones without consent (Douglas et al, 2019;Matthews et al, 2017). Eterovic-Soric et al (2017) note the emergence of what they term the stalker app, described as "a particular type of spyware available for mobile devices, whose primary purpose is to allow a user to covertly monitor a smartphone carried by another person" (2017: 280).…”
Section: Covert Omnipresencementioning
confidence: 99%
See 1 more Smart Citation
“…Even the simple scenarios of ubiquitous computing in Weiser's speculative work, Computers for the 21st Century provided a vision and guidance to multi-billion dollar industries of smartphones and Internet of Things devices [6,100]. As past work at CHI has indicated, the real-world impacts of this new age have been uneven [37]. In this section, we reflect on how, as researchers and practitioners, we might better account for and anticipate the ways in which speculation engages and impacts the real world.…”
Section: O'leary Et Al's Project In Engaging An Africanmentioning
confidence: 99%