Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems 2017
DOI: 10.1145/3025453.3025875
|View full text |Cite
|
Sign up to set email alerts
|

Stories from Survivors

Abstract: We present a qualitative study of the digital privacy and security motivations, practices, and challenges of survivors of intimate partner abuse (IPA). This paper provides a framework for organizing survivors' technology practices and challenges into three phases: physical control, escape, and life apart. This three-phase framework combines technology practices with three phases of abuse to provide an empirically sound method for technology creators to consider how survivors of IPA can leverage new and existin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

2
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 127 publications
(18 citation statements)
references
References 35 publications
(52 reference statements)
2
15
0
Order By: Relevance
“…Security for specific user groups. Security and privacy researchers have studied specific user groups (e.g., Journalists ( McGregor et al, 2015 ), parents and teens ( Czeskis et al, 2010 ), older adults ( Caine et al, 2012 ), and victims of partner violence ( Matthews et al., 2017 , Freed et al., 2017 )) to understand their unique security practices and needs. Methods and lessons from these studies have informed our work.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Security for specific user groups. Security and privacy researchers have studied specific user groups (e.g., Journalists ( McGregor et al, 2015 ), parents and teens ( Czeskis et al, 2010 ), older adults ( Caine et al, 2012 ), and victims of partner violence ( Matthews et al., 2017 , Freed et al., 2017 )) to understand their unique security practices and needs. Methods and lessons from these studies have informed our work.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Some LCEs studied in HCI were not in the original list of Holmes and Rahe (1967) (e.g. domestic violence or abusive behaviour Dimond, Fiesler, and Bruckman 2011;Clarke et al 2013;Freed et al 2017;Matthews et al 2017;Freed et al 2018, gender transition Haimson et al 2015Haimson 2018, veteran reintegration Semaan, Britton, andDosono 2016). 3.…”
Section: Resultsmentioning
confidence: 99%
“…Despite the limited evidence-base on IoT-enabled tech abuse, emerging classes of harms have to be evaluated in light of the dynamics of IPV (Katerndahl, Burge, Ferrer, Becho, & Wood, 2010;de Lucena et al, 2016). For example, Matthews et al (2017) developed a framework for organizing victims'/survivors' technology practices and challenges into three phases, including: physical control, escape, and life apart (see Fig. 39.1).…”
mentioning
confidence: 99%
“…While their research centered on "conventional" devices such as computers and phones, similar considerations will have to be applied to both the social and technical responses to IoT. Matthews et al's (2017) findings further showcase that tech abuse victims/ survivors face high levels of stress and risk, which makes it harder for them to pay attention to user interface (UI) details. The latter are means by which a user interacts with and regulates a technical system.…”
mentioning
confidence: 99%