skip to main content
10.1145/3025453.3025875acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Open Access
Best Paper

Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse

Published:02 May 2017Publication History

ABSTRACT

We present a qualitative study of the digital privacy and security motivations, practices, and challenges of survivors of intimate partner abuse (IPA). This paper provides a framework for organizing survivors' technology practices and challenges into three phases: physical control, escape, and life apart. This three-phase framework combines technology practices with three phases of abuse to provide an empirically sound method for technology creators to consider how survivors of IPA can leverage new and existing technologies. Overall, our results suggest that the usability of and control over privacy and security functions should be or continue to be high priorities for technology creators seeking ways to better support survivors of IPA.

References

  1. Devdatta Akhawe and Adrienne Porter Felt. 2013. Alice in warningland: A large-scale field study of browser security warning effectiveness. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13), 257--272.Google ScholarGoogle Scholar
  2. Nazanin Andalibi, Oliver L. Haimson, Munmun De Choudhury, and Andrea Forte. 2016. Understanding Social Media Disclosures of Sexual Abuse Through the Lenses of Support Seeking and Anonymity. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 3906--3918. https://doi.org/10.1145/2858036.2858096Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Deborah K. Anderson and Daniel G. Saunders. 2003. Leaving An Abusive Partner An Empirical Review of Predictors, the Process of Leaving, and Psychological Well-Being. Trauma, Violence, & Abuse 4, 2: 163--191. https://doi.org/10.1177/1524838002250769 Google ScholarGoogle ScholarCross RefCross Ref
  4. Paul M. Aoki and Allison Woodruff. 2005. Making space for stories: Ambiguity in the design of personal communication systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '05), 181--190. https://doi.org/10.1145/1054972.1054998Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Budi Arief, Kovila PL Coopamootoo, Martin Emms, and Aad van Moorsel. 2014. Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse. In Proceedings of the 13th Workshop on Privacy in the Electronic Society, 201204. https://doi.org/10.1145/2665943.2665965Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Matthew J. Breiding, Sharon G. Smith, Kathleen C. Basile, Mikel L. Walters, Jieru Chen, and Melissa T. Merrick. 2014. Prevalence and characteristics of sexual violence, stalking, and intimate partner violence victimization-National Intimate Partner and Sexual Violence Survey, USA, 2011. Morbidity and Mortality Weekly Report 63, 4: 1--18. https://doi.org/10.2105/AJPH.2015.302634Google ScholarGoogle Scholar
  7. Jacquelyn C. Campbell, Daniel Webster, Jane KoziolMcLain, Carolyn Block, Doris Campbell, Mary Ann Curry, Faye Gary, Nancy Glass, Judith McFarlane, Carolyn Sachs, and others. 2003. Risk factors for femicide in abusive relationships: Results from a multisite case control study. American Journal of Public Health 93, 7: 1089--1097. https://doi.org/10.2105/AJPH.93.7.1089Google ScholarGoogle ScholarCross RefCross Ref
  8. Judy C. Chang, Diane Dado, Lynn Hawker, Patricia A. Cluss, Raquel Buranosky, Leslie Slagel, Melissa McNeil, and Sarah Hudson Scholle. 2010. Understanding turning points in intimate partner violence: Factors and circumstances leading women victims toward change. Journal of Women's Health 19, 2: 251--259. https://doi.org/10.1089/jwh.2009.1568 Google ScholarGoogle ScholarCross RefCross Ref
  9. Jeremy Clark, P. C. van Oorschot, and Carlisle Adams. 2007. Usability of Anonymous Web Browsing: An Examination of Tor Interfaces and Deployability. In Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS '07), 41--51. https://doi.org/10.1145/1280680.1280687Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Rachel Clarke, Peter Wright, Madeline Balaam, and John McCarthy. 2013. Digital Portraits: Photo-sharing After Domestic Violence. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 2517--2526. https://doi.org/10.1145/2470654.2481348Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Sunny Consolvo, Jaeyeon Jung, Ben Greenstein, Pauline Powledge, Gabriel Maganis, and Daniel Avrahami. 2010. The Wi-Fi privacy ticker: Improving awareness & control of personal information exposure on Wi-Fi. In Proceedings of the 12th ACM International Conference on Ubiquitous Computing (UBICOMP '10), 321--330. https://doi.org/10.1145/1864349.1864398Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Lorrie Faith Cranor. 2008. A framework for reasoning about the human in the loop. In Proceedings of the 1st Conference on Usability, Psychology, and Security (UPSEC'08). 1--15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Lorrie Faith Cranor. 2012. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. Journal on Telecommunications and High Technology Law 10, 2: 273--307.Google ScholarGoogle Scholar
  14. Lorrie Faith Cranor and Simson Garfinkel. 2005. Security and usability: Designing secure systems that people can use. O'Reilly Media, Inc.Google ScholarGoogle Scholar
  15. Sally A. Matar Curnow. 1997. The open window phase: Helpseeking and reality behaviors by battered women. Applied Nursing Research 10, 3: 128--135. https://doi.org/10.1016/S0897--1897(97)80215--7 Google ScholarGoogle ScholarCross RefCross Ref
  16. Jill P. Dimond, Casey Fiesler, and Amy S. Bruckman. 2011. Domestic violence and information communication technologies. Interacting with Computers 23, 5: 413--421. https://doi.org/10.1016/j.intcom.2011.04.006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Paul Dunphy, John Vines, Lizzie Coles-Kemp, Rachel Clarke, Vasilis Vlachokyriakos, Peter Wright, John McCarthy, and Patrick Olivier. 2014. Understanding the Experience-Centeredness of Privacy and Security Technologies. In Proceedings of the 2014 Workshop on New Security Paradigms Workshop (NSPW '14), 83--94. https://doi.org/10.1145/2683467.2683475Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Mary Ellsberg and Lori Heise. 2002. Bearing witness: Ethics in domestic violence research. The Lancet 359, 9317: 1599--1604. https://doi.org/10.1016/S01406736(02)08521--5 Google ScholarGoogle ScholarCross RefCross Ref
  19. Martin Emms, Budi Arief, and Aad van Moorsel. 2014. Electronic footprints in the sand: Technologies for assisting domestic violence survivors. In Privacy Technologies and Policy, 203--214.Google ScholarGoogle Scholar
  20. Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, and Sarah Tucker. 2010. The new age of stalking: Technological implications for stalking. Juvenile and family court journal 61, 4: 39--55. https://doi.org/10.1111/j.1755--6988.2010.01051.x Google ScholarGoogle ScholarCross RefCross Ref
  21. Jeffrey Hunker and Christian W. Probst. 2011. Insiders and Insider Threats. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications 2, 1: 4--27.Google ScholarGoogle Scholar
  22. Giovanni Iachello and Jason Hong. 2007. End-user privacy in human-computer interaction. Foundations and Trends in Human-Computer Interaction 1, 1: 1137. https://doi.org/10.1561/1100000004Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Eric Jardine. 2015. The Dark Web Dilemma: Tor, Anonymity and Online Policing. Global Commission on Internet Governance Paper Series, No. 21. https://ssrn.com/abstract=2667711Google ScholarGoogle Scholar
  24. Maritza Johnson, Serge Egelman, and Steven M. Bellovin. 2012. Facebook and privacy: It's complicated. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12), 9. https://doi.org/10.1145/2335356.2335369Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Zayira Jordán Conde, William Eric Marsh, Andrew W. Luse, and Li-Shan Eva Tao. 2008. GuardDV: A proximity detection device for homeless survivors of domestic violence. In CHI'08 Extended Abstracts on Human Factors in Computing Systems, 3855--3860. https://doi.org/10.1145/1358628.1358943Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. "My data just goes everywhere:" User mental models of the internet and implications for privacy and security. In Eleventh Symposium On Usable Privacy and Security (SOUPS '15), 39--52.Google ScholarGoogle Scholar
  27. Saranga Komanduri, Richard Shay, Patrick Gage Kelley, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, and Serge Egelman. 2011. Of passwords and people: Measuring the effect of password-composition policies. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11), 2595--2604. https://doi.org/10.1145/1978942.1979321Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. T. K. Logan and Robert Walker. 2009. Partner stalking: Psychological dominance or "business as usual?" Trauma Violence Abuse 10, 3. https://doi.org/10.1177/1524838009334461Google ScholarGoogle ScholarCross RefCross Ref
  29. Michael Massimi, Jill P. Dimond, and Christopher A. Le Dantec. 2012. Finding a new normal: The role of technology in life disruptions. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (CSCW '12), 719--728. https://doi.org/10.1145/2145204.2145314Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Michelle L. Mazurek, J. P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, and others. 2010. Access control for home data sharing: Attitudes, needs and practices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10), 645--654. https://doi.org/10.1145/1753326.1753421Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Judith McFarlane, Ann Malecha, Julia Gist, Kathy Watson, Elizabeth Batten, Iva Hall, and Sheila Smith. 2004. Increasing the safety-promoting behaviors of abused women. AJN The American Journal of Nursing 104, 3: 40--50. Google ScholarGoogle ScholarCross RefCross Ref
  32. M. Merritt-Gray and J. Wuest. 1995. Counteracting abuse and breaking free: The process of leaving revealed through women's voices. Health Care for Women International 16, 5: 399--412. https://doi.org/10.1080/07399339509516194 Google ScholarGoogle ScholarCross RefCross Ref
  33. Wendy Moncur. 2013. The Emotional Wellbeing of Researchers: Considerations for Practice. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 1883--1890. https://doi.org/10.1145/2470654.2466248Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. NNEDV. Power and Control Wheel. Retrieved September 17, 2016 from http://nnedv.org/resources/transitional-housing/139financial-empowerment-economic-justiceresources/3898-power-and-control-wheel.htmlGoogle ScholarGoogle Scholar
  35. NNEDV. Tech Safety App. Retrieved September 17, 2016 from http://techsafetyapp.org/Google ScholarGoogle Scholar
  36. Greg Norcie, Kelly Caine, and L. Jean Camp. 2012. Eliminating stop-points in the installation and use of anonymity systems: a usability evaluation of the tor browser bundle. In 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS).Google ScholarGoogle Scholar
  37. Shirley Patton. 2003. Pathways: How women leave violent men. Government of Tasmania. http://nla.gov.au/anbd.bib-an25304195Google ScholarGoogle Scholar
  38. Martina Angela Sasse, Sacha Brostoff, and Dirk Weirich. 2001. Transforming the "weakest link"-a human/computer interaction approach to usable and effective security. BT Technology Journal 19, 3: 122131. https://doi.org/10.1023/A:1011902718709Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Cindy Southworth, Shawndell Dawson, Cynthia Fraser, and Sarah Tucker. 2005. A high-tech twist on abuse: Technology, intimate partner stalking, and advocacy. Violence Against Women Online Resources. Retrieved January 3, 2017 from http://www.vawnet.orgGoogle ScholarGoogle Scholar
  40. Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, and Sarah Tucker. 2007. Intimate partner violence, technology, and stalking. Violence Against Women 13, 8: 842--856. https://doi.org/10.1177/1077801207302045 Google ScholarGoogle ScholarCross RefCross Ref
  41. David R. Thomas. 2006. A General Inductive Approach for Analyzing Qualitative Evaluation Data. American Journal of Evaluation 27, 2: 237--246. Google ScholarGoogle ScholarCross RefCross Ref
  42. Lenore E. Walker. 1977. Battered women and learned helplessness. Victimology 2, 3--4: 525--534. https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=46167Google ScholarGoogle Scholar
  43. Rick Wash. 2010. Folk models of home computer security. In Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS '10). https://doi.org/10.1145/1837110.1837125Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. WHO, Department of Reproductive Health and Research, and London School of Hygiene and Tropical Medicine, South African Medical Research Council. 2013. Global and regional estimates of violence against women: Prevalence and health effects of intimate partner violence and non-partner sexual violence. World Health Organization. Retrieved from http://www.who.int/iris/handle/10665/85239Google ScholarGoogle Scholar
  45. Delanie Woodlock. 2016. The abuse of technology in domestic violence and stalking. Violence Against Women. https://doi.org/10.1177/1077801216646277Google ScholarGoogle Scholar
  46. World Health Organization. 2002. World Report on Violence and Health. Edited by Etienne G. Krug, Linda L. Dahlberg, et al. http://www.who.int/violence_injury_prevention/violence/world_report/Google ScholarGoogle Scholar
  47. J. Wuest and M. Merritt-Gray. 2001. Beyond survival: Reclaiming self after leaving an abusive male partner. The Canadian Journal of Nursing Research 32, 4: 7994.Google ScholarGoogle Scholar
  48. Judith Wuest and Marilyn Merritt-Gray. 1999. Not Going Back: Sustaining the Separation in the Process of Leaving Abusive Relationships. Violence Against Women 5, 2: 110--133. Google ScholarGoogle ScholarCross RefCross Ref
  49. Safe Chat Silicon Valley. Retrieved September 17, 2016 from http://safechatsv.com/about-us/Google ScholarGoogle Scholar
  50. The National Domestic Violence Hotline: 50 Obstacles to Leaving: 1--10. Retrieved September 17, 2016 from http://www.thehotline.org/2013/06/50-obstacles-toleaving-1--10/Google ScholarGoogle Scholar

Index Terms

  1. Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader