Abstract
With the rapid growth and spread of Internet-based social support systems, the impact that these systems can make to society – be it good or bad – has become more significant and can make a real difference to people’s lives. As such, various aspects of these systems need to be carefully investigated and analysed, including their security/privacy issues. In this paper, we present our work in designing and implementing various technological features that can be used to assist domestic violence survivors in obtaining help without leaving traces which might lead to further violence from their abuser. This case study serves as the core of our paper, in which we outline our approach, various design considerations – including difficulties in keeping browsing history private, our currently implemented solutions (single use URL, targeted history sanititation agent, and secret graphical gateway), as well as novel ideas for future work (including location-based service advertising and deployment in the wild).
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
References
Aggrawal, G., Bursztein, E., Jackson, C., Boneh, D.: An analysis of private browsing modes in modern browsers. In: Proceedings 19th USENIX Security Symposium (2010)
Krishnamurthy, B., Malandrino, D., Wills, C.E.: Measuring privacy loss and the impact of privacy protection in web browsing. In: Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS 2007), pp. 52–63. ACM, New York (2007)
Baum, K., Catalano, S., Rand, M., Rose, K.: Stalking victimization in the US. US Department of Justice National Crime Victimisation Survey (January 2009)
Besnard, D., Arief, B.: Computer security impaired by legitimate users. Computers & Security 23(3), 253–264 (2004)
Dunphy, P., Yan, J.: Do background images improve “draw a secret” graphical passwords? In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), pp. 36–47. ACM, New York (2007)
Logan, T., Walker, R.: Partner stalking: Psychological dominance or business as usual? Trauma Violence Abuse 10(3), 247–270 (2009)
Maple, C., Short, E., Brown, A.: Cyberstalking in the United Kingdom: An Analysis of the ECHO Pilot Survey. University of Bedfordshire National Centre for Cyberstalking Research (2011)
Mayer, J.R., Mitchell, J.C.: Third-Party Web Tracking: Policy and Technology. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 413–427 (2012)
Mitnick, K., Simon, W.: The art of deception: Controlling the human element of security. Wiley (2002)
Perry, J.: Digital stalking: A guide to technology risks for victims. Published jointly by Network for Surviving Stalking and Women’s Aid Federation of England (2012)
Richards, L.: Findings from the Multi-agency Domestic Violence Murder Reviews in London. Prepared for the ACPO Homicide Working Group, Metropolitan Police (2003)
Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the weakest link - a human computer interaction approach to usable effective security. BT Tech. Journal 19, 122–131 (2001)
Southworth, C., Dawson, S., Fraser, C., Tucker, S.: A high-tech twist on abuse: Technology, intimate partner stalking and advocacy. Violence Against Women Online Resources (June 2005)
Southworth, C., Finn, J., Dawson, S., Fraser, C., Tucker, S.: Intimate Partner Violence, Technology, and Stalking. Violence Against Women 13(8), 842–856 (2007)
Spence-Diehl, E.: Stalking and technology: The double edge sword. Technology in Human Services 22(1), 5–18 (2003)
Tjaden, P., Thoennes, N.: Stalking in America: Findings form the national violence against women survey. US Dept. of Justice (1998)
van Moorsel, A., Emms, M., Rendall, G., Arief, B.: Digital Strategy for the Social Inclusion of Survivors of Domestic Violence. Technical Report CS-TR-1277, School of Computing Science, Newcastle University (September 2011)
BBC News Online: Details of 100m Facebook users collected and published, http://www.bbc.co.uk/news/technology-10796584 (last accessed: November 27, 2012)
BBC News Online: Facebook’s battle with privacy and profit, http://news.bbc.co.uk/1/hi/programmes/click_online/8843007.stm (last accessed: November 27, 2012)
Digital Trends: Why Do Not Track may not protect anybody’s privacy, http://www.digitaltrends.com/mobile/why-do-not-track-may-not-protect-anybodys-privacy/ (last accessed: November 27, 2012)
Google Chrome: Using the Incognito mode, https://support.google.com/chrome/bin/answer.py?hl=en-GB&answer=95464&p=cpn_incognito (last accessed: November 27, 2012)
Panopticlick: How Unique – and Trackable – Is Your Browser?, https://panopticlick.eff.org/ (last accessed: November 27, 2012)
Tails: The Amnesic Incognito Life System, https://tails.boum.org/ (last accessed: November 27, 2012)
Tor Project: Anonymity Online, https://www.torproject.org/ (last accessed: November 27, 2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Emms, M., Arief, B., van Moorsel, A. (2014). Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors. In: Preneel, B., Ikonomou, D. (eds) Privacy Technologies and Policy. APF 2012. Lecture Notes in Computer Science, vol 8319. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54069-1_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-54069-1_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54068-4
Online ISBN: 978-3-642-54069-1
eBook Packages: Computer ScienceComputer Science (R0)