[HTML][HTML] Online social networks security and privacy: comprehensive review and analysis

AK Jain, SR Sahoo, J Kaubiyal - Complex & Intelligent Systems, 2021 - Springer
With fast-growing technology, online social networks (OSNs) have exploded in popularity
over the past few years. The pivotal reason behind this phenomenon happens to be the …

[HTML][HTML] Threaten me softly: A review of potential dating app risks

A Phan, K Seigfried-Spellar, KKR Choo - Computers in human behavior …, 2021 - Elsevier
The potential abuse of dating applications (apps), including during the current lockdowns
due to COVID-19, has resulted in a growing community of research to learn to what extent …

“A Stalker's Paradise” How Intimate Partner Abusers Exploit Technology

D Freed, J Palmer, D Minchala, K Levy… - Proceedings of the …, 2018 - dl.acm.org
This paper describes a qualitative study with 89 participants that details how abusers in
intimate partner violence (IPV) contexts exploit technologies to intimidate, threaten, monitor …

[HTML][HTML] Digital or digitally delivered responses to domestic and intimate partner violence during COVID-19

C Emezue - JMIR public health and surveillance, 2020 - publichealth.jmir.org
Before the coronavirus disease (COVID-19), 1 in 3 women and girls, globally, were
victimized by an abusive partner in intimate relationships. However, the current pandemic …

" Is My Phone Hacked?" Analyzing Clinical Computer Security Interventions With Survivors of Intimate Partner Violence

D Freed, S Havron, E Tseng, A Gallardo… - Proceedings of the …, 2019 - dl.acm.org
Intimate partner abusers use technology to track, monitor, harass, and otherwise harm their
victims, and prior work reports that victims have few resources for obtaining help with such …

A framework to predict social crime through twitter tweets by using machine learning

Z Abbass, Z Ali, M Ali, B Akbar… - 2020 IEEE 14th …, 2020 - ieeexplore.ieee.org
An increasing amount of data and information coming from social networks that can be used
to generate a variety of data patterns for different types of investigation such as human social …

Technology-facilitated domestic abuse in political economy: A new theoretical framework

E Yardley - Violence against women, 2021 - journals.sagepub.com
This article presents a new theoretical framework around technology-facilitated domestic
abuse (TFDA) in identifying four distinct types of omnipresent behavior. Perpetrators are …

Policing technology-facilitated abuse

A Flynn, A Powell, S Hindes - Policing and Society, 2023 - Taylor & Francis
Technology-facilitated abuse (TFA) is a growing problem with serious harms and
implications, yet laws and legal responses often fail to keep pace. The policing of TFA poses …

Technology-facilitated abuse: A survey of support services stakeholders

A Flynn, A Powell, S Hindes - 2021 - research.monash.edu
This report presents findings from Stage I of a larger national project examining the extent
and nature of, and responses to, technology-facilitated abuse (TFA) within the Australian …

The commodification of mobile phone surveillance: An analysis of the consumer spyware industry

D Harkin, A Molnar, E Vowles - Crime, media, culture, 2020 - journals.sagepub.com
This article examines the attempts of 'spyware'developers to commodify and market their
products to a general audience. While consumers of 'spyware'have often been government …