{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T16:24:36Z","timestamp":1768407876535,"version":"3.49.0"},"reference-count":204,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/501100004489","name":"Mitacs","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004489","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/sp46214.2022.9833663","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T19:28:05Z","timestamp":1658950085000},"page":"2320-2343","source":"Crossref","is-referenced-by-count":5,"title":["SoK: The Dual Nature of Technology in Sexual Abuse"],"prefix":"10.1109","author":[{"given":"Borke","family":"Obada-Obieh","sequence":"first","affiliation":[{"name":"University of British Columbia"}]},{"given":"Yue","family":"Huang","sequence":"additional","affiliation":[{"name":"University of British Columbia"}]},{"given":"Lucrezia","family":"Spagnolo","sequence":"additional","affiliation":[{"name":"Vesta Social Innovation Technologies"}]},{"given":"Konstantin","family":"Beznosov","sequence":"additional","affiliation":[{"name":"University of British Columbia"}]}],"member":"263","reference":[{"key":"ref57","author":"duerksen","year":"2018","journal-title":"Technological intimate partner violence victim impacts and technological perpetration factors"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2019.01.001"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00069"},{"key":"ref58","first-page":"1","article-title":"Technology-facilitated intimate partner abuse: a qualitative analysis of data from online domestic abuse forums","author":"leit\u00e3o","year":"2019","journal-title":"Human-Computer Interaction"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azy052"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.008"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3180305"},{"key":"ref204","first-page":"679","article-title":"Intimate surveillance","volume":"51","author":"levy","year":"2014","journal-title":"Idaho Law Review"},{"key":"ref55","first-page":"1","article-title":"a stalker&#x2019;s paradise,&#x201D; how intimate partner abusers exploit technology","author":"freed","year":"2018","journal-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems"},{"key":"ref201","author":"keller","year":"2021","journal-title":"Pickton investigation plagued by same issues that failed to stop bernardo"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1080\/07399332.2019.1641502"},{"key":"ref202","first-page":"1075","article-title":"Networks of empathy","author":"kadri","year":"2020","journal-title":"Utah Law Review"},{"key":"ref51","author":"tanczer","year":"2018","journal-title":"Gender and iot research report the rise of the internet of things and implications for technology-facilitated abuse"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2447778"},{"key":"ref46","first-page":"1893","article-title":"The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums","author":"tseng","year":"2020","journal-title":"29th USENIX Security Symposium USENIX Security 20"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s10896-015-9674-1"},{"key":"ref48","author":"ramsay","year":"2019","journal-title":"Tech vs abuse Research findings"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.wsif.2018.04.005"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1057\/9781137356192_5"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6171.2010.00235.x"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.2466\/21.16.PR0.116k22w4"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1080\/15228835.2014.1000558"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3109\/01612840.2014.991049"},{"key":"ref8","author":"barrow","year":"2020","journal-title":"Sexual assault centre&#x2019;s crisis calls on the rise during pandemic"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441788"},{"key":"ref9","author":"sace","year":"2020","journal-title":"Sace services during covid-19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/014107680710000713"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1093\/her\/cyt119"},{"key":"ref6","author":"pringle","year":"2020","journal-title":"Ottawa hospital encourages survivors of sexual assault partner violence to seek er treatment during pandemic"},{"key":"ref5","author":"dyer","year":"2020","journal-title":"Sexual assault reports on the rise during pandemic Sace"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1111\/hojo.12006"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2010.01.007"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azy068"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00061"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10896-008-9207-2"},{"key":"ref37","article-title":"Protecting women&#x2019;s safety? the use of smartphone `apps&#x2019; in relation to domestic and sexual violence","author":"westmarland","year":"2013","journal-title":"Society for Applied Social Sciences"},{"key":"ref36","first-page":"135","article-title":"From spaces of sexual violence to sites of networked resistance: Re-imagining mobile and social media technologies","volume":"33","author":"hart","year":"2015","journal-title":"Perspect Educ"},{"key":"ref31","article-title":"Safelives","author":"snook","year":"2017","journal-title":"Tech vs abuse Research findings"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3350615"},{"key":"ref33","first-page":"105","article-title":"Clinical computer security for victims of intimate partner violence","author":"havron","year":"2019","journal-title":"28th USENIX Security Symposium ( USENIX Security 19)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025875"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v10i2.4094"},{"key":"ref38","article-title":"A high-tech twist on abuse: Technology, intimate partner stalking, and advocacy","author":"southworth","year":"2005","journal-title":"Violence Against Women Online Resources"},{"key":"ref24","article-title":"The publish or perish book","author":"harzing","year":"2010","journal-title":"Tarma Software Research Pty Limited Melbourne"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3209281.3209320"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1097\/PRS.0b013e3181de24bc"},{"key":"ref25","year":"2019","journal-title":"Google scholar web of science and scopus Which is best for me?"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2016.61"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892406"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3303771"},{"key":"ref28","article-title":"Paedophile internet activity","author":"forde","year":"1998","journal-title":"Australian Institute of Criminology Canberra"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1136\/eb-2015-102054"},{"key":"ref29","author":"turner","year":"2020","journal-title":"Should you use inter-rater reliability in qualitative coding?"},{"key":"ref200","author":"sebelius","year":"2011","journal-title":"Announcing the winners of the apps against abuse technology challenge"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1080\/15614263.2018.1507892"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.4324\/9780429467608"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1177\/1461444815612407"},{"key":"ref97","first-page":"411","article-title":"Child protection on the internet-challenges for criminal law","volume":"14","author":"gillespie","year":"2002","journal-title":"Child & Fam LQ"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/s10691-017-9343-2"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1089\/109493101753235197"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.4324\/9780203124116"},{"key":"ref99","author":"project","year":"2021","journal-title":"About the tor project"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1350\/jcla.2013.77.3.843"},{"key":"ref98","first-page":"1","article-title":"Trafficking and technology: Exploring the role of digital communication technologies in the belgian human trafficking business","author":"raets","year":"2019","journal-title":"European Journal on Criminal Policy and Research"},{"key":"ref133","author":"henry","year":"2019","journal-title":"Responding to&#x2019;revenge Pornography&#x2019; Prevalence Nature and Impacts"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.04.006"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1177\/0886260516672055"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2010.01.007"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78440-3_47"},{"key":"ref95","author":"facebook","year":"2021","journal-title":"Using facebook-tagging"},{"key":"ref132","first-page":"1","article-title":"Image-based sexual abuse: an australian reflection","author":"flynn","year":"2019","journal-title":"Women Crim Justice"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1177\/1524838013511543"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.wsif.2018.07.001"},{"key":"ref91","first-page":"25","article-title":"The role of emerging communication technologies in experiences of sexual violence: A new legal frontier?","volume":"20","author":"bluett-boyd","year":"2013","journal-title":"Journal of the Home Economics Institute of Australia"},{"key":"ref90","author":"vitis","year":"2017","journal-title":"Technology and sexual violence Sacc summary report"},{"key":"ref89","first-page":"1","article-title":"they don&#x2019;t leave us alone anywhere we go&#x201D; gender and digital abuse in south asia","author":"sambasivan","year":"2019","journal-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems"},{"key":"ref139","first-page":"469","article-title":"Video voyeurism, privacy, and the internet: Exposing peeping toms in cyberspce","volume":"18","author":"calvert","year":"2000","journal-title":"Cardozo Arts & Ent L J"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1177\/1741659015601173"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.2016.1154964"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1375\/acri.43.1.76"},{"key":"ref85","author":"davies","year":"2013","journal-title":"The lived experiences of individuals who have been technologically stalked by a past intimate a hermeneutic phenomenological study through a communication privacy management theory lens"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.34296\/01021008"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2018.1447341"},{"key":"ref136","author":"powell","year":"2020","journal-title":"Image-based sexual abuse An international study of victims and perpetrators"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1375\/acri.43.1.76"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1177\/1362480615576271"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1177\/1077801216646277"},{"key":"ref145","author":"twitter","year":"2021","journal-title":"About Twitter"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.wsif.2018.04.005"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.11.009"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azy052"},{"key":"ref143","first-page":"89","article-title":"Computer security and privacy in the interactions between victim service providers and human trafficking survivors","author":"chen","year":"2019","journal-title":"28th USENIX Security Symposium ( USENIX Security 19)"},{"key":"ref83","first-page":"105","article-title":"Clinical computer security for victims of intimate partner violence","author":"havron","year":"0","journal-title":"28th USENIX Security Symposium ( USENIX Security 19)"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1177\/1524838016650189"},{"key":"ref141","first-page":"1","article-title":"Image-based sexual abuse: an australian reflection","author":"flynn","year":"2019","journal-title":"Women Crim Justice"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1057\/978-1-137-58047-4"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azy005"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3134681"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1177\/1079063210374347"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.clsr.2015.12.015","article-title":"The role of technology in the fight against human trafficking: Reflections on privacy and data protection concerns","volume":"32","author":"qc","year":"2016","journal-title":"Computer Law & Security Review"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674735613"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.18061\/bhac.v3i1.6688"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.18848\/1832-3669\/CGP\/v05i02\/55977"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3368860.3368861"},{"key":"ref105","first-page":"320","article-title":"Online sexual exploitation of children and young people","author":"bryce","year":"2010","journal-title":"Handbook of internet crime"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322366"},{"key":"ref102","first-page":"1","article-title":"Technology and sexual abuse: A critical review of an internet grooming case","author":"eneman","year":"2010","journal-title":"International Conference on Information Systems"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1111\/j.1755-6988.2010.01051.x"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1080\/13600834.2012.744223"},{"key":"ref76","author":"tanczer","year":"2019","journal-title":"Ucl&#x2019;s gender and internet of things (iot) research project"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1353\/sor.2018.0050"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2402224"},{"key":"ref112","author":"henderson","year":"1985","journal-title":"Flimflam Man How Con Games Work"},{"key":"ref70","first-page":"1","article-title":"A systematic review of crime facilitated by the consumer internet of things","author":"blythe","year":"2019","journal-title":"Security Journal"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TRONSHOW.2014.7396875"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1177\/1079063209344979"},{"key":"ref72","first-page":"119","article-title":"Using machine learning techniques to track individuals & their fitness activities","author":"reichherzer","year":"2017","journal-title":"CATA 2017"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1177\/2158244014553585"},{"key":"ref68","author":"van moorsel","year":"2011","journal-title":"Digital strategy for the social inclusion of survivors of domestic violence"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2014.06.005"},{"key":"ref117","author":"mitchell","year":"2014","journal-title":"Understanding the role of technology in the commercial sexual exploitation of children the perspective of law enforcement"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665965"},{"key":"ref69","author":"hand","year":"2009","journal-title":"The use of information and communication technologies to coerce and control in domestic violence and following separation"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1177\/1079063210374347"},{"key":"ref64","article-title":"What is violence now?: A grounded theory approach to conceptualizing technology-mediated abuse (tma) as spatial and participatory","volume":"29","author":"eckstein","year":"2020","journal-title":"Elect Commun J"},{"key":"ref116","author":"pendergrass","year":"2018","journal-title":"The intersection of human trafficking and technology"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1108\/978-1-78769-955-720201026"},{"key":"ref113","author":"taylor","year":"2004","journal-title":"Confidence games Money and markets in a world without redemption"},{"key":"ref66","first-page":"41","article-title":"The emergence of cyber activity as a gateway to human trafficking","volume":"12","author":"greiman","year":"2013","journal-title":"Journal of Information Warfare"},{"key":"ref114","first-page":"11","article-title":"Confidence schemes and con games: Old games with new players","volume":"55","author":"heintzman","year":"1986","journal-title":"FBI Law Enforcement Bulletin"},{"key":"ref65","author":"doria","year":"2020","journal-title":"Women&#x2019;s experiences of safety apps for sexualized violence A narrative scoping review"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1177\/0004865814524218"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78440-3_25"},{"key":"ref123","volume":"103","year":"2009","journal-title":"Online Child Grooming A Literature Review on the Misuse of Social Networking Sites for Grooming Children for Sexual Offences"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1080\/01639620290086413"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s10896-019-00114-7"},{"key":"ref121","author":"bouche","year":"2015","journal-title":"A Report on the Use of Technology to Recruit Groom and Sell Domestic Minor Sex Trafficking Victims"},{"key":"ref61","first-page":"1","article-title":"Trafficking and technology: Exploring the role of digital communication technologies in the belgian human trafficking business","author":"raets","year":"2019","journal-title":"European Journal on Criminal Policy and Research"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.3390\/sym12010037"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1177\/0886260509354508"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1080\/15228835.2020.1742272"},{"key":"ref177","first-page":"667","article-title":"Technology, stalking and domestic violence victims","volume":"76","author":"southworth","year":"2006","journal-title":"Miss LJ"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1080\/15228835.2017.1350616"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1177\/1609406919825932"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1080\/07448481.2018.1446439"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1145\/3282353.3282363"},{"key":"ref174","author":"uusitalo","year":"2018","journal-title":"Designing for women experiencing intimate partner violence"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1186\/s12889-017-4143-9"},{"key":"ref172","author":"neelam","year":"2018","journal-title":"Mobile application for survivors of domestic violence"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1016\/j.amepre.2016.12.014"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300352"},{"key":"ref181","first-page":"145","article-title":"Towards understanding privacy and trust in online reporting of sexual assault","author":"obada-obieh","year":"2020","journal-title":"Sixteenth Symposium on Usable Privacy and Security ( SOUPS 2020)"},{"key":"ref188","first-page":"126","article-title":"Chain of custody and life cycle of digital evidence","volume":"3","author":"cosic","year":"2012","journal-title":"Computer Applications in Technology"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.5120\/19971-1856"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572534"},{"key":"ref187","author":"university","year":"2021","journal-title":"Iot security & privacy label"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-019-00332-3"},{"key":"ref185","author":"foundation","year":"2021","journal-title":"Intuitive design"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1080\/10999183.2010.10767394"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33649-3"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1177\/1557085116687032"},{"key":"ref149","author":"campbell","year":"1996","journal-title":"Bernardo investigation review"},{"key":"ref146","author":"facebook","year":"2021","journal-title":"About Facebook"},{"key":"ref147","author":"youtube","year":"2021","journal-title":"YouTube About"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1177\/0004865819851544"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1080\/15228835.2013.861784"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2015.1137962"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1177\/1049732308319925"},{"key":"ref151","author":"joyce","year":"2010","journal-title":"Digital Activism Decoded The New Mechanics of Change"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1016\/j.wsif.2020.102379"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2010.01.007"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1186\/s12889-020-08743-0"},{"key":"ref157","first-page":"939","article-title":"When whispers enter the cloud: Evaluating technology to prevent and report sexual assault","volume":"31","author":"liu","year":"2017","journal-title":"Harv JL & Tech"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098082"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1093\/iwc\/iwy019"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1007\/s10896-008-9207-2"},{"key":"ref164","author":"powell","year":"2017","journal-title":"Project aletheia A web-based support network for survivors of campus sexual assault"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376693"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1186\/s12889-015-2072-z"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1186\/s12889-015-2191-6"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2019.1574100"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.18060\/22526"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1177\/1077801215576581"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eclinm.2021.100817"},{"key":"ref15","author":"bourgeois","year":"2021","journal-title":"Chapter 5 Networking and communication"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.51"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18356\/9789210012232"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1111\/inm.12735"},{"key":"ref17","author":"lexico","year":"2021","journal-title":"Perpetrator"},{"key":"ref16","author":"webster","year":"2021","journal-title":"SEXUAL ASSAULT"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2874096"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1109\/THMS.2019.2919702","article-title":"Designing wearable systems for sports: A review of trends and opportunities in human--computer interaction","volume":"49","author":"mencarini","year":"2019","journal-title":"IEEE Transactions on Human-Machine Systems"},{"key":"ref2","year":"2020","journal-title":"Statistics Sexual violence"},{"key":"ref1","article-title":"The national intimate partner and sexual violence survey: 2015 data brief--updated release","author":"smith","year":"2018","journal-title":"National Center for Injury Prevention and Control Centers for Disease Control and Prevention"},{"key":"ref191","author":"lawyers","year":"2021","journal-title":"Is it a crime to videotape your sexual encounter with someone without his or her consent?"},{"key":"ref192","author":"women","year":"2021","journal-title":"Sexual consent campaign"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.15394\/jdfsl.2014.1191"},{"key":"ref199","author":"kumar","year":"2020","journal-title":"The ultimate master list of revenue models used by web and mobile companies"},{"key":"ref197","first-page":"1","article-title":"Criminal victimization in canada, 2014","volume":"35","author":"perreault","year":"2015","journal-title":"Juristat"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.4337\/9781788975803.00038"},{"key":"ref195","author":"kowalski","year":"2021","journal-title":"Digital minimalism defined & 10 digital declutter tips"},{"key":"ref196","author":"vesta","year":"2020","journal-title":"Vesta social innovation technologies"},{"key":"ref193","author":"fling","year":"2021","journal-title":"Get explicit about sexual consent"},{"key":"ref194","author":"salam","year":"2021","journal-title":"Consent in the digital age Can apps solve a very human problem?"}],"event":{"name":"2022 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833550\/9833558\/09833663.pdf?arnumber=9833663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:26:23Z","timestamp":1699485983000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833663\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":204,"URL":"https:\/\/doi.org\/10.1109\/sp46214.2022.9833663","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}