{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:20:00Z","timestamp":1776122400479,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025875","type":"proceedings-article","created":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T18:37:22Z","timestamp":1493750242000},"page":"2189-2201","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":148,"title":["Stories from Survivors"],"prefix":"10.1145","author":[{"given":"Tara","family":"Matthews","sequence":"first","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"Kathleen","family":"O'Leary","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"Anna","family":"Turner","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"Manya","family":"Sleeper","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"Jill Palzkill","family":"Woelfer","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"Martin","family":"Shelton","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"Cori","family":"Manthorne","sequence":"additional","affiliation":[{"name":"Community Overcoming Relationship Abuse, San Mateo, CA, USA"}]},{"given":"Elizabeth F.","family":"Churchill","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"Sunny","family":"Consolvo","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13), 257--272.","author":"Akhawe Devdatta","unstructured":"Devdatta Akhawe and Adrienne Porter Felt . 2013. Alice in warningland: A large-scale field study of browser security warning effectiveness . In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13), 257--272. Devdatta Akhawe and Adrienne Porter Felt. 2013. Alice in warningland: A large-scale field study of browser security warning effectiveness. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13), 257--272."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858096"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/1524838002250769"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '05)","author":"Paul","unstructured":"Paul M. Aoki and Allison Woodruff. 2005. Making space for stories: Ambiguity in the design of personal communication systems . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '05) , 181--190. https:\/\/doi.org\/10.1145\/1054972.1054998 10.1145\/1054972.1054998 Paul M. Aoki and Allison Woodruff. 2005. Making space for stories: Ambiguity in the design of personal communication systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '05), 181--190. https:\/\/doi.org\/10.1145\/1054972.1054998"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665965"},{"key":"e_1_3_2_1_6_1","first-page":"1","article-title":"Prevalence and characteristics of sexual violence, stalking, and intimate partner violence victimization-National Intimate Partner and Sexual Violence Survey, USA, 2011","volume":"63","author":"Breiding Matthew J.","year":"2014","unstructured":"Matthew J. Breiding , Sharon G. Smith , Kathleen C. Basile , Mikel L. Walters , Jieru Chen , and Melissa T. Merrick . 2014 . Prevalence and characteristics of sexual violence, stalking, and intimate partner violence victimization-National Intimate Partner and Sexual Violence Survey, USA, 2011 . Morbidity and Mortality Weekly Report 63 , 4: 1 -- 18 . https:\/\/doi.org\/10.2105\/AJPH.2015.302634 10.2105\/AJPH.2015.302634 Matthew J. Breiding, Sharon G. Smith, Kathleen C. Basile, Mikel L. Walters, Jieru Chen, and Melissa T. Merrick. 2014. Prevalence and characteristics of sexual violence, stalking, and intimate partner violence victimization-National Intimate Partner and Sexual Violence Survey, USA, 2011. Morbidity and Mortality Weekly Report 63, 4: 1--18. https:\/\/doi.org\/10.2105\/AJPH.2015.302634","journal-title":"Morbidity and Mortality Weekly Report"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2105\/AJPH.93.7.1089"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1089\/jwh.2009.1568"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280687"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481348"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864398"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387649.1387650"},{"key":"e_1_3_2_1_13_1","first-page":"273","article-title":"Necessary but not sufficient: Standardized mechanisms for privacy notice and choice","volume":"10","author":"Cranor Lorrie Faith","year":"2012","unstructured":"Lorrie Faith Cranor . 2012 . Necessary but not sufficient: Standardized mechanisms for privacy notice and choice . Journal on Telecommunications and High Technology Law 10 , 2: 273 -- 307 . Lorrie Faith Cranor. 2012. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. Journal on Telecommunications and High Technology Law 10, 2: 273--307.","journal-title":"Journal on Telecommunications and High Technology Law"},{"key":"e_1_3_2_1_14_1","volume-title":"Security and usability: Designing secure systems that people can use","author":"Cranor Lorrie Faith","unstructured":"Lorrie Faith Cranor and Simson Garfinkel . 2005. Security and usability: Designing secure systems that people can use . O'Reilly Media, Inc. Lorrie Faith Cranor and Simson Garfinkel. 2005. Security and usability: Designing secure systems that people can use. O'Reilly Media, Inc."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0897-1897(97)80215-7"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.04.006"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2683467.2683475"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-6736(02)08521-5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Martin Emms Budi Arief and Aad van Moorsel. 2014. Electronic footprints in the sand: Technologies for assisting domestic violence survivors. In Privacy Technologies and Policy 203--214.  Martin Emms Budi Arief and Aad van Moorsel. 2014. Electronic footprints in the sand: Technologies for assisting domestic violence survivors. In Privacy Technologies and Policy 203--214.","DOI":"10.1007\/978-3-642-54069-1_13"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1755-6988.2010.01051.x"},{"key":"e_1_3_2_1_21_1","first-page":"4","article-title":"Insiders and Insider Threats","volume":"2","author":"Hunker Jeffrey","year":"2011","unstructured":"Jeffrey Hunker and Christian W. Probst . 2011 . Insiders and Insider Threats . Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications 2 , 1: 4 -- 27 . Jeffrey Hunker and Christian W. Probst. 2011. Insiders and Insider Threats. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications 2, 1: 4--27.","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1561\/1100000004"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Eric Jardine. 2015. The Dark Web Dilemma: Tor Anonymity and Online Policing. Global Commission on Internet Governance Paper Series No. 21. https:\/\/ssrn.com\/abstract=2667711  Eric Jardine. 2015. The Dark Web Dilemma: Tor Anonymity and Online Policing. Global Commission on Internet Governance Paper Series No. 21. https:\/\/ssrn.com\/abstract=2667711","DOI":"10.2139\/ssrn.2667711"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12)","author":"Johnson Maritza","unstructured":"Maritza Johnson , Serge Egelman , and Steven M. Bellovin . 2012. Facebook and privacy: It's complicated . In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12) , 9. https:\/\/doi.org\/10.1145\/2335356.2335369 10.1145\/2335356.2335369 Maritza Johnson, Serge Egelman, and Steven M. Bellovin. 2012. Facebook and privacy: It's complicated. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12), 9. https:\/\/doi.org\/10.1145\/2335356.2335369"},{"key":"e_1_3_2_1_25_1","volume-title":"Andrew W. Luse, and Li-Shan Eva Tao.","author":"Conde Zayira Jord\u00e1n","year":"2008","unstructured":"Zayira Jord\u00e1n Conde , William Eric Marsh , Andrew W. Luse, and Li-Shan Eva Tao. 2008 . GuardDV: A proximity detection device for homeless survivors of domestic violence. In CHI'08 Extended Abstracts on Human Factors in Computing Systems , 3855--3860. https:\/\/doi.org\/10.1145\/1358628.1358943 10.1145\/1358628.1358943 Zayira Jord\u00e1n Conde, William Eric Marsh, Andrew W. Luse, and Li-Shan Eva Tao. 2008. GuardDV: A proximity detection device for homeless survivors of domestic violence. In CHI'08 Extended Abstracts on Human Factors in Computing Systems, 3855--3860. https:\/\/doi.org\/10.1145\/1358628.1358943"},{"key":"e_1_3_2_1_26_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS '15)","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang , Laura Dabbish , Nathaniel Fruchter , and Sara Kiesler . 2015 . \" My data just goes everywhere:\" User mental models of the internet and implications for privacy and security . In Eleventh Symposium On Usable Privacy and Security (SOUPS '15) , 39--52. Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. \"My data just goes everywhere:\" User mental models of the internet and implications for privacy and security. In Eleventh Symposium On Usable Privacy and Security (SOUPS '15), 39--52."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979321"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/1524838008327262"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (CSCW '12)","author":"Massimi Michael","unstructured":"Michael Massimi , Jill P. Dimond , and Christopher A . Le Dantec. 2012. Finding a new normal: The role of technology in life disruptions . In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (CSCW '12) , 719--728. https:\/\/doi.org\/10.1145\/2145204.2145314 10.1145\/2145204.2145314 Michael Massimi, Jill P. Dimond, and Christopher A. Le Dantec. 2012. Finding a new normal: The role of technology in life disruptions. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (CSCW '12), 719--728. https:\/\/doi.org\/10.1145\/2145204.2145314"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753421"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1097\/00000446-200403000-00019"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/07399339509516194"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466248"},{"key":"e_1_3_2_1_34_1","volume-title":"Retrieved","author":"NNEDV.","year":"2016","unstructured":"NNEDV. Power and Control Wheel . Retrieved September 17, 2016 from http:\/\/nnedv.org\/resources\/transitional-housing\/139financial-empowerment-economic-justiceresources\/3898-power-and-control-wheel.html NNEDV. Power and Control Wheel. Retrieved September 17, 2016 from http:\/\/nnedv.org\/resources\/transitional-housing\/139financial-empowerment-economic-justiceresources\/3898-power-and-control-wheel.html"},{"key":"e_1_3_2_1_35_1","volume-title":"Retrieved","author":"NNEDV.","year":"2016","unstructured":"NNEDV. Tech Safety App . Retrieved September 17, 2016 from http:\/\/techsafetyapp.org\/ NNEDV. Tech Safety App. Retrieved September 17, 2016 from http:\/\/techsafetyapp.org\/"},{"key":"e_1_3_2_1_36_1","volume-title":"5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS).","author":"Norcie Greg","unstructured":"Greg Norcie , Kelly Caine , and L. Jean Camp . 2012. Eliminating stop-points in the installation and use of anonymity systems: a usability evaluation of the tor browser bundle . In 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS). Greg Norcie, Kelly Caine, and L. Jean Camp. 2012. Eliminating stop-points in the installation and use of anonymity systems: a usability evaluation of the tor browser bundle. In 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS)."},{"key":"e_1_3_2_1_37_1","volume-title":"Pathways: How women leave violent men. Government of Tasmania","author":"Patton Shirley","year":"2003","unstructured":"Shirley Patton . 2003 . Pathways: How women leave violent men. Government of Tasmania . http:\/\/nla.gov.au\/anbd.bib-an25304195 Shirley Patton. 2003. Pathways: How women leave violent men. Government of Tasmania. http:\/\/nla.gov.au\/anbd.bib-an25304195"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"e_1_3_2_1_39_1","volume-title":"A high-tech twist on abuse: Technology, intimate partner stalking, and advocacy. Violence Against Women Online Resources. Retrieved","author":"Southworth Cindy","year":"2017","unstructured":"Cindy Southworth , Shawndell Dawson , Cynthia Fraser , and Sarah Tucker . 2005. A high-tech twist on abuse: Technology, intimate partner stalking, and advocacy. Violence Against Women Online Resources. Retrieved January 3, 2017 from http:\/\/www.vawnet.org Cindy Southworth, Shawndell Dawson, Cynthia Fraser, and Sarah Tucker. 2005. A high-tech twist on abuse: Technology, intimate partner stalking, and advocacy. Violence Against Women Online Resources. Retrieved January 3, 2017 from http:\/\/www.vawnet.org"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801207302045"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/1098214005283748"},{"key":"e_1_3_2_1_42_1","first-page":"3","article-title":"Battered women and learned helplessness","volume":"2","author":"Walker Lenore E.","year":"1977","unstructured":"Lenore E. Walker . 1977 . Battered women and learned helplessness . Victimology 2 , 3 -- 4 : 525--534. https:\/\/www.ncjrs.gov\/App\/Publications\/abstract.aspx?ID=46167 Lenore E. Walker. 1977. Battered women and learned helplessness. Victimology 2, 3--4: 525--534. https:\/\/www.ncjrs.gov\/App\/Publications\/abstract.aspx?ID=46167","journal-title":"Victimology"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_2_1_44_1","volume-title":"Department of Reproductive Health and Research, and London School of Hygiene and Tropical Medicine","author":"WHO","year":"2013","unstructured":"WHO , Department of Reproductive Health and Research, and London School of Hygiene and Tropical Medicine , South African Medical Research Council . 2013 . Global and regional estimates of violence against women: Prevalence and health effects of intimate partner violence and non-partner sexual violence. World Health Organization. Retrieved from http:\/\/www.who.int\/iris\/handle\/10665\/85239 WHO, Department of Reproductive Health and Research, and London School of Hygiene and Tropical Medicine, South African Medical Research Council. 2013. Global and regional estimates of violence against women: Prevalence and health effects of intimate partner violence and non-partner sexual violence. World Health Organization. Retrieved from http:\/\/www.who.int\/iris\/handle\/10665\/85239"},{"key":"#cr-split#-e_1_3_2_1_45_1.1","doi-asserted-by":"crossref","unstructured":"Delanie Woodlock. 2016. The abuse of technology in domestic violence and stalking. Violence Against Women. https:\/\/doi.org\/10.1177\/1077801216646277 10.1177\/1077801216646277","DOI":"10.1177\/1077801216646277"},{"key":"#cr-split#-e_1_3_2_1_45_1.2","doi-asserted-by":"crossref","unstructured":"Delanie Woodlock. 2016. The abuse of technology in domestic violence and stalking. Violence Against Women. https:\/\/doi.org\/10.1177\/1077801216646277","DOI":"10.1177\/1077801216646277"},{"key":"e_1_3_2_1_46_1","unstructured":"World Health Organization. 2002. World Report on Violence and Health. Edited by Etienne G. Krug Linda L. Dahlberg et al. http:\/\/www.who.int\/violence_injury_prevention\/violence\/world_report\/  World Health Organization. 2002. World Report on Violence and Health. Edited by Etienne G. Krug Linda L. Dahlberg et al. http:\/\/www.who.int\/violence_injury_prevention\/violence\/world_report\/"},{"key":"e_1_3_2_1_47_1","first-page":"7994","article-title":"Beyond survival: Reclaiming self after leaving an abusive male partner","volume":"32","author":"Wuest J.","year":"2001","unstructured":"J. Wuest and M. Merritt-Gray . 2001 . Beyond survival: Reclaiming self after leaving an abusive male partner . The Canadian Journal of Nursing Research 32 , 4: 7994 . J. Wuest and M. Merritt-Gray. 2001. Beyond survival: Reclaiming self after leaving an abusive male partner. The Canadian Journal of Nursing Research 32, 4: 7994.","journal-title":"The Canadian Journal of Nursing Research"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801299005002002"},{"key":"e_1_3_2_1_49_1","unstructured":"Safe Chat Silicon Valley. Retrieved September 17 2016 from http:\/\/safechatsv.com\/about-us\/  Safe Chat Silicon Valley. Retrieved September 17 2016 from http:\/\/safechatsv.com\/about-us\/"},{"key":"e_1_3_2_1_50_1","volume-title":"Retrieved","author":"The National Domestic Violence Hotline","year":"2016","unstructured":"The National Domestic Violence Hotline : 50 Obstacles to Leaving: 1--10 . Retrieved September 17, 2016 from http:\/\/www.thehotline.org\/2013\/06\/50-obstacles-toleaving-1--10\/ The National Domestic Violence Hotline: 50 Obstacles to Leaving: 1--10. Retrieved September 17, 2016 from http:\/\/www.thehotline.org\/2013\/06\/50-obstacles-toleaving-1--10\/"}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","location":"Denver Colorado USA","acronym":"CHI '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025875","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:39Z","timestamp":1750215819000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025875"}},"subtitle":["Privacy &amp; Security Practices when Coping with Intimate Partner Abuse"],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":51,"alternative-id":["10.1145\/3025453.3025875","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025875","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}