{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:16:46Z","timestamp":1776122206708,"version":"3.50.1"},"reference-count":69,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW","license":[{"start":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T00:00:00Z","timestamp":1573084800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1916096"],"award-info":[{"award-number":["1916096"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2019,11,7]]},"abstract":"<jats:p>Intimate partner abusers use technology to track, monitor, harass, and otherwise harm their victims, and prior work reports that victims have few resources for obtaining help with such attacks. This paper presents a qualitative analysis of data from a field study of an approach to helping survivors of intimate partner violence (IPV) with technology abuse. In this approach, called clinical computer security, a trained technologist performs a face-to-face consultation with an IPV survivor to help them understand and navigate technology issues. Findings from consultations with 31 survivors, as well as IPV professionals working on their behalf, uncovered a range of digital security and privacy vulnerabilities exacerbated by the nuanced social context of such abuse.<\/jats:p>\n          <jats:p>In this paper we explore survivor experiences with, and reactions to, the consultations, discussing (1) the ways in which survivors present their tech concerns, (2) the cooperative work required to guide survivors towards understanding probable causes of tech insecurity, (3) survivors' reactions to the consultations, particularly when security vulnerabilities or spyware are discovered, and (4) the role we play as consultants and interventionists in the complex socio-technical systems involved in mitigating IPV. We conclude by discussing some of the broad ethical and sustainability challenges raised by our work, and provide design opportunities for tech platforms to better support survivors of IPV.<\/jats:p>","DOI":"10.1145\/3359304","type":"journal-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:21Z","timestamp":1573220421000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":69,"title":["\"Is my phone hacked?\" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence"],"prefix":"10.1145","volume":"3","author":[{"given":"Diana","family":"Freed","sequence":"first","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"given":"Sam","family":"Havron","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"given":"Emily","family":"Tseng","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"given":"Andrea","family":"Gallardo","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"given":"Rahul","family":"Chatterjee","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"given":"Thomas","family":"Ristenpart","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"given":"Nicola","family":"Dell","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI1523_5"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665965"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858548"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-016-9261-x"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753521"},{"key":"e_1_2_1_6_1","volume-title":"Bates' guide to physical examination and history-taking","author":"Bickley Lynn","unstructured":"Lynn Bickley and Peter G Szilagyi. 2012. Bates' guide to physical examination and history-taking.Lippincott Williams & Wilkins."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134659"},{"key":"e_1_2_1_8_1","volume-title":"Doxxing': The Real Moral of the Gawker\/Reddit Story. Wired","year":"2012","unstructured":"danah boyd. 2012. Truth, Lies, and `Doxxing': The Real Moral of the Gawker\/Reddit Story. Wired (2012)."},{"key":"e_1_2_1_9_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology, Vol. 3, 2 (2006), 77--101."},{"key":"e_1_2_1_10_1","volume-title":"The Spyware Used in Intimate Partner Violence. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 441--458","author":"Chatterjee Rahul","year":"2018","unstructured":"Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, and Thomas Ristenpart. 2018. The Spyware Used in Intimate Partner Violence. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 441--458."},{"key":"e_1_2_1_11_1","volume-title":"https:\/\/cltc.berkeley.edu\/citizen-clinic\/. (2019). Online","author":"Clinic Citizen","year":"2019","unstructured":"Citizen Clinic. 2019. https:\/\/cltc.berkeley.edu\/citizen-clinic\/. (2019). Online; accessed 2019."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864398"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.21606\/drs.2018.679"},{"key":"e_1_2_1_14_1","volume-title":"The Citizen Lab. https:\/\/citizenlab.ca\/. (2019). Online","author":"Deibert Ronald J.","year":"2019","unstructured":"Ronald J. Deibert. 2019. The Citizen Lab. https:\/\/citizenlab.ca\/. (2019). Online; accessed 2019."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858081"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441831"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.04.006"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362394.2362400"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901861"},{"key":"e_1_2_1_20_1","volume-title":"Doxing: a conceptual analysis. Ethics and information technology","author":"Douglas David M","year":"2016","unstructured":"David M Douglas. 2016. Doxing: a conceptual analysis. Ethics and information technology, Vol. 18, 3 (2016), 199--210."},{"key":"e_1_2_1_21_1","volume-title":"Speculative everything: design, fiction, and social dreaming","author":"Dunne Anthony","unstructured":"Anthony Dunne and Fiona Raby. 2013. Speculative everything: design, fiction, and social dreaming.MIT press."},{"key":"e_1_2_1_22_1","first-page":"29","article-title":"Cyber-stalking: the Regulation of Harassment on the Internet","volume":"29","author":"Ellison Louise","year":"1998","unstructured":"Louise Ellison and Yaman Akdeniz. 1998. Cyber-stalking: the Regulation of Harassment on the Internet. Criminal Law Review, Vol. 29 (1998), 29--48.","journal-title":"Criminal Law Review"},{"key":"e_1_2_1_23_1","volume-title":"Annual Privacy Forum","author":"Emms Martin","unstructured":"Martin Emms, Budi Arief, and Aad van Moorsel. 2012. Electronic footprints in the sand: Technologies for assisting domestic violence survivors. In Annual Privacy Forum. Springer, 203--214."},{"key":"e_1_2_1_24_1","unstructured":"NYC ENDGBV. 2019. NYC Mayor's Office to Combat Domestic and Gender-Based Violence. https:\/\/www1.nyc.gov\/site\/ocdv\/about\/about-endgbv.page. (2019)."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194349"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.008"},{"key":"e_1_2_1_27_1","volume-title":"The locales framework: understanding and designing for wicked problems","author":"Fitzpatrick Geraldine","unstructured":"Geraldine Fitzpatrick. 2003. The locales framework: understanding and designing for wicked problems. Vol. 1. Springer Science & Business Media."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-012-9168-0"},{"key":"e_1_2_1_29_1","unstructured":"NYC FJCs. 2019. NYC Family Justice Centers. https:\/\/www1.nyc.gov\/site\/ocdv\/programs\/family-justice-centers.page. (2019)."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2856465"},{"key":"e_1_2_1_31_1","volume-title":"The new age of stalking: Technological implications for stalking. Juvenile and family court journal","author":"Fraser Cynthia","year":"2010","unstructured":"Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, and Sarah Tucker. 2010. The new age of stalking: Technological implications for stalking. Juvenile and family court journal, Vol. 61, 4 (2010), 39--55."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134681"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_2_1_34_1","volume-title":"Listening to battered women: A survivor-centered approach to advocacy, mental health, and justice","author":"Goodman Lisa A","unstructured":"Lisa A Goodman and Deborah Epstein. 2008. Listening to battered women: A survivor-centered approach to advocacy, mental health, and justice. American Psychological Association."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260514555131"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818052.2869107"},{"key":"e_1_2_1_37_1","unstructured":"Sam Havron Diana Freed Rahul Chatterjee Damon McCoy Nicola Dell and Thomas Ristenpart. 2019. Clinical Computer Security for Victims of Intimate Partner Violence. In USENIX Security."},{"key":"e_1_2_1_38_1","volume-title":"https:\/\/iheartmob.org\/. (2019). Online","year":"2019","unstructured":"HeartMob. 2019. https:\/\/iheartmob.org\/. (2019). Online; accessed 2019."},{"key":"e_1_2_1_39_1","unstructured":"Leigh Honeywell. 2019. Personal communication. (2019)."},{"key":"e_1_2_1_40_1","volume-title":"usability and universal design-positioning and definition of concepts describing person-environment relationships. Disability and rehabilitation","author":"Iwarsson Susanne","year":"2003","unstructured":"Susanne Iwarsson and Agnetha St\u00e5hl. 2003. Accessibility, usability and universal design-positioning and definition of concepts describing person-environment relationships. Disability and rehabilitation, Vol. 25, 2 (2003), 57--66."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335369"},{"key":"e_1_2_1_42_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS).","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. My data just goes everywhere: user mental models of the internet and implications for privacy and security. In Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_2_1_43_1","volume-title":"Wicked problems: problems worth solving: a handbook and call to action. Ac4d","author":"Kolko J","year":"2012","unstructured":"J Kolko. 2012. Wicked problems: problems worth solving: a handbook and call to action. Ac4d. Austin Center for Design, Austin (2012)."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274368"},{"key":"e_1_2_1_45_1","volume-title":"After method: Mess in social science research","author":"Law John","unstructured":"John Law. 2004. After method: Mess in social science research.Routledge."},{"key":"e_1_2_1_46_1","volume-title":"Squadbox: A Tool To Combat Online Harassment Using Friendsourced Moderation. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, D401","author":"Mahar Kaitlin","year":"2018","unstructured":"Kaitlin Mahar, Amy X Zhang, and David Karger. 2018. Squadbox: A Tool To Combat Online Harassment Using Friendsourced Moderation. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, D401."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145314"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025875"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10896-015-9674-1"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2004.04.001"},{"key":"e_1_2_1_51_1","volume-title":"Dilemmas in a general theory of planning. Policy sciences","author":"Rittel Horst WJ","year":"1973","unstructured":"Horst WJ Rittel and Melvin M Webber. 1973. Dilemmas in a general theory of planning. Policy sciences, Vol. 4, 2 (1973), 155--169."},{"key":"e_1_2_1_52_1","volume-title":"A theory of therapy, personality, and interpersonal relationships: As developed in the client-centered framework","author":"Rogers Carl Ransom","unstructured":"Carl Ransom Rogers. 1959. A theory of therapy, personality, and interpersonal relationships: As developed in the client-centered framework. Vol. 3. McGraw-Hill New York."},{"key":"e_1_2_1_53_1","first-page":"278","article-title":"The Politics of Technology: On Bringing Social Theory into Technological Design","volume":"46","author":"Sadler Victoria","year":"1999","unstructured":"Victoria Sadler. 1999. The Politics of Technology: On Bringing Social Theory into Technological Design. Technical Communication, Vol. 46, 2 (1999), 278--278.","journal-title":"Technical Communication"},{"key":"e_1_2_1_54_1","unstructured":"Safe Chat Silicon Valley. 2017. Safe Chat Silicon Valley. (2017). http:\/\/safechatsv.com\/."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.7326\/0003-4819-115-6-470"},{"key":"e_1_2_1_56_1","unstructured":"Sharon G Smith Kathleen C Basile Leah K Gilbert Melissa T Merrick Nimesh Patel Margie Walling and Anurag Jain. 2017. The National Intimate Partner and Sexual Violence Survey (NISVS): 2010--2012 state report. (2017)."},{"key":"e_1_2_1_57_1","volume-title":"A high-tech twist on abuse: Technology, intimate partner stalking, and advocacy. Violence Against Women","author":"Southworth Cindy","year":"2005","unstructured":"Cindy Southworth, Shawndell Dawson, Cynthia Fraser, and Sarah Tucker. 2005. A high-tech twist on abuse: Technology, intimate partner stalking, and advocacy. Violence Against Women (2005)."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3185369"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979042"},{"key":"e_1_2_1_60_1","volume-title":"Technology-Enabled Coercive Control Working Group","author":"TECC.","year":"2019","unstructured":"TECC. 2019. Technology-Enabled Coercive Control Working Group, Seattle, USA. https:\/\/teccworkinggroup.org\/. (2019). Online; accessed 2019."},{"key":"e_1_2_1_61_1","unstructured":"National Network to End Domestic Violence. 2017a. NNEDV website. (2017). https:nnedv.org\/."},{"key":"e_1_2_1_62_1","unstructured":"National Network to End Domestic Violence. 2017b. Tech Safety App. (2017). https:\/\/techsafetyapp.org\/."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-3506-1_6"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998337"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858317"},{"key":"e_1_2_1_67_1","volume-title":"Engaging homeless young people in HCI research. interactions","author":"Woelfer Jill Palzkill","year":"2014","unstructured":"Jill Palzkill Woelfer. 2014. Engaging homeless young people in HCI research. interactions, Vol. 21, 1 (2014), 54--57."},{"key":"e_1_2_1_68_1","volume-title":"The abuse of technology in domestic violence and stalking. Violence against women","author":"Woodlock Delanie","year":"2017","unstructured":"Delanie Woodlock. 2017. The abuse of technology in domestic violence and stalking. Violence against women, Vol. 23, 5 (2017), 584--602."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110065"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359304","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359304","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:54Z","timestamp":1750202634000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359304"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,7]]},"references-count":69,"journal-issue":{"issue":"CSCW","published-print":{"date-parts":[[2019,11,7]]}},"alternative-id":["10.1145\/3359304"],"URL":"https:\/\/doi.org\/10.1145\/3359304","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,7]]},"assertion":[{"value":"2019-11-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}