{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T11:22:05Z","timestamp":1773141725837,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":90,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445114","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T03:56:25Z","timestamp":1620446185000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Standing in the Way of Control: A Call to Action to Prevent Abuse through Better Design of Smart Technologies"],"prefix":"10.1145","author":[{"given":"Dana","family":"McKay","sequence":"first","affiliation":[{"name":"iSchool University of Melbourne, Australia"}]},{"given":"Charlynn","family":"Miller","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems University of Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"8","volume-title":"Proc. HICS 18","author":"Alkhatib S.","unstructured":"Alkhatib , S. , Waycott , J. , Buchanan , G. , and Bosua , R ., 2018. Privacy and the Internet of Things (IoT) Monitoring Solutions for Older Adults: a review . In Proc. HICS 18 ( Sydney, Australia) , IOS Press, 8 - 14 . Alkhatib, S., Waycott, J., Buchanan, G., and Bosua, R., 2018. Privacy and the Internet of Things (IoT) Monitoring Solutions for Older Adults: a review. In Proc. HICS 18 (Sydney, Australia), IOS Press, 8-14."},{"key":"e_1_3_2_1_2_1","unstructured":"Amnesty International 2018. Toxic Twitter. https:\/\/www.amnesty.org\/en\/latest\/research\/2018\/03\/online-violence-against-women-chapter-1\/.  Amnesty International 2018. Toxic Twitter. https:\/\/www.amnesty.org\/en\/latest\/research\/2018\/03\/online-violence-against-women-chapter-1\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-018-0036-2"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/08993408.2018.1519322"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376693"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2838739.2838767"},{"issue":"9","key":"e_1_3_2_1_7_1","first-page":"616","article-title":"Communist attempts to elicit false confessions from Air Force prisoners of war","volume":"33","author":"Biderman A.D.","year":"1957","unstructured":"Biderman , A.D. , 1957 . Communist attempts to elicit false confessions from Air Force prisoners of war . B New York Acad Med 33 , 9 , 616 - 625 . Biderman, A.D., 1957. Communist attempts to elicit false confessions from Air Force prisoners of war. B New York Acad Med 33, 9, 616-625.","journal-title":"B New York Acad Med"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369457.3369474"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753349"},{"key":"e_1_3_2_1_10_1","volume-title":"New York Times. A.G Sulzberger","author":"Bowles N.","year":"2018","unstructured":"Bowles , N. , 2018. Thermostats , Locks and Lights: Digital Tools of Domestic Abuse , New York Times. A.G Sulzberger , New York, NY , https:\/\/www.nytimes.com\/ 2018 \/06\/23\/technology\/smart-home-devices-domestic-abuse.html. Bowles, N., 2018. Thermostats, Locks and Lights: Digital Tools of Domestic Abuse, New York Times. A.G Sulzberger, New York, NY, https:\/\/www.nytimes.com\/2018\/06\/23\/technology\/smart-home-devices-domestic-abuse.html."},{"key":"e_1_3_2_1_11_1","unstructured":"Bradley A. 2017. I Caught My Boyfriend Cheating On Me With Our Amazon Alexa \u2014 Here's How I Did It ThoughtCatalog. https:\/\/thoughtcatalog.com\/alexa-bradley\/2017\/08\/i-caught-my-boyfriend-cheating-on-me-with-our-amazon-alexa-heres-how-i-did-it\/  Bradley A. 2017. I Caught My Boyfriend Cheating On Me With Our Amazon Alexa \u2014 Here's How I Did It ThoughtCatalog. https:\/\/thoughtcatalog.com\/alexa-bradley\/2017\/08\/i-caught-my-boyfriend-cheating-on-me-with-our-amazon-alexa-heres-how-i-did-it\/"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1300\/J084v17n03_03"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Breslin S. and Wadhwa B. 2018. Gender and Human\u2010Computer Interaction. In The Wiley Handbook of Human Computer Interaction K. Norman and J. Kirakowski Eds. Wiley 71-87.  Breslin S. and Wadhwa B. 2018. Gender and Human\u2010Computer Interaction. In The Wiley Handbook of Human Computer Interaction K. Norman and J. Kirakowski Eds. Wiley 71-87.","DOI":"10.1002\/9781118976005.ch4"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-0378-8_18"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979249"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.12.010"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0216362"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2196\/11985"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370226"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025797"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2317956.2318039"},{"key":"e_1_3_2_1_22_1","first-page":"19","volume-title":"Proc. SOUPS 14","author":"Cranor L.F.","unstructured":"Cranor , L.F. , Durity , A.L. , Marsh , A. , and Ur , B ., 2014. Parents\u2019 and teens\u2019 perspectives on privacy in a technology-filled world . In Proc. SOUPS 14 ( Menlo Park, CA), Usenix Inc., Berkely, CA , 19 - 35 . Cranor, L.F., Durity, A.L., Marsh, A., and Ur, B., 2014. Parents\u2019 and teens\u2019 perspectives on privacy in a technology-filled world. In Proc. SOUPS 14 (Menlo Park, CA), Usenix Inc., Berkely, CA, 19-35."},{"key":"e_1_3_2_1_23_1","unstructured":"Crosson-Tower C. 1999. Understanding child abuse and neglect. Allyn and Bacon Boston.  Crosson-Tower C. 1999. Understanding child abuse and neglect. Allyn and Bacon Boston."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/10778010022183695"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134681"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_3_2_1_28_1","first-page":"1","article-title":"Violence against Women and the Persistence of Privacy","volume":"61","author":"Goldfarb S.F.","year":"2000","unstructured":"Goldfarb , S.F. , 2000 . Violence against Women and the Persistence of Privacy . Ohio State Law Journal 61 , 1 (2000), 1 - 88 . Goldfarb, S.F., 2000. Violence against Women and the Persistence of Privacy. Ohio State Law Journal 61, 1 (2000), 1-88.","journal-title":"Ohio State Law Journal"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.erss.2017.09.037"},{"key":"e_1_3_2_1_30_1","first-page":"105","article-title":". Feminist Conceptions of Public and Private: A Critical Analysis","volume":"32","author":"Hansen K.V.","year":"1987","unstructured":"Hansen , K.V. , 1987 . Feminist Conceptions of Public and Private: A Critical Analysis . Berkeley J Soc 32 , 105 - 128 . Hansen, K.V., 1987. Feminist Conceptions of Public and Private: A Critical Analysis. Berkeley J Soc 32, 105-128.","journal-title":"Berkeley J Soc"},{"key":"e_1_3_2_1_31_1","first-page":"255","volume-title":"Proc. Usenix Security 18","author":"He W.","unstructured":"He , W. , Golla , M. , Padhi , R. , Ofek , J. , D\u00fcrmuth , M. , Fernandes , E. , and Ur , B ., 2018. Rethinking access control and authentication for the home internet of things (IoT) . In Proc. Usenix Security 18 ( Baltimore, MD), Usenix Inc, Berkely, CA , 255 - 272 . He, W., Golla, M., Padhi, R., Ofek, J., D\u00fcrmuth, M., Fernandes, E., and Ur, B., 2018. Rethinking access control and authentication for the home internet of things (IoT). In Proc. Usenix Security 18 (Baltimore, MD), Usenix Inc, Berkely, CA, 255-272."},{"key":"e_1_3_2_1_32_1","unstructured":"Herman J.L. 2015. Trauma and recovery: The aftermath of violence\u2013from domestic abuse to political terror. Hachette UK.  Herman J.L. 2015. Trauma and recovery: The aftermath of violence\u2013from domestic abuse to political terror. Hachette UK."},{"key":"e_1_3_2_1_33_1","volume-title":"See What You Made Me Do: Power, Control and Domestic Abuse","author":"Hill J.","unstructured":"Hill , J. , 2019. See What You Made Me Do: Power, Control and Domestic Abuse . Black Inc . Hill, J., 2019. See What You Made Me Do: Power, Control and Domestic Abuse. Black Inc."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281444"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1177\/1088767902239243"},{"key":"e_1_3_2_1_36_1","unstructured":"Jones N. 2016. New family violence offences to be created New Zealand Herald. Fairfax Media Auckland New Zealand https:\/\/www.nzherald.co.nz\/nz\/news\/article.cfm?c_id=1&objectid=11708758.  Jones N. 2016. New family violence offences to be created New Zealand Herald. Fairfax Media Auckland New Zealand https:\/\/www.nzherald.co.nz\/nz\/news\/article.cfm?c_id=1&objectid=11708758."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.4"},{"key":"e_1_3_2_1_38_1","volume-title":"Proc. UbiComp 01 (Atlanta, GA)","author":"Langheinrich M.","unstructured":"Langheinrich , M. , 2001. Privacy by Design \u2014 Principles of Privacy-Aware Ubiquitous Systems . In Proc. UbiComp 01 (Atlanta, GA) , Springer , Berlin, Germany , 273-291. Langheinrich, M., 2001. Privacy by Design \u2014 Principles of Privacy-Aware Ubiquitous Systems. In Proc. UbiComp 01 (Atlanta, GA), Springer, Berlin, Germany, 273-291."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322366"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec"},{"key":"e_1_3_2_1_41_1","first-page":"679","article-title":"Intimate surveillance","volume":"51","author":"Levy K.E.","year":"2014","unstructured":"Levy , K.E. , 2014 . Intimate surveillance . Idaho L. Rev. 51 , 679 - 693 . Levy, K.E., 2014. Intimate surveillance. Idaho L. Rev. 51, 679-693.","journal-title":"Idaho L. Rev."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/14606925.2017.1352796"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.65"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1086\/658870"},{"key":"e_1_3_2_1_45_1","volume-title":"CBS News. CBS Interactive Limited","author":"Marcus M.B.","unstructured":"Marcus , M.B. , 2016. Fitbit fitness tracker detects woman's pregnancy , CBS News. CBS Interactive Limited , Toronto, Canada , https:\/\/www.cbsnews.com\/news\/fitbit-fitness-tracker-tells-woman-shes-pregnant\/. Marcus, M.B., 2016. Fitbit fitness tracker detects woman's pregnancy, CBS News. CBS Interactive Limited, Toronto, Canada, https:\/\/www.cbsnews.com\/news\/fitbit-fitness-tracker-tells-woman-shes-pregnant\/."},{"key":"e_1_3_2_1_46_1","unstructured":"Margolis J. and Fisher A. 2003. Unlocking the clubhouse: Women in computing. MIT press.  Margolis J. and Fisher A. 2003. Unlocking the clubhouse: Women in computing. MIT press."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420164"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858051"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025875"},{"key":"e_1_3_2_1_50_1","volume-title":"Sydney Morning Herald. Fairfax Media","author":"McGorrery P.","year":"2019","unstructured":"McGorrery , P. and McMahon , M. , 2019. It's time 'coercive control' was made illegal in Australia , Sydney Morning Herald. Fairfax Media , Sydney, Australia , https:\/\/www.smh.com.au\/lifestyle\/gender\/it-s-time-coercive-control-was-made-illegal-in-australia- 2019 0501-p51iyq.html. McGorrery, P. and McMahon, M., 2019. It's time 'coercive control' was made illegal in Australia, Sydney Morning Herald. Fairfax Media, Sydney, Australia, https:\/\/www.smh.com.au\/lifestyle\/gender\/it-s-time-coercive-control-was-made-illegal-in-australia-20190501-p51iyq.html."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31205-2_10"},{"key":"e_1_3_2_1_52_1","volume-title":"Elder mistreatment: Abuse, neglect, and exploitation in an aging America","author":"National Research Council, 2003.","unstructured":"National Research Council, 2003. Elder mistreatment: Abuse, neglect, and exploitation in an aging America . National Academies Press . National Research Council, 2003. Elder mistreatment: Abuse, neglect, and exploitation in an aging America. National Academies Press."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2019.101283"},{"key":"e_1_3_2_1_54_1","unstructured":"LMF 2.1 Usual Working Hours Per Week By Gender 2011 https:\/\/www.oecd.org\/els\/family\/LMF_2_1_Usual_working_hours_gender.pdf  LMF 2.1 Usual Working Hours Per Week By Gender 2011 https:\/\/www.oecd.org\/els\/family\/LMF_2_1_Usual_working_hours_gender.pdf"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Olson J.S. and Kellogg W.A. 2014. Ways of Knowing in HCI. Springer Science & Business.  Olson J.S. and Kellogg W.A. 2014. Ways of Knowing in HCI. Springer Science & Business.","DOI":"10.1007\/978-1-4939-0378-8"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370224"},{"key":"e_1_3_2_1_57_1","volume-title":"Invisible women: Exposing data bias in a world designed for men","author":"Perez C.C.","unstructured":"Perez , C.C. , 2019. Invisible women: Exposing data bias in a world designed for men . Random House . Perez, C.C., 2019. Invisible women: Exposing data bias in a world designed for men. Random House."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300275"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.12688\/f1000research.3-38.v2"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2001.00098.x"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.04.005"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196839.3196845"},{"key":"e_1_3_2_1_63_1","unstructured":"Rogers Y. Sharp H. and Preece J. 2007. Interaction design: beyond human-computer interaction. Wiley Chichester West Sussex England.  Rogers Y. Sharp H. and Preece J. 2007. Interaction design: beyond human-computer interaction. Wiley Chichester West Sussex England."},{"key":"e_1_3_2_1_64_1","volume-title":"Rape in Marriage","author":"Russell D.E.","unstructured":"Russell , D.E. , 1990. Rape in Marriage . Indiana University Press . Russell, D.E., 1990. Rape in Marriage. Indiana University Press."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300232"},{"issue":"1","key":"e_1_3_2_1_66_1","first-page":"83","article-title":"Safe at home: Towards a feminist critique of cybersecurity","volume":"15","author":"Slupska J.","year":"2019","unstructured":"Slupska , J. , 2019 . Safe at home: Towards a feminist critique of cybersecurity . St Anthony's International Review 15 , 1 , 83 - 100 . Slupska, J., 2019. Safe at home: Towards a feminist critique of cybersecurity. St Anthony's International Review 15, 1, 83-100.","journal-title":"St Anthony's International Review"},{"key":"e_1_3_2_1_67_1","volume-title":"Draft Ethics Guidelines for Trustworthy AI","author":"Smuha N.","unstructured":"Smuha , N. , 2018. Draft Ethics Guidelines for Trustworthy AI . European Union , https:\/\/ec.europa.eu\/digital-single-market\/en\/news\/draft-ethics-guidelines-trustworthy-ai. Smuha, N., 2018. Draft Ethics Guidelines for Trustworthy AI. European Union, https:\/\/ec.europa.eu\/digital-single-market\/en\/news\/draft-ethics-guidelines-trustworthy-ai."},{"key":"e_1_3_2_1_68_1","first-page":"342","volume-title":"Proc. OzCHI 14","author":"Snow S.","unstructured":"Snow , S. , Radke , K. , Vyas , D. , and Brereton , M ., 2014. Privacy in the new era of visible and sharable energy-use information . In Proc. OzCHI 14 ( Sydney, Australia), ACM, New York, NY , 342 - 351 . Snow, S., Radke, K., Vyas, D., and Brereton, M., 2014. Privacy in the new era of visible and sharable energy-use information. In Proc. OzCHI 14 (Sydney, Australia), ACM, New York, NY, 342-351."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801207302045"},{"key":"e_1_3_2_1_71_1","volume-title":"Coercive control: The entrapment of women in personal life","author":"Stark E.","unstructured":"Stark , E. , 2009. Coercive control: The entrapment of women in personal life . Oxford University Press . Stark, E., 2009. Coercive control: The entrapment of women in personal life. Oxford University Press."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801218816191"},{"key":"e_1_3_2_1_73_1","unstructured":"Tanczer L. Neira I.L. Parkin S. Patel T. and Danezis G. 2018. Gender and IoT Research Report. University College London  Tanczer L. Neira I.L. Parkin S. Patel T. and Danezis G. 2018. Gender and IoT Research Report. University College London"},{"key":"e_1_3_2_1_74_1","unstructured":"Tene O. and Polonetsky J. 2013. A Theory of Creepy: Technology Privacy and Shifting Social Norms. Yale J Law & Tech 16(2013-2014) 59-102.  Tene O. and Polonetsky J. 2013. A Theory of Creepy: Technology Privacy and Shifting Social Norms. Yale J Law & Tech 16(2013-2014) 59-102."},{"key":"e_1_3_2_1_75_1","unstructured":"Thompson T. Benz J. and Agiesta J. 2013. The Digital Abuse Study: Experiences of Teens and Young Adults.  Thompson T. Benz J. and Agiesta J. 2013. The Digital Abuse Study: Experiences of Teens and Young Adults."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1891\/0886-6708.4.3.159"},{"key":"e_1_3_2_1_77_1","unstructured":"Toohey P. 2014. Jealousy. Yale University Press.  Toohey P. 2014. Jealousy. Yale University Press."},{"key":"e_1_3_2_1_78_1","unstructured":"UN Broadband Commission 2015. Cyberviolence Against Women and Girls: A Worldwide Wakeup Call. https:\/\/www.unwomen.org\/\u223c\/media\/headquarters\/attachments\/sections\/library\/publications\/2015\/cyber_violence_gender%20report.pdf.  UN Broadband Commission 2015. Cyberviolence Against Women and Girls: A Worldwide Wakeup Call. https:\/\/www.unwomen.org\/\u223c\/media\/headquarters\/attachments\/sections\/library\/publications\/2015\/cyber_violence_gender%20report.pdf."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632107"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1049\/et.2018.0603"},{"key":"e_1_3_2_1_81_1","volume-title":"The Guardian","author":"Vlahos J.","year":"2019","unstructured":"Vlahos , J. , 2019. Smart talking: are our devices threatening our privacy? , The Guardian . Guardian Media Ltd ., London UK, https:\/\/www.theguardian.com\/technology\/ 2019 \/mar\/26\/smart-talking-are-our-devices-threatening-our-privacy. Vlahos, J., 2019. Smart talking: are our devices threatening our privacy?, The Guardian. Guardian Media Ltd., London UK, https:\/\/www.theguardian.com\/technology\/2019\/mar\/26\/smart-talking-are-our-devices-threatening-our-privacy."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858458"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091489"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.07.002"},{"key":"e_1_3_2_1_85_1","unstructured":"Williams C. 2018. Coercive Control: Should Canada Do More to Protect Victims of Domestic Abuse? Robson Crim Legal Blog. https:\/\/www.robsoncrim.com\/single-post\/2018\/01\/11\/Coercive-Control-Should-Canada-Do-More-to-Protect-Victims-of-Domestic-Abuse  Williams C. 2018. Coercive Control: Should Canada Do More to Protect Victims of Domestic Abuse? Robson Crim Legal Blog. https:\/\/www.robsoncrim.com\/single-post\/2018\/01\/11\/Coercive-Control-Should-Canada-Do-More-to-Protect-Victims-of-Domestic-Abuse"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300492"},{"key":"e_1_3_2_1_87_1","volume-title":"Technology-facilitated Stalking: Findings and Recommendations from the SmartSafe Project","author":"Woodlock D.","year":"2013","unstructured":"Woodlock , D. , 2013 . Technology-facilitated Stalking: Findings and Recommendations from the SmartSafe Project . Domestic Violence Resource Centre Victoria http:\/\/www.dvrcv.org.au\/sites\/default\/files\/SmartSafe_0.pdf. Woodlock, D., 2013. Technology-facilitated Stalking: Findings and Recommendations from the SmartSafe Project. Domestic Violence Resource Centre Victoria http:\/\/www.dvrcv.org.au\/sites\/default\/files\/SmartSafe_0.pdf."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173693"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_3_2_1_90_1","first-page":"65","volume-title":"Proc. SOUPS 17 (Santa Clara CA)","author":"Zeng E.","unstructured":"Zeng , E. , Mare , S. , and Roesner , F ., 2017. End user security and privacy concerns with smart homes . In Proc. SOUPS 17 (Santa Clara CA) , Usenix, Berkeley, CA , 65 - 80 . Zeng, E., Mare, S., and Roesner, F., 2017. End user security and privacy concerns with smart homes. In Proc. SOUPS 17 (Santa Clara CA), Usenix, Berkeley, CA, 65-80."}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445114","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:30Z","timestamp":1750195710000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":90,"alternative-id":["10.1145\/3411764.3445114","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445114","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}