{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:12:33Z","timestamp":1776121953672,"version":"3.50.1"},"reference-count":230,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2206950"],"award-info":[{"award-number":["CNS-2206950"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2024,11,7]]},"abstract":"<jats:p>\n            People are increasingly introduced to each other\n            <jats:italic toggle=\"yes\">offline<\/jats:italic>\n            thanks to\n            <jats:italic toggle=\"yes\">online<\/jats:italic>\n            platforms that make algorithmically-mediated introductions between their users. Such platforms include dating apps (e.g., Tinder) and in-person gig work websites (e.g., TaskRabbit, Care.com). Protecting the users of these online-offline systems requires answering calls from prior work to consider 'post-digital' orientations of safety: shifting from traditional technological security thinking to consider algorithm-driven consequences that emerge throughout online and offline contexts rather than solely acknowledging online threats. To support post-digital safety in platforms that make algorithmically-mediated offline introductions (AMOIs), we apply a mixed-methods approach to identify the core harms that AMOI users experience, the protective safety behaviors they employ, and the prevalence of those behaviors. First, we systematically review existing work (n=93), synthesizing the harms that threaten AMOIs and the protective behaviors people employ to combat these harms. Second, we validate prior work and fill gaps left by primarily qualitative inquiry through a survey of respondents' definitions of safety in AMOI and the prevalence and implementation of their protective behaviors. We focus on two exemplar populations who engage in AMOIs: online daters (n=476) and in-person gig workers (n=451). We draw on our systematization and prevalence data to identify several directions for designers and researchers to reimagine defensive tools to support safety in AMOIs.\n          <\/jats:p>","DOI":"10.1145\/3686948","type":"journal-article","created":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T15:52:40Z","timestamp":1731081160000},"page":"1-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Safer Algorithmically-Mediated Offline Introductions: Harms and Protective Behaviors"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6658-2213","authenticated-orcid":false,"given":"Veronica A.","family":"Rivera","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4611-3030","authenticated-orcid":false,"given":"Daricia","family":"Wilkinson","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3525-7784","authenticated-orcid":false,"given":"Aurelia","family":"Augusta","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Software Systems, Saarbrucken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5301-4594","authenticated-orcid":false,"given":"Sophie","family":"Li","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Software Systems, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3930-8128","authenticated-orcid":false,"given":"Elissa M.","family":"Redmiles","sequence":"additional","affiliation":[{"name":"Georgetown University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0334-0097","authenticated-orcid":false,"given":"Angelika","family":"Strohmayer","sequence":"additional","affiliation":[{"name":"Northumbria University, Newcastle upon Tyne, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,11,8]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"1084","article-title":"FOSTA in legal context","volume":"52","author":"Albert Kendra","year":"2020","unstructured":"Kendra Albert, Emily Armbruster, Elizabeth Brundige, Elizabeth Denning, Kimberly Kim, Lorelei Lee, Lindsey Ruff, Korica Simon, and Yueyu Yang. 2020. FOSTA in legal context. Columbia Human Rights Law Review, Vol. 52 (2020), 1084.","journal-title":"Columbia Human Rights Law Review"},{"key":"e_1_2_1_2_1","volume-title":"Collective Information Security in Large-Scale Urban Protests: The Case of Hong Kong. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Albrecht Martin R","year":"2021","unstructured":"Martin R Albrecht, Jorge Blasco, Rikke Bjerg Jensen, and Lenka Marekov\u00e1. 2021. Collective Information Security in Large-Scale Urban Protests: The Case of Hong Kong. In 30th USENIX Security Symposium (USENIX Security 21). 3363--3380."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305116672887"},{"key":"e_1_2_1_4_1","volume-title":"risk and wellbeing on dating apps: Final report. Report","author":"Albury Kath","unstructured":"Kath Albury, Paul Byron, Anthony McCosker, Tinonee Pym, Jarrod Walshe, Kane Race, Doreen Salon, Tim Wark, Jessica Botfield, Daniel Reeders, and Christopher Dietzel. 2019. Safety, risk and wellbeing on dating apps: Final report. Report. Swinburne University of Technology. https:\/\/apo.org.au\/node\/268156"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/14461242.2020.1777885"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3567559"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359319"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2701149"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432949"},{"key":"e_1_2_1_10_1","unstructured":"Kofi Annan. 2001. Definitions of human security. https:\/\/www.gdrc.org\/."},{"key":"e_1_2_1_11_1","unstructured":"Avi Asher-Schapiro. 2022. U.S. gig worker murders expose apps' safety gaps says labor group. https:\/\/news.trust.org\/item\/20220406101735-ixk5v\/."},{"key":"e_1_2_1_12_1","first-page":"523","article-title":"Outed by Advertisements: How LGBTQ Internet Users Present a Case for Federal Data Privacy Legislation","volume":"99","author":"Ashman Noah","year":"2020","unstructured":"Noah Ashman. 2020. Outed by Advertisements: How LGBTQ Internet Users Present a Case for Federal Data Privacy Legislation. Or. L. Rev., Vol. 99 (2020), 523.","journal-title":"Or. L. Rev."},{"key":"e_1_2_1_13_1","unstructured":"Australia eSafety Commissioner. 2021. Principles and background. https:\/\/www.esafety.gov.au\/industry\/safety-by-design\/principles-and-background. (Accessed on 07\/17\/2023)."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v16i1.19268"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00247"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445378"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243916656059"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14197\/atr.201220148"},{"key":"e_1_2_1_19_1","unstructured":"Danielle Blunt Ariel Wolf Emily Coombes and Shanelle Mullin. 2020. Posting into the void: Studying the impact of shadowbanning on sex workers and activists. https:\/\/hackinghustling.org\/posting-into-the-void-content-moderation\/."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106779"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864382"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.198"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/23268743.2021.1993972"},{"key":"e_1_2_1_25_1","volume-title":"At least 50 people have been killed doing gig driving since","author":"Browning Kellen","year":"2017","unstructured":"Kellen Browning. 2022. At least 50 people have been killed doing gig driving since 2017, report says. https:\/\/www.nytimes.com\/2022\/04\/06\/business\/uber-lyft-driver-deaths.html."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814542311"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462204.3481751"},{"key":"e_1_2_1_28_1","unstructured":"United States Census Bureau. 2020. 2020 Census Demographic Profile. https:\/\/www.census.gov\/data\/tables\/2023\/dec\/2020-census-demographic-profile.html#data."},{"key":"e_1_2_1_29_1","volume-title":"How the machine 'thinks': Understanding opacity in machine learning algorithms. Big data & society","author":"Burrell Jenna","year":"2016","unstructured":"Jenna Burrell. 2016. How the machine 'thinks': Understanding opacity in machine learning algorithms. Big data & society, Vol. 3, 1 (2016), 2053951715622512."},{"key":"e_1_2_1_30_1","first-page":"337","article-title":"Aligned: Sex Workers' Lessons for the Gig Economy","volume":"26","author":"Butler Yvette","year":"2020","unstructured":"Yvette Butler. 2020. Aligned: Sex Workers' Lessons for the Gig Economy. Michigan Journal of Race & Law, Vol. 26 (2020), 337.","journal-title":"Michigan Journal of Race & Law"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/0004865814521224"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1037\/apl0000993"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2019.01.001"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/1440783319833181"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2006.9.54"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819963"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00061"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517475"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/1079063216672168"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jth.2019.02.007"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11186-020-09411-3"},{"key":"e_1_2_1_42_1","first-page":"793","article-title":"Privacy harms","volume":"102","author":"Citron Danielle Keats","year":"2022","unstructured":"Danielle Keats Citron and Daniel J Solove. 2022. Privacy harms. BUL Rev., Vol. 102 (2022), 793.","journal-title":"BUL Rev."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052592"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376214"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0027"},{"key":"e_1_2_1_46_1","unstructured":"Larry Conklin. 2024. Threat Modeling Process. https:\/\/owasp.org\/www-community\/Threat_Modeling_Process."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1177\/1363460702005003001"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1080\/13698570701488936"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1080\/13698575.2012.720964"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485252"},{"key":"e_1_2_1_51_1","unstructured":"Maria Dinzeo. 2018. Ninth Circuit Takes New Look at Duty to Warn in Match Gone Bad. https:\/\/www.courthousenews.com\/ninth-circuit-takes-new-look-at-duty-to-warn-in-match-gone-bad\/. (Accessed on 07\/16\/2023)."},{"key":"e_1_2_1_52_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"5","author":"Doerfler Periwinkle","year":"2021","unstructured":"Periwinkle Doerfler, Andrea Forte, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn, and Damon McCoy. 2021. \u201cI'm a Professor, which isn't usually a dangerous job\u201d: Internet-facilitated Harassment and Its Impact on Researchers. Proceedings of the ACM on Human-Computer Interaction, Vol. 5, CSCW2 (2021), 1--32."},{"key":"e_1_2_1_53_1","volume-title":"He has a way gayer Facebook than I do\u201d: Investigating sexual identity disclosure and context collapse on a social networking site. New media & society","author":"Duguay Stefanie","year":"2016","unstructured":"Stefanie Duguay. 2016. \u201cHe has a way gayer Facebook than I do\u201d: Investigating sexual identity disclosure and context collapse on a social networking site. New media & society, Vol. 18, 6 (2016), 891--907."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1177\/1354856518781530"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415226"},{"key":"e_1_2_1_56_1","unstructured":"Josh Dzieza. 2021. Revolt of the Delivery Workers. https:\/\/www.curbed.com\/article\/nyc-delivery-workers.html."},{"key":"e_1_2_1_57_1","volume-title":"Profile as promise: A framework for conceptualizing veracity in online dating self-presentations. New media & society","author":"Ellison Nicole B","year":"2012","unstructured":"Nicole B Ellison, Jeffrey T Hancock, and Catalina L Toma. 2012. Profile as promise: A framework for conceptualizing veracity in online dating self-presentations. New media & society, Vol. 14, 1 (2012), 45--62."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432933"},{"key":"e_1_2_1_59_1","unstructured":"Australia eSafety Commissioner. 2024. eSafety Commissioner. https:\/\/www.esafety.gov.au\/."},{"key":"e_1_2_1_60_1","volume-title":"Gender, Sex, and Politics","author":"Fairchild Kimberly","unstructured":"Kimberly Fairchild. 2015. \u201cBut look at what she was wearing!\u201d: Victim blaming and street harassment. In Gender, Sex, and Politics. Routledge, 22--32."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359328"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77392-2_10"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.14763\/2021.2.1559"},{"key":"e_1_2_1_64_1","volume-title":"Sexual violence and abuse in online dating: A scoping review. Aggression and violent behavior","author":"Filice Eric","year":"2022","unstructured":"Eric Filice, Kavishka D Abeywickrama, Diana C Parry, and Corey W Johnson. 2022. Sexual violence and abuse in online dating: A scoping review. Aggression and violent behavior, Vol. 67 (2022), 101781."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1177\/1529100612436522"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_2_1_67_1","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS","author":"Gallardo Andrea","year":"2022","unstructured":"Andrea Gallardo, Hanseul Kim, Tianying Li, Lujo Bauer, and Lorrie Cranor. 2022. Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and Obstacles. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). 291--312."},{"key":"e_1_2_1_68_1","first-page":"501","article-title":"Section 230 of the Communications Decency Act, Product Liability, and a Proposal for Preventing Dating-App Harassment","volume":"125","author":"Geary Kira M","year":"2020","unstructured":"Kira M Geary. 2020. Section 230 of the Communications Decency Act, Product Liability, and a Proposal for Preventing Dating-App Harassment. Penn St. L. Rev., Vol. 125 (2020), 501.","journal-title":"Penn St. L. Rev."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650210377091"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1089\/jwh.2018.7191"},{"key":"e_1_2_1_71_1","unstructured":"Eden Gillespie and Tamsin Rose. 2022. Call for dating apps to require criminal checks as Australian government plans summit on safety | Australian police and policing. https:\/\/www.theguardian.com\/australia-news\/2022\/dec\/24\/call-for-dating-apps-to-require-criminal-checks-as-australian-government-plans-summit-on-safety. (Accessed on 07\/16\/2023)."},{"key":"e_1_2_1_72_1","volume-title":"Women's Studies International Forum","author":"Gillett Rosalie","unstructured":"Rosalie Gillett. 2018. Intimate intrusions online: Studying the normalisation of abuse in dating apps. In Women's Studies International Forum, Vol. 69. Elsevier, 212--219."},{"key":"e_1_2_1_73_1","first-page":"1","article-title":"This is not a nice safe space\u201d: Investigating women's safety work on Tinder","volume":"23","author":"Gillett Rosalie","year":"2021","unstructured":"Rosalie Gillett. 2021. \u201cThis is not a nice safe space\u201d: Investigating women's safety work on Tinder. Feminist Media Studies, Vol. 23, 1 (2021), 1--17.","journal-title":"Feminist Media Studies"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12889-015-2191-6"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1177\/07308884211024711"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1177\/1024258916687250"},{"key":"e_1_2_1_77_1","volume-title":"Ghost work: How to stop Silicon Valley from building a new global underclass","author":"Gray Mary L","unstructured":"Mary L Gray and Siddharth Suri. 2019. Ghost work: How to stop Silicon Valley from building a new global underclass. Eamon Dolan Books."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2014.11.013"},{"key":"e_1_2_1_79_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Guo Cheng","year":"2021","unstructured":"Cheng Guo, Brianne Campbell, Apu Kapadia, Michael K Reiter, and Kelly Caine. 2021. Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication. In 30th USENIX Security Symposium (USENIX Security 21). 1--18."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392561.3394635"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415195"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376669"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555650"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12119-020-09758-w"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azy052"},{"key":"e_1_2_1_86_1","volume-title":"Human rights and the Internet","author":"Hick Steven","unstructured":"Steven Hick, Edward Halpin, and Eric Hoskins. 2016. Human rights and the Internet. Springer."},{"key":"e_1_2_1_87_1","unstructured":"Kashmir Hill. 2020. I Tried to Live Without the Tech Giants. It was Impossible. https:\/\/www.nytimes.com\/2020\/07\/31\/technology\/blocking-the-tech-giants.html."},{"key":"e_1_2_1_88_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Ho Grant","year":"2019","unstructured":"Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M Voelker, and David Wagner. 2019. Detecting and characterizing lateral phishing at scale. In 28th USENIX Security Symposium (USENIX Security 19). 1273--1290."},{"key":"e_1_2_1_89_1","volume-title":"Contextual Design: Defining Customer-centered Systems","author":"Holtzblatt Karen","year":"1997","unstructured":"Karen Holtzblatt and Hugh Beyer. 1997. Contextual Design: Defining Customer-centered Systems. Elsevier."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3310430"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274340"},{"key":"e_1_2_1_92_1","unstructured":"Abigail Hunt Emma Samman Sherry Tapfuma Grace Mwaura Rhoda Omenya Kay Kim Sara Stevano and Aida Roumer. 2019. Women in the gig economy: Paid work care and flexibility in Kenya and South Africa. Technical Report. ODI. https:\/\/odi.org\/en\/publications\/women-in-the-gig-economy-paid-work-care-and-flexibility-in-kenya-and-south-africa\/"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15742-5_55"},{"key":"e_1_2_1_94_1","volume-title":"Sarah Beth Nelson, and Steve Sawyer","author":"Jarrahi Mohammad Hossein","year":"2020","unstructured":"Mohammad Hossein Jarrahi, Will Sutherland, Sarah Beth Nelson, and Steve Sawyer. 2020. Platformic management, boundary resources for gig work, and worker autonomy. Computer supported cooperative work (CSCW), Vol. 29, 1 (2020), 153--189."},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0256762"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.3389\/fcomm.2023.1089335"},{"key":"e_1_2_1_97_1","volume-title":"Digital technology and the safety of women and girls in urban space: Personal safety Apps or crowd-sourced activism tools? In Architecture and Feminisms","author":"Kalms Nicole","unstructured":"Nicole Kalms. 2017. Digital technology and the safety of women and girls in urban space: Personal safety Apps or crowd-sourced activism tools? In Architecture and Feminisms. Routledge, 112--121."},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025532"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1177\/1745691610369469"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300569"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449291003611326"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13178-018-0330-4"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azab080"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833766"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702548"},{"key":"e_1_2_1_106_1","unstructured":"Rachel Lerman. 2021. Tinder's upcoming feature for singles? A criminal background check on potential dates. https:\/\/www.washingtonpost.com\/technology\/2021\/03\/16\/tinder-match-background-check\/."},{"key":"e_1_2_1_107_1","first-page":"1183","article-title":"Designing against discrimination in online markets","volume":"32","author":"Levy Karen","year":"2017","unstructured":"Karen Levy and Solon Barocas. 2017. Designing against discrimination in online markets. Berkeley Technology Law Journal, Vol. 32, 3 (2017), 1183--1238.","journal-title":"Berkeley Technology Law Journal"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.5153\/sro.3781"},{"key":"e_1_2_1_109_1","volume-title":"stigma & sociotechnical design for HIV. arXiv preprint arXiv:2006.04882","author":"Liang Calvin","year":"2020","unstructured":"Calvin Liang, Jevan Hutson, and Os Keyes. 2020. Surveillance, stigma & sociotechnical design for HIV. arXiv preprint arXiv:2006.04882 (2020)."},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1177\/1536504219883848"},{"key":"e_1_2_1_111_1","volume-title":"Methodology of Longitudinal Surveys","author":"Lynn Peter","unstructured":"Peter Lynn. 2009. Methodology of Longitudinal Surveys. Wiley Online Library."},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517524"},{"key":"e_1_2_1_113_1","volume-title":"Woon Kian Chong, and Linpei Song","author":"Ma Zhuang","year":"2022","unstructured":"Zhuang Ma, Woon Kian Chong, and Linpei Song. 2022. How Arousing Benefits and Ethical Misgivings Affect AI-Based Dating App Adoption: The Roles of Perceived Autonomy and Perceived Risks. In International Conference on Human-Computer Interaction. Springer, 160--170."},{"key":"e_1_2_1_114_1","first-page":"18","article-title":"Platform design as a managerial act: Analyzing sexual harassment in the gig economy","volume":"23","author":"Maffie Michael","year":"2019","unstructured":"Michael Maffie and Allison Elias. 2019. Platform design as a managerial act: Analyzing sexual harassment in the gig economy. LERA For Libraries, Vol. 23, 2 (2019), 18--23.","journal-title":"LERA For Libraries"},{"key":"e_1_2_1_115_1","first-page":"29","article-title":"A mobile based women safety application (I Safe Apps)","volume":"17","author":"Mandapati Sridhar","year":"2015","unstructured":"Sridhar Mandapati, Sravya Pamidi, and Sriharitha Ambati. 2015. A mobile based women safety application (I Safe Apps). IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 17, 1 (2015), 29--34.","journal-title":"IOSR Journal of Computer Engineering (IOSR-JCE)"},{"key":"e_1_2_1_116_1","volume-title":"The Private is Political: Networked Privacy and Social Media","author":"Marwick Alice E.","unstructured":"Alice E. Marwick. 2023. The Private is Political: Networked Privacy and Social Media. Yale University Press."},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702417"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1080\/17458927.2020.1852722"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0054346"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025875"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801219832124"},{"key":"e_1_2_1_122_1","first-page":"257","article-title":"Underreporting of violence to police among women sex workers in Canada: Amplified inequities for im\/migrant and in-call workers prior to and following end-demand legislation","volume":"22","author":"McBride Bronwyn","year":"2020","unstructured":"Bronwyn McBride, Kate Shannon, Brittany Bingham, Melissa Braschel, Steffanie Strathdee, and Shira M Goldenberg. 2020. Underreporting of violence to police among women sex workers in Canada: Amplified inequities for im\/migrant and in-call workers prior to and following end-demand legislation. Health and Human Rights, Vol. 22, 2 (2020), 257.","journal-title":"Health and Human Rights"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1080\/13691058.2020.1767305"},{"key":"e_1_2_1_124_1","volume-title":"Practices Online. In 30th USENIX Security Symposium (USENIX Security 21)","author":"McDonald Allison","year":"2021","unstructured":"Allison McDonald, Catherine Barwulor, Michelle L Mazurek, Florian Schaub, and Elissa M Redmiles. 2021. \u201cIt's stressful having all these phones\u201d: Investigating Sex Workers' Safety Goals, Risks, and Practices Online. In 30th USENIX Security Symposium (USENIX Security 21). 375--392."},{"key":"e_1_2_1_125_1","unstructured":"Metropolitan Police. n.d.. Request information under Clare's Law: Make a Domestic Violence Disclosure Scheme (DVDS) application. https:\/\/www.met.police.uk\/advice\/advice-and-information\/daa\/domestic-abuse\/alpha2\/request-information-under-clares-law\/. (Accessed on 08\/31\/2022)."},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1177\/0896920520949631"},{"key":"e_1_2_1_127_1","volume-title":"Proc. of USENIX Security.","author":"Mink Jaron","year":"2022","unstructured":"Jaron Mink, Licheng Luo, Nat a M Barbosa, Olivia Figueira, Yang Wang, and Gang Wang. 2022. DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks. In Proc. of USENIX Security."},{"key":"e_1_2_1_128_1","unstructured":"Eva Moog. 2021. Design for Safety. A Book Apart."},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13178-021-00603-9"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--65828--1_3"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1080\/09585192.2020.1867612"},{"key":"e_1_2_1_132_1","unstructured":"National Sex Offender Database. n.d.. Keeping Children Safe from Sexual Offenders. https:\/\/www.meganslaw.com\/. (Accessed on 08\/31\/2022)."},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1891\/VV-D-19-00173"},{"key":"e_1_2_1_134_1","volume-title":"User Security Strategies for Online Dating. In Workshop on Usable Security (USEC).","author":"Obada-Obieh Borke","year":"2017","unstructured":"Borke Obada-Obieh, Sonia Chiasson, and Anil Somayaji. 2017. \u201cDon't Break My Heart!\u201d: User Security Strategies for Online Dating. In Workshop on Usable Security (USEC)."},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1486870"},{"key":"e_1_2_1_136_1","unstructured":"UN Office of the High Commissioner. 2017. UN experts urge States and companies to address online gender-based abuse but warn against censorship. https:\/\/www.ohchr.org\/EN\/NewsEvents\/Pages\/DisplayNews.aspx?NewsID=21317"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1080\/15332985.2020.1845281"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-03-2017-0123"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957297"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1080\/17544750.2022.2052130"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.4000\/ejas.16587"},{"key":"e_1_2_1_142_1","volume-title":"Threaten me softly: A review of potential dating app risks. Computers in human behavior reports","author":"Phan Anh","year":"2021","unstructured":"Anh Phan, Kathryn Seigfried-Spellar, and Kim-Kwang Raymond Choo. 2021. Threaten me softly: A review of potential dating app risks. Computers in human behavior reports, Vol. 3 (2021), 100055."},{"key":"e_1_2_1_143_1","first-page":"1","article-title":"Mobile dating applications and sexual and violent offending","volume":"612","author":"Pooley Kamarah","year":"2020","unstructured":"Kamarah Pooley and Hayley Boxall. 2020. Mobile dating applications and sexual and violent offending. Trends and Issues in Crime and Criminal Justice 612 (2020), 1--16.","journal-title":"Trends and Issues in Crime and Criminal Justice"},{"key":"e_1_2_1_144_1","volume-title":"Maslow's hierarchy of needs. The surgical technologist","author":"Poston Bob","year":"2009","unstructured":"Bob Poston. 2009. Maslow's hierarchy of needs. The surgical technologist, Vol. 41, 8 (2009), 347--353."},{"key":"e_1_2_1_145_1","volume-title":"International Journal of Communication","volume":"14","author":"Pruchniewska Urszula","year":"2020","unstructured":"Urszula Pruchniewska. 2020. \u201cI Like That It's My Choice a Couple Different Times\u201d: Gender, Affordances, and User Experience on Bumble Dating. International Journal of Communication, Vol. 14 (April 2020), 18. https:\/\/ijoc.org\/index.php\/ijoc\/article\/view\/12657"},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1177\/1367877920959332"},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335364"},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1177\/2050157916664559"},{"key":"e_1_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820026"},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1177\/14614448221099223"},{"key":"e_1_2_1_151_1","unstructured":"Elissa M Redmiles Yasemin Acar Sascha Fahl and Michelle L Mazurek. 2017. A summary of survey methodology best practices for security and privacy researchers. Technical Report. University of Maryland."},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v13i01.3356"},{"key":"e_1_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2007.10.003"},{"key":"e_1_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12024-019-00201-7"},{"key":"e_1_2_1_155_1","volume-title":"Glitch feminism: A manifesto","author":"Russell Legacy","year":"2020","unstructured":"Legacy Russell. 2020. Glitch feminism: A manifesto. London: Verso, Vol. 11 (2020), 29--29."},{"key":"e_1_2_1_156_1","volume-title":"Designing out vulnerability, building in respect: violence, safety and sex work policy. The British journal of sociology","author":"Sanders Teela","year":"2007","unstructured":"Teela Sanders and Rosie Campbell. 2007. Designing out vulnerability, building in respect: violence, safety and sex work policy. The British journal of sociology, Vol. 58, 1 (2007), 1--19."},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173626"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188511"},{"key":"e_1_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300512"},{"key":"e_1_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555755"},{"key":"e_1_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502083"},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274424"},{"key":"e_1_2_1_163_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479512"},{"key":"e_1_2_1_164_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449138"},{"key":"e_1_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818792425"},{"key":"e_1_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1177\/0265407518822780"},{"key":"e_1_2_1_167_1","volume-title":"Threat Modeling: Designing for Security","author":"Shostack Adam","year":"2014","unstructured":"Adam Shostack. 2014. Threat Modeling: Designing for Security. John Wiley & Sons."},{"key":"e_1_2_1_168_1","volume-title":"SCSM 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19--24, 2020, Proceedings, Part I 22","author":"Simmons Mariah","year":"2020","unstructured":"Mariah Simmons and Joon Suk Lee. 2020. Catfishing: a look into online dating and impersonation. In Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis: 12th International Conference, SCSM 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19--24, 2020, Proceedings, Part I 22. Springer, 349--358."},{"key":"e_1_2_1_169_1","volume-title":"The Emerald International Handbook of Technology-Facilitated Violence and Abuse","author":"Slupska Julia","unstructured":"Julia Slupska and Leonie Maria Tanczer. 2021. Threat modeling intimate partner violence: Tech abuse as a cybersecurity challenge in the Internet of Things. In The Emerald International Handbook of Technology-Facilitated Violence and Abuse. Emerald Publishing Limited."},{"key":"e_1_2_1_170_1","volume-title":"Police Say. The New York Times","author":"Southall Ashley","year":"2018","unstructured":"Ashley Southall. 2018. He Used Tinder to Hunt the Women He Raped and Killed, Police Say. The New York Times (2018)."},{"key":"e_1_2_1_171_1","volume-title":"The Meanings of Violence","author":"Stanko Elizabeth Anne","unstructured":"Elizabeth Anne Stanko. 2003. The Meanings of Violence. Routledge London."},{"key":"e_1_2_1_172_1","volume-title":"Media, Culture","author":"Stardust Zahra","year":"2022","unstructured":"Zahra Stardust, Rosalie Gillett, and Kath Albury. 2022. Surveillance does not equal safety: Police, data and consent on dating apps. Crime, Media, Culture (2022), 17416590221111827."},{"key":"e_1_2_1_173_1","doi-asserted-by":"publisher","DOI":"10.5204\/ijcjsd.1894"},{"key":"e_1_2_1_174_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581114"},{"key":"e_1_2_1_175_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Stevens Rock","year":"2018","unstructured":"Rock Stevens, Daniel Votipka, Elissa M Redmiles, Colin Ahern, Patrick Sweeney, and Michelle L Mazurek. 2018. The battle for New York: A case study of applied digital threat modeling at the enterprise level. In 27th USENIX Security Symposium (USENIX Security 18). 621--637."},{"key":"e_1_2_1_176_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS52396.2021.00081"},{"key":"e_1_2_1_177_1","doi-asserted-by":"publisher","DOI":"10.14763\/2022.1.1634"},{"key":"e_1_2_1_178_1","volume-title":"Safety as a Grand Challenge in Pervasive Computing: Using Feminist Epistemologies to Shift the Paradigm From Security to Safety","author":"Strohmayer Angelika","year":"2022","unstructured":"Angelika Strohmayer, Rosanna Bellini, and Julia Slupska. 2022. Safety as a Grand Challenge in Pervasive Computing: Using Feminist Epistemologies to Shift the Paradigm From Security to Safety. IEEE Pervasive Computing (2022)."},{"key":"e_1_2_1_179_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300882"},{"key":"e_1_2_1_180_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025615"},{"key":"e_1_2_1_181_1","volume-title":"Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions","author":"Strohmayer Angelika","unstructured":"Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, and Adam Dodge. 2021. Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions. Northumbria University."},{"key":"e_1_2_1_182_1","doi-asserted-by":"publisher","DOI":"10.1080\/01490400.2020.1712277"},{"key":"e_1_2_1_183_1","volume-title":"Victimology","author":"Sugiura Lisa","unstructured":"Lisa Sugiura and April Smith. 2020. Victim blaming, responsibilization and resilience in online sexual abuse and harassment. In Victimology. Springer, 45--79."},{"key":"e_1_2_1_184_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462204.3483281"},{"key":"e_1_2_1_185_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675278"},{"key":"e_1_2_1_186_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00028"},{"key":"e_1_2_1_187_1","volume-title":"Understanding How Creators Experience and Cope with Hate and Harassment Online. In CHI Conference on Human Factors in Computing Systems. 1--15","author":"Thomas Kurt","year":"2022","unstructured":"Kurt Thomas, Patrick Gage Kelley, Sunny Consolvo, Patrawat Samermit, and Elie Bursztein. 2022. \u201cIt's common and a part of being a content creator\u201d: Understanding How Creators Experience and Cope with Hate and Harassment Online. In CHI Conference on Human Factors in Computing Systems. 1--15."},{"key":"e_1_2_1_188_1","volume-title":"Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In 22nd USENIX Security Symposium (USENIX Security 13)","author":"Thomas Kurt","year":"2013","unstructured":"Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, and Vern Paxson. 2013. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In 22nd USENIX Security Symposium (USENIX Security 13). 195--210."},{"key":"e_1_2_1_189_1","unstructured":"ThreatModeler. 2019. How to Process Flow Diagram for Threat Modeling. https:\/\/threatmodeler.com\/how-to-process-flow-diagram-for-threat-modeling\/."},{"key":"e_1_2_1_190_1","first-page":"3","article-title":"Behind closed doors: An analysis of indoor sex work in New York City","volume":"33","author":"Thukral Juhu","year":"2005","unstructured":"Juhu Thukral. 2005. Behind closed doors: An analysis of indoor sex work in New York City. Siecus Report, Vol. 33, 2 (2005), 3.","journal-title":"Siecus Report"},{"key":"e_1_2_1_191_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2015.1012531"},{"key":"e_1_2_1_192_1","doi-asserted-by":"publisher","DOI":"10.1177\/14614448221099233"},{"key":"e_1_2_1_193_1","volume-title":"How Domestic Workers Wager Safety in the Platform Economy","author":"Ticona Julia","year":"2018","unstructured":"Julia Ticona and Alexandra Mateescu. 2018. How Domestic Workers Wager Safety in the Platform Economy. Fast Company (2018). https:\/\/www.fastcompany.com\/40541050\/how-domestic-workers-wager-safety-in-the-platform-economy"},{"key":"e_1_2_1_194_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818773727"},{"key":"e_1_2_1_195_1","unstructured":"Julia Ticona Alexandra Mateescu and Alex Rosenblat. 2018. Beyond disruption: How tech shapes labor across domestic work and ridehailing. Technical Report."},{"key":"e_1_2_1_196_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650209356437"},{"key":"e_1_2_1_197_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167208318067"},{"key":"e_1_2_1_198_1","doi-asserted-by":"publisher","DOI":"10.1097\/JOM.0000000000000977"},{"key":"e_1_2_1_199_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Tseng Emily","year":"2020","unstructured":"Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2020. The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums. In 29th USENIX Security Symposium (USENIX Security 20). 1893--1909."},{"key":"e_1_2_1_200_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445589"},{"key":"e_1_2_1_201_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Tu Huahong","year":"2019","unstructured":"Huahong Tu, Adam Doup\u00e9, Ziming Zhao, and Gail-Joon Ahn. 2019. Users really do answer telephone scams. In 28th USENIX Security Symposium (USENIX Security 19). 1327--1340."},{"key":"e_1_2_1_202_1","volume-title":"Unofficial Reporting in the #MeToo Era Law in the Era of #MeToo","author":"Tuerkheimer Deborah","year":"2019","unstructured":"Deborah Tuerkheimer. 2019. Unofficial Reporting in the #MeToo Era Law in the Era of #MeToo. University of Chicago Legal Forum, Vol. 2019 (2019), 273--298. https:\/\/heinonline.org\/HOL\/P?h=hein.journals\/uchclf2019&i=277"},{"key":"e_1_2_1_203_1","unstructured":"Zeynep Tufekci. 2017. Security in the Wild for Low-Profile Activists. https:\/\/www.usenix.org\/conference\/enigma2017\/conference-program\/presentation\/tufekci."},{"key":"e_1_2_1_204_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636070"},{"key":"e_1_2_1_205_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS). 22--24","author":"Vitak Jessica","year":"2015","unstructured":"Jessica Vitak. 2015. Balancing privacy concerns and impression management strategies on Facebook. In Symposium on Usable Privacy and Security (SOUPS). 22--24."},{"key":"e_1_2_1_206_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998337"},{"key":"e_1_2_1_207_1","unstructured":"Stephen Walcott. 2020. Victimisation and Fear of Crime in the Gig Economy. Technical Report. The Police Foundation."},{"key":"e_1_2_1_208_1","doi-asserted-by":"publisher","DOI":"10.1080\/09585192.2021.1914129"},{"key":"e_1_2_1_209_1","doi-asserted-by":"publisher","DOI":"10.1017\/lsi.2018.29"},{"key":"e_1_2_1_210_1","volume-title":"The Emerald international handbook of technology-facilitated violence and abuse","author":"Waldman Ari Ezra","unstructured":"Ari Ezra Waldman. 2021. Navigating Privacy on Gay-Oriented Mobile Dating Applications. In The Emerald international handbook of technology-facilitated violence and abuse. Emerald Publishing Limited, 369--381."},{"key":"e_1_2_1_211_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Wang Gang","year":"2014","unstructured":"Gang Wang, Tianyi Wang, Haitao Zheng, and Ben Y Zhao. 2014. Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers. In 23rd USENIX Security Symposium (USENIX Security 14). 239--254."},{"key":"e_1_2_1_212_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833643"},{"key":"e_1_2_1_213_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274450"},{"key":"e_1_2_1_214_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376150"},{"key":"e_1_2_1_215_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300922"},{"key":"e_1_2_1_216_1","doi-asserted-by":"publisher","DOI":"10.1177\/14614448221099229"},{"key":"e_1_2_1_217_1","doi-asserted-by":"publisher","DOI":"10.1177\/1748895815603773"},{"key":"e_1_2_1_218_1","doi-asserted-by":"publisher","DOI":"10.2478\/nor-2021-0042"},{"key":"e_1_2_1_219_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517643"},{"key":"e_1_2_1_220_1","volume-title":"Violence, & Abuse","author":"Wood Mark A","year":"2021","unstructured":"Mark A Wood, Stuart Ross, and Diana Johns. 2021. Primary crime prevention apps: A typology and scoping review. Trauma, Violence, & Abuse (2021), 1524838020985560."},{"key":"e_1_2_1_221_1","doi-asserted-by":"publisher","DOI":"10.1177\/0887302X9601400407"},{"key":"e_1_2_1_222_1","volume-title":"SoK: Social Cybersecurity. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE","author":"Wu Yuxi","year":"2022","unstructured":"Yuxi Wu, W Keith Edwards, and Sauvik Das. 2022. SoK: Social Cybersecurity. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 1863--1879."},{"key":"e_1_2_1_223_1","volume-title":"ECIS 2013 - Proceedings of the 21st European Conference on Information Systems.","author":"Yang Shuzhe","year":"2013","unstructured":"Shuzhe Yang and Andreas Albers. 2013. Overcoming information overload in online reputation management: A systematic literature review. In ECIS 2013 - Proceedings of the 21st European Conference on Information Systems."},{"key":"e_1_2_1_224_1","unstructured":"Stella Zaryan. 2017. Truth and Trust: How audiences are making sense of Fake News. (student paper)."},{"key":"e_1_2_1_225_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501866"},{"key":"e_1_2_1_226_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3014246"},{"key":"e_1_2_1_227_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Zou Yixin","year":"2021","unstructured":"Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, and Acar Tamersoy. 2021. The role of computer security customer support in helping survivors of intimate partner violence. In 30th USENIX Security Symposium (USENIX Security 21). 429--446."},{"key":"e_1_2_1_228_1","volume-title":"Designing AI for Online-to-Offline Safety Risks with Young Women: The Context of Social Matching. arXiv preprint arXiv:2204.00688","author":"Zytko Douglas","year":"2022","unstructured":"Douglas Zytko and Hanan Aljasim. 2022. Designing AI for Online-to-Offline Safety Risks with Young Women: The Context of Social Matching. arXiv preprint arXiv:2204.00688 (2022)."},{"key":"e_1_2_1_229_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449288"},{"key":"e_1_2_1_230_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660398.2660410"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686948","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3686948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T09:24:10Z","timestamp":1755768250000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686948"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,7]]},"references-count":230,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2024,11,7]]}},"alternative-id":["10.1145\/3686948"],"URL":"https:\/\/doi.org\/10.1145\/3686948","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,7]]},"assertion":[{"value":"2024-11-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}