{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:48:06Z","timestamp":1776109686820,"version":"3.50.1"},"reference-count":120,"publisher":"Association for Computing Machinery (ACM)","issue":"7","funder":[{"name":"Office for Victims of Crime, Office of Justice Programs, U.S. Department of Justice","award":["15POVC-23-GK-01414-NONF"],"award-info":[{"award-number":["15POVC-23-GK-01414-NONF"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,10,18]]},"abstract":"<jats:p>\n            Abusers routinely use technology to spy on and harass their targets. This harmful behavior is known as\n            <jats:italic toggle=\"yes\">technology-facilitated abuse<\/jats:italic>\n            , or tech abuse. Survivors of tech abuse may turn to the legal system for safety and security, and to do so, they need evidence of tech abuse. However, prior work indicates challenges to collecting evidence of tech abuse and using it in legal proceedings. Thus, in this work, we study legal evidence used by survivors of tech abuse in Wisconsin, USA. We report on qualitative interviews and focus groups with 19 legal support providers who work with survivors seeking protective orders, divorces, and criminal charges. Our findings surface current practices that survivors and legal support providers use to prepare and present evidence of tech abuse in Wisconsin and the challenges they face. For example, survivors struggle to collect evidence of covert monitoring and surveillance. When they can collect evidence, it is often difficult to connect that evidence to the abuser due to the anonymous nature of many forms of tech abuse. In court, evidence of tech abuse is frequently challenged and vulnerable to objections and counter-evidence. And at the end of a proceeding, it's not uncommon for a judge to determine that the tech abuse does not meet the statutes. Informed by these results, we encourage CSCW and HCI researchers to work towards designing and deploying sociotechnical solutions that support survivors' use of evidence, in careful collaboration with advocates, legal experts, and survivors.\n          <\/jats:p>","DOI":"10.1145\/3757622","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T16:59:10Z","timestamp":1760633950000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Legal Evidence of Technology-Facilitated Abuse in Wisconsin: Surfacing Barriers Within and Beyond the Courtroom"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8051-0436","authenticated-orcid":false,"given":"Sophie","family":"Stephenson","sequence":"first","affiliation":[{"name":"University of Wisconsin-Madison, Madison, Wisconsin, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9581-081X","authenticated-orcid":false,"given":"Naman","family":"Gupta","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, Wisconsin, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4061-1783","authenticated-orcid":false,"given":"Akhil","family":"Polamarasetty","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3975-6828","authenticated-orcid":false,"given":"Kyle","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, Wisconsin, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3388-6150","authenticated-orcid":false,"given":"David","family":"Youssef","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, Wisconsin, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1890-8418","authenticated-orcid":false,"given":"Kayleigh","family":"Cowan","sequence":"additional","affiliation":[{"name":"Disability Rights Wisconsin, Madison, Wisconsin, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0308-8787","authenticated-orcid":false,"given":"Rahul","family":"Chatterjee","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, Wisconsin, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,16]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"[n. d.]. Population & Diversity. Data USA: Wisconsin. https:\/\/datausa.io\/profile\/geo\/wisconsin?genderResidents=sex2&pums5RacesResident=pums5Race0#demographics Accessed: 2024-2-13."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781446288719"},{"key":"e_1_2_1_3_1","unstructured":"2014. Documentation Tips for Survivors - Safety Net Project. National Network to End Domestic Violence Safety Net Project. https:\/\/www.techsafety.org\/documentationtips (Accessed on 10\/28\/2024)."},{"key":"e_1_2_1_4_1","unstructured":"2014. SAMHSA's Concept of Trauma and Guidance for a Trauma-Informed Approach. (2014)."},{"key":"e_1_2_1_5_1","unstructured":"2018. Clinic to End Tech Abuse (CETA). https:\/\/www.ceta.tech.cornell.edu\/"},{"key":"e_1_2_1_6_1","unstructured":"2018. Klobuchar Urges Departments of Justice Health and Human Services to Support Victims of Domestic Abuse in the Digital Age. U.S. Senator Amy Klobuchar. https:\/\/www.klobuchar.senate.gov\/public\/index.cfm\/2018\/7\/klobuchar-urges-departments-of-justice-health-and-human-services-to-support-victims-of-domestic-abuse-in-the-digital-age"},{"key":"e_1_2_1_7_1","unstructured":"2020. Lorena Gonzalez Announces Legislation to Protect Domestic Violence Survivors from Smart Home Technology Abuses. Assembly Democratic Caucus. https:\/\/asmdc.org\/press-releases\/lorena-gonzalez-announces-legislation-protect-domestic-violence-survivors-smart-home"},{"key":"e_1_2_1_8_1","unstructured":"2020. Rozic Announces Legislation to Protect Domestic Violence Survivors from Smart Home Technology Abuses. Nily Rozic | Assemply District 25 | Assembly Member Directory | New York State Assembly. https:\/\/nyassembly.gov\/mem\/Nily-Rozic\/story\/94199"},{"key":"e_1_2_1_9_1","volume-title":"Devastatingly pervasive: 1 in 3 women globally experience violence","year":"2021","unstructured":"2021. Devastatingly pervasive: 1 in 3 women globally experience violence. World Health Organization Joint News Release, https:\/\/www.who.int\/news\/item\/09-03-2021-devastatingly-pervasive-1-in-3-women-globally-experience-violence."},{"key":"e_1_2_1_10_1","volume-title":"Intimate Partner Violence","unstructured":"2021. Intimate Partner Violence. National Institute of Justice, https:\/\/nij.ojp.gov\/topics\/crimes\/violent-crimes\/intimate-partner-violence."},{"key":"e_1_2_1_11_1","unstructured":"2021. Klobuchar Murkowski Urge FTC to Protect Domestic Violence Victims' Information Online. U.S. Senator Amy Klobuchar. https:\/\/www.klobuchar.senate.gov\/public\/index.cfm\/2021\/3\/klobuchar-murkowski-urge-ftc-to-protect-domestic-violence-victims-information-online"},{"key":"e_1_2_1_12_1","unstructured":"2022. Bills Signed: H.R. 7132 and S. 4524. https:\/\/www.whitehouse.gov\/briefing-room\/legislation\/2022\/12\/07\/bills-signed-h-r-7132-and-s-4524\/. Accessed: 2023-10-3."},{"key":"e_1_2_1_13_1","unstructured":"2023. DocuSAFE Documentation and Evidence Collection App. National Network to End Domestic Violence (NNEDV) Safety Net Project. https:\/\/www.techsafety.org\/docusafe"},{"key":"e_1_2_1_14_1","unstructured":"2023. OurFamilyWizard - Best Co-Parenting App for Child Custody. OurFamilyWizard.com. https:\/\/www.ourfamilywizard.com\/ (Accessed on 03\/16\/2023)."},{"key":"e_1_2_1_15_1","unstructured":"2023. VictimsVoice - Giving victims a legal voice. VictimsVoice. https:\/\/victimsvoice.app\/ (Accessed on 03\/16\/2023)."},{"key":"e_1_2_1_16_1","unstructured":"2024. Accelerate justice with Cellebrite. Cellebrite. https:\/\/cellebrite.com\/en\/home\/ (Accessed on 10\/25\/2024)."},{"key":"e_1_2_1_17_1","unstructured":"2024. Axon Evidence. Axon. https:\/\/www.axon.com\/products\/axon-evidence (Accessed on 10\/25\/2024)."},{"key":"e_1_2_1_18_1","unstructured":"2024. Court Watch. http:\/\/courtwatch.org\/."},{"key":"e_1_2_1_19_1","unstructured":"2024. Madison Tech Clinic. https:\/\/techclinic.cs.wisc.edu\/ Accessed: 2024-1-25."},{"key":"e_1_2_1_20_1","unstructured":"2024. Victim Advocate Demographics and Statistics: Number Of Victim Advocates In The US. Zippia. https:\/\/www.zippia.com\/victim-advocate-jobs\/demographics\/"},{"key":"e_1_2_1_21_1","unstructured":"2024. Violence Against Women Act. NNEDV. https:\/\/nnedv.org\/content\/violence-against-women-act\/ (Accessed on 10\/25\/2024)."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801219841445"},{"key":"e_1_2_1_23_1","first-page":"20","article-title":"A Global Survey of Android Dual-Use Applications used in Intimate Partner Surveillance","volume":"1","author":"Almansoori Majed","year":"2022","unstructured":"Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, and Rahul Chatterjee. 2022. A Global Survey of Android Dual-Use Applications used in Intimate Partner Surveillance. Proceedings on Privacy Enhancing Technologies 1 (2022), 20.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","author":"Alsoubai Ashwaq","year":"2022","unstructured":"Ashwaq Alsoubai, Jihye Song, Afsaneh Razi, Nurun Naher, Munmun De Choudhury, and Pamela J. Wisniewski. 2022. From 'Friends with Benefits' to 'Sextortion:' A Nuanced Investigation of Adolescents' Online Sexual Risk Experiences. Proceedings of the ACM on Human-Computer Interaction (2022), 411:1-411:32. doi:10\/gsjrvg"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642871"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581101"},{"key":"e_1_2_1_27_1","first-page":"87","volume-title":"The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Bellini Rosanna","year":"2023","unstructured":"Rosanna Bellini, Kevin Lee, Megan A. Brown, Jeremy Shaffer, Rasika Bhalerao, and Thomas Ristenpart. 2023. The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 87-104. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/bellini"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432909"},{"key":"e_1_2_1_29_1","volume-title":"SoK: Safer Digital-Safety Research Involving At-Risk Users. In IEEE Symposium on Security and Privacy (S&P","author":"Bellini Rosanna","year":"2024","unstructured":"Rosanna Bellini, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Palzkill Woelfer, Patrick Gage Kelley, Michelle L Mazurek, Dana Cuomo, Nicola Dell, and Thomas Ristenpart. 2024. SoK: Safer Digital-Safety Research Involving At-Risk Users. In IEEE Symposium on Security and Privacy (S&P 2024). http:\/\/arxiv.org\/abs\/2309.00735"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642033"},{"key":"e_1_2_1_31_1","volume-title":"Positionality: Reflecting on the research process. The qualitative report 19, 33","author":"Bourke Brian","year":"2014","unstructured":"Brian Bourke. 2014. Positionality: Reflecting on the research process. The qualitative report 19, 33 (2014), 1-9."},{"key":"e_1_2_1_32_1","first-page":"373","volume-title":"Twentieth Symposium on Usable Privacy and Security (SOUPS 2024","author":"Brigham Natalie Grace","year":"2024","unstructured":"Natalie Grace Brigham, Miranda Wei, Tadayoshi Kohno, and Elissa M. Redmiles. 2024. ''Violation of my body:'' Perceptions of AI-generated non-consensual (intimate) imagery. In Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). USENIX Association, Philadelphia, PA, 373-392. https:\/\/www.usenix.org\/conference\/soups2024\/presentation\/brigham"},{"key":"e_1_2_1_33_1","article-title":"Can I just share my story?'' Experiences of technology-facilitated abuse among Aboriginal and Torres Strait Islander women in regional and remote Australia","volume":"5","author":"Brown Chay","year":"2021","unstructured":"Chay Brown, Mandy Yap, Annick Thomassin, Minda Murray, and Eunice Yu. 2021. ''Can I just share my story?'' Experiences of technology-facilitated abuse among Aboriginal and Torres Strait Islander women in regional and remote Australia. Journal of Global Indigeneity 5, 2 (2021). https:\/\/www.journalofglobalindigeneity.com\/article\/29716.pdf","journal-title":"Journal of Global Indigeneity"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2023.238140"},{"key":"e_1_2_1_35_1","volume-title":"Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Ceccio Rose","year":"2023","unstructured":"Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, and Rahul Chatterjee. 2023. Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association. https:\/\/pages.cs.wisc.edu\/~chatterjee\/papers\/usenix23-spydevices.pdf"},{"key":"e_1_2_1_36_1","unstructured":"Women's Center and Shelter of Greater Pittsburgh. 2023. Bright Sky US. App Store. https:\/\/apps.apple.com\/us\/app\/bright-sky-us\/id1667028531"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00061"},{"key":"e_1_2_1_38_1","volume-title":"United States. Psychology of violence 10, 1","author":"Chen Jieru","year":"2020","unstructured":"Jieru Chen, Mikel L Walters, Leah K Gilbert, and Nimesh Patel. 2020. Sexual violence, stalking, and intimate partner violence by sexual orientation, United States. Psychology of violence 10, 1 (2020), 110."},{"key":"e_1_2_1_39_1","volume-title":"The fight for privacy: Protecting dignity, identity, and love in the digital age","author":"Citron Danielle Keats","unstructured":"Danielle Keats Citron. 2022. The fight for privacy: Protecting dignity, identity, and love in the digital age. WW Norton & Company."},{"key":"e_1_2_1_40_1","volume-title":"Gender-Based Violence and Technology-Enabled Coercive Control","author":"Cuomo Dana","year":"2019","unstructured":"Dana Cuomo. 2019. Gender-Based Violence and Technology-Enabled Coercive Control in Seattle: Challenges & Opportunities. (2019)."},{"key":"e_1_2_1_41_1","volume-title":"Digital Technologies, and Firearms:.","author":"Cuomo Dana","year":"2022","unstructured":"Dana Cuomo. 2022. Coercive Control, Digital Technologies, and Firearms:. (2022)."},{"key":"e_1_2_1_42_1","unstructured":"Dana Cuomo Nicola Dell and Alana Ramjit. 2023. The Technology Abuse Clinic Toolkit. (2023)."},{"key":"e_1_2_1_43_1","volume-title":"Gender-Based Violence and Technology-Enabled Coercive Control","author":"Cuomo Dana","year":"2021","unstructured":"Dana Cuomo and Natalie Dolci. 2019. Gender-Based Violence and Technology-Enabled Coercive Control in Seattle: Challenges & Opportunities. Technology-Enabled Coercive Control (TECC) Whitepaper Series. https:\/\/sites.lafayette.edu\/cuomod\/files\/2021\/06\/Technology-Enabled-Coercive-Control-Whitepaper-2019-1-1.pdf"},{"key":"e_1_2_1_44_1","volume-title":"New Tools","author":"Cuomo Dana","year":"2021","unstructured":"Dana Cuomo and Natalie Dolci. 2021. New Tools, Old Abuse: Technology-Enabled Coercive Control (TECC). Geoforum (2021), 224-232. doi:10\/gnpfn5"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.wsif.2022.102596"},{"key":"e_1_2_1_46_1","volume-title":"Place & Culture","author":"Cuomo Dana","year":"2023","unstructured":"Dana Cuomo and Natalie Dolci. 2023. The Entanglements of the Law, Digital Technologies and Domestic Violence in Seattle. Gender, Place & Culture (2023), 903-923. doi:10\/gt57nx"},{"key":"e_1_2_1_47_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Daffalla Alaa","year":"2023","unstructured":"Alaa Daffalla, Marina Bohuk, Nicola Dell, Rosanna Bellini, and Thomas Ristenpart. 2023. Account Security Interfaces: Important, Unintuitive, and Untrustworthy. In 32nd USENIX Security Symposium (USENIX Security 23). 3601-3618. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/daffalla"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.04.006"},{"key":"e_1_2_1_49_1","volume-title":"Technology-Facilitated Domestic and Family Violence: Women's Experiences. The British Journal of Criminology","author":"Douglas Heather","year":"2019","unstructured":"Heather Douglas, Bridget A Harris, and Molly Dragiewicz. 2019. Technology-Facilitated Domestic and Family Violence: Women's Experiences. The British Journal of Criminology (2019), 551-570. doi:10\/gf64dq"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315270265-23"},{"key":"e_1_2_1_51_1","volume-title":"Australian Mothers' Perceptions of Children's Involvement in Technology-Facilitated Coercive Control. Journal of Family Violence","author":"Dragiewicz Molly","year":"2022","unstructured":"Molly Dragiewicz, Delanie Woodlock, Michael Salter, and Bridget Harris. 2022. ''What's Mum's Password?'': Australian Mothers' Perceptions of Children's Involvement in Technology-Facilitated Coercive Control. Journal of Family Violence (2022), 137-149. doi:10\/gkgrvc"},{"key":"e_1_2_1_52_1","volume-title":"Woodin","author":"Duerksen Kari N.","year":"2019","unstructured":"Kari N. Duerksen and Erica M. Woodin. 2019. Technological Intimate Partner Violence: Exploring Technology-Related Perpetration Factors and Overlap with in-Person Intimate Partner Violence. Computers in Human Behavior (2019), 223-231. doi:10\/gr8rpk"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524458.3547247"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531695"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675234"},{"key":"e_1_2_1_56_1","unstructured":"Asher Flynn Anastasia Powell and Sophie Hindes. 2021. Technology-Facilitated Abuse: A Survey of Support Services Stakeholders. Technical Report. ANROWS Research Report."},{"key":"e_1_2_1_57_1","volume-title":"An Intersectional Analysis of Technology-Facilitated Abuse: Prevalence, Experiences and Impacts of Victimization. The British Journal of Criminology","author":"Flynn Asher","year":"2023","unstructured":"Asher Flynn, Anastasia Powell, and Sophie Hindes. 2023. An Intersectional Analysis of Technology-Facilitated Abuse: Prevalence, Experiences and Impacts of Victimization. The British Journal of Criminology (2023), azad044. doi:10\/gth3bp"},{"key":"e_1_2_1_58_1","volume-title":"et al","author":"Centers for Disease Control, Prevention","year":"2018","unstructured":"Centers for Disease Control, Prevention, et al . 2018. CDC: 1 in 4 US adults live with a disability. CDC Online Newsroom (2018)."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359304"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134681"},{"key":"e_1_2_1_62_1","volume-title":"Woman used an AirTag to track boyfriend, then ran over and killed him, police say. USA Today (June","author":"Gleeson Scott","year":"2022","unstructured":"Scott Gleeson. 2022. Woman used an AirTag to track boyfriend, then ran over and killed him, police say. USA Today (June 2022). https:\/\/www.usatoday.com\/story\/news\/nation\/2022\/06\/15\/woman-airtag-track-boyfriend-death\/7632348001\/"},{"key":"e_1_2_1_63_1","volume-title":"Deepfakes: Federal and state regulation aims to curb a growing threat","author":"Graham Michelle M.","year":"2024","unstructured":"Michelle M. Graham. 2024. Deepfakes: Federal and state regulation aims to curb a growing threat. Reuters. https:\/\/www.thomsonreuters.com\/en-us\/posts\/government\/deepfakes-federal-state-regulation\/ (Accessed on 10\/24\/2024)."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3652036"},{"key":"e_1_2_1_65_1","volume-title":"USENIX Security","author":"Gupta Naman","year":"2024","unstructured":"Naman Gupta, Kate Walsh, Sanchari Das, and Rahul Chatterjee. 2024. ''I Really Just Leaned on My Community for Support'': Barriers, Challenges, and Coping Mechanisms Used by Survivors of Technology-Facilitated Abuse to Seek Social Support. In USENIX Security 2024. Philadelphia, PA."},{"key":"e_1_2_1_66_1","volume-title":"Technology-Based Responses to Technology-Facilitated Domestic and Family Violence: An Overview of the Limits and Possibilities of Tech-Based ''Solutions''. Violence Against Women","author":"Harkin Diarmaid","year":"2022","unstructured":"Diarmaid Harkin and Robert Merkel. 2022. Technology-Based Responses to Technology-Facilitated Domestic and Family Violence: An Overview of the Limits and Possibilities of Tech-Based ''Solutions''. Violence Against Women (2022), 107780122210883. doi:10\/gr8rqb"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1108\/978-1-83982-848-520211030"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.5204\/ijcjsd.2190"},{"key":"e_1_2_1_69_1","volume-title":"Digital Coercive Control: Insights From Two Landmark Domestic Violence Studies. The British Journal of Criminology","author":"Harris Bridget A","year":"2019","unstructured":"Bridget A Harris and Delanie Woodlock. 2019. Digital Coercive Control: Insights From Two Landmark Domestic Violence Studies. The British Journal of Criminology (2019), 530-550. doi:10\/gkxr96"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.3316\/informit.379529323994593"},{"key":"e_1_2_1_71_1","first-page":"105","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Havron Sam","year":"2019","unstructured":"Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2019. Clinical computer security for victims of intimate partner violence. In 28th USENIX Security Symposium (USENIX Security 19). usenix.org, 105-122. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/havron"},{"key":"e_1_2_1_72_1","volume-title":"Reflexivity in qualitative research. Qualitative organizational research: Core methods and current challenges 26","author":"Haynes Kathryn","year":"2012","unstructured":"Kathryn Haynes. 2012. Reflexivity in qualitative research. Qualitative organizational research: Core methods and current challenges 26 (2012), 72-89."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528546"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801219863881"},{"key":"e_1_2_1_75_1","volume-title":"Policing Image-Based Sexual Abuse: Stakeholder Perspectives. Police Practice and Research","author":"Henry Nicola","year":"2018","unstructured":"Nicola Henry, Asher Flynn, and Anastasia Powell. 2018. Policing Image-Based Sexual Abuse: Stakeholder Perspectives. Police Practice and Research (2018), 565-581. doi:10\/gn7zhh"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1177\/1524838016650189"},{"key":"e_1_2_1_77_1","volume-title":"Sextortion: Prevalence and Correlates in 10 Countries. Computers in Human Behavior","author":"Henry Nicola","year":"2024","unstructured":"Nicola Henry and Rebecca Umbach. 2024. Sextortion: Prevalence and Correlates in 10 Countries. Computers in Human Behavior (2024), 108298. doi:10\/gt6s43"},{"key":"e_1_2_1_78_1","volume-title":"d.]. Citation for: ''Why Do We Have to Be Almost Dead to Qualify for Help?'': Criminal Legal and Protection System Responses to Intimate Partner Violence Against Indigenous Women in Canada","author":"Kaye Julie","unstructured":"Julie Kaye and Alana Glecia. [n. d.]. Citation for: ''Why Do We Have to Be Almost Dead to Qualify for Help?'': Criminal Legal and Protection System Responses to Intimate Partner Violence Against Indigenous Women in Canada. Wiley Online Library ([n.d.])."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1080\/07370024.2019.1685883"},{"key":"e_1_2_1_80_1","first-page":"22","article-title":"Internet of Things': How abuse is getting smarter","volume":"63","author":"Lopez-Neira Isabel","year":"2019","unstructured":"Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, and Leonie Tanczer. 2019. 'Internet of Things': How abuse is getting smarter. Safe - The Domestic Abuse Quarterly 63 (2019), 22-26.","journal-title":"Safe - The Domestic Abuse Quarterly"},{"key":"e_1_2_1_81_1","unstructured":"Jeneile Luebke Peninnah Kako Alexa Lopez Marin Schmitt Anne Dressel Kathryn Klein and Lucy Mkandawire-Vahlmu. 2022. Barriers Faced by American Indian Women in Urban Wisconsin in Seeking Help Following an Experience of Intimate Partner Violence. (2022). pmid:36245254 doi:10\/gsc3hk"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675203"},{"key":"e_1_2_1_83_1","volume-title":"A Hidden Risk for Domestic Violence Victims: Family Phone Plans. Wired (July","author":"Matsakis Louise","year":"2020","unstructured":"Louise Matsakis. 2020. A Hidden Risk for Domestic Violence Victims: Family Phone Plans. Wired (July 2020). https:\/\/www.wired.com\/story\/family-phone-plans-hidden-risk-domestic-violence-victims\/"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025875"},{"key":"e_1_2_1_85_1","volume-title":"Andrea Kappas, and Alesha Durfee.","author":"Messing Jill","year":"2020","unstructured":"Jill Messing, Meredith Bagwell-Gray, Megan Lindsay Brown, Andrea Kappas, and Alesha Durfee. 2020. Intersections of Stalking and Technology-Based Abuse: Emerging Definitions, Conceptualization, and Measurement. Journal of Family Violence (2020), 693-704. doi:10\/gg6p2g"},{"key":"e_1_2_1_86_1","volume-title":"Domestic Abuse: Little Impact on Child Custody and Placement. https:\/\/www.wisbar.org\/NewsPublications\/WisconsinLawyer\/Pages\/Article.aspx?Volume=91&Issue=11&ArticleID=26737. Accessed: 2023-12-13.","author":"Meuer Teresa E","year":"2018","unstructured":"Teresa E Meuer, Tony Gibart, and Adrienne Roach. 2018. Domestic Abuse: Little Impact on Child Custody and Placement. https:\/\/www.wisbar.org\/NewsPublications\/WisconsinLawyer\/Pages\/Article.aspx?Volume=91&Issue=11&ArticleID=26737. Accessed: 2023-12-13."},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819925"},{"key":"e_1_2_1_88_1","unstructured":"World Health Organization et al. 2014. Global status report on violence prevention 2014. World Health Organization."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368860.3368861"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.2016.1154964"},{"key":"e_1_2_1_91_1","volume-title":"Technology-Facilitated Sexual Violence Victimization: Results From an Online Survey of Australian Adults. Journal of Interpersonal Violence","author":"Powell Anastasia","year":"2019","unstructured":"Anastasia Powell and Nicola Henry. 2019. Technology-Facilitated Sexual Violence Victimization: Results From an Online Survey of Australian Adults. Journal of Interpersonal Violence (2019), 3637-3665. doi:10\/gfttwz"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","unstructured":"Anastasia Powell Adrian Scott Asher Flynn and Nicola Henry. 2020. Image-Based Sexual Abuse: An International Study of Victims and Perpetrators. doi:10.13140\/RG.2.2.35166.59209","DOI":"10.13140\/RG.2.2.35166.59209"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462204.3481797"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580648"},{"key":"e_1_2_1_95_1","volume-title":"Navigating Traumatic Stress Reactions During Computer Security Interventions. USENIX Security","author":"Ramjit Lana","year":"2024","unstructured":"Lana Ramjit, Natalie Dolci, Francesca Rossi, Ryan Garcia, Thomas Ristenpart, and Dana Cuomo. 2024. Navigating Traumatic Stress Reactions During Computer Security Interventions. USENIX Security (2024)."},{"key":"e_1_2_1_96_1","volume-title":"Media, Culture","author":"Regehr Kaitlyn","year":"2022","unstructured":"Kaitlyn Regehr, Arija Birze, and Cheryl Regehr. 2022. Technology Facilitated Re-Victimization: How Video Evidence of Sexual Violence Contributes to Mediated Cycles of Abuse. Crime, Media, Culture (2022), 597-615. doi:10\/gr8rp8"},{"key":"e_1_2_1_97_1","volume-title":"Violence against American Indian and Alaska Native Women and Men. NIJ Journal 277 (Sept","author":"Rosay Andr\u00e9 B","year":"2016","unstructured":"Andr\u00e9 B Rosay. 2016. Violence against American Indian and Alaska Native Women and Men. NIJ Journal 277 (Sept. 2016). https:\/\/scholarworks.alaska.edu\/handle\/11122\/7030"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00069"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300232"},{"key":"e_1_2_1_100_1","first-page":"127","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS","author":"Sambasivan Nithya","year":"2018","unstructured":"Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gayt\u00e1n-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. 2018. ''Privacy Is Not for Me, It's for Those Rich Women'': Performative Privacy Practices on Mobile Phones by Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). 127-142."},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3406865.3418331"},{"key":"e_1_2_1_102_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Slupska Julia","year":"2022","unstructured":"Julia Slupska and Angelika Strohmayer. 2022. Networks of care: Tech abuse advocates' digital security practices. In 31st USENIX Security Symposium (USENIX Security 22). 341-358. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/slupska-networks"},{"key":"e_1_2_1_103_1","volume-title":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","author":"Slupska Julia","unstructured":"Julia Slupska and Leonie Maria Tanczer. 2021. Threat modeling intimate partner violence: Tech abuse as a cybersecurity challenge in the Internet of Things. In The Emerald International Handbook of Technology Facilitated Violence and Abuse. Emerald Publishing Limited."},{"key":"e_1_2_1_104_1","volume-title":"Marcie jo Kresnow, and Jieru Chen","author":"Smith Sharon G.","year":"2018","unstructured":"Sharon G. Smith, Xinjian Zhang, Kathleen C. Basile, Melissa T. Merrick, Jing Wang, Marcie jo Kresnow, and Jieru Chen. 2018. The National Intimate Partner and Sexual Violence Survey (NISVS): 2015 Data Brief - Updated Release. Atlanta, GA: National Center for Injury Prevention and Control, Centers for Disease Control and Prevention, https:\/\/www.cdc.gov\/violenceprevention\/pdf\/2015data-brief508.pdf."},{"key":"e_1_2_1_105_1","unstructured":"Stalking Prevention Awareness and Resource Center. 2022. Technology-Facilitated Stalking: Fact Sheet. https:\/\/www.stalkingawareness.org\/wp-content\/uploads\/2022\/12\/SPARC-Stalking-Techology-Fact-Sheet.pdf"},{"key":"e_1_2_1_106_1","volume-title":"Coercive control: How men entrap women in personal life","author":"Stark Evan","unstructured":"Evan Stark. 2007. Coercive control: How men entrap women in personal life. Oxford University Press."},{"key":"e_1_2_1_107_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Stephenson Sophie","year":"2023","unstructured":"Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, and Rahul Chatterjee. 2023. ''It's the Equivalent of Feeling Like You're in Jail'': Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse. In 32nd USENIX Security Symposium (USENIX Security 23)."},{"key":"e_1_2_1_108_1","volume-title":"Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse. In 32nd USENIX Security Symposium.","author":"Stephenson Sophie","year":"2023","unstructured":"Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, and Rahul Chatterjee. 2023. Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse. In 32nd USENIX Security Symposium."},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713544"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1332\/239868021X16290304343529"},{"key":"e_1_2_1_111_1","unstructured":"HeHop Team. 2021. HeHop - Help for Hope. Google Play. https:\/\/play.google.com\/store\/apps\/details?id=com.mco.hehop&hl=en&gl=FR (Accessed on 03\/16\/2023)."},{"key":"e_1_2_1_112_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Tseng Emily","year":"2020","unstructured":"Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2020. The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums. In 29th USENIX Security Symposium (USENIX Security 20). 1893-1909."},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/3637316"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445589"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502038"},{"key":"e_1_2_1_116_1","unstructured":"Domestic Violence Resource Centre Victoria. [n. d.]. Arc App. Google Play. https:\/\/play.google.com\/store\/apps\/details?id=au.org.dvrcv.arc"},{"key":"e_1_2_1_117_1","unstructured":"Elyse Wild. 2024. New Electronic Evidence Bill Could Help Tribal Courts Bring Justice to MMIP Crisis. Native News Online. https:\/\/nativenewsonline.net\/health\/new-electronic-evidence-bill-could-help-tribal-courts-bring-justice-to-mmip-crisis Accessed: 2024-8-22."},{"key":"e_1_2_1_118_1","volume-title":"The Abuse of Technology in Domestic Violence and Stalking. Violence Against Women","author":"Woodlock Delanie","year":"2017","unstructured":"Delanie Woodlock. 2017. The Abuse of Technology in Domestic Violence and Stalking. Violence Against Women (2017), 584-602. doi:10\/gg6gv4"},{"key":"e_1_2_1_119_1","volume-title":"You Have to Be Really Careful': Technology and the Abuse of Women with Intellectual and Cognitive Disabilities","author":"Woodlock Delanie","year":"2022","unstructured":"Delanie Woodlock and Bridget Harris. 2022. 'You Have to Be Really Careful': Technology and the Abuse of Women with Intellectual and Cognitive Disabilities. Disability & Society (2022), 1-21. doi:10\/gscxq6"},{"key":"e_1_2_1_120_1","volume-title":"Disenfranchised Grief, and Institutional Betrayal. Violence Against Women","author":"Woodlock Delanie","year":"2023","unstructured":"Delanie Woodlock, Michael Salter, Molly Dragiewicz, and Bridget Harris. 2023. ''Living in the Darkness'': Technology-Facilitated Coercive Control, Disenfranchised Grief, and Institutional Betrayal. Violence Against Women (2023), 987-1004. doi:10\/gscxq7"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T01:54:06Z","timestamp":1760666046000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757622"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,16]]},"references-count":120,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,10,18]]}},"alternative-id":["10.1145\/3757622"],"URL":"https:\/\/doi.org\/10.1145\/3757622","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,16]]},"assertion":[{"value":"2025-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}