University of Cambridge > > Computer Laboratory Security Seminar > Tech Abuse in the Intimate Partner Violence Setting: Issues, Challenges, and Mitigations

Tech Abuse in the Intimate Partner Violence Setting: Issues, Challenges, and Mitigations

Add to your list(s) Download to your calendar using vCal

  • UserDamon McCoy, New York University
  • ClockTuesday 05 May 2020, 14:00-15:00
  • HouseWebinar.

If you have a question about this talk, please contact Jack Hughes.

Technology connects people which can be both positive and sometimes negative. The problems arising from tech abuse more broadly and especially in the intimate partner violence setting are now becoming more apparent. Past investigations of these issues have largely been qualitative in nature and conducted by social scientists. Indeed, multiple studies have highlighted the harms caused by gendered tech abuse. However, we have little quantitative analysis of these issues. In this talk, I’ll highlight how our understanding of tech abuse in the intimate partner violence setting can be improved through the creation of data analysis pipelines, the challenges that arise in attempting to study these issues at scale, and some of the strategies that might mitigate these issues.

Related papers:

Bio: Damon McCoy is an associate professor of Computer Science and Engineering at the New York University Tandon School of Engineering. He focuses on understanding the security and privacy issues at the intersection of society and technology. He received his Ph.D., MS, and BS in Computer Science from the University of Colorado, Boulder. McCoy is the recipient of an NSF CAREER award, former CRA /CCC Computer Innovation Fellow, IEEE Security and Privacy test of time and best practical paper awards, and an ACM MobiSys best paper award.

RECORDING : Please note, this event will be recorded and will be available after the event for an indeterminate period under a CC BY -NC-ND license. Audience members should bear this in mind before joining the webinar or asking questions.

This talk is part of the Computer Laboratory Security Seminar series.

Tell a friend about this talk:

This talk is included in these lists:

Note that ex-directory lists are not shown.


© 2006-2024, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity