COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > Tech Abuse in the Intimate Partner Violence Setting: Issues, Challenges, and Mitigations
Tech Abuse in the Intimate Partner Violence Setting: Issues, Challenges, and MitigationsAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Jack Hughes. Technology connects people which can be both positive and sometimes negative. The problems arising from tech abuse more broadly and especially in the intimate partner violence setting are now becoming more apparent. Past investigations of these issues have largely been qualitative in nature and conducted by social scientists. Indeed, multiple studies have highlighted the harms caused by gendered tech abuse. However, we have little quantitative analysis of these issues. In this talk, I’ll highlight how our understanding of tech abuse in the intimate partner violence setting can be improved through the creation of data analysis pipelines, the challenges that arise in attempting to study these issues at scale, and some of the strategies that might mitigate these issues. Related papers: http://damonmccoy.com/papers/spyware.pdf http://damonmccoy.com/papers/Creepware_SP.pdf http://damonmccoy.com/papers/clinicalsec.pdf Bio: Damon McCoy is an associate professor of Computer Science and Engineering at the New York University Tandon School of Engineering. He focuses on understanding the security and privacy issues at the intersection of society and technology. He received his Ph.D., MS, and BS in Computer Science from the University of Colorado, Boulder. McCoy is the recipient of an NSF CAREER award, former CRA /CCC Computer Innovation Fellow, IEEE Security and Privacy test of time and best practical paper awards, and an ACM MobiSys best paper award. RECORDING : Please note, this event will be recorded and will be available after the event for an indeterminate period under a CC BY -NC-ND license. Audience members should bear this in mind before joining the webinar or asking questions. This talk is part of the Computer Laboratory Security Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsOperations Group Seminar Series CCCRR Vascular Biology Research Seminars Basic Statistics Reading GroupOther talks[CANCELLED] Three-Dimensional Active Defect Loops Zoom seminar - Virtual laboratory for reinforced concrete: Lattice modelling Bloodlines of the British CANCELLED - Further explorations in Peru The promise of proton therapy in Paediatric tumours |