Privacy threats in intimate relationships

06/06/2020
by   Karen Levy, et al.
0

This article provides an overview of intimate threats: a class of privacy threats that can arise within our families, romantic partnerships, close friendships, and caregiving relationships. Many common assumptions about privacy are upended in the context of these relationships, and many otherwise effective protective measures fail when applied to intimate threats. Those closest to us know the answers to our secret questions, have access to our devices, and can exercise coercive power over us. We survey a range of intimate relationships and describe their common features. Based on these features, we explore implications for both technical privacy design and policy, and offer design recommendations for ameliorating intimate privacy risks.

READ FULL TEXT

page 2

page 4

page 6

page 9

page 10

page 11

page 12

page 13

research
07/16/2018

Future Scenarios and Challenges for Security and Privacy

Over the past half-century, technology has evolved beyond our wildest dr...
research
05/09/2023

Privacy in Speech Technology

Speech technology for communication, accessing information and services ...
research
04/06/2023

Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards

Consumer Internet of Things (IoT) devices are increasingly common, from ...
research
01/17/2023

Co-designing Community-based Sharing of Smarthome Devices for the Purpose of Co-monitoring In-home Emergencies

We conducted 26 co-design interviews with 50 smarthome device owners to ...
research
04/11/2023

Multi-step Jailbreaking Privacy Attacks on ChatGPT

With the rapid progress of large language models (LLMs), many downstream...
research
11/21/2019

The Power and Pitfalls of Transparent Privacy Policies in Social Networking Service Platforms

Users disclose ever-increasing amounts of personal data on Social Networ...
research
12/04/2020

Threats to the information system in the physical environment and cyberspace

The purpose of the study is to supplement and update the list of threats...

Please sign up or login with your details

Forgot password? Click here to reset