[go: up one dir, main page]

Essert, 2019 - Google Patents

Addressing imperfect solutions to technology-facilitated domestic violence

Essert, 2019

Document ID
13375555415696419227
Author
Essert C
Publication year
Publication venue
Women's Rts. L. Rep.

External Links

Snippet

PURPOSE The purpose of this Note is to bring attention to the growing prevalence of cyber- facilitated domestic violence and the factors that contribute to inadequate responses at a state level. Particular attention will be given to spyware and the hacking of internet-of-things …
Continue reading at heinonline.org (other versions)

Similar Documents

Publication Publication Date Title
Henry et al. Policing image-based sexual abuse: Stakeholder perspectives
Rackley et al. Seeking justice and redress for victim-survivors of image-based sexual abuse
Tsesis Social media accountability for terrorist propaganda
Lipton Combating cyber-victimization
Hand et al. The use of information and communication technologies to coerce and control in domestic violence and following separation
Kaluarachchi et al. Responsible use of technology to combat Cyberbullying among adolescents
Flynn et al. Technology-facilitated abuse: A survey of support services stakeholders
Stabile et al. “She Lied”: Social construction, rape myth prevalence in social media, and sexual assault policy
Gray et al. Fighting cybercrime after united states v. jones
Khoo et al. Installing fear: A Canadian legal and policy analysis of using, developing, and selling smartphone spyware and stalkerware applications
Strand et al. Towards a situated understanding of vulnerability—An analysis of Ugandan LGBT+ exposure to hate crimes in digital spaces
Ashraf et al. " Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in Pakistan
Malanga Survey of cyber violence against women in Malawi
Dar et al. Are Women a Soft Target for Cyber Crime in India
Essert Addressing imperfect solutions to technology-facilitated domestic violence
Clevenger et al. Intimate partner violence and the internet: Perspectives
Vasiu et al. Light my fire: A Roentgenogram of cyberstalking cases
Draper Protecting children in the age of end-to-end encryption
Festa New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking
Klein et al. Social media compliance programs and the war against terrorism
Pérez-Sales COVID-19 and Torture
Sumner et al. Preliminary Analysis of Privacy Implications Observed in Social-Media Posts Across Shopping Platforms
Miftha The social, legal, and technical perspectives of cyberstalking in India
GULATI CYBER CRIMES AGAINST WOMEN
Jaffe Caution social media cyberbullies: Identifying new harms and liabilities