Essert, 2019 - Google Patents
Addressing imperfect solutions to technology-facilitated domestic violenceEssert, 2019
- Document ID
- 13375555415696419227
- Author
- Essert C
- Publication year
- Publication venue
- Women's Rts. L. Rep.
External Links
Snippet
PURPOSE The purpose of this Note is to bring attention to the growing prevalence of cyber- facilitated domestic violence and the factors that contribute to inadequate responses at a state level. Particular attention will be given to spyware and the hacking of internet-of-things …
- 230000004044 response 0 abstract description 11
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Henry et al. | Policing image-based sexual abuse: Stakeholder perspectives | |
Rackley et al. | Seeking justice and redress for victim-survivors of image-based sexual abuse | |
Tsesis | Social media accountability for terrorist propaganda | |
Lipton | Combating cyber-victimization | |
Hand et al. | The use of information and communication technologies to coerce and control in domestic violence and following separation | |
Kaluarachchi et al. | Responsible use of technology to combat Cyberbullying among adolescents | |
Flynn et al. | Technology-facilitated abuse: A survey of support services stakeholders | |
Stabile et al. | “She Lied”: Social construction, rape myth prevalence in social media, and sexual assault policy | |
Gray et al. | Fighting cybercrime after united states v. jones | |
Khoo et al. | Installing fear: A Canadian legal and policy analysis of using, developing, and selling smartphone spyware and stalkerware applications | |
Strand et al. | Towards a situated understanding of vulnerability—An analysis of Ugandan LGBT+ exposure to hate crimes in digital spaces | |
Ashraf et al. | " Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in Pakistan | |
Malanga | Survey of cyber violence against women in Malawi | |
Dar et al. | Are Women a Soft Target for Cyber Crime in India | |
Essert | Addressing imperfect solutions to technology-facilitated domestic violence | |
Clevenger et al. | Intimate partner violence and the internet: Perspectives | |
Vasiu et al. | Light my fire: A Roentgenogram of cyberstalking cases | |
Draper | Protecting children in the age of end-to-end encryption | |
Festa | New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking | |
Klein et al. | Social media compliance programs and the war against terrorism | |
Pérez-Sales | COVID-19 and Torture | |
Sumner et al. | Preliminary Analysis of Privacy Implications Observed in Social-Media Posts Across Shopping Platforms | |
Miftha | The social, legal, and technical perspectives of cyberstalking in India | |
GULATI | CYBER CRIMES AGAINST WOMEN | |
Jaffe | Caution social media cyberbullies: Identifying new harms and liabilities |