Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse.
Tara MatthewsKathleen O'LearyAnna TurnerManya SleeperJill Palzkill WoelferMartin SheltonCori ManthorneElizabeth F. ChurchillSunny ConsolvoPublished in: CHI (2017)
Keyphrases
- security issues
- security concerns
- statistical databases
- preserving privacy
- security and privacy issues
- security properties
- information security
- privacy issues
- personal data
- security risks
- privacy preserving
- security mechanisms
- data security
- privacy concerns
- security requirements
- data privacy
- security threats
- electronic payment
- security measures
- protection mechanisms
- security services
- rfid systems
- privacy policies
- sensitive data
- confidential information
- personal information
- privacy enhancing
- access control
- secure multiparty computation
- biometric template
- security policies
- privacy requirements
- identity management
- authentication protocol
- privacy preservation
- privacy protection
- security problems
- privacy preserving data mining
- encryption key
- case study
- security protocols
- security level
- cyber security
- data confidentiality
- data integrity
- security analysis
- rfid tags
- private information
- smart card
- information systems
- outsourced databases