"Computer Security Researchers Aim To Prevent Tech Abuse"

Computer security researchers at Cornell Tech have developed a new method for helping domestic abuse survivors stop assailants from hacking into their devices and social media to cause further harm to them. Their model is based on continuity of care in which clients are provided with a seamless relationship with one volunteer tech consultant similar to what occurs in the health care setting. The model matches survivors with trustworthy consultants who understand their needs, offers multiple ways to safely communicate with consultants, and securely stores their tech abuse history and concerns. Emily Tseng, a doctoral student and lead author on a paper about the model, emphasized that managing personal data in tech abuse is complex and cannot always be solved in a single visit. She also pointed out that existing tech support approaches are limited by a one-size-fits-all protocol similar to that of an emergency room. The researchers' paper, "Care Infrastructure for Digital Security in Intimate Partner Violence," details a new approach, which was developed in partnership with New York City's Mayor's Office to End Domestic and Gender-Based Violence. The research behind their approach involved eight months of data, interviews with volunteer technology consultants, and experts on Intimate Partner Violence (IPV). This work explores the benefits and burdens of running a volunteer technology consultant service for IPV survivors, as well as the challenges that emerge when trying to safely provide computer security advice. Cornell Tech's program helps survivors experiencing technology abuse and increases understanding of how people could misuse technology to further harm others. For example, assailants can abuse their victims through spyware, the inappropriate use of different devices' location-tracking features, and more. This article continues to discuss the new approach created by Cornell Tech researchers to help domestic abuse survivors stop assailants from hacking their devices and social media.

Cornell Chronicle reports "Computer Security Researchers Aim To Prevent Tech Abuse"

Submitted by Anonymous on