2019
DOI: 10.2139/ssrn.3350615
|View full text |Cite
|
Sign up to set email alerts
|

‘Internet of Things’: How Abuse is Getting Smarter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
56
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 42 publications
(57 citation statements)
references
References 10 publications
1
56
0
Order By: Relevance
“…While smart speakers can be useful tools for parental oversight of young children, for instance, ensuring that they are not accessing age-inappropriate material, the surveillance affordances can also reinforce domestic power imbalances in the form of technological intimate partner violence (Geeng and Roesner 2019). For example, domestic abusers can monitor the movements, search activity, and conversations of their victims through smart speakers (Lopez-Neira et al 2019). This issue is compounded in cases of unilateral control over connected smart-home systems, such as door locks, lights, or heating systems.…”
Section: Introductionmentioning
confidence: 99%
“…While smart speakers can be useful tools for parental oversight of young children, for instance, ensuring that they are not accessing age-inappropriate material, the surveillance affordances can also reinforce domestic power imbalances in the form of technological intimate partner violence (Geeng and Roesner 2019). For example, domestic abusers can monitor the movements, search activity, and conversations of their victims through smart speakers (Lopez-Neira et al 2019). This issue is compounded in cases of unilateral control over connected smart-home systems, such as door locks, lights, or heating systems.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, while this dominant imaginary promises to put user needs at the center, it also downplays its risks (cf. Lopez-Neira et al, 2019). In response, Dowse offers a curious twist on the notion of magic: rather than the obscuring “magic” of seamless technological utility, the Dowse developers invoke the language of magic to encourage users to get involved in a playful manner, with the goal of “open[ing] up the black box, dig deeper, look in the processes” (Interview #179).…”
Section: Dowse: Counter-infrastructuring the Datafied Consumermentioning
confidence: 99%
“…Such 'hidden' actions can also include proactive, well-meaning activities by multiple stakeholders (e.g. [19], [20]). For instance, evidence-gathering by law enforcement may be disrupted if the observed asset is impacted by a well-meaning system owner who acts upon the asset (such as disrupting a website, as in Figure 1).…”
Section: B Unintended Consequencesmentioning
confidence: 99%
“…Bob and Charlie live together. Charlie is controlling and monitors Bob's behaviour using IoT devices [20]. This includes Bob's smartphone [24].…”
Section: A Intimate Partner Abusementioning
confidence: 99%
See 1 more Smart Citation