Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems 2023
DOI: 10.1145/3544548.3581101
|View full text |Cite
|
Sign up to set email alerts
|

Paying the Price: When Intimate Partners Use Technology for Financial Harm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
22
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 14 publications
(22 citation statements)
references
References 69 publications
0
22
0
Order By: Relevance
“…In this study, our focus is on targeted digital financial attacks in situations involving intimate partner violence. These attacks, carried out by an abuser, can result in the loss of wealth, property, or other financial benefits for a survivor [90,98], for a range of social, or financial motives [13,44]. We refer to these actions as intimate partner financial abuse (IPFA), which may also branch into elder financial abuse [40,65] if involving older adults (see Appendix A for differentiation).…”
Section: Background and Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…In this study, our focus is on targeted digital financial attacks in situations involving intimate partner violence. These attacks, carried out by an abuser, can result in the loss of wealth, property, or other financial benefits for a survivor [90,98], for a range of social, or financial motives [13,44]. We refer to these actions as intimate partner financial abuse (IPFA), which may also branch into elder financial abuse [40,65] if involving older adults (see Appendix A for differentiation).…”
Section: Background and Related Workmentioning
confidence: 99%
“…Recent work has shown that these actions extend to financial and economic sectors, from surveillance of financial expenditure [25,102], to permitting unauthorized entry into smartphone applications [14], to harassing messages sent in payment memos [36]. In their in-depth review of survivor accounts of tech-enabled abuse, Bellini [13] identified a range of technical attacks across a variety of technical products, including credit accounts, shared banking infrastructures, and online businesses. Thus, abusers defy the conventional threat models of consumer technologies by exerting physical control over a survivor's devices and exploiting use of private financial information.…”
Section: Background and Related Workmentioning
confidence: 99%
See 3 more Smart Citations