{"id":1045,"date":"2020-11-27T20:16:01","date_gmt":"2020-11-27T19:16:01","guid":{"rendered":"https:\/\/wp.unil.ch\/persuasivelab\/?p=1045"},"modified":"2020-11-30T09:45:43","modified_gmt":"2020-11-30T08:45:43","slug":"1045","status":"publish","type":"post","link":"https:\/\/wp.unil.ch\/persuasivelab\/2020\/11\/1045\/","title":{"rendered":"Interdependent Privacy and Surveillance in Intimate Relationships"},"content":{"rendered":"<h2><span style=\"font-weight: 400\">Interdependent Privacy<\/span><\/h2>\n<p><span style=\"font-weight: 400\">The notion of privacy is a collective concern<\/span><a href=\"https:\/\/www.zotero.org\/google-docs\/?cK1K8n\"><span style=\"font-weight: 400\"> [1]<\/span><\/a><span style=\"font-weight: 400\">. So when studying privacy or designing new technologies, it is essential to consider this social construct to better protect individuals\u2019 privacy. Recent reviews on privacy scrutinized the social aspect of privacy by proposing new notions called \u2018interdependent privacy\u2019<\/span><a href=\"https:\/\/www.zotero.org\/google-docs\/?ckN7r9\"><span style=\"font-weight: 400\"> [2,3]<\/span><\/a><span style=\"font-weight: 400\"> or \u2018privacy dependencies\u2019<\/span><a href=\"https:\/\/www.zotero.org\/google-docs\/?vhv6M7\"><span style=\"font-weight: 400\"> [4]<\/span><\/a><span style=\"font-weight: 400\">. These studies explain how our privacy depends on the decisions of other people including our partners, families, friends, colleagues, and strangers in society.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">A paper by Barocas and Levy published in Washington Law Review<\/span><a href=\"https:\/\/www.zotero.org\/google-docs\/?gFTkkP\"><span style=\"font-weight: 400\"> [4]<\/span><\/a><span style=\"font-weight: 400\"> provides a framework explaining three different ways that our privacy might get disclosed\u4e00caused by other individuals.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">(1) Tie-based Dependency<\/span><\/h4>\n<p><span style=\"font-weight: 400\">Tie-based dependency explains (i) how an observer (e.g., 3rd party service provider or government) can collect information about us if a friend or family member knowingly or unknowingly disclose that information, (ii) how one&#8217;s information can be accidentally caught (e.g., bystanders), (iii) how one&#8217;s identity can be revealed by information from her acquaintance (e.g., family members sharing similar genetic patterns), or (iv) how one&#8217;s connection with others can help to collect information about others (e.g., contact chaining or Cambridge Analytica examples).<\/span><\/p>\n<h4><span style=\"font-weight: 400\">(2) Similarity-based Dependency<\/span><\/h4>\n<p><span style=\"font-weight: 400\">Similarity-based dependency explains how the following situations can help for inference of information or identity (i) being a member of the same family or sharing the same house, (ii) belonging to the same socially salient groups (age, gender, religion), or (iii) showing similar behaviors like using the same webpage, buying the same product, etc.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">(3) Difference-based Dependency<\/span><\/h4>\n<p><span style=\"font-weight: 400\">Difference-based dependency is about finding the required information about a person based on her\/his differences from others which including three approaches: (i) elimination which means that if someone discloses her information, this can make her distinguishable from others and finally can reveal other&#8217;s information or identity (ii) detecting those whose behavior or data are abnormal (iii) detecting those that trying to hide information or impede the observer, e.g., if everyone routinely discloses tax information, those who avoid such behavior might be the suspicious cases.<\/span><\/p>\n<h2><span style=\"font-weight: 400\">Intimate Privacy<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Considering the sensitivity of the disclosed information, the severity of the privacy conflicts, and its negative consequences on individuals can differ. One of the situations that <\/span><i><span style=\"font-weight: 400\">severe<\/span><\/i><span style=\"font-weight: 400\"> consequences might occur is privacy conflicts in intimate relationships. Partners usually access a lot of information from each other that disclosure of such information can threaten peer privacy and can finally hurt the peer. Partners could disclose such information with different motivations<\/span><a href=\"https:\/\/www.zotero.org\/google-docs\/?VhB6BE\"><span style=\"font-weight: 400\"> [5]<\/span><\/a><span style=\"font-weight: 400\">. Most of the time, emotional reasons play a critical role, when partners want to retaliate against their peer after their relationship ended up (e.g., revenge pornography). Partners could also use such privacy threats to gain personal benefits, for example, to prolong a one-sided relationship.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Another form of privacy violation in intimate relationships is intimate monitoring. While such surveillance could be useful in some types of relations (e.g., parental control), monitoring an adult person in partnership relations might have painful repercussions for the person who is under surveillance.<\/span><\/p>\n<h2><span style=\"font-weight: 400\">Intimate Partner Surveillance (IPS)<\/span><\/h2>\n<p><span style=\"font-weight: 400\">A recent study<\/span><a href=\"https:\/\/www.zotero.org\/google-docs\/?Lw0trz\"><span style=\"font-weight: 400\"> [6]<\/span><\/a><span style=\"font-weight: 400\"> showed that online communities such as public \u2018relationship infidelity forums\u2019 can serve perpetrators (i.e., those who monitor their partner) as a platform to discuss the techniques and tools required for IPS (e.g., how to use a keylogger to hack the partners\u2019 password). Nevertheless, it is yet unclear why perpetrators are interested in IPS and what are their motivations for seeking information related to IPS on such websites.<\/span><\/p>\n<p><span style=\"font-weight: 400\">A CSCW paper<\/span><a href=\"https:\/\/www.zotero.org\/google-docs\/?gJrWFs\"><span style=\"font-weight: 400\"> [7]<\/span><\/a><span style=\"font-weight: 400\"> by Bellini and colleagues studied IPS by analyzing comments left by perpetrators on three different online forums. The study used a mixed-method research approach where it first used a narrative analysis method to understand justifications and motivations provided by perpetrators for IPS and second it used a grounded theory approach to create a conceptual framework to better understand perpetrators\u2019 attitude changes during the IPS procedure.<\/span><\/p>\n<p><span style=\"font-weight: 400\">By analyzing 556 posts through three different forums, authors found a chronological structure consisting of three different acts related to IPS. Figure 1 shows these three steps including <\/span><i><span style=\"font-weight: 400\">setup<\/span><\/i><span style=\"font-weight: 400\"> (i.e., the reasons incentivized IPS for example if their partner started behaving differently), <\/span><i><span style=\"font-weight: 400\">confrontation<\/span><\/i><span style=\"font-weight: 400\"> (i.e. the initial actions that perpetrators did in response by gathering more evidence), and <\/span><i><span style=\"font-weight: 400\">resolution<\/span><\/i><span style=\"font-weight: 400\"> (i.e., the actions they did to solve the issue by seeking advice from the forum members).\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h6><img alt=\"\" loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-1047 aligncenter\" src=\"https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/11\/Screen-Shot-2020-11-27-at-20.10.50-1-1024x611.png\" alt=\"\" width=\"665\" height=\"397\" srcset=\"https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/11\/Screen-Shot-2020-11-27-at-20.10.50-1-1024x611.png 1024w, https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/11\/Screen-Shot-2020-11-27-at-20.10.50-1-300x179.png 300w, https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/11\/Screen-Shot-2020-11-27-at-20.10.50-1-768x458.png 768w, https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/11\/Screen-Shot-2020-11-27-at-20.10.50-1-369x220.png 369w, https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/11\/Screen-Shot-2020-11-27-at-20.10.50-1.png 1418w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/><\/h6>\n<h6 style=\"text-align: center\"><i><span style=\"font-weight: 400\">Figure 1. Three main actions related to IPS<\/span><\/i><\/h6>\n<p><span style=\"font-weight: 400\">The perpetrators used different justifications in their posts to commit IPS including\u00a0<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400\">to make sure their partner is being faithful<\/span><\/li>\n<li><span style=\"font-weight: 400\">to gather evidence discovering the partner betrayal<\/span><\/li>\n<li><span style=\"font-weight: 400\">to understand the reasons behind sudden behavior changes<\/span><\/li>\n<li><span style=\"font-weight: 400\">to control their partners\u2019 devices or social media accounts.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400\">While committing IPS, perpetrators often disclose different types of information about themselves and their partners including their physical spaces (workplace, holiday destination, home) and digital spaces (work devices, printed records, phone). They also give gender information about themselves, their partner, and a third party person (e.g., an affair partner). Disclosure of such information can create an opportunity for adversaries such as cyber attackers.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The paper also showed that perpetrators use such forums to<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">request help and guidance from others, e.g., \u201c<\/span><i><span style=\"font-weight: 400\">any suggestions for installing spyware<\/span><\/i><span style=\"font-weight: 400\">\u201d.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">to help others how to commit IPS, e.g., \u201c<\/span><i><span style=\"font-weight: 400\">keep snooping!<\/span><\/i><span style=\"font-weight: 400\">\u201d<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">to support and validate others by sharing similar experiences, e.g., \u201c<\/span><i><span style=\"font-weight: 400\">this is too dramatic!<\/span><\/i><span style=\"font-weight: 400\">\u201d<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">to praise themselves for the IPS they committed before, e.g., \u201c<\/span><i><span style=\"font-weight: 400\">I told him I was watching his every move!<\/span><\/i><span style=\"font-weight: 400\">\u201d<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">to monitor and gatekeep newcomers in the forum, e.g., \u201c<\/span><i><span style=\"font-weight: 400\">you should first share your story here before asking for answers!<\/span><\/i><span style=\"font-weight: 400\">\u201d<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400\">In the second part of the paper, the authors used grounded theory to provide a conceptual framework on how perpetrators change their attitudes during the IPS process. For this purpose, they used open coding, axial coding, and selective coding to analyze data systematically. The outcome is shown in Figure 2, and it includes four main stages: setting expectations, change in attitude, escalation, and reflection.<\/span><\/p>\n<p><img alt=\"\" loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-1048 aligncenter\" src=\"https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/11\/Screen-Shot-2020-11-27-at-20.11.20-1024x349.png\" alt=\"\" width=\"665\" height=\"227\" srcset=\"https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/11\/Screen-Shot-2020-11-27-at-20.11.20-1024x349.png 1024w, https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/11\/Screen-Shot-2020-11-27-at-20.11.20-300x102.png 300w, https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/11\/Screen-Shot-2020-11-27-at-20.11.20-768x262.png 768w, https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/11\/Screen-Shot-2020-11-27-at-20.11.20-640x218.png 640w, https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/11\/Screen-Shot-2020-11-27-at-20.11.20.png 1456w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/><\/p>\n<h6 style=\"text-align: center\"><i><span style=\"font-weight: 400\">Figure 2. A conceptual framework for attitude changes in IPS<\/span><\/i><\/h6>\n<p><span style=\"font-weight: 400\">According to this framework, perpetrators expect certain behavioral standards from their partners to demonstrate their trust based on their social contract (either implicit contract, e.g., promise, or explicit contract, e.g., a marriage contract). Based on this trust relationship perpetrators expect to have open access to all information of their partners. When perpetrators could not make sure of this trust relationship or when they noticed any suspicious change in their partner behavior, they start to change their attitude by using different wordings or by committing the first IPS actions. Perpetrators may escalate their IPS actions by looking for more techniques and tools and to increase the surveillance or they may reduce if they become confident about their relationships or if they do not have enough technical capacity to expand their surveillance. Last, only those perpetrators who stop the surveillance might reflect on their actions. Such reflections could make perpetrators realize that they indeed violated their own personal values, e.g., trust, and then deleting the gathered evidence!\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">The paper discusses different implications of the findings on how to make online forums safer environments and to make interventions to protect partners\u2019 privacy against surveillance. (For further information please click <\/span><a href=\"https:\/\/damonmccoy.com\/papers\/IPS_CSCW.pdf\"><span style=\"font-weight: 400\">here<\/span><\/a><span style=\"font-weight: 400\">!)<\/span><\/p>\n<p><span style=\"text-decoration: underline\"><span style=\"font-weight: 400\">Author: <a href=\"https:\/\/wp.unil.ch\/persuasivelab\/2020\/07\/kavous-salehzadeh-niksirat\/\">Kavous SALEHZADEH NIKSIRAT<\/a><\/span><\/span><\/p>\n<h2><span style=\"font-weight: 400\">References<\/span><\/h2>\n<ol>\n<li><span style=\"font-weight: 400\">Petronio, S. Communication Privacy Management Theory: What Do We Know About Family Privacy Regulation? <\/span><i><span style=\"font-weight: 400\">J. Fam. Theory Rev. <\/span><\/i><span style=\"font-weight: 400\">2, 175\u2013196 (2010).<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400\">\u00a0\u00a0\u00a0\u00a0<\/span><span style=\"font-weight: 400\">\u00a0<\/span><a href=\"https:\/\/doi.org\/10.1111\/j.1756-2589.2010.00052.x\"><span style=\"font-weight: 400\">https:\/\/doi.org\/10.1111\/j.1756-2589.2010.00052.x<\/span><\/a><\/p>\n<ol start=\"2\">\n<li><span style=\"font-weight: 400\">Humbert, M. &amp; Huguenin, K. Interdependent Privacy. in <\/span><i><span style=\"font-weight: 400\">Encyclopedia of Cryptography, Security and Privacy<\/span><\/i><span style=\"font-weight: 400\"> 5 (2020).<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400\">\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><a href=\"https:\/\/hal.archives-ouvertes.fr\/hal-02523728\/\"><span style=\"font-weight: 400\">https:\/\/hal.archives-ouvertes.fr\/hal-02523728\/<\/span><\/a><\/p>\n<ol start=\"3\">\n<li><span style=\"font-weight: 400\">Humbert, M., Trubert, B. &amp; Huguenin, K. A Survey on Interdependent Privacy. <\/span><i><span style=\"font-weight: 400\">ACM Comput. Surv. <\/span><\/i><span style=\"font-weight: 400\">52, 122:1\u2013122:40 (2019).<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400\">\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><a href=\"https:\/\/doi.org\/10.1145\/3360498\"><span style=\"font-weight: 400\">https:\/\/doi.org\/10.1145\/3360498<\/span><\/a><\/p>\n<ol start=\"4\">\n<li><span style=\"font-weight: 400\">Barocas, S. &amp; Levy, K. <\/span><i><span style=\"font-weight: 400\">Privacy Dependencies<\/span><\/i><span style=\"font-weight: 400\">. (2019)<\/span><span style=\"font-weight: 400\">.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400\">\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><a href=\"https:\/\/papers.ssrn.com\/abstract=3447384\"><span style=\"font-weight: 400\">https:\/\/papers.ssrn.com\/abstract=3447384<\/span><\/a><\/p>\n<ol start=\"5\">\n<li><span style=\"font-weight: 400\">Levy, K. &amp; Schneier, B. Privacy threats in intimate relationships. <\/span><i><span style=\"font-weight: 400\">J. Cybersecurity <\/span><\/i><span style=\"font-weight: 400\">6, (2020).<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400\">\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/6\/1\/tyaa006\/5849222\"><span style=\"font-weight: 400\">https:\/\/academic.oup.com\/cybersecurity\/article\/6\/1\/tyaa006\/5849222<\/span><\/a><\/p>\n<ol start=\"6\">\n<li><span style=\"font-weight: 400\">Tseng, E. <\/span><i><span style=\"font-weight: 400\">et al.<\/span><\/i><span style=\"font-weight: 400\"> The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. in 1893\u20131909 (2020).<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400\">\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><a href=\"https:\/\/arxiv.org\/abs\/2005.14341\"><span style=\"font-weight: 400\">https:\/\/arxiv.org\/abs\/2005.14341<\/span><\/a><\/p>\n<ol start=\"7\">\n<li><span style=\"font-weight: 400\">Bellini, R. <\/span><i><span style=\"font-weight: 400\">et al.<\/span><\/i><span style=\"font-weight: 400\"> &#8220;So-called privacy breeds evil\u2019\u2019: Narrative Justifications for Intimate Partner Surveillance in Online Forums. <\/span><i><span style=\"font-weight: 400\">J ACM <\/span><\/i><span style=\"font-weight: 400\">1, 27.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400\">\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><a href=\"https:\/\/damonmccoy.com\/papers\/IPS_CSCW.pdf\"><span style=\"font-weight: 400\">https:\/\/damonmccoy.com\/papers\/IPS_CSCW.pdf<\/span><\/a><\/p>\n<pre class=\"page-title\">\u00a9 Thumbnail photo by <a href=\"https:\/\/unsplash.com\/@dtopkin1?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Dayne Topkin<\/a> on <a href=\"https:\/\/unsplash.com\/s\/photos\/privacy?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash<\/a><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Interdependent Privacy The notion of privacy is a collective concern [1]. So when studying privacy or designing new technologies, it is essential to consider this social construct to better protect &hellip; <\/p>\n","protected":false},"author":1002102,"featured_media":1053,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[22],"tags":[],"class_list":{"0":"post-1045","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-research-update"},"_links":{"self":[{"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/posts\/1045","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/users\/1002102"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/comments?post=1045"}],"version-history":[{"count":0,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/posts\/1045\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/media\/1053"}],"wp:attachment":[{"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/media?parent=1045"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/categories?post=1045"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/tags?post=1045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}