Skip to main content

Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse

Arief, Budi and Coopamootoo, Kovila P.L. and Emms, Martin and van Moorsel, Aad (2014) Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society. CCS Computer and Communications Security . ACM, New York, USA, pp. 201-204. ISBN 978-1-4503-3148-7. (doi:10.1145/2665943.2665965) (KAR id:54149)

PDF Author's Accepted Manuscript
Language: English
Download (225kB) Preview
[thumbnail of WPES2014.pdf]
This file may not be suitable for users of assistive technology.
Request an accessible format
Official URL


Privacy is a concept with real life ties and implications. Privacy infringement has the potential to lead to serious consequences for the stakeholders involved, hence researchers and organisations have developed various privacy enhancing techniques and tools. However, there is no solution that fits all, and there are instances where privacy solutions could be misused, for example to hide nefarious activities. Therefore, it is important to provide suitable measures and to make necessary design tradeoffs in order to avoid such misuse. This short paper aims to make a case for the need of careful consideration when designing a privacy solution, such that the design effectively addresses the user requirements while at the same time minimises the risk of inadvertently assisting potential offenders. In other words, this paper strives to promote “sensible privacy” design, which deals with the complex challenges in balancing privacy, usability and accountability. We illustrate this idea through a case study involving the design of privacy solutions for domestic violence survivors. This is the main contribution of the paper. The case study presents specific user requirements and operating conditions, which coupled with the attacker model, provide a complex yet interesting scenario to explore. One example of our solutions is described in detail to demonstrate the feasibility of our approach.

Item Type: Book section
DOI/Identification number: 10.1145/2665943.2665965
Uncontrolled keywords: Privacy; anonymity; tradeoffs; privacy enhancing technologies; privacy in mobile systems; privacy threats; personal privacy; domestic violence; survivors.
Subjects: Q Science > QA Mathematics (inc Computing science)
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing
Depositing User: Budi Arief
Date Deposited: 17 Nov 2016 09:30 UTC
Last Modified: 16 Feb 2021 13:33 UTC
Resource URI: (The current URI for this page, for reference purposes)
Arief, Budi:
  • Depositors only (login required):


Downloads per month over past year