Journal Article - Journal of Cybersecurity
Privacy Threats in Intimate Relationships
Abstract
This article provides an overview of intimate threats: a class of privacy threats that can arise within our families, romantic partnerships, close friendships, and caregiving relationships. Many common assumptions about privacy are upended in the context of these relationships, and many otherwise effective protective measures fail when applied to intimate threats. Those closest to us know the answers to our secret questions, have access to our devices, and can exercise coercive power over us. We survey a range of intimate relationships and describe their common features. Based on these features, we explore implications for both technical privacy design and policy, and offer design recommendations for ameliorating intimate privacy risks.
– Via Journal of Cybersecurity.
For more information on this publication:
Please contact
Science, Technology, and Public Policy
For Academic Citation:
Levy, Karen and Bruce Schneier. "Privacy Threats in Intimate Relationships." Journal of Cybersecurity, vol. 6. no. 1. (2020) .
- Recommended
- In the Spotlight
- Most Viewed
Recommended
Analysis & Opinions
- Lawfare
The Myth of Consumer Security
Magazine Article
- Federal Times
How Technologists in Government Could Shape Better Tech Policy
Analysis & Opinions
- WIRED
There's No Good Reason to Trust Blockchain Technology
In the Spotlight
Most Viewed
Policy Brief
- Quarterly Journal: International Security
The Future of U.S. Nuclear Policy: The Case for No First Use
Discussion Paper
- Belfer Center for Science and International Affairs, Harvard Kennedy School
Why the United States Should Spread Democracy
Abstract
This article provides an overview of intimate threats: a class of privacy threats that can arise within our families, romantic partnerships, close friendships, and caregiving relationships. Many common assumptions about privacy are upended in the context of these relationships, and many otherwise effective protective measures fail when applied to intimate threats. Those closest to us know the answers to our secret questions, have access to our devices, and can exercise coercive power over us. We survey a range of intimate relationships and describe their common features. Based on these features, we explore implications for both technical privacy design and policy, and offer design recommendations for ameliorating intimate privacy risks.
Levy, Karen and Bruce Schneier. "Privacy Threats in Intimate Relationships." Journal of Cybersecurity, vol. 6. no. 1. (2020) .
- Recommended
- In the Spotlight
- Most Viewed
Recommended
Analysis & Opinions - Lawfare
The Myth of Consumer Security
Magazine Article - Federal Times
How Technologists in Government Could Shape Better Tech Policy
Analysis & Opinions - WIRED
There's No Good Reason to Trust Blockchain Technology
In the Spotlight
Most Viewed
Policy Brief - Quarterly Journal: International Security
The Future of U.S. Nuclear Policy: The Case for No First Use
Discussion Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School
Why the United States Should Spread Democracy


