YoVDO

Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors

Offered By: USENIX via YouTube

Tags

USENIX Security Courses Computer Security Courses Privacy Courses

Course Description

Overview

Explore a distinguished paper presentation from USENIX Security '19 examining the computer security and privacy aspects of interactions between victim service providers (VSPs) and human trafficking survivors. Delve into the findings of a study based on 17 semi-structured interviews with VSP staff members and trafficking survivors, uncovering the role of technology in these interactions and associated security and privacy concerns. Learn about the delicate balance VSPs must maintain between building trust through client autonomy and guiding technology use to mitigate revictimization risks. Gain insights into concrete recommendations for computer security and privacy technologists aiming to collaborate with VSPs in supporting and empowering trafficking survivors.

Syllabus

USENIX Security '19 - Computer Security and Privacy in the Interactions Between Victim


Taught by

USENIX

Related Courses

Never Been KIST - Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport
USENIX via YouTube
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
USENIX via YouTube
Control-Flow Bending - On the Effectiveness of Control-Flow Integrity
USENIX via YouTube
Protecting Privacy of BLE Device Users
USENIX via YouTube
K-Fingerprinting - A Robust Scalable Website Fingerprinting Technique
USENIX via YouTube