Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors
Offered By: USENIX via YouTube
Course Description
Overview
Explore a distinguished paper presentation from USENIX Security '19 examining the computer security and privacy aspects of interactions between victim service providers (VSPs) and human trafficking survivors. Delve into the findings of a study based on 17 semi-structured interviews with VSP staff members and trafficking survivors, uncovering the role of technology in these interactions and associated security and privacy concerns. Learn about the delicate balance VSPs must maintain between building trust through client autonomy and guiding technology use to mitigate revictimization risks. Gain insights into concrete recommendations for computer security and privacy technologists aiming to collaborate with VSPs in supporting and empowering trafficking survivors.
Syllabus
USENIX Security '19 - Computer Security and Privacy in the Interactions Between Victim
Taught by
USENIX
Related Courses
Never Been KIST - Tor’s Congestion Management Blossoms with Kernel-Informed Socket TransportUSENIX via YouTube Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
USENIX via YouTube Control-Flow Bending - On the Effectiveness of Control-Flow Integrity
USENIX via YouTube Protecting Privacy of BLE Device Users
USENIX via YouTube K-Fingerprinting - A Robust Scalable Website Fingerprinting Technique
USENIX via YouTube