Author of the publication

Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors.

, , and . USENIX Security Symposium, page 89-104. USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digitizing paper forms with mobile imaging technologies., , , , and . ACM DEV, page 2:1-2:10. ACM, (2012)Integrating ODK Scan into the community health worker supply chain in Mozambique., , , , , , and . ICTD (1), page 228-237. ACM, (2013)The Many Kinds of Creepware Used for Interpersonal Attacks., , , , , , and . SP, page 626-643. IEEE, (2020)Social Media Platforms for Low-Income Blind People in India., , , and . ASSETS, page 259-272. ACM, (2015)"It cannot do all of my work": Community Health Worker Perceptions of AI-Enabled Mobile Health Applications in Rural India., , , and . CHI, page 701:1-701:20. ACM, (2021)Ä Second Voice": Investigating Opportunities and Challenges for Interactive Voice Assistants to Support Home Health Aides., , , , , , , and . CHI, page 45:1-45:17. ACM, (2022)Care Infrastructures for Digital Security in Intimate Partner Violence., , , , , and . CHI, page 123:1-123:20. ACM, (2022)Trauma-Informed Computing: Towards Safer Technology Experiences for All., , , , , , , , and . CHI, page 544:1-544:20. ACM, (2022)Privacy, Security, and Surveillance in the Global South: A Study of Biometric Mobile SIM Registration in Bangladesh., , , , and . CHI, page 906-918. ACM, (2017)Challenges and Issues Integrating Smartphones into Teacher Support Programs in India., , , and . ICTD, page 10:1-10:11. ACM, (2020)