Fragments of the Past: Curating Peer Support with Perpetrators of
Domestic Violence
- URL: http://arxiv.org/abs/2107.04711v1
- Date: Fri, 9 Jul 2021 22:57:43 GMT
- Title: Fragments of the Past: Curating Peer Support with Perpetrators of
Domestic Violence
- Authors: Rosanna Bellini, Alexander Wilson, Jan David Smeddinck
- Abstract summary: We report on a ten-month study where we worked with six support workers and eighteen perpetrators in the design and deployment of Fragments of the Past.
We share how crafting digitally-augmented artefacts - 'fragments' - of experiences of desisting from violence can translate messages for motivation and rapport between peers.
These insights provide the basis for practical considerations for future network design with challenging populations.
- Score: 88.37416552778178
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: There is growing evidence that digital peer-support networks can have a
positive influence on behaviour change and wellbeing outcomes for people who
harm themselves and others. However, making and sustaining such networks are
subject to ethical and pragmatic challenges, particularly for perpetrators of
domestic violence whom pose unique risks when brought together. In this work we
report on a ten-month study where we worked with six support workers and
eighteen perpetrators in the design and deployment of Fragments of the Past; a
socio-material system that connects audio messages with tangible artefacts. We
share how crafting digitally-augmented artefacts - 'fragments' - of experiences
of desisting from violence can translate messages for motivation and rapport
between peers, without subjecting the process to risks inherent with direct
inter-personal communication. These insights provide the basis for practical
considerations for future network design with challenging populations.
Related papers
- Tracing the Unseen: Uncovering Human Trafficking Patterns in Job Listings [9.450459784653196]
We analyze over a quarter million job postings collected from eight relevant regions across the United States, spanning nearly two decades (2006-2024)
Our investigation into the types of advertised opportunities, the modes of preferred contact, and the frequency of postings uncovers the patterns characterizing suspicious ads.
This research underscores the imperative for a deeper dive into how online job boards and communication platforms could be unwitting facilitators of human trafficking.
arXiv Detail & Related papers (2024-06-18T10:18:15Z) - Sim-to-Real Causal Transfer: A Metric Learning Approach to
Causally-Aware Interaction Representations [62.48505112245388]
We take an in-depth look at the causal awareness of modern representations of agent interactions.
We show that recent representations are already partially resilient to perturbations of non-causal agents.
We propose a metric learning approach that regularizes latent representations with causal annotations.
arXiv Detail & Related papers (2023-12-07T18:57:03Z) - A Survey on Transferability of Adversarial Examples across Deep Neural Networks [53.04734042366312]
adversarial examples can manipulate machine learning models into making erroneous predictions.
The transferability of adversarial examples enables black-box attacks which circumvent the need for detailed knowledge of the target model.
This survey explores the landscape of the adversarial transferability of adversarial examples.
arXiv Detail & Related papers (2023-10-26T17:45:26Z) - The Anatomy of Deception: Technical and Human Perspectives on a Large-scale Phishing Campaign [4.369550829556578]
This study takes an unprecedented deep dive into large-scale phishing campaigns aimed at Meta's users.
Analysing data from over 25,000 victims worldwide, we highlight the nuances of these campaigns.
Through the application of advanced computational techniques, including natural language processing and machine learning, this work unveils critical insights into the psyche of victims.
arXiv Detail & Related papers (2023-10-05T12:24:24Z) - Exploiting Explainability to Design Adversarial Attacks and Evaluate
Attack Resilience in Hate-Speech Detection Models [0.47334880432883714]
We present an analysis of adversarial robustness exhibited by various hate-speech detection models.
We devise and execute targeted attacks on the text by leveraging the TextAttack tool.
This work paves the way for creating more robust and reliable hate-speech detection systems.
arXiv Detail & Related papers (2023-05-29T19:59:40Z) - Known by the company we keep: `Triadic influence' as a proxy for
compatibility in social relationships [1.1545092788508224]
We study real social networks of 13 schools with more than 3,000 students and 60,000 declared positive and negative relations.
We use neural networks to predict the relationships and to extract the probability that two students are friends or enemies.
We postulate that the probabilities extracted from the neural networks control the evolution of real social networks.
arXiv Detail & Related papers (2022-09-08T09:52:34Z) - Detecting adversaries in Crowdsourcing [71.20185379303479]
This work investigates the effects of adversaries on crowdsourced classification, under the popular Dawid and Skene model.
The adversaries are allowed to deviate arbitrarily from the considered crowdsourcing model, and may potentially cooperate.
We develop an approach that leverages the structure of second-order moments of annotator responses, to identify large numbers of adversaries, and mitigate their impact on the crowdsourcing task.
arXiv Detail & Related papers (2021-10-07T15:07:07Z) - Towards Unbiased Visual Emotion Recognition via Causal Intervention [63.74095927462]
We propose a novel Emotion Recognition Network (IERN) to alleviate the negative effects brought by the dataset bias.
A series of designed tests validate the effectiveness of IERN, and experiments on three emotion benchmarks demonstrate that IERN outperforms other state-of-the-art approaches.
arXiv Detail & Related papers (2021-07-26T10:40:59Z) - Detecting Cross-Modal Inconsistency to Defend Against Neural Fake News [57.9843300852526]
We introduce the more realistic and challenging task of defending against machine-generated news that also includes images and captions.
To identify the possible weaknesses that adversaries can exploit, we create a NeuralNews dataset composed of 4 different types of generated articles.
In addition to the valuable insights gleaned from our user study experiments, we provide a relatively effective approach based on detecting visual-semantic inconsistencies.
arXiv Detail & Related papers (2020-09-16T14:13:15Z) - A Survey on Computational Propaganda Detection [31.42480765785039]
Propaganda campaigns aim at influencing people's mindset with the purpose of advancing a specific agenda.
They exploit the anonymity of the Internet, the micro-profiling ability of social networks, and the ease of automatically creating and managing coordinated networks of accounts.
arXiv Detail & Related papers (2020-07-15T22:25:51Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.