Protecting Digital Footprints: A Selective Web History Sanitization Tool for Domestic Violence Survivors
https://doi.org/10.24017/science.2025.1.7
Abstract views: 0 / PDF downloads: 0Abstract
This study introduces a novel solution that is designed to protect the privacy of domestic violence survivors when seeking online support. It enables survivors to access essential online resources without leaving digital footprints that may lead to further abuse by their violent partners. The study employs the principles of the design science framework to develop and evaluate a system for selective web history sanitization. The implemented system effectively deletes traces related to support websites while preserving unrelated browsing history to avoid the abuser’s suspicion, ensuring both usability and privacy. This work contributes a novel artifact that addresses a critical societal challenge, providing domestic violence survivors with a secure, adaptive, and privacy-preserving tool to seek online supports with confidence. It offers a significant step forward in protecting and empowering vulnerable populations, particularly those with limited technical expertise in the digital age. Additionally, this work offers practical insights for organizations that support survivors by advocating for the development and use of privacy-focused tools and practices to make their digital services more effective and safer.
Keywords:
References
B. Olaniran, “ICTs and domestic violence (DV): Exploring intimate partner violence (IPV),” International Journal of Big Data and Analytics in Healthcare (IJBDAH)., vol. 6, pp. 31–44, Jan. 2021, doi: 10.4018/IJBDAH.20210701.oa3. DOI: https://doi.org/10.4018/IJBDAH.20210701.oa3
A. L. Kranz and K. Nakamura, “Helpful or harmful? how innovative communication technology affects survivors of intimate violence,” Apr. 2002, [Online]. Available: https://api.semanticscholar.org/CorpusID:148213549.
A. van Moorsel, M. Emms, G. Rendall, and B. Arief, “Digital strategy for the social inclusion of survivors of domestic violence,” 2011. [Online]. Available: https://www.cs.kent.ac.uk/people/staff/ba284/home/Papers/TR1277.pdf.
B. Arief, K. P. L. Coopamootoo, M. Emms, and A. Van Moorsel, “Sensible privacy: How we can protect domestic violence survivors without facilitating misuse,” Proceedings of the 9th ACM conference on Computer and communications security, pp. 201–204, 2014, doi: 10.1145/2665943.2665965. DOI: https://doi.org/10.1145/2665943.2665965
T. Hand, D. Chung, M. Peters, and A. D. and F. V. C. University of New South Wales, The use of information and communication technologies to coerce and control in domestic violence following separation. Australian Domestic and Family Violence Clearinghouse, 2009.
C. Southworth, J. Finn, S. Dawson, C. Fraser, and S. Tucker, “Intimate partner violence, technology, and stalking,” Violence Against Women, vol. 13, no. 8, pp. 842–856, 2007, doi: 10.1177/1077801207302045. DOI: https://doi.org/10.1177/1077801207302045
M. Emms, B. Arief, and A. van Moorsel, “Electronic footprints in the sand: technologies for assisting domestic violence survivors BT - privacy technologies and policy,” in Lecture Notes in Computer Science, 2014, pp. 203–214. DOI: https://doi.org/10.1007/978-3-642-54069-1_13
D. Canali, L. Bilge, and D. Balzarotti, “On the effectiveness of risk prediction based on users browsing behavior,” Proceedings of the 9th ACM symposium on Information, computer and communications security, pp. 171–181, 2014, doi: 10.1145/2590296.2590347. DOI: https://doi.org/10.1145/2590296.2590347
R. D. P. Daniel and R. P. Sundarraj, “A latent factor model based movie recommender using smartphone browsing history,” Int. Conf. Res. Innov. Inf. Syst. Proceedings of the International Conference on Research and Innovation in Information Systems (ICRIIS)., pp. 1–6, 2017, doi: 10.1109/ICRIIS.2017.8002510. DOI: https://doi.org/10.1109/ICRIIS.2017.8002510
P. Shuxin et al., “A method of behavior evaluation based on web browsing information,” Proceedings - 2017 International Conference on Smart Grid and Electrical Automation ( ICSGEA 2017)., , pp. 697–700, 2017, doi: 10.1109/ICSGEA.2017.70. DOI: https://doi.org/10.1109/ICSGEA.2017.70
A. Dabrowski, G. Merzdovnik, N. Kommenda, and E. Weippl, “Browser history stealing with captive Wi-Fi portals,” Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops (SPW 2016).,. pp. 234–240, 2016, doi: 10.1109/SPW.2016.42. DOI: https://doi.org/10.1109/SPW.2016.42
K. Sim, H. Heo, and H. Cho, “Combating web tracking: analyzing web tracking technologies for user privacy,” Future Internet, vol. 16, no. 10, 2024, doi: 10.3390/fi16100363. DOI: https://doi.org/10.3390/fi16100363
A. R. Hevner, S. T. March, J. Park, and S. Ram, “Design science in information systems research,” MIS Quarterly, vol. 28, no. 1, pp. 75–105, Dec. 2004, doi: 10.2307/25148625. DOI: https://doi.org/10.2307/25148625
S. T. March and V. C. Storey, “Design science in the information systems discipline: an introduction to the special issue on design science research,” MISQuarterly , vol. 32, no. 4, pp. 725–730, Dec. 2008, doi: 10.2307/25148869. DOI: https://doi.org/10.2307/25148869
S. Gregor and A. R. Hevner, “Positioning and presenting design science research for maximum impact,” MISQuarterly , vol. 37, no. 2, pp. 337–355, Dec. 2013, [Online]. Available: http://www.jstor.org/stable/43825912. DOI: https://doi.org/10.25300/MISQ/2013/37.2.01
K. Peffers, T. Tuunanen, M. A. Rothenberger, and S. Chatterjee, “A design science research methodology for information systems research,” Journal of Management Information Systems, vol. 24, no. 3, pp. 45–77, Dec. 2007, [Online]. Available: http://www.jstor.org/stable/40398896. DOI: https://doi.org/10.2753/MIS0742-1222240302
F. Stevens, J. R. C. Nurse, and B. Arief, “Cyber Stalking, cyber harassment, and adult mental health: a systematic review,” Cyberpsychology, Behavior, and Social Networking, vol. 24, no. 6, pp. 367–376, Nov. 2020, doi: 10.1089/cyber.2020.0253. DOI: https://doi.org/10.1089/cyber.2020.0253
U.S. Department of Justice, “OVW observes national stalking awareness month, 2023,” Office on Violence Against Women, 2023. https://www.justice.gov/ovw/blog/ovw-observes-national-stalking-awareness-month-2023 (accessed Nov. 14, 2024).
Kaspersky, “Global Kaspersky report reveals digital violence has increased,” Kaspersky, 2024. https://www.kaspersky.com/about/press-releases/global-kaspersky-report-reveals-digital-violence-has-increased (accessed Oct. 15, 2024).
Office for National Statistics, “I feel like I am living someone else’s life’: one in seven people a victim of stalking,” UK Office for National Statistics, 2024. https://shorturl.at/HUnOW (accessed Nov. 23, 2024).
M. Sheridan, “The latest cyberstalking statistics for 2024,” SafeHome.Org, 2024. https://www.safehome.org/data/cyberstalking-statistics/ (accessed Nov. 01, 2024).
K. Hughes, P. Papadopoulos, N. Pitropakis, A. Smales, J. Ahmad, and W. Buchanan, “Browsers’ private mode: is it what we were promised?,” Computers, vol. 10, Dec. 2021, doi: 10.3390/computers10120165. DOI: https://doi.org/10.3390/computers10120165
R. Shah, P. Shukla, D. Rathod, S. Hitesh, and Y. Zala, “Web browser forensics: mozilla firefox,” International Journal of Electronic Security and Digital Forensics, vol. 1, p. 1, Jan. 2024, doi: 10.1504/IJESDF.2024.10055704. DOI: https://doi.org/10.1504/IJESDF.2024.10055704
D. Mugisha, “Web browser forensics: Evidence collection and analysis for most popular web browsers usage in windows 10,” International Journal of Cyber Criminology, vol. 54, p. 12, Sep. 2018, doi: 10.13140/RG.2.2.25857.51049.
P. Anuradha, T. R. Kumar, and N. V. Sobhana, “Recovering deleted browsing artifacts from web browser log files in Linux environment,” 2016 Symposium on Colossal Data Analysis and Networking (CDAN 2016), pp. 1–4, 2016, doi: 10.1109/CDAN.2016.7570957. DOI: https://doi.org/10.1109/CDAN.2016.7570957
O. R. Hammoud and I. A. Tarkhanov, “A method to prevent tracking browsing history with the use of browser extension,” UBMK 2019 - Proceedings of 4th International Conference on Computer Science and Engineering, pp. 251–254, 2019, doi: 10.1109/UBMK.2019.8907084. DOI: https://doi.org/10.1109/UBMK.2019.8907084
I. Sanchez-Rola, D. Balzarotti, and I. Santos, “Cookies from the past: timing server-side request processing code for history sniffing,” Digital Threats: Research and Practice, vol. 1, no. 4, 2020, doi: 10.1145/3419473. DOI: https://doi.org/10.1145/3419473
J. Bou Abdo and S. Zeadally, “Disposable identities: Solving web tracking,” Journal of Information Security and Applications, vol. 84, no. June, p. 103821, 2024, doi: 10.1016/j.jisa.2024.103821. DOI: https://doi.org/10.1016/j.jisa.2024.103821
L. Olejnik, C. Castelluccia, and A. Janc, “On the uniqueness of Web browsing history patterns,” Annales des Telecommunications/Annals of Telecommunications, vol. 69, no. 1–2, pp. 63–74, 2014, doi: 10.1007/s12243-013-0392-5. DOI: https://doi.org/10.1007/s12243-013-0392-5
A. Aggarwal, B. Viswanath, L. Zhang, S. Kumar, A. Shah, and P. Kumaraguru, “I spy with my little eye: analysis and detection of spying browser extensions,” P Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018, no. Section 3, pp. 47–61, 2018, doi: 10.1109/EuroSP.2018.00012. DOI: https://doi.org/10.1109/EuroSP.2018.00012
Z. Wang, F. X. Lin, L. Zhong, and M. Chishtie, “How effective is mobile browser cache?,” Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 17–19, 2011, doi: 10.1145/2030686.2030693. DOI: https://doi.org/10.1145/2030686.2030693
Y. Wu, D. Meng, and H. Chen, “Evaluating private modes in desktop and mobile browsers and their resistance to fingerprinting,” Proceedings of the 2017 IEEE Conference on Communications and Network Security, CNS 2017, vol. 2017-Janua, pp. 1–9, 2017, doi: 10.1109/CNS.2017.8228636. DOI: https://doi.org/10.1109/CNS.2017.8228636
Y. Wu, P. Gupta, M. Wei, Y. Acar, S. Fahl, and B. Ur, “Your secrets are safe: How browsers’ explanations impact misconceptions about private browsing mode,” Proceedings of the World Wide Web Conference (WWW 2018) , pp. 217–226, 2018, doi: 10.1145/3178876.3186088. DOI: https://doi.org/10.1145/3178876.3186088
A. Shoeb, “Is private browsing in modern web browsers really private?,” Jan. 2018, doi: 10.48550/arXiv.1802.10523.
A. Kumar et al., “Forensics analysis of TOR browser,” in Lecture Notes in Electrical Engineering, 2024, vol. 1075 LNEE, pp. 331–341, doi: 10.1007/978-981-99-5091-1_24. DOI: https://doi.org/10.1007/978-981-99-5091-1_24
W. L. Chen and W. G. Teng, “Exploiting browsing history for exploratory search,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5617 LNCS, no. PART 1, pp. 355–364, 2009, doi: 10.1007/978-3-642-02556-3_41. DOI: https://doi.org/10.1007/978-3-642-02556-3_41
A. van der Merwe, A. Gerber, and H. Smuts, “Guidelines for conducting design science research in information systems,” Communications in Computer and Information Science, Jul. 2019, vol. 1136 CCIS, pp. 163–178, doi: 10.1007/978-3-030-35629-3_11. DOI: https://doi.org/10.1007/978-3-030-35629-3_11
A. Ahmed, S. Ahmad, N. Ehsan, E. Mirza, and S. Z. Sarwar, “Agile software development: Impact on productivity and quality,” 5th IEEE International Conference on Management of Innovation and Technology (ICMIT2010) , pp. 287–291, 2010, doi: 10.1109/ICMIT.2010.5492703. DOI: https://doi.org/10.1109/ICMIT.2010.5492703
M. Stoica, M. Mircea, and B. Ghilic-Micu, “Software development: Agile vs. traditional,” Informatica Economică., vol. 17, no. 4, 2013, doi: 10.12948/issn14531305/17.4.2013.06. DOI: https://doi.org/10.12948/issn14531305/17.4.2013.06
M. B. Legowo, B. Indiarto, and D. Prayitno, “Agile software methodology with scrum for developing quality assurance system,” Proceedings of the 2nd International Conference of Computer and Informatics Engineering: Artificial Intelligence Roles in Industrial Revolution 4.0, IC2IE 2019 , pp. 104–109, Sep. 2019, doi: 10.1109/IC2IE47452.2019.8940831. DOI: https://doi.org/10.1109/IC2IE47452.2019.8940831
Downloads
How to Cite
Article Metrics
Published
Issue
Section
License
Copyright (c) 2025 Rozha Kamal Ahmed, Silvia Lips, Zryan Najat Rashid (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.