Participatory threat modelling: Exploring paths to reconfigure cybersecurity

J Slupska, SD Dawson Duckworth, L Ma… - extended abstracts of the …, 2021 - dl.acm.org
We present “participatory threat modelling” as a feminist cybersecurity practice which allows
technology research to centre traditionally marginalized and excluded experiences. We …

Hacking humans? Social Engineering and the construction of the “deficient user” in cybersecurity discourses

N Klimburg-Witjes, A Wentland - Science, Technology, & …, 2021 - journals.sagepub.com
Today, social engineering techniques are the most common way of committing cybercrimes
through the intrusion and infection of computer systems. Cybersecurity experts use the term …

Too much information: Questioning security in a post-digital society

L Coles-Kemp, RB Jensen, CPR Heath - … of the 2020 CHI Conference on …, 2020 - dl.acm.org
Whilst user-and people-centered design are accepted routes for digital services, they are
less commonly used in the design of technologies that control access to data and the …

Under surveillance: Technology practices of those monitored by the state

P Sanches, V Tsaknaki, A Rostami… - Proceedings of the 2020 …, 2020 - dl.acm.org
This paper documents the experiences of those living under state surveillance. We
interviewed our participants about how they lived under threat, and how it changed their …

Mechanisms of moral responsibility: Rethinking technologies for domestic violence prevention work

R Bellini, S Forrest, N Westmarland… - Proceedings of the 2020 …, 2020 - dl.acm.org
This paper provides a critical examination of how digital systems within a charitable
organisation in the North of England are being used to both support and challenge male …

" The Personal is Political" Hackathons as Feminist Consciousness Raising

C D'Ignazio, R Michelson, A Hope, J Hoy… - Proceedings of the …, 2020 - dl.acm.org
Initially conceived as problem-focused programming events, hackathons have expanded to
encompass a range of issue areas, stakeholders and activities. There have been important …

Networks of care: Tech abuse advocates' digital security practices

J Slupska, A Strohmayer - 31st USENIX Security Symposium (USENIX …, 2022 - usenix.org
As technology becomes an enabler of relationship abuse and coercive control, advocates
who support survivors develop digital security practices to counter this. Existing research on …

“My sex-related data is more sensitive than my financial data and I want the same level of security and privacy\": User Risk Perceptions and Protective Actions in …

M Mehrnezhad, T Almeida - … of the 2023 European Symposium on …, 2023 - dl.acm.org
The digitalization of the reproductive body has engaged myriads of cutting-edge
technologies in supporting people to know and tackle their intimate health. Generally …

Technologies for social justice: Lessons from sex workers on the front lines

A Strohmayer, J Clamen, M Laing - … of the 2019 CHI conference on …, 2019 - dl.acm.org
This paper provides analysis and insight from a collaborative process with a Canadian sex
worker rights organization called Stella, l'amie de Maimie, where we reflect on the use of …

" They Look at Vulnerability and Use That to Abuse You'': Participatory Threat Modelling with Migrant Domestic Workers

J Slupska, S Cho, M Begonia, R Abu-Salma… - 31st USENIX Security …, 2022 - usenix.org
The needs of marginalised groups like migrant domestic workers (MDWs) are often ignored
in digital privacy and security research. If considered, MDWs are treated as' bystanders' or …