Participatory threat modelling: exploring paths to reconfigure cybersecurity
We present “participatory threat modelling” as a feminist cybersecurity practice which allows technology research to centre traditionally marginalized and excluded experiences. We facilitated a series of community workshops in which we invited participants to define their own cybersecurity threats,...
Main Authors: | , , , |
---|---|
Format: | Conference item |
Language: | English |
Published: |
Association for Computing Machinery
2021
|
_version_ | 1797087032328060928 |
---|---|
author | Slupska, J Duckworth, SD Ma, L Neff, G |
author_facet | Slupska, J Duckworth, SD Ma, L Neff, G |
author_sort | Slupska, J |
collection | OXFORD |
description | We present “participatory threat modelling” as a feminist cybersecurity practice which allows technology research to centre traditionally marginalized and excluded experiences. We facilitated a series of community workshops in which we invited participants to define their own cybersecurity threats, implement changes to defend themselves, and reflect on the role cybersecurity plays in their lives. In doing so, we contest both hierarchical approaches to users in cybersecurity—which seek to ‘solve’ the problems of human behavior—and a tendency in HCI to equate action research with the development of novel technology solutions. Our findings draw highlight barriers to engaging with cybersecurity, the role of personal experiences (for instance of gender, race or sexuality) in shaping this engagement, and the benefits of communal approaches to cybersecurity. |
first_indexed | 2024-03-07T02:30:22Z |
format | Conference item |
id | oxford-uuid:a70787e2-73ab-4a2f-b6f3-3270f11ed3a9 |
institution | University of Oxford |
language | English |
last_indexed | 2024-03-07T02:30:22Z |
publishDate | 2021 |
publisher | Association for Computing Machinery |
record_format | dspace |
spelling | oxford-uuid:a70787e2-73ab-4a2f-b6f3-3270f11ed3a92022-03-27T02:51:41ZParticipatory threat modelling: exploring paths to reconfigure cybersecurityConference itemhttp://purl.org/coar/resource_type/c_5794uuid:a70787e2-73ab-4a2f-b6f3-3270f11ed3a9EnglishSymplectic ElementsAssociation for Computing Machinery2021Slupska, JDuckworth, SDMa, LNeff, GWe present “participatory threat modelling” as a feminist cybersecurity practice which allows technology research to centre traditionally marginalized and excluded experiences. We facilitated a series of community workshops in which we invited participants to define their own cybersecurity threats, implement changes to defend themselves, and reflect on the role cybersecurity plays in their lives. In doing so, we contest both hierarchical approaches to users in cybersecurity—which seek to ‘solve’ the problems of human behavior—and a tendency in HCI to equate action research with the development of novel technology solutions. Our findings draw highlight barriers to engaging with cybersecurity, the role of personal experiences (for instance of gender, race or sexuality) in shaping this engagement, and the benefits of communal approaches to cybersecurity. |
spellingShingle | Slupska, J Duckworth, SD Ma, L Neff, G Participatory threat modelling: exploring paths to reconfigure cybersecurity |
title | Participatory threat modelling: exploring paths to reconfigure cybersecurity |
title_full | Participatory threat modelling: exploring paths to reconfigure cybersecurity |
title_fullStr | Participatory threat modelling: exploring paths to reconfigure cybersecurity |
title_full_unstemmed | Participatory threat modelling: exploring paths to reconfigure cybersecurity |
title_short | Participatory threat modelling: exploring paths to reconfigure cybersecurity |
title_sort | participatory threat modelling exploring paths to reconfigure cybersecurity |
work_keys_str_mv | AT slupskaj participatorythreatmodellingexploringpathstoreconfigurecybersecurity AT duckworthsd participatorythreatmodellingexploringpathstoreconfigurecybersecurity AT mal participatorythreatmodellingexploringpathstoreconfigurecybersecurity AT neffg participatorythreatmodellingexploringpathstoreconfigurecybersecurity |