Participatory threat modelling: exploring paths to reconfigure cybersecurity

We present “participatory threat modelling” as a feminist cybersecurity practice which allows technology research to centre traditionally marginalized and excluded experiences. We facilitated a series of community workshops in which we invited participants to define their own cybersecurity threats,...

Full description

Bibliographic Details
Main Authors: Slupska, J, Duckworth, SD, Ma, L, Neff, G
Format: Conference item
Language:English
Published: Association for Computing Machinery 2021
_version_ 1797087032328060928
author Slupska, J
Duckworth, SD
Ma, L
Neff, G
author_facet Slupska, J
Duckworth, SD
Ma, L
Neff, G
author_sort Slupska, J
collection OXFORD
description We present “participatory threat modelling” as a feminist cybersecurity practice which allows technology research to centre traditionally marginalized and excluded experiences. We facilitated a series of community workshops in which we invited participants to define their own cybersecurity threats, implement changes to defend themselves, and reflect on the role cybersecurity plays in their lives. In doing so, we contest both hierarchical approaches to users in cybersecurity—which seek to ‘solve’ the problems of human behavior—and a tendency in HCI to equate action research with the development of novel technology solutions. Our findings draw highlight barriers to engaging with cybersecurity, the role of personal experiences (for instance of gender, race or sexuality) in shaping this engagement, and the benefits of communal approaches to cybersecurity.
first_indexed 2024-03-07T02:30:22Z
format Conference item
id oxford-uuid:a70787e2-73ab-4a2f-b6f3-3270f11ed3a9
institution University of Oxford
language English
last_indexed 2024-03-07T02:30:22Z
publishDate 2021
publisher Association for Computing Machinery
record_format dspace
spelling oxford-uuid:a70787e2-73ab-4a2f-b6f3-3270f11ed3a92022-03-27T02:51:41ZParticipatory threat modelling: exploring paths to reconfigure cybersecurityConference itemhttp://purl.org/coar/resource_type/c_5794uuid:a70787e2-73ab-4a2f-b6f3-3270f11ed3a9EnglishSymplectic ElementsAssociation for Computing Machinery2021Slupska, JDuckworth, SDMa, LNeff, GWe present “participatory threat modelling” as a feminist cybersecurity practice which allows technology research to centre traditionally marginalized and excluded experiences. We facilitated a series of community workshops in which we invited participants to define their own cybersecurity threats, implement changes to defend themselves, and reflect on the role cybersecurity plays in their lives. In doing so, we contest both hierarchical approaches to users in cybersecurity—which seek to ‘solve’ the problems of human behavior—and a tendency in HCI to equate action research with the development of novel technology solutions. Our findings draw highlight barriers to engaging with cybersecurity, the role of personal experiences (for instance of gender, race or sexuality) in shaping this engagement, and the benefits of communal approaches to cybersecurity.
spellingShingle Slupska, J
Duckworth, SD
Ma, L
Neff, G
Participatory threat modelling: exploring paths to reconfigure cybersecurity
title Participatory threat modelling: exploring paths to reconfigure cybersecurity
title_full Participatory threat modelling: exploring paths to reconfigure cybersecurity
title_fullStr Participatory threat modelling: exploring paths to reconfigure cybersecurity
title_full_unstemmed Participatory threat modelling: exploring paths to reconfigure cybersecurity
title_short Participatory threat modelling: exploring paths to reconfigure cybersecurity
title_sort participatory threat modelling exploring paths to reconfigure cybersecurity
work_keys_str_mv AT slupskaj participatorythreatmodellingexploringpathstoreconfigurecybersecurity
AT duckworthsd participatorythreatmodellingexploringpathstoreconfigurecybersecurity
AT mal participatorythreatmodellingexploringpathstoreconfigurecybersecurity
AT neffg participatorythreatmodellingexploringpathstoreconfigurecybersecurity