Sometimes threats come from inside the system (content warning: intimate partner violence).
This week we're talking with Julia about how to model risk when the threat is known and trusted (e.g., coercion, manipulation and surveillance).
Julia Slupska is a doctoral student at the Centre for Doctoral Training in Cybersecurity and the Oxford Internet Institute. Her research focuses on technologically-mediated abuse like image-based sexual abuse ('revenge porn') and stalking, as well as emotion, care and metaphors in cybersecurity.
Julia's recent papers: Aiding Intimate Violence Survivors in Lockdown: Lessons about Digital Security in the Covid-19 Pandemic (https://dl.acm.org/doi/abs/10.1145/3491101.3503548); Cybersecurity must learn from and support advocates tackling online gender-based violence (https://unidir.org/commentary/cybersecurity-online-GBV).
In this episode we refer to: Ashkan Soltani's article on what 'abusability' is (https://www.wired.com/story/abusability-testing-ashkan-soltani); an example of intimidation during court proceedings held over Zoom court hearing (https://www.youtube.com/watch?v=xgz3Tx69zXk); Trust and Usability Toolkit (https://northumbria.design/projects/trust-and-abusability-toolkit); RightsCon (FREE tickets until June 3rd 2022, rightscon.org/attend); USENIX conference (Privacy Engineering Practice and Respect, or PEPR).