ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

USENIX Security '22 - "They Look at Vulnerability and Use That to Abuse You''

Автор: USENIX

Загружено: 2022-10-25

Просмотров: 259

Описание: USENIX Security '22 - "They Look at Vulnerability and Use That to Abuse You'': Participatory Threat Modelling with Migrant Domestic Workers

Julia Słupska and Selina Cho, University of Oxford; Marissa Begonia, Voice of Domestic Workers; Ruba Abu-Salma, King's College London; Nayanatara Prakash, University of Oxford; Mallika Balakrishnan, Migrants Organise

The needs of marginalised groups like migrant domestic workers (MDWs) are often ignored in digital privacy and security research. If considered, MDWs are treated as 'bystanders' or even as threats rather than as targets of surveillance and legitimate security subjects in their own right. Using participatory threat modelling (PTM) as a method of incorporating marginalised populations' experiences, we designed and conducted five workshops with MDWs (n=32) in the UK to identify threats to their privacy and security. We found that MDWs named government surveillance, scams and harassment, and employer monitoring (in this order) as the primary threats to their privacy and security. We also examined the methods MDWs used to stay safe online, such as configuring the privacy settings of their online accounts and creating on- and offline community support networks. Based on our findings, we developed and disseminated a digital privacy and security guide with links to further resources that MDWs can refer to. We conclude by arguing that security research must consider broader social structures like gendered work and racialised border policy that foster insecurity in the lives of MDWs. We also present the key lessons of our work, including considering data sharing from the perspective of stakeholders who do not own technology devices but are affected by them, and reflecting on how security research can stop enabling harmful forms of surveillance.

View the full USENIX Security '22 program at https://www.usenix.org/conference/use...

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
USENIX Security '22 - "They Look at Vulnerability and Use That to Abuse You''

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

USENIX Security '22 - How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical...

USENIX Security '22 - How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical...

IP and Human Creativity in the AI Age: (Panel 2) AI’s Challenges to Non-obviousness

IP and Human Creativity in the AI Age: (Panel 2) AI’s Challenges to Non-obviousness

USENIX Security '22 - Are Your Sensitive Attributes Private? Novel Model Inversion Attribute

USENIX Security '22 - Are Your Sensitive Attributes Private? Novel Model Inversion Attribute

SREcon25 Европа/Ближний Восток/Африка — HyperRouter: уроки, извлеченные из создания L4-загрузочно...

SREcon25 Европа/Ближний Восток/Африка — HyperRouter: уроки, извлеченные из создания L4-загрузочно...

Computer science perspectives on AI legal reasoning | Workshop on Law-Following AI 2025

Computer science perspectives on AI legal reasoning | Workshop on Law-Following AI 2025

Закон POSH (О предотвращении сексуальных домогательств) 2013 г. | UPSC IAS 2022

Закон POSH (О предотвращении сексуальных домогательств) 2013 г. | UPSC IAS 2022

Green Industrial Policy in Multilevel Governance

Green Industrial Policy in Multilevel Governance

Reconfigure: Feminist Action Research in Cybersecurity Report Launch

Reconfigure: Feminist Action Research in Cybersecurity Report Launch

USENIX Security '22 - Under the Hood of DANE Mismanagement in SMTP

USENIX Security '22 - Under the Hood of DANE Mismanagement in SMTP

Мир Будущего 2045 | Как Наука и Технологии Победят Старость

Мир Будущего 2045 | Как Наука и Технологии Победят Старость

SREcon25 Европа/Ближний Восток/Африка — Компьютер хочет потерять ваши данные

SREcon25 Европа/Ближний Восток/Африка — Компьютер хочет потерять ваши данные

4 Hours Chopin for Studying, Concentration & Relaxation

4 Hours Chopin for Studying, Concentration & Relaxation

Как распознать ложь - рассказывает агент ФБР

Как распознать ложь - рассказывает агент ФБР

Противостояние по вопросу доступного жилья | Доннибрук: 19 февраля 2026 г.

Противостояние по вопросу доступного жилья | Доннибрук: 19 февраля 2026 г.

Engaged Scholars Talk: Assessing Community Readiness for Co-Design

Engaged Scholars Talk: Assessing Community Readiness for Co-Design

WEBINAR | EJWOP Precarious Work | February 2026

WEBINAR | EJWOP Precarious Work | February 2026

Учебное пособие по ClickUp — Как использовать ClickUp для начинающих

Учебное пособие по ClickUp — Как использовать ClickUp для начинающих

Музыка для работы - Deep Focus Mix для программирования, кодирования

Музыка для работы - Deep Focus Mix для программирования, кодирования

Navigating Mental Health with SWE PNW: UW SWE February Meeting

Navigating Mental Health with SWE PNW: UW SWE February Meeting

Beer Tax Beats Big Oil, Bold Small Cap for the Community Portfolio & the $880 Billion Space Economy

Beer Tax Beats Big Oil, Bold Small Cap for the Community Portfolio & the $880 Billion Space Economy

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]