Technology-Enabled Abuse
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Tech defaults to prioritizing the desires of ______ groups

culturally dominant

The Amazon Echo's Drop In feature prioritizes ______ at the expense of other users' agency, privacy, and safety

eavesdropping and monitoring

In abuse situations, it's often not ______ to just edit permissions

that simple

Abusers will ______ your product

<p>subvert</p> Signup and view all the answers

The assumption that our users aren't ______ each other with tech

<p>hurting</p> Signup and view all the answers

When designing any product or digital experience that will involve couples, families, friends, or workers, we need to dismantle the assumption that these relationships are always ______

<p>healthy</p> Signup and view all the answers

The bedrock on which this sits is that abusive relationships are all about ______

<p>control</p> Signup and view all the answers

Abusers often have access to their victims’ ______

<p>phones</p> Signup and view all the answers

A safer design would send alerts asking for ______ at regular intervals

<p>consent</p> Signup and view all the answers

We need to push back against the assumption that technology that enables ______ can be used safely or ethically

<p>surveillance</p> Signup and view all the answers

Any product capable of ______ needs to staff a customer support line

<p>harm</p> Signup and view all the answers

Designing for users who have a low level of tech literacy will _____ them

<p>empower</p> Signup and view all the answers

The concept of 'impact over intent' means that the _________ of our actions is more important than whatever our intentions were

<p>actual impact</p> Signup and view all the answers

When it comes to the tech we design, _____ is irrelevant, and impact is everything

<p>intent</p> Signup and view all the answers

Passwords represent the primary (and sometimes only) method of digital account security and privacy. Technologists design account systems under the assumption that passwords are only known and used by the account owner, but this doesn’t reflect reality. Whenever there’s a power imbalance in a relationship, the person with more power can simply demand ______ and access their victim’s accounts.

<p>passwords</p> Signup and view all the answers

An abusive spouse might regularly check their partner’s ______. A homophobic parent might monitor their child’s social media messages. A manager might read a direct report’s ______.

<p>browser history, emails</p> Signup and view all the answers

Additionally, someone with access to another person’s phone can weaponize various apps for monitoring and stalking by adding themselves as a user or by sharing the victim’s location with their own phone (a form of tech-facilitated abuse that we’ll discuss in Chapter 3). Once we upend the assumption that the only threats to account security are malicious hackers, data breaches, and phishing scams, we’re better positioned to design safeguards into our products so that users can quickly understand when an abuser has infiltrated their ______.

<p>accounts</p> Signup and view all the answers

One example is location-sharing features: if a user has shared their location with someone, we assume that they meant to do so and are aware of its functionality and effects. We don’t typically incorporate abuse cases into our design strategy, such as when an abuser surreptitiously accesses a user’s phone and shares its location with their own phone. Consent is a theme that will recur over and over again throughout this book, as there are many examples of tech-facilitated abuse that are enabled through issues of assuming ______.

<p>consent</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser