Podcast
Questions and Answers
Tech defaults to prioritizing the desires of ______ groups
Tech defaults to prioritizing the desires of ______ groups
culturally dominant
The Amazon Echo's Drop In feature prioritizes ______ at the expense of other users' agency, privacy, and safety
The Amazon Echo's Drop In feature prioritizes ______ at the expense of other users' agency, privacy, and safety
eavesdropping and monitoring
In abuse situations, it's often not ______ to just edit permissions
In abuse situations, it's often not ______ to just edit permissions
that simple
Abusers will ______ your product
Abusers will ______ your product
Signup and view all the answers
The assumption that our users aren't ______ each other with tech
The assumption that our users aren't ______ each other with tech
Signup and view all the answers
When designing any product or digital experience that will involve couples, families, friends, or workers, we need to dismantle the assumption that these relationships are always ______
When designing any product or digital experience that will involve couples, families, friends, or workers, we need to dismantle the assumption that these relationships are always ______
Signup and view all the answers
The bedrock on which this sits is that abusive relationships are all about ______
The bedrock on which this sits is that abusive relationships are all about ______
Signup and view all the answers
Abusers often have access to their victims’ ______
Abusers often have access to their victims’ ______
Signup and view all the answers
A safer design would send alerts asking for ______ at regular intervals
A safer design would send alerts asking for ______ at regular intervals
Signup and view all the answers
We need to push back against the assumption that technology that enables ______ can be used safely or ethically
We need to push back against the assumption that technology that enables ______ can be used safely or ethically
Signup and view all the answers
Any product capable of ______ needs to staff a customer support line
Any product capable of ______ needs to staff a customer support line
Signup and view all the answers
Designing for users who have a low level of tech literacy will _____ them
Designing for users who have a low level of tech literacy will _____ them
Signup and view all the answers
The concept of 'impact over intent' means that the _________ of our actions is more important than whatever our intentions were
The concept of 'impact over intent' means that the _________ of our actions is more important than whatever our intentions were
Signup and view all the answers
When it comes to the tech we design, _____ is irrelevant, and impact is everything
When it comes to the tech we design, _____ is irrelevant, and impact is everything
Signup and view all the answers
Passwords represent the primary (and sometimes only) method of digital account security and privacy. Technologists design account systems under the assumption that passwords are only known and used by the account owner, but this doesn’t reflect reality. Whenever there’s a power imbalance in a relationship, the person with more power can simply demand ______ and access their victim’s accounts.
Passwords represent the primary (and sometimes only) method of digital account security and privacy. Technologists design account systems under the assumption that passwords are only known and used by the account owner, but this doesn’t reflect reality. Whenever there’s a power imbalance in a relationship, the person with more power can simply demand ______ and access their victim’s accounts.
Signup and view all the answers
An abusive spouse might regularly check their partner’s ______. A homophobic parent might monitor their child’s social media messages. A manager might read a direct report’s ______.
An abusive spouse might regularly check their partner’s ______. A homophobic parent might monitor their child’s social media messages. A manager might read a direct report’s ______.
Signup and view all the answers
Additionally, someone with access to another person’s phone can weaponize various apps for monitoring and stalking by adding themselves as a user or by sharing the victim’s location with their own phone (a form of tech-facilitated abuse that we’ll discuss in Chapter 3). Once we upend the assumption that the only threats to account security are malicious hackers, data breaches, and phishing scams, we’re better positioned to design safeguards into our products so that users can quickly understand when an abuser has infiltrated their ______.
Additionally, someone with access to another person’s phone can weaponize various apps for monitoring and stalking by adding themselves as a user or by sharing the victim’s location with their own phone (a form of tech-facilitated abuse that we’ll discuss in Chapter 3). Once we upend the assumption that the only threats to account security are malicious hackers, data breaches, and phishing scams, we’re better positioned to design safeguards into our products so that users can quickly understand when an abuser has infiltrated their ______.
Signup and view all the answers
One example is location-sharing features: if a user has shared their location with someone, we assume that they meant to do so and are aware of its functionality and effects. We don’t typically incorporate abuse cases into our design strategy, such as when an abuser surreptitiously accesses a user’s phone and shares its location with their own phone. Consent is a theme that will recur over and over again throughout this book, as there are many examples of tech-facilitated abuse that are enabled through issues of assuming ______.
One example is location-sharing features: if a user has shared their location with someone, we assume that they meant to do so and are aware of its functionality and effects. We don’t typically incorporate abuse cases into our design strategy, such as when an abuser surreptitiously accesses a user’s phone and shares its location with their own phone. Consent is a theme that will recur over and over again throughout this book, as there are many examples of tech-facilitated abuse that are enabled through issues of assuming ______.
Signup and view all the answers