{"id":8909,"date":"2021-11-12T14:35:11","date_gmt":"2021-11-12T14:35:11","guid":{"rendered":"http:\/\/TheNextWeb=1373091"},"modified":"2021-11-12T14:35:11","modified_gmt":"2021-11-12T14:35:11","slug":"safety-by-design-features-can-reduce-stalking-and-domestic-violence-but-we-need-companies-to-apply-it","status":"publish","type":"post","link":"https:\/\/www.londonchiropracter.com\/?p=8909","title":{"rendered":"\u2018Safety by design\u2019 features can reduce stalking and domestic violence \u2014 but we need companies to apply it"},"content":{"rendered":"\n<p>Mobile phones and online technologies are frequently used by <a href=\"https:\/\/eprints.qut.edu.au\/199781\/1\/V1_Briefing_Paper_template.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">perpetrators of domestic and family violence<\/a> to coerce, control and restrict the freedoms of victims and survivors.<\/p>\n<p>Recent death reviews have found that <a href=\"https:\/\/www.courts.qld.gov.au\/__data\/assets\/pdf_file\/0003\/586182\/domestic-and-family-violence-death-review-and-advisory-board-annual-report-2017-18.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">stalking by technology<\/a> and the use of fake social media identities are becoming more common elements in cases of <a href=\"https:\/\/www.coroners.nsw.gov.au\/content\/dam\/dcj\/ctsd\/coronerscourt\/documents\/reports\/2017-2019_DVDRT_Report.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">domestic and family violence homicide<\/a>.<\/p>\n<p>In Australia, there are two leading agencies working to reduce this kind of technology-enabled abuse: <a href=\"https:\/\/wesnet.org.au\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">WESNET<\/a> and the <a href=\"https:\/\/www.esafety.gov.au\/women\/domestic-family-violence\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">eSafety Commissioner<\/a>. Both provide training for advocates and practitioners, as well as resources for victims and survivors. WESNET also provides <a href=\"https:\/\/wesnet.org.au\/ourwork\/telstra\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">replacement phones<\/a>.<\/p>\n<p>Their work \u2013 and the \u201csafety work\u201d of people experiencing violence \u2013 is made more difficult by tech products and services that treat user safety as an afterthought. Platforms and the tech industry can do a lot to reduce harm by building in user safety from the earliest stages of product design.<\/p>\n<h2>Creating risk<\/h2>\n<p>At present, major tech companies often design and manage devices and digital media without considering user vulnerabilities.<\/p>\n<p><a href=\"https:\/\/support.google.com\/adspolicy\/answer\/9726908?hl=en&amp;ref_topic=29265\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Until 2020<\/a>, Google allowed <a href=\"https:\/\/www.techsafety.org\/spyware-and-stalkerware-phone-surveillance\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">spyware and stalkerware<\/a> \u2013 software designed to be covertly installed on a phone to monitor and record photos, videos, texts, calls, and other information \u2013 to be freely advertised on its platform. It banned the ads amidst mounting evidence that this kind of software is used to <a href=\"https:\/\/nyuscholars.nyu.edu\/en\/publications\/the-spyware-used-in-intimate-partner-violence\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">enact intimate partner violence<\/a>.<\/p>\n<p>In April 2021, Apple released coin-sized tiles called AirTags intended to help people keep track of belongings via Bluetooth signals. After they were criticized as presenting a serious security risk by enabling <a href=\"https:\/\/www.macobserver.com\/news\/airtags-pose-domestic-abuse-risk-leading-nonprofit-warns\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">stalking of intimate partners<\/a>, Apple <a href=\"https:\/\/www.bbc.com\/news\/technology-57351554\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">updated the devices<\/a> to make them beep at random intervals if they were away from the owner\u2019s phone.<\/p>\n<p>Facebook\u2019s new smart glasses have also <a href=\"https:\/\/theconversation.com\/can-facebooks-smart-glasses-be-smart-about-security-and-privacy-170002\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">sparked privacy concerns<\/a>, like <a href=\"https:\/\/mashable.com\/article\/snapchat-spectacles-privacy-safety\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Snapchat\u2019s Spectacles<\/a> and <a href=\"https:\/\/www.wired.com\/story\/google-glass-reasonable-expectation-of-privacy\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Google Glass<\/a> before them. The glasses contain cameras and microphones that enable (potentially covert) recording.<\/p>\n<p><a href=\"https:\/\/tech.fb.com\/ray-ban-and-facebook-introduce-ray-ban-stories-first-generation-smart-glasses\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Facebook did consult groups<\/a> such as the US National Network to End Domestic Violence in an effort to \u201cinnovate responsibly\u201d, though there are still concerns about how the glasses might be used.<\/p>\n<h2>Recognizing user realities and threat<\/h2>\n<p>Traditional ideas of cybersecurity are focused on \u201cstranger threats\u201d. However, to reduce and combat digital domestic and family violence we need an \u201cintimate threat\u201d model.<\/p>\n<p>Partners and families can compel others to provide access to devices. They may be linked to online accounts or able to guess passwords, based on their intimate knowledge of the owner.<\/p>\n<p>In this context, technologies that enable surveillance and recording can be used to constrain and threaten victims and survivors in alarming ways, in everyday life.<\/p>\n<p>Understanding and seeking to alleviate the risk posed by abusers requires platforms and industry to think proactively about how technologies may be co-opted or weaponized.<\/p>\n<h2>Safety by Design<\/h2>\n<p>The eSafety Commissioner\u2019s <a href=\"https:\/\/www.esafety.gov.au\/sites\/default\/files\/2019-10\/SBD%20-%20Quick%20guide.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Safety by Design<\/a> initiative aims to make user safety a priority in the design, development and deployment of online products, and services. The initiative revolves around three basic principles.<\/p>\n<p>The first is that service providers are responsible for making user safety the number one priority. This means platforms and other companies work to anticipate how their products may facilitate, increase or encourage harm. In this way, the burden of safety will not fall solely on the user.<\/p>\n<p>The second is that users should have the power and autonomy to make decisions in their own best interest. Platforms and services should engage in meaningful consultation with users, including diverse and at-risk groups, to ensure their features and functions are accessible and helpful to all.<\/p>\n<p>The third principle is transparency and accountability about operations and published safety objectives is essential. This also helps users to address safety concerns.<\/p>\n<p>There is growing support for these principles among tech companies. Last year IBM published its own guide to \u201c<a href=\"https:\/\/www.ibm.com\/blogs\/policy\/wp-content\/uploads\/2020\/05\/CoerciveControlResistantDesign.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">coercive control resistant design<\/a>\u201d.<\/p>\n<p>Effective approaches must also acknowledge how intersecting or overlapping forms of structural or systemic oppression shape an individual\u2019s experience of technology and can deepen social inequalities.<\/p>\n<p>To realize the goals of safety by design or coercive control resistant design, we will need to review not only the policies but also the actual practices of platforms and industry, as they emerge.<\/p>\n<h2>How tech can improve<\/h2>\n<p>eSafety has produced <a href=\"https:\/\/www.esafety.gov.au\/about-us\/safety-by-design\/assessment-tools\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Safety by Design assessment tools<\/a> to improve and innovate based on good practice and evidence-informed resources and templates.<\/p>\n<p>Platforms and industry have a key role to play in addressing the impacts of domestic and family violence through design. They can and should do more in this space.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/counter.theconversation.com\/content\/170636\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" class=\"js-lazy\"><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><noscript><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/counter.theconversation.com\/content\/170636\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" class><\/noscript><\/p>\n<p><em>Article by <a href=\"https:\/\/theconversation.com\/profiles\/bridget-harris-547362\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Bridget Harris<\/a>, Associate professor, <a href=\"https:\/\/theconversation.com\/institutions\/queensland-university-of-technology-847\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Queensland University of Technology<\/a><\/em><\/p>\n<p><em>This article is republished from <a href=\"https:\/\/theconversation.com\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/technology-enabled-abuse-how-safety-by-design-can-reduce-stalking-and-domestic-violence-170636\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">original article<\/a>.<\/em><\/p>\n<p> <a href=\"https:\/\/thenextweb.com\/news\/safety-by-design-reduce-stalking-violence-need-companies-to-apply-it-syndication\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile phones and online technologies are frequently used by perpetrators of domestic and family violence to coerce, control and restrict the freedoms of victims and survivors. Recent death reviews have found that&#8230;<\/p>\n","protected":false},"author":1,"featured_media":8910,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts\/8909"}],"collection":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8909"}],"version-history":[{"count":0,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts\/8909\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/media\/8910"}],"wp:attachment":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}