- This event has passed.
Designing a Standard to Minimise Misuse of Technology for Coercive-Control (P2987)
June 11 @ 6:00 pm - 7:00 pm
Henry Nash (P2987 Standard Working Group) will present “Designing a Standard to Minimise Misuse of Technology for Coercive-Control (P2987)” at 6pm (UTC+1) / 1pm EDT on 11 June ’24. Click (https://www.timeanddate.com/worldclock/fixedtime.html?msg=IEEE+SSIT+Lecture%3A+Designing+a+Standard+to+Minimise+Misuse+of+Technology+for+Coercive-Control+%28P2987&iso=20240611T18&p1=78&ah=1).
(https://www.ieee-ukandireland.org/chapters/society-on-social-implications-of-technology/) and SSIT IST-Africa SIGHT are cooperating with a number of IEEE OUs including: North Jersey Section SSIT Chapter; Vancouver Section Jt. Chapter,TEM14/PC26/E25/SIT30; New Jersey Coast Section SIGHT; New Jersey Coast Section Jt. IM/Computer Society Chapter, Southeastern Michigan Section Computer Chapter and Phoenix Section Computer Chapter to organise this SSIT Lecture as a joint Webinar on 11 June ‘24.
Registration
IEEE and SSIT Members as well as non-IEEE Members are invited to (https://events.vtools.ieee.org/m/420067) and participate.
IEEE Members should include their IEEE Membership Number when registering.
Access to online Meeting
Registered participants will be provided with the link prior to the event.
Guest Lecture Focus
It is an uncomfortable truth for designers and operators of technology that it is increasingly being used by perpetrators of interpersonal coercive-control, for example in cases such as domestic abuse. Moreover, this use of technology does not typically involve hacking in the traditional sense, rather the misuse of often well-intentioned standard features – the design of which usually did not include threat analysis of, for instance, an abusive domestic partner who has access to passwords or manages the device/application in question. Examples include tracking of partners and their children, manipulation of social media while gaslighting to cover what is happening, and utilising smart-home devices to secretly monitor movement. In this session we will update you on our progress towards a recommended practice in the Principles of Design and Operation of such technology to minimise this kind of misuse.
Speaker(s): Henry Nash,
Agenda:
18:00 (UTC+1) / 13:00 (EDT) Welcome and Introduction to Guest Speaker
18:05 Lecture
18:45 Questions and Discussions
Virtual: https://events.vtools.ieee.org/m/420067