Cyber Security (CYBER); Implementing Design practices to mitigate consumer IoT-enabled coercive control
ETSI TR 103 936 V1.1.1 (2024-01)
Organization:
ETSI - European Telecommunications Standards Institute
Year: 2024
ETSI - European Telecommunications Standards Institute
Abstract: The use of IoT devices by users to abuse and coerce vulnerable users is a matter that ETSI cannot ignore. The number, and format, of devices, their penetration, and their core functionality, all make them attractive to both the vulnerable user and their abuser. The intent of this work item is to identify design practices that guide the development of measures that allow some degree of mitigation in both the devices themselves and in the services that the devices support.
Thread #1: Coercive control resistant design
The role of coercive control resistant design is addressed in device and service design. It is expected that this will examine and guide the designer on the roles of user identification, location and access control, in order to limit, where possible, the ability of the abusive or coercive party to use the device whilst not limiting the access to the device functionality by the intended user.
Thread #2: Trauma informed design
Trauma informed design requires acceptance that devices are actively targeted as threat-agents of coercion. This element of the work is expected to address feature extensions in IoT devices and services to allow the at risk user to seek help without interference from the coercive party. The work should also identify where future standards are required to further strengthen the protection of the vulnerable user.
Collections
:
-
Statistics
Cyber Security (CYBER); Implementing Design practices to mitigate consumer IoT-enabled coercive control
Show full item record
contributor author | ETSI - European Telecommunications Standards Institute | |
date accessioned | 2024-12-18T15:02:58Z | |
date available | 2024-12-18T15:02:58Z | |
date copyright | 1/10/2024 | |
date issued | 2024 | |
identifier other | tr_103936v010101p.pdf | |
identifier uri | https://yse.yabesh.ir/std/handle/yse/340127 | |
description abstract | The use of IoT devices by users to abuse and coerce vulnerable users is a matter that ETSI cannot ignore. The number, and format, of devices, their penetration, and their core functionality, all make them attractive to both the vulnerable user and their abuser. The intent of this work item is to identify design practices that guide the development of measures that allow some degree of mitigation in both the devices themselves and in the services that the devices support. Thread #1: Coercive control resistant design The role of coercive control resistant design is addressed in device and service design. It is expected that this will examine and guide the designer on the roles of user identification, location and access control, in order to limit, where possible, the ability of the abusive or coercive party to use the device whilst not limiting the access to the device functionality by the intended user. Thread #2: Trauma informed design Trauma informed design requires acceptance that devices are actively targeted as threat-agents of coercion. This element of the work is expected to address feature extensions in IoT devices and services to allow the at risk user to seek help without interference from the coercive party. The work should also identify where future standards are required to further strengthen the protection of the vulnerable user. | |
language | English | |
publisher | ETSI - European Telecommunications Standards Institute | |
title | Cyber Security (CYBER); Implementing Design practices to mitigate consumer IoT-enabled coercive control | en |
title | ETSI TR 103 936 V1.1.1 (2024-01) | num |
type | standard | |
page | 35 | |
status | Published | |
tree | ETSI - European Telecommunications Standards Institute:;2024 | |
contenttype | fulltext | |
scope | - |