• 0
    • ارسال درخواست
    • حذف همه
    • Industrial Standards
    • Defence Standards
  • درباره ما
  • درخواست موردی
  • فهرست استانداردها
    • Industrial Standards
    • Defence Standards
  • راهنما
  • Login
  • لیست خرید شما 0
    • ارسال درخواست
    • حذف همه
View Item 
  •   YSE
  • Industrial Standards
  • ETSI - European Telecommunications Standards Institute
  • View Item
  •   YSE
  • Industrial Standards
  • ETSI - European Telecommunications Standards Institute
  • View Item
  • All Fields
  • Title(or Doc Num)
  • Organization
  • Year
  • Subject
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Archive

Cyber Security (CYBER); Implementing Design practices to mitigate consumer IoT-enabled coercive control

ETSI TR 103 936 V1.1.1 (2024-01)

Organization:
ETSI - European Telecommunications Standards Institute
Year: 2024

ETSI - European Telecommunications Standards Institute

Abstract: The use of IoT devices by users to abuse and coerce vulnerable users is a matter that ETSI cannot ignore. The number, and format, of devices, their penetration, and their core functionality, all make them attractive to both the vulnerable user and their abuser. The intent of this work item is to identify design practices that guide the development of measures that allow some degree of mitigation in both the devices themselves and in the services that the devices support. Thread #1: Coercive control resistant design The role of coercive control resistant design is addressed in device and service design. It is expected that this will examine and guide the designer on the roles of user identification, location and access control, in order to limit, where possible, the ability of the abusive or coercive party to use the device whilst not limiting the access to the device functionality by the intended user. Thread #2: Trauma informed design Trauma informed design requires acceptance that devices are actively targeted as threat-agents of coercion. This element of the work is expected to address feature extensions in IoT devices and services to allow the at risk user to seek help without interference from the coercive party. The work should also identify where future standards are required to further strengthen the protection of the vulnerable user.
URI: https://yse.yabesh.ir/std/handle/yse/340127
Collections :
  • ETSI - European Telecommunications Standards Institute
  • Download PDF : (549.7Kb)
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Cyber Security (CYBER); Implementing Design practices to mitigate consumer IoT-enabled coercive control

Show full item record

contributor authorETSI - European Telecommunications Standards Institute
date accessioned2024-12-18T15:02:58Z
date available2024-12-18T15:02:58Z
date copyright1/10/2024
date issued2024
identifier othertr_103936v010101p.pdf
identifier urihttps://yse.yabesh.ir/std/handle/yse/340127
description abstractThe use of IoT devices by users to abuse and coerce vulnerable users is a matter that ETSI cannot ignore. The number, and format, of devices, their penetration, and their core functionality, all make them attractive to both the vulnerable user and their abuser. The intent of this work item is to identify design practices that guide the development of measures that allow some degree of mitigation in both the devices themselves and in the services that the devices support. Thread #1: Coercive control resistant design The role of coercive control resistant design is addressed in device and service design. It is expected that this will examine and guide the designer on the roles of user identification, location and access control, in order to limit, where possible, the ability of the abusive or coercive party to use the device whilst not limiting the access to the device functionality by the intended user. Thread #2: Trauma informed design Trauma informed design requires acceptance that devices are actively targeted as threat-agents of coercion. This element of the work is expected to address feature extensions in IoT devices and services to allow the at risk user to seek help without interference from the coercive party. The work should also identify where future standards are required to further strengthen the protection of the vulnerable user.
languageEnglish
publisherETSI - European Telecommunications Standards Institute
titleCyber Security (CYBER); Implementing Design practices to mitigate consumer IoT-enabled coercive controlen
titleETSI TR 103 936 V1.1.1 (2024-01)num
typestandard
page35
statusPublished
treeETSI - European Telecommunications Standards Institute:;2024
contenttypefulltext
scope-
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian
 
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian