Antiracist economist Kim Crayton says that “intention with out technique is chaos.” We’ve mentioned how our biases, assumptions, and inattention towards marginalized and weak teams result in harmful and unethical tech—however what, particularly, do we have to do to repair it? The intention to make our tech safer just isn’t sufficient; we’d like a technique.
Article Continues Beneath
This chapter will equip you with that plan of motion. It covers methods to combine security ideas into your design work with a view to create tech that’s secure, methods to persuade your stakeholders that this work is critical, and the way to answer the critique that what we really want is extra range. (Spoiler: we do, however range alone just isn’t the antidote to fixing unethical, unsafe tech.)
The method for inclusive security#section2
If you end up designing for security, your targets are to:
- determine methods your product can be utilized for abuse,
- design methods to forestall the abuse, and
- present help for weak customers to reclaim energy and management.
The Course of for Inclusive Security is a instrument that can assist you attain these targets (Fig 5.1). It’s a technique I created in 2018 to seize the varied methods I used to be utilizing when designing merchandise with security in thoughts. Whether or not you’re creating a completely new product or including to an current function, the Course of can assist you make your product secure and inclusive. The Course of consists of 5 basic areas of motion:
- Conducting analysis
- Creating archetypes
- Brainstorming issues
- Designing options
- Testing for security

The Course of is supposed to be versatile—it received’t make sense for groups to implement each step in some conditions. Use the components which are related to your distinctive work and context; that is meant to be one thing you possibly can insert into your current design observe.
And as soon as you utilize it, when you’ve got an thought for making it higher or just need to present context of the way it helped your workforce, please get in contact with me. It’s a dwelling doc that I hope will proceed to be a helpful and sensible instrument that technologists can use of their day-to-day work.
When you’re engaged on a product particularly for a weak group or survivors of some type of trauma, similar to an app for survivors of home violence, sexual assault, or drug habit, make sure to learn Chapter 7, which covers that scenario explicitly and ought to be dealt with a bit in a different way. The rules listed below are for prioritizing security when designing a extra basic product that may have a large consumer base (which, we already know from statistics, will embody sure teams that ought to be shielded from hurt). Chapter 7 is targeted on merchandise which are particularly for weak teams and individuals who have skilled trauma.
Step 1: Conduct analysis#section3
Design analysis ought to embody a broad evaluation of how your tech may be weaponized for abuse in addition to particular insights into the experiences of survivors and perpetrators of that sort of abuse. At this stage, you and your workforce will examine problems with interpersonal hurt and abuse, and discover some other security, safety, or inclusivity points that may be a priority to your services or products, like information safety, racist algorithms, and harassment.
Broad analysis#section4
Your mission ought to start with broad, basic analysis into comparable merchandise and points round security and moral issues which have already been reported. For instance, a workforce constructing a wise dwelling machine would do properly to grasp the multitude of ways in which current sensible dwelling units have been used as instruments of abuse. In case your product will contain AI, search to grasp the potentials for racism and different points which have been reported in current AI merchandise. Practically all forms of know-how have some sort of potential or precise hurt that’s been reported on within the information or written about by teachers. Google Scholar is a useful gizmo for locating these research.
Particular analysis: Survivors#section5
When attainable and acceptable, embody direct analysis (surveys and interviews) with people who find themselves consultants within the types of hurt you have got uncovered. Ideally, you’ll need to interview advocates working within the area of your analysis first so that you’ve a extra strong understanding of the subject and are higher geared up to not retraumatize survivors. When you’ve uncovered attainable home violence points, for instance, the consultants you’ll need to converse with are survivors themselves, in addition to staff at home violence hotlines, shelters, different associated nonprofits, and attorneys.
Particularly when interviewing survivors of any sort of trauma, it is very important pay folks for his or her data and lived experiences. Don’t ask survivors to share their trauma without spending a dime, as that is exploitative. Whereas some survivors could not need to be paid, it is best to all the time make the provide within the preliminary ask. An alternative choice to fee is to donate to a corporation working in opposition to the kind of violence that the interviewee skilled. We’ll discuss extra about methods to appropriately interview survivors in Chapter 6.
Particular analysis: Abusers#section6
It’s unlikely that groups aiming to design for security will be capable to interview self-proclaimed abusers or individuals who have damaged legal guidelines round issues like hacking. Don’t make this a purpose; moderately, attempt to get at this angle in your basic analysis. Intention to grasp how abusers or unhealthy actors weaponize know-how to make use of in opposition to others, how they cowl their tracks, and the way they clarify or rationalize the abuse.
Step 2: Create archetypes#section7
When you’ve completed conducting your analysis, use your insights to create abuser and survivor archetypes. Archetypes should not personas, as they’re not primarily based on actual folks that you just interviewed and surveyed. As an alternative, they’re primarily based in your analysis into possible questions of safety, very similar to once we design for accessibility: we don’t must have discovered a gaggle of blind or low-vision customers in our interview pool to create a design that’s inclusive of them. As an alternative, we base these designs on current analysis into what this group wants. Personas sometimes symbolize actual customers and embody many particulars, whereas archetypes are broader and will be extra generalized.
The abuser archetype is somebody who will have a look at the product as a instrument to carry out hurt (Fig 5.2). They could be attempting to hurt somebody they don’t know via surveillance or nameless harassment, or they might be attempting to manage, monitor, abuse, or torment somebody they know personally.

The survivor archetype is somebody who’s being abused with the product. There are numerous conditions to think about by way of the archetype’s understanding of the abuse and methods to put an finish to it: Do they want proof of abuse they already suspect is going on, or are they unaware they’ve been focused within the first place and must be alerted (Fig 5.3)?

Chances are you’ll need to make a number of survivor archetypes to seize a spread of various experiences. They could know that the abuse is going on however not be capable to cease it, like when an abuser locks them out of IoT units; or they understand it’s occurring however don’t know the way, similar to when a stalker retains determining their location (Fig 5.4). Embody as many of those eventualities as you’ll want to in your survivor archetype. You’ll use these in a while if you design options to assist your survivor archetypes obtain their targets of stopping and ending abuse.

It could be helpful so that you can create persona-like artifacts to your archetypes, such because the three examples proven. As an alternative of specializing in the demographic data we regularly see in personas, give attention to their targets. The targets of the abuser can be to hold out the precise abuse you’ve recognized, whereas the targets of the survivor can be to forestall abuse, perceive that abuse is going on, make ongoing abuse cease, or regain management over the know-how that’s getting used for abuse. Later, you’ll brainstorm methods to stop the abuser’s targets and help the survivor’s targets.
And whereas the “abuser/survivor” mannequin suits most instances, it doesn’t match all, so modify it as you’ll want to. For instance, should you uncovered a problem with safety, similar to the power for somebody to hack into a house digicam system and discuss to kids, the malicious hacker would get the abuser archetype and the kid’s mother and father would get survivor archetype.
Step 3: Brainstorm issues#section8
After creating archetypes, brainstorm novel abuse instances and questions of safety. “Novel” means issues not present in your analysis; you’re attempting to determine utterly new questions of safety which are distinctive to your services or products. The purpose with this step is to exhaust each effort of figuring out harms your product may trigger. You aren’t worrying about methods to stop the hurt but—that comes within the subsequent step.
How may your product be used for any sort of abuse, outdoors of what you’ve already recognized in your analysis? I like to recommend setting apart at the least a couple of hours together with your workforce for this course of.
When you’re on the lookout for someplace to begin, strive doing a Black Mirror brainstorm. This train is predicated on the present Black Mirror, which options tales in regards to the darkish prospects of know-how. Strive to determine how your product could be utilized in an episode of the present—essentially the most wild, terrible, out-of-control methods it might be used for hurt. After I’ve led Black Mirror brainstorms, members normally find yourself having a great deal of enjoyable (which I feel is nice—it’s okay to have enjoyable when designing for security!). I like to recommend time-boxing a Black Mirror brainstorm to half an hour, after which dialing it again and utilizing the remainder of the time pondering of extra sensible types of hurt.
After you’ve recognized as many alternatives for abuse as attainable, you should still not really feel assured that you just’ve uncovered each potential type of hurt. A wholesome quantity of tension is regular if you’re doing this sort of work. It’s frequent for groups designing for security to fret, “Have we actually recognized each attainable hurt? What if we’ve missed one thing?” When you’ve spent at the least 4 hours arising with methods your product might be used for hurt and have run out of concepts, go to the subsequent step.
It’s unattainable to ensure you’ve considered all the pieces; as an alternative of aiming for 100% assurance, acknowledge that you just’ve taken this time and have executed the very best you possibly can, and decide to persevering with to prioritize security sooner or later. As soon as your product is launched, your customers could determine new points that you just missed; goal to obtain that suggestions graciously and course-correct rapidly.
Step 4: Design options#section9
At this level, it is best to have a listing of the way your product can be utilized for hurt in addition to survivor and abuser archetypes describing opposing consumer targets. The subsequent step is to determine methods to design in opposition to the recognized abuser’s targets and to help the survivor’s targets. This step is an effective one to insert alongside current components of your design course of the place you’re proposing options for the varied issues your analysis uncovered.
Some inquiries to ask your self to assist stop hurt and help your archetypes embody:
- Are you able to design your product in such a approach that the recognized hurt can not occur within the first place? If not, what roadblocks can you place as much as stop the hurt from occurring?
- How are you going to make the sufferer conscious that abuse is going on via your product?
- How are you going to assist the sufferer perceive what they should do to make the issue cease?
- Are you able to determine any forms of consumer exercise that may point out some type of hurt or abuse? Might your product assist the consumer entry help?
In some merchandise, it’s attainable to proactively acknowledge that hurt is going on. For instance, a being pregnant app may be modified to permit the consumer to report that they had been the sufferer of an assault, which may set off a suggestion to obtain sources for native and nationwide organizations. This type of proactiveness just isn’t all the time attainable, nevertheless it’s value taking a half hour to debate if any sort of consumer exercise would point out some type of hurt or abuse, and the way your product may help the consumer in receiving assist in a secure method.
That stated, use warning: you don’t need to do something that would put a consumer in hurt’s approach if their units are being monitored. When you do provide some sort of proactive assist, all the time make it voluntary, and assume via different questions of safety, similar to the necessity to preserve the consumer in-app in case an abuser is checking their search historical past. We’ll stroll via an excellent instance of this within the subsequent chapter.
Step 5: Take a look at for security#section10
The ultimate step is to check your prototypes from the perspective of your archetypes: the one that needs to weaponize the product for hurt and the sufferer of the hurt who must regain management over the know-how. Identical to some other sort of product testing, at this level you’ll goal to scrupulously check out your security options so as to determine gaps and proper them, validate that your designs will assist preserve your customers secure, and really feel extra assured releasing your product into the world.
Ideally, security testing occurs together with usability testing. When you’re at an organization that doesn’t do usability testing, you would possibly be capable to use security testing to cleverly carry out each; a consumer who goes via your design trying to weaponize the product in opposition to another person may also be inspired to level out interactions or different components of the design that don’t make sense to them.
You’ll need to conduct security testing on both your remaining prototype or the precise product if it’s already been launched. There’s nothing unsuitable with testing an current product that wasn’t designed with security targets in thoughts from the onset—“retrofitting” it for security is an effective factor to do.
Keep in mind that testing for security entails testing from the angle of each an abuser and a survivor, although it could not make sense so that you can do each. Alternatively, should you made a number of survivor archetypes to seize a number of eventualities, you’ll need to check from the angle of every one.
As with different kinds of usability testing, you because the designer are almost definitely too near the product and its design by this level to be a useful tester; you realize the product too properly. As an alternative of doing it your self, arrange testing as you’ll with different usability testing: discover somebody who just isn’t acquainted with the product and its design, set the scene, give them a process, encourage them to assume out loud, and observe how they try to finish it.
Abuser testing#section11
The purpose of this testing is to grasp how simple it’s for somebody to weaponize your product for hurt. In contrast to with usability testing, you need to make it unattainable, or at the least tough, for them to realize their purpose. Reference the targets within the abuser archetype you created earlier, and use your product in an try to realize them.
For instance, for a health app with GPS-enabled location options, we are able to think about that the abuser archetype would have the purpose of determining the place his ex-girlfriend now lives. With this purpose in thoughts, you’d strive all the pieces attainable to determine the situation of one other consumer who has their privateness settings enabled. You would possibly attempt to see her working routes, view any obtainable data on her profile, view something obtainable about her location (which she has set to non-public), and examine the profiles of some other customers by some means related together with her account, similar to her followers.
If by the top of this you’ve managed to uncover a few of her location information, regardless of her having set her profile to non-public, you realize now that your product permits stalking. The next move is to return to step 4 and work out methods to stop this from occurring. Chances are you’ll must repeat the method of designing options and testing them greater than as soon as.
Survivor testing#section12
Survivor testing entails figuring out methods to give data and energy to the survivor. It may not all the time make sense primarily based on the product or context. Thwarting the try of an abuser archetype to stalk somebody additionally satisfies the purpose of the survivor archetype to not be stalked, so separate testing wouldn’t be wanted from the survivor’s perspective.
Nonetheless, there are instances the place it is smart. For instance, for a wise thermostat, a survivor archetype’s targets could be to grasp who or what’s making the temperature change once they aren’t doing it themselves. You possibly can check this by on the lookout for the thermostat’s historical past log and checking for usernames, actions, and occasions; should you couldn’t discover that data, you’ll have extra work to do in step 4.
One other purpose may be regaining management of the thermostat as soon as the survivor realizes the abuser is remotely altering its settings. Your check would contain trying to determine how to do that: are there directions that specify methods to take away one other consumer and alter the password, and are they simple to search out? This would possibly once more reveal that extra work is required to make it clear to the consumer how they will regain management of the machine or account.
Stress testing#section13
To make your product extra inclusive and compassionate, take into account including stress testing. This idea comes from Design for Actual Life by Eric Meyer and Sara Wachter-Boettcher. The authors identified that personas sometimes middle people who find themselves having an excellent day—however actual customers are sometimes anxious, wired, having a foul day, and even experiencing tragedy. These are known as “stress instances,” and testing your merchandise for customers in stress-case conditions can assist you determine locations the place your design lacks compassion. Design for Actual Life has extra particulars about what it seems like to include stress instances into your design in addition to many different nice techniques for compassionate design.