Skip to main navigation Skip to search Skip to main content
No photo of Adrianne Thompson
20232024

Research activity per year

Personal profile

Research Statement

My research investigates how Internet of Things (IoT) systems can be exploited for technology-facilitated abuse, particularly against victims of intimate partner violence (IPV). Collaborating with the Gender and Tech group at University College London, I conduct usability tests and risk analyses to identify how features like remote control and enhanced connectivity can be misused for harassment and control. The goal is to develop effective technical solutions that protect vulnerable individuals, inform policy, and promote the design of secure, user-centric smart technologies. By addressing these challenges, my work aims to create a safer digital environment and empower IPV survivors through innovative prevention and mitigation strategies.

Research Focus

  • Analysing IoT Exploitation in IPV Contexts:
    • Vulnerability Assessment: Perform comprehensive evaluations of IoT device architectures to identify security weaknesses that facilitate unauthorized surveillance, environmental manipulation, and interference with safety systems.
    • Threat Modeling: Developing and applying advanced threat models to understand and predict how IoT functionalities can be exploited for coercive control and harassment in intimate partner violence (IPV) scenarios.
  • Mapping Tech Abuse Pathways in IoT Ecosystems:

    • Risk Trajectory Analysis: Constructing detailed risk models to trace the escalation of technology-facilitated abuse within interconnected IoT environments, identifying key attack vectors and exploitation techniques.
    • Attack Vector Identification: Use quantitative and qualitative methodologies to pinpoint specific vulnerabilities and assess their potential impact on vulnerable populations.
  • Developing Technical Mitigation Strategies:

    • Proposing and evaluating technical solutions to prevent and mitigate instances of technology-facilitated abuse.
    • Enhancing IoT devices' security and privacy features to safeguard against malicious exploitation.

Fingerprint

Dive into the research topics where Adrianne Thompson is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or