Personal profile
Research Statement
My research investigates how Internet of Things (IoT) systems can be exploited for technology-facilitated abuse, particularly against victims of intimate partner violence (IPV). Collaborating with the Gender and Tech group at University College London, I conduct usability tests and risk analyses to identify how features like remote control and enhanced connectivity can be misused for harassment and control. The goal is to develop effective technical solutions that protect vulnerable individuals, inform policy, and promote the design of secure, user-centric smart technologies. By addressing these challenges, my work aims to create a safer digital environment and empower IPV survivors through innovative prevention and mitigation strategies.
Research Focus
- Analysing IoT Exploitation in IPV Contexts:
-
- Vulnerability Assessment: Perform comprehensive evaluations of IoT device architectures to identify security weaknesses that facilitate unauthorized surveillance, environmental manipulation, and interference with safety systems.
- Threat Modeling: Developing and applying advanced threat models to understand and predict how IoT functionalities can be exploited for coercive control and harassment in intimate partner violence (IPV) scenarios.
-
Mapping Tech Abuse Pathways in IoT Ecosystems:
- Risk Trajectory Analysis: Constructing detailed risk models to trace the escalation of technology-facilitated abuse within interconnected IoT environments, identifying key attack vectors and exploitation techniques.
- Attack Vector Identification: Use quantitative and qualitative methodologies to pinpoint specific vulnerabilities and assess their potential impact on vulnerable populations.
-
Developing Technical Mitigation Strategies:
- Proposing and evaluating technical solutions to prevent and mitigate instances of technology-facilitated abuse.
- Enhancing IoT devices' security and privacy features to safeguard against malicious exploitation.
Fingerprint
- 1 Similar Profiles
Collaborations and top research areas from the last five years
-
Connect to protect? Assessing risks in women's personal safety wearables
Thompson, A., Carlin, D., McLaughlin, K. & Tanczer, L., 13 Mar 2024, p. 1. 1 p.Research output: Contribution to conference › Poster › peer-review
21 Downloads (Pure) -
Position paper for the Gender, Online Safety, and Sexuality Workshop (GOSS). Connect to protect: examining the risks of wearable IoT devices in the context of Intimate Partner Violence (IPV)
Thompson, A., Carlin, D., McLaughlin, K. & Tanczer, L., 11 Aug 2024.Research output: Contribution to conference › Other contribution to conference › peer-review
Open AccessFile51 Downloads (Pure) -
Consultation response: strategic framework to end violence against women and girls & foundational action plan for Northern Ireland
Gender and Tech Research Group University College London (UCL) & Queens University Belfast (QUB) Institute of Electronics, Communications and Information Technology (ECIT), 05 Oct 2023, 12 p.Research output: Other contribution
Open AccessFile45 Downloads (Pure)
Prizes
-
Bursary for ACM Europe Summer School on Accessible and Inclusive Technologies
Thompson, A. (Recipient), 01 Mar 2024
Prize: Prize (including medals and awards)
-
Bursary for PETS Conference Attendance
Thompson, A. (Recipient), 01 Jun 2024
Prize: Prize (including medals and awards)
Activities
-
REPHRAIN Annual Showcase and Festival of Privacy:
Thompson, A. (Participant)
25 Mar 2024 → 27 Mar 2024Activity: Participating in or organising an event types › Participation in conference
-
Researching Online Violence against Women and Girls Roundtable
Thompson, A. (Participant)
22 Feb 2024Activity: Participating in or organising an event types › Participation in workshop, seminar, course
-
Tech Roundtable to Inform VKPP/NPCC VAWG Strategic Threat and Risk Assessment
Thompson, A. (Participant)
09 Jan 2024Activity: Participating in or organising an event types › Participation in workshop, seminar, course
-
UNFPA & IoT Device Presentation
Thompson, A. (Presenter)
12 Dec 2023Activity: Talk or presentation types › Oral presentation