HRCD
Security

Glossary

TermChapterDefinitionSource
Actor Map
chapter 2
An actor map is a visual depiction of the key organizations and individuals that influence a topic, allowing insight into the players within a system.
Actor Map
chapter 2
An actor map is a visual depiction of the key organizations and individuals that influence a topic, allowing insight into the players within a system.
at-risk communities
introduction
Communities are considered to be “at risk” if they face the risk of a variety of human rights abuses from warrantless surveillance, communications & internet shut-downs, targeting, and harassment to more extreme violations like genocide, war crimes, ethnic cleansing and crimes against humanity.
at-risk communities
introduction
Communities are considered to be “at risk” if they face the risk of a variety of human rights abuses from warrantless surveillance, communications & internet shut-downs, targeting, and harassment to more extreme violations like genocide, war crimes, ethnic cleansing and crimes against humanity.
Blockchain
introduction
A blockchain is a type of Digital Ledger Technology (DLT) that consists of growing list of records, called blocks, that are securely linked together using cryptography.
Blockchain
introduction
A blockchain is a type of Digital Ledger Technology (DLT) that consists of growing list of records, called blocks, that are securely linked together using cryptography.
Co-design
chapter 4
Co-design is about challenging the imbalance of power held within groups of individuals, who make important decisions about others lives, livelihoods and bodies. Often, with little to no involvement of the people who will be most impacted by those decisions. Co-design seeks to change that through building new relationships, capability and capacity for boundless curiosity. It uses inclusive convening to share knowledge and power.
Co-design
chapter 4
Co-design is about challenging the imbalance of power held within groups of individuals, who make important decisions about others lives, livelihoods and bodies. Often, with little to no involvement of the people who will be most impacted by those decisions. Co-design seeks to change that through building new relationships, capability and capacity for boundless curiosity. It uses inclusive convening to share knowledge and power.
Community Partner
chapter 2
A community partner is a group that works to advise and support your work by sharing their lived experience.
Community Partner
chapter 2
A community partner is a group that works to advise and support your work by sharing their lived experience.
Cyber Warfare
introduction
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic warfare.
Cyber Warfare
introduction
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic warfare.
Decentralized Web
introduction
The decentralized web is an abstract concept sought by several researchers. The idea proposes the reorganization of the Internet in order to remove centralized data hosting services, using instead a peer-to-peer infrastructure. Interest in the decentralized web arose due to the lack of trust in network maintenance organizations, due to scandals involving widespread espionage and content control.
Decentralized Web
introduction
The decentralized web is an abstract concept sought by several researchers. The idea proposes the reorganization of the Internet in order to remove centralized data hosting services, using instead a peer-to-peer infrastructure. Interest in the decentralized web arose due to the lack of trust in network maintenance organizations, due to scandals involving widespread espionage and content control.
deepfakes
introduction
a video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
deepfakes
introduction
a video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
Digital redlining
introduction
It is the practice of creating and perpetuating inequities between already marginalized groups specifically through the use of digital technologies, digital content, and the internet
Digital redlining
introduction
It is the practice of creating and perpetuating inequities between already marginalized groups specifically through the use of digital technologies, digital content, and the internet
Doxxing
chapter 1
Doxxing is the act of publicly revealing previously private personal information about an individual or organization, usually via the internet.
Doxxing
chapter 1
Doxxing is the act of publicly revealing previously private personal information about an individual or organization, usually via the internet.
Ecosystem Mapping
chapter 1
The ecosystem map is a synthetic representation capturing all the key roles that have an influence on the user, organization, and service environment. The ecosystem map is built by first displaying all the entities, and then connecting them based on the type of value they exchange.
Ecosystem Mapping
chapter 1
The ecosystem map is a synthetic representation capturing all the key roles that have an influence on the user, organization, and service environment. The ecosystem map is built by first displaying all the entities, and then connecting them based on the type of value they exchange.
Environmental Scan
chapter 1
Understanding the environment your community is affected by and lives in
Environmental Scan
chapter 1
Understanding the environment your community is affected by and lives in
Ethnographic Research
chapter 2
Ethnographic research is a qualitative method where researchers observe and/or interact with a study’s participants in their real-life environment.
Ethnographic Research
chapter 2
Ethnographic research is a qualitative method where researchers observe and/or interact with a study’s participants in their real-life environment.
Global North
chapter 1
The Global North encompasses the rich and powerful regions such as North America, Europe, and Australia. Developed by Emmanuel Wallerstein to describe a global capitalist system that separates countries into the core (the North), semiperiphery, and periphery (the South) based primarily on their economic participation.
Global North
chapter 1
The Global North encompasses the rich and powerful regions such as North America, Europe, and Australia. Developed by Emmanuel Wallerstein to describe a global capitalist system that separates countries into the core (the North), semiperiphery, and periphery (the South) based primarily on their economic participation.
Global South
introduction
The phrase “Global South” refers broadly to the regions of Latin America, Asia, Africa, and Oceania. It is one of a family of terms, including “Third World” and “Periphery,” that denote regions outside Europe and North America, mostly (though not all) low-income and often politically or culturally marginalized.
Global South
introduction
The phrase “Global South” refers broadly to the regions of Latin America, Asia, Africa, and Oceania. It is one of a family of terms, including “Third World” and “Periphery,” that denote regions outside Europe and North America, mostly (though not all) low-income and often politically or culturally marginalized.
human rights centered design
introduction
Human Rights Centered Design insists on the same sovereignty and protection for the user of a product. In essence, this means respecting a user’s privacy and data, thinking about the digital rights of people across the world (instead of just in our own backyards), and designing for all.
human rights centered design
introduction
Human Rights Centered Design insists on the same sovereignty and protection for the user of a product. In essence, this means respecting a user’s privacy and data, thinking about the digital rights of people across the world (instead of just in our own backyards), and designing for all.
Intersectional
chapter 1
Intersectionality is an analytical framework for understanding how aspects of a person's social and political identities combine to create different modes of discrimination and privilege. Intersectional means related to the way in which different types of discrimination (= unfair treatment because of a person's sex, race, etc.) are connected to and affect each other.
Intersectional
chapter 1
Intersectionality is an analytical framework for understanding how aspects of a person's social and political identities combine to create different modes of discrimination and privilege. Intersectional means related to the way in which different types of discrimination (= unfair treatment because of a person's sex, race, etc.) are connected to and affect each other.
Localizing
chapter 2
It is the adaptation of a product or service to meet the needs of a particular language, culture or desired population's "look-and-feel." A successfully localized service or product is one that appears to have been developed within the local culture.
Localizing
chapter 2
It is the adaptation of a product or service to meet the needs of a particular language, culture or desired population's "look-and-feel." A successfully localized service or product is one that appears to have been developed within the local culture.
Marginalized Communities
chapter 1
Marginalized communities are those excluded from mainstream social, economic, educational, and/or cultural life. Examples of marginalized populations include, but are not limited to, groups excluded due to race, gender identity, sexual orientation, age, physical ability, language, and/or immigration status.
Marginalized Communities
chapter 1
Marginalized communities are those excluded from mainstream social, economic, educational, and/or cultural life. Examples of marginalized populations include, but are not limited to, groups excluded due to race, gender identity, sexual orientation, age, physical ability, language, and/or immigration status.
Metadata
chapter 2
Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself
Metadata
chapter 2
Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself
Minimum Viable Product
chapter 9
A minimum viable product, or MVP, is a product with enough features to attract early-adopter customers and validate a product idea early in the product development cycle. In industries such as software, the MVP can help the product team receive user feedback as quickly as possible to iterate and improve the product.
Minimum Viable Product
chapter 9
A minimum viable product, or MVP, is a product with enough features to attract early-adopter customers and validate a product idea early in the product development cycle. In industries such as software, the MVP can help the product team receive user feedback as quickly as possible to iterate and improve the product.
Open Source
chapter 2
Open source software is software with source code that anyone can inspect, modify, and enhance.
Open Source
chapter 2
Open source software is software with source code that anyone can inspect, modify, and enhance.
Participatory Design
chapter 2
Participatory design (originally co-operative design, now often co-design) is an approach to design attempting to actively involve all stakeholders (e.g. employees, partners, customers, citizens, end users) in the design process to help ensure the result meets their needs and is usable. Participatory design is an approach which is focused on processes and procedures of design and is not a design style.
Participatory Design
chapter 2
Participatory design (originally co-operative design, now often co-design) is an approach to design attempting to actively involve all stakeholders (e.g. employees, partners, customers, citizens, end users) in the design process to help ensure the result meets their needs and is usable. Participatory design is an approach which is focused on processes and procedures of design and is not a design style.
participatory research
chapter 5
Participatory Research (PR) is a research-to-action approach that emphasizes direct engagement of local priorities and perspectives (Cornwall & Jewkes, 1995). PR can be defined as an umbrella term for research designs, methods, and frameworks that use systematic inquiry in direct collaboration
participatory research
chapter 5
Participatory Research (PR) is a research-to-action approach that emphasizes direct engagement of local priorities and perspectives (Cornwall & Jewkes, 1995). PR can be defined as an umbrella term for research designs, methods, and frameworks that use systematic inquiry in direct collaboration
Persona
chapter 6
"User personas are [anonymized] archetypical users whose goals and characteristics represent the needs of a larger group of users." User personas are modeled after a particular person, but also incorporate fictional aspects that you use to create ‘ideal personas’ to compare and contrast with the ‘actual personas’. You will present a persona in a one to two-page document that describes their behavior patterns, goals, skills, attitudes, and background information, as well as the environment in which they operate.
Persona
chapter 6
"User personas are [anonymized] archetypical users whose goals and characteristics represent the needs of a larger group of users." User personas are modeled after a particular person, but also incorporate fictional aspects that you use to create ‘ideal personas’ to compare and contrast with the ‘actual personas’. You will present a persona in a one to two-page document that describes their behavior patterns, goals, skills, attitudes, and background information, as well as the environment in which they operate.
Release candidate
chapter 8
A release candidate is like a "sneak preview" of the final release with the added advantage that serious bugs may yet surface and be fixed before the general public uses it.
Release candidate
chapter 8
A release candidate is like a "sneak preview" of the final release with the added advantage that serious bugs may yet surface and be fixed before the general public uses it.
SEO
chapter 7
SEO stands for search engine optimization -- that much has stayed the same. It refers to techniques that help your website rank higher in search engine results pages (SERPs).
SEO
chapter 7
SEO stands for search engine optimization -- that much has stayed the same. It refers to techniques that help your website rank higher in search engine results pages (SERPs).
Stakeholders
chapter 1
Individual or group that has an interest in any decision or activity of an organization.
Stakeholders
chapter 1
Individual or group that has an interest in any decision or activity of an organization.
Structural Harm
chapter 6
Structural violence (harm) is a form of violence wherein some social structure or social institution may harm people by preventing them from meeting their basic needs.
Structural Harm
chapter 6
Structural violence (harm) is a form of violence wherein some social structure or social institution may harm people by preventing them from meeting their basic needs.
Threat-Modelling
chapter 3
Threat modeling is a structured process with these objectives: identify security requirements, pinpoint security threats and potential vulnerabilities, quantify threat and vulnerability criticality, and prioritize remediation methods.
Threat-Modelling
chapter 3
Threat modeling is a structured process with these objectives: identify security requirements, pinpoint security threats and potential vulnerabilities, quantify threat and vulnerability criticality, and prioritize remediation methods.
Web3
introduction
Web3 (also known as Web 3.0) is an idea for a new iteration of the World Wide Web which incorporates concepts such as decentralization, blockchain technologies, and token-based economics.
Web3
introduction
Web3 (also known as Web 3.0) is an idea for a new iteration of the World Wide Web which incorporates concepts such as decentralization, blockchain technologies, and token-based economics.