Overview

Security is organized around threats, speculative scenarios that describe possible security outcomes. Speculative scenarios are also used widely in design. This initiative takes inspiration from speculative practices in design to develop new practices for identifying security issues, drawing designers into the work of security in the process.

Security Games
Our security games project combines the strengths of existing security practices with human-centered design. We are developing improvisational role-playing games to help stakeholders imagine the human perpetrators of attacks. These games aim to create more specific, human-centered ways of representing security threats, and to draw new kinds of people into the practice of security: designers, activists, project managers, and more. Try our first game, Adversary Personas (pictured above).

Project Team

Nick Merrill

Director

Joanne Ma

Research Assistant

Contact information
Nick Merrill - ffff at berkeley dot edu
The Security PM
Project managers (PM) oversee design, engineering, and business. As a result, they have an overview that can help them identify possible threats—and could wield enormous leverage in mitigating them. Through on-the-ground interviews and ethnographic work with PMs, this project investigates how project managers identify harms in the technologies they develop. Through a design-led inquiry, we are producing (re)training programs that empower PMs to surface, prioritize, and fix security threats by building on existing practices of design and development.

Project Team

Nick Merrill

Director

Joanne Ma

Research Assistant

Contact information
Nick Merrill - ffff at berkeley dot edu