Skip to content
A place to gather and organize information about using threat modeling frameworks to deal with social conflict in online systems
Branch: master
Clone or download
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
1-Systems First Update Feb 3, 2019
2-Threats added 'unclothed children' with text examples Jun 24, 2019
3-Controls Update Readme.md Jun 8, 2019
examples Added details from Facebooks "Further update" blog post Mar 21, 2019
images added png version of redhen screencap Sep 5, 2018
references Added Schwab, Metzinger Jul 12, 2019
LICENSE Create LICENSE Feb 3, 2019
README.md Update README.md Oct 28, 2018

README.md

Conflict Modeling

A place to gather and organize information about using threat modeling frameworks to deal with social conflict in online systems. Businesses are named here soley to make discussion concrete, not to criticise their choices.

Frame

In 2018, it is very obvious that there are many problems with the way people behave online, which various people have approached with names like "social threat modeling," or "conflict modeling." This site is intended as a frame for thinking about and collaborating around building blocks to help us understand such conflict, and to engineer ways to address it.

A brief example may help illustrate. When a business is in the news and Yelp detects that people are reviewing it based on the news rather than their experience with the business, they put up an interstitial which tells visitors that they're aware of the problem, what a good review is, and promising to look at the reviews that have been posted for quality. These are engineering decisions around conflict. They put up an interstitial page. They implement a review queue. They might instead lock the business relative to new reviews. They might keep a secret what they look for in moderation. Each of these involves tradeoffs, and my goal in starting this site is to collect the tools that are being used, discuss the tradeoffs, and offer a resource for engineers and managers taking on these complex descisions.

A screenshot from Yelp

Threat Modeling

Threat modeling is a collection of techniques that help us bring structure to analysis of systems to anticipate what might go wrong and address it earlier in the engineering process.

This site is organized along the lines of the 4-question frame for technology threat modeling:

  1. What are we working on?
  2. What can go wrong?
  3. What are we going to do about it?
  4. Did we do a good job?

Amanda Levendowski has made a convincing case that the hardest part of threat modeling conflict is figuring out what to do about the issues that you find. This site aims to track pros and cons of possible methods.

Ways to Contribute

  1. There's a lot of information in the references. It would be great to mine and organize into the 4 question framework.
  2. There are lots of ways to address it which we need to model and discuss. For example, there's plenty of enthusiasm for and criticism of real name policies. Can we pull that information together to be a better resource to help engineers, product managers, executives and advocates to have richer discussions?
You can’t perform that action at this time.