Skip to content
This repository has been archived by the owner on Feb 27, 2024. It is now read-only.

vulnerability recognition

Nicky Hickman edited this page Nov 21, 2022 · 1 revision

Definition

Vulnerability recognition is one of four harms mitigation strategies in the human harms framework. It is

  1. the capability of the digital identity ecosystem to recognise that there are P2P decision contexts where some parties or actors could be vulnerable (e.g. they are a child, they are a person living with dementia, they are a refugee) in the digital identity ecosystem and in some or all P2P decision contexts.
  2. the operational practice of the digital identity ecosystem to carry out differentiated risk assessments to determine the likelihood of those P2P decision contexts occurring, and the impact on those parties, and 3) the ability to recognise the characteristics of parties who may be vulnerable in those P2P decision contexts.

Purpose

One of four harms mitigation strategies implemented at the intersection of the external life context and the internal life context focused on protecting from felt harm.

Criterion

Examples

Enabling guardianship Carrying out age verification and creating age-gated digital experiences are examples of harms countermeasures using vulnerability recognition.

Related concepts

Tags

#harmstf