2020 UK Lockdown Cyber Narratives: the Secure, the Insecure and the Worrying

On the 23rd March 2020, the UK entered a period of lockdown in the face of a deadly pandemic. While some were unable to work from home, many organisations were forced to move their activities online. Here, we discuss the technologies they used, from a privacy and security perspective. We also mention the communication failures that have exacerbated uncertainty and anxiety during the crisis. An organisation could be driven to move their activities online by a range of disasters, of which a global pandemic is only one. We seek, in this paper, to highlight the need for organisations to have contingency plans in place for this kind of eventuality. The insecure usages and poor communications we highlight are a symptom of a lack of advance pre-pandemic planning. We hope that this paper will help organisations to plan more effectively for the future.

[1]  Jeremy Bentham,et al.  The Panopticon Writings , 1995 .

[2]  Lorrie Faith Cranor,et al.  Security and Usability: Designing Secure Systems that People Can Use , 2005 .

[3]  William G. Holt The Communitarian Reader: Beyond the Essentials , 2006 .

[4]  Tamara Dinev,et al.  Internet privacy concerns and beliefs about government surveillance - An empirical investigation , 2008, J. Strateg. Inf. Syst..

[5]  William Sadera,et al.  Cyberethics, Cybersafety, and Cybersecurity , 2011 .

[6]  J. Potterat,et al.  Partner notification for sexually transmitted infections in the modern world: a practitioner perspective on challenges and opportunities , 2011, Sexually Transmitted Infections.

[7]  William Bülow,et al.  Nothing to Hide : The False Tradeoff between Privacy and Security by Daniel J. Solove , 2012 .

[8]  Alan D. Schrift,et al.  Discipline and Punish , 2013 .

[9]  Simone Wannemaker Security And Usability Designing Secure Systems That People Can Use , 2016 .

[10]  Kyung Kyu Kim,et al.  Information and communication technology overload and social networking service fatigue: A stress perspective , 2016, Comput. Hum. Behav..

[11]  Lisa Grow Sun,et al.  War Rhetoric and Disaster Transparency , 2016 .

[12]  David Lyon Bentham’s Panopticon: From Moral Architecture to Electronic Surveillance , 2017 .

[13]  Robin Kleer,et al.  Walking Parallel Paths or Taking the Same Road? The Effect of Collaborative Incentives in Innovation Contests , 2017, Managing Innovation.

[14]  Lorrie Faith Cranor,et al.  Putting Privacy Notices to the Test , 2017 .

[15]  Matthew Deaves,et al.  General Data Protection Regulation (GDPR) , 2017 .

[16]  J. Murphy The General Data Protection Regulation (GDPR) , 2018, Irish medical journal.

[17]  Sandra J Valenti About Being Accessible: Your Communication from a Universal Design Perspective , 2018 .

[18]  J. Mulderrig Multimodal strategies of emotional governance: a critical analysis of ‘nudge’ tactics in health policy , 2018 .

[19]  Nathaniel J. S. Ashby,et al.  The effect of switching costs on choice-inertia and its consequences , 2019, PloS one.

[20]  Carl Landwher,et al.  2018 , 2019, Communications of the ACM.

[21]  Shoshana Zuboff The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power , 2019 .

[22]  Lucie Abeler-Dörner,et al.  Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing , 2020, Science.

[23]  Lorrie Faith Cranor,et al.  Ask the Experts: What Should Be on an IoT Privacy and Security Label? , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[24]  Florimond Houssiau,et al.  Blogpost: Evaluating COVID-19 contact tracing apps? Here are 8 privacy questions we think you should ask , 2020 .

[25]  Mark Zastrow,et al.  South Korea is reporting intimate details of COVID-19 cases: has it helped? , 2020, Nature.

[26]  Kristie B. Hadden,et al.  2020 , 2020, Journal of Surgical Orthopaedic Advances.