Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

“Citizens Too”: Safety Setting Collaboration Among Older Adults with Memory Concerns

Published: 20 August 2021 Publication History

Abstract

Designing technologies that support the cybersecurity of older adults with memory concerns involves wrestling with an uncomfortable paradox between surveillance and independence and the close collaboration of couples. This research captures the interactions between older adult couples where one or both have memory concerns—a primary feature of cognitive decline—as they make decisions on how to safeguard their online activities using a Safety Setting probe we designed, and over the course of several informal interviews and a diary study. Throughout, couples demonstrated a collaborative mentality to which we apply a frame of citizenship in opensource collaboration, specifically (a) histories of participation, (b) lower barriers to participation, and (c) maintaining ongoing contribution. In this metaphor of collaborative enterprise, one partner (or member of the couple) may be the service provider and the other may be the participant, but at varying moments, they may switch roles while still maintaining a collaborative focus on preserving shared assets and freedom on the internet. We conclude with a discussion of what this service provider-contributor mentality means for empowerment through citizenship, and implications for vulnerable populations’ cybersecurity.

References

[1]
I. Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Brooks/Cole.
[2]
R. Bartlett and D. O'Connor. 2007. From personhood to citizenship: Broadening the lens for dementia practice and research. Journal of Aging Studies 21, 2 (Apr. 2007), 107–118.
[3]
R. Batchelor, A. Bobrowicz, R. Mackenzie, and A. Milne. 2012. Challenges of ethical and legal responsibilities when technologies’ uses and users change: Social networking sites, decision-making capacity and dementia. Ethics and Information Technology 14, 2 (Jun. 2012), 99–108.
[4]
E. P. S. Baumer and J. R. Brubaker. 2017. Post-userism. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 6291–6303.
[5]
T. Bielsten and I. Hellström. 2017. A review of couple-centred interventions in dementia: Exploring the what and why—Part A: Dementia. 18, 7 (Nov. 2017), 2436–2449.
[6]
K. Boehner, J. Vertesi, P. Sengers, and P. Dourish. 2007. How HCI interprets the probes. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1077–1086.
[7]
V. Braun and V. Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3, 2 (2006), 77–101.
[8]
A. Brooke and L. Raine. 2019. Key Takeaways on Americans’ Views About Privacy, Surveillance and Data-Sharing. Pew Research Center.
[9]
A. Bruckman. 1993. Gender swapping on the internet. In Proceedings of INET’93.
[10]
S. L. Bryant, A. Forte, and A. Bruckman. 2005. Becoming Wikipedian: Transformation of participation in a collaborative online encyclopedia. In Proceedings of the 2005 ACM International Conference on Supporting Groupwork. 1–10.
[11]
M. Burawoy. 1998. The extended case method. Sociological Theory 16, 1 (1998), 4–33.
[12]
D. K. Citron and B. Wittes. 2017. The internet will not break: Denying bad Samaritans section 230 immunity. Fordham Law Review 86, 2 (2017), Article 3.
[13]
J. Clifford and G. E. Marcus. 1986. Writing Culture: The Poetics and Politics of Ethnography: A School of American Research Advanced Seminar. University of California Press.
[14]
P. Dourish. 2014. Reading and interpreting ethnography. In Ways of Knowing in HCI. Springer-Verlag, 1–23.
[15]
P. Dourish. 2007. Responsibilities and Implications: Further thoughts on ethnography and design. In Proceedings of the 2007 Conference on Designing for User eXperiences. 25:2–25:16.
[16]
T. Erickson and W. A. Kellogg. 2000. Social translucence: An approach to designing systems that support social processes. ACM Transactions of Computing-Human Interaction 7, 1 (Mar. 2000), 59–83.
[17]
Facts and Figures. Retrieved 2019, from https://alz.org/alzheimers-dementia/facts-figures.
[18]
S. Fazio, D. Pace, J. Flinner, and B. Kallmyer. 2018. The fundamentals of person-centered care for individuals with dementia. The Gerontologist 58, suppl_1 (Jan. 2018), S10–S19.
[19]
A. Forte and C. Lampe. 2013. Defining, understanding and supporting open collaboration: Lessons from the literature. American Behavioral Scientist 57, 5 (2013), 535–547.
[20]
D. Freed, J. Palmer, D. Minchala, K. Levy, T. Ristenpart, and N. Dell. 2018. “A stalker's paradise”: How intimate partner abusers exploit technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1–13.
[21]
R. S. Geiger and D. Ribes. 2010. The work of sustaining order in Wikipedia: The banning of a vandal. In Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work. 117–126.
[22]
G. R. Hayes. 2014. Knowing by doing: Action research as an approach to HCI. In Ways of Knowing in HCI. J. S. Olson and W. A. Kellogg (Eds.), Springer, 49–68.
[23]
G. R. Hayes. 2011. The relationship of action research to human-computer interaction. ACM Transactions on Computer-Human Interaction 18, 3 (Aug. 2011), 15:1–15:20.
[24]
D. Heater. 2013. What is citizenship? John Wiley & Sons.
[25]
I. Hellstrom, M. Nolan, and U. Lundh. 2007. Sustaining “couplehood”: Spouses’ strategies for living positively with dementia. Dementia 6, 3 (2007), 383–409.
[26]
I. Hellström, M. Nolan, and U. Lundh. 2005. “We do things together”: A case study of “couplehood” in dementia. Dementia 4, 1 (Feb. 2005), 7–22.
[27]
D. Hornung, C. Müller, I. Shklovski, T. Jakobi, and V. Wulf. 2017. Navigating relationships and boundaries: Concerns around ICT-uptake for elderly people. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 7057–7069.
[28]
A. S. Hwang, P. Jackson, A. Sixsmith, L. Nygård, A. Astell, K. N. Truong, and A. Mihailidis. 2020. Exploring how persons with dementia and care couples collaboratively appropriate information and communication technologies. ACM Transactions on Computer-Human Interaction 27, 6 (Nov. 2020), 46:1–46:38.
[29]
S. E. Igo. 2018. The Known Citizen: A History of Privacy in Modern America. Harvard University Press.
[30]
M. S. Jørgensen, F. K. Nissen, J. Paay, J. Kjeldskov, and M. B. Skov. 2016. Monitoring children's physical activity and sleep: A study of surveillance and information disclosure. In Proceedings of the 28th Australian Conference on Computer-Human Interaction. 50–58.
[31]
A. Lazar. 2014. Using technology to increase meaningful engagement in a memory care unit. In Proceedings of the 18th International Conference on Supporting Group Work. 255–257.
[32]
A. Lazar, C. Edasis, and A. M. Piper. 2017. A critical lens on dementia and design in HCI. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 2175–2188.
[33]
A. Lazar, C. Edasis, and A. M. Piper. 2017. Supporting people with dementia in digital social sharing. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 2149–2162.
[34]
G. Madjaroff and H. Mentis. 2017. Narratives of older adults with mild cognitive impairment and their caregivers. In Proceedings of the 19th International ACM SIGACCESS Conference on Computers and Accessibility. 140–149.
[35]
D. Mahoney, R. Purtilo, F. Webbe, M. Alwan, A. Bharucha, T. Adlam, H. Jimison, B. Turner, and S. Becker. 2007. In-home monitoring of persons with dementia: Ethical guidelines for technology research and development. Alzheimer's & Dementia: The Journal of the Alzheimer's Association 3, 3 (Aug. 2007), 217–226.
[36]
A. Marwick and boyd danah. 2010. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society 13, 1 (2010), 114-133.
[37]
D. W. McDonald, S. Gokhman, and M. Zachry. 2012. Building for social translucence: A domain analysis and prototype system. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work. 637–646.
[38]
N. McDonald, A. Larsen, A. Battisti, G. Madjaroff, A. Massey, and H. Mentis. 2020. Realizing choice: Online safeguards for couples adapting to cognitive challenges. In Proceedings of the 16th Symposium on Usable Privacy and Security (SOUPS’20). 99–110.
[39]
N. McDonald and H. M. Mentis. 2021. Building for “We”: Safety settings for couples with memory concerns. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems.
[40]
H. M. Mentis, G. Madjaroff, A. Massey, and Z. Trendafilova. 2020. The illusion of choice in discussing cybersecurity safeguards between older adults with mild cognitive impairment and their caregivers. In Proceedings of the ACM Conference on Computer-Supported Cooperative Work & Social Computing.
[41]
H. M. Mentis, G. Madjaroff, and A. K. Massey. 2019. Upside and downside risk in online security for older adults with mild cognitive impairment. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 343:1–343:13.
[42]
Mild Cognitive Impairment—Symptoms and Causes. Retrieved 2019, from https://www.mayoclinic.org/diseases-conditions/mild-cognitive-impairment/symptoms-causes/syc-20354578.
[43]
H. Nissenbaum. 2004. Privacy as contextual integrity. Washington Law Review 79, 1 (2004), 101–139.
[44]
L. Palen and P. Dourish. 2003. Unpacking “privacy” for a networked world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 129–136.
[45]
A. M. Piper, R. Cornejo, L. Hurwitz, and C. Unumb. 2016. Technological caregiving: Supporting online activity for adults with cognitive impairments. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI’16). 5311–5323.
[46]
Y. Rogers. 1997. Reconfiguring the social scientist: Shifting from telling designers what to do to getting more involved. In Social Science, Technical Systems, and Cooperative Work: Beyond the Great Divide. Psychology Press.
[47]
J. Ruby (Ed.). 1981. A Crack in the Mirror: Reflexive Perspectives in Anthropology. University of Pennsylvania Press.
[48]
P. S. Sachdev et al. 2015. The Prevalence of Mild Cognitive Impairment in Diverse Geographical and Ethnocultural Regions: The COSMIC Collaboration. PLoS ONE 10, 11 (Nov. 2015).
[49]
A. Schutz. 1967. The Phenomenology of the Social World. Northwestern University Press.
[50]
S. L. Star. 1999. The ethnography of infrastructure. American Behavioral Scientist 43, 3 (Nov. 1999), 377–391.
[51]
L. A. Suchman. 1987. Plans and Situated Actions: The Problem of Human-Computer Communication. Cambridge University Press.
[52]
B. Tejada-Vera. 2013. Mortality from Alzheimer's disease in the United States: Data for 2000 and 2010. NCHS Data Brief 116 (Mar. 2013), 1–8.
[53]
Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, and Ron Deibert. 2019. The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry. Retrieved 2019, from https://citizenlab.ca/2019/06/the-predator-in-your-pocket-a-multidisciplinary-assessment-of-the-stalkerware-application-industry/.
[54]
S. Turkle. 1997. Life on the Screen: Identity in the Age of the Internet. Simon & Schuster.
[55]
D. Unbehaun, K. Aal, R. Wieching, V. Wulf, D. D. Vaziri, S. Jahnke, and B. Wulf. 2019. Development of an ICT-based training system for people with dementia. In Proceedings of Companion Publication of the 2019 on Designing Interactive Systems Conference 2019 Companion. 65–68.
[56]
J. Vines, G. Pritchard, P. Wright, P. Olivier, and K. Brittain. 2015. An age-old problem: Examining the discourses of ageing in HCI and strategies for future research. ACM Transactions on Computer-Human Interaction 22, 1 (Feb. 2015), 2:1–2:27.
[57]
A. F. Westin. 1967. Privacy and Freedom. Atheneum.
[58]
What Is Mild Cognitive Impairment? Retrieved 2019, from https://www.nia.nih.gov/health/what-mild-cognitive-impairment.
[59]
P. Wisniewski, A. K. Ghosh, H. Xu, M. B. Rosson, and J. M. Carroll. 2017. Parental control vs. teen self-regulation: Is there a middle ground for mobile online safety? In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. 51–69.
[60]
J. Zimmerman and J. Forlizzi. 2014. Research through design in HCI. In Ways of Knowing in HCI. J. S. Olson and W. A. Kellogg (Eds.), Springer, 167–189.
[61]
S. Zuboff. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs.

Cited By

View all
  • (2024)Proxy Accounts and Behavioural Nudges: Investigating Support for Older Adults and their Financial DelegatesProceedings of the 50th Graphics Interface Conference10.1145/3670947.3670962(1-14)Online publication date: 3-Jun-2024
  • (2023)Participación ciudadana de adultos mayores en modernización estatal: Una revisión de la literaturaLATAM Revista Latinoamericana de Ciencias Sociales y Humanidades10.56712/latam.v4i5.13214:5Online publication date: 7-Nov-2023
  • (2023)Characterizing the Technology Needs of Vulnerable Populations for Participation in Research and Design by Adopting Maslow’s Hierarchy of NeedsProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581221(1-20)Online publication date: 19-Apr-2023
  • Show More Cited By

Index Terms

  1. “Citizens Too”: Safety Setting Collaboration Among Older Adults with Memory Concerns

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Computer-Human Interaction
    ACM Transactions on Computer-Human Interaction  Volume 28, Issue 5
    October 2021
    308 pages
    ISSN:1073-0516
    EISSN:1557-7325
    DOI:10.1145/3481685
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 August 2021
    Accepted: 01 May 2021
    Revised: 01 May 2021
    Received: 01 December 2020
    Published in TOCHI Volume 28, Issue 5

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Memory
    2. cybersecurity
    3. couples
    4. older adults

    Qualifiers

    • Research-article
    • Refereed

    Funding Sources

    • National Science Foundation

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)72
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 09 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Proxy Accounts and Behavioural Nudges: Investigating Support for Older Adults and their Financial DelegatesProceedings of the 50th Graphics Interface Conference10.1145/3670947.3670962(1-14)Online publication date: 3-Jun-2024
    • (2023)Participación ciudadana de adultos mayores en modernización estatal: Una revisión de la literaturaLATAM Revista Latinoamericana de Ciencias Sociales y Humanidades10.56712/latam.v4i5.13214:5Online publication date: 7-Nov-2023
    • (2023)Characterizing the Technology Needs of Vulnerable Populations for Participation in Research and Design by Adopting Maslow’s Hierarchy of NeedsProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581221(1-20)Online publication date: 19-Apr-2023
    • (2023)Assessing the health ability based on health monitoring using fuzzy for monitoring geriatrics care and amputeesSoft Computing10.1007/s00500-023-08229-2Online publication date: 27-Apr-2023
    • (2022)Barriers to Online Dementia Information and MitigationProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3517554(1-14)Online publication date: 29-Apr-2022
    • (2022)Unofficial Proxies: How Close Others Help Older Adults with BankingProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3501845(1-13)Online publication date: 29-Apr-2022
    • (2022)Accessible and Inclusive Cyber Security: A Nuanced and Complex ChallengeSN Computer Science10.1007/s42979-022-01239-13:5Online publication date: 22-Jun-2022

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media