Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Protecting The Vulnerable: Dimensions of Assisted Digital Access

Published: 11 November 2022 Publication History
  • Get Citation Alerts
  • Abstract

    A successful digital society is, in part, predicated on people having secure access to digitally-delivered services when they need it. It has long been recognised that parts of society are not able to access digital services without assistance, often as a result of economic precarity. During the COVID-19 pandemic, the importance of third and voluntary sector organisations in providing assisted digital access has come to the fore. As access to essential everyday services moved to digital-only and family and friendship networks of support became disrupted by the pandemic, for many, voluntary and third sector organisations were the source of digital assistance to claim welfare, pay bills, take part in education and purchase food. Our study explores the types of assisted digital access that voluntary and third sector organisations have provided thus far during the COVID-19 pandemic. We capture the dimensions of this assistance and evaluate the steps such organisations take to ensure that this access is safe for both the assister and assisted. From these findings we set out a security strategy with supporting design principles that combines digital security with human security in a security approach we term 'positive-first'.

    References

    [1]
    Anne Adams and Martina Angela Sasse. 1999. Users are not the enemy. Commun. ACM, Vol. 42, 12 (1999), 40--46.
    [2]
    Andrew A Adams and Shirley A Williams. 2014. What's yours is mine and what's mine's my own: joint accounts and digital identity. ACM SIGCAS Computers and Society, Vol. 44, 1 (2014), 15--26.
    [3]
    Age UK. 2021. Digital inclusion and older people --- how have things changed in a Covid-19 world? Online Briefing Paper. https://www.ageuk.org.uk/globalassets/age-uk/documents/reports-and-publications/reports-and-briefings/active-communities/digital-inclusion-in-the-pandemic-final-march-2021.pdf Accessed: 2021-05-02.
    [4]
    Jennifer M Allen, Leo Gugerty, Eric R Muth, and Jenna L Scisco. 2013. Remote Technical Support Requires Diagnosing the End User (Customer) as well as the Computer. Human-Computer Interaction, Vol. 28, 5 (2013), 442--477.
    [5]
    Axelle Asmar, Leo Van Audenhove, and Ilse Mariën. 2020. Social Support for Digital Inclusion: Towards a Typology of Social Support Patterns. Social Inclusion, Vol. 8, 2 (2020), 138--150.
    [6]
    Belén Barros Pena, Bailey Kursar, Rachel E Clarke, Katie Alpin, Merlyn Holkar, and John Vines. 2021a. " Pick Someone Who Can Kick Your Ass"-Moneywork in Financial Third Party Access. Proceedings of the ACM on Human-Computer Interaction, Vol. 4, CSCW3 (2021), 1--28.
    [7]
    Belén Barros Barros Pena, Bailey Kursar, Rachel E Clarke, Katie Alpin, Merlyn Holkar, and John Vines. 2021b. Financial Technologies in the Cycle of Poor Mental Health and Financial Hardship: Towards Financial Citizenship. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1--16.
    [8]
    Andrew A Bayor, Margot Brereton, Laurianne Sitbon, Bernd Ploderer, Filip Bircanin, Benoit Favre, and Stewart Koplick. 2021. Toward a Competency-based Approach to Co-designing Technologies with People with Intellectual Disability. ACM Transactions on Accessible Computing (TACCESS), Vol. 14, 2 (2021), 1--33.
    [9]
    Joseph Bonneau and Sören Preibusch. 2010. The Password Thicket: Technical and Market Failures in Human Authentication on the Web. In WEIS.
    [10]
    Stacy M Branham and Shaun K Kane. 2015. Collaborative accessibility: How blind and sighted companions co-create accessible home spaces. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 2373--2382.
    [11]
    Pam Briggs and Lisa Thomas. 2015. An inclusive, value sensitive design perspective on future identity technologies. ACM Transactions on Computer-Human Interaction (TOCHI), Vol. 22, 5 (2015), 1--28.
    [12]
    Daniel Calderon Gomez. 2020. The third digital divide and Bourdieu: Bidirectional conversion of economic, cultural, and social capital to (and from) digital capital among young people in Madrid. New Media & Society (2020), 1461444820933252.
    [13]
    Priyank Chandra. 2021. Piracy and the Impaired Cyborg: Assistive Technologies, Accessibility, and Access. Proceedings of the ACM on Human-Computer Interaction, Vol. 4, CSCW3 (2021), 1--21.
    [14]
    Chhaya Chouhan, Christy M LaPerriere, Zaina Aljallad, Jess Kropczynski, Heather Lipford, and Pamela J Wisniewski. 2019. Co-designing for community oversight: Helping people make privacy and security decisions together. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1--31.
    [15]
    Carla Cipolla. 2012. Solutions for relational services. Service design with Theory (2012), 37--44.
    [16]
    Carla Cipolla and Ezio Manzini. 2009. Relational services. Knowledge, Technology & Policy, Vol. 22, 1 (2009), 45--50.
    [17]
    Lizzie Coles-Kemp and Claude P. R Heath. 2020. Digital Identity: Ground-up Perspectives.
    [18]
    Cédric Courtois and Pieter Verdegem. 2016. With a little help from my friends: An analysis of the role of social support in digital inequalities. New media & society, Vol. 18, 8 (2016), 1508--1527.
    [19]
    Lorrie Faith Cranor and Simson Garfinkel. 2005. Security and usability: designing secure systems that people can use. " O'Reilly Media, Inc.".
    [20]
    Amber L Cushing. 2016. ?If it computes, patrons have brought it in": Personal information management and personal technology assistance in public libraries. Library & Information Science Research, Vol. 38, 1 (2016), 81--88.
    [21]
    Matthew Davidson, Karen Renaud, and Shujun Li. 2014. jCAPTCHA: accessible human validation. In International Conference on Computers for Handicapped Persons. Springer, 129--136.
    [22]
    Tawanna R Dillahunt, Matthew Garvin, Marcy Held, and Julie Hui. 2021. Implications for Supporting Marginalized Job Seekers: Lessons from Employment Centers. In ACM Conference on Computer-Supported Cooperative Work and Social Computing.
    [23]
    Paul DiMaggio, Eszter Hargittai, Coral Celeste, Steven Shafer, et al. 2004. From unequal access to differentiated use: A literature review and agenda for research on digital inequality. Social inequality, Vol. 1 (2004), 355--400.
    [24]
    Roxanne Lynn Doty. 1998. Immigration and the Politics of Security. Security studies, Vol. 8, 2--3 (1998), 71--93.
    [25]
    Paul Dunphy, Andrew Monk, John Vines, Mark Blythe, and Patrick Olivier. 2014a. Designing for spontaneous and secure delegation in digital payments. Interacting with Computers, Vol. 26, 5 (2014), 417--432.
    [26]
    Paul Dunphy, John Vines, Lizzie Coles-Kemp, Rachel Clarke, Vasilis Vlachokyriakos, Peter Wright, John McCarthy, and Patrick Olivier. 2014b. Understanding the experience-centeredness of privacy and security technologies. In Proceedings of the 2014 New Security Paradigms Workshop. 83--94.
    [27]
    Serge Egelman, AJ Bernheim Brush, and Kori M Inkpen. 2008. Family accounts: A new paradigm for user accounts within the home environment. In Proceedings of the 2008 ACM conference on Computer supported cooperative work. 669--678.
    [28]
    Valerie Fanelle, Sepideh Karimi, Aditi Shah, Bharath Subramanian, and Sauvik Das. 2020. Blind and Human: Exploring More Usable Audio $$CAPTCHA$$ Designs. In Sixteenth Symposium on Usable Privacy and Security ($$SOUPS$$ 2020). 111--125.
    [29]
    Gunhild Hoogensen Gjørv. 2012. Security by any other name: negative security, positive security, and a multi-actor security approach. Review of international Studies, Vol. 38, 4 (2012), 835--859.
    [30]
    Good Things Foundation. 2021. A new manifesto for digital inclusion. Web page. https://www.goodthingsfoundation.org/insights/new-manifesto-digital-inclusion/ Accessed: 2021-05-02.
    [31]
    Jo ao Guerreiro, Dragan Ahmetovic, Daisuke Sato, Kris Kitani, and Chieko Asakawa. 2019. Airport accessibility and navigation assistance for people with visual impairments. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--14.
    [32]
    Xinning Gui, Yu Chen, Yubo Kou, Katie Pine, and Yunan Chen. 2017. Investigating support seeking from peers for pregnancy in online health communities. Proceedings of the ACM on Human-Computer Interaction, Vol. 1, CSCW (2017), 1--19.
    [33]
    Christina N Harrington. 2020. The forgotten margins: what is community-based participatory health design telling us? Interactions, Vol. 27, 3 (2020), 24--29.
    [34]
    House of Lords Select Committee on COVID 19, UK Parliament. 2021. Select Committee on COVID-19. Corrected oral evidence: Living online. https://committees.parliament.uk/oralevidence/1736/pdf/ Accessed: 2021-05-02.
    [35]
    Joey Chiao-Yin Hsiao and Tawanna R Dillahunt. 2018. Technology to support immigrant access to social capital and adaptation to a new country. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (2018), 1--21.
    [36]
    Julie Hui, Nefer Ra Barber, Wendy Casey, Suzanne Cleage, Danny C Dolley, Frances Worthy, Kentaro Toyama, and Tawanna R Dillahunt. 2020. Community collectives: Low-tech social support for digitally-engaged entrepreneurship. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--15.
    [37]
    Justine Humphry. 2014. The importance of circumstance: digital access and affordability for people experiencing homelessness. Journal of Telecommunications and the Digital Economy, Vol. 2, 3 (2014), 55--1.
    [38]
    Philip G Inglesant and M Angela Sasse. 2010. The true cost of unusable password policies: password use in the wild. In Proceedings of the sigchi conference on human factors in computing systems. 383--392.
    [39]
    Maia Jacobs, Henriette Cramer, and Louise Barkhuus. 2016. Caring about sharing: Couples' practices in single user device access. In Proceedings of the 19th International Conference on Supporting Group Work. 235--243.
    [40]
    Helen Jiang. 2020. Security for People with Mental Illness in Telehealth Systems: A Proposal. arXiv preprint arXiv:2008.03406 (2020).
    [41]
    Jamie Johnston. 2016. Conversation-based programming and newcomer integration: A case study of the Språkhörnan program at Malmö City Library. Library & information science research, Vol. 38, 1 (2016), 10--17.
    [42]
    Vaishnav Kameswaran and Srihari Hulikal Muralidhar. 2019. Cash, Digital Payments and Accessibility: A Case Study from Metropolitan India. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1--23.
    [43]
    M Kr"amer, W Seymour, and I Flechais. 2020. Responsibility and privacy: Caring for a dependent in a digital age. (2020).
    [44]
    Tara Matthews, Kerwell Liao, Anna Turner, Marianne Berkovich, Robert Reeder, and Sunny Consolvo. 2016. " She'll just grab any device that's closer" A Study of Everyday Device & Account Sharing in Households. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 5921--5932.
    [45]
    Michelle L Mazurek, JP Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, et al. 2010. Access control for home data sharing: Attitudes, needs and practices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 645--654.
    [46]
    Nora McDonald and Helena M Mentis. 2021. Building for ?We': Safety Settings for Couples with Memory Concerns. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1--11.
    [47]
    Tamir Mendel and Eran Toch. 2019. My mom was getting this popup: Understanding motivations and processes in helping older relatives with mobile security and privacy. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Vol. 3, 4 (2019), 1--20.
    [48]
    Maggie Morgan, Vicki Hanson, Chris Martin, Janet Hughes, and Alan Newell. 2008. Accessibility Challenge-a Game Show Investigating the Accessibility of Computer Systems for Disabled People. In CHI'08 extended abstracts on Human factors in computing systems. 2609--2610.
    [49]
    NCSC. 2019. Small Charity Guide. https://www.ncsc.gov.uk/collection/charity Accessed:21-04--2022.
    [50]
    NCSC. 2021a. The NCSC's cyber security advice to protect you and your family, and the technology you rely on. https://www.ncsc.gov.uk/section/information-for/individuals-families Accessed:17-04--2022.
    [51]
    NCSC. 2021b. Small & medium sized organisations. https://www.ncsc.gov.uk/section/information-for/small-medium-sized-organisations Accessed:17-04--2022.
    [52]
    James Nicholson, Lynne Coventry, and Pamela Briggs. 2019. " If It's Important It Will Be A Headline" Cybersecurity Information Seeking in Older Adults. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--11.
    [53]
    James Nicholson and Jill McGlasson. 2020. CyberGuardians: improving community cyber resilience through embedded peer-to-peer support. In Companion Publication of the 2020 ACM designing interactive systems conference. 117--121.
    [54]
    James Nicholson, Ben Morrison, Matt Dixon, Jack Holt, Lynne Coventry, and Jill McGlasson. 2021. Training and Embedding Cybersecurity Guardians in Older Communities. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1--15.
    [55]
    Norbert Nthala and Ivan Flechais. 2018. Informal support networks: an investigation into home data security practices. In Fourteenth Symposium on Usable Privacy and Security ($$SOUPS$$ 2018). 63--82.
    [56]
    Ihudiya Finda Ogbonnaya-Ogburu, Kentaro Toyama, and Tawanna R. Dillahunt. 2019. Towards an effective digital literacy intervention to assist returning citizens with job search. In Proceedings of the 2019 CHI conference on Human factors in computing systems. 1--12.
    [57]
    Heidi Kristin Olsen, Roswitha Skare, and Andreas Vårheim. 2020. Digital hjelp på biblioteket. Rød mix: Ragnar Audunson som forsker og nettverksbygger (2020).
    [58]
    Erika Shehan Poole, Marshini Chetty, Tom Morgan, Rebecca E Grinter, and W Keith Edwards. 2009. Computer help at home: methods and motivations for informal technical support. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 739--748.
    [59]
    Massimo Ragnedda and Maria Ruiu. 2017. Social capital and the three levels of digital divide. (2017).
    [60]
    Massimo Ragnedda and Maria Laura Ruiu. 2020. Digital capital: A Bourdieusian perspective on the digital divide. Emerald Group Publishing.
    [61]
    Anita Ramsetty and Cristin Adams. 2020. Impact of the digital divide in the age of COVID-19. Journal of the American Medical Informatics Association, Vol. 27, 7 (2020), 1147--1148.
    [62]
    Elissa M Redmiles, Sean Kross, and Michelle L Mazurek. 2017. Where is the digital divide? a survey of security, privacy, and socioeconomics. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 931--936.
    [63]
    Karen Renaud. 2021. Accessible Cyber Security: The Next Frontier?. In ICISSP. 9--18.
    [64]
    Karen Renaud, Graham Johnson, and Jacques Ophoff. 2021. Accessible authentication: dyslexia and password strategies. Information & Computer Security (2021).
    [65]
    Jahmeilah Roberson and Bonnie Nardi. 2010. Survival needs and social inclusion: Technology use among the homeless. In Proceedings of the 2010 ACM conference on Computer supported cooperative work. 445--448.
    [66]
    Laura Robinson, Jeremy Schulz, Aneka Khilnani, Hiroshi Ono, Shelia R Cotten, Noah Mcclain, Lloyd Levine, Wenhong Chen, Gejun Huang, Antonio A Casilli, et al. 2020. Digital inequalities in time of pandemic: COVID-19 exposure risk profiles and new forms of vulnerability. First Monday, Vol. 25, 10 (2020).
    [67]
    Paul Roe. 2008. The ?value'of positive security. Review of international studies, Vol. 34, 4 (2008), 777--794.
    [68]
    Maria Laura Ruiu and Massimo Ragnedda. 2016. Between digital inclusion and social equality: the role of public libraries in Newcastle upon Tyne. Library and Information Research, Vol. 40, 123 (2016), 69--87.
    [69]
    Jerome H Saltzer and Michael D Schroeder. 1975. The protection of information in computer systems. Proc. IEEE, Vol. 63, 9 (1975), 1278--1308.
    [70]
    M Angela Sasse. 2013. ?Technology Should Be Smarter Than This!": A Vision for Overcoming the Great Authentication Fatigue. In Workshop on Secure Data Management. Springer, 33--36.
    [71]
    Reijo Savolainen. 2016. Approaches to socio-cultural barriers to information seeking. Library & information science research, Vol. 38, 1 (2016), 52--59.
    [72]
    Kjeld Schmidt and Liam Bannon. 1992. Taking CSCW seriously. Computer Supported Cooperative Work (CSCW), Vol. 1, 1 (1992), 7--40.
    [73]
    Neil Selwyn. 2004. Reconsidering political and popular understandings of the digital divide. New media & society, Vol. 6, 3 (2004), 341--362.
    [74]
    Neil Selwyn, Stephen Gorard, and John Furlong. 2005. Whose Internet is it anyway? Exploring adults'(non) use of the Internet in everyday life. European Journal of Communication, Vol. 20, 1 (2005), 5--26.
    [75]
    Kristen Shinohara and Jacob O Wobbrock. 2016. Self-conscious or self-confident? A diary study conceptualizing the social accessibility of assistive technology. ACM Transactions on Accessible Computing (TACCESS), Vol. 8, 2 (2016), 1--31.
    [76]
    Supriya Singh, Anuja Cabraal, Catherine Demosthenous, Gunela Astbrink, and Michele Furlong. 2007. Password sharing: implications for security design based on social practice. In Proceedings of the SIGCHI conference on Human factors in computing systems. 895--904.
    [77]
    Manya Sleeper, Tara Matthews, Kathleen O'Leary, Anna Turner, Jill Palzkill Woelfer, Martin Shelton, Andrew Oplinger, Andreas Schou, and Sunny Consolvo. 2019. Tough times at transitional homeless shelters: Considering the impact of financial insecurity on digital security and privacy. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--12.
    [78]
    Yunpeng Song, Cori Faklaris, Zhongmin Cai, Jason I Hong, and Laura Dabbish. 2019. Normal and Easy: Account Sharing Practices in the Workplace. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1--25.
    [79]
    Dhaval Vyas and Tawanna Dillahunt. 2017. Everyday resilience: Supporting resilient strategies among low socioeconomic status communities. Proceedings of the ACM on Human-Computer Interaction, Vol. 1, CSCW (2017), 1--21.
    [80]
    Yang Wang. 2017. The third wave? Inclusive privacy and security. In Proceedings of the 2017 New Security Paradigms Workshop. 122--130.
    [81]
    Yang Wang. 2018. Inclusive security and privacy. IEEE Security & Privacy, Vol. 16, 4 (2018), 82--87.
    [82]
    Hue Watson, Eyitemi Moju-Igbene, Akanksha Kumari, and Sauvik Das. 2020. "We Hold Each Other Accountable": Unpacking How Social Groups Approach Cybersecurity and Privacy Together. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--12.
    [83]
    Earnest Wheeler and Tawanna R Dillahunt. 2018. Navigating the job search as a low-resourced job seeker. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--10.
    [84]
    Mary Ellen Zurko and Richard T Simon. 1996. User-centered security. In Proceedings of the 1996 workshop on New security paradigms. 27--33. io

    Cited By

    View all
    • (2024)Security Patchworking in Lebanon: Infrastructuring Across Failing InfrastructuresProceedings of the ACM on Human-Computer Interaction10.1145/36373978:CSCW1(1-26)Online publication date: 26-Apr-2024
    • (2024)Hostile Systems: A Taxonomy of Harms Articulated by Citizens Living with Socio-Economic DeprivationProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642562(1-17)Online publication date: 11-May-2024
    • (2023)“As Usual, I Needed Assistance of a Seeing Person”: Experiences and Challenges of People with Disabilities and Authentication Methods2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW59978.2023.00070(575-593)Online publication date: Jul-2023
    • Show More Cited By

    Index Terms

    1. Protecting The Vulnerable: Dimensions of Assisted Digital Access

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Proceedings of the ACM on Human-Computer Interaction
      Proceedings of the ACM on Human-Computer Interaction  Volume 6, Issue CSCW2
      CSCW
      November 2022
      8205 pages
      EISSN:2573-0142
      DOI:10.1145/3571154
      Issue’s Table of Contents
      This work is licensed under a Creative Commons Attribution International 4.0 License.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 11 November 2022
      Published in PACMHCI Volume 6, Issue CSCW2

      Check for updates

      Author Tags

      1. assisted access
      2. digital divide and voluntary and third sector support

      Qualifiers

      • Research-article

      Funding Sources

      • EPSRC

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)103
      • Downloads (Last 6 weeks)12

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Security Patchworking in Lebanon: Infrastructuring Across Failing InfrastructuresProceedings of the ACM on Human-Computer Interaction10.1145/36373978:CSCW1(1-26)Online publication date: 26-Apr-2024
      • (2024)Hostile Systems: A Taxonomy of Harms Articulated by Citizens Living with Socio-Economic DeprivationProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642562(1-17)Online publication date: 11-May-2024
      • (2023)“As Usual, I Needed Assistance of a Seeing Person”: Experiences and Challenges of People with Disabilities and Authentication Methods2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW59978.2023.00070(575-593)Online publication date: Jul-2023
      • (2023)Internet of Things-based care monitoring for the elderly and those with special needsProcedia Computer Science10.1016/j.procs.2023.09.083224:C(572-579)Online publication date: 1-Jan-2023

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media