Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3313831.3376339acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Privacy and Activism in the Transgender Community

Published: 23 April 2020 Publication History

Abstract

Transgender people are marginalized, facing specific privacy concerns and high risk of online and offline harassment, discrimination, and violence. They also benefit tremendously from technology. We conducted semi-structured interviews with 18 transgender people from 3 U.S. cities about their computer security and privacy experiences broadly construed. Participants frequently returned to themes of activism and prosocial behavior, such as protest organization, political speech, and role-modeling transgender identities, so we focus our analysis on these themes. We identify several prominent risk models related to visibility, luck, and identity that participants used to analyze their own risk profiles, often as distinct or extreme. These risk perceptions may heavily influence transgender people's defensive behaviors and self-efficacy, jeopardizing their ability to defend themselves or gain technology's benefits. We articulate design lessons emerging from these ideas, contrasting and relating them to lessons about other marginalized groups whenever possible.

Supplementary Material

ZIP File (paper212aux.zip)
Auxiliary material contains a single PDF which includes a) our demographic questionnaire and b) our interview protocol used by interviewers for this study.

References

[1]
Alex A. Ahmed, Teresa Almeida, Judeth Oden Choi, Jon Pincus, and Kelly Ireland. 2018. What's at Issue: Sex, Stigma, and Politics in ACM Publishing. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (CHI EA '18). ACM, NY, NY, USA, Article alt07, 10 pages.
[2]
Tousif Ahmed, Roberto Hoyle, Kay Connelly, David Crandall, and Apu Kapadia. 2015. Privacy concerns and behaviors of people with visual impairments. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, NY, NY, USA, 3523--3532.
[3]
Tousif Ahmed, Roberto Hoyle, Patrick Shaffer, Kay Connelly, David Crandall, and Apu Kapadia. 2017. Understanding the Physical Safety, Security, and Privacy Concerns of People with Visual Impairments. IEEE Internet Computing 21, 3 (May/June 2017), 56--63.
[4]
Kevin L Ard and Harvey J Makadon. 2011. Addressing Intimate Partner Violence in Lesbian, Gay, Bisexual, and Transgender Patients. Journal of General Internal Medicine 26, 8 (March 2011), 930--933.
[5]
Shiri Azenkot, Kyle Rector, Richard Ladner, and Jacob Wobbrock. 2012. PassChords: secure multi-touch authentication for blind people. In Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility (ASSETS '12). ACM, NY, NY, USA, 159--166.
[6]
MV Lee Badgett, Laura E Durso, and Alyssa Schneebaum. 2013. New patterns of poverty in the lesbian, gay, and bisexual community. (2013).
[7]
Rosanna Bellini, Angelika Strohmayer, Ebtisam Alabdulqader, Alex A. Ahmed, Katta Spiel, Shaowen Bardzell, and Madeline Balaam. 2018. Feminist HCI: Taking Stock, Moving Forward, and Engaging Community. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (CHI EA '18). ACM, NY, NY, USA, Article SIG02, 4 pages.
[8]
Lindsay Blackwell, Jean Hardy, Tawfiq Ammari, Tiffany Veinot, Cliff Lampe, and Sarita Schoenebeck. 2016. LGBT parents and social media: Advocacy, privacy, and disclosure during shifting social movements. In Proceedings of the 2016 CHI conference on human factors in computing systems (CHI '16). ACM, NY, NY, USA, 610--622.
[9]
Erin Brady, Meredith Ringel Morris, Yu Zhong, Samuel White, and Jeffrey P Bigham. 2013. Visual challenges in the everyday lives of blind people. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13). ACM, NY, NY, USA, 2117--2126.
[10]
Burcu Bulgurcu, Hasan Cavusoglu, and Izak Benbasat. 2010. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly 34, 3 (2010), 523--548.
[11]
Michael P Carey and Andrew D Forsyth. 2019. Teaching Tip Sheet: Self-Efficacy. (2019). https://www.apa.org/pi/aids/resources/education/self-efficacy Accessed 17-December-2019.
[12]
Matthew Carrasco and Andruid Kerne. 2018. Queer Visibility: Supporting LGBT+ Selective Visibility on Social Media. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, NY, NY, USA, 250.
[13]
Anthony D'Augelli. 1998. Lesbian, gay, and bisexual youth and their families: disclosure of sexual orientation and its consequences. In American Journal of Orthopsychiatry, Vol. 68.
[14]
Michael A DeVito, Ashley Marie Walker, and Jeremy Birnholtz. 2018. 'Too Gay for Facebook' Presenting LGBTQ+ Identity Throughout the Personal Social Media Ecosystem. Proceedings of the ACM on Human-Computer Interaction Vol. 2, CSCW (Nov. 2018), 1--23.
[15]
Franco Dispenza, Laurel B Watson, Y Barry Chung, and Greg Brack. 2012. Experience of career-related discrimination for female-to-male transgender persons: A qualitative study. The Career Development Quarterly 60, 1 (March 2012), 65--81.
[16]
Stefanie Duguay. 2016. "He has a way gayer Facebook than I do": Investigating sexual identity disclosure and context collapse on a social networking site. New Media & Society 18, 6 (2016), 891--907.
[17]
Ame Elliott and Sara Brody. 2015. Straight Talk: New Yorkers On Mobile Messaging And Implications For Privacy. (2015), 13.
[18]
Jesse Fox and Rachel Ralston. 2016. Queer identity online: Informal learning and teaching experiences of LGBTQ individuals on social media. Computers in Human Behavior 65 (Dec 2016), 635--642.
[19]
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. "A Stalker's Paradise": How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, NY, NY, USA, 667.
[20]
Samantha Friedman, Angela Reynolds, Susan Scovill, Florence Brassier, Ron Campbell, and McKenzie Ballou. 2013. An estimate of housing discrimination against same-sex couples. (2013).
[21]
Lesbian Gay, Straight Education Network, and others. 2013. Out online: The experiences of lesbian, gay, bisexual and transgender youth on the Internet. (2013). https://www.glsen.org/news/out-online-experiences-lgbt-youth-internet Accessed 17-December-2019.
[22]
GLAAD. 2018. Glossary of Terms - Transgender. (2018). https://www.glaad.org/reference/transgender Accessed 17-December-2019.
[23]
Erving Goffman. 1956. The presentation of self in everyday life. Anchor Books, New York, New York.
[24]
Google. 2019. Advanced Protection Program. (2019). https://landing.google.com/advancedprotection/. Accessed 17-December-2019.
[25]
Jaime M Grant, Lisa Mottet, Justin Edward Tanis, Jack Harrison, Jody Herman, and Mara Keisling. 2011. Injustice at every turn: A report of the national transgender discrimination survey. (2011).
[26]
Ann P Haas, Philip L Rodgers, and Jody L Herman. 2014. Suicide attempts among transgender and gender non-conforming adults. work 50 (2014), 59.
[27]
Oliver L Haimson. 2019. Mapping gender transition sentiment patterns via social media data: toward decreasing transgender mental health disparities. Journal of the American Medical Informatics Association (2019).
[28]
Oliver L Haimson, Jed R Brubaker, Lynn Dombrowski, and Gillian R Hayes. 2015. Disclosure, stress, and support during gender transition on Facebook. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15). ACM, NY, NY, USA, 1176--1190.
[29]
Oliver L Haimson, Jed R Brubaker, Lynn Dombrowski, and Gillian R Hayes. 2016. Digital footprints and changing networks during online identity transitions. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, NY, NY, USA, 2895--2907.
[30]
Oliver L Haimson and Gillian R Hayes. 2017. Changes in social media affect, disclosure, and sociality for a sample of transgender Americans in 2016's political climate. In Proceedings of Eleventh International AAAI Conference on Web and Social Media (ICWSM '17). The AAAI Press.
[31]
Oliver L Haimson and Anna Lauren Hoffmann. 2016. Constructing and enforcing" authentic" identity online: Facebook, real names, and non-normative identities. First Monday 21, 6 (2016).
[32]
Foad Hamidi, Morgan Klaus Scheuerman, and Stacy M Branham. 2018. Gender Recognition or Gender Reductionism?: The Social Implications of Embedded Gender Recognition Systems. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, NY, NY, USA, 8.
[33]
Md Munirul Haque, Shams Zawoad, and Ragib Hasan. 2013. Secure techniques and methods for authenticating visually impaired mobile phone users. In 2013 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 735--740.
[34]
Amanda Holpuch. 2014. Victory for drag queens as Facebook apologises for 'real-name' policy. (2014). https://www.theguardian.com/technology/2014/oct/01/victory-drag-queens-facebook-apologises-real-name-policy Accessed 17-December-2019.
[35]
Stephanie Ann Hooker. 2013. Self-Blame. Springer New York, New York, NY, 1731--1732.
[36]
Farnaz Irannejad Bisafar, Lina Itzel Martinez, and Andrea G Parker. 2018. Social Computing-Driven Activism in Youth Empowerment Organizations: Challenges and Opportunities. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, NY, NY, USA, 183.
[37]
Sandy E James and Jody Herman. 2017. The Report of the 2015 US Transgender Survey: Executive Summary. (2017).
[38]
Shanna K. Kattari, Darren L. Whitfield, N. Eugene Walls, Lisa Langenderfer-Magruder, and Daniel Ramos. 2016. Policing Gender Through Housing and Employment Discrimination: Comparison of Discrimination Experiences of Transgender and Cisgender LGBQ Individuals. Journal of the Society for Social Work and Research 7, 3 (Sept. 2016), 427--447.
[39]
Mark J Keith, Courtenay Maynes, Paul Benjamin Lowry, and Jeffry Babb. 2014. Privacy fatigue: The effect of privacy control complexity on consumer electronic information disclosure. In International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December. 14--17.
[40]
Ronald C Kessler, Guilherme Borges, and Ellen E Walters. 1999. Prevalence of and risk factors for lifetime suicide attempts in the National Comorbidity Survey. Archives of general psychiatry 56, 7 (1999), 617--626.
[41]
Alex S Keuroghlian, Derri Shtasel, and Ellen L Bassuk. 2014. Out on the street: a public health and policy agenda for lesbian, gay, bisexual, and transgender youth who are homeless. American Journal of Orthopsychiatry 84, 1 (2014), 66.
[42]
Joseph G. Kosciw, Neal A. Palmer, and Ryan M. Kull. 2014. Reflecting Resiliency: Openness About Sexual Orientation and/or Gender Identity and Its Relationship to Well-Being and Educational Outcomes for LGBT Students. American Journal of Community Psychology 55, 1--2 (April 2014), 167--178.
[43]
lamblint (Urban Dictionary user). 2017. Truscum. (2017). https://www.urbandictionary.com/define.php?term=truscum Accessed 17-December-2019.
[44]
Hanlin Li, Disha Bora, Sagar Salvi, and Erin Brady. 2018. Slacktivists or Activists?: Identity Work in the Virtual Disability March. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, NY, NY, USA, Article 225, 13 pages.
[45]
Emilia L Lombardi, Riki Anne Wilchins, Dana Priesing, and Diana Malouf. 2002. Gender violence: Transgender experiences with violence and discrimination. Journal of homosexuality 42, 1 (2002), 89--101.
[46]
Mary Madden. 2017. Privacy, Security, and Digital Inequality. (2017).
[47]
Mary Madden, Michele Gilman, Karen Levy, and Alice Marwick. 2017. Privacy, poverty, and big data: A matrix of vulnerabilities for poor Americans. Wash. UL Rev. 95 (2017), 53.
[48]
Alice E. Marwick and danah boyd. 2010. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society 13, 1 (July 2010), 114--133.
[49]
Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F Churchill, and Sunny Consolvo. 2017. Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Proceedings of the 2017 Conference on Interaction Design and Children (IDC '17). ACM, NY, NY, USA.
[50]
Lydia Michie, Madeline Balaam, John McCarthy, Timur Osadchiy, and Kellie Morrissey. 2018. From her story, to our story: Digital storytelling as public engagement around abortion rights advocacy in Ireland. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, NY, NY, USA, 357.
[51]
Brian Mustanski, Rebecca Andrews, and Jae A. Puckett. 2016. The Effects of Cumulative Victimization on Mental Health Among Lesbian, Gay, Bisexual, and Transgender Adolescents and Young Adults. American Journal of Public Health 106, 3 (March 2016).
[52]
Brian Mustanski, Michael Newcomb, and Robert Garofalo. 2011. Mental health of lesbian, gay, and bisexual youth: A developmental resiliency perspective. Journal of Gay & Lesbian Social Services 23, 2 (Jan. 2011).
[53]
Helen Nissenbaum. 79. Privacy as Contextual Integrity. Washington Law Review.
[54]
Matthew K Nock and Ronald C Kessler. 2006. Prevalence of and risk factors for suicide attempts versus suicide gestures: analysis of the National Comorbidity Survey. Journal of abnormal psychology 115, 3 (2006), 616.
[55]
ProPublica. 2019. When Transgender Travelers Walk Into Scanners, Invasive Searches Sometimes Wait on the Other Side. (2019). https://www.propublica.org/article/tsa-transgender-travelers-scanners-invasive-searches\ \-often-wait-on-the-other-side Accessed 17-December-2019.
[56]
Marcus Renner and Ellen Taylor-Powell. 2003. Analyzing qualitative data. Programme Development & Evaluation, University of Wisconsin-Extension Cooperative Extension (2003), 1--10.
[57]
Johnny Saldaña. 2015. The coding manual for qualitative researchers. Sage.
[58]
Morgan Klaus Scheuerman, Stacy M. Branham, and Foad Hamidi. 2018. Safe Spaces and Safe Places: Unpacking Technology-Mediated Experiences of Safety and Harm with Transgender People. Proceedings of the ACM on Human-Computer Interaction 2, CSCW, Article 155 (Nov. 2018), 27 pages.
[59]
Katie A Siek, Yvonne Rogers, and Kay H Connelly. 2005. Fat finger worries: how older and younger users physically interact with PDAs. In IFIP Conference on Human-Computer Interaction (INTERACT '05). Springer, 267--280.
[60]
Janaki Srinivasan, Savita Bailur, Emrys Schoemaker, and Sarita Seshagiri. 2018. Privacy at the margins| The poverty of privacy: Understanding privacy trade-offs from identity infrastructure users in India. International Journal of Communication 12 (2018), 20.
[61]
Sarah E Ullman. 1996. Social reactions, coping strategies, and self-blame attributions in adjustment to sexual assault. Psychology of women quarterly 20, 4 (1996), 505--526.
[62]
Stephen Whittle. 1998. The trans-cyberian mail way. Social & Legal Studies 7, 3 (1998), 389--408.
[63]
Pamela Wisniewski, Heng Xu, Mary Beth Rosson, Daniel F. Perkins, and John M. Carroll. 2016. Dear Diary: Teens Reflect on Their Weekly Online Risk Experiences. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, NY, NY, USA, 3919--3930.
[64]
Pamela J Wisniewski, Heng Xu, Mary Beth Rosson, and John M Carroll. 2014. Adolescent online safety: The "Moral" of the Story. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing (CSCW '14). ACM, New York, New York, USA, 1258--1271.
[65]
Shaomei Wu and Lada A Adamic. 2014. Visually impaired users on an online social network. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, NY, NY, USA, 3133--3142.
[66]
Jillian C York and Dia Kayyali. 2014. Facebook's 'Real Name' Policy Can Cause Real-World Harm for the LGBTQ Community. (2014). https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-\ \harm-lgbtq-community Accessed 17-December-2019.

Cited By

View all
  • (2024)Targets of Weaponized Islamophobia: The Impact of Misinformation on the Online Practices of Muslims in the United StatesProceedings of the ACM on Human-Computer Interaction10.1145/36374038:CSCW1(1-38)Online publication date: 26-Apr-2024
  • (2024)Privacy Norms of Transformative Fandom: A Case Study of an Activity-Defined CommunityProceedings of the ACM on Human-Computer Interaction10.1145/36373888:CSCW1(1-29)Online publication date: 26-Apr-2024
  • (2024)Expanding Concepts of Non-Consensual Image-Disclosure Abuse: A Study of NCIDA in PakistanProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642871(1-17)Online publication date: 11-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems
April 2020
10688 pages
ISBN:9781450367080
DOI:10.1145/3313831
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 April 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. gender identity
  2. presentation management
  3. privacy
  4. security
  5. social networks
  6. transgender
  7. user-centered design

Qualifiers

  • Research-article

Conference

CHI '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)228
  • Downloads (Last 6 weeks)13
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Targets of Weaponized Islamophobia: The Impact of Misinformation on the Online Practices of Muslims in the United StatesProceedings of the ACM on Human-Computer Interaction10.1145/36374038:CSCW1(1-38)Online publication date: 26-Apr-2024
  • (2024)Privacy Norms of Transformative Fandom: A Case Study of an Activity-Defined CommunityProceedings of the ACM on Human-Computer Interaction10.1145/36373888:CSCW1(1-29)Online publication date: 26-Apr-2024
  • (2024)Expanding Concepts of Non-Consensual Image-Disclosure Abuse: A Study of NCIDA in PakistanProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642871(1-17)Online publication date: 11-May-2024
  • (2024)Counting Carrds: Investigating Personal Disclosure and Boundary Management in Transformative FandomProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642664(1-13)Online publication date: 11-May-2024
  • (2024)Cruising Queer HCI on the DL: A Literature Review of LGBTQ+ People in HCIProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642494(1-21)Online publication date: 11-May-2024
  • (2024)“Vulnerable, Victimized, and Objectified”: Understanding Ableist Hate and Harassment Experienced by Disabled Content Creators on Social MediaProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641949(1-19)Online publication date: 11-May-2024
  • (2024)More Than Binary: Transgender and Non-binary Perspectives on Human Robot InteractionProceedings of the 2024 ACM/IEEE International Conference on Human-Robot Interaction10.1145/3610977.3634939(697-705)Online publication date: 11-Mar-2024
  • (2024)Pathways to Euphoria: Deconstructing Gender-Expansive Adults Conceptualizations of WellbeingInternational Journal of Applied Positive Psychology10.1007/s41042-024-00149-29:2(719-745)Online publication date: 31-Jan-2024
  • (2024)Bluetooth security analysis of general and intimate health IoT devices and apps: the case of FemTechInternational Journal of Information Security10.1007/s10207-024-00883-3Online publication date: 16-Aug-2024
  • (2024)Overview of Usable Privacy Research: Major Themes and Research DirectionsThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_3(43-102)Online publication date: 20-Mar-2024
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media