Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

Co-designing for Community Oversight: Helping People Make Privacy and Security Decisions Together

Published: 07 November 2019 Publication History

Abstract

Collective feedback can support an individual's decision-making process. For instance, individuals often seek the advice of friends, family, and co-workers to help them make privacy decisions. However, current technologies often do not provide mechanisms for this type of collaborative interaction. To address this gap, we propose a novel model of Community Oversight for Privacy and Security ("CO-oPS"), which identifies mechanisms for users to interact with people they trust to help one another make digital privacy and security decisions. We apply our CO-oPS model in the context of mobile applications ("apps"). To interrogate and refine this model, we conducted participatory design sessions with 32 participants in small groups of 2-4 people who know one another, with the goal of designing a mobile app that facilitates collaborative privacy and security decision-making. We describe and reflect on the opportunities and challenges that arise from the unequal motivation and trust in seeking support and giving support within and beyond a community. Through this research, we contribute a novel framework for collaborative digital privacy and security decision-making and provide empirical evidence towards how researchers and designers might translate this framework into design-based features.

References

[1]
Jarle Aarstad, Marcus Selart, and Sigurd Troye. 2011. Advice seeking network structures and the learning organization. Problems and Perspectives in Management 9, 2: 8.
[2]
Yuvraj Agarwal and Malcolm Hall. 2013. ProtectMyPrivacy: Detecting and Mitigating Privacy Leaks on iOS Devices Using Crowdsourcing. In Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '13), 97--110. https://doi.org/10.1145/2462456.2464460
[3]
Hunt Allcott, Matthew Gentzkow, and Chuan Yu. 2019. Trends in the Diffusion of Misinformation on Social Media. National Bureau of Economic Research, Cambridge, MA. https://doi.org/10.3386/w25500
[4]
Stephen J Andriole. 1992. Rapid application prototyping: the storyboard approach to user requirements analysis. QED Technical Publishing Group, Boston, Mass.
[5]
Alastair R. Beresford, Andrew Rice, Nicholas Skehin, and Ripduman Sohan. 2011. MockDroid: Trading Privacy for Application Functionality on Smartphones. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications (HotMobile '11), 49--54. https://doi.org/10.1145/2184489.2184500
[6]
John Carlo Bertot, Ursula Gorham, Paul T. Jaeger, Lindsay C. Sarin, and Heeyoon Choi. 2014. Big data, open government and e-government: Issues, policies and recommendations. Information Polity 19: 5--16. https://doi.org/10.3233/IP-140328
[7]
John Carlo Bertot, Paul T. Jaeger, Sean Munson, and Tom Glaisyer. 2010. Social Media Technology and Government Transparency. Computer 43, 11: 53--59. https://doi.org/10.1109/MC.2010.325
[8]
Lindsay Blackwell, Jean Hardy, Tawfiq Ammari, Tiffany Veinot, Cliff Lampe, and Sarita Schoenebeck. 2016. LGBT Parents and Social Media: Advocacy, Privacy, and Disclosure During Shifting Social Movements. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16), 610--622. https://doi.org/10.1145/2858036.2858342
[9]
Danah Michele Boyd. 2004. Friendster and Publicly Articulated Social Networking. In CHI '04 Extended Abstracts on Human Factors in Computing Systems (CHI EA '04), 1279--1282. https://doi.org/10.1145/985921.986043
[10]
Brent Hecht, Lauren Wilcox, Jeffrey P. Bigham, Johannes Schöning, Ehsan Hoque, Jason Ernst, Yonatan Bisk, Luigi De Russis, Lana Yarosh, Bushra Anjum, Danish Contractor, and Cathy Wu. 2018. It's Time to Do Something: Mitigating the Negative Impacts of Computing Through a Change to the Peer Review Process. ACM FCA. Retrieved June 25, 2019 from https://acm-fca.org/2018/03/29/negativeimpacts/
[11]
John M. Carroll and D. D. Reese. 2003. Community collective efficacy: structure and consequences of perceived capacities in the Blacksburg Electronic Village. In 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the, 10 pp.-. https://doi.org/10.1109/HICSS.2003.1174585
[12]
John M. Carroll, Patrick C. Shih, and Jessica Kropczynski. 2015. Community informatics as innovation in sociotechnical infrastructures. J. Community Informatics 11.
[13]
Erika Chin, Adrienne Porter Felt, Vyas Sekar, and David Wagner. 2012. Measuring user confidence in smartphone security and privacy. In Proceedings of the Eighth Symposium on Usable Privacy and Security - SOUPS '12, 1. https://doi.org/10.1145/2335356.2335358
[14]
Sunny Consolvo, Predrag Klasnja, David W. McDonald, and James A. Landay. 2009. Goal-setting Considerations for Persuasive Technologies That Encourage Physical Activity. In Proceedings of the 4th International Conference on Persuasive Technology (Persuasive '09), 8:1--8:8. https://doi.org/10.1145/1541948.1541960
[15]
Sunny Consolvo, David W. McDonald, and James A. Landay. 2009. Theory-driven Design Strategies for Technologies That Support Behavior Change in Everyday Life. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '09), 405--414. https://doi.org/10.1145/1518701.1518766
[16]
Lorrie Faith Cranor, Adam L. Durity, Abigail Marsh, and Blase Ur. 2014. Parents' and Teens' Perspectives on Privacy in a Technology-filled World. In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security (SOUPS '14), 19--35. Retrieved June 25, 2019 from http://dl.acm.org/citation.cfm?id=3235838.3235841
[17]
Rob Cross, Stephen P Borgatti, and Andrew Parker. 2001. Beyond answers: dimensions of the advice network. Social Networks 23, 3: 215--235. https://doi.org/10.1016/S0378--8733(01)00041--7
[18]
Robert E. Crossler and France Bélanger. 2017. The Mobile Privacy-Security Knowledge Gap Model: Understanding Behaviors. https://doi.org/10.24251/hicss.2017.491
[19]
Sauvik Das, Tiffany Hyun-Jin Kim, Laura A. Dabbish, and Jason I. Hong. 2014. The Effect of Social Influence on Security Sensitivity. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014), 143--157. Retrieved June 25, 2019 from https://www.usenix.org/conference/soups2014/proceedings/presentation/das
[20]
Sauvik Das, Adam D.I. Kramer, Laura A. Dabbish, and Jason I. Hong. 2015. The Role of Social Influence in Security Feature Adoption. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15), 1416--1426. https://doi.org/10.1145/2675133.2675225
[21]
Paul DiGioia and Paul Dourish. 2005. Social Navigation As a Model for Usable Security. In Proceedings of the 2005 Symposium on Usable Privacy and Security (SOUPS '05), 101--108. https://doi.org/10.1145/1073001.1073011
[22]
Carl DiSalvo, Illah Nourbakhsh, David Holstius, Ayça Akin, and Marti Louw. 2008. The Neighborhood Networks Project: A Case Study of Critical Engagement and Creative Expression Through Participatory Design. In Proceedings of the Tenth Anniversary Conference on Participatory Design 2008 (PDC '08), 41--50. Retrieved June 19, 2019 from http://dl.acm.org/citation.cfm?id=1795234.1795241
[23]
Carl DiSalvo and Andrew Clement and Volkmar Pipek. 2012. Communities: Participatory Design for, with and by communities. Communities: Participatory Design for, with and by communities Routledge International Handbook of Participatory Design, edited by Jesper Simonsen and Toni Robertson, Routledge, pp. 182--210. https://doi.org/10.4324/9780203108543--15
[24]
Paul Dourish, E. Grinter, Jessica Delgado de la Flor, and Melissa Joseph. 2004. Security in the Wild: User Strategies for Managing Security As an Everyday, Practical Problem. Personal Ubiquitous Comput. 8, 6: 391--401. https://doi.org/10.1007/s00779-004-0308--5
[25]
Mica R. Endsley. 1995. Toward a Theory of Situation Awareness in Dynamic Systems. Human Factors 37, 1: 32--64. https://doi.org/10.1518/001872095779049543
[26]
Jennifer Fereday and Eimear Muir-Cochrane. 2006. Demonstrating Rigor Using Thematic Analysis: A Hybrid Approach of Inductive and Deductive Coding and Theme Development. International Journal of Qualitative Methods 5, 1: 80--92. https://doi.org/10.1177/160940690600500107
[27]
Leon Festinger. 1954. A Theory of Social Comparison Processes. Human Relations 7, 2: 117--140. https://doi.org/10.1177/001872675400700202
[28]
Alain Forget, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Marian Harbach, and Rahul Telang. 2016. Do or Do Not, There is No Try: User Engagement May Not Improve Security Outcomes. In Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security (SOUPS'16), 97--111. Retrieved July 24, 2018 from http://dl.acm.org/citation.cfm?id=3235895.3235904
[29]
James Garofalo and Maureen McLeod. 1989. The Structure and Operations of Neighborhood Watch Programs in the United States. Crime & Delinquency 35, 3: 326--344. https://doi.org/10.1177/0011128789035003002
[30]
Arup Kumar Ghosh, Karla Badillo-Urquiola, Shion Guha, Joseph J. LaViola Jr, and Pamela J. Wisniewski. 2018. Safety vs. Surveillance: What Children Have to Say About Mobile Apps for Parental Control. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18), 124:1--124:14. https://doi.org/10.1145/3173574.3173698
[31]
Arup Kumar Ghosh, Karla Badillo-Urquiola, Mary Beth Rosson, Heng Xu, John M. Carroll, and Pamela J. Wisniewski. 2018. A Matter of Control or Safety?: Examining Parental Use of Technical Monitoring Apps on Teens' Mobile Devices. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems - CHI '18, 1--14. https://doi.org/10.1145/3173574.3173768
[32]
Peter Gilbert, Byung-Gon Chun, Landon P. Cox, and Jaeyeon Jung. 2011. Vision: automated security validation of mobile apps at app markets. In Proceedings of the second international workshop on Mobile cloud computing and services - MCS '11, 21. https://doi.org/10.1145/1999732.1999740
[33]
Jeremy Goecks, W. Keith Edwards, and Elizabeth D. Mynatt. 2009. Challenges in Supporting End-user Privacy and Security Management with Social Navigation. In Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS '09), 5:1--5:12. https://doi.org/10.1145/1572532.1572539
[34]
Jürgen Habermas. 1984. The theory of communicative action. Beacon Press, Boston.
[35]
Keith Hampton and Barry Wellman. 2003. Neighboring in Netville: How the Internet Supports Community and Social Capital in a Wired Suburb. City and Community 2, 4: 277--311. https://doi.org/10.1046/j.1535--6841.2003.00057.x
[36]
Katy R. Holloway, Trevor H. Bennett, and David P. Farrington. 2008. Does Neighborhood Watch Reduce Crime? Retrieved June 25, 2019 from https://www.hsdl.org/?abstract&did=
[37]
Victor W. Hwang and Greg Horowitt. 2012. The Rainforest: The Secret to Building the Next Silicon Valley. Regenwald, Los Altos Hills, Calif.
[38]
Barbara A. Israel, Amy J. Schulz, Edith A. Parker, and Adam B. Becker. 1998. REVIEW OF COMMUNITY-BASED RESEARCH: Assessing Partnership Approaches to Improve Public Health. Annual Review of Public Health 19, 1: 173--202. https://doi.org/10.1146/annurev.publhealth.19.1.173
[39]
Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman Sadeh, and David Wetherall. 2012. A Conundrum of Permissions: Installing Applications on an Android Smartphone. In Financial Cryptography and Data Security (Lecture Notes in Computer Science), 68--79.
[40]
Holly Korda and Zena Itani. 2013. Harnessing social media for health promotion and behavior change. Health Promotion Practice 14, 1: 15--23. https://doi.org/10.1177/1524839911405850
[41]
David Krackhardt and Jeffrey R. Hanson. 1993. Informal Networks: The Company Behind the Chart. Harvard Business Review. Retrieved July 24, 2018 from https://hbr.org/1993/07/informal-networks-the-company-behind-the-chart
[42]
Rahim Kurwa. 2019. Building the Digitally Gated Community: The Case of Nextdoor. Surveillance & Society 17, 1/2: 111--117. https://doi.org/10.24908/ss.v17i1/2.12927
[43]
Heather Richter Lipford and Mary Ellen Zurko. 2012. Someone to Watch over Me. In Proceedings of the 2012 New Security Paradigms Workshop (NSPW '12), 67--76. https://doi.org/10.1145/2413296.2413303
[44]
Elizabeth J. Lyons, Zakkoyya H. Lewis, Brian G. Mayrsohn, and Jennifer L. Rowland. 2014. Behavior change techniques implemented in electronic lifestyle activity monitors: a systematic content analysis. Journal of Medical Internet Research 16, 8: e192. https://doi.org/10.2196/jmir.3469
[45]
Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, and Sunny Consolvo. 2017. Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17), 2189--2201. https://doi.org/10.1145/3025453.3025875
[46]
K. R. McLeroy, D. Bibeau, A. Steckler, and K. Glanz. 1988. An ecological perspective on health promotion programs. Health Education Quarterly 15, 4: 351--377.
[47]
Brenna McNally, Priya Kumar, Chelsea Hordatt, Matthew Louis Mauriello, Shalmali Naik, Leyla Norooz, Alazandra Shorter, Evan Golub, and Allison Druin. 2018. Co-designing Mobile Online Safety Applications with Children. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems.
[48]
Andrew R. McNeill, Lynne Coventry, Jake Pywell, and Pam Briggs. 2017. Privacy Considerations when Designing Social Network Systems to Support Successful Ageing. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17), 6425--6437. https://doi.org/10.1145/3025453.3025861
[49]
Cheryl Merzel and Joanna D'Afflitti. 2003. Reconsidering Community-Based Health Promotion: Promise, Performance, and Potential. American Journal of Public Health 93, 4: 557--574. https://doi.org/10.2105/AJPH.93.4.557
[50]
Darakhshan J. Mir, Yan Shvartzshnaider, and Mark Latonero. 2018. It Takes a Village: A Community Based Participatory Framework for Privacy Design. In 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS PW), 112--115. https://doi.org/10.1109/EuroSPW.2018.00022
[51]
Michael J. Muller and Allison Druin. 2003. Participatory design: the third space in HCI. In The Human-computer Interaction Handbook, Julie A. Jacko and Andrew Sears (eds.). L. Erlbaum Associates Inc., Hillsdale, NJ, USA.
[52]
Michael J. Muller and Sarah Kuhn. 1993. Participatory Design. Commun. ACM 36, 6: 24--28. https://doi.org/10.1145/153571.255960
[53]
Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.
[54]
Sameer Patil, Xinru Page, and Alfred Kobsa. 2011. With a Little Help from My Friends: Can Social Navigation Inform Interpersonal Privacy Preferences? In Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work (CSCW '11), 391--394. https://doi.org/10.1145/1958824.1958885
[55]
James Pierce, Sarah Fox, Nick Merrill, and Richmond Wong. 2018. Differential Vulnerabilities and a Diversity of Tactics: What Toolkits Teach Us About Cybersecurity. Proc. ACM Hum.-Comput. Interact. 2, CSCW: 139:1--139:24. https://doi.org/10.1145/3274408
[56]
Anaïk Purenne and Grégoire Palierse. 2017. Towards Cities of Informers? Community-Based Surveillance in France and Canada. Surveillance & Society 15, 1: 79--93. https://doi.org/10.24908/ss.v15i1.5619
[57]
Emilee Rader and Rick Wash. 2015. Identifying patterns in informal sources of security information. Journal of Cybersecurity 1, 1: 121--144. https://doi.org/10.1093/cybsec/tyv008
[58]
Emilee Rader, Rick Wash, and Brandon Brooks. 2012. Stories As Informal Lessons About Security. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12), 6:1--6:17. https://doi.org/10.1145/2335356.2335364
[59]
E. M. Redmiles, A. R. Malone, and M. L. Mazurek. 2016. I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security. In 2016 IEEE Symposium on Security and Privacy (SP), 272--288. https://doi.org/10.1109/SP.2016.24
[60]
DENNIS P. ROSENBAUM. 1987. The Theory and Research Behind Neighborhood Watch: Is it a Sound Fear and Crime Reduction Strategy? Crime & Delinquency 33, 1: 103--134. https://doi.org/10.1177/0011128787033001007
[61]
Mary Beth Rosson and John M. Carroll. 2003. The Human-computer Interaction Handbook. In Julie A. Jacko and Andrew Sears (eds.). L. Erlbaum Associates Inc., Hillsdale, NJ, USA, 1032--1050. Retrieved November 8, 2018 from http://dl.acm.org/citation.cfm?id=772072.772137
[62]
Robert J. Sampson, Jeffrey D. Morenoff, and Felton Earls. 1999. Beyond Social Capital: Spatial Dynamics of Collective Efficacy for Children. American Sociological Review 64, 5: 633--660. https://doi.org/10.2307/2657367
[63]
Robert J. Sampson, Stephen W. Raudenbush, and Felton Earls. 1997. Neighborhoods and Violent Crime: A Multilevel Study of Collective Efficacy. Science 277, 5328: 918--924. https://doi.org/10.1126/science.277.5328.918
[64]
Stephen Schneider. 2007. Refocusing Crime Prevention: Collective Action and the Quest for Community. University of Toronto Press. Retrieved March 10, 2019 from https://www.jstor.org/stable/10.3138/j.ctt2tv2h6
[65]
Chengcheng Shao, Giovanni Luca Ciampaglia, Onur Varol, Kaicheng Yang, Alessandro Flammini, and Filippo Menczer. 2018. The spread of low-credibility content by social bots. Nature Communications 9, 1. https://doi.org/10.1038/s41467-018-06930--7
[66]
Wesley G. Skogan. 1989. Communities, Crime, and Neighborhood Organization. Crime & Delinquency 35, 3: 437--457. https://doi.org/10.1177/0011128789035003008
[67]
Clay Spinuzzi. 2005. The methodology of participatory design. Technical Communication: 163--174.
[68]
Beti Thompson, Gloria Coronado, Shedra A. Snipes, and Klaus Puschel. 2003. Methodologic Advances and Ongoing Challenges in Designing Community-Based Health Promotion Programs. Annual Review of Public Health 24, 1: 315--340. https://doi.org/10.1146/annurev.publhealth.24.100901.140819
[69]
Yang Wang. 2017. The Third Wave?: Inclusive Privacy and Security. In Proceedings of the 2017 New Security Paradigms Workshop (NSPW 2017), 122--130. https://doi.org/10.1145/3171533.3171538
[70]
Yang Wang, Pedro Giovanni Leon, Kevin Scott, Xiaoxuan Chen, Alessandro Acquisti, and Lorrie Faith Cranor. 2013. Privacy Nudges for Social Media: An Exploratory Facebook Study. In Proceedings of the 22Nd International Conference on World Wide Web Companion (WWW '13 Companion), 763--770. Retrieved June 12, 2015 from http://dl.acm.org/citation.cfm?id=2487788.2488038
[71]
Barry Wellman. 2005. Community: from neighborhood to network. Communications of the ACM 48, 10: 53. https://doi.org/10.1145/1089107.1089137
[72]
Pamela Wisniewski, Arup Kumar Ghosh, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2017. Parental Control vs. Teen Self-Regulation: Is there a middle ground for mobile online safety? In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing - CSCW '17, 51--69. https://doi.org/10.1145/2998181.2998352
[73]
Catherine G. Wolf and John Karat. 1997. Capturing What is Needed in Multi-user System Design: Observations from the Design of Three Healthcare Systems. In Proceedings of the 2nd Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques (DIS '97), 405--415. https://doi.org/10.1145/263552.263656
[74]
Hengshu Zhu, Hui Xiong, Yong Ge, and Enhong Chen. 2014. Mobile app recommendations with security and privacy awareness. In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '14, 951--960. https://doi.org/10.1145/2623330.2623705
[75]
Demographics of Mobile Device Ownership and Adoption in the United States. Retrieved September 25, 2018 from http://www.pewinternet.org/fact-sheet/mobile/
[76]
What is a mobile threat? Retrieved June 20, 2019 from https://www.lookout.com/know-your-mobile/what-is-a-mobile-threat
[77]
Official Site | NortonTM - Antivirus & Cybersecurity Software. Retrieved April 4, 2019 from https://us.norton.com/

Cited By

View all
  • (2024)The Subversive AI Acceptance Scale (SAIA-8): A Scale to Measure User Acceptance of AI-Generated, Privacy-Enhancing Image ModificationsProceedings of the ACM on Human-Computer Interaction10.1145/36410248:CSCW1(1-43)Online publication date: 26-Apr-2024
  • (2024)Using Co-Design with Streamers and Viewers to Identify Values and Resolve Tensions in the Design of Interpersonal Wearable Telepresence SystemsProceedings of the ACM on Human-Computer Interaction10.1145/36374258:CSCW1(1-21)Online publication date: 26-Apr-2024
  • (2024)“It's like educating us older people...”: Unveiling Needs and Expectations Regarding Educational Features within Parental Control ToolsExtended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613905.3651113(1-8)Online publication date: 11-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 3, Issue CSCW
November 2019
5026 pages
EISSN:2573-0142
DOI:10.1145/3371885
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 November 2019
Published in PACMHCI Volume 3, Issue CSCW

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. collaborative privacy
  2. collective feedback
  3. community
  4. mobile privacy
  5. oversight
  6. security

Qualifiers

  • Research-article

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)471
  • Downloads (Last 6 weeks)65
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)The Subversive AI Acceptance Scale (SAIA-8): A Scale to Measure User Acceptance of AI-Generated, Privacy-Enhancing Image ModificationsProceedings of the ACM on Human-Computer Interaction10.1145/36410248:CSCW1(1-43)Online publication date: 26-Apr-2024
  • (2024)Using Co-Design with Streamers and Viewers to Identify Values and Resolve Tensions in the Design of Interpersonal Wearable Telepresence SystemsProceedings of the ACM on Human-Computer Interaction10.1145/36374258:CSCW1(1-21)Online publication date: 26-Apr-2024
  • (2024)“It's like educating us older people...”: Unveiling Needs and Expectations Regarding Educational Features within Parental Control ToolsExtended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613905.3651113(1-8)Online publication date: 11-May-2024
  • (2023)Towards Resilience and Autonomy-Based Approaches for Adolescents Online SafetySSRN Electronic Journal10.2139/ssrn.4608406Online publication date: 2023
  • (2023)The Participatory Turn in AI Design: Theoretical Foundations and the Current State of PracticeProceedings of the 3rd ACM Conference on Equity and Access in Algorithms, Mechanisms, and Optimization10.1145/3617694.3623261(1-23)Online publication date: 30-Oct-2023
  • (2023)Localised Trust in a Globalised Knot: Designing Information Privacy for Digital-IDACM Journal on Computing and Sustainable Societies10.1145/3616024Online publication date: 16-Aug-2023
  • (2023)Invigorating Ubuntu Ethics in AI for healthcare: Enabling equitable careProceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency10.1145/3593013.3594024(583-592)Online publication date: 12-Jun-2023
  • (2023)"Money shouldn't be money!" : An Examination of Financial Literacy and Technology for Children Through Co-DesignProceedings of the 22nd Annual ACM Interaction Design and Children Conference10.1145/3585088.3589355(82-93)Online publication date: 19-Jun-2023
  • (2023)It Takes a Village: A Case for Including Extended Family Members in the Joint Oversight of Family-based Privacy and Security for Mobile SmartphonesExtended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544549.3585904(1-7)Online publication date: 19-Apr-2023
  • (2023)Co-designing Community-based Sharing of Smarthome Devices for the Purpose of Co-monitoring In-home EmergenciesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581239(1-16)Online publication date: 19-Apr-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media