Browsing by Subject "privacy"
1 - 19 of 19
Results Per Page
Sort Options
- Journal ArticleBridging Identity Gaps—Supporting Identity Performance in Citizen Service Encounters(Computer Supported Cooperative Work (CSCW): Vol. 21, No. 6, 2012) Borchorst, Nikolaj Gandrup; McPhail, Brenda; Smith, Karen Louise; Ferenbok, Joseph; Clement, AndrewThis paper explores in situ citizen service encounters in government offices. Drawing upon ethnographically informed fieldwork in Canada and Denmark, we discuss the challenges to supporting citizens in constructing and performing identities in public service settings. Our data suggests that citizens make use of at least three strategies in their attempts to perform the appropriate identities needed to “fit within the system” in specific encounters with government. There exists a strong correlation between citizens’ ability to perform identities that are compatible with the bureaucratic administrative processes and the quality and swiftness of the service they receive. As we bring to light in this paper, this “fitting in” with rigid bureaucratic procedures and IT systems interestingly requires a substantial collaborative effort between the receiver(s) of the service and a complex constellation of surrounding stakeholders and intermediaries. This collaboration and the performing of multiple identities raises challenges for the design of e-government systems aimed at supporting physical and digital citizen service provision, as well as issues regarding privacy, citizenship, and public service quality. Lastly, we turn to a discussion of how the established identity gaps can be addressed through design. Information and communication technologies as well as face-to-face encounters have an important role to play in the building of an interface to government. Here, it is paramount to consider the context in which people and systems must function in order to meet the need for dynamic identity performance.
- Conference PaperCarebit: A Privacy-Preserving Step Toward Remote Informal Caregiving(Proceedings of the 2018 ACM International Conference on Supporting Group Work, 2018) Ghosh, Arup Kumar; Aljallad, Zaina; Badillo-Urquiola, Karla; Wisniewski, PamelaSeveral tele-monitoring systems have been developed for in-home patient use. Unfortunately, many of these systems are cost prohibitive and privacy invasive to the patient. To overcome this problem, we designed a more affordable and lightweight solution called Carebit, an Android application that leverages the Fitbit API. We conducted two user studies to understand ways to improve our design. Overall, we found that the notifications feature is the most useful feature for users, and no concerns about privacy were mentioned. The goal of Carebit is improve informal caregiving.
- Conference PaperDesign and Evaluation of a Virtual Assistant for Improving Awareness in Mobile Messaging(Companion Proceedings of the 2023 ACM International Conference on Supporting Group Work, 2023) Jain, PranutMobile messaging suffers from the lack of effective communication cues that help people infer the availability of others, like in face-to-face communication. My research focuses on designing, implementing, and evaluating an agent that can communicate unavailability to message senders. The design encompasses three phases (1) user modeling – understanding the recipient’s state; (2) preference modeling – understanding both recipient and sender preferences; (3) learning and adaptability – adjusting self-behavior or appropriating the agent to accomplish desired behavior. My dissertation research explores what factors are important in this design and how we can empower control back to users through user-agent interaction.
- Conference PaperExploring Computer-Supported Professional Development for Novice Museum and Zoo Professionals(Proceedings of the 2016 ACM International Conference on Supporting Group Work, 2016) Jimenez-Pazmino, Priscilla F.; Lyons, Leilah; Slattery, Brian; Hunt, BenjaminZoos and museums often rely on interpretive staff, called explainers, to facilitate visitors' learning through conversations and demonstrations. Many explainers begin their careers as teens, and would benefit from ongoing Professional Development (PD). As institutions begin to use mobile devices to enhance explainers' interpretation, new opportunities arise to support explainers' individual and collaborative professional development. This paper presents the results of structured participatory design sessions to engage explainers in examining and proposing features for a Facilitation, Reflection, and Augmented Interpretation Mobile System (FRAIMS). The goal for FRAIMS is to support everyday interpretive tasks while also gathering information on how explainers perform that interpretation (both passively, via logging and recording, and actively, via self-reports and ratings) to support them in their PD. Reflecting on one's own performance and the performance of others is a powerful PD strategy, but can be emotionally fraught. Via participatory design sessions with expert, in-development, and novice explainers at different informal learning institutions, we found that explainers' preferences for socially sharing performance information gathered via mobile devices varied with their experience. We detail emerging themes captured from the sessions and make suggestions for how these findings might apply more broadly to computer-supported professional development systems.
- Conference PaperExploring Ethics and Obligations for Studying Digital Communities(Proceedings of the 2016 ACM International Conference on Supporting Group Work, 2016) Fiesler, Casey; Wisniewski, Pamela; Pater, Jessica; Andalibi, NazaninMany of the most prominent and unanswered ethical questions within HCI and social computing involve our ethical obligation to the communities that we study. Some of these questions fall under the purview of more traditional human subjects research ethics, but others hinge on when, for example, studies of public data trigger similar obligations. Basic rules to do no harm" are complicated in digital communities by issues of consent and privacy, and ethics review boards are struggling to keep up even as research communities are similarly struggling to form appropriate norms. The goals of this workshop are to continue seeding conversations about research ethics within the SIGCHI community, to work towards norm setting, and in the meantime, to collectively help community members make good ethical decisions about research into sociotechnical systems and digital communities."
- Conference PaperIdentity and User Behavior in Online Communities(Companion Proceedings of the 2020 ACM International Conference on Supporting Group Work, 2020) Guo, ChengIn online communities, people share and discuss information at all levels of topic sensitivity. Identity policies within these communities range from real names to anonymity. The amount of user engagement, the quality of the information, disinformation behavior (e.g., trolling) may differ under different types of identity, which is currently unclear. Most of these online communities have a mechanism of content moderation. The relationship between identity and moderation is also unclear. Finally, yet little is known about how and why people make decisions of self-disclosure in online communities. My dissertation research aims to deepen our understanding of identity and user behavior in online communities. My research will benefit privacy researchers, online social network designers, policymakers, and researchers in the field of Human-Computer Interaction who study online identity and social media.
- Text DocumentImage, Appearance and Vanity in the Use of Media Spaces and Video Conference Systems(Proceedings of the 2009 ACM International Conference on Supporting Group Work, 2009) de Vasconcelos Filho, Jose Eurico; Inkpen, Kori M.; Czerwinski, MaryMedia spaces and videoconference systems are beneficial for connecting separated co-workers and providing rich contextual information. However, image sharing communication tools may also touch on sensitive spots of the human psyche related to personal, perceived image issues (e.g., appearance, self-image, self-presentation and vanity). We conducted two user studies to examine the impact of self-image concerns on the use of media spaces and videoconference systems. Our results suggest that personal, perceived image concerns have a considerable impact on the comfort level of users and may hinder effective communication [8]. We also found that image filtering techniques can help users feel more comfortable. Our results revealed that distortion filters, which are frequently cited to help preserve privacy, do not tend to be the ones preferred by users. Instead, users seemed to favor filters that make subtle changes to their appearance, or, in some instances, they preferred to use a surrogate instead.
- Text DocumentImproving Personal Privacy in Social Systems with People-Tagging(Proceedings of the 2009 ACM International Conference on Supporting Group Work, 2009) Razavi, Maryam Najafian; Iverson, LeeThe recent emergence of social systems has transformed the Web from an information pool to a platform for communication and social interaction. As such, the issue of managing privacy of various types of user-created content in these open environments has become more of a concern. Existing social systems often define privacy either as a private/public dichotomy or in terms of a network of friends relationship, in which all friends" are created equal and all relationships are reciprocal. We explore instead the idea of tagging people to create ego-centric groups of dynamic, non-reciprocal relationships to improve privacy management in this domain. In this paper, we introduce the principles and motivations behind people-tagging, discuss constraints that make people-tagging safe, trustable, and spam-free, describe a research implementation we have created to experiment with the concept, and provide the results of a preliminary empirical evaluation which shows the strength of the idea and indicates areas for future enhancements."
- Conference PaperInvestigating the Use of a Simulator to Support Users in Anticipating Impact of Privacy Settings in Facebook(Proceedings of the 2014 ACM International Conference on Supporting Group Work, 2014) Junior, Manoel Pereira; Xavier, Simone Isabela de Rezende; Prates, Raquel OliveiraOne of the challenges faced by Facebook users is that privacy settings change not only the visibility of the information, but also impact actions other users can take on a piece of information. These actions on their turn can also create changes to the visibility of that piece of information, sometimes granting access to people originally unintended by the user who posted the information. In this paper we investigate how a simulator that allows users to explore the different situations that can result from privacy settings may support them in anticipating the impact of their decisions. To do so, we have implemented a privacy setting simulator prototype, and evaluated it through a qualitative case-study which involved 12 regular Facebook users. Our findings indicate that the simulator improved users understanding of the effects of their privacy settings and allowed them to identify misunderstandings they had about the visibility of their information.
- Text DocumentLocation-Based Crowdsourcing of Hyperlocal News: Dimensions of Participation Preferences(Proceedings of the 2012 ACM International Conference on Supporting Group Work, 2012) Väätäjä, Heli; Vainio, Teija; Sirkkunen, EsaWe studied the mobile users' preferences and concerns of using location-based assignments (LBA) and geotagging in crowdsourced news making. First, nine readers who had submitted reader's photos were interviewed about their perceptions of LBA and geotagging scenarios. Second, a quasi-experiment in field conditions was carried out with nineteen participants. After completing four LBA tasks with a mobile phone, participants were interviewed on their perceptions and asked to complete a questionnaire on their preferences for receiving LBA and usage of geotags. Findings indicate that the perceived benefits of LBA and geotagging are greater than the perceived risks. The task type, temporal context, preciseness of location query, proximity to the reporting location, parallel tasks, social context and incentives affected the participation preferences. We propose a framework for participation preferences to support further studies in location-based crowdsourcing and in the development of crowdsourcing processes and systems.
- Conference PaperPrivacy and Weight Loss Apps: A First Look at How Women with Eating Disorders Use Social Features(Proceedings of the 2016 ACM International Conference on Supporting Group Work, 2016) Eikey, Elizabeth V.Women with eating disorders benefit from using social and community features of apps because they can get social support and information about their disorder. Although seeking help online may be easier than getting face-to-face treatment, there still may be a number of privacy concerns to sharing information, especially on apps not specifically intended for those with eating disorders, such as weight loss apps. Women with eating disorders are using weight loss apps, but are they using features that could help them get support for their disorder? This research begins to answer this question by presenting preliminary results from a qualitative study on how women with eating disorders use community and social features of weight loss apps. Early findings suggest women with eating disorders rarely use the community and social features of weight loss apps. This work highlights the tradeoffs between sharing information and privacy and has implications for app design.
- Conference PaperPrivacy Norms within the Internet of Things Using Contextual Integrity(Companion Proceedings of the 2020 ACM International Conference on Supporting Group Work, 2020) Abaquita, Denielle; Bahirat, Paritosh; Badillo-Urquiola, Karla A.; Wisniewski, PamelaThe collection of devices networked via the internet, also referred to as the Internet of Things, is poised to grow in adoption. With this rise has come equally increasing concerns for security and privacy. Considering Nissenbaum's framework of Contextual Integrity, we examined users' perceptions of IoT environmental and wearable devices to investigate acceptable norms surrounding privacy perceptions. We present results from a qualitative analysis of an interview study of 19 parent-young adult dyads to give insights on how privacy norms in context of two IoT environments were varying across two generations. We strongly believe understanding these variations can inform IoT system designs and government policies concerning the privacy and management of IoT devices.
- Conference PaperRegrets, I've Had a Few: When Regretful Experiences Do (and Don't) Compel Users to Leave Facebook(Proceedings of the 2018 ACM International Conference on Supporting Group Work, 2018) Guha, Shion; Baumer, Eric P.S.; Gay, Geri K.Previous work has explored regretful experiences on social media. In parallel, scholars have examined how people do not use social media. This paper aims to synthesize these two research areas and asks: Do regretful experiences on social media influence people to (consider) not using social media? How might this influence differ for different sorts of regretful experiences? We adopted a mixed methods approach, combining topic modeling, logistic regressions, and contingency analysis to analyze data from a web survey with a demographically representative sample of US internet users (n=515) focusing on their Facebook use. We found that experiences that arise because of users' own actions influence actual deactivation of their Facebook account, while experiences that arise because of others' actions lead to considerations of non-use. We discuss the implications of these findings for two theoretical areas of interest in HCI: individual agency in social media use and the networked dimensions of privacy.
- Text DocumentTowards an Understanding of Social Inference Opportunities in Social Computing(Proceedings of the 2012 ACM International Conference on Supporting Group Work, 2012) Mayer, Julia M.; Schuler, Richard P.; Jones, QuentinSocial computing applications are transforming the way we make new social ties, work, learn and play, thus becoming an essential part our social fabric. As a result, people and systems routinely make inferences about people's personal information based on their disclosed personal information. Despite the significance of this phenomenon the opportunity to make social inferences about users and how this process can be managed is poorly understood. In this paper we 1) outline why social inferences are important to study in the context of social computing applications, 2) how we can model, understand and predict social inference opportunities 3) highlight the need for social inference management systems, and 4) discuss the design space and associated research challenges. Collectively, this paper provides the first systematic overview for social inference research in the area of social computing.
- Text DocumentUncovering Privacy Attitudes and Practices in Instant Messaging(Proceedings of the 2005 ACM International Conference on Supporting Group Work, 2005) Patil, Sameer; Kobsa, AlfredWe present an analysis of privacy attitudes and practices in Instant Messaging based on responses to an online questionnaire. On a 7-point Likert scale, the reported concern about IM privacy spanned the whole range, with the average being slightly below medium". Respondents' justifications for privacy concerns revealed that the main contributing factors were: sensitivity of content, personal disposition towards privacy, understanding of technology, and potential persistence of conversations. Expectations for various categories of contacts differed significantly. Our findings indicate that it may be useful to leverage grouping functionality for privacy management. We also propose making the underlying technology more transparent."
- Conference PaperUnderstanding and Designing for Privacy in Wearable Fitness Platforms(Companion Proceedings of the 2020 ACM International Conference on Supporting Group Work, 2020) Alqhatani, AbdulmajeedThere has been increasing use of commercial wearable devices for tracking fitness-related activities. These devices sense and collect a variety of health and fitness data, which can be shared by users with other people and organizations. Yet, sharing personal data collected by these devices imposes several privacy concerns, ranging from private information exposure and repurposing, to aggregation and inferences. We do not fully understand people's sharing practices and privacy behaviors in the context of these ubiquitous devices. To address this limitation, my dissertation investigates the sharing of data collected by these devices in order to design solutions that support users' sharing needs and enhance their privacy. Preliminary findings indicate that users do not consider much of the data collected by these devices as sensitive, though they voice concerns about the possibility of abusing their data.
- Journal ArticleVideo-as-data: Technical and social aspects of a collaborative multimedia application(Computer Supported Cooperative Work (CSCW): Vol. 4, No. 1, 1995) Nardi, Bonnie A.; Kuchinsky, Allan; Whittaker, Steve; Leichner, Robert; Schwarz, HeinrichWe studied the use of a collaborative multimedia system for coordinating teamwork among members of a neurosurgical team. We analyze the use of video within the operating room and the use of broadcast audio and video to other locations in the hospital to enable remote neurophysiological monitoring. We describe how the multimedia system was used in a real world work context, including its benefits and problems. We argue that video can be useful as more than just pictures of people talking to one another; video can be a rich tool to enable analysis and problem solving. We discuss privacy problems inherent in collaborative multimedia technology and describe how they played out in the hospital during the course of our study.
- Conference PaperWhen Social Norms Fail(Companion Proceedings of the 2020 ACM International Conference on Supporting Group Work, 2020) Dym, Brianna; Fiesler, CaseyWithin online communities, social norms that both set expectations for and regulate behavior can be critical to the overall welfare of the community--particularly in the context of the privacy and safety of its members. For communities where the cost of regulatory failure can be high, it is important to understand both the conditions under which norms might be effective, and when they might fail. As a case study, we consider transformative fandom, a creative community dedicated to reimagining existing media in subversive ways. Due to the vulnerability of many members, this community has strong, longstanding norms to keep its members safe. Through an interview study with 25 fandom participants, we investigate this complex array of implicit norms that have been largely effective over time, but have also begun to break down. Catalysts for these breakdowns include value tensions between sub-communities and an increasing presence of outsiders, though most prominently, we identify a disconnect between the norms the community needs to support and the design of the platforms they occupy.
- Conference PaperWilling Buyer, Willing Seller: Personal Data Trade as a Service(Companion Proceedings of the 2020 ACM International Conference on Supporting Group Work, 2020) Kotut, Lindah; Stelter, Timothy L.; Horning, Michael; McCrickard, D. ScottThere is an increased sensitivity by people about how companies collect information about them, and how this information is packaged, used and sold. This perceived lack of control is highlighted by the helplessness of users of various platforms in managing or halting what data is collected from/about them. In a future where users have wrested control of their data and have the autonomy to decide what information is collected, how it is used and most importantly, how much it is worth, a new market emerges. This design fiction considers possible steps prescient companies would take to meet these demands, such as providing third-party subscription platforms offering personal data trade as a service. These services would provide a means for transparent transactions that preserve an owner's control over their data; allowing them to individually make decisions about what data they avail for sale, and the amount of compensation they would accept in trade.