Privacy research with marginalized groups: what we know, what's needed, and what's next

S Sannon, A Forte - Proceedings of the ACM on Human-Computer …, 2022 - dl.acm.org
People who are marginalized experience disproportionate harms when their privacy is
violated. Meeting their needs is vital for develo** equitable and privacy-protective …

“It's common and a part of being a content creator”: Understanding How Creators Experience and Cope with Hate and Harassment Online

K Thomas, PG Kelley, S Consolvo, P Samermit… - Proceedings of the …, 2022 - dl.acm.org
Content creators—social media personalities with large audiences on platforms like
Instagram, TikTok, and YouTube—face a heightened risk of online hate and harassment. We …

Sok: A framework for unifying at-risk user research

N Warford, T Matthews, K Yang, O Akgul… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
At-risk users are people who experience risk factors that augment or amplify their chances of
being digitally attacked and/or suffering disproportionate harms. In this systematization work …

Users' expectations about and use of smartphone privacy and security settings

A Frik, J Kim, JR Sanchez, J Ma - … of the 2022 CHI Conference on Human …, 2022 - dl.acm.org
With the growing smartphone penetration rate, smartphone settings remain one of the main
models for information privacy and security controls. Yet, their usability is largely …

Sok: Safer digital-safety research involving at-risk users

R Bellini, E Tseng, N Warford, A Daffalla… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Research involving at-risk users—that is, users who are more likely to experience a digital
attack or to be disproportionately affected when harm from such an attack occurs—can pose …

Accessible and inclusive cyber security: a nuanced and complex challenge

K Renaud, L Coles-Kemp - SN Computer Science, 2022 - Springer
It has been argued that human-centred security design needs to accommodate the
considerations of three dimensions:(1) security,(2) usability and (3) accessibility. The latter …

The politics of privacy theories: Moving from norms to vulnerabilities

N McDonald, A Forte - Proceedings of the 2020 CHI Conference on …, 2020 - dl.acm.org
Privacy and surveillance are central features of public discourse around use of computing
systems. As the systems we design and study are increasingly used and regulated as …

“desperate times call for desperate measures”: User concerns with mobile loan apps in kenya

CW Munyendo, Y Acar, AJ Aviv - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The usage of mobile loan applications has proliferated in develo** countries. This is due
to the ease and speed in which they disburse small loans to users, compared to traditional …

Privacy and power: Acknowledging the importance of privacy research and design for vulnerable populations

N McDonald, K Badillo-Urquiola, MG Ames… - Extended Abstracts of …, 2020 - dl.acm.org
Privacy researchers and designers must take into consideration the unique needs and
challenges of vulnerable populations. Normative and privileged lenses can impair …

Too much information: Questioning security in a post-digital society

L Coles-Kemp, RB Jensen, CPR Heath - … of the 2020 CHI Conference on …, 2020 - dl.acm.org
Whilst user-and people-centered design are accepted routes for digital services, they are
less commonly used in the design of technologies that control access to data and the …