Children's data and privacy online: growing up in a digital age: an evidence review
Children's autonomy and dignity as actors in the world depends on both their freedom to
engage and their freedom from undue persuasion or influence. In a digital age in which …
engage and their freedom from undue persuasion or influence. In a digital age in which …
Privacy research with marginalized groups: what we know, what's needed, and what's next
People who are marginalized experience disproportionate harms when their privacy is
violated. Meeting their needs is vital for develo** equitable and privacy-protective …
violated. Meeting their needs is vital for develo** equitable and privacy-protective …
Intersectional HCI: Engaging identity through gender, race, and class
Understanding users becomes increasingly complicated when we grapple with various
overlap** attributes of an individual's identity. In this paper we introduce intersectionality …
overlap** attributes of an individual's identity. In this paper we introduce intersectionality …
Gender recognition or gender reductionism? The social implications of embedded gender recognition systems
Automatic Gender Recognition (AGR) refers to various computational methods that aim to
identify an individual's gender by extracting and analyzing features from images, video …
identify an individual's gender by extracting and analyzing features from images, video …
Safe spaces and safe places: Unpacking technology-mediated experiences of safety and harm with transgender people
Transgender individuals in the United States face significant threats to interpersonal safety;
however, there has as yet been relatively little research in the HCI and CSCW communities …
however, there has as yet been relatively little research in the HCI and CSCW communities …
Classification and its consequences for online harassment: Design insights from heartmob
Online harassment is a pervasive and pernicious problem. Techniques like natural
language processing and machine learning are promising approaches for identifying …
language processing and machine learning are promising approaches for identifying …
Designing toxic content classification for a diversity of perspectives
In this work, we demonstrate how existing classifiers for identifying toxic comments online
fail to generalize to the diverse concerns of Internet users. We survey 17,280 participants to …
fail to generalize to the diverse concerns of Internet users. We survey 17,280 participants to …
Parenting and digital media: from the early web to contemporary digital society
Parents have accessed websites, online discussion forums and blogs for advice, information
and support since the early days of the World Wide Web. In this article, we review the …
and support since the early days of the World Wide Web. In this article, we review the …
Sok: A framework for unifying at-risk user research
At-risk users are people who experience risk factors that augment or amplify their chances of
being digitally attacked and/or suffering disproportionate harms. In this systematization work …
being digitally attacked and/or suffering disproportionate harms. In this systematization work …
" Coming Out Okay" Community Narratives for LGBTQ Identity Recovery Work
Online communities provide support for those who are vulnerable, such as LGBTQ people
while coming out. Research shows that social support and personal narrative construction …
while coming out. Research shows that social support and personal narrative construction …