Sok: Safer digital-safety research involving at-risk users

R Bellini, E Tseng, N Warford, A Daffalla… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Research involving at-risk users—that is, users who are more likely to experience a digital
attack or to be disproportionately affected when harm from such an attack occurs—can pose …

" I Never Imagined Grandma Could Do So Well with Technology" Evolving Roles of Younger Family Members in Older Adults' Technology Learning and Use

X Tang, Y Sun, B Zhang, Z Liu, RAY Lc, Z Lu… - Proceedings of the ACM …, 2022 - dl.acm.org
Older adults' technology learning is a long-term process, during which family members often
play significant roles. Although much research has emphasized how family support is …

" We are half-doctors": Family Caregivers as Boundary Actors in Chronic Disease Management

KS Bhat, AK Hall, T Kuo, N Kumar - Proceedings of the ACM on Human …, 2023 - dl.acm.org
Computer-Supported Cooperative Work (CSCW) and Human--Computer Interaction (HCI)
research is increasingly investigating the roles of caregivers as ancillary stakeholders in …

Infrastructuring telehealth in (in) formal patient-doctor contexts

KS Bhat, M Jain, N Kumar - Proceedings of the ACM on Human …, 2021 - dl.acm.org
Telehealth technologies have long remained on the peripheries of healthcare systems that
prioritize in-person healthcare provision. The spread of the COVID-19 pandemic has …

“desperate times call for desperate measures”: User concerns with mobile loan apps in kenya

CW Munyendo, Y Acar, AJ Aviv - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The usage of mobile loan applications has proliferated in develo** countries. This is due
to the ease and speed in which they disburse small loans to users, compared to traditional …

SoK: Social Cybersecurity

Y Wu, WK Edwards, S Das - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
We analyze prior work in social cybersecurity and present a structuring of this literature
based on its pertinence to four S&P-relevant social behaviors:(1) negotiating access to …

Unofficial proxies: How close others help older adults with banking

C Latulipe, R Dsouza, M Cumbers - … of the 2022 CHI Conference on …, 2022 - dl.acm.org
We present results of a survey (n= 42) investigating how close others (family members,
friends, or other community members) assist older adults with banking tasks in Canada. We …

Feeling proud, feeling embarrassed: Experiences of low-income women with crowd work

RA Varanasi, D Siddarth, V Seshadri, K Bali… - Proceedings of the …, 2022 - dl.acm.org
Women's economic empowerment is central to gender equality. However, work
opportunities available to low-income women in patriarchal societies are infrequent. While …

Navigating traumatic stress reactions during computer security interventions

L Ramjit, N Dolci, F Rossi, R Garcia… - 33rd USENIX Security …, 2024 - usenix.org
At-risk populations need direct support from computer security and privacy consultants, what
we refer to as a security intervention. However, at-risk populations often face security threats …

The security & privacy acceptance framework (spaf)

S Das, C Faklaris, JI Hong… - Foundations and Trends …, 2022 - nowpublishers.com
How can we encourage end-user acceptance of expert recommended cybersecurity and
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …