ABSTRACT
Privacy and surveillance are central features of public discourse around use of computing systems. As the systems we design and study are increasingly used and regulated as potential instruments of surveillance, HCI researchers-even those whose focus is not privacy-find themselves needing to understand privacy in their work. Concepts like contextual integrity and boundary regulation have become touchstones for thinking about privacy in HCI. In this paper, we draw on HCI and privacy literature to understand the limitations of commonly used theories and examine their assumptions, politics, strengths, and weaknesses. We use a case study from the HCI literature to illustrate conceptual gaps in existing frameworks where privacy requirements can fall through. Finally, we advocate vulnerability as a core concept for privacy theorizing and examine how feminist, queer-Marxist, and intersectional thinking may augment our existing repertoire of privacy theories to create a more inclusive scholarship and design practice.
- Ackerman, M.S. and Mainwaring, S.D. 2005. Privacy issues and human-computer interaction. Computer. 27, 5 (2005), 19--26.Google Scholar
- Acquisti, A. and Gross, R. 2006. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. PETS (2006), 36--58.Google Scholar
- Acquisti, A. and Grossklags, J. 2004. Privacy attitudes and privacy behavior: Losses, gains, and hyperbolic discounting. The economics of information security. Kluwer Academic Publishers. 1--15.Google Scholar
- Altman, I. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Brooks/Cole.Google Scholar
- Andalibi, N., Haimson, O.L., De Choudhury, M. and Forte, A. 2016. Understanding Social Media Disclosures of Sexual Abuse Through the Lenses of Support Seeking and Anonymity. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2016), 3906--3918.Google ScholarDigital Library
- Anjum, B. 2018. An Interview with Pamela Wisniewski: Making the Online World Safer for Our Youth. Ubiquity. 2018, December (Dec. 2018), 2:1-- 2:6. DOI: https://doi.org/10.1145/3301323.Google ScholarDigital Library
- Badillo-Urquiola, K., Page, X. and Wisniewski, P. 2019. Risk vs. Restriction: The Tension between Providing a Sense of Normalcy and Keeping Foster Teens Safe Online. The ACM CHI Conference on Human Factors in Computing Systems (2019).Google Scholar
- Bardzell, S. 2010. Feminist HCI: Taking Stock and Outlining an Agenda for Design. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2010), 1301--1310.Google ScholarDigital Library
- Barnes, S.B. 2006. A privacy paradox: Social networking in the United States. First Monday. 11, 9 (Sep. 2006).Google ScholarCross Ref
- Bernstein, M.S., Bakshy, E., Burke, M. and Karrer, B. 2013. Quantifying the Invisible Audience in Social Networks. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2013), 21--30.Google ScholarDigital Library
- Blackwell, L., Dimond, J., Schoenebeck, S. and Lampe, C. 2017. Classification and Its Consequences for Online Harassment: Design Insights from HeartMob. Proc. ACM Hum.-Comput. Interact. 1, CSCW (Dec. 2017), 24:1--24:19. DOI: https://doi.org/10.1145/3134659.Google ScholarDigital Library
- Blackwell, L., Hardy, J., Ammari, T., Veinot, T., Lampe, C. and Schoenebeck, S. 2016. LGBT Parents and Social Media: Advocacy, Privacy, and Disclosure During Shifting Social Movements. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2016), 610--622.Google ScholarDigital Library
- Bowser, A., Shilton, K., Preece, J. and Warrick, E. 2017. Accounting for Privacy in Citizen Science: Ethical Research in a Context of Openness. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (New York, NY, USA, 2017), 2124--2136.Google ScholarDigital Library
- boyd, danah 2014. It's Complicated: The Social Lives of Networked Teens. Yale University Press.Google ScholarDigital Library
- Bridges, K.M. 2017. The Poverty of Privacy Rights. Stanford Law Books.Google Scholar
- Cate, F.H. 2010. The Limits of Notice and Choice. IEEE Security Privacy. 8, 2 (Mar. 2010), 59--62. DOI: https://doi.org/10.1109/MSP.2010.84.Google ScholarDigital Library
- Chatterjee, R., Doerfler, P., Orgad, H., Havron, S., Palmer, J., Freed, D., Levy, K., Dell, N., McCoy, D. and Ristenpart, T. 2018. The Spyware Used in Intimate Partner Violence. 2018 IEEE Symposium on Security and Privacy (SP) (May 2018), 441--458.Google Scholar
- Collins, P.H. 2019. Intersectionality as Critical Social Theory. Duke University Press Books.Google Scholar
- Collins, P.H. 2015. Intersectionality's Definitional Dilemmas. Annual Review of Sociology. 41, 1 (2015), 1--20.Google ScholarCross Ref
- Collins, P.H. and Bilge, S. 2016. Intersectionality. Polity.Google Scholar
- Crenshaw, K. 1989. Demarginalizing the Intersection of Race and Sex: A Black Feminist Critique of Antidiscrimination Doctrine. University of Chicago Legal Forum. 1989, 1 (1989).Google Scholar
- Domestic Abuse Survivors Go "Underground" With the Tor Network: 2014. http://www.adweek.com/digital/domestic-abusesurvivors-go-underground-tor-network/. Accessed: 2017-08--31.Google Scholar
- Dourish, P. 2001. Seeking a Foundation for ContextAware Computing. Human--Computer Interaction. 16, 2--4 (Dec. 2001), 229--241. DOI: https://doi.org/10.1207/S15327051HCI16234_0 7.Google ScholarCross Ref
- Dym, B. and Fiesler, C. 2018. Vulnerable and Online: Fandom's Case for Stronger Privacy Norms and Tools. Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing (New York, NY, USA, 2018), 329--332.Google ScholarDigital Library
- Ekbia, H. and Nardi, B. 2016. Social Inequality and HCI: The View from Political Economy. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2016), 4997--5002.Google ScholarDigital Library
- Encryption Is a Luxury: 2016. https://www.theatlantic.com/technology/archive/2016 /03/the-digital-security-divide/475590/. Accessed: 2019-08--12.Google Scholar
- Eubanks, V. 2018. Automating Inequality: How HighTech Tools Profile, Police, and Punish the Poor. St. Martin's Press.Google Scholar
- Forte, A., Andalibi, N. and Greenstadt, R. 2017. Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (New York, NY, USA, 2017), 1800--1811.Google ScholarDigital Library
- Foucault, M. 1977. Discipline & Punish: The Birth of the Prison. Vintage Books.Google Scholar
- Foucault, M. 1976. The History of Sexuality, Vol. 1: An Introduction. Vintage.Google Scholar
- Fox, S., Menking, A., Steinhardt, S., Hoffmann, A.L. and Bardzell, S. 2017. Imagining Intersectional Futures: Feminist Approaches in CSCW. Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (New York, NY, USA, 2017), 387--393.Google Scholar
- Fox, S., Menking, A., Steinhardt, S., Hoffmann, A.L. and Bardzell, S. 2017. Imagining Intersectional Futures: Feminist Approaches in CSCW. Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (New York, NY, USA, 2017), 387--393.Google Scholar
- Fraser, N., Bhattacharya, T. and Arruzza, C. 2019. Feminism for the 99%. Verso.Google Scholar
- Fratantonio, Y., Qian, C., Chung, S.P. and Lee, W. 2017. Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop. 2017 IEEE Symposium on Security and Privacy (SP) (May 2017), 1041--1057.Google ScholarCross Ref
- Freed, D., Palmer, J., Minchala, D., Levy, K., Ristenpart, T. and Dell, N. 2018. A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology. (2018), 1--13.Google Scholar
- Gandy, O.H. 2017. Surveillance and the Formation of Public Policy. Surveillance & Society Biennial Conference (2017).Google Scholar
- Gavison, R. 1992. Feminism and the Public/Private Distinction. Stanford Law Review. 45, 1 (1992), 1--45. DOI: https://doi.org/10.2307/1228984.Google ScholarCross Ref
- Goffman, A. 2014. On the Run: Fugitive Life in an American City. University of Chicago Press.Google Scholar
- Gray, M.L. 2009. Out in the Country: Youth, Media, and Queer Visibility in Rural America. NYU Press.Google Scholar
- Gross, R. and Acquisti, A. 2005. Information Revelation and Privacy in Online Social Networks. Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (New York, NY, USA, 2005), 71--80.Google ScholarDigital Library
- Guberek, T., McDonald, A., Simioni, S., Mhaidli, A.H., Toyama, K. and Schaub, F. 2018. Keeping a Low Profile?: Technology, Risk and Privacy Among Undocumented Immigrants. Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2018), 114:1--114:15.Google ScholarDigital Library
- Gurses, S. and Hoboken, J. van 2016. Privacy after the Agile Turn. (Aug. 2016). DOI: https://doi.org/None.Google Scholar
- Hancock, A.-M. 2016. Intersectionality: An Intellectual History. Oxford University Press.Google ScholarCross Ref
- Hao, K. 2018. Amazon is the invisible backbone behind ICE's immigration crackdown. MIT Technology Review.Google Scholar
- Hargittai, E. and Marwick, A. 2016. "What can I really do?" Explaining the privacy paradox with onine apathy. International Journal of Communication. 10, (2016), 3737--3757.Google Scholar
- Hartsock, N.C. 1983. The Feminist Standpoint: Developing the Ground for a Specifically Feminist Historical Materialism. Discovering Reality. Reidel Publishing Company. 283--310.Google Scholar
- Hoofnagle, C. and Urban, J. 2014. Alan Westin's Privacy Homo Economicus. Wake Forest Law Review. (Jun. 2014), 261.Google Scholar
- Hornung, D., Müller, C., Shklovski, I., Jakobi, T. and Wulf, V. 2017. Navigating Relationships and Boundaries: Concerns Around ICT-uptake for Elderly People. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2017), 7057--7069.Google ScholarDigital Library
- Hull, G. 2015. Successful Failure: What Foucault Can Teach Us About Privacy Self-Management in a World of Facebook and Big Data. Ethics and Information Technology. 17, 2 (2015), 89--101.Google ScholarDigital Library
- Igo, S.E. 2018. The Known Citizen: A History of Privacy in Modern America. Harvard University Press.Google Scholar
- Is China's social credit system as Orwellian as it sounds? https://www.technologyreview.com/f/613027/chinassocial-credit-system-isnt-as-orwellian-as-it-sounds/. Accessed: 2019-07--31.Google Scholar
- Jernigan, C. and Mistree, B.F.T. 2009. Gaydar: Facebook friendships expose sexual orientation. First Monday. 14, 10 (Sep. 2009). DOI: https://doi.org/10.5210/fm.v14i10.2611.Google ScholarCross Ref
- Kang, R., Brown, S. and Kiesler, S. 2013. Why Do People Seek Anonymity on the Internet?: Informing Policy and Design. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2013), 2657--2666.Google ScholarDigital Library
- Kitzie, V. 2019. "That looks like me or something i can do": Affordances and constraints in the online identity work of US LGBTQ+ millennials. Journal of the Association for Information Science and Technology. 0, 0 (2019). DOI: https://doi.org/10.1002/asi.24217.Google ScholarDigital Library
- Kobie, N. 2019. The complicated truth about China's social credit system. Wired UK.Google Scholar
- Kosinski, M., Stillwell, D. and Graepel, T. 2013. Private traits and attributes are predictable from digital records of human behavior. Proceedings of the National Academy of Sciences. 110, 15 (Apr. 2013), 5802--5805. DOI: https://doi.org/10.1073/pnas.1218772110.Google ScholarCross Ref
- Kulwin, N. 2019. Shoshana Zuboff Talks Surveillance Capitalism's Threat to Democracy. New York Magazine.Google Scholar
- Kumar, N. and Karusala, N. 2019. Intersectional Computing. Interactions. 26, 2 (Feb. 2019), 50--54.Google ScholarDigital Library
- Lampinen, A., Lehtinen, V., Lehmuskallio, A. and Tamminen, S. 2011. We're in It Together: Interpersonal Management of Disclosure in Social Network Services. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2011), 3217--3226.Google ScholarDigital Library
- Lampinen, A., Tamminen, S. and Oulasvirta, A. 2009. All My People Right Here, Right Now: Management of Group Co-presence on a Social Networking Site. Proceedings of the ACM 2009 International Conference on Supporting Group Work (New York, NY, USA, 2009), 281--290.Google ScholarDigital Library
- Lampinen, A., Tamminen, S. and Oulasvirta, A. 2009. All My People Right Here, Right Now: Management of Group Co-presence on a Social Networking Site. Proceedings of the ACM 2009 International Conference on Supporting Group Work (New York, NY, USA, 2009), 281--290.Google ScholarDigital Library
- Lanier, J. 2014. Who Owns the Future?. Simon & Schuster.Google ScholarDigital Library
- Latour, B. 2018. Down to Earth: Politics in the New Climatic Regime. Polity.Google Scholar
- Laufer, R.S. and Wolfe, M. 1977. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory. Journal of Social Issues. 33, 3 (Jul. 1977), 22--42. DOI: https://doi.org/10.1111/j.15404560.1977.tb01880.x.Google ScholarCross Ref
- Lewis, H. 2016. The Politics of Everybody: Feminism, Queer Theory and Marxism at the Intersection. Zed Books.Google Scholar
- Madden, M. 2017. Privacy, Security, and Digital Inequality.Google Scholar
- Madden, M., Gilman, M., Levy, K. and Marwick, A. 2017. Privacy, Poverty, and Big Data: A Matrix of Vulnerabilities for Poor Americans. Washington University Law Review. 95, 1 (Jan. 2017), 053--125.Google Scholar
- Madejski, M., Johnson, M. and Bellovin, S.M. 2012. A study of privacy settings errors in an online social network. 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (Mar. 2012), 340--345.Google Scholar
- Marwick, A. 2012. The Public Domain: Surveillance in Everyday Life. Surveillance & Society. 9, 4 (Jun. 2012), 378--393.Google ScholarCross Ref
- Marwick, A. and boyd, danah 2010. I Tweet Honestly, I Tweet Passionately: Twitter Users, Context Collapse, and the Imagined Audience. New Media & Society. (2010).Google Scholar
- Marwick, A., Fontaine, C. and boyd, danah 2017. "Nobody Sees It, Nobody Gets Mad": Social Media, Privacy, and Personal Responsibility Among LowSES Youth. Social Media + Society. 3, 2 (Apr. 2017).Google Scholar
- Marwick, A.E. and boyd, danah 2014. Networked privacy: How teenagers negotiate context in social media. New Media & Society. 16, 7 (Nov. 2014), 1051--1067. DOI: https://doi.org/10.1177/1461444814543995.Google ScholarCross Ref
- Marwick, A.E. and Boyd, D. 2018. Privacy at the Margins| Understanding Privacy at the Margins- Introduction. International Journal of Communication. 12, 0 (Mar. 2018), 9.Google Scholar
- Matthews, T., O'Leary, K., Turner, A., Sleeper, M., Woelfer, J.P., Shelton, M., Manthorne, C., Churchill, E.F. and Consolvo, S. 2017. Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2017), 2189--2201.Google ScholarDigital Library
- McDonald, N., Mako Hill, B., Greenstadt, R. and Forte, A. 2019. Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Service Providers. CHI (New York, NY, USA, 2019).Google Scholar
- Mulligan, D. and King, J. 2011. Bridging the Gap between Privacy and Design. University of Pennsylvania Journal of Constitutional Law. 14, (Jan. 2011), 989.Google Scholar
- Nardi, B.A. 1996. Studying context: A comparison of activity theory, situated action models, and distributed cognition. Context and consciousness: Activity theory and human--computer interaction. The MIT Press. 69-- 102.Google Scholar
- Netter, M., Riesner, M., Weber, M. and Pernul, G. 2013. Privacy Settings in Online Social Networks -Preferences, Perception, and Reality. Proceedings of the Hawaii international Conference on System Sciences HICSS'13 (2013), 3219--3228.Google Scholar
- Newman, N. 2014. The Costs of Lost Privacy: Consumer Harm and Rising Economic Inequality in the Age of Google. William Mitchell Law Review. 40, 2 (2014).Google Scholar
- Nissenbaum, H. 2004. Privacy as Contextual Integrity. Washington Law Review. 79, 1 (2004), 101--139.Google Scholar
- Nissenbaum, H. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press.Google ScholarDigital Library
- Norberg, P.A., Horne, D.R. and Horne, D.A. 2007. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs. 41, 1 (Jun. 2007), 100--126. DOI: https://doi.org/10.1111/j.17456606.2006.00070.x.Google ScholarCross Ref
- Okin, S.M. 1989. Justice, gender, and the family. Basic Books.Google Scholar
- Onuma, M., Kimura, A. and Mukawa, N. 2013. Exploring Social Cognition Related to Privacy Settings in SNS Usage. Proceedings of the 2013 International Conference on Signal-Image Technology & Internet-Based Systems (Washington, DC, USA, 2013), 1077--1082.Google ScholarDigital Library
- Orend, B. 2001. Walzer's General Theory of Justice. Social Theory and Practice. 27, 2 (2001), 207--229.Google ScholarCross Ref
- Palen, L. and Dourish, P. 2003. Unpacking "Privacy" for a Networked World. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2003), 129--136.Google ScholarDigital Library
- Pearce, K.E., Vitakm, J. and Barta, K. 2018. Socially Mediated Visibility: Friendship and Dissent in Authoritarian Azerbaijan. International journal of communication (Online). (Mar. 2018), 1310-.Google Scholar
- Pierce, J., Fox, S., Merrill, N. and Wong, R. 2018. Differential Vulnerabilities and a Diversity of Tactics: What Toolkits Teach Us About Cybersecurity. Proc. ACM Hum.-Comput. Interact. 2, CSCW (Nov. 2018), 139:1--139:24. DOI: https://doi.org/10.1145/3274408.Google ScholarDigital Library
- Pitcan, M., Marwick, A.E. and Boyd, D. 2018. Performing a Vanilla Self: Respectability Politics, Social Class, and the Digital World. Journal of Computer-Mediated Communication. 23, 3 (May 2018), 163--179. DOI: https://doi.org/10.1093/jcmc/zmy008.Google ScholarCross Ref
- Rankin, Y.A. and Thomas, J.O. 2019. Straighten Up and Fly Right: Rethinking Intersectionality in HCI Research. Interactions. 26, 6 (Oct. 2019), 64--68.Google ScholarDigital Library
- Richardson, J. 2014. Spinoza, Feminism and Privacy: Exploring an Immanent Ethics of Privacy. Feminist Legal Studies; Dordrecht. 22, 3 (Dec. 2014), 225--241. DOI: http://dx.doi.org.ezproxy2.library.drexel.edu/10.1007/s10691-014--9271--3.Google Scholar
- Rosenblat, A., Kneese, T. and boyd, danah 2014. WorkplaceSurveillance. Data & Society Working Paper. (2014), 19.Google Scholar
- Scheuerman, M.K., Branham, S.M. and Hamidi, F. 2018. Safe Spaces and Safe Places: Unpacking Technology-Mediated Experiences of Safety and Harm with Transgender People. Proc. ACM Hum.Comput. Interact. 2, CSCW (Nov. 2018), 155:1-- 155:27.Google Scholar
- Schlesinger, A., Edwards, W.K. and Grinter, R.E. 2017. Intersectional HCI: Engaging Identity Through Gender, Race, and Class. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2017), 5412--5427.Google ScholarDigital Library
- Selinger, E. and Hartzog, W. 2014. Obscurity and Privacy. Technical Report #ID 2439866. Social Science Research Network.Google Scholar
- Sleeper, M., Matthews, T., O'Leary, K., Turner, A., Woelfer, J.P., Shelton, M., Oplinger, A., Schou, A. and Consolvo, S. 2019. Tough Times at Transitional Homeless Shelters: Considering the Impact of Financial Insecurity on Digital Security and Privacy. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2019), 89:1--89:12.Google ScholarDigital Library
- Stutzman, F. and Hartzog, W. 2012. Boundary Regulation in Social Media. Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (New York, NY, USA, 2012), 769-- 778.Google ScholarDigital Library
- Thomas, J.O., Joseph, N., Williams, A., Crum, C. and Burge, J. 2018. Speaking Truth to Power: Exploring the Intersectional Experiences of Black Women in Computing. 2018 Research on Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT) (Feb. 2018), 1--8.Google Scholar
- Trappenburg, M. 2000. In Defence of Pure Pluralism: Two Readings of Walzer's Spheres of Justice. Journal of Political Philosophy. 8, 3 (2000), 343--362. DOI: https://doi.org/10.1111/1467--9760.00106.Google ScholarCross Ref
- Tufekci, Z. 2007. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science, Technology & Society. 28, 1 (2007), 20--36.Google ScholarCross Ref
- Tufekci, Z. 2017. Twitter and Tear Gas: The Power and Fragility of Networked Protest. Yale University Press.Google Scholar
- Tufekci, Z. 2017. Twitter and Tear Gas: The Power and Fragility of Networked Protest. Yale University Press.Google Scholar
- Vitak, J., Blasiola, S., Patil, S. and Litt, E. 2015. Balancing Audience and Privacy Tensions on Social Network Sites: Strategies of Highly Engaged Users. International Journal of Communication. 9, 0 (May 2015), 20.Google Scholar
- Vitak, J., Liao, Y., Subramaniam, M. and Kumar, P. 2018. 'I Knew It Was Too Good to Be True": The Challenges Economically Disadvantaged Internet Users Face in Assessing Trustworthiness, Avoiding Scams, and Developing Self-Efficacy Online. Proc. ACM Hum.-Comput. Interact. 2, CSCW (Nov. 2018), 176:1--176:25. DOI: https://doi.org/10.1145/3274445.Google ScholarDigital Library
- Walzer, M. 1984. Spheres Of Justice: A Defense Of Pluralism And Equality. Basic Books.Google Scholar
- Warner, M., Gutmann, A., Sasse, M.A. and Blandford, A. 2018. Privacy Unraveling Around Explicit HIV Status Disclosure Fields in the Online Geosocial Hookup App Grindr. Proc. ACM Hum.-Comput. Interact. 2, CSCW (Nov. 2018), 181:1--181:22.Google Scholar
- Westin, A.F. 1967. Privacy and Freedom. Atheneum.Google Scholar
- Wisniewski, P., Ghosh, A.K., Xu, H., Rosson, M.B. and Carroll, J.M. 2017. Parental Control vs. Teen SelfRegulation: Is There a Middle Ground for Mobile Online Safety? Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (New York, NY, USA, 2017), 51--69.Google ScholarDigital Library
- Wisniewski, P., Islam, A.K.M.N., Knijnenburg, B.P. and Patil, S. 2015. Give Social Network Users the Privacy They Want. Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (New York, NY, USA, 2015), 1427--1441.Google Scholar
- Wisniewski, P., Lipford, H. and Wilson, D. 2012. Fighting for My Space: Coping Mechanisms for Sns Boundary Regulation. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2012), 609--618.Google ScholarDigital Library
- Wisniewski, P.J., Kumar, N., Bassem, C., Clinch, S., Dray, S.M., Fitzpatrick, G., Lampe, C., Muller, M. and Peters, A.N. 2018. Intersectionality As a Lens to Promote Equity and Inclusivity Within SIGCHI. Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2018).Google ScholarDigital Library
- Woodruff, A., Pihur, V., Consolvo, S., Schmidt, L., Brandimarte, L. and Acquisti, A. 2014. Would a Privacy Fundamentalist Sell Their DNA for $1000... If Nothing Bad Happened As a Result? The Westin Categories, Behavioral Intentions, and Consequences. Proceedings of the Tenth USENIX Conference on Usable Privacy and Security (Berkeley, CA, USA, 2014), 1--18.Google Scholar
- Zuboff, S. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs.Google Scholar
Index Terms
- The Politics of Privacy Theories: Moving from Norms to Vulnerabilities
Recommendations
Exploring Nuanced Gender Perspectives within the HCI Community
IndiaHCI '14: Proceedings of the 6th Indian Conference on Human-Computer InteractionWith the increasing spread and pervasiveness of technologies, the role of gender in the design of these technologies is a topic of growing importance. Several conference panels and journal issues have focused on the contributions feminism, gender theory,...
Counterventions: a reparative reflection on interventionist HCI
CHI '23: Proceedings of the 2023 CHI Conference on Human Factors in Computing SystemsResearch in HCI applied to clinical interventions relies on normative assumptions about which bodies and minds are healthy, valuable, and desirable. To disrupt this normalizing drive in HCI, we define a “counterventional approach” to intervention ...
Feminism and Feminist Approaches in Social Computing
CSCW'15 Companion: Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative Work & Social ComputingFollowing on the successful CSCW 2014 workshop on Feminism and Social Media, this workshop will bring together a set of CSCW scholars to discuss feminist perspectives in social computing and technology. We will explore theoretical and methodological ...
Comments