skip to main content
10.1145/3313831.3376167acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Honorable Mention

The Politics of Privacy Theories: Moving from Norms to Vulnerabilities

Published:23 April 2020Publication History

ABSTRACT

Privacy and surveillance are central features of public discourse around use of computing systems. As the systems we design and study are increasingly used and regulated as potential instruments of surveillance, HCI researchers-even those whose focus is not privacy-find themselves needing to understand privacy in their work. Concepts like contextual integrity and boundary regulation have become touchstones for thinking about privacy in HCI. In this paper, we draw on HCI and privacy literature to understand the limitations of commonly used theories and examine their assumptions, politics, strengths, and weaknesses. We use a case study from the HCI literature to illustrate conceptual gaps in existing frameworks where privacy requirements can fall through. Finally, we advocate vulnerability as a core concept for privacy theorizing and examine how feminist, queer-Marxist, and intersectional thinking may augment our existing repertoire of privacy theories to create a more inclusive scholarship and design practice.

References

  1. Ackerman, M.S. and Mainwaring, S.D. 2005. Privacy issues and human-computer interaction. Computer. 27, 5 (2005), 19--26.Google ScholarGoogle Scholar
  2. Acquisti, A. and Gross, R. 2006. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. PETS (2006), 36--58.Google ScholarGoogle Scholar
  3. Acquisti, A. and Grossklags, J. 2004. Privacy attitudes and privacy behavior: Losses, gains, and hyperbolic discounting. The economics of information security. Kluwer Academic Publishers. 1--15.Google ScholarGoogle Scholar
  4. Altman, I. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Brooks/Cole.Google ScholarGoogle Scholar
  5. Andalibi, N., Haimson, O.L., De Choudhury, M. and Forte, A. 2016. Understanding Social Media Disclosures of Sexual Abuse Through the Lenses of Support Seeking and Anonymity. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2016), 3906--3918.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Anjum, B. 2018. An Interview with Pamela Wisniewski: Making the Online World Safer for Our Youth. Ubiquity. 2018, December (Dec. 2018), 2:1-- 2:6. DOI: https://doi.org/10.1145/3301323.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Badillo-Urquiola, K., Page, X. and Wisniewski, P. 2019. Risk vs. Restriction: The Tension between Providing a Sense of Normalcy and Keeping Foster Teens Safe Online. The ACM CHI Conference on Human Factors in Computing Systems (2019).Google ScholarGoogle Scholar
  8. Bardzell, S. 2010. Feminist HCI: Taking Stock and Outlining an Agenda for Design. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2010), 1301--1310.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Barnes, S.B. 2006. A privacy paradox: Social networking in the United States. First Monday. 11, 9 (Sep. 2006).Google ScholarGoogle ScholarCross RefCross Ref
  10. Bernstein, M.S., Bakshy, E., Burke, M. and Karrer, B. 2013. Quantifying the Invisible Audience in Social Networks. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2013), 21--30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Blackwell, L., Dimond, J., Schoenebeck, S. and Lampe, C. 2017. Classification and Its Consequences for Online Harassment: Design Insights from HeartMob. Proc. ACM Hum.-Comput. Interact. 1, CSCW (Dec. 2017), 24:1--24:19. DOI: https://doi.org/10.1145/3134659.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Blackwell, L., Hardy, J., Ammari, T., Veinot, T., Lampe, C. and Schoenebeck, S. 2016. LGBT Parents and Social Media: Advocacy, Privacy, and Disclosure During Shifting Social Movements. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2016), 610--622.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Bowser, A., Shilton, K., Preece, J. and Warrick, E. 2017. Accounting for Privacy in Citizen Science: Ethical Research in a Context of Openness. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (New York, NY, USA, 2017), 2124--2136.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. boyd, danah 2014. It's Complicated: The Social Lives of Networked Teens. Yale University Press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Bridges, K.M. 2017. The Poverty of Privacy Rights. Stanford Law Books.Google ScholarGoogle Scholar
  16. Cate, F.H. 2010. The Limits of Notice and Choice. IEEE Security Privacy. 8, 2 (Mar. 2010), 59--62. DOI: https://doi.org/10.1109/MSP.2010.84.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Chatterjee, R., Doerfler, P., Orgad, H., Havron, S., Palmer, J., Freed, D., Levy, K., Dell, N., McCoy, D. and Ristenpart, T. 2018. The Spyware Used in Intimate Partner Violence. 2018 IEEE Symposium on Security and Privacy (SP) (May 2018), 441--458.Google ScholarGoogle Scholar
  18. Collins, P.H. 2019. Intersectionality as Critical Social Theory. Duke University Press Books.Google ScholarGoogle Scholar
  19. Collins, P.H. 2015. Intersectionality's Definitional Dilemmas. Annual Review of Sociology. 41, 1 (2015), 1--20.Google ScholarGoogle ScholarCross RefCross Ref
  20. Collins, P.H. and Bilge, S. 2016. Intersectionality. Polity.Google ScholarGoogle Scholar
  21. Crenshaw, K. 1989. Demarginalizing the Intersection of Race and Sex: A Black Feminist Critique of Antidiscrimination Doctrine. University of Chicago Legal Forum. 1989, 1 (1989).Google ScholarGoogle Scholar
  22. Domestic Abuse Survivors Go "Underground" With the Tor Network: 2014. http://www.adweek.com/digital/domestic-abusesurvivors-go-underground-tor-network/. Accessed: 2017-08--31.Google ScholarGoogle Scholar
  23. Dourish, P. 2001. Seeking a Foundation for ContextAware Computing. Human--Computer Interaction. 16, 2--4 (Dec. 2001), 229--241. DOI: https://doi.org/10.1207/S15327051HCI16234_0 7.Google ScholarGoogle ScholarCross RefCross Ref
  24. Dym, B. and Fiesler, C. 2018. Vulnerable and Online: Fandom's Case for Stronger Privacy Norms and Tools. Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing (New York, NY, USA, 2018), 329--332.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Ekbia, H. and Nardi, B. 2016. Social Inequality and HCI: The View from Political Economy. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2016), 4997--5002.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Encryption Is a Luxury: 2016. https://www.theatlantic.com/technology/archive/2016 /03/the-digital-security-divide/475590/. Accessed: 2019-08--12.Google ScholarGoogle Scholar
  27. Eubanks, V. 2018. Automating Inequality: How HighTech Tools Profile, Police, and Punish the Poor. St. Martin's Press.Google ScholarGoogle Scholar
  28. Forte, A., Andalibi, N. and Greenstadt, R. 2017. Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (New York, NY, USA, 2017), 1800--1811.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Foucault, M. 1977. Discipline & Punish: The Birth of the Prison. Vintage Books.Google ScholarGoogle Scholar
  30. Foucault, M. 1976. The History of Sexuality, Vol. 1: An Introduction. Vintage.Google ScholarGoogle Scholar
  31. Fox, S., Menking, A., Steinhardt, S., Hoffmann, A.L. and Bardzell, S. 2017. Imagining Intersectional Futures: Feminist Approaches in CSCW. Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (New York, NY, USA, 2017), 387--393.Google ScholarGoogle Scholar
  32. Fox, S., Menking, A., Steinhardt, S., Hoffmann, A.L. and Bardzell, S. 2017. Imagining Intersectional Futures: Feminist Approaches in CSCW. Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (New York, NY, USA, 2017), 387--393.Google ScholarGoogle Scholar
  33. Fraser, N., Bhattacharya, T. and Arruzza, C. 2019. Feminism for the 99%. Verso.Google ScholarGoogle Scholar
  34. Fratantonio, Y., Qian, C., Chung, S.P. and Lee, W. 2017. Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop. 2017 IEEE Symposium on Security and Privacy (SP) (May 2017), 1041--1057.Google ScholarGoogle ScholarCross RefCross Ref
  35. Freed, D., Palmer, J., Minchala, D., Levy, K., Ristenpart, T. and Dell, N. 2018. A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology. (2018), 1--13.Google ScholarGoogle Scholar
  36. Gandy, O.H. 2017. Surveillance and the Formation of Public Policy. Surveillance & Society Biennial Conference (2017).Google ScholarGoogle Scholar
  37. Gavison, R. 1992. Feminism and the Public/Private Distinction. Stanford Law Review. 45, 1 (1992), 1--45. DOI: https://doi.org/10.2307/1228984.Google ScholarGoogle ScholarCross RefCross Ref
  38. Goffman, A. 2014. On the Run: Fugitive Life in an American City. University of Chicago Press.Google ScholarGoogle Scholar
  39. Gray, M.L. 2009. Out in the Country: Youth, Media, and Queer Visibility in Rural America. NYU Press.Google ScholarGoogle Scholar
  40. Gross, R. and Acquisti, A. 2005. Information Revelation and Privacy in Online Social Networks. Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (New York, NY, USA, 2005), 71--80.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Guberek, T., McDonald, A., Simioni, S., Mhaidli, A.H., Toyama, K. and Schaub, F. 2018. Keeping a Low Profile?: Technology, Risk and Privacy Among Undocumented Immigrants. Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2018), 114:1--114:15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Gurses, S. and Hoboken, J. van 2016. Privacy after the Agile Turn. (Aug. 2016). DOI: https://doi.org/None.Google ScholarGoogle Scholar
  43. Hancock, A.-M. 2016. Intersectionality: An Intellectual History. Oxford University Press.Google ScholarGoogle ScholarCross RefCross Ref
  44. Hao, K. 2018. Amazon is the invisible backbone behind ICE's immigration crackdown. MIT Technology Review.Google ScholarGoogle Scholar
  45. Hargittai, E. and Marwick, A. 2016. "What can I really do?" Explaining the privacy paradox with onine apathy. International Journal of Communication. 10, (2016), 3737--3757.Google ScholarGoogle Scholar
  46. Hartsock, N.C. 1983. The Feminist Standpoint: Developing the Ground for a Specifically Feminist Historical Materialism. Discovering Reality. Reidel Publishing Company. 283--310.Google ScholarGoogle Scholar
  47. Hoofnagle, C. and Urban, J. 2014. Alan Westin's Privacy Homo Economicus. Wake Forest Law Review. (Jun. 2014), 261.Google ScholarGoogle Scholar
  48. Hornung, D., Müller, C., Shklovski, I., Jakobi, T. and Wulf, V. 2017. Navigating Relationships and Boundaries: Concerns Around ICT-uptake for Elderly People. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2017), 7057--7069.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Hull, G. 2015. Successful Failure: What Foucault Can Teach Us About Privacy Self-Management in a World of Facebook and Big Data. Ethics and Information Technology. 17, 2 (2015), 89--101.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Igo, S.E. 2018. The Known Citizen: A History of Privacy in Modern America. Harvard University Press.Google ScholarGoogle Scholar
  51. Is China's social credit system as Orwellian as it sounds? https://www.technologyreview.com/f/613027/chinassocial-credit-system-isnt-as-orwellian-as-it-sounds/. Accessed: 2019-07--31.Google ScholarGoogle Scholar
  52. Jernigan, C. and Mistree, B.F.T. 2009. Gaydar: Facebook friendships expose sexual orientation. First Monday. 14, 10 (Sep. 2009). DOI: https://doi.org/10.5210/fm.v14i10.2611.Google ScholarGoogle ScholarCross RefCross Ref
  53. Kang, R., Brown, S. and Kiesler, S. 2013. Why Do People Seek Anonymity on the Internet?: Informing Policy and Design. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2013), 2657--2666.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Kitzie, V. 2019. "That looks like me or something i can do": Affordances and constraints in the online identity work of US LGBTQ+ millennials. Journal of the Association for Information Science and Technology. 0, 0 (2019). DOI: https://doi.org/10.1002/asi.24217.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Kobie, N. 2019. The complicated truth about China's social credit system. Wired UK.Google ScholarGoogle Scholar
  56. Kosinski, M., Stillwell, D. and Graepel, T. 2013. Private traits and attributes are predictable from digital records of human behavior. Proceedings of the National Academy of Sciences. 110, 15 (Apr. 2013), 5802--5805. DOI: https://doi.org/10.1073/pnas.1218772110.Google ScholarGoogle ScholarCross RefCross Ref
  57. Kulwin, N. 2019. Shoshana Zuboff Talks Surveillance Capitalism's Threat to Democracy. New York Magazine.Google ScholarGoogle Scholar
  58. Kumar, N. and Karusala, N. 2019. Intersectional Computing. Interactions. 26, 2 (Feb. 2019), 50--54.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Lampinen, A., Lehtinen, V., Lehmuskallio, A. and Tamminen, S. 2011. We're in It Together: Interpersonal Management of Disclosure in Social Network Services. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2011), 3217--3226.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Lampinen, A., Tamminen, S. and Oulasvirta, A. 2009. All My People Right Here, Right Now: Management of Group Co-presence on a Social Networking Site. Proceedings of the ACM 2009 International Conference on Supporting Group Work (New York, NY, USA, 2009), 281--290.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Lampinen, A., Tamminen, S. and Oulasvirta, A. 2009. All My People Right Here, Right Now: Management of Group Co-presence on a Social Networking Site. Proceedings of the ACM 2009 International Conference on Supporting Group Work (New York, NY, USA, 2009), 281--290.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Lanier, J. 2014. Who Owns the Future?. Simon & Schuster.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Latour, B. 2018. Down to Earth: Politics in the New Climatic Regime. Polity.Google ScholarGoogle Scholar
  64. Laufer, R.S. and Wolfe, M. 1977. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory. Journal of Social Issues. 33, 3 (Jul. 1977), 22--42. DOI: https://doi.org/10.1111/j.15404560.1977.tb01880.x.Google ScholarGoogle ScholarCross RefCross Ref
  65. Lewis, H. 2016. The Politics of Everybody: Feminism, Queer Theory and Marxism at the Intersection. Zed Books.Google ScholarGoogle Scholar
  66. Madden, M. 2017. Privacy, Security, and Digital Inequality.Google ScholarGoogle Scholar
  67. Madden, M., Gilman, M., Levy, K. and Marwick, A. 2017. Privacy, Poverty, and Big Data: A Matrix of Vulnerabilities for Poor Americans. Washington University Law Review. 95, 1 (Jan. 2017), 053--125.Google ScholarGoogle Scholar
  68. Madejski, M., Johnson, M. and Bellovin, S.M. 2012. A study of privacy settings errors in an online social network. 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (Mar. 2012), 340--345.Google ScholarGoogle Scholar
  69. Marwick, A. 2012. The Public Domain: Surveillance in Everyday Life. Surveillance & Society. 9, 4 (Jun. 2012), 378--393.Google ScholarGoogle ScholarCross RefCross Ref
  70. Marwick, A. and boyd, danah 2010. I Tweet Honestly, I Tweet Passionately: Twitter Users, Context Collapse, and the Imagined Audience. New Media & Society. (2010).Google ScholarGoogle Scholar
  71. Marwick, A., Fontaine, C. and boyd, danah 2017. "Nobody Sees It, Nobody Gets Mad": Social Media, Privacy, and Personal Responsibility Among LowSES Youth. Social Media + Society. 3, 2 (Apr. 2017).Google ScholarGoogle Scholar
  72. Marwick, A.E. and boyd, danah 2014. Networked privacy: How teenagers negotiate context in social media. New Media & Society. 16, 7 (Nov. 2014), 1051--1067. DOI: https://doi.org/10.1177/1461444814543995.Google ScholarGoogle ScholarCross RefCross Ref
  73. Marwick, A.E. and Boyd, D. 2018. Privacy at the Margins| Understanding Privacy at the Margins- Introduction. International Journal of Communication. 12, 0 (Mar. 2018), 9.Google ScholarGoogle Scholar
  74. Matthews, T., O'Leary, K., Turner, A., Sleeper, M., Woelfer, J.P., Shelton, M., Manthorne, C., Churchill, E.F. and Consolvo, S. 2017. Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2017), 2189--2201.Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. McDonald, N., Mako Hill, B., Greenstadt, R. and Forte, A. 2019. Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Service Providers. CHI (New York, NY, USA, 2019).Google ScholarGoogle Scholar
  76. Mulligan, D. and King, J. 2011. Bridging the Gap between Privacy and Design. University of Pennsylvania Journal of Constitutional Law. 14, (Jan. 2011), 989.Google ScholarGoogle Scholar
  77. Nardi, B.A. 1996. Studying context: A comparison of activity theory, situated action models, and distributed cognition. Context and consciousness: Activity theory and human--computer interaction. The MIT Press. 69-- 102.Google ScholarGoogle Scholar
  78. Netter, M., Riesner, M., Weber, M. and Pernul, G. 2013. Privacy Settings in Online Social Networks -Preferences, Perception, and Reality. Proceedings of the Hawaii international Conference on System Sciences HICSS'13 (2013), 3219--3228.Google ScholarGoogle Scholar
  79. Newman, N. 2014. The Costs of Lost Privacy: Consumer Harm and Rising Economic Inequality in the Age of Google. William Mitchell Law Review. 40, 2 (2014).Google ScholarGoogle Scholar
  80. Nissenbaum, H. 2004. Privacy as Contextual Integrity. Washington Law Review. 79, 1 (2004), 101--139.Google ScholarGoogle Scholar
  81. Nissenbaum, H. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Norberg, P.A., Horne, D.R. and Horne, D.A. 2007. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs. 41, 1 (Jun. 2007), 100--126. DOI: https://doi.org/10.1111/j.17456606.2006.00070.x.Google ScholarGoogle ScholarCross RefCross Ref
  83. Okin, S.M. 1989. Justice, gender, and the family. Basic Books.Google ScholarGoogle Scholar
  84. Onuma, M., Kimura, A. and Mukawa, N. 2013. Exploring Social Cognition Related to Privacy Settings in SNS Usage. Proceedings of the 2013 International Conference on Signal-Image Technology & Internet-Based Systems (Washington, DC, USA, 2013), 1077--1082.Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Orend, B. 2001. Walzer's General Theory of Justice. Social Theory and Practice. 27, 2 (2001), 207--229.Google ScholarGoogle ScholarCross RefCross Ref
  86. Palen, L. and Dourish, P. 2003. Unpacking "Privacy" for a Networked World. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2003), 129--136.Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Pearce, K.E., Vitakm, J. and Barta, K. 2018. Socially Mediated Visibility: Friendship and Dissent in Authoritarian Azerbaijan. International journal of communication (Online). (Mar. 2018), 1310-.Google ScholarGoogle Scholar
  88. Pierce, J., Fox, S., Merrill, N. and Wong, R. 2018. Differential Vulnerabilities and a Diversity of Tactics: What Toolkits Teach Us About Cybersecurity. Proc. ACM Hum.-Comput. Interact. 2, CSCW (Nov. 2018), 139:1--139:24. DOI: https://doi.org/10.1145/3274408.Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. Pitcan, M., Marwick, A.E. and Boyd, D. 2018. Performing a Vanilla Self: Respectability Politics, Social Class, and the Digital World. Journal of Computer-Mediated Communication. 23, 3 (May 2018), 163--179. DOI: https://doi.org/10.1093/jcmc/zmy008.Google ScholarGoogle ScholarCross RefCross Ref
  90. Rankin, Y.A. and Thomas, J.O. 2019. Straighten Up and Fly Right: Rethinking Intersectionality in HCI Research. Interactions. 26, 6 (Oct. 2019), 64--68.Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. Richardson, J. 2014. Spinoza, Feminism and Privacy: Exploring an Immanent Ethics of Privacy. Feminist Legal Studies; Dordrecht. 22, 3 (Dec. 2014), 225--241. DOI: http://dx.doi.org.ezproxy2.library.drexel.edu/10.1007/s10691-014--9271--3.Google ScholarGoogle Scholar
  92. Rosenblat, A., Kneese, T. and boyd, danah 2014. WorkplaceSurveillance. Data & Society Working Paper. (2014), 19.Google ScholarGoogle Scholar
  93. Scheuerman, M.K., Branham, S.M. and Hamidi, F. 2018. Safe Spaces and Safe Places: Unpacking Technology-Mediated Experiences of Safety and Harm with Transgender People. Proc. ACM Hum.Comput. Interact. 2, CSCW (Nov. 2018), 155:1-- 155:27.Google ScholarGoogle Scholar
  94. Schlesinger, A., Edwards, W.K. and Grinter, R.E. 2017. Intersectional HCI: Engaging Identity Through Gender, Race, and Class. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2017), 5412--5427.Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Selinger, E. and Hartzog, W. 2014. Obscurity and Privacy. Technical Report #ID 2439866. Social Science Research Network.Google ScholarGoogle Scholar
  96. Sleeper, M., Matthews, T., O'Leary, K., Turner, A., Woelfer, J.P., Shelton, M., Oplinger, A., Schou, A. and Consolvo, S. 2019. Tough Times at Transitional Homeless Shelters: Considering the Impact of Financial Insecurity on Digital Security and Privacy. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2019), 89:1--89:12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. Stutzman, F. and Hartzog, W. 2012. Boundary Regulation in Social Media. Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (New York, NY, USA, 2012), 769-- 778.Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. Thomas, J.O., Joseph, N., Williams, A., Crum, C. and Burge, J. 2018. Speaking Truth to Power: Exploring the Intersectional Experiences of Black Women in Computing. 2018 Research on Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT) (Feb. 2018), 1--8.Google ScholarGoogle Scholar
  99. Trappenburg, M. 2000. In Defence of Pure Pluralism: Two Readings of Walzer's Spheres of Justice. Journal of Political Philosophy. 8, 3 (2000), 343--362. DOI: https://doi.org/10.1111/1467--9760.00106.Google ScholarGoogle ScholarCross RefCross Ref
  100. Tufekci, Z. 2007. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science, Technology & Society. 28, 1 (2007), 20--36.Google ScholarGoogle ScholarCross RefCross Ref
  101. Tufekci, Z. 2017. Twitter and Tear Gas: The Power and Fragility of Networked Protest. Yale University Press.Google ScholarGoogle Scholar
  102. Tufekci, Z. 2017. Twitter and Tear Gas: The Power and Fragility of Networked Protest. Yale University Press.Google ScholarGoogle Scholar
  103. Vitak, J., Blasiola, S., Patil, S. and Litt, E. 2015. Balancing Audience and Privacy Tensions on Social Network Sites: Strategies of Highly Engaged Users. International Journal of Communication. 9, 0 (May 2015), 20.Google ScholarGoogle Scholar
  104. Vitak, J., Liao, Y., Subramaniam, M. and Kumar, P. 2018. 'I Knew It Was Too Good to Be True": The Challenges Economically Disadvantaged Internet Users Face in Assessing Trustworthiness, Avoiding Scams, and Developing Self-Efficacy Online. Proc. ACM Hum.-Comput. Interact. 2, CSCW (Nov. 2018), 176:1--176:25. DOI: https://doi.org/10.1145/3274445.Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Walzer, M. 1984. Spheres Of Justice: A Defense Of Pluralism And Equality. Basic Books.Google ScholarGoogle Scholar
  106. Warner, M., Gutmann, A., Sasse, M.A. and Blandford, A. 2018. Privacy Unraveling Around Explicit HIV Status Disclosure Fields in the Online Geosocial Hookup App Grindr. Proc. ACM Hum.-Comput. Interact. 2, CSCW (Nov. 2018), 181:1--181:22.Google ScholarGoogle Scholar
  107. Westin, A.F. 1967. Privacy and Freedom. Atheneum.Google ScholarGoogle Scholar
  108. Wisniewski, P., Ghosh, A.K., Xu, H., Rosson, M.B. and Carroll, J.M. 2017. Parental Control vs. Teen SelfRegulation: Is There a Middle Ground for Mobile Online Safety? Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (New York, NY, USA, 2017), 51--69.Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. Wisniewski, P., Islam, A.K.M.N., Knijnenburg, B.P. and Patil, S. 2015. Give Social Network Users the Privacy They Want. Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (New York, NY, USA, 2015), 1427--1441.Google ScholarGoogle Scholar
  110. Wisniewski, P., Lipford, H. and Wilson, D. 2012. Fighting for My Space: Coping Mechanisms for Sns Boundary Regulation. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2012), 609--618.Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Wisniewski, P.J., Kumar, N., Bassem, C., Clinch, S., Dray, S.M., Fitzpatrick, G., Lampe, C., Muller, M. and Peters, A.N. 2018. Intersectionality As a Lens to Promote Equity and Inclusivity Within SIGCHI. Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2018).Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. Woodruff, A., Pihur, V., Consolvo, S., Schmidt, L., Brandimarte, L. and Acquisti, A. 2014. Would a Privacy Fundamentalist Sell Their DNA for $1000... If Nothing Bad Happened As a Result? The Westin Categories, Behavioral Intentions, and Consequences. Proceedings of the Tenth USENIX Conference on Usable Privacy and Security (Berkeley, CA, USA, 2014), 1--18.Google ScholarGoogle Scholar
  113. Zuboff, S. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs.Google ScholarGoogle Scholar

Index Terms

  1. The Politics of Privacy Theories: Moving from Norms to Vulnerabilities

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems
        April 2020
        10688 pages
        ISBN:9781450367080
        DOI:10.1145/3313831

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 23 April 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate6,199of26,314submissions,24%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format