Congratulations to our STIR Lab authors on the acceptance of 2 full papers to the ACM Conference on Computer-Supported Cooperative Work Workshop on Collective Organizing and Social Responsibility (CSCW 2020)! Citations and Abstracts for the accepted papers are listed below:
- Badillo-Urquiola, K., Shea, Z., Agha, Z., Lediaeva, I., Wisniewski, P., (2020) “Conducting Risky Research with Teens: Co-designing for the Ethical Treatment and Protection of Adolescents” In the Proceedings of the 2020 ACM Conference on Computer Supported Cooperative Work (CSCW 2020).
Abstract: The methods in which we study the online experiences of adolescents should be evidence-based and informed by youth. This is especially true when studying sensitive topics, such as the online risk behaviors of minors. To do this, we directly engaged20 adolescents (ages 12-18) in the co-design of two different research methodologies(i.e., diary studies and analyzing social media trace data) for conducting adolescent online safety research. We also interviewed 13 of their parents to understand their perspectives. Overall, teens wanted to share their personal experiences and beneJit society, while parents wanted researchers to tackle a topic that theyfelt was a prevalent problem for teens. Yet, they both had signiJicant concerns regarding data privacy of thesensitive disclosuresmade by teens during suchstudies, in particular, teens’ fear of getting in trouble. Participantsemphasized the importance of developing a trustingrelationship with the researcher to overcome these concerns. Participants also saw the potential for using the research study as a tool for risk-reporting and mitigation, where researchers could act as liaisons between the teens and other parties (e.g., counselors, law enforcement, parents) to sharepertinent risk details and facilitate resources or even help teens directly by giving them strategies for mitigating online risks they encountered during the study. Our research delves into important ethical considerations for conducting risk-focused research with adolescents anduncovers the critical need for designing risk-based research for youth protection. We provide researchers with heuristic guidelines for conducting ethical research with vulnerable populations(i.e., adolescents) and keeping participants safe while doing so.
- Kropczynski, J., Z., Aljallad, Z., Elrod, N. J., Wisniewski, P., (2020) “Towards Building Community Collective Efficacy for Managing Digital Privacy and Security within Older Adult Communities” In the Proceedings of the 2020 ACM Conference on Computer Supported Cooperative Work, (CSCW 2020).
Abstract: Older adults are increasingly becoming adopters of digital technologies, such as smartphones; however, thispopulation remains particularly vulnerable to digital privacy and security threats. To date, most researchon technology used among older adults focuses on helping individuals overcome their discomfort or lack ofexpertise with technology to protect them from such threats. Instead, we are interested in how communitiesof older adults work together to collectively manage their digital privacy and security. To do this, we surveyed67 individuals across two older adult communities (59 older adults and eight employees or volunteers) andfound that the community’s collective efficacy for privacy and security was significantly correlated with theindividuals’ self-efficacy, power usage of technology, and their sense of community belonging. Communitycollective efficacy is a group’s mutual belief in its ability to achieve a shared goal. Using social network analysis,we further unpacked these relationships to show that many older adults interact with others who have similartechnological expertise, and closer-knit older adult communities that have low technology expertise (i.e.,low power usage and self-efficacy) may increase their community collective efficacy for privacy and securityby embedding facilitators (e.g., employees or volunteers) who have more technical expertise within theircommunities. Our work demonstrates how both peer influence and outside expertise can be leveraged tosupport older adults in managing their digital privacy and security.