skip to main content
10.1145/3234695.3239331acmconferencesArticle/Chapter ViewAbstractPublication PagesassetsConference Proceedingsconference-collections
research-article

Who Should Have Access to my Pointing Data?: Privacy Tradeoffs of Adaptive Assistive Technologies

Published: 08 October 2018 Publication History

Abstract

Customizing assistive technologies based on user needs, abilities, and preferences is necessary for accessibility, especially for individuals whose abilities vary due to a diagnosis, medication, or other external factors. Adaptive Assistive Technologies (AATs) that can automatically monitor a user's current abilities and adapt functionality and appearance accordingly offer exciting solutions. However, there is an often-overlooked privacy tradeoff between usability and user privacy when designing such systems. We present a general privacy threat model analysis of AATs and contextualize it with findings from an interview study with older adults who experience pointing problems. We found that participants had positive attitude towards assistive technologies that gather their personal data but also had strong preferences for how their data should be used and who should have access to it. We identify a need to seriously consider privacy threats when designing assistive technologies to avoid exposing users to them.

References

[1]
Teresa Arroyo-Gallego, María Jesus Ledesma-Carbayo, Álvaro Sánchez-Ferro, Ian Butterworth, Carlos S. Mendoza, Michele Matarazzo, Paloma Montero, Roberto Lopez-Blanco, Veronica Puertas-Martin, Rocio Trincado, and Luca Giancardo. 2017. Detection of Motor Impairment in Parkinson's Disease Via Mobile Touchscreen Typing. IEEE Transactions on Biomedical Engineering, 64 (9), 1994--2002.
[2]
Ali Abdolrahmani, William Easley, Michele Williams, Stacy Branham, and Amy Hurst. 2017. Embracing Errors: Examining How Context of Use Impacts Blind Individuals' Acceptance of Navigation Aid Errors. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17), 4158--4169.
[3]
Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, Claudia Diaz. 2014. The Web Never Forgets: Persistent Tracking Mechanisms in the Wild. in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 674--689.
[4]
David Ahlström, Martin Hitz, and Gerhard Leitner. 2006. An evaluation of sticky and force enhanced targets in multi target situations. In Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles (NordiCHI '06), 58--67.
[5]
Julio Angulo and Martin Ortlieb. 2015. "WTH.!?!" Experiences, Reactions, and Expectations Related to Online Privacy Panic Situations. In Proceedings of the 11th Symposium on Usable Privacy and Security (SOUPS '15), 19--38.
[6]
Tim Baarslag, Alan T. Alan, Richard Gomer, Muddasser Alam, Charith Perera, Enrico H. Gerding, and m.c. schraefel. 2017. An automated negotiation agent for permission management. In Proceedings of Autonomous Agents and MultiAgent Systems, 380--390.
[7]
P. G. Bain, L. J. Findley, P. D. Thompson, M. A. Gresty, J. C. Rothwell, A. E. Harding, C. D. Marsden. 1994. A study of hereditary essential tremor. Brain 117(Pt 4), 805--824.
[8]
Ur Blasé, Pedro G. Leon, Lorrie F. Cranor, Richard Shay, and Yang Wang. 2012. Smart, useful, scary, creepy: Perceptions of online behavioral advertising. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12), Article 4.
[9]
Travis D. Breaux, Annie I. Antón, Kent Boucher, Merlin Dorfman. 2008. Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility. In Proceedings of IEEE 16th International Requirements Engineering Conference (RE'08), 43--52.
[10]
Alex Chaparro, Michael Bohan, Jeffery Fernandez, Sang D. Choi, and Bheem Kattel. 1999. The impact of age on computer input device use. Intl. Journal of Industrial Ergonomics, 24(5), 503--513.
[11]
Yngve Dahl and Kristine Holbø. 2012. "There are no secrets here!": Professional stakeholders' views on the use of GPS for tracking dementia patients. In Proceedings of the 14th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI'12), 133--142.
[12]
Mina Deng, Kim Wuyts, Ricardo Scandariato, Bart Preneel, and Wouter Joosen, 201 A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requirements Eng, 16 (1), 3--32.
[13]
Julia B. Earp, Annie I. Antón, Lynda Aiman-Smith, and William H. Stufflebeam. 2005. Examining Internet privacy policies within the context of user privacy values. IEEE Transactions on Engineering Management, 52 (2), 227--237.
[14]
Leah Findlater, Alex Jansen, Kristen Shinohara, Morgan Dixon, Peter Kamb, Joshua Rakita, and Jacob O. Wobbrock. O. 2010. Enhanced area cursors: reducing fine pointing demands for people with motor impairments. In Proceedings of the 23nd annual ACM symposium on User interface software and technology (UIST '10), 153--162.
[15]
Krysztof Z. Gajos, Daniel S. Weld, and Jacob O. Wobbrock. 2010. Automatically generating personalized user interfaces with Supple. Artificial Intelligence, 174:12--13, 910--950.
[16]
Luca Giancardo, Alvaro Sanchez-Ferro, Teresa Arroyo-Gallego, Ian Butterworth, Carlos S. Mendoza, Paloma Montero, Michele Matarazzo, José A. Obeso, Martha L. Gray, and R. San José Estépar. 2016. Computer keyboard interaction as an indicator of early Parkinson's disease. Scientific reports 6, 34468.
[17]
Vindu Goel and Nicole Perlroth. Yahoo Says 1 Billion User Accounts Were Hacked. The New York Times. Retrieved April 11, 2018 from https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html
[18]
Nanna Gorm and Irina Shklovski. 2016. Sharing Steps in the Workplace: Changing Privacy Concerns Over Time. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16), 4315--4319.
[19]
Peter Gregor, Alan F. Newell. and Mary Zajicek. 2002. Designing for dynamic diversity: interfaces for older people. In Proceedings of the 5th International ACM Conference on Assistive Technologies (ASSETS '02), 151--156.
[20]
Woodrow Hartzog. 2018. Privacy's Blueprint: The Battle to Control the Design of New Technologies. Harvard University Press.
[21]
Michael Heron, Vicki Hanson, and Ian Ricketts. 2013. Accessibility Support for Older Adults with the ACCESS Framework. International Journal of Human-Computer Interaction, 29(11), 702--716.
[22]
Scott Hollier and Shadi Abou-Zahra. Internet of Things (IoT) as Assistive Technology: Potential Applications in Tertiary Education. Proceedings of the 15th International Cross-Disciplinary Conference on Web Accessibility (W4A '18). ACM, New York, NY, USA, 4 pages.
[23]
Juan P. Hourcade, and Theresa R. Berkel. 2008. Simple pen interaction performance of young and older adults using handheld computers. Interacting with Computers, 20(1), 166--183.
[24]
Amy Hurst, Scott E. Hudson, Jennifer Mankoff, and Shari Trewin. 2013. Distinguishing users by pointing performance in laboratory and real-world tasks. ACM Transactions on Accessible Computing, 5(2), 5.
[25]
Hilary Hutchinson, Mackay, W., Westerlund, B., Bederson, B, Druin, A., Plaisant, C, Beaudouin-Lafon, M., Conversy, S., Evans, H., Hansen, H., Roussel, N., and Eiderbäck, B. 2003. Technology Probes: Inspiring Design for and with Families. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'03), 17--24.
[26]
Anthony Jamerson. 2008. Adaptive Interfaces and Agents. In A. Sears & J. A. Jacko (Eds.), The human-computer interaction handbook: Fundamentals, evolving technologies and emerging applications (2nd ed.), 433--458. Boca Raton, FL: CRC Press.
[27]
Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. "My Data Just Goes Everywhere:" User Mental Models of the Internet and Implications for Privacy and Security. In Proceedings of the 11th Symposium On Usable Privacy and Security (SOUPS '15), 39--52.
[28]
Simeon Keates and Shari Trewin. 2005. Effect of age and Parkinson's disease on cursor positioning using a mouse. In Proceedings of the 7th International ACM SIGACCESS Conference on Computers and Accessibility (ASSETS'05), 68--75.
[29]
Caroline J. Ketcham and George E. Stelmach. 2004. Movement Control in the Older Adult. In R. W. Pew & S. B. Van Hemel (Eds.), National Research Council (US) Steering Committee for the Workshop for Technology for Adaptive Aging, National Academies Press, 64--92.
[30]
Keith Kirkpatrick. 2016. Battling Algorithmic Bias: How do we ensure algorithms treat us fairly?, Communications of the ACM, 59 (10), 16--17.
[31]
Alfred Kobsa. 2007. Privacy-enhanced personalization. Commun. ACM, 50 (8), 24--33.
[32]
Ruth Landau, Gail K. Auslander, Shirli Werner, Noam Shoval, and Jeremia Heinik. 2010. Families' and professional caregivers' views of using advanced technology to track people with dementia. Qual. Health Res. 20, 3 (March 2010), 409--419.
[33]
Ruth Landau, Shirli Werner, Gail K. Auslandei Noam Shoval, and Jeremia Heinik. 2009. Attitudes of family and professional care-givers towards the use of GPS for tracking patients with dementia: An Exploratory study. Br. J. Soc. 39, 4 (June 2009), 670--692.
[34]
Talia Lavie and Joachim Meyer. J. 2010. Benefits and costs of adaptive user interfaces. Int. J. Hum.-Comput. Stud., 68 (8), 508--524.
[35]
Hosub Lee and Alfred Kobsa. 2017 Privacy preference modeling and prediction in a simulated campuswide IoT environment. In IEEE International Conference on Pervasive Computing and Communications (PerCom '17), 276--285.
[36]
Louis Li. 2014. Adaptive click-and-cross: adapting to both abilities and task improves performance of users with impaired dexterity. In Proceedings of the 19th international conference on Intelligent User Interfaces (IUI '14), 299--304.
[37]
Xinmin Liu, Nora Hernandez, Sergey Kisselev, Aris Floratos, Ashley Sawle, Iuliana Ionita-Laza, Ruth Ottman, Elan D. Louis, and Lorraine N. Clark. 2016 Identification of candidate genes for familial early-onset essential tremor. European Journal of Human Genetics 24 (7), 1009--1115.
[38]
Elan D. Louis. 2001. Clinical practice. Essential tremor. N Engl. J. Med. 345, 887--891.
[39]
Elan D. Louis, L. Barnes, S. M. Albert, L. Cote, F. R. Schneier, S. L. Pullman, and Q. Yu. 2001. Correlates of functional disability in essential tremor. Mov. Disord. 16, 914--920.
[40]
Elan D. Louis and Ruth Ottman. 2014. How many people in the USA have essential tremor? Deriving a population estimate based on epidemiological data. Tremor Other Hyperkinet Mov (4), 259.
[41]
Andrew McNeill, Pam Briggs, Jake Pywell, and Lynne Coventry. 2017. Functional Privacy Concerns of Older Adults about Pervasive Health-Monitoring Systems. In Proceedings of the 10th International Conference on PErvasive Technologies Related to Assistive Environments (PETRA '17), 96--102.
[42]
Aleecia M. McDonald and Lorrie F. Cranor, 2008. The Cost of Reading Privacy Policies. I/S: A Journal of Law and Policy for the Information Society, vol. 2008 Privacy Year in Review Issue.
[43]
Aleecia M. McDonald and Lorrie F. Cranor. 2010. Beliefs and Behaviors: Internet Users' Understanding of Behavioral Advertising. In Proceedings of TPRC'10.
[44]
Aleecia M. McDonald and Lorrie F. Cranor. 2008. The cost of reading privacy policies. I/S: A Journal of Law and Policy for the Information Society, 4, 543--568.
[45]
Aqueasha Martin-Hammond, Foad Hamidi, Tejas Bhalerao, Christian Ortega, Abdullah Ali, Catherine Hornback, Casey Means, Amy Hurst. 2018. Designing an Adaptive Web Navigation Interface for Users with Variable Pointing Performance. In Proceedings of the 15th International Cross-Disciplinary Conference on Web Accessibility (W4A '18). ACM, New York, NY, USA, Paper 16, 10 pages.
[46]
Aqueasha Martin-Hammond, Abdullah Ali, Casey Means, Catherine Hornback, and Amy Hurst. 2016. Supporting Awareness of Pointing Behavior among Diverse Groups. In Proceedings of the 10th EAI International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth '16), 231--234.
[47]
Aqueasha Martin-Hammond, Abdullah Ali, Catherine Hornback, and Amy Hurst. 2015. Understanding design considerations for adaptive user interfaces for accessible pointing with older and younger adults. In Proceedings of the 12th Web for All Conference (W4A '15), Article 19, 10 pages.
[48]
Karyn Moffatt and Joanna McGrenere. 2009. Exploring Methods to Improve Pen-Based Menu Selection for Younger and Older Adults. ACM Trans. Access. Comput. 2, 1, Article 3, 34 pages.
[49]
Karyn Moffatt, Sandra Yuen, and Joanna McGrenere. 2008. Hover or tap?: supporting pen-based menu navigation for older adults. In Proceedings of the International ACM SIGACCESS Conference on Computers and Accessibility (ASSETS '08), ACM Press, 51--58.
[50]
Fabian Monrose and Aviel D. Rubin. 2000. Keystroke dynamics as a biometric for authentication. Future Generation computer systems, 16(4), 351--9.
[51]
Keaton Mowery and Hovav Shacham. 2012. Pixel perfect: Fingerprinting canvas in HTML5. In Web 2.0 Workshop on Security and Privacy.
[52]
Richard Pak, and Anne C. McLaughlin. 2010. Designing displays for older adults. Boca Raton, FL: CRC Press.
[53]
Pew Research Center. 2017. Automation in Everyday Life.
[54]
Ilkka Rautakorpi. 1978. Essential Tremor. An Epidemiological, Clinical and Genetic Study. Finland: Academic Dissertation University of Turku.
[55]
Sumathi Reddy. 2018. Clues to Parkinson's and Alzheimer's From How You Use Your Computer. The Wall Street Journal. Retrieved June 19, 2018 from https://www.wsj.com/articles/clues-to-parkinsons-disease-from-how-you-use-your-computer-1527600547
[56]
Matthew Rosenberg, Nicholas Confessore and Carole Cadwalladr. 2018. How Trump Consultants Exploited the Facebook Data of Millions. The New York Times. Retrieved April 11, 2018 from https://www.nytimes.com/2018/03/17/us/politics/cambridge-analytica-trump-campaign.html
[57]
Ling Rothrock, Richard Koubek, Frederic Fuchs, Michael Haas, and Gavriel Salvendy. 2010. Review and reappraisal of adaptive interfaces: Toward biologically inspired paradigms. Theoretical Issues in Ergonomics Science, 3(1), 47--84.
[58]
Andrew Sears, Min Lin, Julie Jacko, and Yan Xiao. 2003. When Computers Fade: Pervasive Computing and Situationally-Induced Impairments and Disabilities. In Proc. of HCII'03, 1298--1302.
[59]
Irina Shklovski, Scott D. Mainwaring, Halla Hrund Skúladóttir, and Höskuldur Borgthorsson. 2014. Leakiness and Creepiness in App Space: Perceptions of Privacy and Mobile App Use. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14), 2347--2356.
[60]
Adam Shostack. 2014. Threat Modeling: Designing for Security. Wiley Press.
[61]
David Sloan, Matthew T. Atkinson, Colin Machin, and Yungqiu Li, Y. 2010. The potential of adaptive interfaces as an accessibility aid for older web users. In Proceedings of the 2010 International Cross Disciplinary Conference on Web Accessibility (W4A '10). Article 35, 10 pages.
[62]
Symantec Corporation. Internet security threat report. 19, April 2014.
[63]
Alvaro D. Taveira and Sang D. Choi. 2009. Review Study of Computer Input Devices and Older Users. Intl. Journal of Human-Computer Interaction, 25(5), 455--474.
[64]
Shari Trewin. 2000. Configuration agents, control and privacy. In Proceedings on the 2000 conference on Universal Usability (CUU '00), 9--16.
[65]
Shari Trewin, Simeon Keates, and Karyn Moffatt. 2006. Developing steady clicks: a method of cursor assistance for people with motor impairments. In Proceedings of the 8th International ACM SIGACCESS Conference on Computers and Accessibility, 26--33.
[66]
Alexander I. Troster, Rajesh Pahwa, Julie A. Fields, Caroline M. Tanner, Kelly E. Lyons. 2005. Quality of life in essential tremor questionnaire (QUEST): development and initial validation. Parkinsonism Relat. Disord. 11, 367--373.
[67]
U.S. Department of Health & Human Services. 2017. Your Rights Under HIPPA. HHS.gov. Retrieved June 10, 2018 from https://www.hhs.gov/hipaa/for-individuals/guidance-materials-for-consumers/index.html
[68]
W3C. Accessible Rich Internet Applications (WAI-ARIA). Retrieved June 21, 2018 from https://www.w3.org/TR/wai-aria/
[69]
Lin Wan, Claudia Müller, Dave Randall, and Volker Wulf. 2016. Design of A GPS Monitoring System for Dementia Care and its Challenges in Academia-Industry Project. ACM Trans. Comput.-Hum. Interact. 23, 5, Article 31 (October 2016), 36 pages.
[70]
Ryan W. White, P. Murali Doraiswamy, and Eric Horvitz. 2018. Detecting neurodegenerative disorders from web search signals. npj Digital Medicine 1(1), 8.
[71]
Madhu M. Wickremaratchi, and John G. Llewelyn. 2006. Effects of ageing on touch. Postgraduate Medical Journal, 82(967), 301--304.
[72]
Jacob O. Wobbrock, Shaun K. Kane, Krzysztof Z. Gajos, Susumu Harada, and Jon Froehlich. 2011. Ability-Based Design: Concept, Principles and Examples. ACM Trans. Access. Comput. 3, 3, Article 9, 27 pages.
[73]
Wobbrock, J., Fogarty, F., Liu, S., Kimuro, S., and Harada, S. 2009. The angle mouse: target-agnostic dynamic gain adjustment based on angular deviation. In Proc. of CHI'09. ACM Press, 1401--1410.
[74]
Eileen Wood, Teena Willoughby, Alice Rushing, Lisa Bechtel, and Jessica Gilbert. 2005. Use of Computer Input Devices by Older Adults. Journal of Applied Gerontology, 24(5), 419--438.
[75]
Aileen Worden, Nef Walker, Krishna Bharat, Scott Hudson. 1997. Making computers easier for older adults to use: area cursors and sticky icons. In Proceedings of the ACM SIGCHI Conference on Human factors in computing systems, 266--271.
[76]
Kim Wuyts, Riccardo Scandariato, and Wouter Joosen, 2014. Empirical evaluation of a privacy-focused threat modeling methodology. Journal of Systems and Software (96), 122--138.
[77]
Wei Zhou and Selwyn Piramuthu. 2014. Security/Privacy of Wearable Fitness Tracking IoT Devices. In Proceedings of the 9th Iberian Conference on Information Systems and Technologies (CISTI '14), 1--5.

Cited By

View all
  • (2024)Decoding the Privacy Policies of Assistive TechnologiesProceedings of the 21st International Web for All Conference10.1145/3677846.3677850(87-95)Online publication date: 13-May-2024
  • (2024)I Don’t Want to Sound Rude, but It’s None of Their Business: Exploring Security and Privacy Concerns around Assistive Technology Use in Educational SettingsACM Transactions on Accessible Computing10.1145/367069017:2(1-30)Online publication date: 29-Jul-2024
  • (2024)DREEM: Moving from Empathy to Enculturation in Disability Related Human-Centered DesignProceedings of the 26th International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3663548.3675642(1-17)Online publication date: 27-Oct-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASSETS '18: Proceedings of the 20th International ACM SIGACCESS Conference on Computers and Accessibility
October 2018
508 pages
ISBN:9781450356503
DOI:10.1145/3234695
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 October 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. adaptive systems
  2. assistive technology
  3. essential tremors
  4. older adults
  5. pointing
  6. privacy
  7. threat modeling

Qualifiers

  • Research-article

Funding Sources

Conference

ASSETS '18
Sponsor:

Acceptance Rates

ASSETS '18 Paper Acceptance Rate 28 of 108 submissions, 26%;
Overall Acceptance Rate 436 of 1,556 submissions, 28%

Upcoming Conference

ASSETS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)92
  • Downloads (Last 6 weeks)10
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Decoding the Privacy Policies of Assistive TechnologiesProceedings of the 21st International Web for All Conference10.1145/3677846.3677850(87-95)Online publication date: 13-May-2024
  • (2024)I Don’t Want to Sound Rude, but It’s None of Their Business: Exploring Security and Privacy Concerns around Assistive Technology Use in Educational SettingsACM Transactions on Accessible Computing10.1145/367069017:2(1-30)Online publication date: 29-Jul-2024
  • (2024)DREEM: Moving from Empathy to Enculturation in Disability Related Human-Centered DesignProceedings of the 26th International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3663548.3675642(1-17)Online publication date: 27-Oct-2024
  • (2024)“That’s Kind of Sus(picious)”: The Comprehensiveness of Mental Health Application Users’ Privacy and Security ConcernsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642705(1-16)Online publication date: 11-May-2024
  • (2024)Good Days, Bad Days: Understanding the Trajectories of Technology Use During Chronic Fatigue SyndromeProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642553(1-10)Online publication date: 11-May-2024
  • (2023)Bridging the Gap: Towards Advancing Privacy and AccessibilityProceedings of the 25th International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3597638.3615653(1-4)Online publication date: 22-Oct-2023
  • (2023)“Not There Yet”: Feasibility and Challenges of Mobile Sound Recognition to Support Deaf and Hard-of-Hearing PeopleProceedings of the 25th International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3597638.3608431(1-14)Online publication date: 22-Oct-2023
  • (2023)“I just thought it was me”: How Smartphones Fail Users with Mild-to-Moderate Dexterity DifferencesProceedings of the 25th International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3597638.3608396(1-12)Online publication date: 22-Oct-2023
  • (2023)Contributing to Accessibility Datasets: Reflections on Sharing Study Data by Blind PeopleProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581337(1-18)Online publication date: 19-Apr-2023
  • (2023)Hacking, Switching, Combining: Understanding and Supporting DIY Assistive Technology Design by Blind PeopleProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581249(1-17)Online publication date: 19-Apr-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media