skip to main content
research-article
Public Access

Privacy Research with Marginalized Groups: What We Know, What's Needed, and What's Next

Published: 11 November 2022 Publication History

Abstract

People who are marginalized experience disproportionate harms when their privacy is violated. Meeting their needs is vital for developing equitable and privacy-protective technologies. In response, research at the intersection of privacy and marginalization has acquired newfound urgency in the HCI and social computing community. In this literature review, we set out to understand how researchers have investigated this area of study. What topics have been examined, and how? What are the key findings and recommendations? And, crucially, where do we go from here? Based on a review of papers on privacy and marginalization published between 2010-2020 across HCI, Communication, and Privacy-focused venues, we make three main contributions: (1) we identify key themes in existing work and introduce the Privacy Responses and Costs framework to describe the tensions around protecting privacy in marginalized contexts, (2) we identify understudied research topics (e.g., race) and other avenues for future work, and (3) we characterize trends in research practices, including the under-reporting of important methodological choices, and provide suggestions to establish shared best practices for this growing research area.

Supplementary Material

ZIP File (v6cscw2455aux.zip)
This is a supplementary file for the following CSCW paper: Shruti Sannon and Andrea Forte. 2022. Privacy Research with Marginalized Groups: What We Know, What's Needed, and What?s Next. Proc. ACM Hum.-Comput. Interact. 6, CSCW2, Article 455 (November 2022), 33 pages. https://doi.org/10.1145/3555556

References

[1]
Jacob Abbott, Haley MacLeod, Novia Nurain, Gustave Ekobe, and Sameer Patil. 2019. Local standards for anonymization practices in health, wellness, accessibility, and aging research at CHI. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--14.
[2]
Syed Ishtiaque Ahmed, Md Romael Haque, Jay Chen, and Nicola Dell. 2017. Digital privacy challenges with shared mobile phone use in Bangladesh. Proceedings of the ACM on Human-Computer Interaction, Vol. 1, CSCW (2017), 1--20.
[3]
Tousif Ahmed, Roberto Hoyle, Kay Connelly, David Crandall, and Apu Kapadia. 2015. Privacy concerns and behaviors of people with visual impairments. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 3523--3532.
[4]
Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, and Bryan Semaan. 2020. “I am uncomfortable sharing what I can't see”: Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. In 29th USENIX Security Symposium. 1929--1948.
[5]
Fatma Alshohoumi, Mohammed Sarrab, Abdulla AlHamadani, and Dawood Al-Abri. 2019. Systematic review of existing IoT architectures security and privacy issues and concerns. Int. J. Adv. Comput. Sci. Appl, Vol. 10, 7 (2019), 232--251.
[6]
Louise Barkhuus. 2012. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 367--376.
[7]
Susanne Barth and Menno DT De Jong. 2017. The privacy paradox--Investigating discrepancies between expressed privacy concerns and actual online behavior--A systematic literature review. Telematics and informatics, Vol. 34, 7 (2017), 1038--1058.
[8]
Lindsay Blackwell, Jean Hardy, Tawfiq Ammari, Tiffany Veinot, Cliff Lampe, and Sarita Schoenebeck. 2016. LGBT parents and social media: Advocacy, privacy, and disclosure during shifting social movements. In Proceedings of the 2016 CHI conference on human factors in computing systems. 610--622.
[9]
Louis Brandeis and Samuel Warren. 1890. The right to privacy. Harvard law review, Vol. 4, 5 ( 1890), 193--220.
[10]
Amy Bruckman. 2014. Research ethics and HCI. In Ways of Knowing in HCI, Judith S. Olson and Wendy A. Kellogg (Eds.). Springer, 449--468.
[11]
José González Caba nas, Ángel Cuevas, and Rubén Cuevas. 2018. Unveiling and quantifying Facebook exploitation of sensitive personal data for advertising purposes. In 27th USENIX Security Symposium. 479--495.
[12]
Kelly Caine. 2016. Local standards for sample size at CHI. In Proceedings of the 2016 CHI conference on human factors in computing systems. 981--992.
[13]
Matthew Carrasco and Andruid Kerne. 2018. Queer visibility: Supporting LGBT selective visibility on social media. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--12.
[14]
Christine Chen, Nicola Dell, and Franziska Roesner. 2019. Computer security and privacy in the interactions between victim service providers and human trafficking survivors. In 28th USENIX Security Symposium. 89--104.
[15]
Taejoong Chung, Jinyoung Han, Daejin Choi, Ted Taekyoung Kwon, Jong-Youn Rha, and Hyunchul Kim. 2017. Privacy leakage in event-based social networks: A meetup case study. Proceedings of the ACM on Human-Computer Interaction, Vol. 1, CSCW (2017), 1--22.
[16]
Rachel Clarke, Peter Wright, Madeline Balaam, and John McCarthy. 2013. Digital portraits: photo-sharing after domestic violence. In Proceedings of the SIGCHI conference on Human factors in computing systems. 2517--2526.
[17]
Nuremberg Code. 1949. The Nuremberg Code. Trials of war criminals before the Nuremberg military tribunals under control council law, Vol. 10, 1949 (1949), 181--2.
[18]
Kay Cook. 2008. Marginalized populations. The SAGE encyclopedia of qualitative research methods (2008), 495--496.
[19]
Raymundo Cornejo, Robin Brewer, Caroline Edasis, and Anne Marie Piper. 2016. Vulnerability, sharing, and privacy: Analyzing art therapy for older adults with dementia. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. 1572--1583.
[20]
Council of European Union. 2014. Council Directive 2000/43/EC implementing the principle of equal treatment between persons irrespective of racial or ethnic origin. newlinehttps://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32000L0043.
[21]
Yngve Dahl and Kristine Holbø. 2012. “There are no secrets here!” Professional stakeholders' views on the use of GPS for tracking dementia patients. In Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services. 133--142.
[22]
Sanchari Das, Robert S Gutzwiller, Rod D Roscoe, Prashanth Rajivan, Yang Wang, L Jean Camp, and Roberto Hoyle. 2020. Humans and technology for inclusive privacy and security. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 64. SAGE Publications Sage CA: Los Angeles, CA, 461--464.
[23]
Nicola Dell and Neha Kumar. 2016. The ins and outs of HCI for development. In Proceedings of the 2016 CHI conference on human factors in computing systems. 2220--2232.
[24]
Michael Ann DeVito, Ashley Marie Walker, and Jeremy Birnholtz. 2018. 'Too Gay for Facebook' Presenting LGBTQ Identity Throughout the Personal Social Media Ecosystem. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (2018), 1--23.
[25]
Tobias Dienlin and Miriam J Metzger. 2016. An extended privacy calculus model for SNSs: Analyzing self-disclosure and self-withdrawal in a representative US sample. Journal of Computer-Mediated Communication, Vol. 21, 5 (2016), 368--383.
[26]
Tawanna R Dillahunt, Xinyi Wang, Earnest Wheeler, Hao Fei Cheng, Brent Hecht, and Haiyi Zhu. 2017. The sharing economy in computing: A systematic literature review. Proceedings of the ACM on Human-Computer Interaction, Vol. 1, CSCW (2017), 1--26.
[27]
Carl DiSalvo, Phoebe Sengers, and Hrönn Brynjarsdóttir. 2010. Mapping the landscape of sustainable HCI. In Proceedings of the SIGCHI conference on human factors in computing systems. 1975--1984.
[28]
Bryan Dosono, Jordan Hayes, and Yang Wang. 2015. ?I'm Stuck!": A Contextual Inquiry of People with Visual Impairments in Authentication. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). 151--168.
[29]
Brianna Dym and Casey Fiesler. 2020. Social Norm Vulnerability and its Consequences for Privacy and Safety in an Online Community. Proceedings of the ACM on Human-Computer Interaction, Vol. 4, CSCW2 (2020), 1--24.
[30]
Kim VL England. 1994. Getting personal: Reflexivity, positionality, and feminist research. The professional geographer, Vol. 46, 1 (1994), 80--89.
[31]
Josephine Ensign. 2003. Ethical issues in qualitative health research with homeless youths. Journal of advanced nursing, Vol. 43, 1 (2003), 43--50.
[32]
Sandra K Evans, Katy E Pearce, Jessica Vitak, and Jeffrey W Treem. 2017. Explicating affordances: A conceptual framework for understanding affordances in communication research. Journal of Computer-Mediated Communication, Vol. 22, 1 (2017), 35--52.
[33]
Julia R Fernandez and Jeremy Birnholtz. 2019. “I Don't Want Them to Not Know” Investigating Decisions to Disclose Transgender Identity on Dating Platforms. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1--21.
[34]
National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. 1979. The Belmont Report. (1979).
[35]
Andrea Forte, Nazanin Andalibi, and Rachel Greenstadt. 2017. Privacy, anonymity, and perceived risk in open collaboration: A study of Tor users and Wikipedians. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. 1800--1811.
[36]
Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, and Nicola Dell. 2019. “Is my phone hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1--24.
[37]
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. ?A Stalker's Paradise" How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI conference on human factors in computing systems. 1--13.
[38]
Diana Freed, Jackeline Palmer, Diana Elizabeth Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2017. Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders. Proceedings of the ACM on Human-Computer Interaction, Vol. 1, CSCW (2017), 1--22.
[39]
Niki Fritz and Amy Gonzales. 2018. Not the normal trans story: negotiating trans narratives while crowdfunding at the margins. International Journal of Communication, Vol. 12 (2018), 20.
[40]
Lara Fullenwieder and Adam Molnar. 2018. Settler governance and privacy: Canada's Indian Residential School Settlement Agreement and the mediation of state-based violence. International journal of communication, Vol. 12 (2018), 1332--1349.
[41]
Seeta Pe na Gangadharan. 2017. The downside of digital inclusion: Expectations and experiences of privacy and surveillance among marginal Internet users. New Media & Society, Vol. 19, 4 (2017), 597--615.
[42]
Amy Gonzales and Nicole Fritz. 2017. Prioritizing flexibility and intangibles: Medical crowdfunding for stigmatized individuals. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 2371--2375.
[43]
Government of India. 2016. The Rights of Persons with Disabilities Act. newlinehttps://legislative.gov.in/sites/default/files/A2016--49_1.pdf.
[44]
Kathryn Greene, Valerian J Derlega, Gust A Yep, and Sandra Petronio. 2003. Privacy and disclosure of HIV in interpersonal relationships: A sourcebook for researchers and practitioners. Routledge.
[45]
Tamy Guberek, Allison McDonald, Sylvia Simioni, Abraham H Mhaidli, Kentaro Toyama, and Florian Schaub. 2018. Keeping a low profile? Technology, risk and privacy among undocumented immigrants. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--15.
[46]
Oliver L Haimson, Anne E Bowser, Edward F Melcer, and Elizabeth F Churchill. 2015. Online inspiration and exploration for identity reinvention. In Proceedings of the 33rd annual ACM Conference on Human Factors in Computing Systems. 3809--3818.
[47]
Oliver L Haimson, Justin Buss, Zu Weinger, Denny L Starks, Dykee Gorrell, and Briar Sweetbriar Baron. 2020. Trans Time: Safety, Privacy, and Content Warnings on a Transgender-Specific Social Media Site. Proceedings of the ACM on Human-Computer Interaction, Vol. 4, CSCW2 (2020), 1--27.
[48]
Joanne M Hall, Patricia E Stevens, and Afaf Ibrahim Meleis. 1994. Marginalization: A guiding concept for valuing diversity in nursing knowledge development. Advances in nursing science (1994).
[49]
Sherry Hamby, Elizabeth Taylor, Alli Smith, Kimberly Mitchell, and Lisa Jones. 2018. Technology in rural Appalachia: Cultural strategies of resistance and navigation. International Journal of Communication, Vol. 12 (2018), 21.
[50]
Foad Hamidi, Morgan Klaus Scheuerman, and Stacy M Branham. 2018. Gender recognition or gender reductionism? The social implications of embedded gender recognition systems. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--13.
[51]
Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2019. Clinical computer security for victims of intimate partner violence. In 28th USENIX Security Symposium. 105--122.
[52]
Jordan Hayes, Smirity Kaushik, Charlotte Emily Price, and Yang Wang. 2019. Cooperative privacy and security: Learning from people with visual impairments and their allies. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019).
[53]
Lasse Herskind, Panagiota Katsikouli, and Nicola Dragoni. 2020. Privacy and cryptocurrencies-A systematic literature review. IEEE Access, Vol. 8 (2020), 54044--54059.
[54]
Hwajung Hong, Jennifer G Kim, Gregory D Abowd, and Rosa I Arriaga. 2012. Designing a social network to support the independence of young adults with autism. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work. 627--636.
[55]
Julie Hui, Nefer Ra Barber, Wendy Casey, Suzanne Cleage, Danny C Dolley, Frances Worthy, Kentaro Toyama, and Tawanna R Dillahunt. 2020. Community collectives: Low-tech social support for digitally-engaged entrepreneurship. In Proceedings of the 2020 CHI conference on human factors in computing systems. 1--15.
[56]
Julie Hui, Kentaro Toyama, Joyojeet Pal, and Tawanna Dillahunt. 2018. Making a living my way: Necessity-driven entrepreneurship in resource-constrained communities. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (2018), 1--24.
[57]
Aarti Israni, Sheena Erete, and Che L Smith. 2017. Snitches, Trolls, and Social Norms: Unpacking Perceptions of Social Media Use for Crime Prevention. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. 1193--1209.
[58]
Margaret C Jack, Pang Sovannaroth, and Nicola Dell. 2019. “Privacy is not a concept, but a way of dealing with life” Localization of Transnational Technology Platforms and Liminal Privacy Practices in Cambodia. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1--19.
[59]
Dhruv Jain, Kelly Mack, Akli Amrous, Matt Wright, Steven Goodman, Leah Findlater, and Jon E Froehlich. 2020. Homesound: An iterative field deployment of an in-home sound awareness system for deaf or hard of hearing users. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--12.
[60]
Jazette Johnson, Rebecca W Black, and Gillian R Hayes. 2020. Roles in the Discussion: An Analysis of Social Support in an Online Forum for People with Dementia. Proceedings of the ACM on Human-Computer Interaction, Vol. 4, CSCW2 (2020), 1--30.
[61]
Jennifer A Kam, Andy J Merolla, and Andrew C High. 2020. Latinx immigrant youth's indirect and direct disclosures about their family - undocumented experiences, received emotional support, and depressive symptoms. Communication Research, Vol. 47, 4 (2020), 599--622.
[62]
Naveena Karusala, Apoorva Bhalla, and Neha Kumar. 2019. Privacy, patriarchy, and participation on social media. In Proceedings of the 2019 on Designing Interactive Systems Conference. 511--526.
[63]
Elaine Kasket. 2009. Protocol for Responding to Participant Distress. Adapted Version for Telephone/Skype (2009).
[64]
Christina Katsini, Yasmeen Abdrabou, George E Raptis, Mohamed Khamis, and Florian Alt. 2020. The role of eye gaze in security and privacy applications: Survey and future HCI research directions. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--21.
[65]
Khalid S Khan, Regina Kunz, Jos Kleijnen, and Gerd Antes. 2003. Five steps to conducting a systematic review. Journal of the royal society of medicine, Vol. 96, 3 (2003), 118--121.
[66]
Robert Klitzman, Ilene Albala, Joseph Siragusa, Kristen N Nelson, and Paul S Appelbaum. 2007. The reporting of monetary compensation in research articles. Journal of Empirical Research on Human Research Ethics, Vol. 2, 4 (2007), 61--67.
[67]
Bart P Knijnenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas Proferes, and Jennifer Romano. 2022. Modern Socio-Technical Perspectives on Privacy.
[68]
Roxanne Leit ao. 2019. Anticipating smart home security and privacy threats with survivors of intimate partner abuse. In Proceedings of the 2019 on Designing Interactive Systems Conference. 527--539.
[69]
Ada Lerner, Helen Yuxun He, Anna Kawakami, Silvia Catherine Zeamer, and Roberto Hoyle. 2020. Privacy and activism in the transgender community. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--13.
[70]
Xiaoqian Li, Wenhong Chen, and Joseph D Straubhaar. 2018. Concerns, Skills, and Activities: Multilayered Privacy Issues in Disadvantaged Urban Communities. International Journal of Communication, Vol. 12 (2018), 22.
[71]
Calvin A Liang, Sean A Munson, and Julie A Kientz. 2021. Embracing Four Tensions in Human-Computer Interaction Research with Marginalized People. ACM Transactions on Computer-Human Interaction (TOCHI), Vol. 28, 2 (2021), 1--47.
[72]
Amjad Mahfuth, Jaspaljeet Singh Dhillon, and S Mohd Drus. 2016. A systematic review on data security and patient privacy issues in electronic medical records. (2016).
[73]
Elena Maris, Timothy Libert, and Jennifer R Henrichsen. 2020. Tracking sex: The implications of widespread sexual data leakage and tracking on porn websites. New Media & Society, Vol. 22, 11 (2020), 2018--2038.
[74]
Alice Marwick, Claire Fontaine, and Danah Boyd. 2017. ?Nobody sees it, nobody gets mad": Social media, privacy, and personal responsibility among low-SES youth. Social Media Society, Vol. 3, 2 (2017).
[75]
Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F Churchill, and Sunny Consolvo. 2017. Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 2189--2201.
[76]
Nora McDonald, Karla Badillo-Urquiola, Morgan G Ames, Nicola Dell, Elizabeth Keneski, Manya Sleeper, and Pamela J Wisniewski. 2020. Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1--8.
[77]
Nora McDonald and Andrea Forte. 2020. The politics of privacy theories: Moving from norms to vulnerabilities. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--14.
[78]
Nora McDonald, Sarita Schoenebeck, and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1--23.
[79]
Helena M Mentis, Galina Madjaroff, Aaron Massey, and Zoya Trendafilova. 2020. The Illusion of Choice in Discussing Cybersecurity Safeguards Between Older Adults with Mild Cognitive Impairment and Their Caregivers. Proceedings of the ACM on Human-Computer Interaction, Vol. 4, CSCW2 (2020), 1--19.
[80]
Helena M Mentis, Galina Madjaroff, and Aaron K Massey. 2019. Upside and downside risk in online security for older adults with mild cognitive impairment. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--13.
[81]
David Moher, Alessandro Liberati, Jennifer Tetzlaff, Douglas G Altman, and Prisma Group. 2009. Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. PLoS medicine, Vol. 6, 7 (2009), e1000097.
[82]
Claudia Müller, Lin Wan, and Dalibor Hrg. 2010. Dealing with wandering: a case study on caregivers' attitudes towards privacy and autonomy when reflecting the use of LBS. In Proceedings of the 16th ACM international conference on Supporting group work. 75--84.
[83]
Cosmin Munteanu, Heather Molyneaux, Wendy Moncur, Mario Romero, Susan O'Donnell, and John Vines. 2015. Situational ethics: Re-thinking approaches to formal ethics requirements for human-computer interaction. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 105--114.
[84]
Mustafa Naseem, Fouzia Younas, and Maryam Mustafa. 2020. Designing Digital Safe Spaces for Peer Support and Connectivity in Patriarchal Contexts. Proceedings of the ACM on Human-Computer Interaction, Vol. 4, CSCW2 (2020), 1--24.
[85]
Boel Nelson and Tomas Olovsson. 2016. Security and privacy for big data: A systematic literature review. In 2016 IEEE international conference on big data (big data). IEEE, 3693--3702.
[86]
The United States Department of Justice. 2021. Fair Housing Act. https://www.justice.gov/crt/fair-housing-act-2
[87]
Ihudiya Finda Ogbonnaya-Ogburu, Angela DR Smith, Alexandra To, and Kentaro Toyama. 2020. Critical race theory for HCI. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--16.
[88]
Laura Parson. 2019. Considering positionality: the ethics of conducting research with marginalized groups. In Research methods for social justice and equity in education. Springer, 15--32.
[89]
Jessica Pater, Amanda Coupe, Rachel Pfafman, Chanda Phelan, Tammy Toscos, and Maia Jacobs. 2021. Standardizing Reporting of Participant Compensation in HCI: A Systematic Literature Review and Recommendations for the Field. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1--16.
[90]
Katy E Pearce, Jessica Vitak, and Kristen Barta. 2018. Socially mediated visibility: Friendship and dissent in authoritarian Azerbaijan. International Journal of Communication, Vol. 12 (2018), 22.
[91]
Justin Petelka, Lucy Van Kleunen, Liam Albright, Elizabeth Murnane, Stephen Voida, and Jaime Snyder. 2020. Being (In) Visible: Privacy, Transparency, and Disclosure in the Self-Management of Bipolar Disorder. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--14.
[92]
Fanny A Ramirez and Jeffrey Lane. 2019. Communication privacy management and digital evidence in an intimate partner violence case. International Journal of Communication, Vol. 13 (2019), 18.
[93]
Yolanda A Rankin and Jakita O Thomas. 2019. Straighten up and fly right: Rethinking intersectionality in HCI research. Interactions, Vol. 26, 6 (2019), 64--68.
[94]
Elissa M Redmiles, Sean Kross, and Michelle L Mazurek. 2017. Where is the digital divide? a survey of security, privacy, and socioeconomics. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 931--936.
[95]
Jake Reichel, Fleming Peck, Mikako Inaba, Bisrat Moges, Brahmnoor Singh Chawla, and Marshini Chetty. 2020. 'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and Whatsapp. In 29th USENIX Security Symposium. 1949--1966.
[96]
Matt Reichel. 2017. Race, Class, and Privacy: A Critical Historical Review. International Journal of Communication, Vol. 11 (2017), 4757--4768.
[97]
Ellie Rennie, Tyson Yunkaporta, and Indigo Holcombe-James. 2018. Privacy at the margins| privacy versus relatedness: managing device use in Australia's remote aboriginal communities. International Journal of Communication, Vol. 12 (2018), 19.
[98]
Fatemeh Rezaeibagha, Khin Than Win, and Willy Susilo. 2015. A systematic literature review on security and privacy of electronic health record systems: technical perspectives. Health Information Management Journal, Vol. 44, 3 (2015), 23--38.
[99]
Nithya Sambasivan, Amna Batool, Nova Ahmed, Tara Matthews, Kurt Thomas, Laura Sanely Gaytán-Lugo, David Nemer, Elie Bursztein, Elizabeth Churchill, and Sunny Consolvo. 2019. "They Don't Leave Us Alone Anywhere We Go" Gender and Digital Abuse in South Asia. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--14.
[100]
Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gaytán-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. 2018. “Privacy is not for me, it's for those rich women”: Performative Privacy Practices on Mobile Phones by Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). 127--142.
[101]
Nithya Sambasivan, Julie Weber, and Edward Cutrell. 2011. Designing a phone broadcasting system for urban sex workers in India. In Proceedings of the SIGCHI conference on human factors in computing systems. 267--276.
[102]
Shruti Sannon, Natalya N Bazarova, and Dan Cosley. 2018. Privacy lies: Understanding how, when, and why people lie to protect their privacy in multiple online contexts. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--13.
[103]
Shruti Sannon and Dan Cosley. 2019. Privacy, power, and invisible labor on Amazon Mechanical Turk. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--12.
[104]
Shruti Sannon, Elizabeth L Murnane, Natalya N Bazarova, and Geri Gay. 2019. " I was really, really nervous posting it" Communicating about Invisible Chronic Illnesses across Social Media Platforms. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--13.
[105]
Hyunjin Seo, Hannah Britton, Megha Ramaswamy, Darcey Altschwager, Mathew Blomberg, Shola Aromona, Bernard Schuster, Ellie Booton, Marilyn Ault, and Joi Wickliffe. 2020. Returning to the digital world: Digital technology use and privacy management of women transitioning from incarceration. New Media & Society (2020).
[106]
Rhonda M Shaw, Julie Howe, Jonathan Beazer, and Toni Carr. 2020. Ethics and positionality in qualitative research with vulnerable and marginal groups. Qualitative Research, Vol. 20, 3 (2020), 277--293.
[107]
Lucy Simko, Ada Lerner, Samia Ibtasam, Franziska Roesner, and Tadayoshi Kohno. 2018. Computer security and privacy for refugees in the United States. In IEEE Symposium on Security and Privacy (S&P). IEEE, 409--423.
[108]
Manya Sleeper, Tara Matthews, Kathleen O'Leary, Anna Turner, Jill Palzkill Woelfer, Martin Shelton, Andrew Oplinger, Andreas Schou, and Sunny Consolvo. 2019. Tough times at transitional homeless shelters: Considering the impact of financial insecurity on digital security and privacy. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--12.
[109]
Janaki Srinivasan, Savita Bailur, Emrys Schoemaker, and Sarita Seshagiri. 2018. The poverty of privacy: Understanding privacy trade-offs from identity infrastructure users in India. International Journal of Communication, Vol. 12 (2018), 20.
[110]
Jessica Vitak, Yuting Liao, Mega Subramaniam, and Priya Kumar. 2018. 'I Knew It Was Too Good to Be True" The Challenges Economically Disadvantaged Internet Users Face in Assessing Trustworthiness, Avoiding Scams, and Developing Self-Efficacy Online. Proceedings of the ACM on human-computer interaction, Vol. 2, CSCW (2018), 1--25.
[111]
Ashley Marie Walker, Yaxing Yao, Christine Geeng, Roberto Hoyle, and Pamela Wisniewski. 2019. Moving beyond `one size fits all' research considerations for working with vulnerable populations. Interactions, Vol. 26, 6 (2019), 34--39.
[112]
Lin Wan, Claudia Müller, Volker Wulf, and David William Randall. 2014. Addressing the subtleties in dementia care: pre-study & evaluation of a GPS monitoring system. In Proceedings of the SIGCHI conference on human factors in computing systems. 3987--3996.
[113]
Ruolin Wang, Chun Yu, Xing-Dong Yang, Weijie He, and Yuanchun Shi. 2019. EarTouch: facilitating smartphone use for visually impaired people in mobile and public scenarios. In Proceedings of the 2019 chi conference on human factors in computing systems. 1--13.
[114]
Yang Wang. 2017. The third wave? Inclusive privacy and security. In Proceedings of the 2017 New Security Paradigms Workshop. 122--130.
[115]
Yang Wang. 2018. Inclusive security and privacy. IEEE Security & Privacy, Vol. 16, 4 (2018), 82--87.
[116]
Mark Warner, Andreas Gutmann, M Angela Sasse, and Ann Blandford. 2018. Privacy unraveling around explicit HIV status disclosure fields in the online geosocial hookup app Grindr. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (2018), 1--22.
[117]
Mark Warner, Agnieszka Kitkowska, Jo Gibbs, Juan F Maestre, and Ann Blandford. 2020. Evaluating `Prefer not to say' Around Sensitive Disclosures. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--13.
[118]
Janith Weerasinghe, Kediel Morales, and Rachel Greenstadt. 2019. “Because... I was told... so much”: Linguistic Indicators of Mental Health Status on Twitter. Proceedings on Privacy Enhancing Technologies, Vol. 2019, 4 (2019), 152--171.
[119]
Alan F Westin. 1968. Privacy and freedom. Washington and Lee Law Review, Vol. 25, 1 (1968), 166.
[120]
Richmond Y Wong and Deirdre K Mulligan. 2019. Bringing design to the privacy table: Broadening ?design" in ?privacy by design" through the lens of HCI. In Proceedings of the 2019 CHI conference on human factors in computing systems. 1--17. io

Cited By

View all
  • (2024)Factors That Influence Successful Adoption of Real-Time Location Systems for Use in a Dementia Care Setting: Mixed Methods StudyJMIR Aging10.2196/459787(e45978)Online publication date: 8-Apr-2024
  • (2024)The Online Privacy Divide: Testing Resource and Identity Explanations for Racial/Ethnic Differences in Privacy Concerns and Privacy Management Behaviors on Social MediaCommunication Research10.1177/00936502241273157Online publication date: 13-Aug-2024
  • (2024)Integrating Equity in Public Sector Data-Driven Decision Making: Exploring the Desired Futures of Underserved StakeholdersProceedings of the ACM on Human-Computer Interaction10.1145/36869058:CSCW2(1-39)Online publication date: 8-Nov-2024
  • Show More Cited By

Index Terms

  1. Privacy Research with Marginalized Groups: What We Know, What's Needed, and What's Next

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Human-Computer Interaction
    Proceedings of the ACM on Human-Computer Interaction  Volume 6, Issue CSCW2
    CSCW
    November 2022
    8205 pages
    EISSN:2573-0142
    DOI:10.1145/3571154
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 November 2022
    Published in PACMHCI Volume 6, Issue CSCW2

    Permissions

    Request permissions for this article.

    Check for updates

    Badges

    • Honorable Mention

    Author Tags

    1. discrimination
    2. literature review
    3. marginalization
    4. privacy
    5. vulnerable groups

    Qualifiers

    • Research-article

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1,174
    • Downloads (Last 6 weeks)124
    Reflects downloads up to 20 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Factors That Influence Successful Adoption of Real-Time Location Systems for Use in a Dementia Care Setting: Mixed Methods StudyJMIR Aging10.2196/459787(e45978)Online publication date: 8-Apr-2024
    • (2024)The Online Privacy Divide: Testing Resource and Identity Explanations for Racial/Ethnic Differences in Privacy Concerns and Privacy Management Behaviors on Social MediaCommunication Research10.1177/00936502241273157Online publication date: 13-Aug-2024
    • (2024)Integrating Equity in Public Sector Data-Driven Decision Making: Exploring the Desired Futures of Underserved StakeholdersProceedings of the ACM on Human-Computer Interaction10.1145/36869058:CSCW2(1-39)Online publication date: 8-Nov-2024
    • (2024)Localised Trust in a Globalised Knot: Designing Information Privacy for Digital-IDACM Journal on Computing and Sustainable Societies10.1145/36160242:1(1-37)Online publication date: 13-Jan-2024
    • (2024)What Do We Do? Lessons Learned from Conducting Systematic Reviews to Improve HCI DisseminationExtended Abstracts of the CHI Conference on Human Factors in Computing Systems10.1145/3613905.3637117(1-8)Online publication date: 11-May-2024
    • (2024)“That’s Kind of Sus(picious)”: The Comprehensiveness of Mental Health Application Users’ Privacy and Security ConcernsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642705(1-16)Online publication date: 11-May-2024
    • (2024)Supportive Fintech for Individuals with Bipolar Disorder: Financial Data Sharing Preferences for Longitudinal Care ManagementProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642645(1-15)Online publication date: 11-May-2024
    • (2024)Cruising Queer HCI on the DL: A Literature Review of LGBTQ+ People in HCIProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642494(1-21)Online publication date: 11-May-2024
    • (2024)"I Deleted It After the Overturn of Roe v. Wade": Understanding Women's Privacy Concerns Toward Period-Tracking Apps in the Post Roe v. Wade EraProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642042(1-22)Online publication date: 11-May-2024
    • (2024)Privacy-Preserving Gaze Data Streaming in Immersive Interactive Virtual Reality: Robustness and User ExperienceIEEE Transactions on Visualization and Computer Graphics10.1109/TVCG.2024.337203230:5(2257-2268)Online publication date: 8-Mar-2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media