84 research outputs found

    Challenges and paradoxes in decolonising HCI: A critical discussion

    Get PDF
    The preponderance of Western methods, practices, standards, and classifications in the manner in which new technology-related knowledge is created and globalised has led to calls for more inclusive approaches to design. A decolonisation project is concerned with how researchers might contribute to dismantling and re-envisioning existing power relations, resisting past biases, and balancing Western heavy influences in technology design by foregrounding the authentic voices of the indigenous people in the entire design process. We examine how the establishment of local Global South HCI communities (AfriCHI and ArabHCI) has led to the enactment of decolonisation practices. Specifically, we seek to uncover how decolonisation is perceived in the AfriCHI and ArabHCI communities as well as the extent to which both communities are engaged with the idea of decolonisation without necessarily using the term. We drew from the relevant literature, our own outsider/insider lived experiences, and the communities’ responses to an online anonymised survey to highlight three problematic but interrelated practical paradoxes: a terminology, an ethical, and a micro-colonisation paradox. We argue that these paradoxes expose the dilemmas faced by local non-Western researchers as they pursue decolonisation thinking. This article offers a blended perspective on the decolonisation debate in HCI, CSCW, and the practice-based CSCW scholarly communities and invites researchers to examine their research work using a decolonisation lens

    Designing a Patient-Centered Clinical Workflow to Assess Cyberbully Experiences of Youths in the U.S. Healthcare System

    Get PDF
    Cyberbullying or online harassment is often defined as when someone repeatedly and intentionally harasses, mistreats, or makes fun of others aiming to scare, anger or shame them using electronic devices [296]. Youths experiencing cyberbullying report higher levels of anxiety and depression, mental distress, suicide thoughts, and substance abuse than their non-bullied peers [360, 605, 261, 354]. Even though bullying is associated with significant health problems, to date, very little youth anti-bullying efforts are initiated and directed in clinical settings. There is presently no standardized procedure or workflow across health systems for systematically assessing cyberbullying or other equally dangerous online activities among vulnerable groups like children or adolescents [599]. Therefore, I developed a series of research projects to link digital indicators of cyberbullying or online harassment to clinical practices by advocating design considerations for a patient-centered clinical assessment and workflow that addresses patients’ needs and expectations to ensure quality care. Through this dissertation, I aim to answer these high-level research questions:RQ1. How does the presence of severe online harassment on online platforms contribute to negative experiences and risky behaviors within vulnerable populations? RQ2. How efficient is the current mechanism of screening these risky online negative experiences and behaviors, specifically related to cyberbully, within at-risk populations like adolescent in clinical settings? RQ3. How might evidence of activities and negative harassing experiences on online platforms best be integrated into electronic health records during clinical treatment? I first explore how harassment is presented within different social media platforms from diverse contexts and cultural norms (study 1,2, and 3); next, by analyzing actual patient data, I address current limitations in the screening process in clinical settings that fail to efficiently address core aspect of cyberbullying and their consequences within adolescent patients (study 4 and 5); finally, connecting all my findings, I recommend specific design guidelines for a refined screening tool and structured processes for implementation and integration of the screened data into patients’ electronic health records (EHRs) for better patient assessment and treatment outcomes around cyberbully within adolescent patients (study 6)

    Privacy For Whom? A Multi-Stakeholder Exploration of Privacy Designs

    Get PDF
    Privacy is considered one of the fundamental human rights. Researchers have been investigating privacy issues in various domains, such as our physical privacy, data privacy, privacy as a legal right, and privacy designs. In the Human-Computer Interaction field, privacy researchers have been focusing on understanding people\u27s privacy concerns when they interact with computing systems, designing and building privacy-enhancing technologies to help people mitigate these concerns, and investigating how people\u27s privacy perceptions and the privacy designs influence people\u27s behaviors. Existing privacy research has been overwhelmingly focusing on the privacy needs of end-users, i.e., people who use a system or a product, such as Internet users and smartphone users. However, as our computing systems are becoming more and more complex, privacy issues within these systems have started to impact not only the end-users but also other stakeholders, and privacy-enhancing mechanisms designed for the end-users can also affect multiple stakeholders beyond the users. In this dissertation, I examine how different stakeholders perceive privacy-related issues and expect privacy designs to function across three application domains: online behavioral advertising, drones, and smart homes. I choose these three domains because they represent different multi-stakeholder environments with varying nature of complexity. In particular, these environments present the opportunities to study technology-mediated interpersonal relationships, i.e., the relationship between primary users (owners, end-users) and secondary users (bystanders), and to investigate how these relationships influence people\u27s privacy perceptions and their desired ways of privacy protection. Through a combination of qualitative, quantitative, and design methods, including interviews, surveys, participatory designs, and speculative designs, I present how multi-stakeholder considerations change our understandings of privacy and influence privacy designs. I draw design implications from the study results and guide future privacy designs to consider the needs of different stakeholders, e.g., cooperative mechanisms that aim to enhance the communication between primary and secondary users. In addition, this methodological approach allows researchers to directly and proactively engage with multiple stakeholders and explore their privacy perceptions and expected privacy designs. This is different from what has been commonly used in privacy literature and as such, points to a methodological contribution. Finally, this dissertation shows that when applying the theory of Contextual Integrity in a multi-stakeholder environment, there are hidden contextual factors that may alter the contextual informational norms. I present three examples from the study results and argue that it is necessary to carefully examine such factors in order to clearly identify the contextual norms. I propose a research agenda to explore best practices of applying the theory of Contextual Integrity in a multi-stakeholder environment

    Human-centric explanation facilities

    Get PDF

    Digital commensality: Eating and drinking in the company of technology

    Get PDF
    Commensality is a key aspect of social dining. However, previous research has identified a number of pros and cons associated with the incorporation of digital technology into eating and drinking episodes. For instance, those who are distracted by digital technology may eat/drink more (that is, they may overconsume) as a result of their failure to attend to the food-related sensations that are thought to cue the termination of eating. Similarly, it has often been suggested that the use of mobile devices at mealtimes can disrupt the more commensal aspects of dining/drinking (at least among those who are physically present together). At the same time, however, looking to the future, it seems clear that digital technologies also hold the promise of delivering opportunities for enhanced multisensory experiential dining. For instance, they might be used to match the auditory, visual, or audiovisual entertainment to the eating/drinking episode (e.g., think only about watching a Bollywood movie while eating a home-delivery Indian meal, say). Indeed, given the growing societal problems associated with people dining by themselves, there are a number of routes by which digital technologies may increasingly help to connect the solo diner with physically co-located, remote, or even virtual dining partners. In this review of the literature, our focus is specifically on the role of technology in inhibiting/facilitating the more pleasurable social aspects of dining, what one might call “digital commensality.” The focus is primarily on Westernized adults with reasonable access to, and familiarity with, digital technologies

    Modern Socio-Technical Perspectives on Privacy

    Get PDF
    This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teacherscan assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academicswho are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects

    Data-Driven Accountability: Examining and Reorienting the Mythologies of Data

    Get PDF
    Indiana University-Purdue University Indianapolis (IUPUI)In this work, I examine and design sociotechnical interventions for addressing limitations around data-driven accountability, particularly focusing on politically contentious and systemic social issues (i.e., police accountability). While organizations across sectors of society are scrambling to adopt data-driven technologies and practices, there are epistemological and ethical concerns around how data use influences decisionmaking and actionability. My work explores how stakeholders adopt and handle the challenges around being data-driven, advocating for ways HCI can mitigate such challenges. In this dissertation, I highlight three case studies that focus on data-driven, human-services organizations, which work with at-risk and marginalized populations. First, I examine the tools and practices of nonprofit workers and how they experience the mythologies associated with data use in their work. Second, I investigate how police officers are adopting data-driven technologies and practices, which highlights the challenges police contend with in addressing social criticisms around police accountability and marginalization. Finally, I conducted a case study with multiple stakeholders around police accountability to understand how systemic biases and politically charged spaces perceive and utilize data, as well as to develop the design space around how alternative futures of being data-driven could support more robust and inclusive accountability. I examine how participants situate the concepts of power, bias, and truth in the data-driven practices and technologies used by and around the police. With this empirical work, I present insights that inform the HCI community at the intersection of data design, practice, and policies in addressing systemic social issues
    • …
    corecore