851 research outputs found

    Model(ing) Privacy: Empirical Approaches to Privacy Law and Governance

    Get PDF
    Model(ing) Privacy: Empirical Approaches to Privacy Law and Governanc

    Contextual Integrity of A Virtual (Reality) Classroom

    Full text link
    The multicontextual nature of immersive VR makes it difficult to ensure contextual integrity of VR-generated information flows using existing privacy design and policy mechanisms. In this position paper, we call on the HCI community to do away with lengthy disclosures and permissions models and move towards embracing privacy mechanisms rooted in Contextual Integrity theory.Comment: 11 pages, CHI'23 Workshop - Designing Technology and Policy Simultaneousl

    Digital Vigilantism as Weaponisation of Visibility

    Get PDF
    This paper considers an emerging practice whereby citizen’s use of ubiquitous and domesticated technologies enable a parallel form of criminal justice. Here, weaponised visibility supersedes police intervention as an appropriate response. Digital vigilantism is a user-led violation of privacy that not only transcends online/offline distinctions but also complicates relations of visibility and control between police and the public. This paper develops a theoretically nuanced and empirically grounded understanding of digital vigilantism in order to advance a research agenda in this area of study. In addition to literature on vigilantism and citizen-led violence, this paper draws from key works in surveillance (Haggerty and Ericsson, British Journal of Sociology, 51, 605–622, 2000) as well as visibility studies (Brighenti 2007; Goldsmith, British Journal of Criminology, 50(5), 914–934, 2010) in order to situate how digital media affordances and cultures inform both the moral and organisational dimensions of digital vigilantism. Digital vigilantism is a process where citizens are collectively offended by other citizen activity, and coordinate retaliation on mobile devices and social platforms. The offending acts range from mild breaches of social protocol to terrorist acts and participation in riots. The vigilantism includes, but is not limited to a ‘naming and shaming’ type of visibility, where the target’s home address, work details and other highly sensitive details are published on a public site (‘doxing’), followed by online as well as embodied harassment. The visibility produced through digital vigilantism is unwanted (the target is typically not soliciting publicity), intense (content like text, photos and videos can circulate to millions of users within a few days) and enduring (the vigilantism campaign may be top search item linked to the target, and even become a cultural reference). Such campaigns also further a merging of digital and physical spaces through the reproduction of localised and nationalist identities (through ‘us/them’ distinctions) on global digital platforms as an impetus for privacy violations and breaches of fundamental rights

    Exploring social influence in crowdsourcing

    Get PDF
    This study addresses the phenomenon of social influence in crowdsourcing platforms and, inparticular, it sought to explore whether depending on personal, contextual or cultural, characteristics, individuals which participate in such endeavors are more or less prone to become influenced by a majority when performing an objective task. In crowdsourcing platforms individuals participate through different decision making mechanisms such as voting, averaging and consensus. The exposure to informational cues regarding the aggregate output of a crowd is hypothesized to constitute a pressure upon the individuals' behavior. Our findings provide evidence about the existence of and proneness to socialinfluence in crowdsourcing platforms. These research also showsthat skill level and homophilousties among participants are a stronghold against the pressures of the majorities. These results empirically demonstrate that in the presence of an informational cues a large amount of individuals accept majorities' outcomes as an evidence of the reality. Through the current findings, we provide insighton the phenomenon of social influence in crowdsourcing platforms and, by unveiling these results, give a contribution towards managing such platforms

    Governing Privacy in Knowledge Commons

    Get PDF
    Scholars from various disciplines explore privacy governance using the Governing Knowledge Commons framework. Case studies drawn from contexts such as academia, social media, mental health, and IoT provide insights into how privacy shapes community knowledge production. This title is also available as Open Access on Cambridge Core
    • …
    corecore