[Is something missing? Please submit further links via comments.]
Privacy researchers and designers must take into consideration the unique needs and challenges of vulnerable populations. Normative and privileged lenses can impair conceptualizations of identities and privacy needs, as well as reinforce or exacerbate power structures and struggles—and how they are formalized within privacy research methods, theories, designs, and analytical tools. The aim of this one-day workshop is to facilitate discourse around alternative ways of thinking about privacy and power, as well as ways for researching and designing technologies that not only respect the privacy needs of vulnerable populations but attempt to empower them. We will work towards developing best practices to help academics and industry folks, technologists, researchers, policy makers, and designers do a better job of serving the privacy needs of vulnerable users of technology.
This one-day workshop aims to explore ubiquitous privacy research and design in the context of mobile and IoT by facilitating discourse among scholars from the networked privacy and design communities. The complexity in modern socio-technical systems points to the potential of utilizing various design techniques (e.g., speculative design, design fiction, and research through design practices) in surfacing the potential consequences of novel technologies, particularly those that traditional user studies may not reveal. The results will shed light in future privacy designs for mobile and IoT technologies from both empirical and design perspectives.
Information and communication technologies (ICTs) have created innumerable opportunities for connecting people, simplifying complex tasks, and developing ecosystems of tools for our homes and workplaces. At the same time, they create new threats to the privacy of individuals, groups, and organizations due to the collection, sharing, and analysis practices that companies employ on user-generated data. iSchools and the broader information science community are especially well-positioned to address these challenges because of our interdisciplinary expertise in sociotechnical spaces. In this workshop, we will work with participants to identify and define key domains where information scholars can contribute to our understanding of information privacy over the next 10 years. Topics of interest include research with marginalized groups; ethical issues with privacy research; bridging research, policy, and design; and expanding research on networked and group-managed privacy. Workshop goals include mapping these topic areas, connecting and networking with privacy researchers in the global information science community, writing a public statement on the state and future of information privacy research, and launching a call for a special issue of JASIST on this topic. Follow this link to read more about the special issue.
Children are avid users of digital tools, and many of today’s most popular games and apps are designed for younger audiences. Likewise, elementary and secondary education increasingly relies on digital tools, from learning management systems to educational games. However, we have not seen an increased focus on privacy and security education accompanying this push for technology use. Therefore, we hope to bring together privacy and security researchers and practitioners to explore opportunities for creating tools and technologies that help young people develop competencies in privacy and security management. We will describe, discuss, and demonstrate participatory design (PD) methodologies, which focus on working with the end-users as design partners, to better understand what they want and why some solutions are more likely to succeed while others fail.
Privacy has been a key research theme in the CSCW and HCI communities, but the term is often used in an ad hoc and fragmented way. This is likely due to the fact that privacy is a complex and multi-faceted concept. This one-day workshop will facilitate discourse around key privacy theories and frameworks that can inform privacy research with the goal of producing guidelines for privacy researchers on how and when to incorporate which theories into various aspects of their empirical privacy research. This will lay the groundwork to move the privacy field forward.
As our lives become increasingly digitized, how people maintain and manage their networked privacy has become a formidable challenge for academics, practitioners, and policy-makers. A shift toward people-centered privacy initiatives has shown promise; yet many applications still adopt a “one-size fits all” approach, which fails to consider how individual differences in concerns, preferences, and behaviors shape how different people interact with and through technology.
The main goal of this one-day workshop is to highlight individual differences (e.g., age, culture, personal preference) that influence users’ experiences and privacy-related outcomes and to formulate best practices to account for these differences within privacy research, system design, and the policies that regulate online privacy practices.
Privacy research has been criticized for ignoring other values that, in all but a few real world situations, need to be reconciled with privacy. These tensions suggest that privacy might not always be in the user’s best interest or in the best interest of society. While this assertion may seem obvious, a large portion of the empirical, theoretical, and design-based research on networked privacy continues to focus solely on how to protect individuals from unwanted access and over-sharing. These studies range from designing better privacy defaults to raising privacy awareness to more algorithmic approaches that nudge users toward being more private.
Given this emphasis on trying to increase privacy protection for end users, the primary goal of this workshop is to initiate a discussion on the real, potential, and imagined ethical concerns associated with such a privacy-focused agenda. The workshop shifts the current discussions around user and data privacy from focusing on boundary regulation processes to evaluating how multiple competing values—and especially values around privacy and ethics—shape research and design processes. Over the course of one day, we will bring together researchers and practitioners from the broader CSCW and ACM community to develop heuristics to guide privacy and ethical decision-making in regard to both research design and designs for privacy protection.
This intensive one-day workshop at CHI ’16 seeks to reinvigorate conversations in the CHI community around privacy and design to refocus our attention on developing methods to systematically incorporate privacy into design processes. The workshop will bring together leading privacy researchers in academia and industry to unpack the barriers preventing PbD concepts from being implemented in design.
The topics of the International Workshop on Privacy Engineering (IWPE’15) focus on all the aspects surrounding privacy engineering, ranging from its theoretical foundations, engineering approaches, and support infrastructures, to its practical application in projects of different scale.
Building on this work and previous workshops at CSCW and CHI, this two-day workshop examines networked privacy challenges from a broader perspective by (1) identifying the most important issues researchers will need to address in the next decade and (2) working to create actionable solutions for these privacy issues that future researchers can empirically test.
Social media plays an increasingly important role in interpersonal relationships and, consequently, raises privacy questions for end-users. However, there is little guidance or consensus for researchers on how to measure privacy in social media contexts. Privacy measurement has focused more on data protection and used scales such as CFIP and IUIPC that primarily emphasize informational privacy concerns and are less effective at capturing interpersonal and interactional privacy concerns. To facilitate cross-study comparisons, it is important to develop appropriate metrics and techniques for measuring privacy concerns in social media. Towards that goal, our 2-day workshop will cultivate a common understanding of current methods for measuring social privacy, as well as various existing interpersonal privacy frameworks.
Privacy has traditionally been framed as a way for individuals to protect themselves from the consequences of too much information disclosure. However, privacy can be a means to enhance social media outcomes and is essential for coordinating cooperative relationships. In this workshop we seek to: a) broaden the lens of social media privacy research to examine the benefits and outcomes of interactional privacy as they relate to social media goals; and b) discuss the design of social media interfaces that are responsive to both relational and privacy needs.
As our lives are more commonly mediated by IT, an interactional perspective of privacy is increasingly applicable to the study of how people find and construct privacy in socio-technical interactions. This perspective has received increasing attention within the HCI research community in recent years. While the interactional perspective has proven effective as a starting point for theoretical and empirical studies of privacy in relation to everyday use of IT, there remain important open questions regarding how to translate results based on this perspective into design practice. Addressing these questions requires a greater sensitivity to when interactional privacy is applicable, a better understanding of suitable research methods, and more effective means for communicating results to the research and practitioner communities.
Privacy protection and management in social media becomes increasingly important. The involvement of multiple stakeholders in personal data makes privacy protection and management no longer a task for indi-vidual users and thus requires the collaboration among all stakeholders. This workshop on collaborative privacy practices (CPP) has three main goals. First, we will explore the contributions that CSCW research has made to our understanding of CPP. Second, we will identify challenges to conceptualizing CPP and to designing and evaluating tools for enacting CPP. Third, we will develop a research agenda for future research on CPP.