Sok: A framework for unifying at-risk user research

N Warford, T Matthews, K Yang, O Akgul… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
At-risk users are people who experience risk factors that augment or amplify their chances of
being digitally attacked and/or suffering disproportionate harms. In this systematization work …

" They Don't Leave Us Alone Anywhere We Go" Gender and Digital Abuse in South Asia

N Sambasivan, A Batool, N Ahmed… - proceedings of the …, 2019 - dl.acm.org
South Asia faces one of the largest gender gaps online globally, and online safety is one of
the main barriers to gender-equitable Internet access [GSMA, 2015]. To better understand …

Combating misinformation in Bangladesh: Roles and responsibilities as perceived by journalists, fact-checkers, and users

MM Haque, M Yousuf, AS Alam, P Saha… - Proceedings of the …, 2020 - dl.acm.org
There has been a growing interest within CSCW community in understanding the
characteristics of misinformation propagated through computational media, and the devising …

Examining security and privacy research in developing regions

A Vashistha, R Anderson, S Mare - Proceedings of the 1st ACM SIGCAS …, 2018 - dl.acm.org
Prior research suggests that security and privacy needs of users in developing regions are
different than those in developed regions. To better understand the underlying differentiating …

Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing

F Mathis, JH Williamson, K Vaniea… - ACM Transactions on …, 2021 - dl.acm.org
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …

Digital privacy challenges with shared mobile phone use in Bangladesh

SI Ahmed, MR Haque, J Chen, N Dell - … of the ACM on Human-computer …, 2017 - dl.acm.org
Prior research on technology use in the Global South suggests that people in marginalized
communities frequently share a single device among multiple individuals. However, the data …

Exclusion and inclusion in identification: Regulation, displacement and data justice

A Martin, L Taylor - Information Technology for Development, 2021 - Taylor & Francis
Around the world, regimes of identification regulate people's interactions with state and
commercial institutions. These regimes promise access to resources and entitlements, while …

How platform-user power relations shape algorithmic accountability: A case study of instant loan platforms and financially stressed users in India

D Ramesh, V Kameswaran, D Wang… - Proceedings of the 2022 …, 2022 - dl.acm.org
Accountability, a requisite for responsible AI, can be facilitated through transparency
mechanisms such as audits and explainability. However, prior work suggests that the …

When is machine learning data good?: Valuing in public health datafication

D Thakkar, A Ismail, P Kumar, A Hanna… - Proceedings of the …, 2022 - dl.acm.org
Data-driven approaches that form the foundation of advancements in machine learning (ML)
are powered in large part by human infrastructures that enable the collection of large …

" My cousin bought the phone for me. I never go to mobile shops." The Role of Family in Women's Technological Inclusion in Islamic Culture

S Ibtasam, L Razaq, M Ayub, JR Webster… - Proceedings of the …, 2019 - dl.acm.org
The intersection of Islam and gender affect technological and social interactions for Muslim
women in significant ways and remains an understudied domain for CSCW and related …