[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3481357.3481510acmotherconferencesArticle/Chapter ViewAbstractPublication PageseurousecConference Proceedingsconference-collections
research-article
Public Access

Using a Participatory Toolkit to Elicit Youth’s Workplace Privacy Perspectives

Published: 11 December 2021 Publication History

Abstract

The rapid evolution of technology has enabled us to perform complex, interdependent, and geographically distributed work. As a result, the effective use of communication and coordination technologies is increasingly crucial to success in the workplace, raising at the same time concerns about workplace privacy. In this paper, we present a case study showing how we adapted and used a participatory toolkit to elicit the privacy perspectives of a 3D print shop’s youth employees. Participants expected their managers and co-workers, rather than other third-parties, to see their data, and yet prioritized keeping their co-workers informed rather than being overly concerned about third-parties accessing their data. We found this approach effective at creating an expressive space for the youth to reflect on and share their expectations and preferences on workplace data privacy, a practice that can enhance both their workplace participation and professional communication training. We conclude with thoughts on how using open-ended participatory mechanisms can support employees’ ongoing reflection on the privacy of communication and coordination technologies, leading to increased fluency and participation in workplace decision-making.

References

[1]
Monica Anderson. 2018. A Majority of Teens Have Experienced Some Form of Cyberbullying.
[2]
Monica Anderson and Jingjing Jiang. 2018. Teens, Social Media & Technology 2018. http://www.pewinternet.org/2018/05/31/teens-social-media-technology-2018/
[3]
Monica Anderson and Jingjing Jiang. 2018. Teens’ Social Media Habits and Experiences. http://www.pewinternet.org/2018/11/28/teens-social-media-habits-and-experiences/
[4]
Farzaneh Asgharpour, Debin Liu, and L Jean Camp. 2007. Mental models of security risks. In International Conference on Financial Cryptography and Data Security. Springer, 367–377.
[5]
Zahra Ashktorab and Jessica Vitak. 2016. Designing cyberbullying mitigation and prevention solutions through participatory design with teenagers. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 3895–3905.
[6]
Susan B Barnes. 2006. A privacy paradox: Social networking in the United States. First Monday 11, 9 (2006).
[7]
Danah Boyd. 2007. Why youth (heart) social network sites: The role of networked publics in teenage social life. MacArthur foundation series on digital learning–Youth, identity, and digital media volume 119(2007), 142.
[8]
Eva Brandt, Thomas Binder, and Elizabeth BN Sanders. 2012. Ways to engage telling, making and enacting. Routledge international handbook of participatory design. Routledge, New York (2012), 145–181.
[9]
Niall Cook. 2017. Enterprise 2.0: How social software will change the future of work. Routledge.
[10]
Andrew Dekker, Peter Worthy, Stephen Viller, Kirsten Zimbardi, and Ricky Robinson. 2014. Designer-client Communication in Web Design: A Case Study on the Use of Communication in Practice. In Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures: The Future of Design (Sydney, New South Wales, Australia) (OzCHI ’14). ACM, New York, NY, USA, 440–443. https://doi.org/10.1145/2686612.2686681
[11]
William Easley, Foad Hamidi, Wayne G. Lutters, and Amy Hurst. 2018. Shifting Expectations: Understanding Youth Employees’ Handoffs in a 3D Print Shop. Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article 47 (Nov. 2018), 23 pages. https://doi.org/10.1145/3274316
[12]
Foad Hamidi, Kellie Poneres, Aaron Massey, and Amy Hurst. 2018. Who Should Have Access to My Pointing Data?: Privacy Tradeoffs of Adaptive Assistive Technologies. In Proceedings of the 20th International ACM SIGACCESS Conference on Computers and Accessibility (Galway, Ireland) (ASSETS ’18). ACM, New York, NY, USA, 203–216. https://doi.org/10.1145/3234695.3239331
[13]
Foad Hamidi, Kellie Poneres, Aaron Massey, and Amy Hurst. 2020. Using a Participatory Activities Toolkit to Elicit Privacy Expectations of Adaptive Assistive Technologies. In Proceedings of the 17th International Web for All Conference (Taipei, Taiwan) (W4A ’20). Association for Computing Machinery, New York, NY, USA, Article 17, 12 pages. https://doi.org/10.1145/3371300.3383336
[14]
Eszter Hargittai and Alice Marwick. 2016. “What can I really do?” Explaining the privacy paradox with online apathy. International Journal of Communication 10 (2016), 21.
[15]
James D. Herbsleb, David L. Atkins, David G. Boyer, Mark Handel, and Thomas A. Finholt. 2002. Introducing Instant Messaging and Chat in the Workplace. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Minneapolis, Minnesota, USA) (CHI ’02). ACM, New York, NY, USA, 171–178. https://doi.org/10.1145/503376.503408
[16]
Jason T. Jacques and Per Ola Kristensson. 2019. Crowdworker Economics in the Gig Economy. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI ’19). ACM, New York, NY, USA, Article 391, 10 pages. https://doi.org/10.1145/3290605.3300621
[17]
Patrick Gage Kelley, Lucian Cesca, Joanna Bresee, and Lorrie Faith Cranor. 2010. Standardizing privacy notices: an online study of the nutrition label approach. In Proceedings of the SIGCHI Conference on Human factors in Computing Systems. 1573–1582.
[18]
Min Kyung Lee, Karen P. Tang, Jodi Forlizzi, and Sara Kiesler. 2011. Understanding Users’ Perception of Privacy in Human-robot Interaction. In Proceedings of the 6th International Conference on Human-robot Interaction (Lausanne, Switzerland) (HRI ’11). ACM, New York, NY, USA, 181–182. https://doi.org/10.1145/1957656.1957721
[19]
Lesa Lorenzen-Huber, Mary Boutain, L Jean Camp, Kalpana Shankar, and Kay H Connelly. 2011. Privacy, technology, and aging: A proposed framework. Ageing International 36, 2 (2011), 232–252.
[20]
Susan E. McGregor, Elizabeth Anne Watkins, and Kelly Caine. 2017. Would You Slack That?: The Impact of Security and Privacy on Cooperative Newsroom Work. Proc. ACM Hum.-Comput. Interact. 1, CSCW, Article 75 (Dec. 2017), 22 pages. https://doi.org/10.1145/3134710
[21]
Brenna McNally, Priya Kumar, Chelsea Hordatt, Matthew Louis Mauriello, Shalmali Naik, Leyla Norooz, Alazandra Shorter, Evan Golub, and Allison Druin. 2018. Co-designing mobile online safety applications with children. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1–9.
[22]
Janni Nielsen, Torkil Clemmensen, and Carsten Yssing. 2002. Getting Access to What Goes on in People’s Heads?: Reflections on the Think-aloud Technique. In Proceedings of the Second Nordic Conference on Human-computer Interaction (Aarhus, Denmark) (NordiCHI ’02). ACM, New York, NY, USA, 101–110. https://doi.org/10.1145/572020.572033
[23]
Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79(2004), 119.
[24]
Marc Prensky. 2001. Digital natives, digital immigrants part 1. On the horizon 9, 5 (2001), 1–6.
[25]
Hirak Ray, Flynn Wolf, Ravi Kuber, and Adam J. Aviv. 2019. ”Woe is Me”: Examining Older Adults’ Perceptions of Privacy. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI EA ’19). ACM, New York, NY, USA, Article LBW2611, 6 pages. https://doi.org/10.1145/3290607.3312770
[26]
Patricia Sánchez Abril, Avner Levin, and Alissa Del Riego. 2012. Blurred boundaries: Social media privacy and the twenty-first-century employee. American Business Law Journal 49, 1 (2012), 63–124.
[27]
Casey Swezey and Janet Vertesi. 2019. Working Apart, Together: The Challenges of Co-Work. Proc. ACM Hum.-Comput. Interact. 3, CSCW, Article 204 (Nov. 2019), 22 pages. https://doi.org/10.1145/3359306
[28]
Madiha Tabassum, Abdulmajeed Alqhatani, Marran Aldossari, and Heather Richter Lipford. 2018. Increasing User Attention with a Comic-based Policy. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1–6.
[29]
Thea Turner, Pernilla Qvarfordt, Jacob T. Biehl, Gene Golovchinsky, and Maribeth Back. 2010. Exploring the Workplace Communication Ecology. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Atlanta, Georgia, USA) (CHI ’10). ACM, New York, NY, USA, 841–850.
[30]
Rick Wash and Emilee Rader. 2015. Too Much Knowledge? Security Beliefs and Protective Behaviors among United States Internet Users. In Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security (Ottawa, Canada) (SOUPS ’15). USENIX Association, USA, 309–325.
[31]
Pamela Wisniewski, Arup Kumar Ghosh, Heng Xu, Mary Beth Rosson, and John M Carroll. 2017. Parental Control vs. Teen Self-Regulation: Is there a middle ground for mobile online safety?. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. 51–69.
[32]
Pamela Wisniewski, Haiyan Jia, Heng Xu, Mary Beth Rosson, and John M Carroll. 2015. Preventative vs. reactive: How parental mediation influences teens’ social media privacy behaviors. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM, 302–316.
[33]
Christine Wolf and Jeanette Blomberg. 2019. Evaluating the Promise of Human-Algorithm Collaborations in Everyday Work Practices. Proc. ACM Hum.-Comput. Interact. 3, CSCW, Article 143 (Nov. 2019), 23 pages. https://doi.org/10.1145/3359245
[34]
Richmond Y. Wong, Deirdre K. Mulligan, Ellen Van Wyk, James Pierce, and John Chuang. 2017. Eliciting Values Reflections by Engaging Privacy Futures Using Design Workbooks. Proc. ACM Hum.-Comput. Interact. 1, CSCW, Article 111 (Dec. 2017), 26 pages. https://doi.org/10.1145/3134746
[35]
Yaxing Yao, Justin Reed Basdeo, Smirity Kaushik, and Yang Wang. 2019. Defending my castle: A co-design study of privacy mechanisms for smart homes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1–12.
[36]
Yaxing Yao, Justin Reed Basdeo, Oriana Rosata Mcdonough, and Yang Wang. 2019. Privacy Perceptions and Designs of Bystanders in Smart Homes. Proceedings of the ACM on Human-Computer Interaction 3, CSCW(2019), 1–24.
[37]
Seounmi Youn. 2005. Teenagers’ perceptions of online privacy and coping behaviors: a risk–benefit appraisal approach. Journal of Broadcasting & Electronic Media 49, 1 (2005), 86–110.

Cited By

View all
  • (2023)A Quantitative Study of Youth Employees' Use of an Informal Chatting Tool at a Workforce Training Program2023 IEEE Frontiers in Education Conference (FIE)10.1109/FIE58773.2023.10343221(01-08)Online publication date: 18-Oct-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
EuroUSEC '21: Proceedings of the 2021 European Symposium on Usable Security
October 2021
241 pages
ISBN:9781450384230
DOI:10.1145/3481357
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 December 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. after-school employment
  2. chatting tools
  3. privacy
  4. youth

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

EuroUSEC '21
EuroUSEC '21: European Symposium on Usable Security 2021
October 11 - 12, 2021
Karlsruhe, Germany

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)102
  • Downloads (Last 6 weeks)8
Reflects downloads up to 30 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A Quantitative Study of Youth Employees' Use of an Informal Chatting Tool at a Workforce Training Program2023 IEEE Frontiers in Education Conference (FIE)10.1109/FIE58773.2023.10343221(01-08)Online publication date: 18-Oct-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media