Digital privacy challenges with shared mobile phone use in Bangladesh

SI Ahmed, MR Haque, J Chen, N Dell - … of the ACM on Human-computer …, 2017 - dl.acm.org
Prior research on technology use in the Global South suggests that people in marginalized
communities frequently share a single device among multiple individuals. However, the data …

Recruiting participants with programming skills: A comparison of four crowdsourcing platforms and a CS student mailing list

M Tahaei, K Vaniea - Proceedings of the 2022 CHI Conference on …, 2022 - dl.acm.org
Reliably recruiting participants with programming skills is an ongoing challenge for empirical
studies involving software development technologies, often leading to the use of …

Privacy issues in social networks and analysis: a comprehensive survey

VVH Pham, S Yu, K Sood, L Cui - IET networks, 2018 - Wiley Online Library
Social networks have become part of today's life; however, they also create numerous
privacy problems for their users as they reveal sensitive information. Thus, the privacy …

" Everyone Has Some Personal Stuff" Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh

SI Ahmed, MR Haque, I Haider, J Chen… - Proceedings of the 2019 …, 2019 - dl.acm.org
People in South Asia frequently share a single device among multiple individuals, resulting
in digital privacy challenges. This paper explores a design concept that aims to mitigate …

Shared privacy concerns of the visually impaired and sighted bystanders with camera-based assistive technologies

T Akter, T Ahmed, A Kapadia… - ACM Transactions on …, 2022 - dl.acm.org
Camera-based assistive technologies can provide people with visual impairments (PVIs)
visually derived information about people in their vicinity. Furthermore, the advent of smart …

Private responses for public sharing: understanding self-presentation and relational maintenance via stories in social media

P Trieu, NK Baym - Proceedings of the 2020 CHI conference on human …, 2020 - dl.acm.org
With nearly two billion users, social media Stories-an ephemeral format of sharing-are
increasingly popular and projected to overtake sharing via public feeds. Sharing via Stories …

Was my message read? privacy and signaling on Facebook messenger

R Hoyle, S Das, A Kapadia, AJ Lee… - Proceedings of the 2017 …, 2017 - dl.acm.org
Major online messaging services such as Facebook Messenger and WhatsApp are starting
to provide users with real-time information about when people read their messages, while …

Understanding privacy switching behaviour on Twitter

D Kekulluoglu, K Vaniea, W Magdy - … of the 2022 CHI Conference on …, 2022 - dl.acm.org
Changing a Twitter account's privacy setting between public and protected changes the
visibility of past tweets. By inspecting the privacy setting of more than 100K Twitter users …

Today's social network sites: An analysis of emerging security risks and their counter measures

K Hameed, N Rahman - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
The concept of social networking sites boomed in this modern era of globalization as it
opens the door for the people to communicate with each other despite thinking about …

Twitter has a binary privacy setting, are users aware of how it works?

D Keküllüoglu, K Vaniea, MK Wolters… - Proceedings of the ACM …, 2023 - dl.acm.org
Twitter accounts are public by default, but Twitter gives the option to create protected
accounts, where only approved followers can see their tweets. The publicly visible …