Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems 2020
DOI: 10.1145/3313831.3376214
|View full text |Cite
|
Sign up to set email alerts
|

Too Much Information: Questioning Security in a Post-Digital Society

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 61 publications
0
8
0
Order By: Relevance
“…Choosing not to be visible and not to disclose information about oneself can be seen as a privilege, afforded to those who are established members of society and not seeking work. This is especially pertinent for those whose safety may be jeopardised by online visibility -such as survivors of domestic or other abuse, and asylum seekers -yet who feel compelled to be visible due to the adverse impact that invisibility could have on their chances of getting a job, or gaining legitimacy as citizens and members of social groups [21]; also see [73].…”
Section: Discussionmentioning
confidence: 99%
“…Choosing not to be visible and not to disclose information about oneself can be seen as a privilege, afforded to those who are established members of society and not seeking work. This is especially pertinent for those whose safety may be jeopardised by online visibility -such as survivors of domestic or other abuse, and asylum seekers -yet who feel compelled to be visible due to the adverse impact that invisibility could have on their chances of getting a job, or gaining legitimacy as citizens and members of social groups [21]; also see [73].…”
Section: Discussionmentioning
confidence: 99%
“…Construction/Drawing Materials For Assemblage and Annotation Card and Cardboard [18] [41] [5] [8];paper [30] [22] [29]; wide use of LEGO bricks [22] [30] [12] [19] [35]; cocktail sticks [18]; masking tape [18]; modelling clay [22]; paper plates [5]; plastic cups [5]; string [18]; paper sorting poles [7]; pipe cleaners [5];foam [35] and; envelopes for covering or grouping together [22].…”
Section: Methodsmentioning
confidence: 99%
“…The approach assists the generation and exchange of learning around the hazards and risks of day-to-day information security. This represents a "radical departure [from] affirming the principles of technological security through compliant practice" [12] (p.10) and a platform that enables participating communities, and indeed those who do not engage in security programmes, to enter a dialogue of security concerns [33]. Further, we selected two papers that report on a number of different case studies -some of which are more relevant to TIPS than others, but which valuably synthesise, analyse and contribute critical insights into methodological approaches, with particular [15] or broad [37] relevance to TIPS.…”
Section: Review Papersmentioning
confidence: 99%
See 2 more Smart Citations