Identity Activism is a new phenomenon afforded by the massive popularity of social media. It consists of the prominent display of a social movement symbol within a space reserved for description of the self. The 2022 Russian invasion of Ukraine provides a contemporary (yet unfortunate) opportunity to observe this phenomenon. Here, we introduce and explore this concept in the context of the recent Twitter trend of displaying the Ukraine flag emoji in bios and names to signal support of Ukraine. We explore several questions, including: how has the popularity of this trend changed over time, are users who display the flag more likely to be connected to others who do, and what types of users are and are not participating. We find that Ukraine flag emoji prevalence in both names and bios increased many-fold in late February 2022, with it becoming the 11th most prevalent emoji in bios and the 3rd most prevalent emoji in names during March. We also find evidence that users who display the flag in their bio or name are more likely to follow and be followed by others who also do so, as compared to users who do not. Finally, we observe that users who share politically left-leaning messages were most likely to display the emoji. Those who share account information from alternative social media sites and non-personal accounts appear least likely. These findings give us insight into how users participate in Identity Activism, what connections exist between participating users, and, in this particular case, what types of users participate.
more »
« less
The Motivated Can Encrypt (Even with PGP)
Abstract Existing end-to-end-encrypted (E2EE) email systems, mainly PGP, have long been evaluated in controlled lab settings. While these studies have exposed usability obstacles for the average user and offer design improvements, there exist users with an immediate need for private communication, who must cope with existing software and its limitations. We seek to understand whether individuals motivated by concrete privacy threats, such as those vulnerable to state surveil-lance, can overcome usability issues to adopt complex E2EE tools for long-term use. We surveyed regional activists, as surveillance of social movements is well-documented. Our study group includes individuals from 9 social movement groups in the US who had elected to participate in a workshop on using Thunder-bird+Enigmail for email encryption. These workshops tool place prior to mid-2017, via a partnership with a non-profit which supports social movement groups. Six to 40 months after their PGP email encryption training, more than half of the study participants were continuing to use PGP email encryption despite intervening widespread deployment of simple E2EE messaging apps such as Signal. We study the interplay of usability with social factors such as motivation and the risks that individuals undertake through their activism. We find that while usability is an important factor, it is not enough to explain long term use. For example, we find that riskiness of one’s activism is negatively correlated with long-term PGP use. This study represents the first long-term study, and the first in-the-wild study, of PGP email encryption adoption.
more »
« less
- Award ID(s):
- 1915768
- PAR ID:
- 10329278
- Date Published:
- Journal Name:
- Proceedings on Privacy Enhancing Technologies
- Volume:
- 2021
- Issue:
- 3
- ISSN:
- 2299-0984
- Page Range / eLocation ID:
- 49 to 69
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Abstract More than half of the coronavirus disease 19 (COVID-19) related mortality rates in the United States and Europe are associated with long-term-care facilities (LTCFs) such as old-age organizations, nursing homes, and disability centers. These facilities are considered most vulnerable to spread of an pandemic like COVID-19 because of multiple reasons including high density of elderly population with a diverse range of medical requirements, limited resources, nursing activities/medications, and the role of external visitors. In this study, we aim to understand the role of visitor’s family members and specific interventions (such as use of face masks and restriction of visiting hours) on the dynamics of infection in a community using a mathematical model. The model considers two types of social contexts (community and LTCFs) with three different groups of interacting populations (non-mobile community individuals, mobile community individuals, and long-term facility residents). The goal of this work is to compare the outbreak burden between different centre of disease control (CDC) planning scenarios, which capture distinct types of intensity of diseases spread in LTCF observed during COVID-19 outbreak. The movement of community mobile members is captured via their average relative times in and out of the long-term facilities to understand the strategies that would work well in these facilities the CDC planning scenarios. Our results suggest that heterogeneous mixing worsens epidemic scenario as compared to homogeneous mixing and the epidemic burden is hundreds times greater for community spread than within the facility population.more » « less
-
Male baboons mature more slowly than females, reaching full adult maturity at around 10-12 years of age. After the onset of puberty at 5-7 years, the sub-adult period lasts 3-5 years while the male continues to grow, though there is considerable variation between individuals. Here, we present data on the behavioral changes that accompany the physical maturation of male olive baboons (Papio anubis) as they transition through each developmental stage. This research was conducted on a fully habituated wild troop at the Uaso Ngiro Baboon Project in Laikipia, Kenya. We use long-term grooming data (2018-2023) to show that males have significantly more grooming partners as they get older (n=48, p<.001). We then use behavioral data collected in June and July 2023 to compare the social behaviors of males from three developmental stages: juveniles (n=5), males who recently became sub-adults (n=4), and males who have been sub-adults for over a year (n=5). The differences between these three groups show the effect of puberty on behavior: juveniles were observed in social play significantly more often than sub-adults (p=.006), while males who recently underwent puberty tended to groom less often than either juveniles or older sub-adults (p=.091). Our focal data also revealed variation in the age at which males reached each developmental stage. Further research is needed to determine causes and consequences of the variation in age at puberty and the potential long-term consequences of this variation on the males’ social behavior.more » « less
-
Abstract Environmental practitioners often develop communications and behavior change interventions that conceptualize individuals as consumers or as other limited, standalone personae. This view neglects the role of conservation audiences as social beings with complex social relationships and networks, potentially resulting in lost opportunities to increase the effectiveness of conservation interventions. We offer a reframing of individuals as members of social networks who can influence others through their many different societal roles. This framing may help individuals recognize their potential to affect large‐scale societal structures and empower them to contribute to systemic changes. In practice, conservation organizations might increase the impact and reach of their behavioral interventions by targeting social referents (individuals or groups who people reference for accepted and desired behaviors) and leveraging interpersonal relationships. This includes encouraging individuals to make use of their networks to discuss issues such as biodiversity loss with a variety of acquaintances to normalize them as a topic of conversation. We argue that organizations can leverage the power of social networks to amplify change and promote the message that people change the world through their social ties, thereby inspiring audiences to further engage in conservation behaviors.more » « less
-
null (Ed.)Static analysis tools can help prevent security incidents, but to do so, they must enable developers to resolve the defects they detect. Unfortunately, developers often struggle to interact with the interfaces of these tools, leading to tool abandonment, and consequently the proliferation of preventable vulnerabilities. Simply put, the usability of static analysis tools is crucial. The usable security community has successfully identified and remedied usability issues in end user security applications, like PGP and Tor browsers, by conducting usability evaluations. Inspired by the success of these studies, we conducted a heuristic walkthrough evaluation and user study focused on four security-oriented static analysis tools. Through the lens of these evaluations, we identify several issues that detract from the usability of static analysis tools. The issues we identified range from workflows that do not support developers to interface features that do not scale. We make these findings actionable by outlining how our results can be used to improve the state-of-the-art in static analysis tool interfaces.more » « less
An official website of the United States government

