skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Survey research in Russia: in the shadow of war
Amid ongoing uncertainty, regular surveying in Russia continues to date and collaborations with Western academics have too. These developments offer some basis for cautious optimism. Yet they also raise critical questions about the practice of survey research in repressive environments. Are Russians less willing today to respond to surveys? Are they less willing to answer sensitive questions? How can we design research to elicit truthful responses and to know whether respondents are answering insincerely about sensitive opinions? This article lays out some of the existing evidence on these important questions. It also makes the argument that cross-fertilization with other fields can help to ensure a rigorous understanding of and response to changes in the environment for survey research in Russia.  more » « less
Award ID(s):
2049595
PAR ID:
10394448
Author(s) / Creator(s):
Date Published:
Journal Name:
Post-Soviet Affairs
ISSN:
1060-586X
Page Range / eLocation ID:
1 to 11
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. While security technology can be nearly impenetrable, the people behind the computer screens are often easily manipulated, which makes the human factor the biggest threat to cybersecurity. This study examined whether college students disclosed private information about themselves, and what type of information they shared. The study utilized pretexting, in which attackers impersonate individuals in certain roles and often involves extensive research to ensure credibility. The goal of pretexting is to create situations where individuals feel safe releasing information that they otherwise might not. The pretexts used for this study were based on the natural inclination to help, where people tend to want to help those in need, and reciprocity, where people tend to return favors given to them. Participants (N=51) answered survey questions that they thought were for a good cause or that would result in a reward. This survey asked for increasingly sensitive information that could be used maliciously to gain access to identification, passwords, or security questions. Upon completing the survey, participants were debriefed on the true nature of the study and were interviewed about why they were willing to share information via the survey. Some of the most commonly skipped questions included “Student ID number” and “What is your mother’s maiden name?”. General themes identified from the interviews included the importance of similarities between the researcher and the subject, the researcher’s adherence to the character role, the subject’s awareness of question sensitivity, and the overall differences between online and offline disclosure. Findings suggest that college students are more likely to disclose private information if the attacker shares a similar trait with the target or if the attacker adheres to the character role they are impersonating. Additionally, this study sheds light on the research limitations, emphasizes the relevance of the human factor in security and privacy, and offers recommendations for future research. 
    more » « less
  2. Ferreira_Mello, R; Rummel, N; Jivet; I; Pishtari, G; Ruipérez_Valiente, J A (Ed.)
    Teacher reflection is essential for K-12 classrooms, including effective and personalized instruction. Multimodal Learning Analytics (MMLA), integrating data from digital and physical learning environments, could support teacher reflection. Classroom data collected from sensors and TEL environments are needed to produce such analytics. These novel data collection methods pose an open challenge of how MMLA research practices can ensure alignment with teachers’ needs and concerns. This study explores K-12 teachers’ perceptions and preferences regarding MMLA analytics and data sharing. Through a mixed-method survey, we explore teachers’ (N=100) preferences for analytics that help them reflect on their teaching practices, their favored data collection modalities, and data-sharing preferences. Results indicate that teachers were most interested in student learning analytics and their interactions and ways of motivating students. However, they were also significantly less accepting of collecting students’ audio and position data compared to such data about themselves. Finally, teachers were less willing to share data about themselves than their students. Our findings contribute ethical, practical, and pedagogical considerations of MMLA analytics for teacher reflection, informing the research practices and development of MMLA within TEL. 
    more » « less
  3. Abstract Public concern regarding the use of herbicides in urban areas (e.g., golf courses, parks, lawns) is increasing. Thus, there is a need for alternative methods for weed control that are safe for the public, effective against weeds, and yet selective to turfgrass and other desirable species. New molecular tools such as ribonucleic acid interference (RNAi) have the potential to meet all those requirements, but before these technologies can be implemented, it is critical to understand the perceptions of key stakeholders to facilitate adoption as well as regulatory processes. With this in mind, turfgrass system managers, such as golf course superintendents and lawn care providers, were surveyed to gain insight into the perception and potential adoption of RNAi technology for weed management. Based on survey results, turfgrass managers believe that cost of weed management and time spent managing weeds are the main challenges faced in their fields. When considering new weed management tools, survey respondents were most concerned about cost, efficacy, and efficiency of a new product. Survey respondents were also optimistic toward RNAi for weed management and would either use this technology in their own fields or be willing to conduct research to develop RNAi herbicides. Although respondents believed that the general public would have some concerns about this technology, they did not believe this to be the most important factor for them when choosing new weed management tools. The need for new herbicides to balance weed control challenges and public demands is a central factor for turfgrass managers’ willingness to use RNAi-based weed control in turfgrass systems. They believe their clientele will be accepting of RNAi tools, although further research is needed to investigate how a wider range of stakeholders perceive RNAi tools for turfgrass management more broadly. 
    more » « less
  4. Despite recent widespread deployment of differential privacy, relatively little is known about what users think of differential privacy. In this work, we seek to explore users' privacy expectations related to differential privacy. Specifically, we investigate (1) whether users care about the protections afforded by differential privacy, and (2) whether they are therefore more willing to share their data with differentially private systems. Further, we attempt to understand (3) users' privacy expectations of the differentially private systems they may encounter in practice and (4) their willingness to share data in such systems. To answer these questions, we use a series of rigorously conducted surveys (n=2424).   We find that users care about the kinds of information leaks against which differential privacy protects and are more willing to share their private information when the risks of these leaks are less likely to happen.  Additionally, we find that the ways in which differential privacy is described in-the-wild haphazardly set users' privacy expectations, which can be misleading depending on the deployment. We synthesize our results into a framework for understanding a user's willingness to share information with differentially private systems, which takes into account the interaction between the user's prior privacy concerns and how differential privacy is described. 
    more » « less
  5. People often rely on their friends, family, and other loved ones to help them make decisions about digital privacy and security. However, these social processes are rarely supported by technology. To address this gap, we developed an Android-based mobile application ("app") prototype which helps individuals collaborate with people they know to make informed decisions about their app privacy permissions. To evaluate our design, we conducted an interview study with 10 college students while they interacted with our prototype. Overall, participants responded positively to the novel idea of using social collaboration as a means for making better privacy decisions. Yet, we also found that users are less inclined to help others and may be only willing to partake in conversations that directly affect themselves. We discuss the potential for embedding social processes in the design of systems that support privacy decision-making, as well as some of the challenges of this approach. 
    more » « less