skip to main content

Attention:

The NSF Public Access Repository (NSF-PAR) system and access will be unavailable from 11:00 PM ET on Thursday, October 10 until 2:00 AM ET on Friday, October 11 due to maintenance. We apologize for the inconvenience.


Title: Intersectional Thinking about PETs: A Study of Library Privacy

This qualitative study examines the privacy challenges perceived by librarians who afford access to physical and electronic spaces and are in a unique position of safeguarding the privacy of their patrons. As internet “service providers,” librarians represent a bridge between the physical and internet world, and thus offer a unique sight line to the convergence of privacy, identity, and social disadvantage. Drawing on interviews with 16 librarians, we describe how they often interpret or define their own rules when it comes to privacy to protect patrons who face challenges that stem from structures of inequality outside their walls. We adopt the term “intersectional thinking” to describe how librarians reported thinking about privacy solutions, which is focused on identity and threats of structural discrimination (the rules, norms, and other determinants of discrimination embedded in institutions and other societal structures that present barriers to certain groups or individuals), and we examine the role that low/no-tech strategies play in ameliorating these threats. We then discuss how librarians act as privacy intermediaries for patrons, the potential analogue for this role for developers of systems, the power of low/no-tech strategies, and implications for design and research of privacy-enhancing technologies (PETs).

 
more » « less
Award ID(s):
2031951 1703049
NSF-PAR ID:
10472057
Author(s) / Creator(s):
; ;
Publisher / Repository:
Proceedings on Privacy Enhancing Technologies
Date Published:
Journal Name:
Proceedings on Privacy Enhancing Technologies
Volume:
2023
Issue:
2
ISSN:
2299-0984
Page Range / eLocation ID:
480 to 495
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. The rise in online health information seeking among older adults promises significant benefits but also presents potentially serious privacy risks. In light of these risks, we argue that ongoing research and advocacy aimed at promoting online health information seeking among older adults must be coupled with efforts to identify and address threats to their online privacy. We first detail how internet users reveal sensitive health information to third parties through seemingly innocuous web browsing. We then describe ethical concerns raised by the inadvertent disclosure of health information, which include the potential for dignitary harms, subjective injuries, online health scams, and discrimination. After reviewing ways in which existing privacy laws fail to meet the needs of older adults, we provide recommendations for individual and collective action to protect the online privacy of older adults. 
    more » « less
  2. In the Pittsburgh region, the Every1online project, led by the non-profit Meta Mesh, bridges communities with no-cost Internet service. Recognizing that digital literacy is a core component of digital inclusion, the authors worked with Meta Mesh to consider the digital literacy needs of community members and to be responsive to these needs through resources provided to individuals as their Internet connection is established. To build an understanding of these digital literacy needs, the research team surveyed librarians to discover the questions that patrons bring to the library. In this paper, we propose that libraries both provide essential social infrastructure and, as evidenced by this case study, serve as important intermediaries to critical infrastructure. We introduce the concept of a critical infrastructure intermediary, an organization or individual that helps people to find and use critical infrastructure and that helps to strengthen that infrastructure through a feedback loop. 
    more » « less
  3. The recent pandemic has resulted in challenges to the prioritization of CS curriculum and strained the structures that support and grow the professional development and identity building of the teachers who implement it. In this poster we examine how local chapters of a national CS teacher advocacy organization (the CSTA) support their members during a time of transition and change. Using focus group data collected from an ongoing multi-year longitudinal research project, we tried to better understand the challenges that these entities faced as their normal structures of communication and outreach were closed off, and how such challenges might affect the perceptions of the role that local chapters play in supporting the continued development of their members, including their identity as CS teachers. 
    more » « less
  4. Managing digital privacy and security is often a collaborative process, where groups of individuals work together to share information and give one another advice. Yet, this collaborative process is not always reciprocal or equally shared. In many cases, individuals with more expertise help others without receiving help in return. Therefore, we studied the phenomenon of "Tech Caregiving" by surveying 20 groups (112 individuals) comprised of friends, family members, and/or co-workers who identified at least one member of their group as a someone who provides informal technical support to the people they know. We found that tech caregivers reported significantly higher levels of power use and self-efficacy for digital privacy and security, compared to tech caregivees. However, caregivers and caregivees did not differ based on their self-reportedcommunity collective-efficacy for collaboratively managing privacy and security together as a group. This finding demonstrates the importance of tech caregiving and community belonging in building community collective efficacy for digital privacy and security. We also found that caregivers and caregivees most often communicated via text message or phone when coordinating support, which was most frequently needed when troubleshooting or setting up new devices. Meanwhile, discussions specific to privacy and security represented only a small fraction of the issues for which participants gave or received tech care. Thus, we conclude that educating tech caregivers on how to provide privacy and security-focused support, as well as designing technologies that facilitate such support, has the potential to create positive networks effects towards the collective management of digital privacy and security. 
    more » « less
  5. The Negro Motorist Green Book was a tool used by the Black community to navigate systemic racism throughout the U.S. and around the world. Whether providing its users with safer roads to take or businesses that were welcoming to Black patrons, The Negro Motorist Green Book fostered pride and created a physical network of safe spaces within the Black community. Building a bridge between this artifact which served Black people for thirty years and the current moment, we explore Black Twitter as an online space where the Black community navigates identity, activism, racism, and more. Through interviews with people who engage with Black Twitter, we surface the benefits (such as community building, empowerment, and activism) and challenges (like dealing with racism, appropriation, and outsiders) on the platform, juxtaposing the Green Book as a historical artifact and Black Twitter as its contemporary counterpart. Equipped with these insights, we make suggestions including audience segmentation, privacy controls, and involving historically disenfranchised perspectives into the technological design process. These proposals have implications for the design of technologies that would serve Black communities by amplifying Black voices and bolstering work toward justice. 
    more » « less