2022 IEEE Symposium on Security and Privacy (SP) 2022
DOI: 10.1109/sp46214.2022.9833643
|View full text |Cite
|
Sign up to set email alerts
|

SoK: A Framework for Unifying At-Risk User Research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 81 publications
0
6
0
Order By: Relevance
“…Many financial products we identified in our analysis were often co-shared or connected between a complainant and an offender, including bank accounts, house loans, car insurance, and utility bills. Relationships with offenders can present unique digital-safety risks [107], such as fraudulent purchases, identity theft, or social engineering to elicit financial information through social engineering [43,44,108]. Our analysis revealed that financial support workers are broadly unaware of such a risk, and made multiple recommendations for a complainant to directly challenge an offender until the concern was resolved.…”
Section: What Barriers To Resolving Financial Abuse Do Complainants R...mentioning
confidence: 95%
See 3 more Smart Citations
“…Many financial products we identified in our analysis were often co-shared or connected between a complainant and an offender, including bank accounts, house loans, car insurance, and utility bills. Relationships with offenders can present unique digital-safety risks [107], such as fraudulent purchases, identity theft, or social engineering to elicit financial information through social engineering [43,44,108]. Our analysis revealed that financial support workers are broadly unaware of such a risk, and made multiple recommendations for a complainant to directly challenge an offender until the concern was resolved.…”
Section: What Barriers To Resolving Financial Abuse Do Complainants R...mentioning
confidence: 95%
“…As a cross academia-industry team, we obtained approval from our Institutional Review Board and internal legal group before starting this work. Like other HCI scholars before us, we were cognizant that the use of public data incurs unique ethical concerns (e.g., de-anonymization, adversarial learning, and misrepresentation [16,24]), particularly for the discussion of at-risk groups and sensitive topics [107]. We thus took steps to protect the digital safety of both the complainants and the research team.…”
Section: Study and Workflow Designmentioning
confidence: 99%
See 2 more Smart Citations
“…It is, perhaps, an inverted conception of contextual integrity-the idea that privacy relates to contextual norms or collective expectations of information flow [72]. Indeed, past research indicates that for marginalized individuals, in particular, privacy might be better achieved for those who employ much less technical strategies or abstinence [78,90]. Librarians are worried about the relationships their patrons have with police, parents, and schools which might make them vulnerable, leading librarians to conceal identity or adopt certain practices, not all of which deal with privacy in obvious ways (e.g., ignoring library card usage to avoid penalties).…”
Section: Intersectional Thinkingmentioning
confidence: 99%