skip to main content
research-article

Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy

Authors Info & Claims
Published:15 October 2020Publication History
Skip Abstract Section

Abstract

Sensor-enabled computers in the form of 'IoT' devices such as home security cameras and voice assistants are increasingly becoming pervasive in our environment. With the embedded cameras and microphones in these devices, this 'invasion' of our everyday spaces can pose significant threats to the privacy of bystanders. Because of their complex functionality, even when people attempt privacy measures (such as asking the owner to "turn the camera off"), these devices may still record information because of the lack of a 'real' off button. With the ambiguities of current designs, a bystander's perceived privacy can diverge from their actual privacy. Indeed, being able to assess one's actual privacy is a key aspect in managing one's privacy according to Altman's theory of boundary regulation, and current designs fall short in assuring people of their privacy. To understand how people as bystanders manage their privacy with IoT devices, we conducted an interview study about people's perceptions of and behaviors around current IoT devices. We find that although participants' behaviors line up with Altman's theory of boundary regulation, in the face of uncertainty about their privacy, they desire or engage in various 'tangible' workarounds. Based on our findings, we identify and introduce the concept of 'tangible privacy' as being essential to boundary regulation with IoT devices. We argue that IoT devices should be designed in a way that clearly and unambiguously conveys sensor states to people around them and make actionable design recommendations to provide strong privacy assurances to bystanders.

References

  1. Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Pub. Co.Google ScholarGoogle Scholar
  2. Leonardo Angelini, Elena Mugellini, Omar Abou Khaled, and Nadine Couture. 2018. Internet of Tangible Things (IoTT): Challenges and Opportunities for Tangible Interaction with IoT. Informatics, Vol. 5, 7 (2018).Google ScholarGoogle Scholar
  3. Orlando Arias, Jacob Wurm, Khoa Hoang, and Yier Jin. 2015. Privacy and Security in Internet of Things and Wearable Devices. IEEE Transactions on Multi-Scale Computing Systems, Vol. 1, 2 (2015), 99--109.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. David Armstrong, Ann Gosling, John Weinman, and Theresa Marteau. 1997. The Place of Inter-Rater Reliability in Qualitative Research: An Empirical Study. Sociology, Vol. 31, 3 (1997), 597--606.Google ScholarGoogle ScholarCross RefCross Ref
  5. Victoria Bellotti and Abigail Sellen. 1993. Design for Privacy in Ubiquitous Computing Environments. In Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13--17 September 1993, Milan, Italy ECSCW'93. Springer, 77--92.Google ScholarGoogle ScholarCross RefCross Ref
  6. Lucia Benaquisto and L Given. 2008. The SAGE encyclopedia of qualitative research methods. New York: Sage (2008).Google ScholarGoogle Scholar
  7. Matthew Brocker and Stephen Checkoway. 2014. iSeeYou: Disabling the MacBook Webcam Indicator LED. In 23rd USENIX Security Symposium (USENIX Security 14). San Diego, CA, 337--352.Google ScholarGoogle Scholar
  8. Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson. 2016. On privacy and security challenges in smart connected homes. In 2016 European Intelligence and Security Informatics Conference (EISIC). IEEE, 172--175.Google ScholarGoogle ScholarCross RefCross Ref
  9. Gary Burnett and Laurie Bonnici. 2003. Beyond the FAQ: Explicit and implicit norms in Usenet newsgroups. Library & Information Science Research, Vol. 25, 3 (2003), 333--351.Google ScholarGoogle ScholarCross RefCross Ref
  10. Kelly E. Caine, Celine Y. Zimmerman, Zachary Schall-Zimmerman, William R. Hazlewood, Alexander C. Sulgrove, L. Jean Camp, Katherine H. Connelly, Lesa L. Huber, and Kalpana Shankar. 2010. DigiSwitch: Design and Evaluation of a Device for Older Adults to Preserve Privacy While Monitoring Health at Home. In Proceedings of the 1st ACM International Health Informatics Symposium (Arlington, Virginia, USA) (IHI '10). ACM, New York, NY, USA, 153--162.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Nico Castelli, Corinna Ogonowski, Timo Jakobi, Martin Stein, Gunnar Stevens, and Volker Wulf. 2017. What Happened in My Home?: An End-User Development Approach for Smart Home Data Visualization. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI '17). ACM, New York, NY, USA, 853--866.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Varun Chandrasekaran, Kassem Fawaz, Bilge Mutlu, and Suman Banerjee. 2018. Characterizing Privacy Perceptions of Voice Assistants: A Technology Probe Study. ArXiv, Vol. abs/1812.00263 (2018).Google ScholarGoogle Scholar
  13. Soumyadeb Chowdhury, Md Sadek Ferdous, and Joemon M Jose. 2016. Bystander privacy in lifelogging. In Proceedings of the 30th International BCS Human Computer Interaction Conference: Companion Volume. BCS Learning & Development Ltd., 15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Yaliang Chuang, Lin-Lin Chen, and Yoga Liu. 2018. Design Vocabulary for Human-IoT Systems Communication. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI '18). ACM, New York, NY, USA, Article 274, bibinfonumpages11 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Nigel Davies, Nina Taft, Mahadev Satyanarayanan, Sarah Clinch, and Brandon Amos. 2016. Privacy mediators: Helping IoT cross the chasm. In Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications. ACM, 39--44.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Eva Deckers, Stephan Wensveen, Pierre Levy, and Rene Ahn. 2013. Designing for perceptual crossing: Designing and comparing three behaviors. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1901--1910.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Tamara Denning, Zakariya Dehlawi, and Tadayoshi Kohno. 2014. In Situ with Bystanders of Augmented Reality Glasses: Perspectives on Recording and Privacy-mediating Technologies. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI '14). ACM, New York, NY, USA, 2377--2386.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Tamara Denning, Tadayoshi Kohno, and Henry M Levy. 2013. Computer security and the modern home. Commun. ACM, Vol. 56, 1 (2013), 94--103.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Tamara Denning, Cynthia Matuszek, Karl Koscher, Joshua R Smith, and Tadayoshi Kohno. 2009. A spotlight on security and privacy risks with future household robots: attacks and lessons. In Proceedings of the 11th international conference on Ubiquitous computing. ACM, 105--114.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Emily Dixon. 2019. Family finds hidden camera livestreaming from their Airbnb in Ireland. https://www.cnn.com/2019/04/05/europe/ireland-airbnb-hidden-camera-scli-intl/index.html.Google ScholarGoogle Scholar
  21. Pardis Emami-Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security (Santa Clara, CA, USA) (SOUPS'17). USENIX Association, Berkeley, CA, USA, 399--412.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Batya Friedman, Peter H. Kahn, Jr., Jennifer Hagman, Rachel L. Severson, and Brian Gill. 2008. The Watcher and the Watched: Social Judgments About Privacy in a Public Place. Hum.-Comput. Interact., Vol. 21, 2 (May 2008), 235--272.Google ScholarGoogle Scholar
  23. Nina Gerber, Benjamin Reinheimer, and Melanie Volkamer. 2018. Home Sweet Home? Investigating Users? Awareness of Smart Home Privacy Threats. In Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP), Baltimore, MD, August 12, 2018. USENIX, Berkeley, CA.Google ScholarGoogle Scholar
  24. Stacy Gray. 2016. Always on: privacy implications of microphone-enabled devices. In Future of privacy forum.Google ScholarGoogle Scholar
  25. Chris Harrison, John Horstman, Gary Hsieh, and Scott Hudson. 2012. Unlocking the expressivity of point lights. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1683--1692.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Eva Hornecker and Jacob Buur. 2006. Getting a grip on tangible interaction: a framework on physical space and social interaction. In Proceedings of the SIGCHI conference on Human Factors in computing systems. ACM, 437--446.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. 2014. Privacy behaviors of lifeloggers using wearable cameras. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. 571--582.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Intel. 2014. Intel IoT Gateway. https://www.intel.com/content/dam/www/public/us/en/documents/product-briefs/gateway-solutions-iot-brief.pdf.Google ScholarGoogle Scholar
  29. Judy Kendall. 1999. Axial coding and the grounded theory controversy. Western journal of nursing research, Vol. 21, 6 (1999), 743--757.Google ScholarGoogle Scholar
  30. Marion Koelle, Katrin Wolf, and Susanne Boll. 2018. Beyond LED Status Lights-Design Requirements of Privacy Notices for Body-worn Cameras. In Proceedings of the Twelfth International Conference on Tangible, Embedded, and Embodied Interaction. ACM, 177--187.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Karen L Courtney, George Demiris, Marilyn Rantz, and Marjorie Skubic. 2008. Needing smart home technologies: The perspectives of older adults in continuing care retirement communities. Intformatics in primary care, Vol. 16 (02 2008), 195--201.Google ScholarGoogle Scholar
  32. Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, Are You Listening? Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (2018), 102.Google ScholarGoogle Scholar
  33. Adam J. Lee, Rosta Farzan, Apu Kapadia, and Imtiaz Ahmad. 2020. Making sense of risk in an increasingly cyber-physical world. Critical Quarterly, Vol. 62, 1 (2020), 40--48.Google ScholarGoogle ScholarCross RefCross Ref
  34. Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, and David Wagner. 2019. Privacy Attitudes of Smart Speaker Users. Proceedings on Privacy Enhancing Technologies, Vol. 2019, 4 (2019), 250 -- 271.Google ScholarGoogle Scholar
  35. Shrirang Mare, Franziska Roesner, and Tadayoshi Kohno. 2020. Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proceedings on Privacy Enhancing Technologies, Vol. 2020, 2 (2020), 436--458.Google ScholarGoogle ScholarCross RefCross Ref
  36. Nora McDonald, Sarita Schoenebeck, and Andrea Forte. 2019. Reliability and Inter-rater Reliability in Qualitative Research: Norms and Guidelines for CSCW and HCI Practice. Proc. ACM Hum.-Comput. Interact., Vol. 3, CSCW, Article 72 (Nov. 2019), bibinfonumpages23 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Emily McReynolds, Sarah Hubbard, Timothy Lau, Aditya Saraf, Maya Cakmak, and Franziska Roesner. 2017. Toys that listen: A study of parents, children, and internet-connected toys. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 5197--5207.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. B. Momenzadeh, H. Dougherty, M. Remmel, S. Myers, and L. J. Camp. 2020. Best Practices Would Make Things Better in the IoT. IEEE Security & Privacy, Vol. 18, 4 (2020), 38--47.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. David M Newman. 2020. Sociology: Exploring the architecture of everyday life .SAGE Publications, Incorporated.Google ScholarGoogle Scholar
  40. Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev., Vol. 79 (2004), 119.Google ScholarGoogle Scholar
  41. Don Norman. 2014. Turn signals are the facial expressions of automobiles .Diversion Books.Google ScholarGoogle Scholar
  42. Antti Oulasvirta, Aurora Pihlajamaa, Jukka Perkiö, Debarshi Ray, Taneli V"ah"akangas, Tero Hasu, Niklas Vainio, and Petri Myllym"aki. 2012. Long-term Effects of Ubiquitous Surveillance in the Home. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (Pittsburgh, Pennsylvania) (UbiComp '12). ACM, New York, NY, USA, 41--50.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Joann Peck and Terry L Childers. 2003. To have and to hold: The influence of haptic information on product judgments. Journal of Marketing, Vol. 67, 2 (2003), 35--48.Google ScholarGoogle ScholarCross RefCross Ref
  44. Joann Peck and Jennifer Wiggins Johnson. 2011. Autotelic need for touch, haptics, and persuasion: The role of involvement. Psychology & Marketing, Vol. 28, 3 (2011), 222--239.Google ScholarGoogle ScholarCross RefCross Ref
  45. James Pierce. 2019. Smart Home Security Cameras and Shifting Lines of Creepiness: A Design-Led Inquiry. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI '19). ACM, New York, NY, USA, Article 45, bibinfonumpages14 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Rebecca S. Portnoff, Linda N. Lee, Serge Egelman, Pratyush Mishra, Derek Leung, and David Wagner. 2015. Somebody's Watching Me? Assessing the Effectiveness of Webcam Indicator Lights. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI '15). ACM, New York, NY, USA, 1649--1658.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman Makoto Su. 2018. “You don't want to be the next meme”: College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography. In Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS '18). 143--157.Google ScholarGoogle Scholar
  48. Joel R Reidenberg. 2014. Privacy in public. U. Miami L. Rev., Vol. 69 (2014), 141.Google ScholarGoogle Scholar
  49. Tom A Rodden, Joel E Fischer, Nadia Pantidi, Khaled Bachour, and Stuart Moran. 2013. At home with agents: exploring attitudes towards future smart energy infrastructures. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1173--1182.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Rodrigo Roman, Jianying Zhou, and Javier Lopez. 2013. On the features and challenges of security and privacy in distributed internet of things. Computer Networks, Vol. 57, 10 (2013), 2266--2279.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Gilad Rosner and Erin Kenneally. 2018. Clearly Opaque: Privacy Risks of the Internet of Things. In Rosner, Gilad and Kenneally, Erin, Clearly Opaque: Privacy Risks of the Internet of Things (May 1, 2018). IoT Privacy Forum.Google ScholarGoogle Scholar
  52. Mike Scaife and Yvonne Rogers. 1996. External cognition: how do graphical representations work? International journal of human-computer studies, Vol. 45, 2 (1996), 185--213.Google ScholarGoogle Scholar
  53. Roman Schlegel, Kehuan Zhang, Xiaoyong Zhou, Mehool Intwala, Apu Kapadia, and XiaoFeng Wang. 2011. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS). 17--33.Google ScholarGoogle Scholar
  54. Bertrand Schneider, Patrick Jermann, Guillaume Zufferey, and Pierre Dillenbourg. 2010. Benefits of a tangible interface for collaborative learning and interaction. IEEE Transactions on Learning Technologies, Vol. 4, 3 (2010), 222--232.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Irving Seidman. 2006. Interviewing as qualitative research: A guide for researchers in education and the social sciences .Teachers college press.Google ScholarGoogle Scholar
  56. Teddy Seyed, Xing-Dong Yang, and Daniel Vogel. 2017. A Modular Smartphone for Lending. In Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology (UIST '17). ACM, New York, NY, USA, 205--215.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer networks, Vol. 76 (2015), 146--164.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Deepika Singh, Ismini Psychoula, Johannes Kropf, Sten Hanke, and Andreas Holzinger. 2018. Users? Perceptions and Attitudes Towards Smart Home Technologies. In International Conference on Smart Homes and Health Telematics. Springer, 203--214.Google ScholarGoogle Scholar
  59. Yunpeng Song, Yun Huang, Zhongmin Cai, and Jason I Hong. 2020. I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Luke Stark. 2016. The emotional context of information privacy. The Information Society, Vol. 32, 1 (2016), 14--27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Joshua Streiff, Olivia Kenny, Sanchari Das, Andrew Leeth, and L Jean Camp. 2018. Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears. In 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 285--286.Google ScholarGoogle Scholar
  62. Harald Sundmaeker, Patrick Guillemin, Peter Friess, and Sylvie Woelfflé. 2010. Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things, European Commision, Vol. 3, 3 (2010), 34--36.Google ScholarGoogle Scholar
  63. Robert Templeman, Zahid Rahman, David Crandall, and Apu Kapadia. 2013. PlaceRaider: Virtual Theft in Physical Spaces with Smartphones. In Proceedings of The 20th Annual Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle Scholar
  64. Brygg Ullmer and Hiroshi Ishii. 2000. Emerging frameworks for tangible user interfaces. IBM systems journal, Vol. 39, 3.4 (2000), 915--931.Google ScholarGoogle Scholar
  65. Elise Van Den Hoven, Evelien Van De Garde-Perik, Serge Offermans, Koen Van Boerdonk, and Kars-Michiel H Lenssen. 2013. Moving Tangible Interaction Systems to the Next Level. IEEE Computer, Vol. 46, 8 (2013), 70--76.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Yang Wang, Huichuan Xia, Yaxing Yao, and Yun Huang. 2016. Flying eyes and hidden controllers: A qualitative study of people?s privacy perceptions of civilian drones in the US. Proceedings on Privacy Enhancing Technologies, Vol. 2016, 3 (2016), 172--190.Google ScholarGoogle ScholarCross RefCross Ref
  67. Meredydd Williams, Jason RC Nurse, and Sadie Creese. 2016. The perfect storm: The privacy paradox and the Internet-of-Things. In 2016 11th International Conference on Availability, Reliability and Security (ARES). IEEE, 644--652.Google ScholarGoogle ScholarCross RefCross Ref
  68. Yaxing Yao, Justin Reed Basdeo, Smirity Kaushik, and Yang Wang. 2019 a. Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, 198.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Yaxing Yao, Justin Reed Basdeo, Oriana Rosata Mcdonough, and Yang Wang. 2019 b. Privacy Perceptions and Designs of Bystanders in Smart Homes. Proc. ACM Hum.-Comput. Interact., Vol. 3, CSCW, Article 59 (Nov. 2019), bibinfonumpages24 pages.Google ScholarGoogle Scholar
  70. Yaxing Yao, Huichuan Xia, Yun Huang, and Yang Wang. 2017. Privacy Mechanisms for Drones: Perceptions of Drone Controllers and Bystanders. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI '17). ACM, New York, NY, USA, 6777--6788.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 65--80.Google ScholarGoogle Scholar
  72. Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User Perceptions of Smart Home IoT Privacy. Proc. ACM Hum.-Comput. Interact., Vol. 2, CSCW, Article 200 (Nov. 2018), bibinfonumpages20 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Oren Zuckerman. 2015. Objects for change: A case study of a tangible user interface for behavior change. In Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction. 649--654.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Proceedings of the ACM on Human-Computer Interaction
        Proceedings of the ACM on Human-Computer Interaction  Volume 4, Issue CSCW2
        CSCW
        October 2020
        2310 pages
        EISSN:2573-0142
        DOI:10.1145/3430143
        Issue’s Table of Contents

        Copyright © 2020 ACM

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 15 October 2020
        Published in pacmhci Volume 4, Issue CSCW2

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!