Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3678884.3681876acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article
Open access

Why is Accessibility So Hard? Insights From the History of Privacy

Published: 13 November 2024 Publication History

Abstract

While HCI and CSCW research has recognized the importance of accessibility, the field has primarily focused on individual capabilities and technological solutions. Inspired by the evolution of privacy research, I argue for expanding accessibility research to influence accessibility in real-world practice. Similar to privacy, accessibility is driven by a poorly defined core concept and faces comparable challenges including substantial demands placed on software development and the general lack of pushback. By drawing insights from the lessons learned from the privacy research community, this paper explores the current challenges faced by accessibility research. I propose centralized support and policymaking - two areas currently under-explored within accessibility research - hold rich potential for driving meaningful progress.

References

[1]
Noura Abdi, Xiao Zhan, KopoMRamokapane, and Jose Such. 2021. Privacy norms for smart home personal assistants. In Proceedings of the 2021 CHI conference on human factors in computing systems. 1--14.
[2]
Yasemin Acar, Sascha Fahl, and Michelle L Mazurek. 2016. You are not your developer, either: A research agenda for usable security and privacy research beyond end users. 2016 IEEE Cybersecurity Development (SecDev) (2016), 3--8.
[3]
Alessandro Acquisti, Laura Brandimarte, and Jeff Hancock. 2022. How privacy?s past may shape its future. Science 375, 6578 (2022), 270--272.
[4]
Kelsie Acton. 2020. " Just with you": Professional integrated dancers? practices of access and access intimacy in timing. (2020).
[5]
Anne Adams and Martina Angela Sasse. 1999. Users are not the enemy. Commun. ACM 42, 12 (1999), 40--46.
[6]
Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, and Elissa M Redmiles. 2018. Ethics emerging: the story of privacy and security perceptions in virtual reality. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). 427--442.
[7]
Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, and Bryan Semaan. 2020. " I am uncomfortable sharing what I cant see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. In 29th USENIX Security Symposium (USENIX Security 20). 1929--1948.
[8]
Rahaf Alharbi, John Tang, and Karl Henderson. 2023. Accessibility Barriers, Conflicts, and Repairs: Understanding the Experience of Professionals with Disabilities in Hybrid Meetings. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. 1--15.
[9]
Rahaf Alharbi, John Tang, and Karl Henderson. 2023. Accessibility Barriers, Conflicts, and Repairs: Understanding the Experience of Professionals with Disabilities in Hybrid Meetings. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (Hamburg, Germany) (CHI '23). Association for Computing Machinery, New York, NY, USA, Article 605, 15 pages. https://doi.org/10.1145/3544548.3581541
[10]
Irwin Altman. 1975. The environment and social behavior: privacy, personal space, territory, and crowding. (1975).
[11]
Apple. Retrieved July, 2024. Accessibility. https://www.apple.com/accessibility/.
[12]
Mariana Arroyo Chavez, Molly Feanny, Matthew Seita, Bernard Thompson, Keith Delk, Skyler Officer, Abraham Glasser, Raja Kushalnagar, and Christian Vogler. 2024. How Users Experience Closed Captions on Live Television: Quality Metrics Remain a Challenge. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1--16.
[13]
Shiri Azenkot, Margot J Hanley, and Catherine M Baker. 2021. How accessibility practitioners promote the creation of accessible products in large companies. Proceedings of the ACM on Human-Computer Interaction 5, CSCW1 (2021), 1--27.
[14]
CatherineMBaker, Yasmine N Elglaly, Anne Spencer Ross, and Kristen Shinohara. 2022. Including accessibility in computer science education. In Proceedings of the 24th International ACM SIGACCESS Conference on Computers and Accessibility. 1--5.
[15]
Rebecca Balebako, Abigail Marsh, Jialiu Lin, Jason Hong, and Lorrie Faith Cranor. 2014. The privacy and security behaviors of smartphone app developers. In Workshop on Usable Security. The Internet Society Reston, VA, USA, 1--10.
[16]
France Bélanger and Robert E Crossler. 2011. Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly (2011), 1017--1041.
[17]
Victoria Bellotti and Abigail Sellen. 1993. Design for privacy in ubiquitous computing environments. In Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13--17 September 1993, Milan, Italy ECSCW 93. Springer, 77--92.
[18]
Cynthia L Bennett, Erin Brady, and Stacy M Branham. 2018. Interdependence as a frame for assistive technology research and design. In Proceedings of the 20th international acm sigaccess conference on computers and accessibility. 161--173.
[19]
Tingting Bi, Xin Xia, David Lo, John Grundy, Thomas Zimmermann, and Denae Ford. 2022. Accessibility in software practice: A practitioners perspective. ACM Transactions on Software Engineering and Methodology (TOSEM) 31, 4 (2022), 1--26.
[20]
Jeffrey P Bigham, Irene Lin, and Saiph Savage. 2017. The Effects of" Not Knowing What You Dont Know" on Web Accessibility for Blind Web Users. In Proceedings of the 19th international ACM SIGACCESS conference on computers and accessibility. 101--109.
[21]
Danielle Bragg, Naomi Caselli, Julie A Hochgesang, Matt Huenerfauth, Leah Katz-Hernandez, Oscar Koller, Raja Kushalnagar, Christian Vogler, and Richard E Ladner. 2021. The fate landscape of sign language ai datasets: An interdisciplinary perspective. ACM Transactions on Accessible Computing (TACCESS) 14, 2 (2021), 1--45.
[22]
Danielle Bragg, Oscar Koller, Mary Bellard, Larwan Berke, Patrick Boudreault, Annelies Braffort, Naomi Caselli, Matt Huenerfauth, Hernisa Kacorri, Tessa Verhoef, et al. 2019. Sign language recognition, generation, and translation: An interdisciplinary perspective. In The 21st international ACMSIGACCESS conference on computers and accessibility. 16--31.
[23]
Sheryl Burgstahler and Richard Ladner. 2006. An alliance to increase the participation of individuals with disabilities in computing careers. ACM SIGACCESS Accessibility and Computing 85 (2006), 3--9.
[24]
CHI2024. Retrieved July, 2024. Selecting a Subcommittee Accessibility and Aging. https://chi2024.acm.org/subcommittees/selecting-a-subcommittee/ #accessibility.
[25]
John Lee Clark. Retrieved January, 2024. Against Access. https://audio. mcsweeneys.net/transcripts/against_access.html.
[26]
Jessica Colnago, Yuanyuan Feng, Tharangini Palanivel, Sarah Pearman, Megan Ung, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh. 2020. Informing the design of a personalized privacy assistant for the internet of things. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--13.
[27]
Paula Conn, Taylor Gotfrid, Qiwen Zhao, Rachel Celestine, Vaishnavi Mande, Kristen Shinohara, Stephanie Ludi, and Matt Huenerfauth. 2020. Understanding the motivations of final-year computing undergraduates for considering accessibility. ACM Transactions on Computing Education (TOCE) 20, 2 (2020), 1--22.
[28]
The World Wide Web Consortium. Retrieved January, 2024. Introduction to Web Accessibility. https://www.w3.org/WAI/fundamentals/accessibility-intro/.
[29]
Raymundo Cornejo, Robin Brewer, Caroline Edasis, and Anne Marie Piper. 2016. Vulnerability, sharing, and privacy: Analyzing art therapy for older adults with dementia. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. 1572--1583.
[30]
Sauvik Das, Hao-Ping Lee, and Jodi Forlizzi. 2023. Privacy in the Age of AI. Commun. ACM 66, 11 (2023), 29--31.
[31]
Jaybie A De Guzman, Kanchana Thilakarathna, and Aruna Seneviratne. 2019. Security and privacy approaches in mixed reality: A literature survey. ACM Computing Surveys (CSUR) 52, 6 (2019), 1--37.
[32]
Cambridge Dictionary. Retrieved July, 2024. accessibility. https://dictionary. cambridge.org/us/dictionary/english/accessibility.
[33]
Frank Elavsky. 2023. Option-Driven Design: Context, Tradeoffs, and Considerations for Accessibility. arXiv preprint arXiv:2304.08748 (2023).
[34]
Elizabeth F Emens. 2012. Disabling attitudes: US disability law and the ADA Amendments Act. The American Journal of Comparative Law 60, 1 (2012), 205-- 234.
[35]
Organisation for Economic Co-operation and Development. Retrieved January, 2024. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. https://bja.ojp.gov/sites/g/files/xyckuh186/files/media/document/ oecd_fips.pdf.
[36]
GENERAL DATA PROTECTION REGULATION (GDPR). Retrieved January, 2024. Right to be Forgotten. https://gdpr-info.eu/issues/right-to-be-forgotten/.
[37]
Ephraim P Glinert and Bryant W York. 1992. Computers and people with disabilities. Commun. ACM 35, 5 (1992), 32--35.
[38]
Erving Goffman. 2023. The presentation of self in everyday life. In Social theory re-wired. Routledge, 450--459.
[39]
Google. Retrieved July, 2024. Accessibility in our products. https://about.google/ intl/ALL_us/belonging/disability-inclusion/product-accessibility/.
[40]
Johanna Gunawan, Cristiana Santos, and Irene Kamara. 2022. Redress for dark patterns privacy harms A case study on consent interactions. In Proceedings of the 2022 Symposium on Computer Science and Law. 181--194.
[41]
Irit Hadar, Tomer Hasson, Oshrat Ayalon, Eran Toch, Michael Birnhack, Sofia Sherman, and Arod Balissa. 2018. Privacy by designers: software developers? privacy mindset. Empirical Software Engineering 23 (2018), 259--289.
[42]
Shawn Lawton Henry. 2007. Just ask: integrating accessibility throughout design. Lulu. com.
[43]
Megan Hofmann, Devva Kasnitz, Jennifer Mankoff, and Cynthia L Bennett. 2020. Living disability theory: Reflections on access, research, and design. In Proceedings of the 22nd International ACM SIGACCESS Conference on Computers and Accessibility. 1--13.
[44]
Jason I Hong. 2023. Teaching the FATE Community about Privacy. Commun. ACM 66, 8 (2023), 10--11.
[45]
Jason I Hong. Retrieved August, 2023. Why is Privacy So Hard? https://cacm. acm.org/blogs/blog-cacm/235401-why-is-privacy-so-hard/fulltext.
[46]
Stacy Hsueh, Beatrice Vincenzi, Akshata Murdeshwar, and Marianela Ciolfi Felice. 2023. Cripping Data Visualizations: Crip Technoscience as a Critical Lens for Designing Digital Access. In Proceedings of the 25th International ACM SIGACCESS Conference on Computers and Accessibility. 1--16.
[47]
Jie Huang, Michael Backes, and Sven Bugiel. 2021. A11y and Privacy dont have to be mutually exclusive: Constraining Accessibility Service Misuse on Android. In 30th USENIX Security Symposium (USENIX Security 21). 3631--3648.
[48]
Dhruv Jain, Kelly Mack, Akli Amrous, Matt Wright, Steven Goodman, Leah Findlater, and Jon E Froehlich. 2020. Homesound: An iterative field deployment of an in-home sound awareness system for deaf or hard of hearing users. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--12.
[49]
Sushant Kafle and Matt Huenerfauth. 2017. Evaluating the usability of automatically generated captions for people who are deaf or hard of hearing. In Proceedings of the 19th International ACM SIGACCESS Conference on Computers and Accessibility. 165--174.
[50]
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, and Robert W Reeder. 2009. A" nutrition label" for privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security. 1--12.
[51]
Tanner Kohler. Retrieved July, 2024. Challenges for Screen-Reader Users on Mobile. https://www.nngroup.com/articles/screen-reader-users-on-mobile/.
[52]
Spyros Kokolakis. 2017. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & security 64 (2017), 122--134.
[53]
Raja S Kushalnagar and Christian Vogler. 2020. Teleconference accessibility and guidelines for deaf and hard of hearing users. In Proceedings of the 22nd International ACM SIGACCESS Conference on Computers and Accessibility. 1--6.
[54]
Lin Kyi, Sushil Ammanaghatta Shivakumar, Cristiana Teixeira Santos, Franziska Roesner, Frederike Zufall, and Asia J Biega. 2023. Investigating deceptive design in GDPRs legitimate interest. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. 1--16.
[55]
Richard E Ladner, Francis A McDonough, William Roth, Lawrence A Scadden, and Gregg C Vanderheiden. 1988. Public law 99--506,Section 508 Electronic equipment accessibility for disabled workers. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 219--222.
[56]
Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proceedings of the ACM on human-computer interaction 2, CSCW (2018), 1--31.
[57]
Jonathan Lazar, Alfreda Dudley-Sponaugle, and Kisha-Dawn Greenidge. 2004. Improving web accessibility: a study of webmaster perceptions. Computers in human behavior 20, 2 (2004), 269--288.
[58]
Tianshi Li, Yuvraj Agarwal, and Jason I Hong. 2018. Coconut: An IDE plugin for developing privacy-friendly apps. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 4 (2018), 1--35.
[59]
Tianshi Li, Elizabeth Louie, Laura Dabbish, and Jason I Hong. 2021. How developers talk about personal data and what it means for user privacy: A case study of a developer forum on reddit. Proceedings of the ACM on Human-Computer Interaction 4, CSCW3 (2021), 1--28.
[60]
Tianshi Li, Kayla Reiman, Yuvraj Agarwal, Lorrie Faith Cranor, and Jason I Hong. 2022. Understanding challenges for developers to create accurate privacy nutrition labels. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems. 1--24.
[61]
Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Aerin Zhang, Norman Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow my recommendations: A personalized privacy assistant for mobile app permissions. In Twelfth symposium on usable privacy and security (SOUPS 2016). 27--41.
[62]
Kelly Mack, Emma McDonnell, Dhruv Jain, Lucy Lu Wang, Jon E. Froehlich, and Leah Findlater. 2021. What do we mean by accessibility research A literature survey of accessibility papers in CHI and ASSETS from 1994 to 2019. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1--18.
[63]
Jennifer Mankoff, Gillian R Hayes, and Devva Kasnitz. 2010. Disability studies as a source of critical inquiry for the field of assistive technology. In Proceedings of the 12th international ACM SIGACCESS conference on Computers and accessibility. 3--10.
[64]
Nora McDonald and Andrea Forte. 2020. The politics of privacy theories: Moving from norms to vulnerabilities. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--14.
[65]
Emma J McDonnell, Ping Liu, Steven M Goodman, Raja Kushalnagar, Jon E Froehlich, and Leah Findlater. 2021. Social, environmental, and technical: Factors at play in the current use and future design of small-group captioning. Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021), 1--25.
[66]
Microsoft. Retrieved July, 2024. Accessibility. https://www.microsoft.com/enus/ accessibility.
[67]
Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004), 119.
[68]
OECD. 2002. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. 64 pages. https://doi.org/https://doi.org/10.1787/9789264196391- en
[69]
Ministry of Justice of the Peoples Republic of China. Retrieved July, 2024. China passes new law on barrier-free living environment. http://en.moj.gov.cn/2023- 06/29/c_898657.htm.
[70]
Leysia Palen and Paul Dourish. 2003. Unpacking" privacy" for a networked world. In Proceedings of the SIGCHI conference on Human factors in computing systems. 129--136.
[71]
Rohan Patel, Pedro Breton, Catherine M Baker, Yasmine N El-Glaly, and Kristen Shinohara. 2020. Why software is not accessible: Technology professionals? perspectives and challenges. In Extended abstracts of the 2020 CHI conference on human factors in computing systems. 1--9.
[72]
Elissa M Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, and Michelle L Mazurek. 2020. A comprehensive quality evaluation of security and privacy advice on the web. In 29th USENIX Security Symposium (USENIX Security 20). 89--108.
[73]
Franziska Roesner, Tadayoshi Kohno, and David Molnar. 2014. Security and privacy for augmented reality systems. Commun. ACM 57, 4 (2014), 88--96.
[74]
Anne Spencer Ross, Xiaoyi Zhang, James Fogarty, and Jacob O Wobbrock. 2017. Epidemiology as a framework for large-scale mobile application accessibility assessment. In Proceedings of the 19th international ACM SIGACCESS conference on computers and accessibility. 2--11.
[75]
Anne Spencer Ross, Xiaoyi Zhang, James Fogarty, and Jacob O Wobbrock. 2018. Examining image-based button labeling for accessibility in Android apps through large-scale analysis. In Proceedings of the 20th International ACM SIGACCESS Conference on Computers and Accessibility. 119--130.
[76]
Abir Saha and Anne Marie Piper. 2020. Understanding audio production practices of people with vision impairments. In The 22nd International ACM SIGACCESS Conference on Computers and Accessibility. 1--13.
[77]
Jerome H Saltzer and Michael D Schroeder. 1975. The protection of information in computer systems. Proc. IEEE 63, 9 (1975), 1278--1308.
[78]
Ather Sharif, Aedan Liam McCall, and Kianna Roces Bolante. 2022. Should I say disabled people or people with disabilities Language preferences of disabled people between identity-and person-first language. In Proceedings of the 24th international ACM SIGACCESS conference on computers and accessibility. 1--18.
[79]
Kristen Shinohara, Michael McQuaid, and Nayeri Jacobo. 2020. Access differential and inequitable access: Inaccessibility for doctoral students in computing. In Proceedings of the 22nd International ACM SIGACCESS Conference on Computers and Accessibility. 1--12.
[80]
Kristen Shinohara, Mick McQuaid, and Nayeri Jacobo. 2021. The burden of survival: how doctoral students in computing bridge the chasm of inaccessibility. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1--13.
[81]
Kristen Shinohara, Murtaza Tamjeed, Michael McQuaid, and Dymen A Barkins. 2022. Usability, Accessibility and Social Entanglements in Advanced Tool Use by Vision Impaired Graduate Students. Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022), 1--21.
[82]
João Sousa e Silva, Ramiro Gonçalves, Frederico Branco, António Pereira, Manuel Au-Yong-Oliveira, and José Martins. 2019. Accessible software development: a conceptual model proposal. Universal Access in the Information Society 18 (2019), 703--716.
[83]
Daniel J Solove. 2005. A taxonomy of privacy. U. Pa. l. Rev. 154 (2005), 477.
[84]
Abigale Stangl, Nitin Verma, Kenneth R Fleischmann, Meredith Ringel Morris, and Danna Gurari. 2021. Going beyond one-size-fits-all image descriptions to satisfy the information wants of people who are blind or have low vision. In Proceedings of the 23rd International ACM SIGACCESS Conference on Computers and Accessibility. 1--15.
[85]
Thad Starner and Alex Pentland. 1995. Real-time american sign language recognition from video using hidden markov models. In Proceedings of International Symposium on Computer Vision-ISCV. IEEE, 265--270.
[86]
Xinru Tang, Xiang Chang, Nuoran Chen, Yingjie Ni, RAY LC, and Xin Tong. 2023. Community-Driven Information Accessibility: Online Sign Language Content Creation within d/Deaf Communities. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. 1--24.
[87]
Shari Trewin, Brian Cragun, Cal Swart, Jonathan Brezin, and John Richards. 2010. Accessibility challenges and tool features: an IBM Web developer perspective. In Proceedings of the 2010 international cross disciplinary conference on web accessibility (W4A). 1--10.
[88]
Emily Tseng, Mehrnaz Sabet, Rosanna Bellini, Harkiran Kaur Sodhi, Thomas Ristenpart, and Nicola Dell. 2022. Care infrastructures for digital security in intimate partner violence. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems. 1--20.
[89]
Emily Q Wang and Anne Marie Piper. 2018. Accessibility in action: Co-located collaboration among deaf and hearing professionals. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 1--25.
[90]
Hao-ChuanWang, Susan F Fussell, and Leslie D Setlock. 2009. Cultural difference and adaptation of communication styles in computer-mediated group brainstorming. In Proceedings of the SIGCHI conference on human factors in computing systems. 669--678.
[91]
Yang Wang. 2017. The third wave? Inclusive privacy and security. In Proceedings of the 2017 new security paradigms workshop. 122--130.
[92]
Samuel D. Warren and Louis D. Brandeis. Retrieved July, 2024. The Right to Privacy. https://louisville.edu/law/library/special-collections/the-louis-d.-brandeiscollection/ the-right-to-privacy.
[93]
Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Franziska Roesner, and Kurt Thomas. 2023. Theres so much responsibility on users right now: Expert Advice for Staying Safer From Hate and Harassment. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. 1--17.
[94]
Jacob OWobbrock, Krzysztof Z Gajos, Shaun K Kane, and Gregg C Vanderheiden. 2018. Ability-based design. Commun. ACM 61, 6 (2018), 62--71.
[95]
Jacob O Wobbrock, Shaun K Kane, Krzysztof Z Gajos, Susumu Harada, and Jon Froehlich. 2011. Ability-based design: Concept, principles and examples. ACM Transactions on Accessible Computing (TACCESS) 3, 3 (2011), 1--27.
[96]
Richmond Y Wong, Andrew Chong, and R Cooper Aspegren. 2023. Privacy Legislation as Business Risks: How GDPR and CCPA are Represented in Technology Companies Investment Risk Disclosures. Proceedings of the ACM on Human-Computer Interaction 7, CSCW1 (2023), 1--26.
[97]
Richmond Y Wong and Deirdre K Mulligan. 2019. Bringing design to the privacy table: Broadening design in privacy by design? through the lens of HCI. In Proceedings of the 2019 CHI conference on human factors in computing systems. 1--17.
[98]
Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, and Acar Tamersoy. 2021. The role of computer security customer support in helping survivors of intimate partner violence. In 30th USENIX security symposium (USENIX Security 21). 429--446.

Index Terms

  1. Why is Accessibility So Hard? Insights From the History of Privacy

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CSCW Companion '24: Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing
    November 2024
    755 pages
    ISBN:9798400711145
    DOI:10.1145/3678884
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 November 2024

    Check for updates

    Author Tags

    1. accessibility
    2. developer support
    3. infrastructure support
    4. policymaking
    5. privacy
    6. research agenda

    Qualifiers

    • Research-article

    Conference

    CSCW '24
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

    Upcoming Conference

    CSCW '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 19
      Total Downloads
    • Downloads (Last 12 months)19
    • Downloads (Last 6 weeks)19
    Reflects downloads up to 18 Nov 2024

    Other Metrics

    Citations

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media