{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:42:19Z","timestamp":1774946539711,"version":"3.50.1"},"reference-count":52,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["NS-1814068, CNS-1814110, and CNS-1814439"],"award-info":[{"award-number":["NS-1814068, CNS-1814110, and CNS-1814439"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2021,10,13]]},"abstract":"<jats:p>Managing digital privacy and security is often a collaborative process, where groups of individuals work together to share information and give one another advice. Yet, this collaborative process is not always reciprocal or equally shared. In many cases, individuals with more expertise help others without receiving help in return. Therefore, we studied the phenomenon of \"Tech Caregiving\" by surveying 20 groups (112 individuals) comprised of friends, family members, and\/or co-workers who identified at least one member of their group as a someone who provides informal technical support to the people they know. We found that tech caregivers reported significantly higher levels of power use and self-efficacy for digital privacy and security, compared to tech caregivees. However, caregivers and caregivees did not differ based on their self-reportedcommunity collective-efficacy for collaboratively managing privacy and security together as a group. This finding demonstrates the importance of tech caregiving and community belonging in building community collective efficacy for digital privacy and security. We also found that caregivers and caregivees most often communicated via text message or phone when coordinating support, which was most frequently needed when troubleshooting or setting up new devices. Meanwhile, discussions specific to privacy and security represented only a small fraction of the issues for which participants gave or received tech care. Thus, we conclude that educating tech caregivers on how to provide privacy and security-focused support, as well as designing technologies that facilitate such support, has the potential to create positive networks effects towards the collective management of digital privacy and security.<\/jats:p>","DOI":"10.1145\/3479540","type":"journal-article","created":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T02:39:17Z","timestamp":1634611157000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Examining Collaborative Support for Privacy and Security in the Broader Context of Tech Caregiving"],"prefix":"10.1145","volume":"5","author":[{"given":"Jess","family":"Kropczynski","sequence":"first","affiliation":[{"name":"University of Cincinnati, Cincinnati, OH, USA"}]},{"given":"Reza","family":"Ghaiumy Anaraky","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Mamtaj","family":"Akter","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"Amy J.","family":"Godfrey","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"Heather","family":"Lipford","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte, Charlotte, NC, USA"}]},{"given":"Pamela J.","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,10,18]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2019. AT&T Tech Caregivers Poll Preview."},{"key":"e_1_2_1_2_1","unstructured":"2019. Empowering Tech Caregivers to Tackle Online Safety: AT&T Cyber Aware. https:\/\/about.att.com\/pages\/cyberaware\/ni\/blog\/tech-caregivers"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Zaina Aljallad Wentao Guo Chhaya Chouhan Christy LaPerriere Jess Kropczynski Pamela Wisnewski and Heather Lipford. 2019. Designing a Mobile Application to Support Social Processes for Privacy (Journal Article) | DOE PAGES. https:\/\/par.nsf.gov\/biblio\/10097722","DOI":"10.14722\/usec.2019.23016"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018896.3036368"},{"key":"e_1_2_1_5_1","volume-title":"The 15th Symp. on Usable Privacy and Security.","author":"Anaraky Reza Ghaiumy","year":"2019","unstructured":"Reza Ghaiumy Anaraky, David Cherry, Marie Jarrell, and B Knijnenburg. 2019. Testing a comic-based privacy policy. In The 15th Symp. on Usable Privacy and Security."},{"key":"e_1_2_1_6_1","volume-title":"Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information. Pew Research (Nov","author":"Auxier Brooke","year":"2019","unstructured":"Brooke Auxier, Lee Rainie, Monica Anderson, Andrew Perrin, Madhu Kumar, and Erica Turner. 2019. Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information. Pew Research (Nov. 2019). https:\/\/www.pewresearch.org\/internet\/2019\/11\/15\/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information\/"},{"key":"e_1_2_1_7_1","volume-title":"Self-efficacy mechanism in human agency. American psychologist 2","author":"Bandura Albert","year":"1982","unstructured":"Albert Bandura. 1982. Self-efficacy mechanism in human agency. American psychologist 2 (1982), 122."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1037\/13620-004"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125579"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2003.1174585"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054974"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441837"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359248"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444813506975"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180910"},{"key":"e_1_2_1_16_1","volume-title":"Coefficient alpha and the internal structure of tests. psychometrika 3","author":"Cronbach Lee J","year":"1951","unstructured":"Lee J Cronbach. 1951. Coefficient alpha and the internal structure of tests. psychometrika 3 (1951), 297--334."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1037\/e578092012-002"},{"key":"e_1_2_1_18_1","volume-title":"Proc. of the Tenth USENIX Conf. on Usable Privacy and Security (SOUPS '14)","author":"Das Sauvik","unstructured":"Sauvik Das, Tiffany Hyun-Jin Kim, Laura A. Dabbish, and Jason I. Hong. 2014. The effect of social influence on security sensitivity. In Proc. of the Tenth USENIX Conf. on Usable Privacy and Security (SOUPS '14). USENIX Association, Menlo Park, CA, 143--157."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660271"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675225"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/10543409808835243"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308--5"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308561.3353807"},{"key":"e_1_2_1_25_1","volume-title":"Editor","author":"Gefen David","year":"2011","unstructured":"David Gefen, Edward E Rigdon, and Detmar Straub. 2011. Editor's comments: an update and extension to SEM guidelines for administrative and social science research. Mis Quarterly (2011), iii--xiv."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-4023-7_24"},{"key":"e_1_2_1_27_1","volume-title":"Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural equation modeling: a multidisciplinary journal 1","author":"Bentler Hu","year":"1999","unstructured":"Li-tze Hu and Peter M Bentler. 1999. Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural equation modeling: a multidisciplinary journal 1 (1999), 1--55."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI1504_2"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650215588786"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432954"},{"key":"e_1_2_1_32_1","volume-title":"The Sage encyclopedia of social science research methods","author":"Lewis-Beck Michael","unstructured":"Michael Lewis-Beck, Alan E Bryman, and Tim Futing Liao. 2003. The Sage encyclopedia of social science research methods. Sage Publications."},{"key":"e_1_2_1_33_1","volume-title":"Sixteenth Symp. on Usable Privacy and Security (SOUPS 2020","author":"McDonald Nora","year":"2020","unstructured":"Nora McDonald, Alison Larsen, Allison Battisti, Galina Madjaroff, Aaron Massey, and Helena Mentis. 2020. Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges. In Sixteenth Symp. on Usable Privacy and Security (SOUPS 2020). USENIX Association, 99--110. https:\/\/www.usenix.org\/Conf.\/soups2020\/presentation\/mcdonald"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341162.3349311"},{"key":"e_1_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Tamir Mendel and Eran Toch. 2017. Susceptibility to Social Influence of Privacy Behaviors | Proceedings of the 2017 ACM Conf. on Computer Supported Cooperative Work and Social Computing. https:\/\/dl.acm.org\/doi\/10.1145\/2998181.2998323","DOI":"10.1145\/2998181.2998323"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369821"},{"key":"e_1_2_1_37_1","unstructured":"Norbert Nthala and Ivan Flechais. 2018. Informal Support Networks: an investigation into Home Data Security Practices."},{"key":"e_1_2_1_38_1","unstructured":"1615 L. St NW Suite 800 Wash. and DC 20036USA202--419--4300 | Main202--857--8562 | Fax202--419--4372 | Media Inquiries. [n.d.]. Demographics of Mobile Device Ownership and Adoption in the United States. https:\/\/www.pewresearch.org\/internet\/fact-sheet\/mobile\/"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v10i10.1286"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518816"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyv008"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335364"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.24"},{"key":"e_1_2_1_44_1","unstructured":"Seymour B Sarason. 1974. The psychological sense of community: Prospects for a community psychology. Jossey-Bass."},{"key":"e_1_2_1_45_1","volume-title":"Learning Assigned Secrets for Unlocking Mobile Devices. (July","author":"Schechter Stuart","year":"2015","unstructured":"Stuart Schechter and Joseph Bonneau. 2015. Learning Assigned Secrets for Unlocking Mobile Devices. (July 2015). https:\/\/www.microsoft.com\/en-us\/research\/publication\/learning-assigned-secrets-for-unlocking-mobile-devices\/"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2010.01377.x"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376255"},{"key":"e_1_2_1_48_1","volume-title":"You don't need to be tech savvy to be a tech caregiver","author":"Parys Bill Van","year":"2019","unstructured":"Bill Van Parys. 2019. You don't need to be tech savvy to be a tech caregiver. Fast Company (Dec. 2019). https:\/\/www.fastcompany.com\/90438110\/you-dont-need-to-be-tech-savvy-to-be-a-tech-caregiver"},{"key":"e_1_2_1_49_1","volume-title":"Vogels and Monica Anderson","author":"Emily","year":"2019","unstructured":"Emily A. Vogels and Monica Anderson. 2019. Americans and Digital Knowledge. Pew Research (Oct. 2019). https:\/\/www.pewresearch.org\/internet\/2019\/10\/09\/americans-and-digital-knowledge\/"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1556460.1556501"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1184\/R1\/6470321.v1"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702588"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479540","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3479540","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3479540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T05:02:27Z","timestamp":1752469347000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479540"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,13]]},"references-count":52,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2021,10,13]]}},"alternative-id":["10.1145\/3479540"],"URL":"https:\/\/doi.org\/10.1145\/3479540","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,13]]},"assertion":[{"value":"2021-10-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}