{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T17:06:32Z","timestamp":1778605592834,"version":"3.51.4"},"reference-count":120,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2031951, 2127309"],"award-info":[{"award-number":["2031951, 2127309"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2022,11,7]]},"abstract":"<jats:p>People who are marginalized experience disproportionate harms when their privacy is violated. Meeting their needs is vital for developing equitable and privacy-protective technologies. In response, research at the intersection of privacy and marginalization has acquired newfound urgency in the HCI and social computing community. In this literature review, we set out to understand how researchers have investigated this area of study. What topics have been examined, and how? What are the key findings and recommendations? And, crucially, where do we go from here? Based on a review of papers on privacy and marginalization published between 2010-2020 across HCI, Communication, and Privacy-focused venues, we make three main contributions: (1) we identify key themes in existing work and introduce the Privacy Responses and Costs framework to describe the tensions around protecting privacy in marginalized contexts, (2) we identify understudied research topics (e.g., race) and other avenues for future work, and (3) we characterize trends in research practices, including the under-reporting of important methodological choices, and provide suggestions to establish shared best practices for this growing research area.<\/jats:p>","DOI":"10.1145\/3555556","type":"journal-article","created":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T22:58:54Z","timestamp":1668207534000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":54,"title":["Privacy Research with Marginalized Groups"],"prefix":"10.1145","volume":"6","author":[{"given":"Shruti","family":"Sannon","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Andrea","family":"Forte","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,11]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300692"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134652"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702334"},{"key":"e_1_2_2_4_1","volume-title":"Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. In 29th USENIX Security Symposium. 1929--1948","author":"Akter Taslima","year":"2020","unstructured":"Taslima Akter , Bryan Dosono , Tousif Ahmed , Apu Kapadia , and Bryan Semaan . 2020 . \u201c I am uncomfortable sharing what I can't see \u201d: Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. In 29th USENIX Security Symposium. 1929--1948 . Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, and Bryan Semaan. 2020. \u201cI am uncomfortable sharing what I can't see\u201d: Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. In 29th USENIX Security Symposium. 1929--1948."},{"key":"e_1_2_2_5_1","first-page":"232","article-title":"Systematic review of existing IoT architectures security and privacy issues and concerns","volume":"10","author":"Alshohoumi Fatma","year":"2019","unstructured":"Fatma Alshohoumi , Mohammed Sarrab , Abdulla AlHamadani , and Dawood Al-Abri . 2019 . Systematic review of existing IoT architectures security and privacy issues and concerns . Int. J. Adv. Comput. Sci. Appl , Vol. 10 , 7 (2019), 232 -- 251 . Fatma Alshohoumi, Mohammed Sarrab, Abdulla AlHamadani, and Dawood Al-Abri. 2019. Systematic review of existing IoT architectures security and privacy issues and concerns. Int. J. Adv. Comput. Sci. Appl , Vol. 10, 7 (2019), 232--251.","journal-title":"Int. J. Adv. Comput. Sci. Appl"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207727"},{"key":"e_1_2_2_7_1","volume-title":"The privacy paradox--Investigating discrepancies between expressed privacy concerns and actual online behavior--A systematic literature review. Telematics and informatics","author":"Barth Susanne","year":"2017","unstructured":"Susanne Barth and Menno DT De Jong . 2017. The privacy paradox--Investigating discrepancies between expressed privacy concerns and actual online behavior--A systematic literature review. Telematics and informatics , Vol. 34 , 7 ( 2017 ), 1038--1058. Susanne Barth and Menno DT De Jong. 2017. The privacy paradox--Investigating discrepancies between expressed privacy concerns and actual online behavior--A systematic literature review. Telematics and informatics , Vol. 34, 7 (2017), 1038--1058."},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858342"},{"key":"e_1_2_2_9_1","volume-title":"The right to privacy. Harvard law review","author":"Brandeis Louis","year":"1890","unstructured":"Louis Brandeis and Samuel Warren . 1890. The right to privacy. Harvard law review , Vol. 4 , 5 ( 1890 ), 193--220. Louis Brandeis and Samuel Warren. 1890. The right to privacy. Harvard law review, Vol. 4, 5 ( 1890), 193--220."},{"key":"e_1_2_2_10_1","volume-title":"Ways of Knowing in HCI, , Judith S","author":"Bruckman Amy","unstructured":"Amy Bruckman . 2014. Research ethics and HCI . In Ways of Knowing in HCI, , Judith S . Olson and Wendy A. Kellogg (Eds.). Springer , 449--468. Amy Bruckman. 2014. Research ethics and HCI. In Ways of Knowing in HCI, , Judith S. Olson and Wendy A. Kellogg (Eds.). Springer, 449--468."},{"key":"e_1_2_2_11_1","volume-title":"27th USENIX Security Symposium. 479--495","author":"Jos\u00e9 Gonz\u00e1lez","year":"2018","unstructured":"Jos\u00e9 Gonz\u00e1lez Caba nas, \u00c1ngel Cuevas , and Rub\u00e9n Cuevas . 2018 . Unveiling and quantifying Facebook exploitation of sensitive personal data for advertising purposes . In 27th USENIX Security Symposium. 479--495 . Jos\u00e9 Gonz\u00e1lez Caba nas, \u00c1ngel Cuevas, and Rub\u00e9n Cuevas. 2018. Unveiling and quantifying Facebook exploitation of sensitive personal data for advertising purposes. In 27th USENIX Security Symposium. 479--495."},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858498"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173824"},{"key":"e_1_2_2_14_1","volume-title":"28th USENIX Security Symposium. 89--104","author":"Chen Christine","year":"2019","unstructured":"Christine Chen , Nicola Dell , and Franziska Roesner . 2019 . Computer security and privacy in the interactions between victim service providers and human trafficking survivors . In 28th USENIX Security Symposium. 89--104 . Christine Chen, Nicola Dell, and Franziska Roesner. 2019. Computer security and privacy in the interactions between victim service providers and human trafficking survivors. In 28th USENIX Security Symposium. 89--104."},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134670"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481348"},{"key":"e_1_2_2_17_1","volume-title":"The Nuremberg Code. Trials of war criminals before the Nuremberg military tribunals under control council law","author":"Code Nuremberg","year":"1949","unstructured":"Nuremberg Code . 1949. The Nuremberg Code. Trials of war criminals before the Nuremberg military tribunals under control council law , Vol. 10 , 1949 (1949), 181--2. Nuremberg Code. 1949. The Nuremberg Code. Trials of war criminals before the Nuremberg military tribunals under control council law, Vol. 10, 1949 (1949), 181--2."},{"key":"e_1_2_2_18_1","volume-title":"Marginalized populations. The SAGE encyclopedia of qualitative research methods","author":"Cook Kay","year":"2008","unstructured":"Kay Cook . 2008. Marginalized populations. The SAGE encyclopedia of qualitative research methods ( 2008 ), 495--496. Kay Cook. 2008. Marginalized populations. The SAGE encyclopedia of qualitative research methods (2008), 495--496."},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819960"},{"key":"e_1_2_2_20_1","unstructured":"Council of European Union. 2014. Council Directive 2000\/43\/EC implementing the principle of equal treatment between persons irrespective of racial or ethnic origin. newlinehttps:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A32000L0043.  Council of European Union. 2014. Council Directive 2000\/43\/EC implementing the principle of equal treatment between persons irrespective of racial or ethnic origin. newlinehttps:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A32000L0043."},{"key":"e_1_2_2_21_1","volume-title":"Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services. 133--142","author":"Dahl Yngve","year":"2012","unstructured":"Yngve Dahl and Kristine Holb\u00f8 . 2012 . \u201c There are no secrets here!\u201d Professional stakeholders' views on the use of GPS for tracking dementia patients . In Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services. 133--142 . Yngve Dahl and Kristine Holb\u00f8. 2012. \u201cThere are no secrets here!\u201d Professional stakeholders' views on the use of GPS for tracking dementia patients. In Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services. 133--142."},{"key":"e_1_2_2_22_1","volume-title":"Proceedings of the Human Factors and Ergonomics Society Annual Meeting","volume":"64","author":"Das Sanchari","year":"2020","unstructured":"Sanchari Das , Robert S Gutzwiller , Rod D Roscoe , Prashanth Rajivan , Yang Wang , L Jean Camp , and Roberto Hoyle . 2020 . Humans and technology for inclusive privacy and security . In Proceedings of the Human Factors and Ergonomics Society Annual Meeting , Vol. 64 . SAGE Publications Sage CA: Los Angeles, CA, 461--464. Sanchari Das, Robert S Gutzwiller, Rod D Roscoe, Prashanth Rajivan, Yang Wang, L Jean Camp, and Roberto Hoyle. 2020. Humans and technology for inclusive privacy and security. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 64. SAGE Publications Sage CA: Los Angeles, CA, 461--464."},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858081"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274313"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12163"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134673"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753625"},{"key":"e_1_2_2_28_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS","author":"Dosono Bryan","year":"2015","unstructured":"Bryan Dosono , Jordan Hayes , and Yang Wang . 2015 . ?I'm Stuck!\": A Contextual Inquiry of People with Visual Impairments in Authentication . In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). 151--168. Bryan Dosono, Jordan Hayes, and Yang Wang. 2015. ?I'm Stuck!\": A Contextual Inquiry of People with Visual Impairments in Authentication. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). 151--168."},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415226"},{"key":"e_1_2_2_30_1","volume-title":"Getting personal: Reflexivity, positionality, and feminist research. The professional geographer","author":"England Kim VL","year":"1994","unstructured":"Kim VL England . 1994. Getting personal: Reflexivity, positionality, and feminist research. The professional geographer , Vol. 46 , 1 ( 1994 ), 80--89. Kim VL England. 1994. Getting personal: Reflexivity, positionality, and feminist research. The professional geographer , Vol. 46, 1 (1994), 80--89."},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2648.2003.02671.x"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12180"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359328"},{"key":"e_1_2_2_34_1","unstructured":"National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. 1979. The Belmont Report. (1979).  National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. 1979. The Belmont Report. (1979)."},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998273"},{"key":"e_1_2_2_36_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"3","author":"Freed Diana","year":"2019","unstructured":"Diana Freed , Sam Havron , Emily Tseng , Andrea Gallardo , Rahul Chatterjee , Thomas Ristenpart , and Nicola Dell . 2019 . \u201c Is my phone hacked? \u201d Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence. Proceedings of the ACM on Human-Computer Interaction , Vol. 3 , CSCW (2019), 1--24. Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, and Nicola Dell. 2019. \u201cIs my phone hacked?\u201d Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1--24."},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134681"},{"key":"e_1_2_2_39_1","first-page":"20","article-title":"Not the normal trans story: negotiating trans narratives while crowdfunding at the margins","volume":"12","author":"Fritz Niki","year":"2018","unstructured":"Niki Fritz and Amy Gonzales . 2018 . Not the normal trans story: negotiating trans narratives while crowdfunding at the margins . International Journal of Communication , Vol. 12 (2018), 20 . Niki Fritz and Amy Gonzales. 2018. Not the normal trans story: negotiating trans narratives while crowdfunding at the margins. International Journal of Communication , Vol. 12 (2018), 20.","journal-title":"International Journal of Communication"},{"key":"e_1_2_2_40_1","volume-title":"International journal of communication","author":"Fullenwieder Lara","year":"2018","unstructured":"Lara Fullenwieder and Adam Molnar . 2018. Settler governance and privacy: Canada's Indian Residential School Settlement Agreement and the mediation of state-based violence . International journal of communication , Vol. 12 ( 2018 ), 1332--1349. Lara Fullenwieder and Adam Molnar. 2018. Settler governance and privacy: Canada's Indian Residential School Settlement Agreement and the mediation of state-based violence. International journal of communication , Vol. 12 (2018), 1332--1349."},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444815614053"},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025647"},{"key":"e_1_2_2_43_1","unstructured":"Government of India. 2016. The Rights of Persons with Disabilities Act. newlinehttps:\/\/legislative.gov.in\/sites\/default\/files\/A2016--49_1.pdf.  Government of India. 2016. The Rights of Persons with Disabilities Act. newlinehttps:\/\/legislative.gov.in\/sites\/default\/files\/A2016--49_1.pdf."},{"key":"e_1_2_2_44_1","volume-title":"Privacy and disclosure of HIV in interpersonal relationships: A sourcebook for researchers and practitioners","author":"Greene Kathryn","unstructured":"Kathryn Greene , Valerian J Derlega , Gust A Yep , and Sandra Petronio . 2003. Privacy and disclosure of HIV in interpersonal relationships: A sourcebook for researchers and practitioners . Routledge . Kathryn Greene, Valerian J Derlega, Gust A Yep, and Sandra Petronio. 2003. Privacy and disclosure of HIV in interpersonal relationships: A sourcebook for researchers and practitioners. Routledge."},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173688"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702270"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415195"},{"key":"e_1_2_2_48_1","volume-title":"Marginalization: A guiding concept for valuing diversity in nursing knowledge development. Advances in nursing science","author":"Hall Joanne M","year":"1994","unstructured":"Joanne M Hall , Patricia E Stevens , and Afaf Ibrahim Meleis . 1994 . Marginalization: A guiding concept for valuing diversity in nursing knowledge development. Advances in nursing science (1994). Joanne M Hall, Patricia E Stevens, and Afaf Ibrahim Meleis. 1994. Marginalization: A guiding concept for valuing diversity in nursing knowledge development. Advances in nursing science (1994)."},{"key":"e_1_2_2_49_1","first-page":"21","article-title":"Technology in rural Appalachia: Cultural strategies of resistance and navigation","volume":"12","author":"Hamby Sherry","year":"2018","unstructured":"Sherry Hamby , Elizabeth Taylor , Alli Smith , Kimberly Mitchell , and Lisa Jones . 2018 . Technology in rural Appalachia: Cultural strategies of resistance and navigation . International Journal of Communication , Vol. 12 (2018), 21 . Sherry Hamby, Elizabeth Taylor, Alli Smith, Kimberly Mitchell, and Lisa Jones. 2018. Technology in rural Appalachia: Cultural strategies of resistance and navigation. International Journal of Communication , Vol. 12 (2018), 21.","journal-title":"International Journal of Communication"},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173582"},{"key":"e_1_2_2_51_1","volume-title":"28th USENIX Security Symposium. 105--122","author":"Havron Sam","year":"2019","unstructured":"Sam Havron , Diana Freed , Rahul Chatterjee , Damon McCoy , Nicola Dell , and Thomas Ristenpart . 2019 . Clinical computer security for victims of intimate partner violence . In 28th USENIX Security Symposium. 105--122 . Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2019. Clinical computer security for victims of intimate partner violence. In 28th USENIX Security Symposium. 105--122."},{"key":"e_1_2_2_52_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS","author":"Hayes Jordan","year":"2019","unstructured":"Jordan Hayes , Smirity Kaushik , Charlotte Emily Price , and Yang Wang . 2019 . Cooperative privacy and security: Learning from people with visual impairments and their allies . In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). Jordan Hayes, Smirity Kaushik, Charlotte Emily Price, and Yang Wang. 2019. Cooperative privacy and security: Learning from people with visual impairments and their allies. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)."},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980950"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145300"},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376363"},{"key":"e_1_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274340"},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998238"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359230"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376758"},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415198"},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650219851424"},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322355"},{"key":"e_1_2_2_63_1","volume-title":"Protocol for Responding to Participant Distress. Adapted Version for Telephone\/Skype","author":"Kasket Elaine","year":"2009","unstructured":"Elaine Kasket . 2009. Protocol for Responding to Participant Distress. Adapted Version for Telephone\/Skype ( 2009 ). Elaine Kasket. 2009. Protocol for Responding to Participant Distress. Adapted Version for Telephone\/Skype (2009)."},{"key":"e_1_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376840"},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1177\/014107680309600304"},{"key":"e_1_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1525\/jer.2007.2.4.61"},{"key":"e_1_2_2_67_1","volume-title":"Nicholas Proferes, and Jennifer Romano.","author":"Knijnenburg Bart P","year":"2022","unstructured":"Bart P Knijnenburg , Xinru Page , Pamela Wisniewski , Heather Richter Lipford , Nicholas Proferes, and Jennifer Romano. 2022 . Modern Socio-Technical Perspectives on Privacy . Bart P Knijnenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas Proferes, and Jennifer Romano. 2022. Modern Socio-Technical Perspectives on Privacy."},{"key":"e_1_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322366"},{"key":"e_1_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376339"},{"key":"e_1_2_2_70_1","first-page":"22","article-title":"Concerns, Skills, and Activities: Multilayered Privacy Issues in Disadvantaged Urban Communities","volume":"12","author":"Li Xiaoqian","year":"2018","unstructured":"Xiaoqian Li , Wenhong Chen , and Joseph D Straubhaar . 2018 . Concerns, Skills, and Activities: Multilayered Privacy Issues in Disadvantaged Urban Communities . International Journal of Communication , Vol. 12 (2018), 22 . Xiaoqian Li, Wenhong Chen, and Joseph D Straubhaar. 2018. Concerns, Skills, and Activities: Multilayered Privacy Issues in Disadvantaged Urban Communities. International Journal of Communication , Vol. 12 (2018), 22.","journal-title":"International Journal of Communication"},{"key":"e_1_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3443686"},{"key":"e_1_2_2_72_1","volume-title":"Jaspaljeet Singh Dhillon, and S Mohd Drus","author":"Mahfuth Amjad","year":"2016","unstructured":"Amjad Mahfuth , Jaspaljeet Singh Dhillon, and S Mohd Drus . 2016 . A systematic review on data security and patient privacy issues in electronic medical records. (2016). Amjad Mahfuth, Jaspaljeet Singh Dhillon, and S Mohd Drus. 2016. A systematic review on data security and patient privacy issues in electronic medical records. (2016)."},{"key":"e_1_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820924632"},{"key":"e_1_2_2_74_1","volume-title":"nobody gets mad\": Social media, privacy, and personal responsibility among low-SES youth","author":"Marwick Alice","year":"2017","unstructured":"Alice Marwick , Claire Fontaine , and Danah Boyd . 2017. ? Nobody sees it , nobody gets mad\": Social media, privacy, and personal responsibility among low-SES youth . Social Media Society , Vol . 3, 2 ( 2017 ). Alice Marwick, Claire Fontaine, and Danah Boyd. 2017. ?Nobody sees it, nobody gets mad\": Social media, privacy, and personal responsibility among low-SES youth. Social Media Society, Vol. 3, 2 (2017)."},{"key":"e_1_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025875"},{"key":"e_1_2_2_76_1","volume-title":"Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1--8.","author":"McDonald Nora","year":"2020","unstructured":"Nora McDonald , Karla Badillo-Urquiola , Morgan G Ames , Nicola Dell , Elizabeth Keneski , Manya Sleeper , and Pamela J Wisniewski . 2020 . Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1--8. Nora McDonald, Karla Badillo-Urquiola, Morgan G Ames, Nicola Dell, Elizabeth Keneski, Manya Sleeper, and Pamela J Wisniewski. 2020. Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1--8."},{"key":"e_1_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376167"},{"key":"e_1_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415235"},{"key":"e_1_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300573"},{"key":"e_1_2_2_81_1","volume-title":"Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. PLoS medicine","author":"Moher David","year":"2009","unstructured":"David Moher , Alessandro Liberati , Jennifer Tetzlaff , Douglas G Altman , and Prisma Group . 2009. Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. PLoS medicine , Vol. 6 , 7 ( 2009 ), e1000097. David Moher, Alessandro Liberati, Jennifer Tetzlaff, Douglas G Altman, and Prisma Group. 2009. Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. PLoS medicine, Vol. 6, 7 (2009), e1000097."},{"key":"e_1_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880071.1880082"},{"key":"e_1_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702481"},{"key":"e_1_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415217"},{"key":"e_1_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7841037"},{"key":"e_1_2_2_86_1","unstructured":"The United States Department of Justice. 2021. Fair Housing Act. https:\/\/www.justice.gov\/crt\/fair-housing-act-2  The United States Department of Justice. 2021. Fair Housing Act. https:\/\/www.justice.gov\/crt\/fair-housing-act-2"},{"key":"e_1_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376392"},{"key":"e_1_2_2_88_1","volume-title":"Research methods for social justice and equity in education","author":"Parson Laura","unstructured":"Laura Parson . 2019. Considering positionality: the ethics of conducting research with marginalized groups . In Research methods for social justice and equity in education . Springer , 15--32. Laura Parson. 2019. Considering positionality: the ethics of conducting research with marginalized groups. In Research methods for social justice and equity in education. Springer, 15--32."},{"key":"e_1_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445734"},{"key":"e_1_2_2_90_1","first-page":"22","article-title":"Socially mediated visibility: Friendship and dissent in authoritarian Azerbaijan","volume":"12","author":"Pearce Katy E","year":"2018","unstructured":"Katy E Pearce , Jessica Vitak , and Kristen Barta . 2018 . Socially mediated visibility: Friendship and dissent in authoritarian Azerbaijan . International Journal of Communication , Vol. 12 (2018), 22 . Katy E Pearce, Jessica Vitak, and Kristen Barta. 2018. Socially mediated visibility: Friendship and dissent in authoritarian Azerbaijan. International Journal of Communication , Vol. 12 (2018), 22.","journal-title":"International Journal of Communication"},{"key":"e_1_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376573"},{"key":"e_1_2_2_92_1","first-page":"18","article-title":"Communication privacy management and digital evidence in an intimate partner violence case","volume":"13","author":"Ramirez Fanny A","year":"2019","unstructured":"Fanny A Ramirez and Jeffrey Lane . 2019 . Communication privacy management and digital evidence in an intimate partner violence case . International Journal of Communication , Vol. 13 (2019), 18 . Fanny A Ramirez and Jeffrey Lane. 2019. Communication privacy management and digital evidence in an intimate partner violence case. International Journal of Communication , Vol. 13 (2019), 18.","journal-title":"International Journal of Communication"},{"key":"e_1_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3363033"},{"key":"e_1_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025673"},{"key":"e_1_2_2_95_1","volume-title":"29th USENIX Security Symposium. 1949--1966","author":"Reichel Jake","year":"2020","unstructured":"Jake Reichel , Fleming Peck , Mikako Inaba , Bisrat Moges , Brahmnoor Singh Chawla , and Marshini Chetty . 2020 . ' I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and Whatsapp . In 29th USENIX Security Symposium. 1949--1966 . Jake Reichel, Fleming Peck, Mikako Inaba, Bisrat Moges, Brahmnoor Singh Chawla, and Marshini Chetty. 2020. 'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and Whatsapp. In 29th USENIX Security Symposium. 1949--1966."},{"key":"e_1_2_2_96_1","first-page":"4757","article-title":"Race, Class, and Privacy: A Critical Historical Review","volume":"11","author":"Reichel Matt","year":"2017","unstructured":"Matt Reichel . 2017 . Race, Class, and Privacy: A Critical Historical Review . International Journal of Communication , Vol. 11 (2017), 4757 -- 4768 . Matt Reichel. 2017. Race, Class, and Privacy: A Critical Historical Review. International Journal of Communication , Vol. 11 (2017), 4757--4768.","journal-title":"International Journal of Communication"},{"key":"e_1_2_2_97_1","first-page":"19","article-title":"Privacy at the margins| privacy versus relatedness: managing device use in Australia's remote aboriginal communities","volume":"12","author":"Rennie Ellie","year":"2018","unstructured":"Ellie Rennie , Tyson Yunkaporta , and Indigo Holcombe-James . 2018 . Privacy at the margins| privacy versus relatedness: managing device use in Australia's remote aboriginal communities . International Journal of Communication , Vol. 12 (2018), 19 . Ellie Rennie, Tyson Yunkaporta, and Indigo Holcombe-James. 2018. Privacy at the margins| privacy versus relatedness: managing device use in Australia's remote aboriginal communities. International Journal of Communication , Vol. 12 (2018), 19.","journal-title":"International Journal of Communication"},{"key":"e_1_2_2_98_1","doi-asserted-by":"publisher","DOI":"10.1177\/183335831504400304"},{"key":"e_1_2_2_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300232"},{"key":"e_1_2_2_100_1","volume-title":"Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security (SOUPS","author":"Sambasivan Nithya","year":"2018","unstructured":"Nithya Sambasivan , Garen Checkley , Amna Batool , Nova Ahmed , David Nemer , Laura Sanely Gayt\u00e1n-Lugo , Tara Matthews , Sunny Consolvo , and Elizabeth Churchill . 2018 . \u201c Privacy is not for me, it's for those rich women\u201d: Performative Privacy Practices on Mobile Phones by Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). 127--142. Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gayt\u00e1n-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. 2018. \u201cPrivacy is not for me, it's for those rich women\u201d: Performative Privacy Practices on Mobile Phones by Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). 127--142."},{"key":"e_1_2_2_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978980"},{"key":"e_1_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173626"},{"key":"e_1_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300512"},{"key":"e_1_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300583"},{"key":"e_1_2_2_105_1","volume-title":"Returning to the digital world: Digital technology use and privacy management of women transitioning from incarceration","author":"Seo Hyunjin","year":"2020","unstructured":"Hyunjin Seo , Hannah Britton , Megha Ramaswamy , Darcey Altschwager , Mathew Blomberg , Shola Aromona , Bernard Schuster , Ellie Booton , Marilyn Ault , and Joi Wickliffe . 2020. Returning to the digital world: Digital technology use and privacy management of women transitioning from incarceration . New Media & Society ( 2020 ). Hyunjin Seo, Hannah Britton, Megha Ramaswamy, Darcey Altschwager, Mathew Blomberg, Shola Aromona, Bernard Schuster, Ellie Booton, Marilyn Ault, and Joi Wickliffe. 2020. Returning to the digital world: Digital technology use and privacy management of women transitioning from incarceration. New Media & Society (2020)."},{"key":"e_1_2_2_106_1","doi-asserted-by":"publisher","DOI":"10.1177\/1468794119841839"},{"key":"e_1_2_2_107_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00023"},{"key":"e_1_2_2_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300319"},{"key":"e_1_2_2_109_1","first-page":"20","article-title":"The poverty of privacy: Understanding privacy trade-offs from identity infrastructure users in India","volume":"12","author":"Srinivasan Janaki","year":"2018","unstructured":"Janaki Srinivasan , Savita Bailur , Emrys Schoemaker , and Sarita Seshagiri . 2018 . The poverty of privacy: Understanding privacy trade-offs from identity infrastructure users in India . International Journal of Communication , Vol. 12 (2018), 20 . Janaki Srinivasan, Savita Bailur, Emrys Schoemaker, and Sarita Seshagiri. 2018. The poverty of privacy: Understanding privacy trade-offs from identity infrastructure users in India. International Journal of Communication , Vol. 12 (2018), 20.","journal-title":"International Journal of Communication"},{"key":"e_1_2_2_110_1","volume-title":"Proceedings of the ACM on human-computer interaction","volume":"2","author":"Vitak Jessica","year":"2018","unstructured":"Jessica Vitak , Yuting Liao , Mega Subramaniam , and Priya Kumar . 2018 . ' I Knew It Was Too Good to Be True\" The Challenges Economically Disadvantaged Internet Users Face in Assessing Trustworthiness, Avoiding Scams, and Developing Self-Efficacy Online . Proceedings of the ACM on human-computer interaction , Vol. 2 , CSCW (2018), 1--25. Jessica Vitak, Yuting Liao, Mega Subramaniam, and Priya Kumar. 2018. 'I Knew It Was Too Good to Be True\" The Challenges Economically Disadvantaged Internet Users Face in Assessing Trustworthiness, Avoiding Scams, and Developing Self-Efficacy Online. Proceedings of the ACM on human-computer interaction, Vol. 2, CSCW (2018), 1--25."},{"key":"e_1_2_2_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3358904"},{"key":"e_1_2_2_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557307"},{"key":"e_1_2_2_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300254"},{"key":"e_1_2_2_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/3171533.3171538"},{"key":"e_1_2_2_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111237"},{"key":"e_1_2_2_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274450"},{"key":"e_1_2_2_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376150"},{"key":"e_1_2_2_118_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0063"},{"key":"e_1_2_2_119_1","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin Alan F","year":"1968","unstructured":"Alan F Westin . 1968 . Privacy and freedom . Washington and Lee Law Review , Vol. 25 , 1 (1968), 166 . Alan F Westin. 1968. Privacy and freedom. Washington and Lee Law Review , Vol. 25, 1 (1968), 166.","journal-title":"Washington and Lee Law Review"},{"key":"e_1_2_2_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300492"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555556","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555556","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:02Z","timestamp":1750182542000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555556"}},"subtitle":["What We Know, What's Needed, and What's Next"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":120,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2022,11,7]]}},"alternative-id":["10.1145\/3555556"],"URL":"https:\/\/doi.org\/10.1145\/3555556","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}