{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:32:11Z","timestamp":1776115931571,"version":"3.50.1"},"reference-count":226,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:00:00Z","timestamp":1746144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The Max Planck Society and the Deutsche Forschungsgemeinschaft","award":["EXC 2092 CASA ? 390781972"],"award-info":[{"award-number":["EXC 2092 CASA ? 390781972"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,5,2]]},"abstract":"<jats:p>HCI and CSCW research has witnessed increasing efforts to address diversity and inclusion in research and design practice, as evidenced by the growing body of research with populations deemed as vulnerable, marginalized, or underserved. However, this work has been largely limited to a population-specific approach, i.e., identifying certain populations as vulnerable and gathering their individual experiences. Drawing primarily from human-centered security and privacy research, we identify three key challenges faced by this population-specific approach: (1) It is limited in addressing user diversity within the target population; (2) It may fail to capture the complex social reality of vulnerability; and (3) It runs the risk of perpetuating othering and stereotypes. To address these limitations, we propose a socio-ecological perspective on vulnerability adapted from the Ecological System Theory (EST). We argue that a socio-ecological perspective of vulnerability can guide researchers to look beyond static and stigmatizing definitions of vulnerability --- instead, focus on the situations, relations, and structures that lead to vulnerability, eventually enabling transferable knowledge of vulnerability across populations. We demonstrate how the socio-ecological lens maps onto existing work and generates new insights in the case of older adults' security and privacy, as well as its potential for being applied to other contexts such as reproductive privacy and responsible artificial intelligence. We end by providing concrete recommendations on how HCI and CSCW research can better operationalize vulnerability in scholarship and design practice.<\/jats:p>","DOI":"10.1145\/3710935","type":"journal-article","created":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T11:36:19Z","timestamp":1747740979000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Beyond \"Vulnerable Populations\": A Unified Understanding of Vulnerability From A Socio-Ecological Perspective"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6426-1363","authenticated-orcid":false,"given":"Xinru","family":"Tang","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2361-350X","authenticated-orcid":false,"given":"Gabriel","family":"Lima","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Security and Privacy, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7342-0629","authenticated-orcid":false,"suffix":"Jiang","given":"Li","family":"Jiang","sequence":"additional","affiliation":[{"name":"George Washington University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2191-1332","authenticated-orcid":false,"given":"Lucy","family":"Simko","sequence":"additional","affiliation":[{"name":"Barnard College, New York City, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9088-705X","authenticated-orcid":false,"given":"Yixin","family":"Zou","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Security and Privacy, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,5,2]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"CHI 2024. Retrieved August 2023. Accessibility and Aging. https:\/\/chi2024.acm.org\/subcommittees\/selecting-a-subcommittee\/."},{"key":"e_1_2_1_2_1","volume-title":"Privacy and human behavior in the age of information. Science 347, 6221","author":"Acquisti Alessandro","year":"2015","unstructured":"Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509--514."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_2_1_4_1","volume-title":"Meaningful collaborations can end 'helicopter research'. Nature 10","author":"Adame Fernanda","year":"2021","unstructured":"Fernanda Adame. 2021. Meaningful collaborations can end 'helicopter research'. Nature 10 (2021)."},{"key":"e_1_2_1_5_1","unstructured":"The UN Refugee Agency. Retrieved October 2023. UNHCR-IDC Vulnerability Screening Tool - Identifying and addressing vulnerability: a tool for asylum and migration systems. https:\/\/www.unhcr.org\/media\/unhcr-idc-vulnerability-screening-tool-identifying-and-addressing-vulnerability-tool-asylum."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0036"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2011.02.006"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533226"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.2022.1651"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Theo Araujo Natali Helberger Sanne Kruikemeier and Claes H De Vreese. 2020. In AI we trust? Perceptions about automated decision-making by artifcial intelligence. AI & society 35 3 (2020) 611--623.","DOI":"10.1007\/s00146-019-00931-w"},{"key":"e_1_2_1_11_1","volume-title":"Using an ecological systems approach to target technology. Autism Imaging and Devices 419","author":"Arriaga Rosa I","year":"2017","unstructured":"Rosa I Arriaga. 2017. Using an ecological systems approach to target technology. Autism Imaging and Devices 419 (2017)."},{"key":"e_1_2_1_12_1","unstructured":"World Medical Association. Retrieved October 2023. WMA DECLARATION OF HELSINKI -- ETHICAL PRINCIPLES FOR MEDICAL RESEARCH INVOLVING HUMAN SUBJECTS. https:\/\/www.wma.net\/policies-post\/wma-declaration-of-helsinki-ethical-principles-for-medical-research-involving-human-subjects\/."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372859"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3519032"},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Jefery Bardzell. Retrieved August 2023. A Dark Pattern in Humanistic HCI. https:\/\/interactionculture.net\/2016\/02\/03\/a-dark-pattern-in-humanistic-hci\/.","DOI":"10.1007\/978-3-031-02214-2"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753521"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445128"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579533"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00071"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1353\/wsq.2018.0003"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579545"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533083"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the 2022 ACM Conference on Fairness, Accountability, and Transparency. 948--958","author":"Birhane Abeba","unstructured":"Abeba Birhane, Elayne Ruane, Thomas Laurent, Matthew S. Brown, Johnathan Flowers, Anthony Ventresque, and Christopher L. Dancy. 2022. The forgotten margins of AI ethics. In Proceedings of the 2022 ACM Conference on Fairness, Accountability, and Transparency. 948--958."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858342"},{"key":"e_1_2_1_25_1","volume-title":"Privacy challenges and research opportunities for genomic data sharing. Nature genetics 52, 7","author":"Bonomi Luca","year":"2020","unstructured":"Luca Bonomi, Yingxiang Huang, and Lucila Ohno-Machado. 2020. Privacy challenges and research opportunities for genomic data sharing. Nature genetics 52, 7 (2020), 646--654."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858379"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594005"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139354"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1037\/10518-046"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557059"},{"key":"e_1_2_1_31_1","volume-title":"Christine Sheppard, Rebecca Zhao, Karl Pillemer, and Mark S Lachs.","author":"Burnes David","year":"2017","unstructured":"David Burnes, Charles R Henderson Jr, Christine Sheppard, Rebecca Zhao, Karl Pillemer, and Mark S Lachs. 2017. Prevalence of financial fraud and scams among older adults in the United States: A systematic review and meta-analysis. American journal of public health 107, 8 (2017), e13--e21."},{"key":"e_1_2_1_32_1","first-page":"591","article-title":"Privacy, vulnerability, and afordance","volume":"66","author":"Calo Ryan","year":"2016","unstructured":"Ryan Calo. 2016. Privacy, vulnerability, and afordance. DePaul L. Rev. 66 (2016), 591.","journal-title":"DePaul L. Rev."},{"key":"e_1_2_1_33_1","unstructured":"Katie Canales. Retrieved January 2024. Mark Zuckerberg said he's 'retooling' Facebook toward young adults and away from older users. https:\/\/www.businessinsider.com\/mark-zuckerberg-facebook-retooling-young-adults-2021--10."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642042"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311957.3358609"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517475"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445359"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1748-720X.2009.00346.x"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819960"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445189"},{"key":"e_1_2_1_41_1","volume-title":"On intersectionality: Essential writings","author":"Crenshaw Kimberl\u00e9 W","unstructured":"Kimberl\u00e9 W Crenshaw. 2017. On intersectionality: Essential writings. The New Press."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00055"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594000"},{"key":"e_1_2_1_44_1","volume-title":"Constructing normalcy. The disability studies reader 3","author":"Davis Lennard J","year":"2010","unstructured":"Lennard J Davis. 2010. Constructing normalcy. The disability studies reader 3 (2010), 3--19."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3617694.3623261"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858081"},{"key":"e_1_2_1_47_1","volume-title":"Revisiting the concept of 'vulnerability'. Social science & medicine 50, 11","author":"Delor Fran\u00e7ois","year":"2000","unstructured":"Fran\u00e7ois Delor and Michel Hubert. 2000. Revisiting the concept of 'vulnerability'. Social science & medicine 50, 11 (2000), 1557--1570."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517441"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311957.3361857"},{"key":"e_1_2_1_50_1","unstructured":"Cambridge Dictionary. Retrieved October 2023. vulnerability. https:\/\/dictionary.cambridge.org\/us\/dictionary\/english\/vulnerability."},{"key":"e_1_2_1_51_1","volume-title":"Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. 409--413","author":"Dillahunt Tawanna R","year":"2017","unstructured":"Tawanna R Dillahunt, Sheena Erete, Roxana Galusca, Aarti Israni, Denise Nacu, and Phoebe Sengers. 2017. Refections on design methods for underserved communities. In Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. 409--413."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901861"},{"key":"e_1_2_1_53_1","volume-title":"Ways of Knowing in HCI","author":"Dourish Paul","unstructured":"Paul Dourish. 2014. Reading and interpreting ethnography. In Ways of Knowing in HCI. Springer, 1--23."},{"key":"e_1_2_1_54_1","volume-title":"The consumer benchmarks in the unfair commercial practices directive","author":"Duivenvoorde Bram B","unstructured":"Bram B Duivenvoorde. 2015. The consumer benchmarks in the unfair commercial practices directive. Vol. 5. Springer."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1093\/jjco\/hyac034"},{"key":"e_1_2_1_56_1","unstructured":"United Nations Economic and Social Commission for Western Asia. Retrieved October 2023. vulnerable groups. https:\/\/archive.unescwa.org\/vulnerable-groups."},{"key":"e_1_2_1_57_1","volume-title":"Cella Monet Sum, and Stacy M Branham","author":"Edwards Emory James","year":"2020","unstructured":"Emory James Edwards, Cella Monet Sum, and Stacy M Branham. 2020. Three tensions between personas and complex disability identities. In Extended abstracts of the 2020 CHI conference on human factors in computing systems. 1--9."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533186"},{"key":"e_1_2_1_59_1","volume-title":"Conference on fairness, accountability and transparency. PMLR, 35--47","author":"Ekstrand Michael D","year":"2018","unstructured":"Michael D Ekstrand, Rezvan Joshaghani, and Hoda Mehrpouyan. 2018. Privacy for all: Ensuring fair and equitable privacy protections. In Conference on fairness, accountability and transparency. PMLR, 35--47."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1017\/can.2021.24"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3663548.3675622"},{"key":"e_1_2_1_62_1","volume-title":"The vulnerable subject and the responsive state. EmoRy lJ 60","author":"Fineman Martha Albertson","year":"2010","unstructured":"Martha Albertson Fineman. 2010. The vulnerable subject and the responsive state. EmoRy lJ 60 (2010), 251."},{"key":"e_1_2_1_63_1","volume-title":"Applied longitudinal analysis","author":"Fitzmaurice Garrett M","unstructured":"Garrett M Fitzmaurice, Nan M Laird, and James H Ware. 2012. Applied longitudinal analysis. John Wiley & Sons."},{"key":"e_1_2_1_64_1","unstructured":"The Organisation for Economic Co-operation and Development. Retrieved October 2023. Consumer vulnerability in the digital age. https:\/\/www.oecd.org\/publications\/consumer-vulnerability-in-the-digital-age-4d013cc5-en.htm."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134681"},{"key":"e_1_2_1_67_1","volume-title":"Fifteenth symposium on usable privacy and security (SOUPS","author":"Frik Alisa","year":"2019","unstructured":"Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and security threat models and mitigation strategies of older adults. In Fifteenth symposium on usable privacy and security (SOUPS 2019). 21--40."},{"key":"e_1_2_1_68_1","volume-title":"Usable security: History, themes, and challenges","author":"Garfnkel Simson","unstructured":"Simson Garfnkel and Heather Richter Lipford. 2014. Usable security: History, themes, and challenges. Morgan & Claypool Publishers."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274325"},{"key":"e_1_2_1_70_1","unstructured":"GDPR. Retrieved October 2023. Recital 75: Risks to the Rights and Freedoms of Natural Persons. https:\/\/gdpr-info.eu\/recitals\/no-75\/."},{"key":"e_1_2_1_71_1","volume-title":"Should You Really Delete Your Period Tracking App? Retrieved","author":"Gebhart Gennie","year":"2024","unstructured":"Gennie Gebhart and Dale Barnett. 2022. Should You Really Delete Your Period Tracking App? Retrieved July 4, 2024 from https:\/\/www.ef.org\/deeplinks\/2022\/06\/should-you-really-delete-your-period-tracking-app"},{"key":"e_1_2_1_72_1","volume-title":"The TESCREAL bundle: Eugenics and the promise of utopia through artifical general intelligence. First Monday","author":"Gebru Timnit","year":"2024","unstructured":"Timnit Gebru and \u00c9mile P Torres. 2024. The TESCREAL bundle: Eugenics and the promise of utopia through artifical general intelligence. First Monday (2024)."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/s44163-022-00043-3"},{"key":"e_1_2_1_74_1","volume-title":"Challenges for taxonomy. Nature 417, 6884","author":"Godfray H Charles J","year":"2002","unstructured":"H Charles J Godfray. 2002. Challenges for taxonomy. Nature 417, 6884 (2002), 17--19."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.31486\/toj.19.0079"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10691-019-09404-3"},{"key":"e_1_2_1_77_1","unstructured":"UK Government. Retrieved October 2023. Syrian Vulnerable Persons Resettlement Scheme (VPRS) Guidance for local authorities and partners. https:\/\/assets.publishing.service.gov.uk\/media\/5a8209abe5274a2e87dc0d21\/170711_Syrian_Resettlement_Updated_Fact_Sheet_fnal.pdf."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551624.3555306"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134685"},{"key":"e_1_2_1_80_1","volume-title":"Proceedings of the 19th ACM conference on computer-supported cooperative work & social computing. 1402--1411","author":"Gutierrez Francisco J","year":"2016","unstructured":"Francisco J Gutierrez and Sergio F Ochoa. 2016. Mom, I do have a family! Attitudes, agreements, and expectations on the interaction with Chilean older adults. In Proceedings of the 19th ACM conference on computer-supported cooperative work & social computing. 1402--1411."},{"key":"e_1_2_1_81_1","volume-title":"Older adults' experiences with using technology for socialization during the COVID-19 pandemic: Cross-sectional survey study. JMIR aging 4, 2","author":"Haase Kristen R","year":"2021","unstructured":"Kristen R Haase, Theodore Cosco, Lucy Kervin, Indira Riadi, and Megan E O'Connell. 2021. Older adults' experiences with using technology for socialization during the COVID-19 pandemic: Cross-sectional survey study. JMIR aging 4, 2 (2021), e28010."},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-018-0617-5"},{"key":"e_1_2_1_83_1","volume-title":"USENIX Security Symposium (SSYM '24)","author":"Hasegawa Ayako A","year":"2024","unstructured":"Ayako A Hasegawa, Daisuke Inoue, and Mitsuaki Akiyama. 2024. How WEIRD is Usable Privacy and Security Research?. In USENIX Security Symposium (SSYM '24). USENIX, Philadelphia, Pennsylvania, USA."},{"key":"e_1_2_1_84_1","volume-title":"A qualitative study exploring factors preventing older adults from reporting cybercrime and seeking help. CrimRxiv","author":"Havers Benjamin","year":"2024","unstructured":"Benjamin Havers, Kartikeya Tripathi, Alexandra Burton, Wendy Martin, and Claudia Cooper. 2024. A qualitative study exploring factors preventing older adults from reporting cybercrime and seeking help. CrimRxiv (2024)."},{"key":"e_1_2_1_85_1","volume-title":"Ways of Knowing in HCI","author":"Hayes Gillian R","unstructured":"Gillian R Hayes. 2014. Knowing by doing: action research as an approach to HCI. In Ways of Knowing in HCI. Springer, 49--68."},{"key":"e_1_2_1_86_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS","author":"Hayes Jordan","year":"2019","unstructured":"Jordan Hayes, Smirity Kaushik, Charlotte Emily Price, and Yang Wang. 2019. Cooperative privacy and security: Learning from people with visual impairments and their allies. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 1--20."},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579493"},{"key":"e_1_2_1_88_1","volume-title":"IEEE Symposium on Security and Privacy. IEEE","author":"Herbert Franziska","year":"2024","unstructured":"Franziska Herbert, Stefen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Yasemin Acar, Markus D\u00fcrmuth, Yixin Zou, and M Angela Sasse. 2024. Digital Security\u2014A Question of Perspective. A Large-Scale Telephone Survey with Four At-Risk User Groups. In IEEE Symposium on Security and Privacy. IEEE, New York, NY, USA. 1--20."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300830"},{"key":"e_1_2_1_90_1","volume-title":"James Nicholson, Vasilis Vlachokyriakos, and Abigail C Durrant.","author":"Holt Jack","year":"2024","unstructured":"Jack Holt, Jan David Smeddinck, James Nicholson, Vasilis Vlachokyriakos, and Abigail C Durrant. 2024. Post-mortem information management: exploring contextual factors in appropriate personal data access after death. Human--Computer Interaction (2024), 1--36."},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603718"},{"key":"e_1_2_1_92_1","unstructured":"Jason I Hong. Retrieved August 2023. Why is Privacy So Hard? https:\/\/cacm.acm.org\/blogs\/blog-cacm\/235401-why-is-privacy-so-hard\/fulltext."},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3571884.3597439"},{"key":"e_1_2_1_94_1","unstructured":"Carrie Hough. Retrieved October 2023. The UK Government's Approach to Evaluating the Vulnerable Persons and Vulnerable Children's Resettlement Schemes. https:\/\/assets.publishing.service.gov.uk\/media\/5f62301ce90e072bc2c791e6\/uk-approach-evaluating-vulnerable-resettlement-schemes-horr106.pdf."},{"key":"e_1_2_1_95_1","doi-asserted-by":"crossref","unstructured":"Zaidat Ibrahim Pallavi Panchpor Novia Nurain and James Clawson. 2024. ''Islamically I am no longer on my period'': A Study of Menstrual Tracking in Muslim Women in the US. (2024).","DOI":"10.1145\/3613904.3642006"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445778"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.3138\/utq.90.2.05"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460112.3471961"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555182"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600211.3604699"},{"key":"e_1_2_1_101_1","volume-title":"Vulnerable Consumers and the Law","author":"Kaprou Eleni","unstructured":"Eleni Kaprou. 2020. The legal defnition of 'vulnerable'consumers in the UCPD: Benefts and limitations of a focus on personal attributes. In Vulnerable Consumers and the Law. Routledge, 51--67."},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3514094.3534188"},{"key":"e_1_2_1_103_1","volume-title":"Nebraska cops used Facebook messages to investigate an alleged illegal abortion. Retrieved","author":"Kaste Martin","year":"2024","unstructured":"Martin Kaste. 2022. Nebraska cops used Facebook messages to investigate an alleged illegal abortion. Retrieved July 4, 2024 from https:\/\/www.npr.org\/2022\/08\/12\/1117092169\/nebraska-cops-used-facebook-messages-to-investigate-an-alleged-illegal-abortion"},{"key":"e_1_2_1_104_1","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS","author":"Kaushik Smirity","year":"2023","unstructured":"Smirity Kaushik, Nat\u00e3 M Barbosa, Yaman Yu, Tanusree Sharma, Zachary Kilhofer, JooYoung Seo, Sauvik Das, and Yang Wang. 2023. {GuardLens}: Supporting Safer Online Browsing for People with Visual Impairments. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). 361--380."},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392063.3394436"},{"key":"e_1_2_1_106_1","volume-title":"Vulnerability in research subjects: A bioethical taxonomy. Ethical and policy issues in research involving human participants 2","author":"Kipnis Kenneth","year":"2001","unstructured":"Kenneth Kipnis. 2001. Vulnerability in research subjects: A bioethical taxonomy. Ethical and policy issues in research involving human participants 2 (2001)."},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3593986"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196490"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/3179995"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/3431280"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533114"},{"key":"e_1_2_1_112_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 4, CSCW3","author":"Kropczynski Jess","year":"2021","unstructured":"Jess Kropczynski, Zaina Aljallad, Nathan Jefrey Elrod, Heather Lipford, and Pamela J Wisniewski. 2021. Towards building community collective efcacy for managing digital privacy and security within older adult communities. Proceedings of the ACM on Human-Computer Interaction 4, CSCW3 (2021), 1--27."},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300537"},{"key":"e_1_2_1_114_1","volume-title":"A Little Silly and Empty-Headed''--Older Adults' Understandings of Social Networking Sites. People and Computers XXIII Celebrating People and Technology","author":"Lehtinen Vilma","year":"2009","unstructured":"Vilma Lehtinen, Jaana N\u00e4s\u00e4nen, and Risto Sarvas. 2009. ''A Little Silly and Empty-Headed''--Older Adults' Understandings of Social Networking Sites. People and Computers XXIII Celebrating People and Technology (2009), 45--54."},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1080\/15265160490497083"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/3443686"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501824"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336141"},{"key":"e_1_2_1_119_1","volume-title":"Conceptualizing stigma. Annual review of Sociology 27, 1","author":"Link Bruce G","year":"2001","unstructured":"Bruce G Link and Jo C Phelan. 2001. Conceptualizing stigma. Annual review of Sociology 27, 1 (2001), 363--385."},{"key":"e_1_2_1_120_1","volume-title":"Beginning with Disability","author":"Linton Simi","unstructured":"Simi Linton. 2017. Reassigning meaning. In Beginning with Disability. Routledge, 20--27."},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445488"},{"key":"e_1_2_1_122_1","volume-title":"Elucidating the concept of vulnerability: Layers not labels. IJFAB: International Journal of Feminist Approaches to Bioethics 2, 1","author":"Luna Florencia","year":"2009","unstructured":"Florencia Luna. 2009. Elucidating the concept of vulnerability: Layers not labels. IJFAB: International Journal of Feminist Approaches to Bioethics 2, 1 (2009), 121--139."},{"key":"e_1_2_1_123_1","volume-title":"Identifying and evaluating layers of vulnerability--a way forward. developing world bioethics 19, 2","author":"Luna Florencia","year":"2019","unstructured":"Florencia Luna. 2019. Identifying and evaluating layers of vulnerability--a way forward. developing world bioethics 19, 2 (2019), 86--95."},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1111\/bioe.12035"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/3272973.3273003"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2021.121390"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642521"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445610"},{"key":"e_1_2_1_129_1","volume-title":"Crip Authorship","author":"Mauldin Laura","unstructured":"Laura Mauldin. 2023. On Trauma in Research on Illness, Disability, and Care. In Crip Authorship. New York University Press, 131--141."},{"key":"e_1_2_1_130_1","unstructured":"Allison McDonald. 2022. Advancing Digital Safety for High-Risk Communities. Ph. D. Dissertation."},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589960"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3375174"},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376167"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0064"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134711"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447526.3472047"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369821"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581183"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415235"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492853"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-020-00405-8"},{"key":"e_1_2_1_142_1","volume-title":"Technological change in the retirement transition and the implications for cybersecurity vulnerability in older adults. Frontiers in psychology 11","author":"Morrison Benjamin A","year":"2020","unstructured":"Benjamin A Morrison, Lynne Coventry, and Pam Briggs. 2020. Technological change in the retirement transition and the implications for cybersecurity vulnerability in older adults. Frontiers in psychology 11 (2020), 623."},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/3582515.3609565"},{"key":"e_1_2_1_144_1","volume-title":"Workshop on Inclusive Privacy and Security.","author":"Morrow Diane","year":"2023","unstructured":"Diane Morrow, Ryan Gibson, and Wendy Moncur. 2023. Understanding online harms and safety of vulnerable groups going through serious life transitions. In Workshop on Inclusive Privacy and Security."},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179410"},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274396"},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449212"},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445078"},{"key":"e_1_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1787\/4d013cc5-en"},{"key":"e_1_2_1_150_1","volume-title":"Nuremberg Code: Directives for Human Experimentation. https:\/\/ori.hhs.gov\/content\/chapter-3-The-Protection-of-Human-Subjects-nuremberg-code-directives-human-experimentation.","author":"U.S. Department of Health and Human Services. Retrieved November","year":"2023","unstructured":"U.S. Department of Health and Human Services. Retrieved November, 2023. Nuremberg Code: Directives for Human Experimentation. https:\/\/ori.hhs.gov\/content\/chapter-3-The-Protection-of-Human-Subjects-nuremberg-code-directives-human-experimentation."},{"key":"e_1_2_1_151_1","unstructured":"U.S. Department of Health and Human Services. Retrieved October 2023. Read the Belmont Report. https:\/\/www.sigaccess.org\/welcome-to-sigaccess\/resources\/accessible-writing-guide\/."},{"key":"e_1_2_1_152_1","volume-title":"Retrieved","author":"The","year":"2023","unstructured":"The U.S. Department of Homeland Security. Retrieved December, 2023. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. https:\/\/www.dhs.gov\/sites\/default\/fles\/publications\/CSD-MenloPrinciplesCORE-20120803_1.pdf."},{"key":"e_1_2_1_153_1","volume-title":"Retrieved","author":"Science Ministry","year":"2023","unstructured":"Ministry of Science and Technology of the People's Republic of China. Retrieved December, 2023. UTF8gbsn Guideline on the Ethics Review of Science and Technology Research (Trial Version) (()). https:\/\/www.most.gov.cn\/xxgk\/xinxifenlei\/fdzdgknr\/fgzc\/gfxwj\/gfxwj2023\/202310\/t20231008_188309.html."},{"key":"e_1_2_1_154_1","unstructured":"Information Commissioner's Ofce. Retrieved October 2023. Safeguard and empower the public particularly vulnerable groups. https:\/\/ico.org.uk\/about-the-ico\/our-information\/our-strategies-and-plans\/ico25-strategic-plan\/annual-action-plan-october-2022-october-2023\/safeguard-and-empower-the-public\/."},{"key":"e_1_2_1_155_1","volume-title":"Factoring the Matrix of Domination: A Critical Review and Reimagination of Intersectionality in AI Fairness. arXiv preprint arXiv:2303.17555","author":"Ovalle Anaelia","year":"2023","unstructured":"Anaelia Ovalle, Arjun Subramonian, Vagrant Gautam, Gilbert Gee, and Kai-Wei Chang. 2023. Factoring the Matrix of Domination: A Critical Review and Reimagination of Intersectionality in AI Fairness. arXiv preprint arXiv:2303.17555 (2023)."},{"key":"e_1_2_1_156_1","unstructured":"Margaret P. Retrieved August 2023. Kill Your Personas - How persona spectrums champion real user needs. https:\/\/www.sigaccess.org\/welcome-to-sigaccess\/resources\/accessible-writing-guide\/."},{"key":"e_1_2_1_157_1","volume-title":"Deaf in America: Voices from a culture","author":"Padden Carol A","unstructured":"Carol A Padden and Tom L Humphries. 1988. Deaf in America: Voices from a culture. Harvard University Press."},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445702"},{"key":"e_1_2_1_159_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 2, CSCW","author":"Pierce James","year":"2018","unstructured":"James Pierce, Sarah Fox, Nick Merrill, and Richmond Wong. 2018. Diferential vulnerabilities and a diversity of tactics: What toolkits teach us about cybersecurity. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 1--24."},{"key":"e_1_2_1_160_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 3, CSCW","author":"Pinter Anthony T","year":"2019","unstructured":"Anthony T Pinter, Jialun Aaron Jiang, Katie Z Gach, Melanie M Sidwell, James E Dykes, and Jed R Brubaker. 2019. ''Am I Never Going to Be Free of All This Crap?'' Upsetting Encounters with Algorithmically Curated Content About Ex-Partners. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 1--23."},{"key":"e_1_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-016-0500-1"},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2023.3238591"},{"key":"e_1_2_1_163_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462075"},{"key":"e_1_2_1_164_1","volume-title":"Retrieved","author":"Rose Nandita","year":"2022","unstructured":"Nandita Rose. 2022. Roe v Wade ruling disproportionately hurts Black women, experts say. Retrieved July, 2024 from https:\/\/www.reuters.com\/world\/us\/roe-v-wade-ruling-disproportionately-hurts-black-women-experts-say-2022-06--27\/"},{"key":"e_1_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781003325086-1"},{"key":"e_1_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1177\/00222429221150910"},{"key":"e_1_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555556"},{"key":"e_1_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476089"},{"key":"e_1_2_1_169_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581308"},{"key":"e_1_2_1_170_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479512"},{"key":"e_1_2_1_171_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359246"},{"key":"e_1_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375804"},{"key":"e_1_2_1_173_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025766"},{"key":"e_1_2_1_174_1","first-page":"113","article-title":"Reimagining social media governance: Harm, accountability, and repair","volume":"23","author":"Schoenebeck Sarita","year":"2020","unstructured":"Sarita Schoenebeck and Lindsay Blackwell. 2020. Reimagining social media governance: Harm, accountability, and repair. Yale JL & Tech. 23 (2020), 113.","journal-title":"Yale JL & Tech."},{"key":"e_1_2_1_175_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0963180109090203"},{"key":"e_1_2_1_176_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581512"},{"key":"e_1_2_1_177_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479577"},{"key":"e_1_2_1_178_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 4, CSCW2","author":"Shen Hong","year":"2020","unstructured":"Hong Shen, Cori Faklaris, Haojian Jin, Laura Dabbish, and Jason I Hong. 2020. 'I Can't Even Buy Apples If I Don't Use Mobile Pay?' When Mobile Payments Become Infrastructural in China. Proceedings of the ACM on Human-Computer Interaction 4, CSCW2 (2020), 1--26."},{"key":"e_1_2_1_179_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581331"},{"key":"e_1_2_1_180_1","unstructured":"SIGACCESS. Retrieved August 2023. Accessible Writing Guides. https:\/\/medium.com\/microsoft-design\/kill-your-personas-1c332d4908cc."},{"key":"e_1_2_1_181_1","volume-title":"Practices, Challenges, and Opportunities","author":"Simko Lucy","unstructured":"Lucy Simko. 2022. Humans and Vulnerability During Times of Change: Computer Security Needs, Practices, Challenges, and Opportunities. University of Washington."},{"key":"e_1_2_1_182_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00023"},{"key":"e_1_2_1_183_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610215"},{"key":"e_1_2_1_184_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479524"},{"key":"e_1_2_1_185_1","volume-title":"Minorias e grupos vulner\u00e1veis: a quest\u00e3o terminol\u00f3gica como fator preponderante para uma real inclus\u00e3o social. Revista direitos sociais e pol\u00edticas p\u00fablicas (UNIFAFIBE) 5, 1","author":"Siqueira Dirceu Pereira","year":"2017","unstructured":"Dirceu Pereira Siqueira and Lorenna Roberta Barbosa Castro. 2017. Minorias e grupos vulner\u00e1veis: a quest\u00e3o terminol\u00f3gica como fator preponderante para uma real inclus\u00e3o social. Revista direitos sociais e pol\u00edticas p\u00fablicas (UNIFAFIBE) 5, 1 (2017), 105--122."},{"key":"e_1_2_1_186_1","doi-asserted-by":"publisher","DOI":"10.1177\/02704676221094731"},{"key":"e_1_2_1_187_1","doi-asserted-by":"publisher","DOI":"10.1145\/3633200"},{"key":"e_1_2_1_188_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642384"},{"key":"e_1_2_1_189_1","doi-asserted-by":"publisher","DOI":"10.1145\/3641000"},{"key":"e_1_2_1_190_1","doi-asserted-by":"publisher","DOI":"10.1177\/20539517221115189"},{"key":"e_1_2_1_191_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173589"},{"key":"e_1_2_1_192_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2022.3182222"},{"key":"e_1_2_1_193_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174110"},{"key":"e_1_2_1_194_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610216"},{"key":"e_1_2_1_195_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 6, CSCW2","author":"Tang Xinru","year":"2022","unstructured":"Xinru Tang, Yuling Sun, Bowen Zhang, Zimi Liu, RAY LC, Zhicong Lu, and Xin Tong. 2022. ''I Never Imagined Grandma Could Do So Well with Technology'' Evolving Roles of Younger Family Members in Older Adults' Technology Learning and Use. Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022), 1--29."},{"key":"e_1_2_1_196_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3596057"},{"key":"e_1_2_1_197_1","volume-title":"Retrieved","author":"Totenberg Nina","year":"2022","unstructured":"Nina Totenberg and Sarah McCammon. 2022. Supreme Court overturns Roe v. Wade, ending right to abortion upheld for decades. Retrieved July, 2024 from https:\/\/www.npr.org\/2022\/06\/24\/1102305878\/supreme-court-abortion-roe-v-wade-decision-overturn"},{"key":"e_1_2_1_198_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502038"},{"key":"e_1_2_1_199_1","volume-title":"Suspending damage: A letter to communities. Harvard educational review 79, 3","author":"Tuck Eve","year":"2009","unstructured":"Eve Tuck. 2009. Suspending damage: A letter to communities. Harvard educational review 79, 3 (2009), 409--428."},{"key":"e_1_2_1_200_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581478"},{"key":"e_1_2_1_201_1","volume-title":"Social Movements and Intersectional Solidarities","author":"Tungohan Ethel","unstructured":"Ethel Tungohan and Fernando Tormos-Aponte. 2023. Social Movements and Intersectional Solidarities. In The Routledge International Handbook of Intersectionality Studies. Routledge, 290--303."},{"key":"e_1_2_1_202_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580925"},{"key":"e_1_2_1_203_1","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2479654"},{"key":"e_1_2_1_204_1","volume-title":"Proceedings of the ACM on human-computer interaction 2, CSCW","author":"Vitak Jessica","year":"2018","unstructured":"Jessica Vitak, Yuting Liao, Mega Subramaniam, and Priya Kumar. 2018. 'I Knew It Was Too Good to Be True'' The Challenges Economically Disadvantaged Internet Users Face in Assessing Trustworthiness, Avoiding Scams, and Developing Self-Efcacy Online. Proceedings of the ACM on human-computer interaction 2, CSCW (2018), 1--25."},{"key":"e_1_2_1_205_1","first-page":"779","article-title":"Exploring vulnerability in EU law: An analysis of ''vulnerability'' in EU criminal law and consumer protection law","volume":"45","author":"Waddington Lisa","year":"2020","unstructured":"Lisa Waddington. 2020. Exploring vulnerability in EU law: An analysis of ''vulnerability'' in EU criminal law and consumer protection law''. European Law Review 45, 6 (2020), 779--801.","journal-title":"European Law Review"},{"key":"e_1_2_1_206_1","doi-asserted-by":"publisher","DOI":"10.1080\/14649365.2013.872286"},{"key":"e_1_2_1_207_1","volume-title":"Cognitive biases, dark patterns, and the 'privacy paradox'. Current opinion in psychology 31","author":"Waldman Ari Ezra","year":"2020","unstructured":"Ari Ezra Waldman. 2020. Cognitive biases, dark patterns, and the 'privacy paradox'. Current opinion in psychology 31 (2020), 105--109."},{"key":"e_1_2_1_208_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376813"},{"key":"e_1_2_1_209_1","doi-asserted-by":"publisher","DOI":"10.1145\/3171533.3171538"},{"key":"e_1_2_1_210_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111237"},{"key":"e_1_2_1_211_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819941"},{"key":"e_1_2_1_212_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833643"},{"key":"e_1_2_1_213_1","volume-title":"Proceedings of the ACM on human-computer interaction 2, CSCW","author":"Warner Mark","year":"2018","unstructured":"Mark Warner, Andreas Gutmann, M Angela Sasse, and Ann Blandford. 2018. Privacy unraveling around explicit HIV status disclosure felds in the online geosocial hookup app Grindr. Proceedings of the ACM on human-computer interaction 2, CSCW (2018), 1--22."},{"key":"e_1_2_1_214_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3027089"},{"key":"e_1_2_1_215_1","doi-asserted-by":"publisher","DOI":"10.1145\/2838739.2838773"},{"key":"e_1_2_1_216_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594012"},{"key":"e_1_2_1_217_1","first-page":"12","article-title":"Seven Research Contributions in HCI","volume":"174","author":"Wobbrock Jacob O","year":"2012","unstructured":"Jacob O Wobbrock. 2012. Seven Research Contributions in HCI. Intelligence 174, 12--13 (2012), 910--950.","journal-title":"Intelligence"},{"key":"e_1_2_1_218_1","unstructured":"Women Against Abuse. 2024. The Language We Use. https:\/\/www.womenagainstabuse.org\/education-resources\/the-language-we-use."},{"key":"e_1_2_1_219_1","doi-asserted-by":"publisher","DOI":"10.1145\/3406865.3418594"},{"key":"e_1_2_1_220_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173693"},{"key":"e_1_2_1_221_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642771"},{"key":"e_1_2_1_222_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642385"},{"key":"e_1_2_1_223_1","volume-title":"30th USENIX security symposium (USENIX Security 21). 429--446.","author":"Zou Yixin","unstructured":"Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, and Acar Tamersoy. 2021. The role of computer security customer support in helping survivors of intimate partner violence. In 30th USENIX security symposium (USENIX Security 21). 429--446."},{"key":"e_1_2_1_224_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376570"},{"key":"e_1_2_1_225_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0009"},{"key":"e_1_2_1_226_1","unstructured":"Nikolina \u0161ajn. Retrieved October 2023. Vulnerable consumers. https:\/\/www.europarl.europa.eu\/RegData\/etudes\/BRIE\/2021\/690619\/EPRS_BRI(2021)690619_EN.pdf."}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3710935","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3710935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T09:23:53Z","timestamp":1755768233000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3710935"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,2]]},"references-count":226,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,5,2]]}},"alternative-id":["10.1145\/3710935"],"URL":"https:\/\/doi.org\/10.1145\/3710935","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,2]]},"assertion":[{"value":"2025-05-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}