{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T07:56:27Z","timestamp":1776930987079,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":98,"publisher":"ACM","funder":[{"name":"DFG (Deutsche Forschungsgemeinschaft)","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3772318.3791487","type":"proceedings-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T06:44:11Z","timestamp":1776062651000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["It Shouldn't Be This Difficult: Researcher Perspectives on Diversity and Inclusion in Usable Privacy and Security Research"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7025-2981","authenticated-orcid":false,"given":"Priyasha","family":"Chatterjee","sequence":"first","affiliation":[{"name":"Human Centered Security and Privacy, MPI-SP, Bochum, NRW, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8776-6030","authenticated-orcid":false,"given":"Smirity","family":"Kaushik","sequence":"additional","affiliation":[{"name":"School of Information Sciences, University of Illinois at Urbana-Champaign, Champaign, Illinois, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7129-9642","authenticated-orcid":false,"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9088-705X","authenticated-orcid":false,"given":"Yixin","family":"Zou","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Security and Privacy, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2026,4,13]]},"reference":[{"key":"e_1_3_3_2_2_2","volume-title":"Privacy and Security for Everyone, Anytime, Anywhere","author":"Inclusive\u00a0Privacy 9th Workshop\u00a0on","year":"2024","unstructured":"9th Workshop\u00a0on Inclusive\u00a0Privacy and Security\u00a0(WIPS) SOUPS. 2024. Privacy and Security for Everyone, Anytime, Anywhere. https:\/\/inclusiveprivacy.org\/workshops\/wips2024.html Accessed: 2025-06-04."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300410"},{"key":"e_1_3_3_2_4_2","volume-title":"Manual Transcription","year":"2025","unstructured":"Amberscript. 2025. Manual Transcription. https:\/\/www.amberscript.com\/en\/products\/manual-transcription\/"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"American Psychological Association. 2002. Ethical Principles of Psychologists and Code of Conduct.American Psychologist 57 12 (2002) 1060\u20131073.","DOI":"10.1037\/0003-066X.57.12.1060"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Ronald\u00a0E Anderson. 1992. ACM code of ethics and professional conduct. Commun. ACM 35 5 (1992) 94\u201399.","DOI":"10.1145\/129875.129885"},{"key":"e_1_3_3_2_7_2","unstructured":"The World\u00a0Medical Association. 2024. WMA Declaration of Helsinki \u2014 Ethical Principles for Medical Research Involving Human Participants. WMA: Ferney-Voltaire France (2024)."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979041"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00071"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00065"},{"key":"e_1_3_3_2_11_2","unstructured":"Aatish Bhatia Amy Fan Jonah Smith and Irena Hwang. 2025. The U.S. Is Funding Fewer Grants in Every Area of Science and Medicine. The New York Times (2025)."},{"key":"e_1_3_3_2_12_2","unstructured":"CACTUS\/P Colloquium. 2025. CACTUS\/P Capital-Area Colloquium on Trustworthy and Usable Security\/Privacy. https:\/\/cactus-colloquium.github.io. Accessed: 2025-12-04."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Caitlin Cahill. 2007. Including excluded perspectives in participatory action research. Design Studies 28 (2007) 325\u2013340.","DOI":"10.1016\/j.destud.2007.02.006"},{"key":"e_1_3_3_2_14_2","unstructured":"Calendly. 2025. Calendly. https:\/\/calendly.com. Accessed: 2025-12-04."},{"key":"e_1_3_3_2_15_2","unstructured":"CITI Program. 2025. Human Subjects Research (HSR). https:\/\/about.citiprogram.org\/series\/human-subjects-research-hsr\/. Accessed: 2025-12-04."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Tom Clark. 2008. \u2018We\u2019re Over-Researched Here!\u2019: Exploring Accounts of Research Fatigue within Qualitative Research Engagements. Sociology 42 5 (2008) 953\u2013970.","DOI":"10.1177\/0038038508094573"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819960"},{"key":"e_1_3_3_2_18_2","unstructured":"Dana Cuomo Nicola Dell Lana Ramjit and Thomas Ristenpart. 2025. The Technology Abuse Clinic Toolkit. https:\/\/www.techabuseclinics.org\/. Accessed: 2025-12-05."},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3715275.3732055"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858081"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208589"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Tawanna\u00a0R. Dillahunt and Tiffany\u00a0C. Veinot. 2018. Getting There: Barriers and Facilitators to Transportation Access in Underserved Communities. ACM Trans. Comput.-Hum. Interact. 25 5 (2018).","DOI":"10.1145\/3233985"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Sheena Erete Yolanda\u00a0A. Rankin and Jakita\u00a0O. Thomas. 2021. I Can\u2019t Breathe: Reflections from Black Women in CSCW and HCI. Proc. ACM Hum.-Comput. Interact. 4 CSCW3 (2021).","DOI":"10.1145\/3432933"},{"key":"e_1_3_3_2_25_2","unstructured":"European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). Official Journal of the European Union L 119 1\u201388. https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581508"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Michael\u00a0G. Findley Faten Ghosn and Sara\u00a0J. Lowe. 2024. Vulnerability in research ethics: A call for assessing vulnerability and implementing protections. Proceedings of the National Academy of Sciences 121 34 (2024) e2322821121.","DOI":"10.1073\/pnas.2322821121"},{"key":"e_1_3_3_2_28_2","unstructured":"Global\u00a0Forum for Media Development\u00a0(GFMD). 2023. Call for Proposals: Expanding Online Trust & Safety Research. https:\/\/gfmd.info\/engagements\/call-for-proposals-expanding-online-trust-safety-research\/. Accessed: 2025-12-05."},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2856465"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.5555\/2755205"},{"key":"e_1_3_3_2_32_2","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Geeng Christine","year":"2022","unstructured":"Christine Geeng, Mike Harris, Elissa Redmiles, and Franziska Roesner. 2022. \u201cLike Lesbians Walking the Perimeter\u201d: Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association."},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173688"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"crossref","unstructured":"Danny Haelewaters Tina\u00a0A Hofmann and Adriana\u00a0L Romero-Olivares. 2021. Ten Simple Rules for Global North Researchers to Stop Perpetuating Helicopter Research in the Global South.","DOI":"10.1371\/journal.pcbi.1009277"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376669"},{"key":"e_1_3_3_2_36_2","unstructured":"Sandra Harding. 1992. Rethinking Standpoint Epistemology: What Is \"Strong Objectivity?\". The Centennial Review 36 3 (1992) 437\u2013470."},{"key":"e_1_3_3_2_37_2","volume-title":"The feminist standpoint theory reader: Intellectual and political controversies","author":"Harding Sandra\u00a0G","year":"2004","unstructured":"Sandra\u00a0G Harding. 2004. The feminist standpoint theory reader: Intellectual and political controversies. Psychology Press."},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300823"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3240925.3240966"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"crossref","unstructured":"Siti\u00a0Ivadhea Harrisa and Nokia Putri\u00a0Andika Lainsyamputty. 2022. Cultural Violence towards the LGBTQ+ Community in Islamic Majority Country: A Case From@ tabu. Id\u2019s Comment Section. Religi\u00f3 Jurnal Studi Agama-agama 12 1 (2022) 82\u2013101.","DOI":"10.15642\/religio.v12i1.1862"},{"key":"e_1_3_3_2_41_2","unstructured":"A. Hasegawa Daisuke Inoue and Mitsuaki Akiyama. 2023. A Survey on the Geographic Diversity of Usable Privacy and Security Research. arXiv.org (2023)."},{"key":"e_1_3_3_2_42_2","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Hasegawa Ayako\u00a0A.","year":"2024","unstructured":"Ayako\u00a0A. Hasegawa, Daisuke Inoue, and Mitsuaki Akiyama. 2024. How WEIRD is Usable Privacy and Security Research?. In 33rd USENIX Security Symposium (USENIX Security 24). USENIX Association."},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753522"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"crossref","unstructured":"Alan\u00a0D Kaye Chikezie\u00a0N Okeagu Alex\u00a0D Pham Rayce\u00a0A Silva Joshua\u00a0J Hurley Brett\u00a0L Arron Noeen Sarfraz Hong\u00a0N Lee Ghali\u00a0E Ghali Jack\u00a0W Gamble et\u00a0al. 2021. Economic impact of COVID-19 pandemic on healthcare facilities and systems: International perspectives. Best Practice & Research Clinical Anaesthesiology 35 3 (2021) 293\u2013306.","DOI":"10.1016\/j.bpa.2020.11.009"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"crossref","unstructured":"Izabela Ka\u017amierczak Anna Zajenkowska Rados\u0142aw Rogoza Peter\u00a0K Jonason and Dawid \u015aciga\u0142a. 2023. Self-selection biases in psychological studies: Personality and affective disorders are prevalent among participants. Plos one 18 3 (2023) e0281046.","DOI":"10.1371\/journal.pone.0281046"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00038"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"crossref","unstructured":"Bran Knowles Vicki L. Hanson Yvonne Rogers Anne Marie Piper Jenny Waycott Nigel Davies Aloha Hufana Ambe Robin N. Brewer Debaleena Chattopadhyay Marianne Dee David Frohlich Marisela Gutierrez-Lopez Ben Jelen Amanda Lazar Radoslaw Nielek Bel\u00e9n Barros Pena Abi Roper Mark Schlager Britta Schulte and Irene Ye Yuan. 2021. The harm in conflating aging with accessibility. Commun. ACM 64 7 (2021) 66\u201371.","DOI":"10.1145\/3431280"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"crossref","unstructured":"Lisa Lazard and Jean McAvoy. 2020. Doing reflexivity in psychological research: What\u2019s the point? What\u2019s the practice?Qualitative research in psychology 17 2 (2020) 159\u2013177.","DOI":"10.1080\/14780887.2017.1400144"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357155"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3462204.3481723"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376339"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"crossref","unstructured":"Calvin\u00a0A Liang Sean\u00a0A. Munson and Julie\u00a0A. Kientz. 2021. Embracing Four Tensions in Human-Computer Interaction Research with Marginalized People. ACM Trans. Comput.-Hum. Interact. 28 2 (2021).","DOI":"10.1145\/3443686"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445488"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"crossref","unstructured":"Rebecca Mandt Kushal Seetharam and Chung Hon\u00a0Michael Cheng. 2020. Federal R&D Funding: The Bedrock of National Innovation. MIT Science Policy Review 1 7 (2020) 44\u201354.","DOI":"10.38105\/spr.n463z4t1u8"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"crossref","unstructured":"Julie Martin Renee Desing and Maura Borrego. 2022. Positionality statements are just the tip of the iceberg: Moving towards a reflexive process. Journal of Women and Minorities in Science and Engineering 28 4 (2022).","DOI":"10.1615\/JWomenMinorScienEng.2022044277"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"crossref","unstructured":"Tara Matthews Elie Bursztein Patrick\u00a0Gage Kelley Lea Kissner Andreas Kramm Andrew Oplinger Andreas Schou Manya Sleeper Stephan Somogyi Dalila Szostak et\u00a0al. 2025. Supporting the Digital Safety of At-Risk Users: Lessons Learned from 9+ Years of Research & Training. ACM Transactions on Computer-Human Interaction (2025).","DOI":"10.1145\/3716382"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376167"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"crossref","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and Inter-rater Reliability in Qualitative Research: Norms and Guidelines for CSCW and HCI Practice. Proc. ACM Hum.-Comput. Interact. 3 CSCW (2019).","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"crossref","unstructured":"Abraham Mhaidli Selin Fidan An Doan Gina Herakovic Mukund Srinath Lee Matheson Shomir Wilson and Florian Schaub. 2023. Researchers\u2019 experiences in analyzing privacy policies: Challenges and opportunities. Proceedings on Privacy Enhancing Technologies (2023).","DOI":"10.56553\/popets-2023-0111"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"crossref","unstructured":"Delyana Miller Halina Bruce Michele Gagnon Vincent Talbot and Claude Messier. 2011. Improving Older Adults\u2019 Experience with Interactive Voice Response Systems. Telemedicine journal and e-health : the official journal of the American Telemedicine Association 17 (2011) 452\u20135.","DOI":"10.1089\/tmj.2010.0204"},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3587399.3587400"},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179410"},{"key":"e_1_3_3_2_63_2","volume-title":"2026 IEEE Symposium on Security and Privacy (SP)","author":"Munyendo Collins\u00a0W.","year":"2026","unstructured":"Collins\u00a0W. Munyendo, Veronica\u00a0A. Rivera, Jackie Hu, Emmanuel Tweneboah, Amna Shahnawaz, Karen Sowon, Dilara Kek\u00fcll\u00fco\u011flu, Marcos Silva, Yue Deng, Mercy Omeiza, Gayatri Priyadarsini, Maria Rosario\u00a0Niniz Silva, Abhishek Bichhawat, Maryam Mustafa, Francisco Marmolejo-Cossio, Elissa\u00a0M. Redmiles, and Yixin Zou. 2026. \"I Wonder if These Warnings Are Accurate\": Security and Privacy Advice in Nine Majority World Countries. In 2026 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society."},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00197"},{"key":"e_1_3_3_2_65_2","unstructured":"Lesley-Ann Noel and Marcelo Paiva. 2021. Learning to recognize exclusion. Journal of Usability Studies 16 2 (2021) 63\u201372."},{"key":"e_1_3_3_2_66_2","volume-title":"Whisper AI for Transcription","year":"2023","unstructured":"OpenAI. 2023. Whisper AI for Transcription. https:\/\/github.com\/openai\/whisper"},{"key":"e_1_3_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580766"},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"crossref","unstructured":"Joseph P\u00a0Simmons Leif D\u00a0Nelson and Uri Simonsohn. 2021. Pre-registration: Why and how. Journal of Consumer Psychology 31 1 (2021) 151\u2013162.","DOI":"10.1002\/jcpy.1208"},{"key":"e_1_3_3_2_69_2","unstructured":"Kopo\u00a0M. Ramokapane Lizzie Coles-Kemp Nikhil Patnaik Rui Huan Nirav Ajmeri Genevieve Liveley and Awais Rashid. 2023. Towards Equitable Privacy."},{"key":"e_1_3_3_2_70_2","doi-asserted-by":"crossref","unstructured":"Steven\u00a0O Roberts Carmelle Bareket-Shavit Forrest\u00a0A Dollins Peter\u00a0D Goldie and Elizabeth Mortenson. 2020. Racial inequality in psychological research: Trends of the past and recommendations for the future. Perspectives on Psychological Science 15 6 (2020) 1295\u20131309.","DOI":"10.1177\/1745691620927709"},{"key":"e_1_3_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3448696.3448703"},{"key":"e_1_3_3_2_72_2","doi-asserted-by":"crossref","unstructured":"Shruti Sannon and Andrea Forte. 2022. Privacy research with marginalized groups: what we know what\u2019s needed and what\u2019s next. Proceedings of the ACM on Human-Computer Interaction 6 CSCW2 (2022) 1\u201333.","DOI":"10.1145\/3555556"},{"key":"e_1_3_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781003377986"},{"key":"e_1_3_3_2_74_2","doi-asserted-by":"crossref","unstructured":"Jukka Savolainen Patrick\u00a0J Casey Justin\u00a0P McBrayer and Patricia\u00a0Nayna Schwerdtle. 2023. Positionality and its problems: questioning the value of reflexivity statements in research. Perspectives on Psychological Science 18 6 (2023) 1331\u20131338.","DOI":"10.1177\/17456916221144988"},{"key":"e_1_3_3_2_75_2","doi-asserted-by":"crossref","unstructured":"Morgan\u00a0Klaus Scheuerman Stacy\u00a0M. Branham and Foad Hamidi. 2018. Safe Spaces and Safe Places: Unpacking Technology-Mediated Experiences of Safety and Harm with Transgender People. Proc. ACM Hum.-Comput. Interact. 2 CSCW (2018).","DOI":"10.1145\/3274424"},{"key":"e_1_3_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025766"},{"key":"e_1_3_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025766"},{"key":"e_1_3_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3593985"},{"key":"e_1_3_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/1738826.1738841"},{"key":"e_1_3_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00023"},{"key":"e_1_3_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713280"},{"key":"e_1_3_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/3615335.3623008"},{"key":"e_1_3_3_2_83_2","doi-asserted-by":"crossref","unstructured":"Robert Soden Austin Toombs and Michaelanne Thomas. 2024. Evaluating interpretive research in HCI. Interactions 31 1 (2024) 38\u201342.","DOI":"10.1145\/3633200"},{"key":"e_1_3_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833581"},{"key":"e_1_3_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713544"},{"key":"e_1_3_3_2_86_2","doi-asserted-by":"crossref","unstructured":"Xinru Tang Gabriel Lima Li Jiang Lucy Simko and Yixin Zou. 2025. Beyond \"Vulnerable Populations\": A Unified Understanding of Vulnerability From A Socio-Ecological Perspective. Proc. ACM Hum.-Comput. Interact. 9 2 (2025).","DOI":"10.1145\/3710935"},{"key":"e_1_3_3_2_87_2","doi-asserted-by":"crossref","unstructured":"Alexandra To Wenxia Sweeney Jessica Hammer and Geoff Kaufman. 2020. \"They Just Don\u2019t Get It\": Towards Social Technologies for Coping with Interpersonal Racism. Proc. ACM Hum.-Comput. Interact. 4 CSCW1 (2020).","DOI":"10.1145\/3392828"},{"key":"e_1_3_3_2_88_2","unstructured":"Clinic to End Tech Abuse\u00a0(CETA). 2025. Clinic to End Tech Abuse (CETA): First-of-its-kind technology-abuse clinic for survivors of intimate partner violence. https:\/\/ceta.tech.cornell.edu\/. Accessed: 2025-12-05."},{"key":"e_1_3_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300791"},{"key":"e_1_3_3_2_90_2","unstructured":"Transparency @ SOUPS. 2025. Workshop on Developing Research Transparency Guidelines in Human-Centered Privacy and Security. https:\/\/transparency-at-soups.teamusec.de. Accessed: 2025-12-04."},{"key":"e_1_3_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502038"},{"key":"e_1_3_3_2_92_2","volume-title":"34th USENIX Security Symposium (USENIX Security 25)","author":"Tweneboah Emmanuel","year":"2025","unstructured":"Emmanuel Tweneboah, Collins\u00a0W Munyendo, and Yixin Zou. 2025. \u201cNo, I Can\u2019t Be a Security Personnel on Your Phone\u201d: Security and Privacy Threats From Sharing Infrastructure in Rural Ghana. In 34th USENIX Security Symposium (USENIX Security 25)."},{"key":"e_1_3_3_2_93_2","doi-asserted-by":"crossref","unstructured":"Ari VanderWalde and Seth Kurzban. 2011. Paying human subjects in research: where are we how did we get here and now what?Journal of Law Medicine & Ethics 39 3 (2011) 543\u2013558.","DOI":"10.1111\/j.1748-720X.2011.00621.x"},{"key":"e_1_3_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-82786-1_13"},{"key":"e_1_3_3_2_95_2","doi-asserted-by":"crossref","unstructured":"Noel Warford Tara Matthews Kaitlyn Yang Omer Akgul Sunny Consolvo Patrick\u00a0Gage Kelley Nathan Malkin Michelle\u00a0L. Mazurek Manya Sleeper and Kurt Thomas. 2022. SoK: A Framework for Unifying At-Risk User Research. IEEE Symposium on Security and Privacy (2022).","DOI":"10.1109\/SP46214.2022.9833643"},{"key":"e_1_3_3_2_96_2","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Wei Miranda","year":"2024","unstructured":"Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa\u00a0M Redmiles, and Franziska Roesner. 2024. SoK or SoLK?: On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors. In 33rd USENIX Security Symposium (USENIX Security 24)."},{"key":"e_1_3_3_2_97_2","doi-asserted-by":"crossref","unstructured":"Caitlin Wilson Gillian Janes and Julia Williams. 2022. Identity positionality and reflexivity: Relevance and application to research paramedics. British Paramedic Journal 7 2 (2022) 43\u201349.","DOI":"10.29045\/14784726.2022.09.7.2.43"},{"key":"e_1_3_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3381828"},{"key":"e_1_3_3_2_99_2","doi-asserted-by":"crossref","unstructured":"Yixin Zou Kaiwen Sun Tanisha Afnan Ruba Abu-Salma Robin Brewer and Florian Schaub. 2024. Cross-contextual examination of older adults\u2019 privacy concerns behaviors and vulnerabilities. Privacy-Enhancing Technologies (PoPETs) (2024).","DOI":"10.56553\/popets-2024-0009"}],"event":{"name":"CHI 2026: CHI Conference on Human Factors in Computing Systems","location":"Barcelona Spain","acronym":"CHI '26","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772318.3791487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T07:12:50Z","timestamp":1776064370000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772318.3791487"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,13]]},"references-count":98,"alternative-id":["10.1145\/3772318.3791487","10.1145\/3772318"],"URL":"https:\/\/doi.org\/10.1145\/3772318.3791487","relation":{},"subject":[],"published":{"date-parts":[[2026,4,13]]},"assertion":[{"value":"2026-04-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}