{"668093":{"#nid":"668093","#data":{"type":"event","title":"PhD Proposal by Yuxi Wu","body":[{"value":"\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003E\u003Cspan\u003ETitle: Designing Collective Action Systems for User Privacy\u003C\/span\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003E\u003Cspan\u003EDate: \u003C\/span\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan\u003E\u003Cspan\u003ETuesday, June 27, 2023\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003E\u003Cspan\u003ETime: \u003C\/span\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan\u003E\u003Cspan\u003E12:00PM to 2:00PM EDT\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003E\u003Cspan\u003ELocation: \u003C\/span\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan\u003E\u003Cspan\u003EVirtual at\u003Cstrong\u003E \u003C\/strong\u003E\u003Ca href=\u0022https:\/\/gatech.zoom.us\/j\/94660607042pwd=L25XOS9nc1FOTk84eXNlekZMRHRsZz09\u0022\u003Ehttps:\/\/gatech.zoom.us\/j\/94660607042pwd=L25XOS9nc1FOTk84eXNlekZMRHRsZz09\u003C\/a\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003E\u003Cspan\u003EYuxi Wu\u003C\/span\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EPhD Student in Computer Science\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003ESchool of Interactive Computing\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EGeorgia Institute of Technology\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003E\u003Cspan\u003ECommittee:\u003C\/span\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. Sauvik Das (co-advisor) \u2013 Human-Computer Interaction Institute, Carnegie Mellon University\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. Keith Edwards (co-advisor) \u2013 School of Interactive Computing, Georgia Tech\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. Joseph Calandrino \u2013 Office of Technology Research and Investigation, Federal Trade Commission\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. Christopher Le Dantec \u2013 School of Interactive Computing, Georgia Tech\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. Richmond Wong \u2013 School of Literature Media, and Communication, Georgia Tech\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. Ellen Zegura \u2013 School of Interactive Computing, Georgia Tech\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003E\u003Cspan\u003EAbstract:\u003C\/span\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EPeople feel concerned but powerless about the ways that large tech institutions have violated their privacy.\u0026nbsp; In other domains, collective action has been successful in effecting change.\u0026nbsp; Computer-supported collective action (CSCA) is a framework proposed by Shaw et al. that identifies five key stages of people using computing tools to engage in collective action\u2014(1) Identify a problem; (2) Generate, debate, and select ideas; (3) Coordinate and prepare for action; (4) Take action; and (5) Document, assess, and follow up\u2014as well as the challenges that make it difficult to transition between stages.\u0026nbsp;\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EIn my work, I explore and scope out design spaces to support transition between these stages for user privacy.\u0026nbsp; First, I show that it is possible to gather and distill a collective\u2019s privacy concerns and their demands for mitigations (Stages 1 and 2); however, these demands don\u2019t mesh well with security and privacy experts\u2019 evaluations, who dismiss them as unrealistic.\u0026nbsp; To better scaffold a dialogue between users and experts (Stages 2 and 3), I qualitatively analyze users\u2019 negative experiences with online behavioral advertising, contextualizing them against legal literature and forming a typology of privacy harms.\u0026nbsp; I propose that exploring a systematic, collaborative process for collecting such data as \u201cevidence of privacy harm\u201d can be a viable path for privacy collective action.\u0026nbsp; In my proposed work, through design fiction and story completion methods, I hope to understand (1) the potential ways that users can collectively participate in this process (Stage 4) and (2) the potential impacts of such collective evidence-gathering (Stage 5).\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003ESee below\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Designing Collective Action Systems for User Privacy"}],"uid":"27707","created_gmt":"2023-06-13 16:25:24","changed_gmt":"2023-06-13 16:25:24","author":"Tatianna Richardson","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2023-06-27T12:00:00-04:00","event_time_end":"2023-06-27T14:00:00-04:00","event_time_end_last":"2023-06-27T14:00:00-04:00","gmt_time_start":"2023-06-27 16:00:00","gmt_time_end":"2023-06-27 18:00:00","gmt_time_end_last":"2023-06-27 18:00:00","rrule":null,"timezone":"America\/New_York"},"location":"Virtual","extras":[],"groups":[{"id":"221981","name":"Graduate Studies"}],"categories":[],"keywords":[{"id":"102851","name":"Phd proposal"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}