Misinformation's Influence on Voting Intentions: Older Adults' Experiences with Manipulative Narratives on Social MediaOlder adults habitually encounter misinformation, yet little is known about their experiences with it. In this study, we employed a mixed-methods approach, combining a survey (n=119) with semi-structured interviews (n=21), to investigate how older adults in America conceptualize, discern, and contextualize social media misinformation. Given the historical context of misinformation being used to influence voting outcomes, our study specifically examined this phenomenon from a voting intention perspective. Our findings reveal that 62% of participants intending to vote Democrat perceived a manipulative political purpose behind the spread of misinformation, whereas only 5% of those intending to vote Republican believed that misinformation serves a political dissent purpose. Regardless of voting intentions, most participants relied on source heuristics and fact-checking to discern truth from misinformation on social media. A major concern among participants was the biased reasoning influenced by personal values and emotions affected by misinformation. Notably, 74% of participants intending to vote Democrat were concerned that misinformation would escalate extremism in the future. In contrast, those intending to vote Republican, those undecided, or those planning to abstain expressed concerns that misinformation would further erode trust in democratic institutions, particularly in public health and free and fair elections. During our interviews, we discovered that 63% of participants intending to vote Republican mentioned that Republican or conservative voices often disseminate misinformation, even though these participants were closely aligned with this political ideology.2025FSFilipo Sharevski et al.Combating Misinformation in Elections and Around the WorldCSCW
“Watch My Health, Not My Data”: Understanding Perceptions, Barriers, Emotional Impact, & Coping Strategies Pertaining to IoT Privacy and Security in Health Monitoring for Older AdultsThe proliferation of “Internet of Things (IoT)” provides older adults with critical support for “health monitoring” and independent living, yet significant concerns about security and privacy persist. In this paper, we report on these issues through a two-phase user study, including a survey (N = 22) and semi-structured interviews (n = 9) with adults aged 65+. We found that while 81.82% of our participants are aware of security features like “two-factor authentication (2FA)” and encryption, 63.64% express serious concerns about unauthorized access to sensitive health data. Only 13.64% feel confident in existing protections, citing confusion over “data sharing policies” and frustration with “complex security settings” which lead to distrust and anxiety. To cope, our participants adopt various strategies, such as relying on family or professional support and limiting feature usage leading to disengagement. Thus, we recommend “adaptive security mechanisms,” simplified interfaces, and real-time transparency notifications to foster trust and ensure “privacy and security by design” in IoT health systems for older adults.2025SSSuleiman Saka et al.University of Denver, Computer ScienceAging-Friendly Technology DesignPrivacy by Design & User ControlSmart Home Privacy & SecurityCHI
Systemization of Knowledge (SoK): Goals, Coverage, and Evaluation in Cybersecurity and Privacy GamesThis paper systematized existing knowledge on cybersecurity and privacy game-based approaches, exploring their goals, scope, and evaluation methods. Our review of 93 academic papers revealed that these approaches serve multiple purposes and target diverse player types. We identified 11 key aspects of cybersecurity and privacy that these approaches addressed, such as threats, defensive strategies, and data privacy. Additionally, we analyzed the effectiveness evaluation methods of these approaches, emphasizing the connections between evaluation techniques, types of data used, and their alignment with the approaches' goals. We also summarized the aspects of user experience evaluated in the literature and the types of questions used to capture these experiences. Reflecting on these methods, we provide guidance for future research and practice in designing and evaluating game-based approaches. Finally, we identify key gaps and propose opportunities to enhance user understanding, foster adaptability, and address emerging cybersecurity and privacy challenges.2025YHYue Huang et al.CSIRO's Data61Accessible GamingCybersecurity Training & AwarenessDark Patterns RecognitionCHI
"We Have No Security Concerns": Understanding the Privacy-Security Nexus in Telehealth for Audiologists and Speech-Language PathologistsThe advent of telehealth revolutionizes healthcare by enabling remote consultations, yet poses complex security and privacy challenges. These are often acutely felt by lower-resourced, allied-healthcare practices. To address this, our study focuses on audiologists and speech-language pathologists (SLPs) in private practice settings, often characterized by limited information technology resources. Over the course of six months, we conducted semi-structured interviews with ten audiologists and ten SLPs to understand their telehealth experiences and concerns. Key findings reveal a diversity of opinions on technology trustworthiness, data security concerns, implemented security protocols, and patient behaviors. Given the nature of the medical practitioners' primary work, participants expressed varied concerns about data breaches and platform vulnerabilities, yet trusted third-party services like Zoom due to inadequate expertise and time to evaluate security protocols. This work underscores the imperative of bridging the technology-healthcare gap to foster secure, patient/provider-centered telehealth as the prevailing practice. It also emphasizes the need to synergize security, privacy, and usability to securely deliver care through telehealth.2024FTFaiza Tazi et al.University of DenverTelemedicine & Remote Patient MonitoringPrivacy by Design & User ControlSmart Home Privacy & SecurityCHI
Cybersecurity, Safety, & Privacy Concerns of Student Support Structure for Information and Communication Technologies in Online EducationCOVID-19 has created a dramatic paradigm shift in education methods, which forced schools and universities to abandon the usual in-person education in favor of online education modules. Such a shift has extended the time and use of internet communication technologies (ICTs) by most, making online education platforms primary cyberattack targets. In this context, this study aims to explore parents, educators, and other caregivers concerns about online education and the cybersecurity of their children and students. Thus, we conducted a survey-based study with 983 participants recruited through popular crowdsourcing platforms: MTurk and Prolific. Our results indicate a lack of technical support following digital safety that the students received with the sudden transition to online education. Over 31% of our participants claimed that they never or rarely receive any communication related to cyber safety from the students' educational institutions. Additionally, our analysis shows that the student support structure needs to be trained and informed on the threats faced by children online and on the ways to mitigate these threats. Finally, we find a statistically significant difference between parents, educators, and other caregivers regarding their perceptions of children's online privacy and cyber safety. We conclude this work by providing actionable recommendations to promote privacy-preserving and digitally secure online education.2023FTFaiza Tazi et al.Security and PrivacyCSCW
What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing DecisionsPhishing attacks, in which deceptive messages purporting to be from a legitimate contact are used to trick recipients and acquire sensitive information for the purposes of committing fraud, are a substantial and growing problem for organizations. IT departments and professionals may put in place a variety of institutional responses to thwart such attacks, but an organization’s susceptibility to phishing also depends on the decisions and actions of individual employees. These employees may have little phishing expertise but still need to react to such attempts on a daily basis. Based on 24 semi-structured interviews with mid-career office workers (70.8% women, averaging 44 years old, with a bachelor’s degree or more) at two universities in the midwestern United States, we find that employees self-describe a wide range of levels of awareness of, and confidence, competency and investment in, the organization’s proscribed anti-phishing policies and practices. These employees also describe variation in the ways they would prefer to increase their perceived performance levels in all of these areas. In this paper, we argue that in order to empower employees to be better collaborators in an organization’s anti-phishing efforts, organizations should embrace a range of efforts akin to the range of expertise among the users themselves. We make four such empowering recommendations for organizations to consider incorporating into their existing anti-phishing policies and practices, including suggestions to 1) embrace educating non-expert users more fully on organizational processes and consequences, 2) provide employees with a standing one-to-one communication channel between them and an IT phishing point-of-contact, 3) keep employees in the loop once phishing reports are made, and 4) avoid testing employees with "gotcha" assessments.2023ATAnne Clara Tally et al.Security and TrustCSCW
Child-Robot Interaction to Integrate Reflective Storytelling Into Early Childhood Creative PlayWhen young children create, they are exploring their emerging skills. And when young children reflect, they are transforming their learning experiences. Yet early childhood play environments often lack toys and tools to scaffold reflection. In this work, we design a stuffed animal robot to converse with young children and prompt creative reflection through open-ended storytelling. We also contribute six design goals for child-robot interaction design. In a hybrid Wizard of Oz study, 33 children ages 4-5 years old across 10 U.S. states engaged in creative play then conversed with a stuffed animal robot to tell a story about their creation. By analyzing children’s story transcripts, we discover four approaches that young children use when responding to the robot’s reflective prompting: Imaginative, Narrative Recall, Process-Oriented, and Descriptive Labeling. Across these approaches, we find that open-ended child-robot interaction can integrate personally meaningful reflective storytelling into diverse creative play practices.2021LHLayne Jackson Hubbard et al.Early Childhood Education TechnologySocial Robot InteractionC&C
Street-Level Realities of Data Practices in Homeless Services ProvisionQuantification and standardization of concepts like risk and vulnerability are increasingly being used in high-stakes, client-facing social services, also presenting the potential for data-driven tools for decision-making in this context. These trends necessitate an understanding of the role of quantitative data in the work of street-level decision-makers in social services. We present a qualitative study of existing data practices and perceptions of potential data-driven tools in housing allocation, engaging the perspective of service providers and policymakers in homeless services in a large urban county in the United States. Our findings highlight participants' concerns around centering clients' choices and ensuring integrity in a resource-constrained, high-stakes context. We also highlight differences between the perspectives of policymakers and service providers on standardization and fairness in the decision-making process. We discuss how use of and policies around data in social services need to consider the importance of the relationships that client-facing service providers have with other workers in the organization, with their work, and with clients.2019NKNaveena Karusala et al.AI and FairnessCSCW