scispace - formally typeset
Search or ask a question

Showing papers by "Pamela Briggs published in 2018"


Proceedings ArticleDOI
19 Apr 2018
TL;DR: Problem making is discussed as a historically and politically contingent process that allow researchers to connect data and design according to certain moral and ethical principles.
Abstract: HCI draws on a variety of traditions but recently there have been calls to consolidate contributions around the problems researchers set out to solve. However, with this comes the assumption that problems are tractable and certain, rather than constructed and framed by researchers. We take as a case study a Tumblr community of teen shoplifters who post on how to steal from stores, discuss shoplifting as political resistance, and share jokes and stories about the practice. We construct three different "problems" and imagine studies that might result from applying different design approaches: Design Against Crime; Critical Design and Value Sensitive Design. Through these studies we highlight how interpretations of the same data can lead to radically different design responses. We conclude by discussing problem making as a historically and politically contingent process that allow researchers to connect data and design according to certain moral and ethical principles.

17 citations


Proceedings Article
12 Aug 2018
TL;DR: It is shown how the Cybersurvival Task could be used to detect ‘shadow security’ cultures within an organisation and how a group discussion about the importance of different cyber behaviours led to the weakening of staff’s cybersecurity positions.
Abstract: Despite increased awareness of cybersecurity incidents and consequences, organisations still struggle to convince employees to comply with information security policies and engage in effective cyber prevention Here we introduce and evaluateThe Cybersurvival Task, a ranking task that highlights cybersecurity misconceptions amongst employees and that serves as a reflective exercise for security experts We describe an initial deployment and refinement of the task in one organisation and a second deployment and evaluation in another We show how the Cybersurvival Task could be used to detect ‘shadow security’ cultures within an organisation and illustrate how a group discussion about the importance of different cyber behaviours led to the weakening of staff’s cybersecurity positions (ie more disagreement with experts) We also discuss its use as a tool to inform organisational policy-making and the design of campaigns and training events, ensuring that they are better tailored to specific staff groups and designed to target problematic behaviours

12 citations


Journal ArticleDOI
TL;DR: It is argued that remediation can contribute to the understanding of digital self and the design implications for new SM systems designed to support self-reflection are considered.
Abstract: We explored the transformation of social media content into three radically different formats; a book, a triptych of photographs and film.Using interviews, we investigated users' responses to their remediated data.Our findings were used to develop a digital curation process to assist the development of different tools for social media analysis and display.Our paper establishes design implications to aid reflection on social media use through remediation. Increasingly our digital traces are providing new opportunities for self-reflection. In particular, social media (SM) data can be used to support self-reflection, but to what extent is this affected by the form in which SM data is presented? Here, we present three studies where we work with individuals to transform or remediate their SM data into a physical book, a photographic triptych and a film. We describe the editorial decisions that take place as part of the remediation process and show how the transformations allow users to reflect on their digital identity in new ways. We discuss our findings in terms of the application of Goffman's (1959) self-presentation theories to the SM context, showing that a fluid rather than bounded interpretation of our social media spaces may be appropriate. We argue that remediation can contribute to the understanding of digital self and consider the design implications for new SM systems designed to support self-reflection.

9 citations


Journal ArticleDOI
TL;DR: It is found the act of creating a physical artefact from social media data gave that data new meaning, albeit with notable differences between manual versus automatically generated triptychs.
Abstract: Many social media platforms support the curation of personal digital data, and, more recently, the use of that data for review and reflection. We explored the process of reflection by asking users to create a meaningful ‘triptych’ of photographs drawn from their Facebook accounts. In a first study, we asked participants to manually trawl their own accounts and select three relevant images, which we then framed and used as an interview probe. In a second study, we designed an automated triptych generation system and assessed participants’ experiences of using this system. We conducted qualitative analyses of participant interviews from both studies. Consistent with other ‘slow technology’ work, we found the act of creating a physical artefact from social media data gave that data new meaning, albeit with notable differences between manual versus automatically generated triptychs. We conclude by discussing possible improvements to the design of the automated triptych system.

7 citations



Proceedings ArticleDOI
04 Jul 2018
TL;DR: It was found that users created longer passwords when asked to do so or when given a financial incentive and these longer passwords were harder to guess than passwords created with no instruction.
Abstract: Recent security breaches have highlighted the consequences of reusing passwords across online accounts. Recent guidance on password policies by the UK government recommend an emphasis on password length over an extended character set for generating secure but memorable passwords without cognitive overload. This paper explores the role of three nudges in creating website-specific passwords: financial incentive (present vs absent), length instruction (long password vs no instruction) and stimulus (picture present vs not present). Mechanical Turk workers were asked to create a password in one of these conditions and the resulting passwords were evaluated based on character length, resistance to automated guessing attacks, and time taken to create the password. We found that users created longer passwords when asked to do so or when given a financial incentive and these longer passwords were harder to guess than passwords created with no instruction. Using a picture nudge to support password creation did not lead to passwords that were either longer or more resistant to attacks but did lead to account-specific passwords.

3 citations