scispace - formally typeset
Open AccessProceedings ArticleDOI

Keeping a Low Profile?: Technology, Risk and Privacy among Undocumented Immigrants

TLDR
It is found that while participants act to address offline threats, this vigilance does not translate to their online activities, and their technology use is shaped by needs and benefits rather than risk perceptions.
Abstract
Undocumented immigrants in the United States face risks of discrimination, surveillance, and deportation. We investigate their technology use, risk perceptions, and protective strategies relating to their vulnerability. Through semi-structured interviews with Latinx undocumented immigrants, we find that while participants act to address offline threats, this vigilance does not translate to their online activities. Their technology use is shaped by needs and benefits rather than risk perceptions. While our participants are concerned about identity theft and privacy generally, and some raise concerns about online harassment, their understanding of government surveillance risks is vague and met with resignation. We identify tensions among self-expression, group privacy, and self-censorship related to their immigration status, as well as strong trust in service providers. Our findings have implications for digital literacy education, privacy and security interfaces, and technology design in general. Even minor design decisions can substantially affect exposure risks and well-being for such vulnerable communities.

read more

Citations
More filters
Journal ArticleDOI

Learning a New Land: Immigrant Students in American Society

TL;DR: Carola Suarez-Orozco and Irina Todorova as discussed by the authors, Learning a New Land: Immigrant Students in American Society Cambridge, MA: Harvard University Press, 2008, 440 pp., $29.95 hb.
Journal ArticleDOI

No Place to Hide: Edward Snowden, The NSA, and the U.S. Surveillance State

TL;DR: In the United States, there is nothing new about whistle-blowers who provided public knowledge of government-led surveillance as mentioned in this paper, and there is also no new information about the source of the leaks.
Journal ArticleDOI

Contextual facilitators and barriers influencing the continued use of mobile payment services in a developing country: insights from adopters in India

TL;DR: A research model is developed to identify the contextual facilitators and barriers driving mobile payment usage intention and its importance in understanding the technology’s sustenance and its future in enabling financial inclusion.
References
More filters
Journal ArticleDOI

An Integrative Model Of Organizational Trust

TL;DR: In this paper, a definition of trust and a model of its antecedents and outcomes are presented, which integrate research from multiple disciplines and differentiate trust from similar constructs, and several research propositions based on the model are presented.
Journal ArticleDOI

Perception of risk.

Paul Slovic
- 17 Apr 1987 - 
TL;DR: This research aims to aid risk analysis and policy-making by providing a basis for understanding and anticipating public responses to hazards and improving the communication of risk information among lay people, technical experts, and decision-makers.
ReportDOI

Tor: the second-generation onion router

TL;DR: This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points.
Proceedings ArticleDOI

Information revelation and privacy in online social networks

TL;DR: This paper analyzes the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges and evaluates the amount of information they disclose and study their usage of the site's privacy settings.
MonographDOI

Privacy in Context: Technology, Policy, and the Integrity of Social Life

TL;DR: Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social context, be it workplace, health care, schools, or among family and friends.
Related Papers (5)