TY - GEN
T1 - SoK
T2 - 45th IEEE Symposium on Security and Privacy, SP 2024
AU - Bellini, Rosanna
AU - Tseng, Emily
AU - Warford, Noel
AU - Daffalla, Alaa
AU - Matthews, Tara
AU - Consolvo, Sunny
AU - Woelfer, Jill Palzkill
AU - Gage Kelley, Patrick
AU - Mazurek, Michelle L.
AU - Cuomo, Dana
AU - Dell, Nicola
AU - Ristenpart, Thomas
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - Research involving at-risk users - that is, users who are more likely to experience a digital attack or to be disproportionately affected when harm from such an attack occurs - can pose significant safety challenges to both users and researchers. Nevertheless, pursuing research in computer security & privacy (S&P) is crucial to understanding how to meet the digital-safety needs of at-risk users and to design safer technology for all. To standardize and bolster safer research involving such users, we offer an analysis of 196 academic works to elicit 14 research risks and 36 safety practices used by a growing community of researchers. We pair this inconsistent set of reported safety practices with oral histories from 12 domain experts to contribute scaffolded and consolidated pragmatic guidance that researchers can use to plan, execute, and share safer digital-safety research involving at-risk users. We conclude by suggesting areas for future research regarding the reporting, study, and funding of at-risk user research.
AB - Research involving at-risk users - that is, users who are more likely to experience a digital attack or to be disproportionately affected when harm from such an attack occurs - can pose significant safety challenges to both users and researchers. Nevertheless, pursuing research in computer security & privacy (S&P) is crucial to understanding how to meet the digital-safety needs of at-risk users and to design safer technology for all. To standardize and bolster safer research involving such users, we offer an analysis of 196 academic works to elicit 14 research risks and 36 safety practices used by a growing community of researchers. We pair this inconsistent set of reported safety practices with oral histories from 12 domain experts to contribute scaffolded and consolidated pragmatic guidance that researchers can use to plan, execute, and share safer digital-safety research involving at-risk users. We conclude by suggesting areas for future research regarding the reporting, study, and funding of at-risk user research.
KW - at-risk users
KW - digital-safety
KW - privacy
KW - research risks
KW - security
UR - http://www.scopus.com/inward/record.url?scp=85182743967&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85182743967&partnerID=8YFLogxK
U2 - 10.1109/SP54263.2024.00071
DO - 10.1109/SP54263.2024.00071
M3 - Conference contribution
AN - SCOPUS:85182743967
T3 - Proceedings - IEEE Symposium on Security and Privacy
SP - 635
EP - 654
BT - Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 20 May 2024 through 23 May 2024
ER -