Speculative Vulnerability: Uncovering the Temporalities of Vulnerability in People's Experiences of the Pandemic

Pandemic-tracking apps may form a future infrastructure for public health surveillance. Yet, there has been relatively little exploration of the potential societal implications of such an infrastructure. In semi-structured interviews with 23 participants from India, the Middle East and North Africa...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Proceedings of the ACM on human-computer interaction 2022-11, Vol.6 (CSCW2), p.1-27, Article 485
Hauptverfasser: Seberger, John S., Obi, Ike, Loukil, Mariem, Liao, William, Wild, David J., Patil, Sameer
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 27
container_issue CSCW2
container_start_page 1
container_title Proceedings of the ACM on human-computer interaction
container_volume 6
creator Seberger, John S.
Obi, Ike
Loukil, Mariem
Liao, William
Wild, David J.
Patil, Sameer
description Pandemic-tracking apps may form a future infrastructure for public health surveillance. Yet, there has been relatively little exploration of the potential societal implications of such an infrastructure. In semi-structured interviews with 23 participants from India, the Middle East and North Africa (MENA), and the United States, we discussed attitudes and preferences regarding the deployment of apps that support contact tracing to contain the spread of COVID-19. Through interpretive analysis, we examined the relationship between persistent discomfort and vulnerability when using such apps. Such an examination yielded three temporal forms of vulnerability: real, anticipatory, and speculative. By identifying and defining the temporalities of vulnerability through an analysis of people's pandemic-related thoughts and experiences, we develop the overlapping discourses of humanistic infrastructure studies and infrastructural speculation. In doing so, we explore the concept of vulnerability itself and present implications for the study of vulnerability in Human-Computer Interaction (HCI) and for the oversight of app-based public health surveillance.
doi_str_mv 10.1145/3555586
format Article
fullrecord <record><control><sourceid>acm_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1145_3555586</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3555586</sourcerecordid><originalsourceid>FETCH-LOGICAL-a516-ced18c9e90ded8128744bc727b0371547a5d8bfdb78fa6be9c3afc11235980af3</originalsourceid><addsrcrecordid>eNpNj81LAzEUxIMoWGrxrCdvnlbfS_I2yVGKX1DoocXr8vIFK1stSSv0v7fSKs5lBubHwAhxiXCHqOle0V62PREjSUY1gFqe_svnYlLrOwCgJSAnR-JqsU5hO_Cm_0o3b9vhIxX2_dBvdhfiLPNQ0-ToY7F8elxOX5rZ_Pl1-jBrmLBtQopog0sOYooWpTVa-2Ck8aAMkjZM0focvbGZW59cUJwDolTkLHBWY3F7mA3ls9aScrcu_YrLrkPofj51x0978vpAclj9Qb_lN6fXRPM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Speculative Vulnerability: Uncovering the Temporalities of Vulnerability in People's Experiences of the Pandemic</title><source>ACM Digital Library Complete</source><creator>Seberger, John S. ; Obi, Ike ; Loukil, Mariem ; Liao, William ; Wild, David J. ; Patil, Sameer</creator><creatorcontrib>Seberger, John S. ; Obi, Ike ; Loukil, Mariem ; Liao, William ; Wild, David J. ; Patil, Sameer</creatorcontrib><description>Pandemic-tracking apps may form a future infrastructure for public health surveillance. Yet, there has been relatively little exploration of the potential societal implications of such an infrastructure. In semi-structured interviews with 23 participants from India, the Middle East and North Africa (MENA), and the United States, we discussed attitudes and preferences regarding the deployment of apps that support contact tracing to contain the spread of COVID-19. Through interpretive analysis, we examined the relationship between persistent discomfort and vulnerability when using such apps. Such an examination yielded three temporal forms of vulnerability: real, anticipatory, and speculative. By identifying and defining the temporalities of vulnerability through an analysis of people's pandemic-related thoughts and experiences, we develop the overlapping discourses of humanistic infrastructure studies and infrastructural speculation. In doing so, we explore the concept of vulnerability itself and present implications for the study of vulnerability in Human-Computer Interaction (HCI) and for the oversight of app-based public health surveillance.</description><identifier>ISSN: 2573-0142</identifier><identifier>EISSN: 2573-0142</identifier><identifier>DOI: 10.1145/3555586</identifier><language>eng</language><publisher>New York, NY, USA: ACM</publisher><subject>Computing / technology policy ; Empirical studies in HCI ; Empirical studies in ubiquitous and mobile computing ; Government technology policy ; Governmental regulations ; HCI design and evaluation methods ; HCI theory, concepts and models ; Human and societal aspects of security and privacy ; Human computer interaction (HCI) ; Human-centered computing ; Privacy policies ; Security and privacy ; Social and professional topics ; Social aspects of security and privacy ; Ubiquitous and mobile computing</subject><ispartof>Proceedings of the ACM on human-computer interaction, 2022-11, Vol.6 (CSCW2), p.1-27, Article 485</ispartof><rights>Owner/Author</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-a516-ced18c9e90ded8128744bc727b0371547a5d8bfdb78fa6be9c3afc11235980af3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://dl.acm.org/doi/pdf/10.1145/3555586$$EPDF$$P50$$Gacm$$Hfree_for_read</linktopdf><link.rule.ids>314,777,781,2276,27905,27906,40177,75977</link.rule.ids></links><search><creatorcontrib>Seberger, John S.</creatorcontrib><creatorcontrib>Obi, Ike</creatorcontrib><creatorcontrib>Loukil, Mariem</creatorcontrib><creatorcontrib>Liao, William</creatorcontrib><creatorcontrib>Wild, David J.</creatorcontrib><creatorcontrib>Patil, Sameer</creatorcontrib><title>Speculative Vulnerability: Uncovering the Temporalities of Vulnerability in People's Experiences of the Pandemic</title><title>Proceedings of the ACM on human-computer interaction</title><addtitle>ACM PACMHCI</addtitle><description>Pandemic-tracking apps may form a future infrastructure for public health surveillance. Yet, there has been relatively little exploration of the potential societal implications of such an infrastructure. In semi-structured interviews with 23 participants from India, the Middle East and North Africa (MENA), and the United States, we discussed attitudes and preferences regarding the deployment of apps that support contact tracing to contain the spread of COVID-19. Through interpretive analysis, we examined the relationship between persistent discomfort and vulnerability when using such apps. Such an examination yielded three temporal forms of vulnerability: real, anticipatory, and speculative. By identifying and defining the temporalities of vulnerability through an analysis of people's pandemic-related thoughts and experiences, we develop the overlapping discourses of humanistic infrastructure studies and infrastructural speculation. In doing so, we explore the concept of vulnerability itself and present implications for the study of vulnerability in Human-Computer Interaction (HCI) and for the oversight of app-based public health surveillance.</description><subject>Computing / technology policy</subject><subject>Empirical studies in HCI</subject><subject>Empirical studies in ubiquitous and mobile computing</subject><subject>Government technology policy</subject><subject>Governmental regulations</subject><subject>HCI design and evaluation methods</subject><subject>HCI theory, concepts and models</subject><subject>Human and societal aspects of security and privacy</subject><subject>Human computer interaction (HCI)</subject><subject>Human-centered computing</subject><subject>Privacy policies</subject><subject>Security and privacy</subject><subject>Social and professional topics</subject><subject>Social aspects of security and privacy</subject><subject>Ubiquitous and mobile computing</subject><issn>2573-0142</issn><issn>2573-0142</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNpNj81LAzEUxIMoWGrxrCdvnlbfS_I2yVGKX1DoocXr8vIFK1stSSv0v7fSKs5lBubHwAhxiXCHqOle0V62PREjSUY1gFqe_svnYlLrOwCgJSAnR-JqsU5hO_Cm_0o3b9vhIxX2_dBvdhfiLPNQ0-ToY7F8elxOX5rZ_Pl1-jBrmLBtQopog0sOYooWpTVa-2Ck8aAMkjZM0focvbGZW59cUJwDolTkLHBWY3F7mA3ls9aScrcu_YrLrkPofj51x0978vpAclj9Qb_lN6fXRPM</recordid><startdate>20221111</startdate><enddate>20221111</enddate><creator>Seberger, John S.</creator><creator>Obi, Ike</creator><creator>Loukil, Mariem</creator><creator>Liao, William</creator><creator>Wild, David J.</creator><creator>Patil, Sameer</creator><general>ACM</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20221111</creationdate><title>Speculative Vulnerability</title><author>Seberger, John S. ; Obi, Ike ; Loukil, Mariem ; Liao, William ; Wild, David J. ; Patil, Sameer</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a516-ced18c9e90ded8128744bc727b0371547a5d8bfdb78fa6be9c3afc11235980af3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computing / technology policy</topic><topic>Empirical studies in HCI</topic><topic>Empirical studies in ubiquitous and mobile computing</topic><topic>Government technology policy</topic><topic>Governmental regulations</topic><topic>HCI design and evaluation methods</topic><topic>HCI theory, concepts and models</topic><topic>Human and societal aspects of security and privacy</topic><topic>Human computer interaction (HCI)</topic><topic>Human-centered computing</topic><topic>Privacy policies</topic><topic>Security and privacy</topic><topic>Social and professional topics</topic><topic>Social aspects of security and privacy</topic><topic>Ubiquitous and mobile computing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Seberger, John S.</creatorcontrib><creatorcontrib>Obi, Ike</creatorcontrib><creatorcontrib>Loukil, Mariem</creatorcontrib><creatorcontrib>Liao, William</creatorcontrib><creatorcontrib>Wild, David J.</creatorcontrib><creatorcontrib>Patil, Sameer</creatorcontrib><collection>CrossRef</collection><jtitle>Proceedings of the ACM on human-computer interaction</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Seberger, John S.</au><au>Obi, Ike</au><au>Loukil, Mariem</au><au>Liao, William</au><au>Wild, David J.</au><au>Patil, Sameer</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Speculative Vulnerability: Uncovering the Temporalities of Vulnerability in People's Experiences of the Pandemic</atitle><jtitle>Proceedings of the ACM on human-computer interaction</jtitle><stitle>ACM PACMHCI</stitle><date>2022-11-11</date><risdate>2022</risdate><volume>6</volume><issue>CSCW2</issue><spage>1</spage><epage>27</epage><pages>1-27</pages><artnum>485</artnum><issn>2573-0142</issn><eissn>2573-0142</eissn><abstract>Pandemic-tracking apps may form a future infrastructure for public health surveillance. Yet, there has been relatively little exploration of the potential societal implications of such an infrastructure. In semi-structured interviews with 23 participants from India, the Middle East and North Africa (MENA), and the United States, we discussed attitudes and preferences regarding the deployment of apps that support contact tracing to contain the spread of COVID-19. Through interpretive analysis, we examined the relationship between persistent discomfort and vulnerability when using such apps. Such an examination yielded three temporal forms of vulnerability: real, anticipatory, and speculative. By identifying and defining the temporalities of vulnerability through an analysis of people's pandemic-related thoughts and experiences, we develop the overlapping discourses of humanistic infrastructure studies and infrastructural speculation. In doing so, we explore the concept of vulnerability itself and present implications for the study of vulnerability in Human-Computer Interaction (HCI) and for the oversight of app-based public health surveillance.</abstract><cop>New York, NY, USA</cop><pub>ACM</pub><doi>10.1145/3555586</doi><tpages>27</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2573-0142
ispartof Proceedings of the ACM on human-computer interaction, 2022-11, Vol.6 (CSCW2), p.1-27, Article 485
issn 2573-0142
2573-0142
language eng
recordid cdi_crossref_primary_10_1145_3555586
source ACM Digital Library Complete
subjects Computing / technology policy
Empirical studies in HCI
Empirical studies in ubiquitous and mobile computing
Government technology policy
Governmental regulations
HCI design and evaluation methods
HCI theory, concepts and models
Human and societal aspects of security and privacy
Human computer interaction (HCI)
Human-centered computing
Privacy policies
Security and privacy
Social and professional topics
Social aspects of security and privacy
Ubiquitous and mobile computing
title Speculative Vulnerability: Uncovering the Temporalities of Vulnerability in People's Experiences of the Pandemic
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T08%3A55%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-acm_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Speculative%20Vulnerability:%20Uncovering%20the%20Temporalities%20of%20Vulnerability%20in%20People's%20Experiences%20of%20the%20Pandemic&rft.jtitle=Proceedings%20of%20the%20ACM%20on%20human-computer%20interaction&rft.au=Seberger,%20John%20S.&rft.date=2022-11-11&rft.volume=6&rft.issue=CSCW2&rft.spage=1&rft.epage=27&rft.pages=1-27&rft.artnum=485&rft.issn=2573-0142&rft.eissn=2573-0142&rft_id=info:doi/10.1145/3555586&rft_dat=%3Cacm_cross%3E3555586%3C/acm_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true