Speculative Vulnerability: Uncovering the Temporalities of Vulnerability in People's Experiences of the Pandemic
Pandemic-tracking apps may form a future infrastructure for public health surveillance. Yet, there has been relatively little exploration of the potential societal implications of such an infrastructure. In semi-structured interviews with 23 participants from India, the Middle East and North Africa...
Gespeichert in:
Veröffentlicht in: | Proceedings of the ACM on human-computer interaction 2022-11, Vol.6 (CSCW2), p.1-27, Article 485 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 27 |
---|---|
container_issue | CSCW2 |
container_start_page | 1 |
container_title | Proceedings of the ACM on human-computer interaction |
container_volume | 6 |
creator | Seberger, John S. Obi, Ike Loukil, Mariem Liao, William Wild, David J. Patil, Sameer |
description | Pandemic-tracking apps may form a future infrastructure for public health surveillance. Yet, there has been relatively little exploration of the potential societal implications of such an infrastructure. In semi-structured interviews with 23 participants from India, the Middle East and North Africa (MENA), and the United States, we discussed attitudes and preferences regarding the deployment of apps that support contact tracing to contain the spread of COVID-19. Through interpretive analysis, we examined the relationship between persistent discomfort and vulnerability when using such apps. Such an examination yielded three temporal forms of vulnerability: real, anticipatory, and speculative. By identifying and defining the temporalities of vulnerability through an analysis of people's pandemic-related thoughts and experiences, we develop the overlapping discourses of humanistic infrastructure studies and infrastructural speculation. In doing so, we explore the concept of vulnerability itself and present implications for the study of vulnerability in Human-Computer Interaction (HCI) and for the oversight of app-based public health surveillance. |
doi_str_mv | 10.1145/3555586 |
format | Article |
fullrecord | <record><control><sourceid>acm_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1145_3555586</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3555586</sourcerecordid><originalsourceid>FETCH-LOGICAL-a516-ced18c9e90ded8128744bc727b0371547a5d8bfdb78fa6be9c3afc11235980af3</originalsourceid><addsrcrecordid>eNpNj81LAzEUxIMoWGrxrCdvnlbfS_I2yVGKX1DoocXr8vIFK1stSSv0v7fSKs5lBubHwAhxiXCHqOle0V62PREjSUY1gFqe_svnYlLrOwCgJSAnR-JqsU5hO_Cm_0o3b9vhIxX2_dBvdhfiLPNQ0-ToY7F8elxOX5rZ_Pl1-jBrmLBtQopog0sOYooWpTVa-2Ck8aAMkjZM0focvbGZW59cUJwDolTkLHBWY3F7mA3ls9aScrcu_YrLrkPofj51x0978vpAclj9Qb_lN6fXRPM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Speculative Vulnerability: Uncovering the Temporalities of Vulnerability in People's Experiences of the Pandemic</title><source>ACM Digital Library Complete</source><creator>Seberger, John S. ; Obi, Ike ; Loukil, Mariem ; Liao, William ; Wild, David J. ; Patil, Sameer</creator><creatorcontrib>Seberger, John S. ; Obi, Ike ; Loukil, Mariem ; Liao, William ; Wild, David J. ; Patil, Sameer</creatorcontrib><description>Pandemic-tracking apps may form a future infrastructure for public health surveillance. Yet, there has been relatively little exploration of the potential societal implications of such an infrastructure. In semi-structured interviews with 23 participants from India, the Middle East and North Africa (MENA), and the United States, we discussed attitudes and preferences regarding the deployment of apps that support contact tracing to contain the spread of COVID-19. Through interpretive analysis, we examined the relationship between persistent discomfort and vulnerability when using such apps. Such an examination yielded three temporal forms of vulnerability: real, anticipatory, and speculative. By identifying and defining the temporalities of vulnerability through an analysis of people's pandemic-related thoughts and experiences, we develop the overlapping discourses of humanistic infrastructure studies and infrastructural speculation. In doing so, we explore the concept of vulnerability itself and present implications for the study of vulnerability in Human-Computer Interaction (HCI) and for the oversight of app-based public health surveillance.</description><identifier>ISSN: 2573-0142</identifier><identifier>EISSN: 2573-0142</identifier><identifier>DOI: 10.1145/3555586</identifier><language>eng</language><publisher>New York, NY, USA: ACM</publisher><subject>Computing / technology policy ; Empirical studies in HCI ; Empirical studies in ubiquitous and mobile computing ; Government technology policy ; Governmental regulations ; HCI design and evaluation methods ; HCI theory, concepts and models ; Human and societal aspects of security and privacy ; Human computer interaction (HCI) ; Human-centered computing ; Privacy policies ; Security and privacy ; Social and professional topics ; Social aspects of security and privacy ; Ubiquitous and mobile computing</subject><ispartof>Proceedings of the ACM on human-computer interaction, 2022-11, Vol.6 (CSCW2), p.1-27, Article 485</ispartof><rights>Owner/Author</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-a516-ced18c9e90ded8128744bc727b0371547a5d8bfdb78fa6be9c3afc11235980af3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://dl.acm.org/doi/pdf/10.1145/3555586$$EPDF$$P50$$Gacm$$Hfree_for_read</linktopdf><link.rule.ids>314,777,781,2276,27905,27906,40177,75977</link.rule.ids></links><search><creatorcontrib>Seberger, John S.</creatorcontrib><creatorcontrib>Obi, Ike</creatorcontrib><creatorcontrib>Loukil, Mariem</creatorcontrib><creatorcontrib>Liao, William</creatorcontrib><creatorcontrib>Wild, David J.</creatorcontrib><creatorcontrib>Patil, Sameer</creatorcontrib><title>Speculative Vulnerability: Uncovering the Temporalities of Vulnerability in People's Experiences of the Pandemic</title><title>Proceedings of the ACM on human-computer interaction</title><addtitle>ACM PACMHCI</addtitle><description>Pandemic-tracking apps may form a future infrastructure for public health surveillance. Yet, there has been relatively little exploration of the potential societal implications of such an infrastructure. In semi-structured interviews with 23 participants from India, the Middle East and North Africa (MENA), and the United States, we discussed attitudes and preferences regarding the deployment of apps that support contact tracing to contain the spread of COVID-19. Through interpretive analysis, we examined the relationship between persistent discomfort and vulnerability when using such apps. Such an examination yielded three temporal forms of vulnerability: real, anticipatory, and speculative. By identifying and defining the temporalities of vulnerability through an analysis of people's pandemic-related thoughts and experiences, we develop the overlapping discourses of humanistic infrastructure studies and infrastructural speculation. In doing so, we explore the concept of vulnerability itself and present implications for the study of vulnerability in Human-Computer Interaction (HCI) and for the oversight of app-based public health surveillance.</description><subject>Computing / technology policy</subject><subject>Empirical studies in HCI</subject><subject>Empirical studies in ubiquitous and mobile computing</subject><subject>Government technology policy</subject><subject>Governmental regulations</subject><subject>HCI design and evaluation methods</subject><subject>HCI theory, concepts and models</subject><subject>Human and societal aspects of security and privacy</subject><subject>Human computer interaction (HCI)</subject><subject>Human-centered computing</subject><subject>Privacy policies</subject><subject>Security and privacy</subject><subject>Social and professional topics</subject><subject>Social aspects of security and privacy</subject><subject>Ubiquitous and mobile computing</subject><issn>2573-0142</issn><issn>2573-0142</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNpNj81LAzEUxIMoWGrxrCdvnlbfS_I2yVGKX1DoocXr8vIFK1stSSv0v7fSKs5lBubHwAhxiXCHqOle0V62PREjSUY1gFqe_svnYlLrOwCgJSAnR-JqsU5hO_Cm_0o3b9vhIxX2_dBvdhfiLPNQ0-ToY7F8elxOX5rZ_Pl1-jBrmLBtQopog0sOYooWpTVa-2Ck8aAMkjZM0focvbGZW59cUJwDolTkLHBWY3F7mA3ls9aScrcu_YrLrkPofj51x0978vpAclj9Qb_lN6fXRPM</recordid><startdate>20221111</startdate><enddate>20221111</enddate><creator>Seberger, John S.</creator><creator>Obi, Ike</creator><creator>Loukil, Mariem</creator><creator>Liao, William</creator><creator>Wild, David J.</creator><creator>Patil, Sameer</creator><general>ACM</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20221111</creationdate><title>Speculative Vulnerability</title><author>Seberger, John S. ; Obi, Ike ; Loukil, Mariem ; Liao, William ; Wild, David J. ; Patil, Sameer</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a516-ced18c9e90ded8128744bc727b0371547a5d8bfdb78fa6be9c3afc11235980af3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computing / technology policy</topic><topic>Empirical studies in HCI</topic><topic>Empirical studies in ubiquitous and mobile computing</topic><topic>Government technology policy</topic><topic>Governmental regulations</topic><topic>HCI design and evaluation methods</topic><topic>HCI theory, concepts and models</topic><topic>Human and societal aspects of security and privacy</topic><topic>Human computer interaction (HCI)</topic><topic>Human-centered computing</topic><topic>Privacy policies</topic><topic>Security and privacy</topic><topic>Social and professional topics</topic><topic>Social aspects of security and privacy</topic><topic>Ubiquitous and mobile computing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Seberger, John S.</creatorcontrib><creatorcontrib>Obi, Ike</creatorcontrib><creatorcontrib>Loukil, Mariem</creatorcontrib><creatorcontrib>Liao, William</creatorcontrib><creatorcontrib>Wild, David J.</creatorcontrib><creatorcontrib>Patil, Sameer</creatorcontrib><collection>CrossRef</collection><jtitle>Proceedings of the ACM on human-computer interaction</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Seberger, John S.</au><au>Obi, Ike</au><au>Loukil, Mariem</au><au>Liao, William</au><au>Wild, David J.</au><au>Patil, Sameer</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Speculative Vulnerability: Uncovering the Temporalities of Vulnerability in People's Experiences of the Pandemic</atitle><jtitle>Proceedings of the ACM on human-computer interaction</jtitle><stitle>ACM PACMHCI</stitle><date>2022-11-11</date><risdate>2022</risdate><volume>6</volume><issue>CSCW2</issue><spage>1</spage><epage>27</epage><pages>1-27</pages><artnum>485</artnum><issn>2573-0142</issn><eissn>2573-0142</eissn><abstract>Pandemic-tracking apps may form a future infrastructure for public health surveillance. Yet, there has been relatively little exploration of the potential societal implications of such an infrastructure. In semi-structured interviews with 23 participants from India, the Middle East and North Africa (MENA), and the United States, we discussed attitudes and preferences regarding the deployment of apps that support contact tracing to contain the spread of COVID-19. Through interpretive analysis, we examined the relationship between persistent discomfort and vulnerability when using such apps. Such an examination yielded three temporal forms of vulnerability: real, anticipatory, and speculative. By identifying and defining the temporalities of vulnerability through an analysis of people's pandemic-related thoughts and experiences, we develop the overlapping discourses of humanistic infrastructure studies and infrastructural speculation. In doing so, we explore the concept of vulnerability itself and present implications for the study of vulnerability in Human-Computer Interaction (HCI) and for the oversight of app-based public health surveillance.</abstract><cop>New York, NY, USA</cop><pub>ACM</pub><doi>10.1145/3555586</doi><tpages>27</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2573-0142 |
ispartof | Proceedings of the ACM on human-computer interaction, 2022-11, Vol.6 (CSCW2), p.1-27, Article 485 |
issn | 2573-0142 2573-0142 |
language | eng |
recordid | cdi_crossref_primary_10_1145_3555586 |
source | ACM Digital Library Complete |
subjects | Computing / technology policy Empirical studies in HCI Empirical studies in ubiquitous and mobile computing Government technology policy Governmental regulations HCI design and evaluation methods HCI theory, concepts and models Human and societal aspects of security and privacy Human computer interaction (HCI) Human-centered computing Privacy policies Security and privacy Social and professional topics Social aspects of security and privacy Ubiquitous and mobile computing |
title | Speculative Vulnerability: Uncovering the Temporalities of Vulnerability in People's Experiences of the Pandemic |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T08%3A55%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-acm_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Speculative%20Vulnerability:%20Uncovering%20the%20Temporalities%20of%20Vulnerability%20in%20People's%20Experiences%20of%20the%20Pandemic&rft.jtitle=Proceedings%20of%20the%20ACM%20on%20human-computer%20interaction&rft.au=Seberger,%20John%20S.&rft.date=2022-11-11&rft.volume=6&rft.issue=CSCW2&rft.spage=1&rft.epage=27&rft.pages=1-27&rft.artnum=485&rft.issn=2573-0142&rft.eissn=2573-0142&rft_id=info:doi/10.1145/3555586&rft_dat=%3Cacm_cross%3E3555586%3C/acm_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |