{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:49:00Z","timestamp":1776109740496,"version":"3.50.1"},"reference-count":67,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:00:00Z","timestamp":1746144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,5,2]]},"abstract":"<jats:p>Individually-experienced privacy harms are often difficult to demonstrate and quantify, which impedes efforts for their redress. Their effects often appear small and are inconsistently documented, and they only become more obvious when aggregated over time and across populations. Taking a design fiction approach, we explore the design requirements and cultural ideals of a government-run system that empowers people to collectively report on and make sense of experiences of privacy harm from online behavioral advertising. Through the use of fictional inquiry, story completion, and comicboarding methods, delivered in an online survey with 50 participants, we found that participants had detailed conceptions of the user experience of such a tool, but wanted assurance that their labor and personal data would not be exploited further by the government if they contributed evidence of harm. We extrapolate these design insights to government-supported complaint-reporting platforms in other domains, finding multiple common design gaps that might disincentivize people to report experiences of harm, be they privacy-related or otherwise.<\/jats:p>","DOI":"10.1145\/3710961","type":"journal-article","created":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T01:35:05Z","timestamp":1746236105000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Design(ing) Fictions for Collective Civic Reporting of Privacy Harms"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3628-862X","authenticated-orcid":false,"given":"Yuxi","family":"Wu","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA and Northeastern University, Boston, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1362-554X","authenticated-orcid":false,"given":"William","family":"Agnew","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5209-7380","authenticated-orcid":false,"given":"W. Keith","family":"Edwards","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9073-8054","authenticated-orcid":false,"given":"Sauvik","family":"Das","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,5,2]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359301"},{"key":"e_1_2_1_2_1","volume-title":"Harvard Journal of Law and Technology","volume":"2","author":"Arsht Andrew","year":"2018","unstructured":"Andrew Arsht and Daniel Etcovitch. 2018. The human cost of online content moderation. Harvard Journal of Law and Technology, Vol. 2 (2018)."},{"key":"e_1_2_1_3_1","volume-title":"Americans and privacy: Concerned, confused and feeling lack of control over their personal information","author":"Auxier Brooke","year":"2019","unstructured":"Brooke Auxier, Lee Rainie, Monica Anderson, Andrew Perrin, Madhu Kumar, and Erica Turner. 2019. Americans and privacy: Concerned, confused and feeling lack of control over their personal information. Pew Research Center (2019)."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.2753\/JOA0091-3367410105"},{"key":"e_1_2_1_5_1","unstructured":"Alexander Ball. 2012. Review of data management lifecycle models. (2012)."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.22230\/cjc.2021v46n3a3815"},{"key":"e_1_2_1_7_1","volume-title":"Data-driven elections: Implications and challenges for democratic societies. Internet policy review","author":"Bennett Colin J","year":"2019","unstructured":"Colin J Bennett and David Lyon. 2019. Data-driven elections: Implications and challenges for democratic societies. Internet policy review, Vol. 8, 4 (2019)."},{"key":"e_1_2_1_8_1","volume-title":"Design fiction: A short essay on design, science, fact, and fiction. Machine Learning and the City: Applications in Architecture and Urban Design","author":"Bleecker Julian","year":"2022","unstructured":"Julian Bleecker. 2022. Design fiction: A short essay on design, science, fact, and fiction. Machine Learning and the City: Applications in Architecture and Urban Design (2022), 561--578."},{"key":"e_1_2_1_9_1","volume-title":"Reflecting on reflexive thematic analysis. Qualitative research in sport, exercise and health","author":"Braun Virginia","year":"2019","unstructured":"Virginia Braun and Victoria Clarke. 2019. Reflecting on reflexive thematic analysis. Qualitative research in sport, exercise and health, Vol. 11, 4 (2019), 589--597."},{"key":"e_1_2_1_10_1","first-page":"1131","article-title":"The boundaries of privacy harm","volume":"86","author":"Calo Ryan","year":"2011","unstructured":"Ryan Calo. 2011. The boundaries of privacy harm. Ind. LJ, Vol. 86 (2011), 1131.","journal-title":"Ind. LJ"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395479"},{"key":"e_1_2_1_12_1","volume-title":"Americans' views of government: Decades of distrust, enduring support for its role","author":"Pew Research Center","year":"2022","unstructured":"Pew Research Center. 2022. Americans' views of government: Decades of distrust, enduring support for its role. Pew Research Center (2022)."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287587"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3171221.3171244"},{"key":"e_1_2_1_15_1","volume-title":"Influence: Science and practice.","author":"Cialdini Robert B","year":"2009","unstructured":"Robert B Cialdini. 2009. Influence: Science and practice. Vol. 4. Pearson education Boston, MA."},{"key":"e_1_2_1_16_1","first-page":"793","article-title":"Privacy harms","volume":"102","author":"Citron Danielle Keats","year":"2022","unstructured":"Danielle Keats Citron and Daniel J Solove. 2022. Privacy harms. BUL Rev., Vol. 102 (2022), 793.","journal-title":"BUL Rev."},{"key":"e_1_2_1_17_1","volume-title":"Editor","author":"Clarke Victoria","unstructured":"Victoria Clarke, Virginia Braun, Hannah Frith, and Naomi Moller. 2019. Editorial introduction to the special issue: Using story completion methods in qualitative research. , 20 pages."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445341"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716663566"},{"key":"e_1_2_1_20_1","volume-title":"What does a critical data studies look like, and why do we care? Seven points for a critical approach to 'big data","author":"Dalton Craig","year":"2014","unstructured":"Craig Dalton and Jim Thatcher. 2014. What does a critical data studies look like, and why do we care? Seven points for a critical approach to 'big data'. Society and Space, Vol. 29 (2014)."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/24694452.2018.1470924"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/15710880701500187"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555102"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 1549--1566","author":"Golla Maximilian","year":"2018","unstructured":"Maximilian Golla, Miranda Wei, Juliette Hainline, Lydia Filipe, Markus D''urmuth, Elissa Redmiles, and Blase Ur. 2018. ''What was that site doing with my Facebook password?'' Designing Password-Reuse Notifications. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 1549--1566."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511265.3550450"},{"key":"e_1_2_1_26_1","unstructured":"Ashley Gorski. 2022. The Biden Administration's SIGINT Executive Order part II. https:\/\/www.justsecurity.org\/83927\/the-biden-administrations-sigint-executive-order-part-ii\/"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376415"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702255"},{"key":"e_1_2_1_29_1","volume-title":"Citizen relationship management in local governments: The potential of 311 for public service delivery. Beyond bureaucracy: Towards sustainable governance informatisation","author":"Hartmann Sarah","year":"2017","unstructured":"Sarah Hartmann, Agnes Mainka, and Wolfgang G Stock. 2017. Citizen relationship management in local governments: The potential of 311 for public service delivery. Beyond bureaucracy: Towards sustainable governance informatisation (2017), 337--353."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998248"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1517797113"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025588"},{"key":"e_1_2_1_33_1","volume-title":"Designing Interactive Systems Conference","author":"M\u00f8ller Naja Holten","year":"2021","unstructured":"Naja Holten M\u00f8ller, Trine Rask Nielsen, and Christopher Le Dantec. 2021. Work of the Unemployed: An inquiry into individuals' experience of data usage in public services and possibilities for their agency. In Designing Interactive Systems Conference 2021. 438--448."},{"key":"e_1_2_1_34_1","volume-title":"Hutnik and Laura Riposo VanDruff","author":"Alysa","year":"2021","unstructured":"Alysa Z. Hutnik and Laura Riposo VanDruff. 2021. ''Not Outgunned, Just Outmanned'' (For Now): Senate Hearing on Privacy Law Addresses Under-resourced FTC. https:\/\/www.kelleydrye.com\/viewpoints\/blogs\/ad-law-access\/not-outgunned-just-outmanned-for-now-senate-hearing-on-privacy-law-addresses-under-resourced-ftc"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858592"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3463910"},{"key":"e_1_2_1_37_1","volume-title":"The Inadequacy of the","author":"Korff Douwe","year":"2022","unstructured":"Douwe Korff. 2022. The Inadequacy of the October 2022 New US Presidential Executive Order on Enhancing Safeguards for United States Signals Intelligence Activities. Available at SSRN 4495169 (2022)."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580882"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/20539517231188723"},{"key":"e_1_2_1_40_1","volume-title":"30th {USENIX} Security Symposium ({USENIX} Security 21).","author":"Mayer Peter","unstructured":"Peter Mayer, Yixin Zou, Florian Schaub, and Adam J Aviv. 2021. ''Now I'm a bit angry:'' Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them. In 30th {USENIX} Security Symposium ({USENIX} Security 21)."},{"key":"e_1_2_1_41_1","volume-title":"How Americans View Data Privacy","author":"McClain Colleen","year":"2023","unstructured":"Colleen McClain, Michelle Faverio, Monica Anderson, and Eugenie Park. 2023. How Americans View Data Privacy. Pew Research Center (2023)."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376167"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240832"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/191666.191729"},{"key":"e_1_2_1_45_1","volume-title":"Slow Violence and the Environmentalism of the Poor","author":"Nixon Rob","unstructured":"Rob Nixon. 2011. Slow Violence and the Environmentalism of the Poor. Harvard University Press."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1177\/20539517231211553"},{"key":"e_1_2_1_47_1","volume-title":"Civic hacking as data activism and advocacy: A history from publicity to open government data. New media & society","author":"Schrock Andrew R","year":"2016","unstructured":"Andrew R Schrock. 2016. Civic hacking as data activism and advocacy: A history from publicity to open government data. New media & society, Vol. 18, 4 (2016), 581--599."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-42286-7_15"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445293"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502112"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576875"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479577"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_2_1_54_1","volume-title":"Guda Van Noort, and Hilde AM Voorveld","author":"Smit Edith G","year":"2014","unstructured":"Edith G Smit, Guda Van Noort, and Hilde AM Voorveld. 2014. Understanding online behavioural advertising: User knowledge, privacy concerns and online coping behaviour in Europe. Computers in human behavior, Vol. 32 (2014), 15--22."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445092"},{"key":"e_1_2_1_56_1","volume-title":"Nora A Draper, and Rowan Howard-Williams.","author":"Turow Joseph","year":"2012","unstructured":"Joseph Turow, Michael X Delli Carpini, Nora A Draper, and Rowan Howard-Williams. 2012. Americans roundly reject tailored political advertising. (2012)."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313742"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445885"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134746"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025762"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594119"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517467"},{"key":"e_1_2_1_64_1","volume-title":"SoK: Social Cybersecurity. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE","author":"Wu Yuxi","year":"2022","unstructured":"Yuxi Wu, W Keith Edwards, and Sauvik Das. 2022b. SoK: Social Cybersecurity. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 1863--1879."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998316"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445459"},{"key":"e_1_2_1_67_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Zou Yixin","year":"2018","unstructured":"Yixin Zou, Abraham H Mhaidli, Austin McCall, and Florian Schaub. 2018. ''I've Got Nothing to Lose''': Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 197--216."}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3710961","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3710961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:58:43Z","timestamp":1755737923000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3710961"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,2]]},"references-count":67,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,5,2]]}},"alternative-id":["10.1145\/3710961"],"URL":"https:\/\/doi.org\/10.1145\/3710961","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,2]]},"assertion":[{"value":"2025-05-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}