Forced Migration: Making Sense of a Complex System
In: The International Journal of Information, Diversity, & Inclusion (IJIDI), Band 4, Heft 2, S. 1-4
ISSN: 2574-3430
Editorial
4 Ergebnisse
Sortierung:
In: The International Journal of Information, Diversity, & Inclusion (IJIDI), Band 4, Heft 2, S. 1-4
ISSN: 2574-3430
Editorial
In: ACM journal on computing and sustainable societies, Band 1, Heft 2, S. 1-29
ISSN: 2834-5533
Most of the HCI work on mental health is based on the Western metaphysical definition of mind that is less applicable outside the West. This article focuses on this issue and critically examines "
Kaan Pete Roi
" (KPR), a suicide prevention and emotional support helpline in Bangladesh, through an interview study with 20 participants. We find that KPR's service, grounded in the "befriending" model—originating from the UK and emphasizing non-judgmental active listening without offering direct advice—often struggles to ensure callers' safety, provide long-term support, and protect volunteers from harassment and distress. We argue that such failures are often rooted in some foundational ideas of the UK-born "befriending" model that underpins the service. Building on Enrique Dussel's decolonial philosophy, we argue that "befriending" model and its underpinning Western metaphysical ideation of mind carry a colonial impulse, and we discuss how community-based approaches may better address the mental health problems in the Global South.
In: ACM journal on computing and sustainable societies, Band 1, Heft 1, S. 1-24
ISSN: 2834-5533
Software security practices are critical in minimizing vulnerabilities and protecting unauthorized access to the code and the system. However, software security practices outside Western countries need to be better understood. This need for understanding security practices is further necessitated by the increased outsourcing of software development that can result in vulnerabilities on a global scale. This article addresses this gap, focusing on Bangladesh, a country that represents a booming software industry in the Global South. In this study, we conducted semi-structured interviews with 15 developers to understand their security perceptions and identify the factors influencing software security practices in Bangladesh. Our findings unpack how security fits in the local software development life cycle and shed light on the challenges deterring security practices in Bangladesh. Based on our results, we provide recommendations for developing situated and sustainable strategies to support software security practices in the local context.
In: ACM transactions on social computing, Band 7, Heft 1, S. 1-32
ISSN: 2469-7826
Despite significant advances in content moderation within HCI, social computing scholarship in this area remains constrained by secular values and Western interpretations of justice. As a result, current literature often overlooks religious and spiritual sensibilities, as well as communal peacebuilding efforts even when the harms originate from and strongly connected to faith sensitivities, such as Islamophobia. This article presents findings from a design and evaluation study on the reporting and moderation of Islamophobic posts on Twitter (currently known as "X"). By utilizing HCI theories and readily available NLP techniques, we developed an online tool for reporting and moderating Islamophobic tweets. We subsequently conducted usability studies, contextual inquiries, and interviews with 32 participants to assess the tool's effectiveness in addressing Islamophobic content. Our study revealed that factors such as faith-related knowledge practices, fact-checking, communal leadership, social harmony, and the cultural-religious value of "compromise" significantly influence reactions to Islamophobic posts online. Expanding on these findings and drawing from the literature on conflict resolution in theology, legal studies, and justification, we explore how "Sulha," a community-driven process for mitigating conflict and restoring communal peace, can cater to faith-based sensibilities in reporting and moderating Islamophobic content. Therefore, this article complements existing content moderation literature by recommending the adaptation of faith sensitivities in the design of computing tools and policies to mitigate Islamophobia and similar faith-related online harms.