Poster session
Assisting information practice: from information intermediary to digital proxy
Peter Cruickshank, Gemma Webster, and Frances Ryan.
Introduction. Dependence on social media and other online systems as part of everyday life has grown considerably over the years. At the same time, the complexity and security of online systems has been increasing, making it more challenging for some people to access the services they need. This impacts the information practices of many users, leading to several scenarios where individuals need assistance in information related tasks, from registering for government services to updating social media content. This poster presents a summary of findings from two qualitative studies and serves as the initial foundation for a larger investigation related to digital proxies.
Method. Different methods of investigation were used for each of the two studies. Study One used a combination of interviews and focus groups to determine how social media accounts are managed by and for older adults through the use of digital proxies. Study Two considered a series of scenarios in a workshop with information professionals and volunteers offering digital proxy services to older and vulnerable adults.
Analysis. A narrative analysis of data was undertaken from each study independently. The results of these were then considered in tandem to determine patterns of information practices between the digital proxy roles in different contexts.
Results. This work confirmed that digital proxies assist older and vulnerable adults in the use of social media and other online platforms, and that proxy roles are undertaken by a range of actors including information professionals, care workers, volunteers, and family members.
Conclusion. This work provides a foundation in theorising the role of digital proxies from an information science perspective whilst providing a roadmap for future research in this vital area.
DOI: https://doi.org/10.47989/irisic2017
Problem statement and research questions
This work considers the relationship between the established concept of information intermediaries and a new concept of digital proxies, which is initially defined here to be individuals who assist others manage their online information presence. This is done in the context of information behaviour and everyday life information practices. It is comprised of the findings from two studies (informal support for managing digital identity provided by information professionals; proxied management of social media presences for people with dementia) which have helped to identify different issues relevant to the concept of proxies in online environments.
This poster presents the initial findings of these two studies as they relate to four exploratory questions:
- What are the underlying concepts, and issues with, the term digital proxy?
- What information practices do digital proxies undertake for the people they support?
- How is risk and trust handled within the proxy relationship, and in what manner does the proxy relationship change over time?
- How do proxies and account holders define terms or determine the scope of the help to be provided (e.g. on a practical or legal basis)?
Significance and relevance of the topic
Every stage of an individual’s life cycle now has a digital aspect to it and there will be times during an individual’s digital life cycle when they have limited capacity to manage their digital presence (e.g. due to age, health, or poor digital literacy) (Moncur et al., 2014). Information science has a long tradition of studying the role of information intermediary (Buchanan et al., 2019; Vitak et al, 2018),, however this has historically focussed on information seeking practices. It is now apparent that there is a need to extend such work to consider the broader information practices of digital proxies in the co-management of an individual’s digital identity and online presence (Kaczmarek et al., 2019). This includes addressing questions about trust and risk behaviour related to digital information, including digital identities such as online login details (Coles-Kemp & Hansen, 2017; Dourish & Anderson, 2016; Jøsang et al, 2005), especially when support is sought from people with whom there is no prior trust relationship in place (e.g., professionals or volunteers at public libraries or computer clubs). An investigation into these issues will help to create better understandings of the role of digital proxies undertake to help keep people safe, maintain social connections, and ensure that people continue to receive vital services benefits (Fiske et al., 2019).
Content
The focus of this work is related to the individuals who act as digital proxies – including information professionals, care workers, volunteers, and family members. This poster presents a summary of findings from the previously mentioned studies and will serve as the initial foundation for a larger investigation related to social digital proxies. It includes the following information:
- A review of definitions contextualising digital proxy in relation to past research in the role of information intermediary and, accounts of human behaviour and everyday information practices. This includes the relationship between the terms service user, identity, trust, and proxy and the ways in which they are used in legal, social, and digital or online contexts.
- An overview of proxy practices in the context of people who assist individuals with limited capabilities or skills, and how they describe their work, from two general forms of proxy relationship:
- Family and friends who act as social media proxies for older adults and people with dementia
- Professionals and other trusted individuals working as proxies through their digital inclusion roles to assist in the creation or management of online accounts for members of the public
- An introduction to a discussion related to a new model of proxy as an everyday information practice, with reference to past literature on information intermediaries, personhood, privacy, identity, and trust.
Conclusion
This is an emerging area of research with implications for the development of wider knowledge around the co-management of online and digital information, self-sovereign identity (Jøsang et al, 2005), improving digital user experiences (Zagouras et al, 2017), and the development of community-based digital skills training. This work provides a foundation in theorising the role of digital proxies from an information science perspective whilst providing a roadmap for future research in this vital area.
About the authors
Peter Cruickshank is a Lecturer at the School of Computing at Edinburgh Napier University, Scotland. He has extensive experience in research into online participation and democratic engagement (e-participation), recently focussing on the information practice aspects, particularly around identity. He also has an active interest and delivers courses and lectures in information security and governance. He is the corresponding author and can be contacted at p.cruickshank@napier.ac.uk.
Dr Gemma Webster is a Lecturer at the School of Computing, Edinburgh Napier University, Scotland. Gemma's principle research interests lie in the field of human computer interaction, health care, older adults and assistive technologies. Gemma’s research focuses on how technology is used within people’s lives. She can be contacted at g.webster@napier.ac.uk.
Dr Frances VC Ryan is a Research Fellow in the School of Natural and Computing Sciences at the University of Aberdeen, Scotland. Frances' research interests focus on the ways in which people use and share information in online environments, especially as it relates to "lived" or real-world experiences. This includes interests in human information behaviour, social media use, online reputation and identity, and determinations of trust in online environments. She blogs at http://www.francesryanphd.com and can be contacted at frances@francesryanphd.com.
References
- Buchanan, S., Jardine, C. & Ruthven, I. (2019). Information behaviors in disadvantaged and dependent circumstances and the role of information intermediaries. Journal of the Association for Information Science and Technology, 70(2), 117-129. https://doi.org/10.1002/asi.24110
- Clare, L., Rowlands, J.M. & Quin, R. (2008). Collective strength: the impact of developing a shared social identity in early-stage dementia. Dementia, 7(1), 9-30. https://doi.org/10.1177/1471301207085365
- Coles-Kemp, L. & Hansen, R.R. (2017). Walking the line: the everyday security ties that bind. In T. Tryfonas (Ed.), Proceedings of the International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 464-480). Springer. (Lecture Notes in Computer Science, 10292). https://doi.org/10.1007/978-3-319-58460-7_32
- Dourish, P. & Anderson, K. (2006). Collective information practice: exploring privacy and security as social and cultural phenomena. Human-Computer Interaction, 21(3), 319-342. https://doi.org/10.1207/s15327051hci2103_2
- Fiske, A., Buyx, A. & Prainsack, B. (2019). Health information counselors. Academic Medicine, 94(1), 37-41. https://doi.org/10.1097/ACM.0000000000002395
- Jøsang, A., Fabre, J., Hay, B., Dalziel, J. & Pope, S. (2005). Trust requirements in identity management. In R. Buyya, P. Coddington, P. Montague, R. Safavi-Naini, N. Sheppard & A. Wendelborn, (Eds.), Proceedings of the 2005 Australasian workshop on grid computing and e-research, 44, 99-108. ACM Digital Library. https://dl.acm.org/doi/10.5555/1082290.1082305
- Kaczmarek, M., Shankar, S. & Nathan, L.P. (2018). Information practice, responsibility, and the ability to respond. Proceedings of the Association for Information Science and Technology, 55(1), 837-838. https://doi.org/10.1002/pra2.2018.14505501138
- Moncur, W., Durrant, A. & Martindale, S. (2014). An introduction to charting the digital lifespan. Paper presented at the CHI 2014 Workshop on Designing Technology for Major Life Events, Toronto, Canada.
- Vitak, J., Liao, Y., Kumar, P. & Subramaniam, M. (2018). Librarians as information intermediaries: navigating tensions between being helpful and being liable. In G. Chowdhury, J. McLeod, V. Gillet & P. Willett, (Eds.), Proceedings of the 13th International Conference on Information: transforming digital worlds (pp. 693-702). Springer. (Lecture Notes in Computer Science, 10766). http://dx.doi.org/10.1007/978-3-319-78105-1_80
- Zagouras, P., Kalloniatis, C. & Gritzalis, S. (2017). Managing user experience: usability and security in a new era of software supremacy. In T. Tryfonas (Ed.), Proceedings of the 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 174-188). Springer. (Lecture Notes in Computer Science, 10292). http://dx.doi.org/10.1007/978-3-319-58460-7_12
- Zahedi, F. & Song, J. (2008). Dynamics of trust revision: using health infomediaries. Journal of Management Information Systems,24(4), 225-248. http://dx.doi.org/10.2753/MIS0742-1222240409