1. bookVolume 2021 (2021): Issue 4 (October 2021)
Journal Details
License
Format
Journal
First Published
16 Apr 2015
Publication timeframe
4 times per year
Languages
English
access type Open Access

“We, three brothers have always known everything of each other”: A Cross-cultural Study of Sharing Digital Devices and Online Accounts

Published Online: 23 Jul 2021
Page range: 203 - 224
Received: 28 Feb 2021
Accepted: 16 Jun 2021
Journal Details
License
Format
Journal
First Published
16 Apr 2015
Publication timeframe
4 times per year
Languages
English
Abstract

Although many technologies assume that a device or an account would be used by a single user, prior research has found that this assumption may not hold true in everyday life. Most studies conducted to date focused on sharing a device or account with the members in a household. However, there is a dearth in existing literature to understand the contexts of sharing devices and accounts, which may extend to a wide range of personal, social, and professional settings. Further, people’s sharing behavior could be impacted by their social background. To this end, our paper presents a qualitative study with 59 participants from three different countries: Bangladesh, Turkey, and USA, where we investigated the sharing of digital devices (e.g., computer, mobile phone) and online accounts, in particular, financial and identity accounts (e.g., email, social networking) in various contexts, and with different entities - not limited to the members in a household. Our study reveals users’ perceptions of risks while sharing a device or account, and their access control strategies to protect privacy and security. Based on our analysis, we shed light on the interplay between users’ sharing behavior and their demographics, social background, and cultural values. Taken together, our findings have broad implications that advance the PETS community’s situated understanding of sharing devices and accounts.

Keywords

[1] Abokhodair, N., and Vieweg, S. Privacy & social media in the context of the arab gulf. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems (New York, NY, USA, 2016), DIS ’16, Association for Computing Machinery, p. 672–683. Search in Google Scholar

[2] Adams, A., and Sasse, M. A. Users are not the enemy. Communications of the ACM 42, 12 (1999), 40–46. Search in Google Scholar

[3] Ahmed, S. I., Guha, S., Rifat, M. R., Shezan, F. H., and Dell, N. Privacy in repair: An analysis of the privacy challenges surrounding broken digital artifacts in bangladesh. In Proceedings of the Eighth International Conference on Information and Communication Technologies and Development (New York, NY, USA, 2016), ICTD ’16, ACM, pp. 11:1–11:10. Search in Google Scholar

[4] Ahmed, S. I., Haque, M. R., Chen, J., and Dell, N. Digital privacy challenges with shared mobile phone use in bangladesh. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (2017), 17. Search in Google Scholar

[5] Ahmed, S. I., Haque, M. R., Chen, J., and Dell, N. Digital privacy challenges with shared mobile phone use in bangladesh. Proc. ACM Hum.-Comput. Interact. 1, CSCW (Dec. 2017), 17:1–17:20. Search in Google Scholar

[6] Ahmed, S. I., Jackson, S. J., Ahmed, N., Ferdous, H. S., Rifat, M. R., Rizvi, A., Ahmed, S., and Mansur, R. S. Protibadi: A platform for fighting sexual harassment in urban bangladesh. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2014), CHI ’14, Association for Computing Machinery, p. 2695–2704. Search in Google Scholar

[7] Ahmed, T., Hoyle, R., Connelly, K., Crandall, D., and Kapadia, A. Privacy concerns and behaviors of people with visual impairments. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (New York, NY, USA, 2015), CHI ’15, Association for Computing Machinery, p. 3523–3532. Search in Google Scholar

[8] Al-Ameen, M. N., Tamanna, T., Nandy, S., Ahsan, M. A. M., Chandra, P., and Ahmed, S. I. We don’t give a second thought before providing our information: Understanding users’ perceptions of information collection by apps in urban bangladesh. In Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies (New York, NY, USA, 2020), COMPASS ’20, Association for Computing Machinery, p. 32–43. Search in Google Scholar

[9] Alghamdi, D., Flechais, I., and Jirotka, M. Security practices for households bank customers in the kingdom of saudi arabia. In Proceedings of the Eleventh USENIX Search in Google Scholar

[10] Ayçiçegi-Dinn, A., and Caldwell-Harris, C. L. Individualism–collectivism among americans, turks and turkish immigrants to the us. International Journal of Intercultural Relations 35, 1 (2011), 9–16. Search in Google Scholar

[11] Bank, W. Gdp per capita. https://data.worldbank.org/indicator/NY.GDP.PCAP.CD. Search in Google Scholar

[12] Bank, W. Literacy rate, adult total. https://data.worldbank.org/indicator/SE.ADT.LITR.ZS. Search in Google Scholar

[13] Ba³tu§, S. Household and family in turkey: An historical perspective. Autonomy and dependence in the family: Turkey and Sweden in critical perspective (2002), 99–116. Search in Google Scholar

[14] Baxter, K., Courage, C., and Caine, K. Understanding Your Users: A Practical Guide to User Research Methods, 2 ed. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2015. Search in Google Scholar

[15] Bødker, S., and Christiansen, E. Poetry in motion: Appropriation of the world of apps. In Proceedings of the 30th European Conference on Cognitive Ergonomics (New York, NY, USA, 2012), ECCE ’12, Association for Computing Machinery, p. 78–84. Search in Google Scholar

[16] Boyatzis, R. E. Transforming qualitative information: Thematic analysis and code development. sage, Thousand Oaks, CA, USA, 1998. Search in Google Scholar

[17] Braun, V., and Clarke, V. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77–101. Search in Google Scholar

[18] Brush, A. J. B., and Inkpen, K. M. Yours, mine and ours? sharing and use of technology in domestic environments. In UbiComp 2007: Ubiquitous Computing (Berlin, Heidelberg, 2007), J. Krumm, G. D. Abowd, A. Seneviratne, and T. Strang, Eds., Springer Berlin Heidelberg, pp. 109–126. Search in Google Scholar

[19] Busse, B., and Fuchs, M. Prevalence of cell phone sharing. Survey Methods: Insights from the Field 1 (2013), 15. Search in Google Scholar

[20] Chen, J., Paik, M., and McCabe, K. Exploring internet security perceptions and practices in urban ghana. In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security (USA, 2014), SOUPS ’14, USENIX Association, p. 129–142. Search in Google Scholar

[21] Cherapau, I., Muslukhov, I., Asanka, N., and Beznosov, K. On the impact of touch id on iphone pass-codes. In Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security (USA, 2015), SOUPS ’15, USENIX Association, p. 257–276. Search in Google Scholar

[22] Cobb, C., Sudar, S., Reiter, N., Anderson, R., Roesner, F., and Kohno, T. Computer security for data collection technologies. Development engineering 3 (2018), 1–11. Search in Google Scholar

[23] Conway, D., Taib, R., Harris, M., Berkovsky, S., Yu, K., and Chen, F. A qualitative investigation of bank employee experiences of information security and phishing. In Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security (USA, 2017), SOUPS ’17, USENIX Association, p. 115–129. Search in Google Scholar

[24] Crabtree, A., Tolmie, P., and Knight, W. Repacking ‘privacy’ for a networked world. Comput. Supported Coop. Work 26, 4-6 (Dec. 2017), 453–488. Search in Google Scholar

[25] Das, A., Bonneau, J., Caesar, M., Borisov, N., and Wang, X. The tangled web of password reuse. In NDSS (01 2014), vol. 14, pp. 23–26. Search in Google Scholar

[26] Derlega, V., and Chaikin, A. Privacy and self-disclosure in social relationships. Journal of Social Issues 33 (04 2010), 102 – 115. Search in Google Scholar

[27] Dodson, L. L., Sterling, S. R., and Bennett, J. K. Minding the gaps: Cultural, technical and gender-based barriers to mobile use in oral-language berber communities in morocco. In Proceedings of the Sixth International Conference on Information and Communication Technologies and Development: Full Papers - Volume 1 (New York, NY, USA, 2013), ICTD ’13, Association for Computing Machinery, p. 79–88. Search in Google Scholar

[28] Dominelli, L. Betrayal of trust: a feminist analysis of power relationships in incest abuse and its relevance for social work practice. The British Journal of Social Work 19, 1 (1989), 291–308. Search in Google Scholar

[29] Egelman, S., Brush, A. B., and Inkpen, K. M. Family accounts: A new paradigm for user accounts within the home environment. In Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work (New York, NY, USA, 2008), CSCW ’08, Association for Computing Machinery, p. 669–678. Search in Google Scholar

[30] Eldefrawy, M. H., Alghathbar, K., and Khan, M. K. Otp-based two-factor authentication using mobile phones. In Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations (USA, 2011), ITNG ’11, IEEE Computer Society, p. 327–331. Search in Google Scholar

[31] Elphinston, R. A., and Noller, P. Time to face it! facebook intrusion and the implications for romantic jealousy and relationship satisfaction. Cyberpsychology, Behavior, and Social Networking 14, 11 (2011), 631–635. Search in Google Scholar

[32] Faruq, M. O., Rahman, M. M., Alam, M. R., et al. Impact of social networking sites in bangladesh: Few possible solutions. International Journal of Intelligent Systems and Applications 9, 4 (2017), 53. Search in Google Scholar

[33] Frohlich, D., and Kraut, R. The social context of home computing. In Inside the smart home. Springer, London, 2003, pp. 127–162. Search in Google Scholar

[34] Geeng, C., and Roesner, F. Who’s in control? interactions in multi-user smart homes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2019), CHI ’19, Association for Computing Machinery, p. 1–13. Search in Google Scholar

[35] Gorodnichenko, Y., and Roland, G. Understanding the individualism-collectivism cleavage and its e˙ects: Lessons from cultural psychology. In Institutions and comparative economic development. Springer, London, 2012, pp. 213–236. Search in Google Scholar

[36] GSMA. Mandatory registration of prepaid sim cards: Addressing challenges through best practice, April 2016. https://www.gsma.com/publicpolicy/wp-content/uploads/2016/04/GSMA2016_Report_MandatoryRegistrationOfPrepaidSIMCards.pdf. Search in Google Scholar

[37] Hang, A., von Zezschwitz, E., De Luca, A., and Hussmann, H. Too much information! user attitudes towards smartphone sharing. In Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design (New York, NY, USA, 2012), NordiCHI ’12, Association for Computing Machinery, p. 284–287. Search in Google Scholar

[38] Haque, S. M. T., Haque, M. R., Nandy, S., Chandra, P., Al-Ameen, M. N., Guha, S., and Ahmed, S. I. Privacy vulnerabilities in public digital service centers in dhaka, bangladesh. In Proceedings of the 2020 International Conference on Information and Communication Technologies and Development (New York, NY, USA, 2020), ICTD2020, Association for Computing Machinery. Search in Google Scholar

[39] Haque, S. T., Wright, M., and Scielzo, S. A study of user password strategy for multiple accounts. In Proceedings of the Third ACM Conference on Data and Application Security and Privacy (New York, NY, USA, 2013), CODASPY ’13, Association for Computing Machinery, p. 173–176. Search in Google Scholar

[40] Haris, M. S., and Loyd, E. L. Countries and their cultures: Bangladesh. https://www.everyculture.com/ABo/Bangladesh.html. Search in Google Scholar

[41] Hayes, J., Kaushik, S., Price, C. E., and Wang, Y. Cooperative privacy and security: Learning from people with visual impairments and their allies. In Proceedings of the Fifteenth USENIX Conference on Usable Privacy and Security (USA, 2019), SOUPS’19, USENIX Association, p. 1–20. Search in Google Scholar

[42] Hofstede, G. Dimensionalizing cultures: The hofstede model in context. Online readings in psychology and culture 2, 1 (2011), 8. Search in Google Scholar

[43] Intercultural Programs, A. Bangladeshi culture. https://www.afsusa.org/countries/bangladesh/. Search in Google Scholar

[44] Ion, I., Reeder, R., and Consolvo, S. “...no one can hack my mind”: Comparing expert and non-expert security practices. In Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security (USA, 2015), SOUPS ’15, USENIX Association, p. 327–346. Search in Google Scholar

[45] Islam, S. Digital bangladesh a reality now, July 2018. https://www.dhakatribune.com/bangladesh/2018/07/11/digital-bangladesh-a-reality-now. Search in Google Scholar

[46] Jasso, G., and Rosenzweig, M. R. The new chosen people: Immigrants in the United States. Russell Sage Foundation, 1990. Search in Google Scholar

[47] Johnson, M., Egelman, S., and Bellovin, S. M. Face-book and privacy: It’s complicated. In Proceedings of the Eighth Symposium on Usable Privacy and Security (New York, NY, USA, 2012), SOUPS ’12, ACM, pp. 9:1–9:15. Search in Google Scholar

[48] Kang, R., Dabbish, L., Fruchter, N., and Kiesler, S. “my data just goes everywhere”: User mental models of the internet and implications for privacy and security. In Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security (USA, 2015), SOUPS ’15, USENIX Association, p. 39–52. Search in Google Scholar

[49] Karim, M. A. Digital bangladesh for good governance. In Bangladesh Development Forum (Bangladesh, 2010), pp. 15–16. Search in Google Scholar

[50] Kumaraguru, P., and Cranor, L. Privacy in india: Attitudes and awareness. Privacy Enhancing Technologies 3856 (2006), 243–258. Search in Google Scholar

[51] Livingstone, S., Mascheroni, G., Dreier, M., Chaudron, S., and Lagae, K. How parents of young children manage digital devices at home: The role of income, education and parental style. EU Kids Online, 2015. Search in Google Scholar

[52] Matthews, T., Liao, K., Turner, A., Berkovich, M., Reeder, R., and Consolvo, S. “she’ll just grab any device that’s closer”: A study of everyday device & account sharing in households. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2016), CHI ’16, Association for Computing Machinery, p. 5921–5932. Search in Google Scholar

[53] Mazurek, M. L., Arsenault, J., Bresee, J., Gupta, N., Ion, I., Johns, C., Lee, D., Liang, Y., Olsen, J., Salmon, B., et al. Access control for home data sharing: Attitudes, needs and practices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2010), pp. 645–654. Search in Google Scholar

[54] Mazurek, M. L., Klemperer, P. F., Shay, R., Takabi, H., Bauer, L., and Cranor, L. F. Exploring reactive access control. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2011), pp. 2085–2094. Search in Google Scholar

[55] Mazurek, M. L., Komanduri, S., Vidas, T., Bauer, L., Christin, N., Cranor, L. F., Kelley, P. G., Shay, R., and Ur, B. Measuring password guessability for an entire university. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (New York, NY, USA, 2013), CCS ’13, Association for Computing Machinery, p. 173–186. Search in Google Scholar

[56] Moitra, A., Hassan, N., Mandal, M. K., Bhuiyan, M., and Ahmed, S. I. Understanding the challenges for bangladeshi women to participate in# metoo movement. Proceedings of the ACM on Human-Computer Interaction 4, GROUP (2020), 1–25. Search in Google Scholar

[57] Nahar, P., Van Reeuwijk, M., and Reis, R. Contextualising sexual harassment of adolescent girls in bangladesh. Reproductive health matters 21, 41 (2013), 78–86. Search in Google Scholar

[58] Nations, U. World economic situation and prospects report: Country classification. https://www.un.org/en/development/desa/policy/wesp/wesp_current/2014wesp_country_classification.pdf. Search in Google Scholar

[59] Nissenbaum, H. Privacy as contextual integrity. Wash L. Rev 79 (2004), 119. Search in Google Scholar

[60] Nova, F. F., Rifat, M. R., Saha, P., Ahmed, S. I., and Guha, S. Online sexual harassment over anonymous social media in bangladesh. In Proceedings of the Tenth International Conference on Information and Communication Technologies and Development (New York, NY, USA, 2019), ICTD ’19, ACM, pp. 1:1–1:12. Search in Google Scholar

[61] of Statistics, B. B. Literacy assessment survey 2008, Nov 2008. http://www.unesco.org/new/fileadmin/MULTIMEDIA/FIELD/Dhaka/pdf/EDU/Literacy%20Assessment%20Survey%202008.pdf. Search in Google Scholar

[62] Patrick, A., and Kenny, S. From privacy legislation to interface design: Implementing information privacy in human-computer interactions. In Privacy Enhancing Technologies (Berlin, Heidelberg, 2003), Springer, Springer Berlin Heidelberg, pp. 107–124. Search in Google Scholar

[63] Rahman, T. Problems of democratic consolidation in bangladesh: A cultural explanation. Network of Asia-Pacific Schools and Institutes of Public Administration and Governance (NAPSIPAG) 569 (2006), 46. Search in Google Scholar

[64] Rashid, S. F., Standing, H., Mohiuddin, M., and Ahmed, F. M. Creating a public space and dialogue on sexuality and rights: a case study from bangladesh. Health Research Policy and Systems 9, 1 (2011), S12. Search in Google Scholar

[65] Rogers, M. Country overview: Bangladesh: Mobile industry driving growth and enabling digital inclusion, August 2014. https://www.gsmaintelligence.com/research/?file=a163eddca009553979bcdfb8fd5f2ef0&download. Search in Google Scholar

[66] Sambasivan, N., Checkley, G., Batool, A., Ahmed, N., Nemer, D., Gaytán-Lugo, L. S., Matthews, T., Consolvo, S., and Churchill, E. "privacy is not for me, it’s for those rich women": Performative privacy practices on mobile phones by women in south asia. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018) (Baltimore, MD, Aug. 2018), USENIX Association, pp. 127–142. Search in Google Scholar

[67] Sambasivan, N., Rangaswamy, N., Cutrell, E., and Nardi, B. Ubicomp4d: Infrastructure and interaction for international development–the case of urban indian slums. In Proceedings of the 11th International Conference on Ubiquitous Computing (New York, NY, USA, 2009), UbiComp ’09, Association for Computing Machinery, p. 155–164. Search in Google Scholar

[68] Sambasivan, N., Weber, J., and Cutrell, E. Designing a phone broadcasting system for urban sex workers in india. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2011), CHI ’11, Association for Computing Machinery, p. 267–276. Search in Google Scholar

[69] Seitz, T., Hartmann, M., Pfab, J., and Souque, S. Do di˙erences in password policies prevent password reuse? In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems (New York, NY, USA, 2017), CHI EA ’17, Association for Computing Machinery, p. 2056–2063. Search in Google Scholar

[70] Seng, S., Al-Ameen, M. N., and Wright, M. A first look into users’ perceptions of facial recognition in the physical world. Computers & Security 105 (2021), 102227. Search in Google Scholar

[71] Seng, S., Kocabas, H., Al-Ameen, M. N., and Wright, M. Poster: Understanding user’s decision to interact with potential phishing posts on facebook using a vignette study. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2019), CCS ’19, Association for Computing Machinery, p. 2617–2619. Search in Google Scholar

[72] Shamsuddin, A. K. The real scenario of internet access, July 2018. https://www.thedailystar.net/opinion/perspective/the-real-scenario-internet-access-1611499. Search in Google Scholar

[73] Singh, S., Cabraal, A., Demosthenous, C., Astbrink, G., and Furlong, M. Password sharing: Implications for security design based on social practice. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2007), CHI ’07, Association for Computing Machinery, p. 895–904. Search in Google Scholar

[74] Steenson, M., and Donner, J. Beyond the personal and private: Modes of mobile phone sharing in urban india. The reconstruction of space and time: Mobile communication practices 1 (2009), 231–250. Search in Google Scholar

[75] Stobert, E., and Biddle, R. The password life cycle: user behaviour in managing passwords. In 10th Symposium On Usable Privacy and Security (SOUPS) (Menlo Park, CA, 2014), USENIX Association, pp. 243–255. Search in Google Scholar

[76] Sultana, S., Saha, P., Hasan, S., Alam, S. M. R., Akter, R., Islam, M. M., Arnob, R. I., Al-Ameen, M. N., and Ahmed, S. I. Understanding the sensibility of social media use and privacy with bangladeshi facebook group users. In Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies (New York, NY, USA, 2020), COMPASS ’20, Association for Computing Machinery, p. 317–318. Search in Google Scholar

[77] Trommsdorff, G., and Nauck, B. The Value of Children in Cross Cultural Perspective: Case Studies from Eight Societies. Pabst Science Publishers, 2005. Search in Google Scholar

[78] van Reeuwijk, M., and Nahar, P. The importance of a positive approach to sexuality in sexual health programmes for unmarried adolescents in bangladesh. Reproductive Health Matters 21, 41 (2013), 69–77. Search in Google Scholar

[79] Vashistha, A., Anderson, R., and Mare, S. Examining security and privacy research in developing regions. In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (New York, NY, USA, 2018), COMPASS ’18, Association for Computing Machinery. Search in Google Scholar

[80] Warren, S. D., and Brandeis, L. D. The right to privacy. Harvard Law Review 4, 5 (1890), 193–220. Search in Google Scholar

[81] Wash, R. Folk models of home computer security. In Proceedings of the Sixth Symposium on Usable Privacy and Security (2010), pp. 1–16. Search in Google Scholar

[82] Watkins, E. A., Al-Ameen, M. N., Roesner, F., Caine, K., and McGregor, S. Creative and set in their ways: Challenges of security sensemaking in newsrooms. In 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI) (Vancouver, BC, 2017), USENIX Association. Search in Google Scholar

[83] Westin, A. F. Privacy and freedom. Washington and Lee Law Review 25, 1 (1968), 166. Search in Google Scholar

[84] Wikipedia. Bangladesh. https://en.wikipedia.org/wiki/Bangladesh. Search in Google Scholar

[85] Wikipedia. Turkey. https://en.wikipedia.org/wiki/Turkey. Search in Google Scholar

[86] Williams, E. J., Hinds, J., and Joinson, A. N. Exploring susceptibility to phishing in the workplace. International Journal of Human-Computer Studies 120 (2018), 1–13. Search in Google Scholar

[87] Wisniewski, P., Lipford, H., and Wilson, D. Fighting for my space: Coping mechanisms for sns boundary regulation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2012), pp. 609–618. Search in Google Scholar

[88] Yerokhin, O. The social cost of blackmail. Review of Law & Economics 7, 1 (2011), 337–351. Search in Google Scholar

[89] Zhang-Kennedy, L., Chiasson, S., and van Oorschot, P. Revisiting password rules: facilitating human management of passwords. In 2016 APWG symposium on electronic crime research (eCrime) (Toronto, ON, Canada, 2016), IEEE, IEEE, pp. 81–90. Search in Google Scholar

[90] Zou, Y., Mhaidli, A. H., McCall, A., and Schaub, F. “i’ve got nothing to lose”: Consumers’ risk perceptions and protective actions after the equifax data breach. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018) (2018), pp. 197–216. Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo