{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T14:26:53Z","timestamp":1763389613534,"version":"3.37.3"},"reference-count":71,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/sp46214.2022.9833779","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T19:28:05Z","timestamp":1658950085000},"page":"2304-2319","source":"Crossref","is-referenced-by-count":20,"title":["\u201cDesperate Times Call for Desperate Measures\u201d: User Concerns with Mobile Loan Apps in Kenya"],"prefix":"10.1109","author":[{"given":"Collins W.","family":"Munyendo","sequence":"first","affiliation":[{"name":"The George Washington University"}]},{"given":"Yasemin","family":"Acar","sequence":"additional","affiliation":[{"name":"The George Washington University"}]},{"given":"Adam J.","family":"Aviv","sequence":"additional","affiliation":[{"name":"The George Washington University"}]}],"member":"263","reference":[{"journal-title":"Kenya outrage over debt collectors&#x2019; shaming tactics","year":"2021","author":"mwaura","key":"ref13"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00023"},{"journal-title":"Kenyan borrowers shamed by debt collectors chasing Silicon Valley loans","year":"2020","author":"roussi","key":"ref12"},{"key":"ref56","article-title":"Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors","author":"chen","year":"2019","journal-title":"Security 2019 USENIX Security Symposium"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"ref59","article-title":"&#x2018;No Telling Passcodes Out Because They&#x2019;re Private&#x2019;: Understanding Children&#x2019;s Mental Models of Privacy and Security Online","author":"kumar","year":"2017","journal-title":"CHI 2017 ACM Conference on Human Factors in Computing Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319723"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445061"},{"key":"ref53","article-title":"&#x2018;I have too much respect for my elders&#x2019;: Understanding South African Mobile Users&#x2019; Perceptions of Privacy and Current Behaviors on Facebook and WhatsApp","author":"reichel","year":"2020","journal-title":"Security 2020 USENIX Security Symposium"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00055"},{"journal-title":"This lending app publicly shames you when you&#x2019;re late on loan payment","year":"2020","author":"kiruga","key":"ref11"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173688"},{"key":"ref10","first-page":"1","article-title":"Smartphone ownership and internet usage continues to climb in emerging economies","volume":"22","author":"poushter","year":"2016","journal-title":"Pew Research Center"},{"key":"ref54","article-title":"Investigating the Computer Security Practices and Needs of Journalists","author":"mcgregor","year":"2015","journal-title":"Security 2015 USENIX Security Symposium"},{"journal-title":"19 Million Kenyans Have Active Mobile Loans with 40% Being Multiple Mobile Lenders","year":"2019","key":"ref17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021821"},{"journal-title":"Android Permissions","year":"2021","key":"ref18"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1177\/1461444808101618","article-title":"A multinational study on online privacy: global concerns and local responses","volume":"11","author":"cho","year":"2009","journal-title":"New Media & Society"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507956"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"ref45","article-title":"Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions","author":"liu","year":"2016","journal-title":"SOUPS 2016 Symposium on Usable Privacy and Security"},{"key":"ref48","article-title":"Turtle Guard: Helping Android Users Apply Contextual Privacy P","author":"tsai","year":"2017","journal-title":"SOUPS 2017 Symposium on Usable Privacy and Security"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173842"},{"journal-title":"Android app permissions explained and how to use them","year":"2021","author":"triggs","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187879"},{"key":"ref43","article-title":"Modeling Users&#x2019; Mobile App Privacy P: Restoring Usability in a Sea of Permission Settings","author":"lin","year":"2014","journal-title":"SOUPS 2014 Conference on Usable Privacy and Security"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025926"},{"journal-title":"How Tala Mobile is using phone data to revolutionize microfinance","year":"2016","author":"adams","key":"ref8"},{"journal-title":"2 5 billion people around the world don&#x2019;t have a credit scorehere&#x2019;s why that&#x2019;s a problem","year":"2019","author":"hecht","key":"ref7"},{"journal-title":"Mobile lending App Branch partners with Visa announces $170 million in fresh funding","year":"2019","author":"hansen","key":"ref9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3386\/w16721"},{"journal-title":"World&#x2019;s most unbanked countries 2021","year":"2021","author":"ventura","key":"ref3"},{"journal-title":"Tech Startups Are Flooding Kenya With Apps Offering High-Interest Loans","year":"2020","author":"faux","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1257\/jep.24.3.207"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.51"},{"key":"ref35","article-title":"It&#x2019;s Scary&#x2026; It&#x2019;s Confusing&#x2026; It&#x2019;s Dull: How Cybersecurity Advocates Overcome Negative Perceptions of Security","author":"haney","year":"2018","journal-title":"SOUPS 2018 Symposium on Usable Privacy and Security"},{"key":"ref34","article-title":"It&#x2019;s a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception","author":"harbach","year":"2014","journal-title":"Symposium On Usable Privacy and Security SOUPS 2014"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041432"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Berlin.2017.8210616"},{"journal-title":"337 digital mobile lenders ejected from CRB listing","year":"2020","author":"guguyu","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50309-3_20"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300319"},{"journal-title":"Loan apps given new standards on CRB listing","year":"2020","author":"mbati","key":"ref32"},{"journal-title":"Financial inclusion on the rise but gaps remain Global Findex database shows","year":"2018","author":"felsenthal","key":"ref2"},{"journal-title":"Igniting SDG progress through digital financial inclusion","year":"2018","key":"ref1"},{"key":"ref39","article-title":"Android Permissions Remystified: A Field Study on Contextual Integrity","author":"wijesekera","year":"2015","journal-title":"Security 2015 USENIX Security Symposium"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SERE-C.2012.44"},{"key":"ref71","article-title":"Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World","author":"reaves","year":"2015","journal-title":"Security 2015 USENIX Security Symposium"},{"key":"ref70","article-title":"&#x2018;Privacy is not for me, it&#x2019;s for those rich women&#x201D;: Performative Privacy Practices on Mobile Phones by Women in South Asia","author":"sambasivan","year":"2018","journal-title":"SOUPS 2018 Symposium on Usable Privacy and Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1177\/1609406919899220"},{"key":"ref68","article-title":"It&#x2019;s stressful having all these phones&#x201D;: Investigating Sex Workers&#x2019; Safety Goals, Risks, and Practices Online","author":"mcdonald","year":"2021","journal-title":"Security 2021 USENIX Security Symposium"},{"journal-title":"Qualitative research guidelines project","year":"2006","author":"cohen","key":"ref23"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300573"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1177\/1468794114550439"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.11604\/pamj.2015.21.127.6185"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445378"},{"key":"ref20","article-title":"Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services","author":"bowers","year":"2017","journal-title":"SOUPS 2017 Symposium on Usable Privacy and Security"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3449212"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0016"},{"key":"ref22","first-page":"19","article-title":"On language rights in Kenya","volume":"12","author":"ogechi","year":"2003","journal-title":"Nordic Journal of African Studies"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3341162.3349311"},{"key":"ref21","first-page":"768","article-title":"Incentivised snowballing","volume":"22","author":"gardner","year":"2009","journal-title":"The Psychologist"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312770"},{"journal-title":"Kenya cracks down on digital lenders over data privacy issues","year":"2021","author":"njanja","key":"ref28"},{"key":"ref27","first-page":"122","article-title":"Credit reference bureau as the factor influencing the profitability of commercial banks in Kenya: A case of Standard Chartered Bank, Kenya","volume":"2","author":"tuwei","year":"2015","journal-title":"International Journal of Novel Research in Marketing Management and Economics"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58460-7_42"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3202185.3202735"},{"key":"ref62","article-title":"Privacy and Security Threat Models and Mitigation Strategies of Older Adults","author":"frik","year":"2019","journal-title":"SOUPS 2019 Symposium on Usable Privacy and Security"},{"key":"ref61","article-title":"Why Older Adults (Don&#x2019;t) Use Password Managers","author":"ray","year":"2021","journal-title":"Security 2021 USENIX Security Symposium"}],"event":{"name":"2022 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2022,5,22]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833550\/9833558\/09833779.pdf?arnumber=9833779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:18:47Z","timestamp":1699485527000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833779\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":71,"URL":"https:\/\/doi.org\/10.1109\/sp46214.2022.9833779","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}