{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T16:01:55Z","timestamp":1773331315213,"version":"3.50.1"},"reference-count":76,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179410","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"570-587","source":"Crossref","is-referenced-by-count":15,"title":["\"In Eighty Percent of the Cases, I Select the Password for Them\": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya"],"prefix":"10.1109","author":[{"given":"Collins W.","family":"Munyendo","sequence":"first","affiliation":[{"name":"The George Washington University"}]},{"given":"Yasemin","family":"Acar","sequence":"additional","affiliation":[{"name":"The George Washington University"}]},{"given":"Adam J.","family":"Aviv","sequence":"additional","affiliation":[{"name":"The George Washington University"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Aunties, Strangers, and the FBI: Online Privacy Concerns and Experiences of Muslim-American Women","volume-title":"Proc. SOUPS","author":"Afnan"},{"key":"ref2","volume-title":"Kenya\u2019s E-citizen portal hits 1.23 million","year":"2016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1257\/jep.24.3.207"},{"key":"ref4","article-title":"...better to use a lock screen than to worry about saving a few seconds of time\u201d: Effect of Fear Appeal in the Context of Smartphone Locking Behavior","volume-title":"Proc. SOUPS","author":"Albayram"},{"key":"ref5","volume-title":"Share of households with a computer in Africa 2005-2019","author":"Alsop","year":"2021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445378"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3432909"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507956"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3555154"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00065"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445061"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.7903\/ijcse.1102"},{"key":"ref14","article-title":"Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice","volume-title":"Proc. SOUPS","author":"Busse"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00061"},{"key":"ref16","volume-title":"What share of households in Kenya own a computer?","author":"Check","year":"2020"},{"key":"ref17","article-title":"Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors","volume-title":"Proc. USENIX Security","author":"Chen"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517475"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1177\/1461444808101618"},{"key":"ref20","volume-title":"Qualitative research guide-lines project","author":"Cohen","year":"2006"},{"key":"ref21","volume-title":"CyberCafePro is Cyber Cafe Management Software","year":"2022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00055"},{"key":"ref23","article-title":"Libraries\u2019 Approaches to the Security of Public Computers","volume-title":"Proc. WIPS","author":"Dooley"},{"key":"ref24","volume-title":"A portal that offers access to information and services provided by the Kenyan government","year":"2015"},{"key":"ref25","article-title":"Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice","volume-title":"Proc. SOUPS","author":"Fagan"},{"key":"ref26","article-title":"Is My Phone Hacked?","volume-title":"Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence. Proc. ACM Hum.-Comput. Interact., 3(CSCW)","author":"Freed"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3134681"},{"key":"ref29","article-title":"Privacy and Security Threat Models and Mitigation Strategies of Older Adults","volume-title":"Proc. SOUPS","author":"Frik"},{"issue":"9","key":"ref30","first-page":"768","article-title":"Incentivised snowballing","volume":"22","author":"Gardner","year":"2009","journal-title":"The Psychologist"},{"key":"ref31","article-title":"\u201cLike Lesbians Walking the Perimeter\u201d: Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice","volume-title":"Proc. USENIX Security","author":"Geeng"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v8i4.1043"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/j.1681-4835.2011.tb00346.x"},{"key":"ref34","article-title":"Keeping a Low Profile? Technology, Risk and Privacy among Undocumented Immigrants","volume-title":"Proc. CHI","author":"Guberek"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3555650"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.15353\/joci.v1i3.2032"},{"key":"ref37","volume-title":"The window at the cafe","author":"Hoffmann","year":"2017"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACOSIS.2016.7843916"},{"key":"ref39","article-title":"\u201c...No one Can Hack My Mind\u201d: Comparing Expert and Non-Expert Security Practices","volume-title":"Proc. SOUPS","author":"Ion"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3359230"},{"key":"ref41","article-title":"Mobile money: The economics of M-PESA","volume-title":"Technical report","author":"Jack","year":"2011"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3134699"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3202185.3202735"},{"key":"ref44","author":"Liang","year":"2021","journal-title":"Reflexivity, positionality, and disclosure in HCI"},{"key":"ref45","article-title":"How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities","volume-title":"Proc. USENIX Security","author":"Luo"},{"key":"ref46","article-title":"It\u2019s stressful having all these phones\u201d: Investigating Sex Workers\u2019 Safety Goals, Risks, and Practices Online","volume-title":"Proc. USENIX Security","author":"McDonald"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0064"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"ref49","article-title":"Investigating the Computer Security Practices and Needs of Journalists","volume-title":"Proc. USENIX Security","author":"McGregor"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3341162.3349311"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300573"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.54501\/jots.v1i4.62"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833779"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3449212"},{"issue":"3","key":"ref56","first-page":"19","article-title":"On language rights in Kenya","volume":"12","author":"Ogechi","year":"2003","journal-title":"Nordic Journal of African Studies"},{"key":"ref57","article-title":"Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives","volume-title":"Proc. USENIX Security","author":"Owens"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445055"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312770"},{"key":"ref60","article-title":"\u201cWarn Them\u201d or \"Just Block Them\"?: Comparing Privacy Concerns of Older and Working Age Adults","volume-title":"Proc. PETS","author":"Ray"},{"key":"ref61","article-title":"Why Older Adults (Don\u2019t) Use Password Managers","volume-title":"Proc. USENIX Security","author":"Ray"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978307"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.24"},{"key":"ref64","article-title":"A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web","volume-title":"Proc. USENIX Security","author":"Redmiles"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3681050"},{"key":"ref66","article-title":"I have too much respect for my elders\u2019: Understanding South African Mobile Users\u2019 Perceptions of Privacy and Current Behaviors on Facebook and WhatsApp","volume-title":"Proc. USENIX Security","author":"Reichel"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.4135\/9781446282243.n20"},{"key":"ref68","article-title":"\u201cPrivacy is not for me, it\u2019s for those rich women\u201d: Performative Privacy Practices on Mobile Phones by Women in South Asia","volume-title":"Proc. SOUPS","author":"Sambasivan"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025926"},{"key":"ref70","article-title":"\u201cPlease help share!\u201d: Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine","author":"Schm\u00fcser","year":"2022"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3314344.3332486"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00023"},{"key":"ref73","volume-title":"What is a Cybercafe? - definition from Techopedia","year":"2016"},{"key":"ref74","article-title":"Damon McCoy, Nicola Dell, and Thomas Ristenpart. The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums","volume-title":"Proc. USENIX Security","author":"Tseng"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502038"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833643"},{"key":"ref77","article-title":"Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships","volume-title":"Proc. SOUPS","author":"Wei"},{"key":"ref78","article-title":"Thomas Ristenpart, Kevin Roundy, Florian Schaub, and Acar Tamersoy. The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence","volume-title":"Proc. USENIX Security","author":"Zou"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179410.pdf?arnumber=10179410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,21]],"date-time":"2024-07-21T04:19:26Z","timestamp":1721535566000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":76,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179410","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}