{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:13:52Z","timestamp":1763468032435,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T00:00:00Z","timestamp":1309219200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,28]]},"DOI":"10.1145\/1999927.1999939","type":"proceedings-article","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T17:34:50Z","timestamp":1309282490000},"page":"39-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Computing security in the developing world"],"prefix":"10.1145","author":[{"given":"Yahel","family":"Ben-David","sequence":"first","affiliation":[{"name":"University of California - Berkeley, Berkeley, CA, USA"}]},{"given":"Shaddi","family":"Hasan","sequence":"additional","affiliation":[{"name":"University of California - Berkeley, Berkeley, CA, USA"}]},{"given":"Joyojeet","family":"Pal","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor., Ann Arbor, MI, USA"}]},{"given":"Matthias","family":"Vallentin","sequence":"additional","affiliation":[{"name":"University of California - Berkeley, Berkeley, CA, USA"}]},{"given":"Saurabh","family":"Panjwani","sequence":"additional","affiliation":[{"name":"Microsoft Corp., Bangalore, Karnataka, India"}]},{"given":"Philipp","family":"Gutheim","sequence":"additional","affiliation":[{"name":"University of California - Berkeley, Berkeley, CA, USA"}]},{"given":"Jay","family":"Chen","sequence":"additional","affiliation":[{"name":"New York University, New York, NY, USA"}]},{"given":"Eric A.","family":"Brewer","sequence":"additional","affiliation":[{"name":"University of California - Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The Human Impact","author":"Report Norton Cybercrime","year":"2010","unstructured":"\" Norton Cybercrime Report : The Human Impact ,\" 2010 . \"Norton Cybercrime Report: The Human Impact,\" 2010."},{"volume-title":"Spam source by country.\" \"http:\/\/www.m86security.com\/labs\/spam_statistics.asp","year":"2011","key":"e_1_3_2_1_2_1","unstructured":"\"M86 security Labs , Spam source by country.\" \"http:\/\/www.m86security.com\/labs\/spam_statistics.asp \", 2011 . \"M86 security Labs, Spam source by country.\" \"http:\/\/www.m86security.com\/labs\/spam_statistics.asp\", 2011."},{"key":"e_1_3_2_1_3_1","unstructured":"\"Project Honey Pot Statistics.\" \"http:\/\/projecthoneypot.org\/statistics.php\" 2010. \"Project Honey Pot Statistics.\" \"http:\/\/projecthoneypot.org\/statistics.php\" 2010."},{"key":"e_1_3_2_1_4_1","unstructured":"\"AirJaldi.Org - Wireless Network Dharamsala India.\" http:\/\/www.airjaldi.org. \"AirJaldi.Org - Wireless Network Dharamsala India.\" http:\/\/www.airjaldi.org."},{"key":"e_1_3_2_1_5_1","volume-title":"An assessment of overt malicious activity manifest in residential networks,\" in DIMVA'11: Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment","author":"Maier G.","year":"2011","unstructured":"G. Maier , A. Feldmann , V. Paxson , R. Sommer , and M. Vallentin , \" An assessment of overt malicious activity manifest in residential networks,\" in DIMVA'11: Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment , Springer , July 2011 . to appear. G. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. Vallentin, \"An assessment of overt malicious activity manifest in residential networks,\" in DIMVA'11: Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment, Springer, July 2011. to appear."},{"key":"e_1_3_2_1_6_1","first-page":"291","article-title":"A multidisciplinary approach to open access village telecenter initiatives: the case of akshaya","volume":"3","author":"Pal H.","year":"2006","unstructured":"H. Pal , S. Nedevschi , and Rabin , \" A multidisciplinary approach to open access village telecenter initiatives: the case of akshaya ,\" E-Learning , vol. 3 , pp. 291 -- 316 , Sept. 2006 . H. Pal, S. Nedevschi, and Rabin, \"A multidisciplinary approach to open access village telecenter initiatives: the case of akshaya,\" E-Learning, vol. 3, pp. 291--316, Sept. 2006.","journal-title":"E-Learning"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"B. Krebs \"'stuxnet' worm far more sophisticated than previously thought \" 2010. B. Krebs \"'stuxnet' worm far more sophisticated than previously thought \" 2010.","DOI":"10.1063\/pt.5.024667"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184496"},{"key":"e_1_3_2_1_9_1","volume-title":"May","author":"Initiative F. A.","year":"2010","unstructured":"F. A. Initiative , \"M- Kesho in Kenya : A new step for M-Pesa and mobile banking.\" http:\/\/financialaccess.org\/node\/2968 , May 2010 . F. A. Initiative, \"M-Kesho in Kenya: A new step for M-Pesa and mobile banking.\" http:\/\/financialaccess.org\/node\/2968, May 2010."},{"key":"e_1_3_2_1_10_1","unstructured":"\"Security breach at m-pesa.\" http:\/\/www.telco2.net\/blog \/2010\/02\/security_breach_at_mpesa_telco.html 2010. Telco 2.0. \"Security breach at m-pesa.\" http:\/\/www.telco2.net\/blog \/2010\/02\/security_breach_at_mpesa_telco.html 2010. Telco 2.0."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837116"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734597"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.204"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067170.1067179"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-903-8.ch012"},{"key":"e_1_3_2_1_16_1","article-title":"The nigerian web content: Combating pornography using content filters","volume":"5","author":"Longe O. B.","year":"2005","unstructured":"O. B. Longe and F. A. Longe , \" The nigerian web content: Combating pornography using content filters ,\" J. Information Tech. Impact , vol. 5 , 2005 . O. B. Longe and F. A. Longe, \"The nigerian web content: Combating pornography using content filters,\" J. Information Tech. Impact, vol. 5, 2005.","journal-title":"J. Information Tech. Impact"},{"key":"e_1_3_2_1_17_1","volume-title":"World Development Indicators","author":"Bank World","year":"2009","unstructured":"\" World Bank , World Development Indicators ,\" 2009 . \"World Bank, World Development Indicators,\" 2009."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2008040106"},{"key":"e_1_3_2_1_19_1","volume-title":"Email virus propagation modeling and analysis,\" Department of Electrical and Computer Engineering","author":"Zou C. C.","year":"2003","unstructured":"C. C. Zou , D. Towsley , and W. Gong , \" Email virus propagation modeling and analysis,\" Department of Electrical and Computer Engineering , Univ. Massachusetts , Amherst, Technical Report : TR-CSE- 03-04, 2003 . C. C. Zou, D. Towsley, and W. Gong, \"Email virus propagation modeling and analysis,\" Department of Electrical and Computer Engineering, Univ. Massachusetts, Amherst, Technical Report: TR-CSE-03-04, 2003."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216016.1216017"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0021849904040371"},{"key":"e_1_3_2_1_23_1","unstructured":"B. Taylor \"Sender reputation in a large webmail service \" 2006. B. Taylor \"Sender reputation in a large webmail service \" 2006."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444805058161"},{"key":"e_1_3_2_1_25_1","volume-title":"developing problems,\" Risk Management & BCDR (MessageLabs), no. 9","author":"Sunner M.","year":"2009","unstructured":"M. Sunner , \" Developing world , developing problems,\" Risk Management & BCDR (MessageLabs), no. 9 , 2009 . M. Sunner, \"Developing world, developing problems,\" Risk Management & BCDR (MessageLabs), no. 9, 2009."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/570907.570911"},{"key":"e_1_3_2_1_27_1","unstructured":"S. Kannan \"Social networking sites prone to virus attacks \" The Hindu 2009. S. Kannan \"Social networking sites prone to virus attacks \" The Hindu 2009."},{"volume-title":"WISE 2004: Workshop on Information Systems and Economics.","author":"Gu B.","key":"e_1_3_2_1_28_1","unstructured":"B. Gu and V. Mahajan , \" The benefits of piracy - a competitive perspective,\" 2004 . WISE 2004: Workshop on Information Systems and Economics. B. Gu and V. Mahajan, \"The benefits of piracy - a competitive perspective,\" 2004. WISE 2004: Workshop on Information Systems and Economics."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-007-9479-0"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132469.1132470"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1353\/tlj.2005.0007"},{"key":"e_1_3_2_1_32_1","article-title":"Still dissatisfied after all these years: Intellectual property, post-wto china, and the avoidable cycle of futility","volume":"34","author":"Yu P. K.","year":"2005","unstructured":"P. K. Yu , \" Still dissatisfied after all these years: Intellectual property, post-wto china, and the avoidable cycle of futility ,\" Georgia Journal of International and Comparative Law , vol. 34 , 2005 . P. K. Yu, \"Still dissatisfied after all these years: Intellectual property, post-wto china, and the avoidable cycle of futility,\" Georgia Journal of International and Comparative Law, vol. 34, 2005.","journal-title":"Georgia Journal of International and Comparative Law"},{"key":"e_1_3_2_1_33_1","unstructured":"J. Karaganis \"Media piracy in emerging economies \" 2011. Social Science Research Council. J. Karaganis \"Media piracy in emerging economies \" 2011. Social Science Research Council."},{"key":"e_1_3_2_1_34_1","unstructured":"K. Stevens \"The Underground Economy of the Pay-Per-Install (PPI) Business.\" Blackhat Conference 2010. K. Stevens \"The Underground Economy of the Pay-Per-Install (PPI) Business.\" Blackhat Conference 2010."},{"key":"e_1_3_2_1_35_1","volume-title":"DEVELOPMENT AS FREEDOM","author":"Sen A.","year":"1999","unstructured":"A. Sen , DEVELOPMENT AS FREEDOM . Alfred A Knopf , 1999 . A. Sen, DEVELOPMENT AS FREEDOM. Alfred A Knopf, 1999."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_32"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/14799850802611446"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12595-9_18"},{"key":"e_1_3_2_1_39_1","volume-title":"IEEE","author":"State of","year":"2009","unstructured":"State of Cybersecurity and the Roadmap to Secure Cyber Community in Cambodia , IEEE , 2009 . State of Cybersecurity and the Roadmap to Secure Cyber Community in Cambodia, IEEE, 2009."},{"key":"e_1_3_2_1_40_1","volume-title":"Cybersecurity in africa: An assessment","author":"Cole K.","year":"2008","unstructured":"K. Cole , M. Chetty , C. LaRosa , F. Rietta , D. K. Schmitt , S. E. Goodman , and G. A. Atlanta , \" Cybersecurity in africa: An assessment ,\" 2008 . K. Cole, M. Chetty, C. LaRosa, F. Rietta, D. K. Schmitt, S. E. Goodman, and G. A. Atlanta, \"Cybersecurity in africa: An assessment,\" 2008."},{"key":"e_1_3_2_1_41_1","first-page":"297","article-title":"Countering terrorism with cyber security","volume":"47","author":"Westby J. R.","year":"2006","unstructured":"J. R. Westby , \" Countering terrorism with cyber security ,\" Jurimetrics , vol. 47 , p. 297 , 2006 . J. R. Westby, \"Countering terrorism with cyber security,\" Jurimetrics, vol. 47, p. 297, 2006.","journal-title":"Jurimetrics"},{"key":"e_1_3_2_1_42_1","first-page":"1","article-title":"Computer attack and cyber terrorism: Vulnerabilities and policy issues for congress","author":"Wilson C.","year":"2007","unstructured":"C. Wilson , \" Computer attack and cyber terrorism: Vulnerabilities and policy issues for congress ,\" Focus on Terrorism , p. 1 , 2007 . C. Wilson, \"Computer attack and cyber terrorism: Vulnerabilities and policy issues for congress,\" Focus on Terrorism, p. 1, 2007.","journal-title":"Focus on Terrorism"},{"key":"e_1_3_2_1_43_1","volume-title":"Trends in internet regulation, surveillance and control in asia","author":"Gomez J.","year":"2004","unstructured":"J. Gomez , \" Dumbing down democracy : Trends in internet regulation, surveillance and control in asia ,\" 2004 . J. Gomez, \"Dumbing down democracy: Trends in internet regulation, surveillance and control in asia,\" 2004."}],"event":{"name":"MobiSys'11: The 9th International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Bethesda Maryland USA","acronym":"MobiSys'11"},"container-title":["Proceedings of the 5th ACM workshop on Networked systems for developing regions"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1999927.1999939","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1999927.1999939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:05:51Z","timestamp":1750244751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1999927.1999939"}},"subtitle":["a case for multidisciplinary research"],"short-title":[],"issued":{"date-parts":[[2011,6,28]]},"references-count":43,"alternative-id":["10.1145\/1999927.1999939","10.1145\/1999927"],"URL":"https:\/\/doi.org\/10.1145\/1999927.1999939","relation":{},"subject":[],"published":{"date-parts":[[2011,6,28]]},"assertion":[{"value":"2011-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}