{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:40:54Z","timestamp":1776109254027,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":152,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T00:00:00Z","timestamp":1529452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,20]]},"DOI":"10.1145\/3209811.3209818","type":"proceedings-article","created":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T12:12:39Z","timestamp":1529496759000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":57,"title":["Examining Security and Privacy Research in Developing Regions"],"prefix":"10.1145","author":[{"given":"Aditya","family":"Vashistha","sequence":"first","affiliation":[{"name":"University of Washington"}]},{"given":"Richard","family":"Anderson","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Shrirang","family":"Mare","sequence":"additional","affiliation":[{"name":"University of Washington"}]}],"member":"320","published-online":{"date-parts":[[2018,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2012. Getting Aadhaar Card Big Challenge for Transgenders. http:\/\/www.deccanherald.com\/content\/250353\/getting-aadhaar-card-big-challenge.html  2012. Getting Aadhaar Card Big Challenge for Transgenders. http:\/\/www.deccanherald.com\/content\/250353\/getting-aadhaar-card-big-challenge.html"},{"key":"e_1_3_2_1_2_1","volume-title":"Census","year":"2011","unstructured":"2012. Press Note on Release of Data on Houses, Household Amenities and Assets , Census 2011 . http:\/\/censusindia.gov.in\/2011census\/hlo\/Data_sheet\/India\/HLO_Press_Release.pdf 2012. Press Note on Release of Data on Houses, Household Amenities and Assets, Census 2011. http:\/\/censusindia.gov.in\/2011census\/hlo\/Data_sheet\/India\/HLO_Press_Release.pdf"},{"key":"e_1_3_2_1_3_1","unstructured":"2013. India's 'Third Gender': A Marginalised Social Class. http:\/\/ajmn.tv\/26tav  2013. India's 'Third Gender': A Marginalised Social Class. http:\/\/ajmn.tv\/26tav"},{"key":"e_1_3_2_1_4_1","volume-title":"Economy Report","year":"2013","unstructured":"2013. Information Economy Report 2013 . http:\/\/unctad.org\/en\/pages\/PublicationWebflyer.aspx?publicationid=710 2013. Information Economy Report 2013. http:\/\/unctad.org\/en\/pages\/PublicationWebflyer.aspx?publicationid=710"},{"key":"e_1_3_2_1_5_1","volume-title":"Children's Use of Mobile Phones - An International Comparison","year":"2015","unstructured":"2016. Children's Use of Mobile Phones - An International Comparison 2015 . https:\/\/www.gsma.com\/publicpolicy\/childrens-use-mobile-phones-international-comparison-2015 2016. Children's Use of Mobile Phones - An International Comparison 2015. https:\/\/www.gsma.com\/publicpolicy\/childrens-use-mobile-phones-international-comparison-2015"},{"key":"e_1_3_2_1_6_1","unstructured":"2016. Country Overview: Pakistan - A Digital Future. https:\/\/www.gsma.com\/mobilefordevelopment\/programme\/connected-society\/country-overview-pakistan-a-digital-future  2016. Country Overview: Pakistan - A Digital Future. https:\/\/www.gsma.com\/mobilefordevelopment\/programme\/connected-society\/country-overview-pakistan-a-digital-future"},{"key":"e_1_3_2_1_7_1","unstructured":"2016. The Global Surveillance Industry Privacy International Beta. https:\/\/www.privacyinternational.org\/node\/807  2016. The Global Surveillance Industry Privacy International Beta. https:\/\/www.privacyinternational.org\/node\/807"},{"key":"e_1_3_2_1_8_1","unstructured":"2016. Mobile Privacy Principles. https:\/\/www.gsma.com\/publicpolicy\/mobile-privacy-principles  2016. Mobile Privacy Principles. https:\/\/www.gsma.com\/publicpolicy\/mobile-privacy-principles"},{"key":"e_1_3_2_1_9_1","unstructured":"2016. Over 80 Percent Software Installed in Pakistan Bangladesh and Indonesia Unlicensed. https:\/\/tribune.com.pk\/story\/1110292\/asia-hotbed-piracy-despite-economic-growth\/  2016. Over 80 Percent Software Installed in Pakistan Bangladesh and Indonesia Unlicensed. https:\/\/tribune.com.pk\/story\/1110292\/asia-hotbed-piracy-despite-economic-growth\/"},{"key":"e_1_3_2_1_10_1","unstructured":"2016. Vietnam Blocks Facebook and Cracks Down on Human Rights Activists During Obama Visit. https:\/\/www.accessnow.org\/vietnam-blocks-facebook-human-rights-obama\/  2016. Vietnam Blocks Facebook and Cracks Down on Human Rights Activists During Obama Visit. https:\/\/www.accessnow.org\/vietnam-blocks-facebook-human-rights-obama\/"},{"key":"e_1_3_2_1_11_1","unstructured":"2016. World Development Report 2016: Digital Dividends. http:\/\/www.worldbank.org\/en\/publication\/wdr2016   2016. World Development Report 2016: Digital Dividends. http:\/\/www.worldbank.org\/en\/publication\/wdr2016"},{"key":"e_1_3_2_1_12_1","volume-title":"ACM SIGMOD 2017 Most Reproducible Paper Award Winners: SIGMOD Website. https:\/\/sigmod.org\/2017-reproducibility-award\/","unstructured":"2017. ACM SIGMOD 2017 Most Reproducible Paper Award Winners: SIGMOD Website. https:\/\/sigmod.org\/2017-reproducibility-award\/ 2017. ACM SIGMOD 2017 Most Reproducible Paper Award Winners: SIGMOD Website. https:\/\/sigmod.org\/2017-reproducibility-award\/"},{"key":"e_1_3_2_1_13_1","unstructured":"2017. Amazon Mechanical Turk. https:\/\/www.mturk.com\/mturk\/  2017. Amazon Mechanical Turk. https:\/\/www.mturk.com\/mturk\/"},{"key":"e_1_3_2_1_14_1","unstructured":"2017. Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/  2017. Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/"},{"key":"e_1_3_2_1_15_1","unstructured":"2017. Enabling Access to Mobile Services for the Forcibly Displaced. https:\/\/www.gsma.com\/mobilefordevelopment\/programme\/digital-identity\/enabling-access-mobile-services-forcibly-displaced  2017. Enabling Access to Mobile Services for the Forcibly Displaced. https:\/\/www.gsma.com\/mobilefordevelopment\/programme\/digital-identity\/enabling-access-mobile-services-forcibly-displaced"},{"key":"e_1_3_2_1_16_1","unstructured":"2017. Global Security Intelligence Report Microsoft. https:\/\/www.microsoft.com\/en-us\/security\/Intelligence-report  2017. Global Security Intelligence Report Microsoft. https:\/\/www.microsoft.com\/en-us\/security\/Intelligence-report"},{"key":"e_1_3_2_1_17_1","volume-title":"GSMA Mobile Economy","year":"2017","unstructured":"2017. GSMA Mobile Economy 2017 . https:\/\/www.gsma.com\/mobileeconomy\/ 2017. GSMA Mobile Economy 2017. https:\/\/www.gsma.com\/mobileeconomy\/"},{"key":"e_1_3_2_1_18_1","unstructured":"2017. Helix Institute of Digital Finance. http:\/\/helix-institute.com\/  2017. Helix Institute of Digital Finance. http:\/\/helix-institute.com\/"},{"key":"e_1_3_2_1_19_1","unstructured":"2017. mSurvey. https:\/\/msurvey.co.ke\/  2017. mSurvey. https:\/\/msurvey.co.ke\/"},{"key":"e_1_3_2_1_20_1","unstructured":"2017. Safety Privacy and Security Across the Mobile Ecosystem. https:\/\/www.gsma.com\/publicpolicy\/safety-privacy-security-across-mobile-ecosystem  2017. Safety Privacy and Security Across the Mobile Ecosystem. https:\/\/www.gsma.com\/publicpolicy\/safety-privacy-security-across-mobile-ecosystem"},{"key":"e_1_3_2_1_21_1","unstructured":"2017. Village Phone - Grameen Telecom. http:\/\/www.grameentelecom.net.bd\/village-phone.html  2017. Village Phone - Grameen Telecom. http:\/\/www.grameentelecom.net.bd\/village-phone.html"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901873"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.52"},{"key":"e_1_3_2_1_24_1","volume-title":"Mazurek","author":"Acar Yasemin","year":"2016","unstructured":"Yasemin Acar , Sascha Fahl , and Michelle L . Mazurek . 2016 . You Are Not Your Developer, Either : A Research Agenda for Usable Security and Privacy Research Beyond End Users. In IEEE Cybersecurity Development (SecDev). IEEE , 3--8. Yasemin Acar, Sascha Fahl, and Michelle L. Mazurek. 2016. You Are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. In IEEE Cybersecurity Development (SecDev). IEEE, 3--8."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909609.2909661"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134652"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025961"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557376"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737856.2738018"},{"key":"e_1_3_2_1_31_1","volume-title":"Economic Impacts of Health Shocks on Households in Low and Middle Income Countries: A Review of the Literature. Globalization and Health 10 (April","author":"Alam Khurshid","year":"2014","unstructured":"Khurshid Alam and Ajay Mahal . 2014. Economic Impacts of Health Shocks on Households in Low and Middle Income Countries: A Review of the Literature. Globalization and Health 10 (April 2014 ), 21. Khurshid Alam and Ajay Mahal. 2014. Economic Impacts of Health Shocks on Households in Low and Middle Income Countries: A Review of the Literature. Globalization and Health 10 (April 2014), 21."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 297--308","author":"Alghamdi Deena","year":"2015","unstructured":"Deena Alghamdi , Ivan Flechais , and Marina Jirotka . 2015 . Security Practices for Households Bank Customers in the Kingdom of Saudi Arabia . In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 297--308 . https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/alghamdi Deena Alghamdi, Ivan Flechais, and Marina Jirotka. 2015. Security Practices for Households Bank Customers in the Kingdom of Saudi Arabia. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 297--308. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/alghamdi"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/872016.872155"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2160673.2160676"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507956"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999927.1999939"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998237"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466198"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2160673.2160702"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS). https:\/\/www.semanticscholar.org\/paper\/582606bb70ac6060066890ec7967f31ce155503b","author":"Bowers Jasmine","year":"2017","unstructured":"Jasmine Bowers , Bradley Reaves , Imani N. Sherman , Patrick Traynor , and Kevin Butler . 2017 . Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services . In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). https:\/\/www.semanticscholar.org\/paper\/582606bb70ac6060066890ec7967f31ce155503b Jasmine Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, and Kevin Butler. 2017. Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). https:\/\/www.semanticscholar.org\/paper\/582606bb70ac6060066890ec7967f31ce155503b"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.204"},{"key":"e_1_3_2_1_45_1","volume-title":"Gender Trouble: Feminism and the Subversion of Identity","author":"Butler Judith","year":"2006","unstructured":"Judith Butler . 2006 . Gender Trouble: Feminism and the Subversion of Identity ( first ed.). Routledge . Judith Butler. 2006. Gender Trouble: Feminism and the Subversion of Identity (first ed.). Routledge."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3001913.3001919"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909609.2909649"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 129--142","author":"Chen Jay","year":"2014","unstructured":"Jay Chen , Michael Paik , and Kelly McCabe . 2014 . Exploring Internet Security Perceptions and Practices in Urban Ghana . In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 129--142 . https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/chen Jay Chen, Michael Paik, and Kelly McCabe. 2014. Exploring Internet Security Perceptions and Practices in Urban Ghana. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 129--142. https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/chen"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208714"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702218"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909609.2909660"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","first-page":"6251","DOI":"10.1126\/science.aac4716","article-title":"Estimating the Reproducibility of Psychological Science","volume":"349","author":"Collaboration Open Science","year":"2015","unstructured":"Open Science Collaboration . 2015 . Estimating the Reproducibility of Psychological Science . Science 349 , 6251 (Aug. 2015), aac4716. Open Science Collaboration. 2015. Estimating the Reproducibility of Psychological Science. Science 349, 6251 (Aug. 2015), aac4716.","journal-title":"Science"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674377.2674384"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660271"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675225"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socscimed.2005.02.004"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133314"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858081"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208589"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702540"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858460"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516604.2516626"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835966.2835968"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240802019970"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819947"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025728"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468503"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"e_1_3_2_1_70_1","volume-title":"Iranian Authorities Block Access to Social Media Tools. The New York Times (Jan","author":"Frenkel Sheera","year":"2018","unstructured":"Sheera Frenkel . 2018. Iranian Authorities Block Access to Social Media Tools. The New York Times (Jan . 2018 ). https:\/\/www.nytimes.com\/2018\/01\/02\/technology\/iran-protests-social-media.html Sheera Frenkel. 2018. Iranian Authorities Block Access to Social Media Tools. The New York Times (Jan. 2018). https:\/\/www.nytimes.com\/2018\/01\/02\/technology\/iran-protests-social-media.html"},{"key":"e_1_3_2_1_71_1","volume-title":"Understanding Sexuality: An Ethnographic Study of Poor Women in Bombay, India","author":"George Annie","year":"1995","unstructured":"Annie George and Surinder Singh Jaswal . 1995 . Understanding Sexuality: An Ethnographic Study of Poor Women in Bombay, India . Washington DC International Center for Research on Women {ICRW}. https:\/\/www.popline.org\/node\/304873 Annie George and Surinder Singh Jaswal. 1995. Understanding Sexuality: An Ethnographic Study of Poor Women in Bombay, India. Washington DC International Center for Research on Women {ICRW}. https:\/\/www.popline.org\/node\/304873"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2851597"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2160673.2160682"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/348941.349002"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.111"},{"key":"e_1_3_2_1_76_1","unstructured":"GSMA. 2015. Bridging the Gender Gap: Mobile Access and Usage in Low-and Middle-income Countries. http:\/\/www.gsma.com\/mobilefordevelopment\/programmes\/connectedwomen\/bridging-gender-gap  GSMA. 2015. Bridging the Gender Gap: Mobile Access and Usage in Low-and Middle-income Countries. http:\/\/www.gsma.com\/mobilefordevelopment\/programmes\/connectedwomen\/bridging-gender-gap"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.85"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858273"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2369220.2369236"},{"key":"e_1_3_2_1_80_1","volume-title":"Dimensionalizing Cultures: The Hofstede Model in Context. Online readings in psychology and culture 2, 1","author":"Hofstede Geert","year":"2011","unstructured":"Geert Hofstede . 2011 . Dimensionalizing Cultures: The Hofstede Model in Context. Online readings in psychology and culture 2, 1 (2011). Geert Hofstede. 2011. Dimensionalizing Cultures: The Hofstede Model in Context. Online readings in psychology and culture 2, 1 (2011)."},{"key":"e_1_3_2_1_81_1","unstructured":"Thorsten Holz Norbert Pohlmann Eric Bodden Matthew Smith and Jorg Hoffmann. 2016. Human-Centered Systems Security: IT Security by People for People. http:\/\/donar.messe.de\/exhibitor\/cebit\/2017\/G541499\/human-centered-systems-security-eng-483137.pdf  Thorsten Holz Norbert Pohlmann Eric Bodden Matthew Smith and Jorg Hoffmann. 2016. Human-Centered Systems Security: IT Security by People for People. http:\/\/donar.messe.de\/exhibitor\/cebit\/2017\/G541499\/human-centered-systems-security-eng-483137.pdf"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1162\/qjec.122.3.879"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518953"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926180.1926195"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519004"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242689"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979150"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979151"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481396"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466263"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_16"},{"key":"e_1_3_2_1_92_1","unstructured":"Lily Kuo. 2017. Uganda has Launched a Total Social Media Blackout for the Second Time in Three Months. https:\/\/goo.gl\/Ds4mj3  Lily Kuo. 2017. Uganda has Launched a Total Social Media Blackout for the Second Time in Three Months. https:\/\/goo.gl\/Ds4mj3"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556969"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1080\/02255189.2005.9669031"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804292"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858051"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/1959022.1959024"},{"key":"e_1_3_2_1_98_1","unstructured":"Mary Meeker. 2015. 2015 Internet Trends. http:\/\/www.kpcb.com\/blog\/2015-internet-trends  Mary Meeker. 2015. 2015 Internet Trends. http:\/\/www.kpcb.com\/blog\/2015-internet-trends"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998323"},{"key":"e_1_3_2_1_100_1","unstructured":"Microsave. 2017. Assessment of AeFDS (Aadhaar Enabled Fertilizer Distribution System) Pilot. http:\/\/www.microsave.net\/resource\/assessment_of_aefds_aadhaar_enabled_fertilizer_distribution_system_pilot  Microsave. 2017. Assessment of AeFDS (Aadhaar Enabled Fertilizer Distribution System) Pilot. http:\/\/www.microsave.net\/resource\/assessment_of_aefds_aadhaar_enabled_fertilizer_distribution_system_pilot"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991096"},{"key":"e_1_3_2_1_102_1","unstructured":"Marie-H\u00e9l\u00e8ne Mottin-Sylla. 2016. The Gender Digital Divide in Francophone Africa: A Harsh Reality. https:\/\/www.apc.org\/en\/pubs\/manuals\/gender\/africa\/gender-digital-divide-francophone-africa-harsh-rea  Marie-H\u00e9l\u00e8ne Mottin-Sylla. 2016. The Gender Digital Divide in Francophone Africa: A Harsh Reality. https:\/\/www.apc.org\/en\/pubs\/manuals\/gender\/africa\/gender-digital-divide-francophone-africa-harsh-rea"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884790"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025618"},{"key":"e_1_3_2_1_106_1","volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","author":"Nissenbaum Helen","unstructured":"Helen Nissenbaum . 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life . Stanford University Press . Helen Nissenbaum. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press."},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557277"},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/2399016.2399025"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909609.2909656"},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/1836001.1836005"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/2442882.2442886"},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837116"},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493236"},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.5555\/1812530.1812567"},{"key":"e_1_3_2_1_115_1","volume-title":"Governments Turn to Commercial Spyware to Intimidate Dissidents. The New York Times (May","author":"Perlroth Nicole","year":"2016","unstructured":"Nicole Perlroth . 2016. Governments Turn to Commercial Spyware to Intimidate Dissidents. The New York Times (May 2016 ). https:\/\/www.nytimes.com\/2016\/05\/30\/technology\/governments-turn-to-commercial-spyware-to-intimidate-dissidents.html Nicole Perlroth. 2016. Governments Turn to Commercial Spyware to Intimidate Dissidents. The New York Times (May 2016). https:\/\/www.nytimes.com\/2016\/05\/30\/technology\/governments-turn-to-commercial-spyware-to-intimidate-dissidents.html"},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702124"},{"key":"e_1_3_2_1_117_1","volume-title":"Poorer Countries Need Privacy Laws as They Adopt New Technologies. The Guardian (Dec","author":"Provost Claire","year":"2013","unstructured":"Claire Provost . 2013. Poorer Countries Need Privacy Laws as They Adopt New Technologies. The Guardian (Dec . 2013 ). http:\/\/www.theguardian.com\/global-development\/2013\/dec\/04\/poorer-countries-privacy-laws-new-technology Claire Provost. 2013. Poorer Countries Need Privacy Laws as They Adopt New Technologies. The Guardian (Dec. 2013). http:\/\/www.theguardian.com\/global-development\/2013\/dec\/04\/poorer-countries-privacy-laws-new-technology"},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240790"},{"key":"e_1_3_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-010-0349-x"},{"key":"e_1_3_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/2160673.2160715"},{"key":"e_1_3_2_1_121_1","volume-title":"Proceedings of the USENIX Security Symposium (USENIX Security). https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/reaves","author":"Reaves Bradley","year":"2015","unstructured":"Bradley Reaves , Nolen Scaife , Adam Bates , Patrick Traynor , and Kevin Butler . 2015 . Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World . In Proceedings of the USENIX Security Symposium (USENIX Security). https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/reaves Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, and Kevin Butler. 2015. Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World. In Proceedings of the USENIX Security Symposium (USENIX Security). https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/reaves"},{"key":"e_1_3_2_1_122_1","unstructured":"Matthew Reynolds. 2018. Iran's Social Media Blackout Forces Apps to Submit or Face a Total Ban. http:\/\/www.wired.co.uk\/article\/iran-protests-2017-2018-twitter-telegram-instagram-censorship  Matthew Reynolds. 2018. Iran's Social Media Blackout Forces Apps to Submit or Face a Total Ban. http:\/\/www.wired.co.uk\/article\/iran-protests-2017-2018-twitter-telegram-instagram-censorship"},{"key":"e_1_3_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025960"},{"key":"e_1_3_2_1_124_1","volume-title":"Report Claims. The Guardian (Jan.","author":"Safi Michael","year":"2018","unstructured":"Michael Safi . 2018. Personal Data of a Billion Indians Sold Online for &pound;6 , Report Claims. The Guardian (Jan. 2018 ). http:\/\/www.theguardian.com\/world\/2018\/jan\/04\/india-national-id-database-data-leak-bought-online-aadhaar Michael Safi. 2018. Personal Data of a Billion Indians Sold Online for &pound;6, Report Claims. The Guardian (Jan. 2018). http:\/\/www.theguardian.com\/world\/2018\/jan\/04\/india-national-id-database-data-leak-bought-online-aadhaar"},{"key":"e_1_3_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025545"},{"key":"e_1_3_2_1_126_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS).","author":"Sambasivan Nithya","year":"2018","unstructured":"Nithya Sambasivan , Garen Checkley , Amna Batool , Nova Ahmed , David Nemer , Laura S. Gayt\u00e1n-Lugo , Matthews, Tara, Consolvo, Sunny, and Churchill, Elizabeth. 2018 . \" Privacy is not for me, it's for those rich women\": Notions and Practices of Privacy on Shared Phones among South Asian Women . In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura S. Gayt\u00e1n-Lugo, Matthews, Tara, Consolvo, Sunny, and Churchill, Elizabeth. 2018. \"Privacy is not for me, it's for those rich women\": Notions and Practices of Privacy on Shared Phones among South Asian Women. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_3_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753718"},{"key":"e_1_3_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620570"},{"key":"e_1_3_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978980"},{"key":"e_1_3_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025766"},{"key":"e_1_3_2_1_131_1","doi-asserted-by":"crossref","unstructured":"Mark B. Schmidt Allen C. Johnston Kirk P. Arnett Jim Q. Chen and Suichen Li. 1. A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness. Journal of Global Information Management 16 2 (Jan. 1) 91--103.  Mark B. Schmidt Allen C. Johnston Kirk P. Arnett Jim Q. Chen and Suichen Li. 1. A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness. Journal of Global Information Management 16 2 (Jan. 1) 91--103.","DOI":"10.4018\/jgim.2008040106"},{"key":"e_1_3_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.2307\/932653"},{"key":"e_1_3_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.139"},{"key":"e_1_3_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025910"},{"key":"e_1_3_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753484"},{"key":"e_1_3_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753436"},{"key":"e_1_3_2_1_137_1","volume-title":"Nothing to Hide: The False Tradeoff Between Privacy and Security","author":"Solove Daniel J.","unstructured":"Daniel J. Solove . 2011. Nothing to Hide: The False Tradeoff Between Privacy and Security . Yale University Press . Daniel J. Solove. 2011. Nothing to Hide: The False Tradeoff Between Privacy and Security. Yale University Press."},{"key":"e_1_3_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1145\/2369220.2369264"},{"key":"e_1_3_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174110"},{"key":"e_1_3_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370292"},{"key":"e_1_3_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675277"},{"key":"e_1_3_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702191"},{"key":"e_1_3_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909609.2909655"},{"key":"e_1_3_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174126"},{"key":"e_1_3_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173631"},{"key":"e_1_3_2_1_146_1","volume-title":"Proceedings of the Big Data Analytics workshop (in conjunction with ACM Sigmetrics). http:\/\/www.cl.cam.ac.uk\/~acr31\/pubs\/wagner-bigdata.pdf","author":"Wagner Daniel","year":"2013","unstructured":"Daniel Wagner , Andrew Rice , and Alastair Beresford . 2013 . Device Analyzer: Large-scale Mobile Data Collection . In Proceedings of the Big Data Analytics workshop (in conjunction with ACM Sigmetrics). http:\/\/www.cl.cam.ac.uk\/~acr31\/pubs\/wagner-bigdata.pdf Daniel Wagner, Andrew Rice, and Alastair Beresford. 2013. Device Analyzer: Large-scale Mobile Data Collection. In Proceedings of the Big Data Analytics workshop (in conjunction with ACM Sigmetrics). http:\/\/www.cl.cam.ac.uk\/~acr31\/pubs\/wagner-bigdata.pdf"},{"key":"e_1_3_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1145\/2371574.2371636"},{"key":"e_1_3_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.69"},{"key":"e_1_3_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2479636"},{"key":"e_1_3_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1145\/1979742.1979877"},{"key":"e_1_3_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753719"},{"key":"e_1_3_2_1_153_1","volume-title":"Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC). IEEE, 161--164","author":"Xie Jing","year":"2011","unstructured":"Jing Xie , Heather Richter Lipford , and Bill Chu . 2011 . Why do Programmers Make Security Errors? . In Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC). IEEE, 161--164 . Jing Xie, Heather Richter Lipford, and Bill Chu. 2011. Why do Programmers Make Security Errors?. In Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC). IEEE, 161--164."},{"key":"e_1_3_2_1_154_1","volume-title":"Psychology's Replication Crisis Can't Be Wished Away. The Atlantic (March","author":"Yong Ed","year":"2016","unstructured":"Ed Yong . 2016. Psychology's Replication Crisis Can't Be Wished Away. The Atlantic (March 2016 ). https:\/\/www.theatlantic.com\/science\/archive\/2016\/03\/psychologys-replication-crisis-cant-be-wished-away\/472272\/ Ed Yong. 2016. Psychology's Replication Crisis Can't Be Wished Away. The Atlantic (March 2016). https:\/\/www.theatlantic.com\/science\/archive\/2016\/03\/psychologys-replication-crisis-cant-be-wished-away\/472272\/"},{"key":"e_1_3_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304859"}],"event":{"name":"COMPASS '18: ACM SIGCAS Conference on Computing and Sustainable Societies","location":"Menlo Park and San Jose CA USA","acronym":"COMPASS '18","sponsor":["SIGCAS ACM Special Interest Group on Computers and Society"]},"container-title":["Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209811.3209818","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3209811.3209818","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:08Z","timestamp":1750212788000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209811.3209818"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,20]]},"references-count":152,"alternative-id":["10.1145\/3209811.3209818","10.1145\/3209811"],"URL":"https:\/\/doi.org\/10.1145\/3209811.3209818","relation":{},"subject":[],"published":{"date-parts":[[2018,6,20]]},"assertion":[{"value":"2018-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}