{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T03:30:32Z","timestamp":1772076632634,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1145\/3460112.3471961","type":"proceedings-article","created":{"date-parts":[[2021,9,23]],"date-time":"2021-09-23T12:39:58Z","timestamp":1632400798000},"page":"261-274","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["\u201cWho is protecting us? No one!\u201d Vulnerabilities Experienced by Low-Income Indian Merchants Using Digital Payments"],"prefix":"10.1145","author":[{"given":"Pranjal","family":"Jain","sequence":"first","affiliation":[{"name":"theUXWhale"}]},{"given":"Rama Adithya","family":"Varanasi","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"Nicola","family":"Dell","sequence":"additional","affiliation":[{"name":"Cornell Tech"}]}],"member":"320","published-online":{"date-parts":[[2021,9,23]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1029","article-title":"Designing government policies to expand financial inclusion: Evidence from around the world","volume":"56","author":"Aggarwal Shilpa","year":"2013","unstructured":"Shilpa Aggarwal and Leora Klapper. 2013. Designing government policies to expand financial inclusion: Evidence from around the world. The Journal of Finance 56, 3 (2013), 1029\u201351.","journal-title":"The Journal of Finance"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300410"},{"key":"e_1_3_2_1_3_1","unstructured":"Irwin Altman. 1975. The Environment and Social Behavior: Privacy Personal Space Territory and Crowding.(1975)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rie.2012.03.001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Susan Athey Christian Catalini and Catherine Tucker. 2017. The digital privacy paradox: Small money small costs small talk. Technical Report. National Bureau of Economic Research.","DOI":"10.3386\/w23488"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2006.12.004"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555846"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.2015.145052010043"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999927.1999939"},{"key":"e_1_3_2_1_10_1","volume-title":"Street Entrepreneurs","author":"Bhowmik K","unstructured":"Sharit\u00a0K Bhowmik. 2007. Street vending in urban India: the struggle for recognition. In Street Entrepreneurs. Routledge, 114\u2013129."},{"key":"e_1_3_2_1_11_1","unstructured":"Muhammad Bilal and Ganesh Sankar. 2011. Trust & Security issues in Mobile banking and its effect on Customers."},{"key":"e_1_3_2_1_12_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology 3, 2","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77\u2013101."},{"key":"e_1_3_2_1_13_1","volume-title":"Paytm Mall to hire 3000 agents to help local stores sell on its platform. Retrieved","author":"ET Bureau","year":"2021","unstructured":"ET Bureau. 2017. Paytm Mall to hire 3000 agents to help local stores sell on its platform. Retrieved January 1, 2021 from https:\/\/economictimes.indiatimes.com\/small-biz\/startups\/paytm-mall-to-hire-3000-agents-to-help-local-stores-sell-on-its-platform\/articleshow\/59212571.cms?from=mdr"},{"key":"e_1_3_2_1_14_1","first-page":"1131","article-title":"The boundaries of privacy harm","volume":"86","author":"Calo Ryan","year":"2011","unstructured":"Ryan Calo. 2011. The boundaries of privacy harm. Ind. LJ 86(2011), 1131.","journal-title":"Ind. LJ"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1017\/9781316831960.011"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819963"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300563"},{"key":"e_1_3_2_1_18_1","volume-title":"Acceptance of mobile money by poor citizens of India: Integrating trust into the technology acceptance model. info","author":"Chauhan Sumedha","year":"2015","unstructured":"Sumedha Chauhan. 2015. Acceptance of mobile money by poor citizens of India: Integrating trust into the technology acceptance model. info (2015)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02767-3_53"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.76"},{"key":"e_1_3_2_1_21_1","first-page":"1339","article-title":"Always Already Suspect: Revising Vulnerability Theory","volume":"93","author":"Cooper Frank\u00a0Rudy","year":"2014","unstructured":"Frank\u00a0Rudy Cooper. 2014. Always Already Suspect: Revising Vulnerability Theory. North Carolina Law Review 93 (2014), 1339.","journal-title":"North Carolina Law Review"},{"key":"e_1_3_2_1_22_1","volume-title":"Determining validity in qualitative inquiry. Theory into practice 39, 3","author":"Creswell W","year":"2000","unstructured":"John\u00a0W Creswell and Dana\u00a0L Miller. 2000. Determining validity in qualitative inquiry. Theory into practice 39, 3 (2000), 124\u2013130."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Kevin Donovan. 2012. Mobile money for financial inclusion. Information and Communications for development 61 1(2012) 61\u201373.","DOI":"10.1596\/9780821389911_ch04"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3272973.3274089"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675230"},{"key":"e_1_3_2_1_26_1","volume-title":"Digital Payments to Hit $6.6T Value","year":"2021","unstructured":"Finara. 2021. Digital Payments to Hit $6.6T Value in 2021, a 40% Jump in Two Years. Retrieved March 1, 2021 from https:\/\/www.finaria.it\/pr\/digital-payments-to-hit-6-6t-value-in-2021-a-40-jump-in-two-years\/"},{"key":"e_1_3_2_1_27_1","first-page":"251","article-title":"The Vulnerable Subject and the Responsive State","volume":"60","author":"Fineman Martha\u00a0Albertson","year":"2010","unstructured":"Martha\u00a0Albertson Fineman. 2010. The Vulnerable Subject and the Responsive State. Emory Law Journal 60(2010), 251.","journal-title":"Emory Law Journal"},{"key":"e_1_3_2_1_28_1","unstructured":"J. Foelste and A Khairy. 2019. Leveraging Technologies to Improve the Quality and Maximize the Productivity of Agent Models. Technical Report. Washington DC USA."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2020.102079"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/13563467.2017.1259298"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Arunava Ghosh. 2017. Turning India into a Cashless Economy: The Challenges to Overcome. Available at SSRN 2989290(2017).","DOI":"10.2139\/ssrn.2989290"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2160673.2160693"},{"key":"e_1_3_2_1_33_1","unstructured":"Ishita Ghosh and Jacki O\u2019Neill. 2020. The Unbearable Modernity of Mobile Money. Computer Supported Cooperative Work (CSCW)(2020) 1\u201335."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Leo\u00a0A Goodman. 1961. Snowball sampling. The annals of mathematical statistics(1961) 148\u2013170.","DOI":"10.1214\/aoms\/1177705148"},{"key":"e_1_3_2_1_35_1","first-page":"245","article-title":"Privacy and security concerns associated with mobile money applications in Africa","volume":"8","author":"Harris Andrew","year":"2012","unstructured":"Andrew Harris, Seymour Goodman, and Patrick Traynor. 2012. Privacy and security concerns associated with mobile money applications in Africa. Wash. JL Tech. & Arts 8(2012), 245.","journal-title":"Wash. JL Tech. & Arts"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628363.2628389"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274341"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136560.3136571"},{"key":"e_1_3_2_1_39_1","volume-title":"Role of banks in financial inclusion in India. Contadur\u00eda y administraci\u00f3n 62, 2","author":"Iqbal Badar\u00a0Alam","year":"2017","unstructured":"Badar\u00a0Alam Iqbal and Shaista Sami. 2017. Role of banks in financial inclusion in India. Contadur\u00eda y administraci\u00f3n 62, 2 (2017), 644\u2013656."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300329"},{"key":"e_1_3_2_1_41_1","volume-title":"Everyday PayTM Practices in India. In International Conference on Social Implications of Computers in Developing Countries. Springer, 280\u2013293","author":"Joshi Tanmay","year":"2019","unstructured":"Tanmay Joshi, Sharmistha\u00a0Swasti Gupta, and Nimmi Rangaswamy. 2019. Digital Wallets \u2018Turning a Corner\u2019for Financial Inclusion: A study of Everyday PayTM Practices in India. In International Conference on Social Implications of Computers in Developing Countries. Springer, 280\u2013293."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Deepa Krishnan and Stephan Siegel. 2017. Effects of demonetization: Evidence from 28 slum neighborhoods in mumbai. Available at SSRN 2896026(2017).","DOI":"10.2139\/ssrn.2896026"},{"key":"e_1_3_2_1_43_1","article-title":"A study on Digital payments in India with perspective of consumers adoption","volume":"118","author":"Suma\u00a0vally K.","year":"2018","unstructured":"K.Hema\u00a0Divya K.Suma\u00a0vally. 2018. A study on Digital payments in India with perspective of consumers adoption. International Journal of Pure and Applied Mathematics 118, 24(2018).","journal-title":"International Journal of Pure and Applied Mathematics"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979150"},{"key":"e_1_3_2_1_45_1","article-title":"Cashless payment: A behaviourial change to economic growth","volume":"2","author":"Kumari Neetu","year":"2017","unstructured":"Neetu Kumari and Jhanvi Khanna. 2017. Cashless payment: A behaviourial change to economic growth. Qualitative and Quantitative Research Review 2, 2 (2017).","journal-title":"Qualitative and Quantitative Research Review"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206306294405"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300620"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357058"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2007.08.001"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300819"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376167"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02767-3_54"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274304"},{"key":"e_1_3_2_1_54_1","volume-title":"India","author":"Mehrotra Aakash","year":"2017","unstructured":"Aakash Mehrotra, Akhand Tiwari, MP Karthick, Mimansa Khanna, Vivek Khanna, Bhavana Srivastava, Manoj Sharma, and Sidra Butt-Mughal. 2018. State of the agent network, India 2017."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2369220.2369242"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sjme.2016.12.001"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJMHCI.2019100105"},{"key":"e_1_3_2_1_58_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79(2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2018.12.033"},{"key":"e_1_3_2_1_60_1","volume-title":"Mobile money usage and continuance intention among micro enterprises in an emerging market\u2013the mediating role of agent credibility. Journal of Systems and Information Technology","author":"Odoom Raphael","year":"2020","unstructured":"Raphael Odoom and John\u00a0Paul Kosiba. 2020. Mobile money usage and continuance intention among micro enterprises in an emerging market\u2013the mediating role of agent credibility. Journal of Systems and Information Technology (2020)."},{"key":"e_1_3_2_1_61_1","volume-title":"Ombudsman Scheme for Digital Transactions. Retrieved","author":"Electronics Ministry","year":"2021","unstructured":"Ministry of Electronics and Information Technology. 2019. Ombudsman Scheme for Digital Transactions. Retrieved April 7, 2021 from https:\/\/vikaspedia.in\/e-governance\/digital-payment\/policies-and-schemes\/ombudsman-scheme-for-digital-transactions"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Jan Ondrus and Yves Pigneur. 2006. Towards a holistic analysis of mobile payments: A multiple perspectives approach. Electronic commerce research and applications 5 3(2006) 246\u2013257.","DOI":"10.1016\/j.elerap.2005.09.003"},{"key":"e_1_3_2_1_63_1","first-page":"4","article-title":"Working digital money into a cash economy: The collaborative work of loan payment","volume":"26","author":"O\u2019neill Jacki","year":"2017","unstructured":"Jacki O\u2019neill, Anupama Dhareshwar, and Srihari\u00a0H Muralidhar. 2017. Working digital money into a cash economy: The collaborative work of loan payment. Computer Supported Cooperative Work (CSCW) 26, 4-6 (2017), 733\u2013768.","journal-title":"Computer Supported Cooperative Work (CSCW)"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173803"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837116"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3162082"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314344.3332500"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.28"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702137"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Daniel Radcliffe and Rodger Voorhies. 2012. A digital pathway to financial inclusion. Available at SSRN 2186926(2012).","DOI":"10.2139\/ssrn.2186926"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449115"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092368"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"crossref","unstructured":"Ms\u00a0Ratna Sahay Mr\u00a0Ulric\u00a0Eriksson von Allmen Ms\u00a0Amina Lahreche Purva Khera Ms\u00a0Sumiko Ogawa Majid Bazarbash and Ms\u00a0Kimberly Beaton. 2020. The promise of fintech: Financial inclusion in the post COVID-19 era. International Monetary Fund.","DOI":"10.5089\/9781513512242.087"},{"key":"e_1_3_2_1_74_1","volume-title":"Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Sambasivan Nithya","year":"2018","unstructured":"Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura\u00a0Sanely Gayt\u00e1n-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. 2018. \u201d Privacy is not for me, it\u2019s for those rich women\u201d: Performative Privacy Practices on Mobile Phones by Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 127\u2013142."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753718"},{"key":"e_1_3_2_1_76_1","first-page":"1227","article-title":"Identity theft, privacy, and the architecture of vulnerability","volume":"54","author":"Solove J","year":"2002","unstructured":"Daniel\u00a0J Solove. 2002. Identity theft, privacy, and the architecture of vulnerability. Hastings Lj 54(2002), 1227.","journal-title":"Hastings Lj"},{"key":"e_1_3_2_1_77_1","unstructured":"Matthew Soursourian Ariadne Plaitakis and Emilio Hernandez. 2019. AGENT NETWORKS AT THE LAST MILE. (2019)."},{"key":"e_1_3_2_1_78_1","volume-title":"Paytm to hire 10,000 agents to expand offline merchant network. Retrieved","author":"\u00a0of India Press","year":"2021","unstructured":"Press trust\u00a0of India. 2016. Paytm to hire 10,000 agents to expand offline merchant network. Retrieved January 1, 2021 from https:\/\/economictimes.indiatimes.com\/small-biz\/startups\/paytm-to-hire-10000-agents-to-expand-offline-merchant-network\/articleshow\/55355204.cms"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392561.3394638"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314344.3332499"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/953460.953488"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145229"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556961"},{"key":"e_1_3_2_1_84_1","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin F","year":"1968","unstructured":"Alan\u00a0F Westin. 1968. Privacy and freedom. Washington and Lee Law Review 25, 1 (1968), 166.","journal-title":"Washington and Lee Law Review"}],"event":{"name":"COMPASS '21: ACM SIGCAS Conference on Computing and Sustainable Societies","location":"Virtual Event Australia","acronym":"COMPASS '21","sponsor":["SIGCAS ACM Special Interest Group on Computers and Society"]},"container-title":["ACM SIGCAS Conference on Computing and Sustainable Societies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460112.3471961","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460112.3471961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T17:02:53Z","timestamp":1756832573000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460112.3471961"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":84,"alternative-id":["10.1145\/3460112.3471961","10.1145\/3460112"],"URL":"https:\/\/doi.org\/10.1145\/3460112.3471961","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]},"assertion":[{"value":"2021-09-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}