{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:12:50Z","timestamp":1776096770453,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":115,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713297","type":"proceedings-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T14:16:03Z","timestamp":1745849763000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Understanding the Security Advice Mechanisms of Low Socioeconomic Pakistanis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7609-1012","authenticated-orcid":false,"given":"Sumair Ijaz","family":"Hashmi","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany and Saarland University, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1776-9506","authenticated-orcid":false,"given":"Rimsha","family":"Sarfaraz","sequence":"additional","affiliation":[{"name":"Lahore University of Management Sciences, Lahore, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7921-9544","authenticated-orcid":false,"given":"Lea","family":"Gr\u00f6ber","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany and Saarland University, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1321-1988","authenticated-orcid":false,"given":"Mobin","family":"Javed","sequence":"additional","affiliation":[{"name":"Lahore University of Management Sciences, Lahore, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2425-3013","authenticated-orcid":false,"given":"Katharina","family":"Krombholz","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","unstructured":"Sayyed\u00a0Khawar Abbas Hafiz\u00a0Ali Hassan Jawad Asif and Faiqa Zainab. 2018. How income level distribution responds to poverty: Empirical evidence from Pakistan. Global Scientific Journals 6 3 (2018) 131\u2013142."},{"key":"e_1_3_3_3_3_2","unstructured":"Abu Dhabi Department of Education and Knowledge. [n. d.]. Pakistani Curriculum. https:\/\/www.adek.gov.ae\/en\/Education-System\/Private-Schools\/Curriculum\/Pakistani-Curriculum Accessed: 2024-08-11."},{"key":"e_1_3_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2909609.2909661"},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"crossref","unstructured":"Syed\u00a0Ishtiaque Ahmed Md\u00a0Romael Haque Jay Chen and Nicola Dell. 2017. Digital privacy challenges with shared mobile phone use in Bangladesh. Proceedings of the ACM on Human-computer Interaction 1 CSCW (2017) 1\u201320.","DOI":"10.1145\/3134652"},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025961"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300410"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/2830629.2830640"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585904"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"crossref","unstructured":"Mamtaj Akter Amy\u00a0J Godfrey Jess Kropczynski Heather\u00a0R Lipford and Pamela\u00a0J Wisniewski. 2022. From parental control to joint family oversight: Can parents and teens manage mobile online safety and privacy as equals? Proceedings of the ACM on Human-Computer Interaction 6 CSCW1 (2022) 1\u201328.","DOI":"10.1145\/3512904"},{"key":"e_1_3_3_3_11_2","first-page":"437","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023)","author":"Akter Mamtaj","year":"2023","unstructured":"Mamtaj Akter, Madiha Tabassum, Nazmus\u00a0Sakib Miazi, Leena Alghamdi, Jess Kropczynski, Pamela\u00a0J Wisniewski, and Heather Lipford. 2023. Evaluating the impact of community oversight for managing mobile privacy and security. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). 437\u2013456."},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3378393.3402244"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00028"},{"key":"e_1_3_3_3_14_2","first-page":"297","volume-title":"Eleventh Symposium On Usable Privacy and Security ({ SOUPS} 2015)","author":"Alghamdi Deena","year":"2015","unstructured":"Deena Alghamdi, Ivan Flechais, and Marina Jirotka. 2015. Security practices for households bank customers in the Kingdom of Saudi Arabia. In Eleventh Symposium On Usable Privacy and Security ({ SOUPS} 2015). 297\u2013308."},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"crossref","unstructured":"Tawfiq Ammari Momina Nofal Mustafa Naseem and Maryam Mustafa. 2022. Moderation as empowerment: Creating and managing women-only digital safe spaces. Proceedings of the ACM on Human-Computer Interaction 6 CSCW2 (2022) 1\u201336.","DOI":"10.1145\/3555204"},{"key":"e_1_3_3_3_16_2","volume-title":"Online Loan Apps: Here\u2019s How Citizens Are Blackmailed","author":"News ARY","year":"2024","unstructured":"ARY News. 2024. Online Loan Apps: Here\u2019s How Citizens Are Blackmailed. https:\/\/arynews.tv\/online-loan-apps-heres-how-citizens-are-blackmailed\/ Accessed: 2024-08-08."},{"key":"e_1_3_3_3_17_2","first-page":"37","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023)","author":"Ashraf Afaq","year":"2023","unstructured":"Afaq Ashraf, Cornelius\u00a0J K\u00f6nig, Mobin Javed, Maryam Mustafa, et\u00a0al. 2023. \" Stalking is immoral but not illegal\": Understanding Security, Cyber Crimes and Threats in Pakistan. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). 37\u201356."},{"key":"e_1_3_3_3_18_2","unstructured":"Barwaqt Fintec. 2024. Barwaqt Fintec Application Process. https:\/\/www.barwaqtfintec.com\/ApplicationProcess\/ Accessed: 2024-11-18."},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00071"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"crossref","unstructured":"Sruti Bhagavatula Lujo Bauer and Apu Kapadia. 2022. \" Adulthood is trying each of the same six passwords that you use for everything\": The Scarcity and Ambiguity of Security Advice on Social Media. Proceedings of the ACM on Human-Computer Interaction 6 CSCW2 (2022) 1\u201327.","DOI":"10.1145\/3555154"},{"key":"e_1_3_3_3_21_2","unstructured":"Google\u00a0Security Blog. 2024. Safer with Google: New intelligent real-time protections on Android to keep you safe. https:\/\/security.googleblog.com\/2024\/11\/new-real-time-protections-on-Android.html Accessed: 2024-11-18."},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"crossref","unstructured":"Billie Bonevski Madeleine Randell Chris Paul Kathy Chapman Laura Twyman Jamie Bryant Irena Brozek and Clare Hughes. 2014. Reaching the hard-to-reach: a systematic review of strategies for improving health and medical research with socially disadvantaged groups. BMC medical research methodology 14 (2014) 1\u201329.","DOI":"10.1186\/1471-2288-14-42"},{"key":"e_1_3_3_3_23_2","first-page":"117","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)","author":"Busse Karoline","year":"2019","unstructured":"Karoline Busse, Julia Sch\u00e4fer, and Matthew Smith. 2019. Replication: No one can hack my mind revisiting a study on expert and { Non-Expert} security practices and advice. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 117\u2013136."},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054974"},{"key":"e_1_3_3_3_25_2","volume-title":"Constructing grounded theory: A practical guide through qualitative analysis","author":"Charmaz Kathy","year":"2006","unstructured":"Kathy Charmaz. 2006. Constructing grounded theory: A practical guide through qualitative analysis. sage."},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"crossref","unstructured":"Yan Chen and Fatemeh\u00a0Mariam Zahedi. 2016. Individuals\u2019 internet security perceptions and behaviors. Mis Quarterly 40 1 (2016) 205\u2013222.","DOI":"10.25300\/MISQ\/2016\/40.1.09"},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"crossref","unstructured":"Chhaya Chouhan Christy\u00a0M LaPerriere Zaina Aljallad Jess Kropczynski Heather Lipford and Pamela\u00a0J Wisniewski. 2019. Co-designing for community oversight: Helping people make privacy and security decisions together. Proceedings of the ACM on Human-Computer Interaction 3 CSCW (2019) 1\u201331.","DOI":"10.1145\/3359248"},{"key":"e_1_3_3_3_28_2","first-page":"5611","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Coopamootoo Kovila\u00a0PL","year":"2023","unstructured":"Kovila\u00a0PL Coopamootoo and Magdalene Ng. 2023. \"{ Un-Equal} Online Safety?\" A Gender Analysis of Security and Privacy Protection Advice and Behaviour Patterns. In 32nd USENIX Security Symposium (USENIX Security 23). 5611\u20135628."},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"crossref","unstructured":"Juliet\u00a0M Corbin and Anselm Strauss. 1990. Grounded theory research: Procedures canons and evaluative criteria. Qualitative sociology 13 1 (1990) 3\u201321.","DOI":"10.1007\/BF00988593"},{"key":"e_1_3_3_3_30_2","first-page":"97","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)","author":"Das Sauvik","year":"2019","unstructured":"Sauvik Das, Laura\u00a0A Dabbish, and Jason\u00a0I Hong. 2019. A typology of perceived triggers for { End-User} security and privacy behaviors. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 97\u2013115."},{"key":"e_1_3_3_3_31_2","first-page":"143","volume-title":"10th Symposium On Usable Privacy and Security (SOUPS 2014)","author":"Das Sauvik","year":"2014","unstructured":"Sauvik Das, Tiffany Hyun-Jin Kim, Laura\u00a0A Dabbish, and Jason\u00a0I Hong. 2014. The effect of social influence on security sensitivity. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). 143\u2013157."},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660271"},{"key":"e_1_3_3_3_33_2","unstructured":"Dawn News. 2016. Qandeel Baloch murdered by brother in Multan: police. https:\/\/www.dawn.com\/news\/1271213 Accessed: 2024-08-25."},{"key":"e_1_3_3_3_34_2","first-page":"81","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)","author":"Dev Jayati","year":"2020","unstructured":"Jayati Dev, Pablo Moriano, and L\u00a0Jean Camp. 2020. Lessons learnt from comparing { WhatsApp} privacy concerns across saudi and indian populations. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 81\u201397."},{"key":"e_1_3_3_3_35_2","volume-title":"DRF Cyber Harassment Helpline Annual Report 2021","author":"Foundation Digital Rights","year":"2021","unstructured":"Digital Rights Foundation. 2021. DRF Cyber Harassment Helpline Annual Report 2021. Technical Report. Digital Rights Foundation, Lahore, Pakistan. https:\/\/digitalrightsfoundation.pk\/wp-content\/uploads\/2022\/05\/helpline-annual-report-2021-1.pdf"},{"key":"e_1_3_3_3_36_2","unstructured":"Employers Federation of Pakistan. 2023. Punjab Minimum Wages Notification 2023. https:\/\/efp.org.pk\/punjab-minimum-wages-notification-2023\/ Accessed: 2024-07-16."},{"key":"e_1_3_3_3_37_2","unstructured":"Express Tribune. 2019. Pakistan\u2019s Rich and Poor Live in Different Countries. https:\/\/tribune.com.pk\/story\/2114456\/pakistans-rich-poor-live-different-countries Accessed: 2024-08-23."},{"key":"e_1_3_3_3_38_2","first-page":"59","volume-title":"Twelfth symposium on usable privacy and security (SOUPS 2016)","author":"Fagan Michael","year":"2016","unstructured":"Michael Fagan and Mohammad Maifi\u00a0Hasan Khan. 2016. Why do they do what they do?: A study of what motivates users to (not) follow computer security advice. In Twelfth symposium on usable privacy and security (SOUPS 2016). 59\u201375."},{"key":"e_1_3_3_3_39_2","unstructured":"Federal Board of Revenue. 2022. Fraudulent Apps Gathering Personal Data (Advisory No. 18). https:\/\/download1.fbr.gov.pk\/Docs\/2022526135150333FraudulentAppsgatheringpersonaldata(advisoryno.18).pdf Accessed: 2024-08-14."},{"key":"e_1_3_3_3_40_2","unstructured":"Vicki\u00a0S Freimuth and Wendy Mettger. 1990. Is there a hard-to-reach audience? Public health reports 105 3 (1990) 232."},{"key":"e_1_3_3_3_41_2","first-page":"79","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)","author":"Fulton Kelsey\u00a0R","year":"2019","unstructured":"Kelsey\u00a0R Fulton, Rebecca Gelles, Alexandra McKay, Yasmin Abdi, Richard Roberts, and Michelle\u00a0L Mazurek. 2019. The effect of entertainment media on mental models of computer security. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 79\u201395."},{"key":"e_1_3_3_3_42_2","unstructured":"Tricia\u00a0K Gatlin and Michael\u00a0J Johnson. 2017. Two case examples of reaching the hard-to-reach: Low income minority and LGBT individuals. Journal of Health Disparities Research and Practice 10 3 (2017) 11."},{"key":"e_1_3_3_3_43_2","unstructured":"Government of Pakistan. [n. d.]. Benazir Income Support Programme. https:\/\/bisp.gov.pk\/ Accessed: 2024-08-03."},{"key":"e_1_3_3_3_44_2","unstructured":"Lea Gr\u00f6ber Waleed Arshad Angelica Goetzen Elissa\u00a0M Redmiles Maryam Mustafa Katharina Krombholz et\u00a0al. 2024. \u201cI chose to fight be brave and to deal with it\u201d: Threat Experiences and Security Practices of Pakistani Content Creators. (2024)."},{"key":"e_1_3_3_3_45_2","unstructured":"GSMA. 2024. The Mobile Economy Asia Pacific 2024. https:\/\/www.gsma.com\/solutions-and-impact\/connectivity-for-good\/mobile-economy\/wp-content\/uploads\/2024\/07\/240724-Mobile-Economy-Asia-Pacific-2024-FINAL.pdf Accessed: 2024-08-08."},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"crossref","unstructured":"Abdul Hameed and Zara Qaiser. 2019. Estimating social exclusion in rural Pakistan: A contribution to social development policies. Business & Economic Review 11 1 (2019) 103\u2013122.","DOI":"10.22547\/BER\/11.1.5"},{"key":"e_1_3_3_3_47_2","unstructured":"Eszter Hargittai. 2001. Second-level digital divide: Mapping differences in people\u2019s online skills. arXiv preprint cs\/0109068 (2001)."},{"key":"e_1_3_3_3_48_2","unstructured":"Eszter Hargittai. 2003. The digital divide and what to do about it. New economy handbook 2003 (2003) 821\u2013839."},{"key":"e_1_3_3_3_49_2","first-page":"39","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)","author":"Hasegawa Ayako\u00a0A","year":"2022","unstructured":"Ayako\u00a0A Hasegawa, Naomi Yamashita, Tatsuya Mori, Daisuke Inoue, and Mitsuaki Akiyama. 2022. Understanding { Non-Experts\u2019} Security-and { Privacy-Related} Questions on a { Q&A} Site. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). 39\u201356."},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585823"},{"key":"e_1_3_3_3_51_2","unstructured":"Google Pixel\u00a0Phone Help. 2024. Learn more about the new Scam Detection beta. https:\/\/support.google.com\/pixelphone\/thread\/307725284\/learn-more-about-the-new-scam-detection-beta?hl=en Accessed: 2024-11-18."},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"crossref","unstructured":"Monique Hennink and Bonnie\u00a0N Kaiser. 2022. Sample sizes for saturation in qualitative research: A systematic review of empirical tests. Social science & medicine 292 (2022) 114523.","DOI":"10.1016\/j.socscimed.2021.114523"},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"crossref","unstructured":"Monique\u00a0M Hennink Bonnie\u00a0N Kaiser and Vincent\u00a0C Marconi. 2017. Code saturation versus meaning saturation: how many interviews are enough? Qualitative health research 27 4 (2017) 591\u2013608.","DOI":"10.1177\/1049732316665344"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"crossref","unstructured":"Joseph Henrich Steven\u00a0J Heine and Ara Norenzayan. 2010. The weirdest people in the world? Behavioral and brain sciences 33 2-3 (2010) 61\u201383.","DOI":"10.1017\/S0140525X0999152X"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581410"},{"key":"e_1_3_3_3_56_2","unstructured":"Qian Hongdao Muhammad\u00a0Bilawal Khaskheli Hafiz\u00a0Abdul Rehman\u00a0Saleem Jonathan\u00a0Gsell Mapa and Sughra Bibi. 2018. Honor killing phenomena in Pakistan. JL Pol\u2019y & Globalization 73 (2018) 169."},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"crossref","unstructured":"Samia Ibtasam Lubna Razaq Maryam Ayub Jennifer\u00a0R Webster Syed\u00a0Ishtiaque Ahmed and Richard Anderson. 2019. \" My cousin bought the phone for me. I never go to mobile shops.\" The Role of Family in Women\u2019s Technological Inclusion in Islamic Culture. Proceedings of the ACM on Human-Computer Interaction 3 CSCW (2019) 1\u201333.","DOI":"10.1145\/3359148"},{"key":"e_1_3_3_3_58_2","first-page":"327","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)","author":"Ion Iulia","year":"2015","unstructured":"Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. { \u201c... No} one Can Hack My { Mind\u201d} : Comparing Expert and { Non-Expert} Security Practices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). 327\u2013346."},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"crossref","unstructured":"Aarti Israni Nicole\u00a0B Ellison and Tawanna\u00a0R Dillahunt. 2021. \u2019A Library of People\u2019 Online Resource-Seeking in Low-Income Communities. Proceedings of the ACM on Human-Computer Interaction 5 CSCW1 (2021) 1\u201328.","DOI":"10.1145\/3449226"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"crossref","unstructured":"Margaret\u00a0C Jack Pang Sovannaroth and Nicola Dell. 2019. \" Privacy is not a concept but a way of dealing with life\" Localization of Transnational Technology Platforms and Liminal Privacy Practices in Cambodia. Proceedings of the ACM on Human-Computer Interaction 3 CSCW (2019) 1\u201319.","DOI":"10.1145\/3359230"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.1037\/11887-000"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300669"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"crossref","unstructured":"Katharina Krombholz Heidelinde Hobel Markus Huber and Edgar Weippl. 2015. Advanced social engineering attacks. Journal of Information Security and applications 22 (2015) 113\u2013122.","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"crossref","unstructured":"Jess Kropczynski Zaina Aljallad Nathan\u00a0Jeffrey Elrod Heather Lipford and Pamela\u00a0J Wisniewski. 2021. Towards building community collective efficacy for managing digital privacy and security within older adult communities. Proceedings of the ACM on Human-Computer Interaction 4 CSCW3 (2021) 1\u201327.","DOI":"10.1145\/3432954"},{"key":"e_1_3_3_3_65_2","doi-asserted-by":"crossref","unstructured":"Jess Kropczynski Reza Ghaiumy\u00a0Anaraky Mamtaj Akter Amy\u00a0J Godfrey Heather Lipford and Pamela\u00a0J Wisniewski. 2021. Examining collaborative support for privacy and security in the broader context of tech caregiving. Proceedings of the ACM on Human-Computer Interaction 5 CSCW2 (2021) 1\u201323.","DOI":"10.1145\/3479540"},{"key":"e_1_3_3_3_66_2","unstructured":"Mary Madden. 2017. Privacy Security and Digital Inequality. Data & Society (2017)."},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"crossref","unstructured":"Indrani Medhi Somani Patnaik Emma Brunskill SN\u00a0Nagasena Gautama William Thies and Kentaro Toyama. 2011. Designing mobile interfaces for novice and low-literacy users. ACM Transactions on Computer-Human Interaction (TOCHI) 18 1 (2011) 1\u201328.","DOI":"10.1145\/1959022.1959024"},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICTD.2006.301841"},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"crossref","unstructured":"Hamid Mehmood Tallal Ahmad Lubna Razaq Shrirang Mare Maryem\u00a0Zafar Usmani Richard Anderson and Agha\u00a0Ali Raza. 2019. Towards digitization of collaborative savings among low-income groups. Proceedings of the ACM on human-computer interaction 3 CSCW (2019) 1\u201330.","DOI":"10.1145\/3274304"},{"key":"e_1_3_3_3_70_2","unstructured":"Ministry of Federal Education and Professional Training Pakistan. 2018. National Education Policy Framework 2018. https:\/\/www.mofept.gov.pk\/SiteImage\/Policy\/National%20Eductaion%20Policy%20Framework%202018%20Final.pdf Accessed: 2024-08-11."},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"crossref","unstructured":"Wanda Montalvo and Elaine Larson. 2014. Participant comprehension of research for which they volunteer: a systematic review. Journal of Nursing Scholarship 46 6 (2014) 423\u2013431.","DOI":"10.1111\/jnu.12097"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833779"},{"key":"e_1_3_3_3_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179410"},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"crossref","unstructured":"Savanthi Murthy Karthik\u00a0S Bhat Sauvik Das and Neha Kumar. 2021. Individually vulnerable collectively safe: The security and privacy practices of households with older adults. Proceedings of the ACM on Human-Computer Interaction 5 CSCW1 (2021) 1\u201324.","DOI":"10.1145\/3449212"},{"key":"e_1_3_3_3_75_2","doi-asserted-by":"crossref","unstructured":"Mustafa Naseem Fouzia Younas and Maryam Mustafa. 2020. Designing digital safe spaces for peer support and connectivity in patriarchal contexts. Proceedings of the ACM on Human-Computer Interaction 4 CSCW2 (2020) 1\u201324.","DOI":"10.1145\/3415217"},{"key":"e_1_3_3_3_76_2","unstructured":"National Database and Registration Authority Pakistan. 2024. National Database and Registration Authority (NADRA). https:\/\/www.nadra.gov.pk Accessed: 2024-11-18."},{"key":"e_1_3_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501883"},{"key":"e_1_3_3_3_78_2","first-page":"63","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)","author":"Nthala Norbert","year":"2018","unstructured":"Norbert Nthala and Ivan Flechais. 2018. Informal support networks: an investigation into home data security practices. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). 63\u201382."},{"key":"e_1_3_3_3_79_2","unstructured":"Pakistan Bureau of Statistics Government of Pakistan. [n. d.]. Pakistan Labour Force Survey 2020-21. https:\/\/www.pbs.gov.pk\/sites\/default\/files\/labour_force\/publications\/lfs2020_21\/LFS_2020-21_Report.pdf. Accessed: 2023-09-20."},{"key":"e_1_3_3_3_80_2","unstructured":"Pakistan Bureau of Statistics Government of Pakistan. 2023. 7th Population and Housing Census - Detailed Results. https:\/\/www.pbs.gov.pk\/digital-census\/detailed-results. Accessed: 2024-08-31."},{"key":"e_1_3_3_3_81_2","unstructured":"Pakistan Telecommunication Authority. 2024. Pakistan Telecommunication Authority Website. https:\/\/www.pta.gov.pk Accessed: 2024-11-18."},{"key":"e_1_3_3_3_82_2","volume-title":"Income Disparity in Pakistan","author":"Today Pakistan","year":"2024","unstructured":"Pakistan Today. 2024. Income Disparity in Pakistan. https:\/\/www.pakistantoday.com.pk\/2024\/02\/20\/income-disparity-in-pakistan\/ Accessed: 2024-08-08."},{"key":"e_1_3_3_3_83_2","doi-asserted-by":"crossref","unstructured":"Sven\u00a0H Pedersen and Leif\u00a0A Str\u00f6mwall. 2013. Victim blame sexism and just-world beliefs: A cross-cultural comparison. Psychiatry Psychology and Law 20 6 (2013) 932\u2013941.","DOI":"10.1080\/13218719.2013.770715"},{"key":"e_1_3_3_3_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/3314344.3332500"},{"key":"e_1_3_3_3_85_2","first-page":"1","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)","author":"Pfeffer Katharina","year":"2022","unstructured":"Katharina Pfeffer, Alexandra Mai, Edgar Weippl, Emilee Rader, and Katharina Krombholz. 2022. Replication: Stories as informal lessons about security. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). 1\u201318."},{"key":"e_1_3_3_3_86_2","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335364"},{"key":"e_1_3_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533237"},{"key":"e_1_3_3_3_88_2","doi-asserted-by":"crossref","unstructured":"Lubna Razaq Tallal Ahmad Samia Ibtasam Umer Ramzan and Shrirang Mare. 2021. \" We Even Borrowed Money From Our Neighbor\" Understanding Mobile-based Frauds Through Victims\u2019 Experiences. Proceedings of the ACM on human-computer interaction 5 CSCW1 (2021) 1\u201330.","DOI":"10.1145\/3449115"},{"key":"e_1_3_3_3_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00059"},{"key":"e_1_3_3_3_90_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978307"},{"key":"e_1_3_3_3_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025673"},{"key":"e_1_3_3_3_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.24"},{"key":"e_1_3_3_3_93_2","volume-title":"The 2018 IEEE Security & Privacy Workshop on Technology and Consumer Protection (ConPro)","author":"Redmiles Elissa\u00a0M","year":"2018","unstructured":"Elissa\u00a0M Redmiles, Miraida Morales, Lisa Maszkiewicz, Rock Stevens, Everest Liu, Dhruv Kuchhal, and Michelle\u00a0L Mazurek. 2018. First steps toward measuring the readability of security advice. In The 2018 IEEE Security & Privacy Workshop on Technology and Consumer Protection (ConPro)."},{"key":"e_1_3_3_3_94_2","first-page":"89","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Redmiles Elissa\u00a0M","year":"2020","unstructured":"Elissa\u00a0M Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, and Michelle\u00a0L Mazurek. 2020. A comprehensive quality evaluation of security and privacy advice on the web. In 29th USENIX Security Symposium (USENIX Security 20). 89\u2013108."},{"key":"e_1_3_3_3_95_2","first-page":"1949","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Reichel Jake","year":"2020","unstructured":"Jake Reichel, Fleming Peck, Mikako Inaba, Bisrat Moges, Brahmnoor\u00a0Singh Chawla, and Marshini Chetty. 2020. \u2019I have too much respect for my elders\u2019: Understanding South African Mobile Users\u2019 Perceptions of Privacy and Current Behaviors on Facebook and { WhatsApp}. In 29th USENIX Security Symposium (USENIX Security 20). 1949\u20131966."},{"key":"e_1_3_3_3_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300232"},{"key":"e_1_3_3_3_97_2","first-page":"127","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)","author":"Sambasivan Nithya","year":"2018","unstructured":"Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura\u00a0Sanely Gayt\u00e1n-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. 2018. \" Privacy is not for me, it\u2019s for those rich women\": Performative Privacy Practices on Mobile Phones by Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). 127\u2013142."},{"key":"e_1_3_3_3_98_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753718"},{"key":"e_1_3_3_3_99_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300319"},{"key":"e_1_3_3_3_100_2","volume-title":"Grounded theory in practice","author":"Strauss Anselm\u00a0L","year":"1997","unstructured":"Anselm\u00a0L Strauss and Juliet\u00a0M Corbin. 1997. Grounded theory in practice. Sage."},{"key":"e_1_3_3_3_101_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174110"},{"key":"e_1_3_3_3_102_2","first-page":"1327","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Tu Huahong","year":"2019","unstructured":"Huahong Tu, Adam Doup\u00e9, Ziming Zhao, and Gail-Joon Ahn. 2019. Users really do answer telephone scams. In 28th USENIX Security Symposium (USENIX Security 19). 1327\u20131340."},{"key":"e_1_3_3_3_103_2","unstructured":"United Nations Development Programme (UNDP). 2020. Income Inequality in Pakistan. https:\/\/www.undp.org\/sites\/g\/files\/zskgke326\/files\/migration\/pk\/UNDP-PK-Poverty-2-Income-Inequality-in-Pakistan.pdf Accessed: 2024-08-23."},{"key":"e_1_3_3_3_104_2","doi-asserted-by":"publisher","DOI":"10.1145\/3209811.3209818"},{"key":"e_1_3_3_3_105_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300302"},{"key":"e_1_3_3_3_106_2","unstructured":"VICE. 2014. The Kitchen Divides Pakistan\u2019s Rich and Poor. https:\/\/www.vice.com\/en\/article\/the-kitchen-divides-pakistans-rich-and-poor Accessed: 2024-08-23."},{"key":"e_1_3_3_3_107_2","doi-asserted-by":"crossref","unstructured":"Jessica Vitak Yuting Liao Mega Subramaniam and Priya Kumar. 2018. \u2019I Knew It Was Too Good to Be True\" The Challenges Economically Disadvantaged Internet Users Face in Assessing Trustworthiness Avoiding Scams and Developing Self-Efficacy Online. Proceedings of the ACM on human-computer interaction 2 CSCW (2018) 1\u201325.","DOI":"10.1145\/3274445"},{"key":"e_1_3_3_3_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833643"},{"key":"e_1_3_3_3_109_2","first-page":"271","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)","author":"Warshaw Jeffrey","year":"2016","unstructured":"Jeffrey Warshaw, Nina Taft, and Allison Woodruff. 2016. Intuitions, analytics, and killing ants: inference literacy of high school-educated adults in the { US}. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 271\u2013285."},{"key":"e_1_3_3_3_110_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376605"},{"key":"e_1_3_3_3_111_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376763"},{"key":"e_1_3_3_3_112_2","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384761"},{"key":"e_1_3_3_3_113_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833757"},{"key":"e_1_3_3_3_114_2","doi-asserted-by":"publisher","DOI":"10.1145\/3392561.3394639"},{"key":"e_1_3_3_3_115_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642433"},{"key":"e_1_3_3_3_116_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376570"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713297","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:30:31Z","timestamp":1751607031000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713297"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":115,"alternative-id":["10.1145\/3706598.3713297","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713297","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}