{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:44:29Z","timestamp":1765439069006,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,4]]},"DOI":"10.1145\/3757232.3757238","type":"proceedings-article","created":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T12:13:01Z","timestamp":1762258381000},"page":"71-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Terms and Conditions (Do Not) Apply: Understanding Exploitation Disparities in Design of Mobile-Based Financial Services"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5788-5888","authenticated-orcid":false,"given":"Lindah","family":"Kotut","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, Washington, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,4]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"Syed\u00a0Ishtiaque Ahmed Md.\u00a0Romael Haque Jay Chen and Nicola Dell. 2017. Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh. Proc. ACM Hum.-Comput. Interact. 1 CSCW Article 17 (dec 2017) 20\u00a0pages. 10.1145\/3134652","DOI":"10.1145\/3134652"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025961"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","unstructured":"Waqas Ahmed Aamir Rasool Abdul\u00a0Rehman Javed Neeraj Kumar Thippa\u00a0Reddy Gadekallu Zunera Jalil and Natalia Kryvinska. 2021. Security in Next Generation Mobile Payment Systems: A Comprehensive Survey. IEEE Access 9 (2021) 115932\u2013115950. 10.1109\/ACCESS.2021.3105450","DOI":"10.1109\/ACCESS.2021.3105450"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","unstructured":"Savita Bailur and H\u00e9l\u00e8ne Smertnik. 2021. Making Digital Financial Services More Trustworthy for Women. Interactions 28 2 (mar 2021) 104\u2013107. 10.1145\/3448556","DOI":"10.1145\/3448556"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/1999927.1999939"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2369220.2369225"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319723"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","unstructured":"E. Brewer M. Demmer B. Du M. Ho M. Kam S. Nedevschi J. Pal R. Patra S. Surana and K. Fall. 2005. The case for technology in developing regions. Computer 38 6 (2005) 25\u201338. 10.1109\/MC.2005.204","DOI":"10.1109\/MC.2005.204"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Jenna Burrell. 2010. Evaluating Shared Access: social equality and the circulation of mobile phones in rural Uganda. Journal of computer-mediated communication 15 2 (2010) 230\u2013250.","DOI":"10.1111\/j.1083-6101.2010.01518.x"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3001913.3001919"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380417"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187879"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.4135\/9781452230153"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173880"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3715335.3736315"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Jonathan Donner. 2008. Research approaches to mobile use in the developing world: A review of the literature. The information society 24 3 (2008) 140\u2013159. https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01972240802019970","DOI":"10.1080\/01972240802019970"},{"key":"e_1_3_3_2_18_2","unstructured":"The Economist. 2013. Airtime is money: The use of pre-paid mobile-phone minutes as a currency. https:\/\/www.economist.com\/finance-and-economics\/2013\/01\/19\/airtime-is-money."},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753720"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Eva Gutierrez and Tony Choi. 2014. Mobile money services development: the cases of the Republic of Korea and Uganda. https:\/\/elibrary.worldbank.org\/doi\/abs\/10.1596\/1813-9450-6786","DOI":"10.1596\/1813-9450-6786"},{"key":"e_1_3_3_2_21_2","unstructured":"Andrew Harris Seymour Goodman and Patrick Traynor. 2012. Privacy and security concerns associated with mobile money applications in Africa. Wash. JL Tech. & Arts 8 (2012) 245. https:\/\/digitalcommons.law.uw.edu\/wjlta\/vol8\/iss3\/5\/"},{"key":"e_1_3_3_2_22_2","unstructured":"David Herbling. 2016. Banks come under pressure over expensive M-Pesa loans. https:\/\/www.businessdailyafrica.com\/corporate\/Banks-come-under-pressure-over-expensive-MPesa-loans\/539550-3382958-3o35laz\/index.html."},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Nick Hughes and Susie Lonie. 2007. M-PESA: mobile money for the \u201cunbanked\u201d turning cellphones into 24-hour tellers in Kenya. Innovations: technology governance globalization 2 1-2 (2007) 63\u201381. https:\/\/direct.mit.edu\/itgg\/article\/2\/1-2\/63\/9485\/M-PESA-Mobile-Money-for-the-Unbanked-Turning","DOI":"10.1162\/itgg.2007.2.1-2.63"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3209811.3209819"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753522"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460112.3471961"},{"key":"e_1_3_3_2_27_2","unstructured":"CM Kariuki and PK Ngugi. 2014. The effect of table banking on the performance of micro and small enterprises in Nairobi County. International Journal of Current Business and Social Sciences 1 2 (2014) 339\u2013360."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Minjin Kim Hanah Zoo Heejin Lee and Juhee Kang. 2018. Mobile financial services financial inclusion and development: A systematic review of academic literature. The Electronic Journal of Information Systems in Developing Countries 84 5 (2018) e12044. https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/isd2.12044","DOI":"10.1002\/isd2.12044"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642874"},{"key":"e_1_3_3_2_30_2","unstructured":"Lindah Kotut and D\u00a0Scott McCrickard. 2020. Amplifying the Griot: Design Fiction for Development as an Inclusivity Lens. EasyChair Preprint - - (2020)."},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","unstructured":"Lindah Kotut and D.\u00a0Scott McCrickard. 2022. The TL;DR Charter: Speculatively Demystifying Privacy Policy Documents and Terms Agreements. Proc. ACM Hum.-Comput. Interact. 6 GROUP Article 23 (jan 2022) 14\u00a0pages. 10.1145\/3492842","DOI":"10.1145\/3492842"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502094"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300620"},{"key":"e_1_3_3_2_34_2","unstructured":"Felix Maringa and Abu-Bakarr Jalloh. 2023. Millions of Kenyans indebted to mobile app lenders. https:\/\/www.dw.com\/en\/millions-of-kenyans-indebted-to-mobile-app-lenders\/a-65349197."},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","unstructured":"Bossi Masamila. 2014. State of mobile banking in Tanzania and security issues. International Journal of Network Security & Its Applications 6 4 (2014) 53. 10.5121\/ijnsa.2014.6405","DOI":"10.5121\/ijnsa.2014.6405"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Moses\u00a0Muia Masika Gregory\u00a0Barnabas Omondi Dennis\u00a0Simiyu Natembeya Ephraim\u00a0Mwatha Mugane Kefa\u00a0Ogonyo Bosire and Isaac\u00a0Ongubo Kibwage. 2015. Use of mobile learning technology among final year medical students in Kenya. Pan African Medical Journal 21 1 (2015). https:\/\/www.panafrican-med-journal.com\/content\/article\/21\/127\/full\/","DOI":"10.11604\/pamj.2015.21.127.6185"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"crossref","unstructured":"Bill Maurer. 2012. Mobile money: Communication consumption and change in the payments space. Journal of Development Studies 48 5 (2012) 589\u2013604. https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00220388.2011.621944","DOI":"10.1080\/00220388.2011.621944"},{"key":"e_1_3_3_2_38_2","unstructured":"Joseck\u00a0Luminzu Mudiri. 2013. Fraud in mobile financial services. Rapport technique MicroSave 30 (2013). https:\/\/www.microsave.net\/files\/pdf\/RP151_Fraud_in_Mobile_Financial_Services_JMudiri.pdf"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833779"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"crossref","unstructured":"Laura\u00a0L Murphy and Alexandra\u00a0E Priebe. 2011. \u201cMy co-wife can borrow my mobile phone!\u201d Gendered Geographies of Cell Phone Usage and Significance for Rural Kenyans. Gender Technology and Development 15 1 (2011) 1\u201323. https:\/\/journals.sagepub.com\/doi\/10.1177\/097185241101500101","DOI":"10.1177\/097185241101500101"},{"key":"e_1_3_3_2_41_2","unstructured":"Angela\u00a0W. Mutua. 2009. Strategic Change Management at Faulu Kenya. Master\u2019s thesis. School ofBusiness."},{"key":"e_1_3_3_2_42_2","unstructured":"Kabui Mwangi. 2023. Whitepath Regus slapped with Sh5m fine for breaching data laws. https:\/\/www.businessdailyafrica.com\/bd\/corporate\/companies\/whitepath-regus-slapped-with-sh5m-fine-for-breaching-data-laws-4196536."},{"key":"e_1_3_3_2_43_2","unstructured":"Waihiga Mwaura. 2021. Kenya outrage over debt collectors\u2019 shaming tactics. https:\/\/www.bbc.com\/news\/world-africa-57985667"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3283458.3283472"},{"key":"e_1_3_3_2_45_2","unstructured":"United Nations. 2000. United Nations Millennium Development Goals (2000-2015). https:\/\/www.un.org\/millenniumgoals\/."},{"key":"e_1_3_3_2_46_2","unstructured":"United Nations. 2017. Sustainable Development: 17 Goals. https:\/\/sdgs.un.org\/goals."},{"key":"e_1_3_3_2_47_2","unstructured":"Annie Njanja. 2021. Kenya cracks down on digital lenders over data privacy issues. https:\/\/techcrunch.com\/2021\/10\/25\/kenya-cracks-down-on-digital-lenders-over-data-privacy-issues\/."},{"key":"e_1_3_3_2_48_2","unstructured":"Annie Njanja. 2023. Google to ban unlicensed loan apps in Kenya as new rules take effect. https:\/\/techcrunch.com\/2023\/01\/31\/google-to-ban-unlicensed-loan-apps-in-kenya-as-new-rules-take-effect\/."},{"key":"e_1_3_3_2_49_2","unstructured":"Allan Odhiambo. 2023. Fintech loans leave trail of regret and shame on Kenyans. https:\/\/www.theeastafrican.co.ke\/tea\/business\/kenya-s-fintech-loans-leave-trail-of-regret-4050142"},{"key":"e_1_3_3_2_50_2","unstructured":"Central\u00a0Bank of Kenya. 2014. The Microfinance Act 2006. https:\/\/www.centralbank.go.ke\/wp-content\/uploads\/2016\/08\/MICROFINANCEACT2006.pdf."},{"key":"e_1_3_3_2_51_2","unstructured":"Central\u00a0Bank of Kenya. 2016. The Banking (Amendment) Act 2016. https:\/\/www.centralbank.go.ke\/uploads\/banking_circulars\/1456582762_Banking Circular No 4 of 2016 - The Banking Amendment Act 2016.pdf."},{"key":"e_1_3_3_2_52_2","unstructured":"Central\u00a0Bank of Kenya. 2021. Enactment Of The Law To Regulate Digital Lenders And Issuance Of The Corresponding Draft Regulations For Public Comment. https:\/\/www.centralbank.go.ke\/uploads\/press_releases\/139697899_Press Release - Enactment of the Law to Regulate Digital Lenders.pdf."},{"key":"e_1_3_3_2_53_2","unstructured":"The Central\u00a0Bank of Kenya. 2023. Commercial Banks Weighted Average Rates. https:\/\/www.centralbank.go.ke\/commercial-banks-weighted-average-rates\/."},{"key":"e_1_3_3_2_54_2","unstructured":"Office of\u00a0the Data Protection\u00a0Commissioner. 2021. The Data Protection Act 2019. https:\/\/www.odpc.go.ke\/dpa-act\/."},{"key":"e_1_3_3_2_55_2","unstructured":"Quincy Okoth. 2023. Tweet. https:\/\/twitter.com\/_skilli\/status\/1656951932542484481."},{"key":"e_1_3_3_2_56_2","unstructured":"Dominic Omondi. 2018. The rise of Kenya\u2019s new \u2018shylock\u2019 economy. https:\/\/www.standardmedia.co.ke\/business\/article\/2001300058\/the-rise-of-kenya-s-new-shylock-economy."},{"key":"e_1_3_3_2_57_2","unstructured":"Dominic Omondi. 2021. How M-Shwari outpriced itself from lucrative mobile loans (Archived). https:\/\/web.archive.org\/web\/20210930185941\/https:\/\/www.standardmedia.co.ke\/business\/financial-standard\/article\/2001418106\/how-m-shwari-outpriced-itself-from-lucrative-mobile-loans."},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3314344.3332500"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","unstructured":"Lubna Razaq Tallal Ahmad Samia Ibtasam Umer Ramzan and Shrirang Mare. 2021. \"We Even Borrowed Money From Our Neighbor\": Understanding Mobile-Based Frauds Through Victims\u2019 Experiences. Proc. ACM Hum.-Comput. Interact. 5 CSCW1 Article 41 (apr 2021) 30\u00a0pages. 10.1145\/3449115","DOI":"10.1145\/3449115"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","unstructured":"Bradley Reaves Jasmine Bowers Nolen Scaife Adam Bates Arnav Bhartiya Patrick Traynor and Kevin R.\u00a0B. Butler. 2017. Mo(Bile) Money Mo(Bile) Problems: Analysis of Branchless Banking Applications. ACM Trans. Priv. Secur. 20 3 Article 11 (aug 2017) 31\u00a0pages. 10.1145\/3092368","DOI":"10.1145\/3092368"},{"key":"e_1_3_3_2_61_2","unstructured":"Hindenburg Research. 2020. Opera: Phantom of the Turnaround \u2013 70% Downside. https:\/\/hindenburgresearch.com\/opera-phantom-of-the-turnaround\/."},{"key":"e_1_3_3_2_62_2","unstructured":"Antoaneta Roussi. 2020. Airtime is money: The use of pre-paid mobile-phone minutes as a currency. https:\/\/www.ft.com\/content\/16c86479-e88d-4a28-8fa4-cd72bace5104."},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3448696.3448704"},{"key":"e_1_3_3_2_64_2","unstructured":"Safaricom. 2014. Safaricom and CBA Launch Ambitious Plan to Grow M-Shwari Customers. https:\/\/www.safaricom.co.ke\/media-center-landing\/press-releases\/safaricom-and-cba-launch-ambitious-plan-to-grow-m-shwari-customers."},{"key":"e_1_3_3_2_65_2","unstructured":"Safaricom. 2015. Mobile Banking Codes\/Paybills. https:\/\/www.safaricom.co.ke\/images\/Mobile_Banking_Codes_Paybill.pdf"},{"key":"e_1_3_3_2_66_2","unstructured":"Safaricom. 2023. Fuliza Terms and Conditons. https:\/\/www.safaricom.co.ke\/media-center-landing\/terms-and-conditions\/fuliza-terms-and-conditons"},{"key":"e_1_3_3_2_67_2","unstructured":"Safaricom. 2023. M-PESA USSD fraud. https:\/\/www.safaricom.co.ke\/fraud-awareness\/m-pesa-fraud\/m-pesa-ussd-fraud."},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/3287098.3287123"},{"key":"e_1_3_3_2_69_2","unstructured":"Jonathan Shieber. 2018. With loans of just $10 this startup has built a financial services powerhouse in emerging markets. https:\/\/techcrunch.com\/2018\/04\/18\/with-loans-of-just-10-this-startup-has-built-a-financial-services-powerhouse-in-emerging-markets\/."},{"key":"e_1_3_3_2_70_2","doi-asserted-by":"publisher","unstructured":"Frank Stajano and Paul Wilson. 2011. Understanding Scam Victims: Seven Principles for Systems Security. Commun. ACM 54 3 (mar 2011) 70\u201375. 10.1145\/1897852.1897872","DOI":"10.1145\/1897852.1897872"},{"key":"e_1_3_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445047"},{"key":"e_1_3_3_2_72_2","doi-asserted-by":"crossref","unstructured":"Tavneet Suri and William Jack. 2016. The long-run poverty and gender impacts of mobile money. Science 354 6317 (2016) 1288\u20131292. https:\/\/www.science.org\/doi\/10.1126\/science.aah5309","DOI":"10.1126\/science.aah5309"},{"key":"e_1_3_3_2_73_2","unstructured":"Nikko Tanui. 2022. Main suspect in SIM swap fraud arrested amid DCI investigations. https:\/\/www.standardmedia.co.ke\/national\/article\/2001464127\/main-suspect-in-sim-swap-fraud-arrested-amid-dci-investigations."},{"key":"e_1_3_3_2_74_2","unstructured":"Mate Tongola. 2022. How to protect yourself from SIM swapping fraud. https:\/\/www.standardmedia.co.ke\/business\/sci-tech\/article\/2001446801\/how-to-protect-yourself-from-sim-swap-fraud."},{"key":"e_1_3_3_2_75_2","unstructured":"Jared Too. 2022. Long queues as Kenyans rush to beat SIM card registration deadline. https:\/\/www.standardmedia.co.ke\/counties\/article\/2001442654\/long-queues-as-kenyans-rush-to-beat-sim-card-registration-deadline"},{"key":"e_1_3_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3209811.3209818"},{"key":"e_1_3_3_2_77_2","unstructured":"Wanyama wa Chebusiri. 2012. Kenya\u2019s battle to switch off fake phones. https:\/\/www.bbc.com\/news\/world-africa-19819965"},{"key":"e_1_3_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/2317956.2317985"},{"key":"e_1_3_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/3209811.3209863"}],"event":{"name":"Africhi 2025: The 5th Biennial African Human Computer Interaction Conference","acronym":"Africhi 2025","location":"Cairo Egypt"},"container-title":["Proceedings of the Fifth Biennial African Human-Computer Interaction Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757232.3757238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T13:43:50Z","timestamp":1762263830000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757232.3757238"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,4]]},"references-count":78,"alternative-id":["10.1145\/3757232.3757238","10.1145\/3757232"],"URL":"https:\/\/doi.org\/10.1145\/3757232.3757238","relation":{},"subject":[],"published":{"date-parts":[[2025,11,4]]},"assertion":[{"value":"2025-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}