{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:19:04Z","timestamp":1760239144288,"version":"build-2065373602"},"reference-count":37,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T00:00:00Z","timestamp":1601337600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>This paper examines the phenomenon of digital persecution in the Global South and evaluates tools that defend against it. First, the paper explains the nature of persecution and its digital incarnation. It then provides a contextual overview of real-world instances of digital persecution in seven Global South countries. The possible defensive technologies against censorship and surveillance are discussed. The article goes on to discuss barriers to technology adoption in the Global South, explains the security implication of these difficulties, and examines the role that human computer interaction (HCI) metrics could play in overcoming these challenges. Finally, the paper surveys the viability of sixteen security tools in a Global South context. The survey results were mixed, with 37.5% of the reviewed tools being deemed to be inviable for use in the Global South to defend against persecution. Prescriptive recommendations are provided for creating security tools that are universal, simple, and effective.<\/jats:p>","DOI":"10.3390\/fi12100166","type":"journal-article","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T08:43:27Z","timestamp":1601369007000},"page":"166","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Survey of Defensive Measures for Digital Persecution in the Global South"],"prefix":"10.3390","volume":"12","author":[{"given":"Louis Edward","family":"Papa","sequence":"first","affiliation":[{"name":"Graduate School of Arts and Science, Fordham University, New York, NY 10023, USA"},{"name":"Fordham Center for Cybersecurity, Fordham University, New York, NY 10023, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8952-1499","authenticated-orcid":false,"given":"Thaier","family":"Hayajneh","sequence":"additional","affiliation":[{"name":"Fordham Center for Cybersecurity, Fordham University, New York, NY 10023, USA"}]}],"member":"1968","published-online":{"date-parts":[[2020,9,29]]},"reference":[{"key":"ref_1","first-page":"1681","article-title":"The Bottom of the Data Pyramid: Big Data and the Global South","volume":"10","author":"Arora","year":"2016","journal-title":"Int. J. Commun."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1111\/aeq.12136","article-title":"Citizens under Suspicion: Response Research with Community under Surveillance","volume":"47","author":"Ali","year":"2016","journal-title":"Anthropol. Educ. Q."},{"key":"ref_3","unstructured":"(2020, April 15). Standard Country or Area Codes for Statistical Use (M49). United Nations. Available online: https:\/\/unstats.un.org\/unsd\/methodology\/m49\/."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1134","DOI":"10.1016\/j.telpol.2014.10.002","article-title":"Big data\u2019s impact on privacy, security and consumer welfare","volume":"38","author":"Kshetri","year":"2014","journal-title":"Telecommun. Policy"},{"key":"ref_5","unstructured":"Amnesty International (2017). Human Rights Defenders Under Threat\u2014A Shrinking Space for Civil Society, Amnesty International."},{"key":"ref_6","unstructured":"(2016). The Global Surveillance Industry, Privacy International."},{"key":"ref_7","unstructured":"Nabi, Z. (2013). The Anatomy of Web Censorship in Pakistan, Information Technology University. Available online: http:\/\/0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com\/12387-foci13-nabi.pdf."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/00221309.2011.619223","article-title":"The Harder the Task, the More Inconsistent the Performance: A PPT Analysis on Task Difficulty","volume":"139","author":"Rice","year":"2012","journal-title":"J. Gen. Psychol."},{"key":"ref_9","unstructured":"(2020, July 10). A Fall to Cheer. The Economist, Available online: http:\/\/www.economist.com\/node\/21548963."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Moore, R.I. (2007). The Formation of a Persecuting Society: Authority and Deviance in Western Europe 950\u20131250, Blackwell. [2nd ed.].","DOI":"10.1002\/9780470773987"},{"key":"ref_11","unstructured":"(2020, July 10). republica2010, re:publica 2012\u2014Eben Moglen\u2014Freedom of Thought Requires Free Media. YouTube, 19 May 2012. Available online: https:\/\/www.youtube.com\/watch?v=sKOk4Y4inVY."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"576","DOI":"10.1177\/0163443716643006","article-title":"Crypto and empire: The contradictions of counter-surveillance advocacy","volume":"38","author":"Gurses","year":"2016","journal-title":"Media Cult. Soc."},{"key":"ref_13","first-page":"159","article-title":"Introduction: Under suspicious eyes\u2013surveillance states, security zones and ethnographic fieldwork","volume":"141","author":"Sokefeld","year":"2016","journal-title":"Z. Ethnol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10708-010-9393-3","article-title":"Geographies of Global Internet Censorship","volume":"76","author":"Warf","year":"2011","journal-title":"GeoJournal"},{"key":"ref_15","unstructured":"(2020, July 24). The World Factbook. Central Intelligence Agency, 1 April 2016, Available online: https:\/\/www.cia.gov\/library\/publications\/the-world-factbook\/."},{"key":"ref_16","first-page":"233","article-title":"Characterizing E-Government in China","volume":"24","year":"2012","journal-title":"Desafios"},{"key":"ref_17","first-page":"403","article-title":"Controlling the internet in China: The real story","volume":"18","author":"Dong","year":"2012","journal-title":"Converg. Int. J. Res. Into New Media Technol."},{"key":"ref_18","unstructured":"Marczak, B., Weaver, N., Dalek, J., Ensafi, R., and Paxson, V. (2020, July 17). An Analysis of China\u2019s \u201cGreat Cannon\u201d. Available online: https:\/\/citizenlab.ca\/2015\/04\/chinas-great-cannon\/."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Chandel, S., Jingji, Z., Yunnan, Y., Jingyao, S., and Zhipeng, Z. (2019). The Golden Shield Project of China: A Decade Later\u2014An in-Depth Study of the Great Firewall, IEEE. International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).","DOI":"10.1109\/CyberC.2019.00027"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1257\/jep.31.1.117","article-title":"Why Does China Allow Freer Social Media? Protests versus Surveillance and Propaganda","volume":"31","author":"Qin","year":"2017","journal-title":"J. Econ. Perspect."},{"key":"ref_21","unstructured":"Amnesty International (2015). Death Sentences and Executions 2014, Amnesty International. Index: ACT 50\/001\/2015."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1080\/07393148.2012.676394","article-title":"The Role of the Internet in Political Struggles: Some Conclusions from Iran and Egypt","volume":"34","author":"Karagiannopoulos","year":"2012","journal-title":"New Political Sci."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Gupta, R., and Muttoo, S.K. (2016). Internet Traffic Surveillance & Network Monitoring in India: Case Study of NETRA. Netw. Protoc. Algorithms, 8.","DOI":"10.5296\/npa.v8i4.10179"},{"key":"ref_24","first-page":"51","article-title":"Iranian Devolution: Tehran Fights the Digital Future","volume":"178","author":"Berman","year":"2015","journal-title":"World Aff."},{"key":"ref_25","unstructured":"Ahmed, A., and Perlroth, N. (2020, July 23). Using Texts as Lures, Government Spyware Targets Mexican Journalists and Their Families. The New York Times, Available online: https:\/\/www.nytimes.com\/2017\/06\/19\/world\/americas\/mexico-spyware-anticrime.html."},{"key":"ref_26","unstructured":"(2020, July 17). Escaping from North Korea in Search of Freedom | Yeomni Park | One Young World. YouTube, 18 October 2014. Available online: https:\/\/www.youtube.com\/watch?v=ufhKWfPSQOw."},{"key":"ref_27","unstructured":"Sedaghat, N. (2020, July 17). North Korea Exposed: Censorship in the World\u2019s Most Secretive State. Available online: https:\/\/web.archive.org\/web\/20150509050318\/."},{"key":"ref_28","unstructured":"Haque, J. (2020, September 28). Pakistan\u2019s Internet Landscape: A Report by Bytes for All, Pakistan. Available online: https:\/\/new.waccglobal.org\/wp-content\/uploads\/wacc-global\/Images\/Articles\/2014\/01Jan\/Pakistan-Internet-Landscape.pdf."},{"key":"ref_29","unstructured":"UIS Unesco (2020, June 23). Mean Years of Schooling. Available online: http:\/\/data.uis.unesco.org\/."},{"key":"ref_30","first-page":"59","article-title":"Technology Adoption: Issues and Challenges in Information Technology Adoption in Emerging Economies","volume":"23","author":"Ejiaku","year":"2014","journal-title":"J. Int. Technol. Inf. Manag."},{"key":"ref_31","first-page":"18","article-title":"Exploring the Challenges of M-Government Adoption in Saudi Arabia","volume":"13","author":"Alssbaiheen","year":"2015","journal-title":"Electron. J. Gov."},{"key":"ref_32","first-page":"117","article-title":"Technology Acceptance: Examining the Intentions of Ghanian Teachers to Use Computer for Teaching","volume":"26","author":"Nor","year":"2016","journal-title":"Afr. J. Libr. Arch. Inf. Sci."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/BF00402715","article-title":"Measuring usability as quality of use","volume":"4","author":"Bevan","year":"1995","journal-title":"Softw. Qual. J."},{"key":"ref_34","unstructured":"Seffah, A., Donyaee, M., Kline, R.B., and Padda, H.K. (2009). Usability Measurement: A Roadmap for a Consolidated Model, Universite de Lausanne."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1016\/S0167-4048(03)00006-3","article-title":"Security and human computer interfaces","volume":"22","author":"Johnston","year":"2003","journal-title":"Comput. Secur."},{"key":"ref_36","unstructured":"(2020, July 28). Desktop Windows Versions Market Share Worldwide. StatCounter: GlobalStats. Available online: http:\/\/gs.statcounter.com\/os-version-market-share\/windows\/desktop."},{"key":"ref_37","unstructured":"(2020, August 12). Readable.io. Available online: https:\/\/readable.io\/."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/10\/166\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:14:53Z","timestamp":1760177693000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/10\/166"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,29]]},"references-count":37,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2020,10]]}},"alternative-id":["fi12100166"],"URL":"https:\/\/doi.org\/10.3390\/fi12100166","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2020,9,29]]}}}