28 Hits in 13.2 sec

Exclusion and inclusion in identification: regulation, displacement and data justice

Aaron Martin, Linnet Taylor
2020 Information Technology for Development  
Meanwhile, the humanitarian sector is undergoing a transformation in which digital identity, mobile connectivity and digital finance are central features.  ...  Through a data justice lens, this paper explores customer identification regimes in two country contexts in which large displaced populations are present: Uganda and Bangladesh.  ...  Acknowledgements The authors would like to thank the organizers of the 2019 Data Power Conference in Bremen, Germany, where a version of this paper was first presented, as well as Wainer Lusoli for inviting  ... 
doi:10.1080/02681102.2020.1811943 fatcat:yehld67l2vhqtg67zdbmmr5oyy

A Study On Aadhar Privacy And Personal Security Issues In India

Hemant Kumar.S, Sahana Madan
2021 Zenodo  
India"s much tested biometric experiment aadhar has aroused a hot and most debated topic on data privacy and personal security issues in India.  ...  The study analysed the impact of aadhar on private and personal security of Indian citizens.  ...  Privacy, security, and surveillance in the Global South: A study of biometric mobile SIM registration in Bangladesh.  ... 
doi:10.5281/zenodo.4641657 fatcat:ivxymbkdtbavnps44bd4tjwdou


Mohsin Dhali, Sonny Zulhuda, Suzi Fadhilah Ismail
2021 IIUM Law Journal  
The purpose of the present study is to find out whether the right to privacy is in fact recognized and protected by the Constitution of Bangladesh by examining specific provisions in the Constitution of  ...  Bangladesh to locate provisions that could be relied on to show that a sliver of recognition could be given to the right of privacy in Bangladesh.  ...  In addition, providing biometrics is a mandatory requirement to buy a mobile sim card allowing telecommunication companies to use consumers' personal data as they seem fit in the absence of a proper regulatory  ... 
doi:10.31436/iiumlj.v28i2.451 fatcat:tuvdev4jvnep7llqtc5uqor5j4

"We, three brothers have always known everything of each other": A Cross-cultural Study of Sharing Digital Devices and Online Accounts

Mahdi Nasrullah Al-Ameen, Huzeyfe Kocabas, Swapnil Nandy, Tanjina Tamanna
2021 Proceedings on Privacy Enhancing Technologies  
Our study reveals users' perceptions of risks while sharing a device or account, and their access control strategies to protect privacy and security.  ...  To this end, our paper presents a qualitative study with 59 participants from three different countries: Bangladesh, Turkey, and USA, where we investigated the sharing of digital devices (e.g., computer  ...  Acknowledgement We thank our participants in this study. We are thankful to our shepherd, Cheng Guo and the anonymous reviewers for their thoughtful and detailed feedback.  ... 
doi:10.2478/popets-2021-0067 fatcat:az45n2yk6na5jk7zmxzct3lute

Identification for Development: The Biometrics Revolution

Alan Gelb, Julia Clark
2013 Social Science Research Network  
Unfortunately, underdocumentation is pervasive in the developing world. Civil registration systems are often absent or cover only a fraction of the population.  ...  Within such a strategic framework, countries and donors can work to close the identification gap, and in the process improve both inclusion and the efficiency of many programs.  ...  Nigeria, for example, has mandated biometric registration of SIM cards for mobile phone users in order to cut down on illicit activities.  ... 
doi:10.2139/ssrn.2226594 fatcat:tbcm7dn6hfgx3f47owsbz3vria

Precarious technoscapes: forced mobility and mobile connections at the urban margins

Peter Chonka, Jutta Bakonyi
2021 Journal of the British Academy  
The findings caution against techno-optimist developmental discourses, and provide a nuanced picture of the benefits, constraints, challenges and risks entailed in the engagement of marginalised urban  ...  This article explores mobile connectivity from the perspective of displaced people, analysing how they experience mobile phones, and the connections they enable in the context of conflict and urban reconstruction  ...  Although studies of the impacts of ICTs for marginal populations in the Global South are increasing, research on the use of phones by forced migrants on the African continent is limited.  ... 
doi:10.5871/jba/009s11.067 fatcat:42uogdjoebfybjzju7havlg7x4

SoK: A Framework for Unifying At-Risk User Research [article]

Noel Warford and Tara Matthews and Kaitlyn Yang and Omer Akgul and Sunny Consolvo and Patrick Gage Kelley and Nathan Malkin and Michelle L. Mazurek and Manya Sleeper and Kurt Thomas
2021 arXiv   pre-print
In this systematization work, we present a framework for reasoning about at-risk users based on a wide-ranging meta-analysis of 85 papers.  ...  At-risk users are people who experience elevated digital security, privacy, and safety threats because of what they do, who they are, where they are, or who they are with.  ...  vacy, security, and surveillance in the global south: Computer security and privacy in the interactions be- A study of biometric mobile SIM registration in tween victim  ... 
arXiv:2112.07047v1 fatcat:bgd2hpvh5fds3ibkawadu7rfhm

ICCIT 2020 Conference Proceedings [Front matter]

2020 2020 23rd International Conference on Computer and Information Technology (ICCIT)  
Bhavani Thuraisingham is the Founders Chair Professor of Computer Science and the  ...  However, security and privacy for the Internet of Transportation and the infrastructures that support it is a challenge.  ...  While AI has been evolving as a field during the past 60 years, the vast developments in computing and data management systems have resulted in serious security and privacy violations.  ... 
doi:10.1109/iccit51783.2020.9392749 fatcat:pz3hf7rsmzbjpe6hxjlu5tmrfq

Bodies as evidence: security, knowledge, and power

Emily C. Kaufman
2020 Social & Cultural Geography  
(2016) convincingly argue, most of the work also in critical migration studies has been focusing on the surveillance of the flows of people and surveillance and biometric technology. 6 The icmp was initiated  ...  Biometric registration in India is certainly one of the more extraordinary experiments in governance through security in the contemporary moment.  ...  The editors and contributors, working in ethnographic field sites from India to the United Kingdom and Argentina to the United States of America, noted that many contemporary matters of great consequence  ... 
doi:10.1080/14649365.2020.1732523 fatcat:fnk2lbajzrd3plk4cg4ufixpbu

A Comparison of Recruitment Methods for an mHealth Intervention Targeting Mothers: Lessons from the Growing Healthy Program

Rachel A Laws, Eloise-Kate V Litterbach, Elizabeth A Denney-Wilson, Catherine G Russell, Sarah Taki, Kok-Leong Ong, Rosalind M Elliott, Sharyn J Lymer, Karen J Campbell
2016 Journal of Medical Internet Research  
Empowerment and Mobile Phones in Rural Bangladesh: A Study of the Village Phone Scheme of Grameen Bank." Shirky, C. 2011. "The Political Power of Social Media."  ...  Governments will need to exercise care in securing their systems and software to avoid any perception of surveillance.  ...  W ith some six billion mobile subscriptions now in use worldwide, about three-quarters of humanity has access to a mobile phone.  ... 
doi:10.2196/jmir.5691 pmid:27634633 pmcid:PMC5043120 fatcat:rbg45p6xzzcgxe3b43jnav7nuy


Syed Ishtiaque Internet Ahmed
This project is based on my study to understand the public reactions to a recent government order in Bangladesh that has enforced the registration of each mobile SIM card with the biometric information  ...  The first project is called "Suhrid", and it was conducted with a group of low-literate rickshaw drivers in Dhaka, Bangladesh.  ...  ., and to the process of my growing up as a scholar in general, cannot be expressed in words. He has always been there Acknowledgements . . . .  ... 
doi:10.7298/x4p55kqj fatcat:z7scfnkkjrhmpapwqc2iikazje


Dr. P.S. Aithal, Prof. Amith D. Menezes
2019 Zenodo  
The Proceedings Book of One Day National Conference  ...  Farooq Hossan and Issa Ahammad (2013) conducted a study on Affiliate Marketing: The Case of Online Content Providers in Bangladesh.  ...  The purpose of this study was to explore the knowledge of affiliate marketing and investigate the views of content providers toward it in Bangladesh.  ... 
doi:10.5281/zenodo.3369601 fatcat:36pzraub2zgx3hxb3gnowzrya4

Making Sense of Digital Disintermediation and Development: The Case of the Mombasa Tea Auction [chapter]

2019 Digital Economies at Global Margins  
This work is licensed under a Creative Commons Attribution 4.0 (CC-BY 4.0) International License. Published by the MIT Press.  ...  A copublication with  ...  Acknowledgments An extended version of this chapter first appeared as J. Burrell  ... 
doi:10.7551/mitpress/10890.003.0012 fatcat:psdnugxerzcmje37k4xhpuhzyq


Dr. P S Aithal, Prof. Amith Menezes
2019 Zenodo  
I would also like to acknowledge our thanks to our parents for their valuable support and encouragement during the period of our study.  ...  Acknowledgement We would like to express our gratitude towards our guide Mrs.Shifana Begum, Assistant Professor, Dept. of CSE, Srinivas School of Engineering, Mukka for her support, guidance and encouragement  ...  To ensure and managing mobile security, network privacy, security and assurance, database etc Information Assurance is highly recommended.  ... 
doi:10.5281/zenodo.3250779 fatcat:rgrz3gtqhnfolkur7bsi7xyzue

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1994 Software engineering notes  
in what might be needed for a high-integrity election process, and a further study of the inherent risks, see the outstanding University of Pennsylvania PhD thesis  ...  Passport flaws (S 27 1:12, R 21 74) SHAIf Security hole in cash machines (S 27 1:12, R 21 74) SP Virgin Mobile security/privacy risk on archived mobile-phone usage records (S 27 1:12, R 21 74) SPH Risks  ...  Programming competency and the use of FORTH (R 20 49-53) + Spark, an attempt at a "safe" Ada subset (S 14 1) + Viper and formal methods used in Australian railroad switching (S 14 5) + Benefits of computer  ... 
doi:10.1145/181610.181612 fatcat:qfzxpio6tfgl5nmbevta334afi
« Previous Showing results 1 — 15 out of 28 results