2019
DOI: 10.1109/msec.2019.2912727
|View full text |Cite
|
Sign up to set email alerts
|

Toward Gender-Equitable Privacy and Security in South Asia

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
25
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(26 citation statements)
references
References 2 publications
1
25
0
Order By: Relevance
“…Scheuerman et al [80] also provided a framework for assessing the severity of threats based on such harms. Thomas et al [91], Sambasivan et al [76], and Levy and Schneier [51] detailed how attacks vary based on the capabilities of attackers, such as having intimate access to a target, or privileged access to a target's devices or data. Our at-risk framework differs in that we isolate the contextual risk factors that may make at-risk users particularly vulnerable to such attacks, threats, or harms.…”
Section: B Previous Taxonomies Of Attacks Threats and Harmsmentioning
confidence: 99%
See 3 more Smart Citations
“…Scheuerman et al [80] also provided a framework for assessing the severity of threats based on such harms. Thomas et al [91], Sambasivan et al [76], and Levy and Schneier [51] detailed how attacks vary based on the capabilities of attackers, such as having intimate access to a target, or privileged access to a target's devices or data. Our at-risk framework differs in that we isolate the contextual risk factors that may make at-risk users particularly vulnerable to such attacks, threats, or harms.…”
Section: B Previous Taxonomies Of Attacks Threats and Harmsmentioning
confidence: 99%
“…These threats were typified by a broad set of potential attackers, and contending with this type of hate and harassment may generally lead to emotional distress [13,92,96]. For this factor, past research has described the perception that anyone may be a potential attacker [79], exacerbated by the fact that attackers may hide behind anonymous identities [76,92].…”
Section: A Societal Factorsmentioning
confidence: 99%
See 2 more Smart Citations
“…For example, IBM recently released five "coercive control resistant" design principles, which are intended to prevent developments from being used for domestic abuse (Nuttall et al, 2020). Google's Security & Privacy Research & Design Group has produced various outputs on the issue of tech abuse (Matthews et al, 2017a(Matthews et al, , 2017bSambasivan & et al, 2019aSambasivan & et al, , 2019bSambasivan & et al, , 2019c and, prompted by research findings, taken action against some spyware apps that were available on its app store (Chatterjee et al, 2018). Kaspersky, F-Secure and other anti-virus and cybersecurity providers have recently established a dedicated "Coalition against Stalkerware".…”
Section: Figurementioning
confidence: 99%