Cultural differences in the online behavior of consumers
Communications of the ACM
Reincarnating PCs with portable SoulPads
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Global software piracy: can economic factors alone explain the trend?
Communications of the ACM - Hacking and innovation
Spam and the ongoing battle for the inbox
Communications of the ACM - Spam and the ongoing battle for the inbox
Spamalytics: an empirical analysis of spam marketing conversion
Proceedings of the 15th ACM conference on Computer and communications security
Brave New World: Pervasive Insecurity of Embedded Network Devices
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
Stragglers of the herd get eaten: security concerns for GSM mobile banking applications
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Usably secure, low-cost authentication for mobile banking
Proceedings of the Sixth Symposium on Usable Privacy and Security
An assessment of overt malicious activity manifest in residential networks
DIMVA'11 Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment
Building an ecosystem for cyber security and data protection in india
ICEB'10 Proceedings of the Third international conference on Ethics and Policy of Biometrics and International Data Sharing
Towards end-to-end security in branchless banking
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
FlashPatch: spreading software updates over flash drives in under-connected regions
Proceedings of the 4th Annual Symposium on Computing for Development
Hi-index | 0.00 |
Technology users in the developing world face a varied and complex set of computer security concerns. These challenges are deeply tied to a range of contextual factors including poor infrastructure, non-traditional usage patterns, and different attitudes towards security, which make simply importing security solutions from industrialized nations inadequate. Recognizing this, we describe some of the specific security risks in developing regions and their relationships with technical, political, social, and economic factors. We present concrete examples of how these factors affect the security of individuals, groups, and key applications such as mobile banking. Our analysis highlights the urgency of the concerns that need attention and presents an important intellectual challenge for the research community.