572 research outputs found
Privacy Vulnerabilities in the Practices of Repairing Broken Digital Artifacts in Bangladesh
This paper presents a study on the privacy concerns associated with the practice of repairing broken digital objects in Bangladesh. Historically, repair of old or broken technologies has received less attention in ICTD scholarship than design, development, or use. As a result, the potential privacy risks associated with repair practices have remained mostly unaddressed. This paper describes our three-month long ethnographic study that took place at ten major repair sites in Dhaka, Bangladesh. We show a variety of ways in which the privacy of an individual’s personal data may be compromised during the repair process. We also examine people’s perceptions around privacy in repair, and its connections with their broader social and cultural values. Finally, we discuss the challenges and opportunities for future research to strengthen the repair ecosystem in developing countries. Taken together, our findings contribute to the growing discourse around post-use cycles of technology
Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices
The goal of this study is to understand the behavior of users from developing countries in managing an old device (e.g., computer, mobile phone), which has been replaced by a new device, or suffers from technical issues providing a notion that it may stop working soon. The prior work explored the ecology and challenges of repairing old devices in developing regions. However, it is still understudied how the strategies of people from developing countries in managing their personal information on old devices could impact their digital privacy. To address this gap in existing literature, we conducted semi-structured interview with 52 participants, including 37 participants living in two developing countries (e.g., Bangladesh, Turkey) and 15 first-generation immigrants from developing regions living in the USA. We found that users leave sensitive information, and online accounts logged in while they give away or sell their old devices. All of our immigrant participants in the USA keep backup of their personal data from an old device, however, some of them store that information in an unprotected medium. Instead of keeping backup, the participants living in Bangladesh and Turkey often keep the old device as a digital storage, or give away to someone where their right to access their information would be preserved. Based on our findings, we unpacked the relation between trust and privacy in managing old devices
Understanding User\u27s Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account
A wide-range of personal and sensitive information are stored in users’ online accounts. Losing access, or an unauthorized access to one of those accounts could put them into the risks of privacy breach, cause financial loss, and compromise their accessibility to important information and documents. A large body of prior work focused on developing new schemes and strategies to protect users’ online security. However, there is a dearth in existing literature to understand users’ strategies and contingency plans to protect their online accounts once they lose access, or identify an unauthorized access to one of their accounts. We addressed this gap in our work, where we conducted semi-structured interview with 59 participants from three different countries: Bangladesh, Turkey, and USA. Our findings reveal the unawareness, misconceptions, and privacy and accessibility concerns of users, which refrain them from taking security-preserving steps to protect their online accounts. We also identified users’ prevention strategies that could put their online security into further risks
Cloud Forensic: Issues, Challenges and Solution Models
Cloud computing is a web-based utility model that is becoming popular every
day with the emergence of 4th Industrial Revolution, therefore, cybercrimes
that affect web-based systems are also relevant to cloud computing. In order to
conduct a forensic investigation into a cyber-attack, it is necessary to
identify and locate the source of the attack as soon as possible. Although
significant study has been done in this domain on obstacles and its solutions,
research on approaches and strategies is still in its development stage. There
are barriers at every stage of cloud forensics, therefore, before we can come
up with a comprehensive way to deal with these problems, we must first
comprehend the cloud technology and its forensics environment. Although there
are articles that are linked to cloud forensics, there is not yet a paper that
accumulated the contemporary concerns and solutions related to cloud forensic.
Throughout this chapter, we have looked at the cloud environment, as well as
the threats and attacks that it may be subjected to. We have also looked at the
approaches that cloud forensics may take, as well as the various frameworks and
the practical challenges and limitations they may face when dealing with cloud
forensic investigations.Comment: 23 pages; 6 figures; 4 tables. Book chapter of the book titled "A
Practical Guide on Security and Privacy in Cyber Physical Systems
Foundations, Applications and Limitations", World Scientific Series in
Digital Forensics and Cybersecurit
Ordeals of Returnee Bangladeshi Migrant Women Domestic Workers
This article explores the ordeals of returnee female domestic migrant workers of Bangladesh to find out ways help formulate policies by the government. A study has been conducted based on primary and secondary sources. It finds that all types of tortures, including physical, sexual, setting them on afire, forcibly cutting their hair, and hit and falls from rooftop, has to be faced by the women migrant workers. The Bangladeshi female migrant workers have to work for 16-18 hours in a day. They are made untimely repatriation to Bangladesh without pay blaming them for theft or such other false allegations. This study suggests enforcing proper laws and policies strictly, and proper agreements between the sending and destination countries to stop such ordeals
Need for an integrated deprived area "slum" mapping system (IDEAMAPS) in low-and middle-income countries (LMICS)
Ninety percent of the people added to the planet over the next 30 years will live in African and Asian cities, and a large portion of these populations will reside in deprived neighborhoods defined by slum conditions, informal settlement, or inadequate housing. The four current approaches to neighborhood deprivation mapping are largely siloed, and each fall short of producing accurate, timely, and comparable maps that reflect local contexts. The first approach, classifying "slum households" in census and survey data, reflects household-level rather than neighborhood-level deprivation. The second approach, field-based mapping, can produce the most accurate and context-relevant maps for a given neighborhood, however it requires substantial resources, preventing up-scaling. The third and fourth approaches, human (visual) interpretation and machine classification of air or spaceborne imagery, both overemphasize informal settlements, and fail to represent key social characteristics of deprived areas such as lack of tenure, exposure to pollution, and lack of public services. We summarize common areas of understanding, and present a set of requirements and a framework to produce routine, accurate maps of deprived urban areas that can be used by local-to-international stakeholders for advocacy, planning, and decision-making across Low-and Middle-Income Countries (LMICs). We suggest that machine learning models be extended to incorporate social area-level covariates and regular contributions of up-to-date and context-relevant field-based classification of deprived urban areas
All slums are not equal: child health conditions among the urban poor
Increasing urbanization has resulted in a faster
growth of slum population. Various agencies,
especially those in developing countries are finding it
difficult to respond to this situation effectively.
Disparities among slums exist owing to various
factors. This has led to varying degrees of health
burden on the slum children. Child health conditions
in slums with inadequate services are worse in
comparison to relatively better served slums.
Identification, mapping and assessment of all slums is
important for locating the hitherto missed out slums
and focusing on the neediest slums. In view of the
differential vulnerabilities across slums, an urban
child health program should build context appropriate
and community-need-responsive approaches
to improve children’s health in the slums
Implementing E-governance in bangladesh using cloud computing technology
This thesis report is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2011.Cataloged from PDF version of thesis report.Includes bibliographical references (page 43).The evolution of cloud computing technology has brought a significant impact in our life. Having different constrains such as high volume query processing request, managing a central data center, data security, uncertainty of electric power, lack of domain knowledge expertise, we personally believe e-Governance implementation with the cloud computing technology can resolve the constrains as par discussed.
Our thesis will present a novel cloud computing model for implementing e-Governance system in Bangladesh and also the implementations of e-Governance applications in a cloud platform such as Google apps engine. This platform is based on distributed system, it has non-relational database such as Big Table. It can scale up to zeta bytes records and query and it has the power of fault tolerance and high availability, which are the basic requirement for the implementations of Cloud based e- Governance system.Mahafuz Aziz AveekMd. Sakibur RahmanB. Computer Science and Engineerin
Enhancing Data Security for Cloud Computing Applications through Distributed Blockchain-based SDN Architecture in IoT Networks
Blockchain (BC) and Software Defined Networking (SDN) are some of the most
prominent emerging technologies in recent research. These technologies provide
security, integrity, as well as confidentiality in their respective
applications. Cloud computing has also been a popular comprehensive technology
for several years. Confidential information is often shared with the cloud
infrastructure to give customers access to remote resources, such as
computation and storage operations. However, cloud computing also presents
substantial security threats, issues, and challenges. Therefore, to overcome
these difficulties, we propose integrating Blockchain and SDN in the cloud
computing platform. In this research, we introduce the architecture to better
secure clouds. Moreover, we leverage a distributed Blockchain approach to
convey security, confidentiality, privacy, integrity, adaptability, and
scalability in the proposed architecture. BC provides a distributed or
decentralized and efficient environment for users. Also, we present an SDN
approach to improving the reliability, stability, and load balancing
capabilities of the cloud infrastructure. Finally, we provide an experimental
evaluation of the performance of our SDN and BC-based implementation using
different parameters, also monitoring some attacks in the system and proving
its efficacy.Comment: 12 Pages 16 Figures 3 Table
- …