572 research outputs found

    Privacy Vulnerabilities in the Practices of Repairing Broken Digital Artifacts in Bangladesh

    Get PDF
    This paper presents a study on the privacy concerns associated with the practice of repairing broken digital objects in Bangladesh. Historically, repair of old or broken technologies has received less attention in ICTD scholarship than design, development, or use. As a result, the potential privacy risks associated with repair practices have remained mostly unaddressed. This paper describes our three-month long ethnographic study that took place at ten major repair sites in Dhaka, Bangladesh. We show a variety of ways in which the privacy of an individual’s personal data may be compromised during the repair process. We also examine people’s perceptions around privacy in repair, and its connections with their broader social and cultural values. Finally, we discuss the challenges and opportunities for future research to strengthen the repair ecosystem in developing countries. Taken together, our findings contribute to the growing discourse around post-use cycles of technology

    Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices

    Get PDF
    The goal of this study is to understand the behavior of users from developing countries in managing an old device (e.g., computer, mobile phone), which has been replaced by a new device, or suffers from technical issues providing a notion that it may stop working soon. The prior work explored the ecology and challenges of repairing old devices in developing regions. However, it is still understudied how the strategies of people from developing countries in managing their personal information on old devices could impact their digital privacy. To address this gap in existing literature, we conducted semi-structured interview with 52 participants, including 37 participants living in two developing countries (e.g., Bangladesh, Turkey) and 15 first-generation immigrants from developing regions living in the USA. We found that users leave sensitive information, and online accounts logged in while they give away or sell their old devices. All of our immigrant participants in the USA keep backup of their personal data from an old device, however, some of them store that information in an unprotected medium. Instead of keeping backup, the participants living in Bangladesh and Turkey often keep the old device as a digital storage, or give away to someone where their right to access their information would be preserved. Based on our findings, we unpacked the relation between trust and privacy in managing old devices

    Understanding User\u27s Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account

    Get PDF
    A wide-range of personal and sensitive information are stored in users’ online accounts. Losing access, or an unauthorized access to one of those accounts could put them into the risks of privacy breach, cause financial loss, and compromise their accessibility to important information and documents. A large body of prior work focused on developing new schemes and strategies to protect users’ online security. However, there is a dearth in existing literature to understand users’ strategies and contingency plans to protect their online accounts once they lose access, or identify an unauthorized access to one of their accounts. We addressed this gap in our work, where we conducted semi-structured interview with 59 participants from three different countries: Bangladesh, Turkey, and USA. Our findings reveal the unawareness, misconceptions, and privacy and accessibility concerns of users, which refrain them from taking security-preserving steps to protect their online accounts. We also identified users’ prevention strategies that could put their online security into further risks

    Cloud Forensic: Issues, Challenges and Solution Models

    Full text link
    Cloud computing is a web-based utility model that is becoming popular every day with the emergence of 4th Industrial Revolution, therefore, cybercrimes that affect web-based systems are also relevant to cloud computing. In order to conduct a forensic investigation into a cyber-attack, it is necessary to identify and locate the source of the attack as soon as possible. Although significant study has been done in this domain on obstacles and its solutions, research on approaches and strategies is still in its development stage. There are barriers at every stage of cloud forensics, therefore, before we can come up with a comprehensive way to deal with these problems, we must first comprehend the cloud technology and its forensics environment. Although there are articles that are linked to cloud forensics, there is not yet a paper that accumulated the contemporary concerns and solutions related to cloud forensic. Throughout this chapter, we have looked at the cloud environment, as well as the threats and attacks that it may be subjected to. We have also looked at the approaches that cloud forensics may take, as well as the various frameworks and the practical challenges and limitations they may face when dealing with cloud forensic investigations.Comment: 23 pages; 6 figures; 4 tables. Book chapter of the book titled "A Practical Guide on Security and Privacy in Cyber Physical Systems Foundations, Applications and Limitations", World Scientific Series in Digital Forensics and Cybersecurit

    Ordeals of Returnee Bangladeshi Migrant Women Domestic Workers

    Get PDF
    This article explores the ordeals of returnee female domestic migrant workers of Bangladesh to find out ways help formulate policies by the government. A study has been conducted based on primary and secondary sources. It finds that all types of tortures, including physical, sexual, setting them on afire, forcibly cutting their hair, and hit and falls from rooftop, has to be faced by the women migrant workers. The Bangladeshi female migrant workers have to work for 16-18 hours in a day. They are made untimely repatriation to Bangladesh without pay blaming them for theft or such other false allegations. This study suggests enforcing proper laws and policies strictly, and proper agreements between the sending and destination countries to stop such ordeals

    Need for an integrated deprived area "slum" mapping system (IDEAMAPS) in low-and middle-income countries (LMICS)

    Get PDF
    Ninety percent of the people added to the planet over the next 30 years will live in African and Asian cities, and a large portion of these populations will reside in deprived neighborhoods defined by slum conditions, informal settlement, or inadequate housing. The four current approaches to neighborhood deprivation mapping are largely siloed, and each fall short of producing accurate, timely, and comparable maps that reflect local contexts. The first approach, classifying "slum households" in census and survey data, reflects household-level rather than neighborhood-level deprivation. The second approach, field-based mapping, can produce the most accurate and context-relevant maps for a given neighborhood, however it requires substantial resources, preventing up-scaling. The third and fourth approaches, human (visual) interpretation and machine classification of air or spaceborne imagery, both overemphasize informal settlements, and fail to represent key social characteristics of deprived areas such as lack of tenure, exposure to pollution, and lack of public services. We summarize common areas of understanding, and present a set of requirements and a framework to produce routine, accurate maps of deprived urban areas that can be used by local-to-international stakeholders for advocacy, planning, and decision-making across Low-and Middle-Income Countries (LMICs). We suggest that machine learning models be extended to incorporate social area-level covariates and regular contributions of up-to-date and context-relevant field-based classification of deprived urban areas

    All slums are not equal: child health conditions among the urban poor

    Full text link
    Increasing urbanization has resulted in a faster growth of slum population. Various agencies, especially those in developing countries are finding it difficult to respond to this situation effectively. Disparities among slums exist owing to various factors. This has led to varying degrees of health burden on the slum children. Child health conditions in slums with inadequate services are worse in comparison to relatively better served slums. Identification, mapping and assessment of all slums is important for locating the hitherto missed out slums and focusing on the neediest slums. In view of the differential vulnerabilities across slums, an urban child health program should build context appropriate and community-need-responsive approaches to improve children’s health in the slums

    Implementing E-governance in bangladesh using cloud computing technology

    Get PDF
    This thesis report is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2011.Cataloged from PDF version of thesis report.Includes bibliographical references (page 43).The evolution of cloud computing technology has brought a significant impact in our life. Having different constrains such as high volume query processing request, managing a central data center, data security, uncertainty of electric power, lack of domain knowledge expertise, we personally believe e-Governance implementation with the cloud computing technology can resolve the constrains as par discussed. Our thesis will present a novel cloud computing model for implementing e-Governance system in Bangladesh and also the implementations of e-Governance applications in a cloud platform such as Google apps engine. This platform is based on distributed system, it has non-relational database such as Big Table. It can scale up to zeta bytes records and query and it has the power of fault tolerance and high availability, which are the basic requirement for the implementations of Cloud based e- Governance system.Mahafuz Aziz AveekMd. Sakibur RahmanB. Computer Science and Engineerin

    Enhancing Data Security for Cloud Computing Applications through Distributed Blockchain-based SDN Architecture in IoT Networks

    Full text link
    Blockchain (BC) and Software Defined Networking (SDN) are some of the most prominent emerging technologies in recent research. These technologies provide security, integrity, as well as confidentiality in their respective applications. Cloud computing has also been a popular comprehensive technology for several years. Confidential information is often shared with the cloud infrastructure to give customers access to remote resources, such as computation and storage operations. However, cloud computing also presents substantial security threats, issues, and challenges. Therefore, to overcome these difficulties, we propose integrating Blockchain and SDN in the cloud computing platform. In this research, we introduce the architecture to better secure clouds. Moreover, we leverage a distributed Blockchain approach to convey security, confidentiality, privacy, integrity, adaptability, and scalability in the proposed architecture. BC provides a distributed or decentralized and efficient environment for users. Also, we present an SDN approach to improving the reliability, stability, and load balancing capabilities of the cloud infrastructure. Finally, we provide an experimental evaluation of the performance of our SDN and BC-based implementation using different parameters, also monitoring some attacks in the system and proving its efficacy.Comment: 12 Pages 16 Figures 3 Table
    • …
    corecore