TY - GEN
T1 - Computing security in the developing world
T2 - 9th International Conference on Mobile Systems, Applications, and Services, MobiSys'11 and Co-located Workshops - 5th ACM Workshop on Networked Systems for Developing Regions, NSDR'11
AU - Ben-David, Yahel
AU - Hasan, Shaddi
AU - Pal, Joyojeet
AU - Vallentin, Matthias
AU - Panjwani, Saurabh
AU - Gutheim, Philipp
AU - Chen, Jay
AU - Brewer, Eric A.
N1 - Copyright:
Copyright 2011 Elsevier B.V., All rights reserved.
PY - 2011
Y1 - 2011
N2 - Technology users in the developing world face a varied and complex set of computer security concerns. These challenges are deeply tied to a range of contextual factors including poor infrastructure, non-traditional usage patterns, and different attitudes towards security, which make simply importing security solutions from industrialized nations inadequate. Recognizing this, we describe some of the specific security risks in developing regions and their relationships with technical, political, social, and economic factors. We present concrete examples of how these factors affect the security of individuals, groups, and key applications such as mobile banking. Our analysis highlights the urgency of the concerns that need attention and presents an important intellectual challenge for the research community.
AB - Technology users in the developing world face a varied and complex set of computer security concerns. These challenges are deeply tied to a range of contextual factors including poor infrastructure, non-traditional usage patterns, and different attitudes towards security, which make simply importing security solutions from industrialized nations inadequate. Recognizing this, we describe some of the specific security risks in developing regions and their relationships with technical, political, social, and economic factors. We present concrete examples of how these factors affect the security of individuals, groups, and key applications such as mobile banking. Our analysis highlights the urgency of the concerns that need attention and presents an important intellectual challenge for the research community.
KW - computer security
KW - ictd
UR - http://www.scopus.com/inward/record.url?scp=79961063912&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79961063912&partnerID=8YFLogxK
U2 - 10.1145/1999927.1999939
DO - 10.1145/1999927.1999939
M3 - Conference contribution
AN - SCOPUS:79961063912
SN - 9781450307390
T3 - MobiSys'11 - Compilation Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services and Co-located Workshops - NSDR 2011 Workshop, NSDR'11
SP - 39
EP - 44
BT - MobiSys'11 - Compilation Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services and Co-located Workshops - NSDR 2011 Workshop, NSDR'11
Y2 - 28 June 2011 through 1 July 2011
ER -