ATTENTION: The software behind KU ScholarWorks is being upgraded to a new version. Starting July 15th, users will not be able to log in to the system, add items, nor make any changes until the new version is in place at the end of July. Searching for articles and opening files will continue to work while the system is being updated.
If you have any questions, please contact Marianne Reed at mreed@ku.edu .
Security & Privacy Practices and Threat Models of Activists During a Political Revolution
dc.contributor.advisor | Bardas, Alexandru A | |
dc.contributor.author | Daffalla, Alaa | |
dc.date.accessioned | 2023-06-07T15:54:09Z | |
dc.date.available | 2023-06-07T15:54:09Z | |
dc.date.issued | 2021-05-31 | |
dc.date.submitted | 2021 | |
dc.identifier.other | http://dissertations.umi.com/ku:17766 | |
dc.identifier.uri | https://hdl.handle.net/1808/34276 | |
dc.description.abstract | Activism is a universal concept that has often played a major role in putting an end to injustices and human rights abuses globally. Political activism in specific is a modern day term coined to refer to a form of activism in which a group of people come into collision with a more omnipotent adversary - national or international governments - who often has a purview and control over the very telecommunications infrastructure that is necessary for activists in order to organize and operate. As technology and social media use have become vital to the success of activism movements in the twenty first century, our study focuses on surfacing the technical challenges and the defensive strategies that activists employ during a political revolution. We find that security and privacy behavior and app adoption is influenced by the specific societal and political context in which activists operate. In addition, the impact of a social media blockade or an internet blackout can trigger a series of anti-censorship approaches at scale and cripple activist's technology use. To a large extent the combination of low tech defensive strategies employed by activists were sufficient against the threats of surveillance, arrests and device confiscation. Throughout our results we surface a number of design principles but also some design tensions that could occur between the security and usability needs of different populations. And thus, we present a set of observations that can help guide technology designers and policy makers. | |
dc.format.extent | 70 pages | |
dc.language.iso | en | |
dc.publisher | University of Kansas | |
dc.rights | Copyright held by the author. | |
dc.subject | Computer science | |
dc.subject | activists | |
dc.subject | privacy | |
dc.subject | revolution | |
dc.subject | security | |
dc.subject | technology use | |
dc.subject | threat models | |
dc.title | Security & Privacy Practices and Threat Models of Activists During a Political Revolution | |
dc.type | Thesis | |
dc.contributor.cmtemember | Li, Fengjun F | |
dc.contributor.cmtemember | Luo, Bo B | |
dc.thesis.degreeDiscipline | Electrical Engineering & Computer Science | |
dc.thesis.degreeLevel | M.S. | |
dc.identifier.orcid | ||
dc.rights.accessrights | openAccess |
Files in this item
This item appears in the following Collection(s)
-
Theses [4088]