ATTENTION: The software behind KU ScholarWorks is being upgraded to a new version. Starting July 15th, users will not be able to log in to the system, add items, nor make any changes until the new version is in place at the end of July. Searching for articles and opening files will continue to work while the system is being updated. If you have any questions, please contact Marianne Reed at mreed@ku.edu .

Show simple item record

dc.contributor.advisorBardas, Alexandru A
dc.contributor.authorDaffalla, Alaa
dc.date.accessioned2023-06-07T15:54:09Z
dc.date.available2023-06-07T15:54:09Z
dc.date.issued2021-05-31
dc.date.submitted2021
dc.identifier.otherhttp://dissertations.umi.com/ku:17766
dc.identifier.urihttps://hdl.handle.net/1808/34276
dc.description.abstractActivism is a universal concept that has often played a major role in putting an end to injustices and human rights abuses globally. Political activism in specific is a modern day term coined to refer to a form of activism in which a group of people come into collision with a more omnipotent adversary - national or international governments - who often has a purview and control over the very telecommunications infrastructure that is necessary for activists in order to organize and operate. As technology and social media use have become vital to the success of activism movements in the twenty first century, our study focuses on surfacing the technical challenges and the defensive strategies that activists employ during a political revolution. We find that security and privacy behavior and app adoption is influenced by the specific societal and political context in which activists operate. In addition, the impact of a social media blockade or an internet blackout can trigger a series of anti-censorship approaches at scale and cripple activist's technology use. To a large extent the combination of low tech defensive strategies employed by activists were sufficient against the threats of surveillance, arrests and device confiscation. Throughout our results we surface a number of design principles but also some design tensions that could occur between the security and usability needs of different populations. And thus, we present a set of observations that can help guide technology designers and policy makers.
dc.format.extent70 pages
dc.language.isoen
dc.publisherUniversity of Kansas
dc.rightsCopyright held by the author.
dc.subjectComputer science
dc.subjectactivists
dc.subjectprivacy
dc.subjectrevolution
dc.subjectsecurity
dc.subjecttechnology use
dc.subjectthreat models
dc.titleSecurity & Privacy Practices and Threat Models of Activists During a Political Revolution
dc.typeThesis
dc.contributor.cmtememberLi, Fengjun F
dc.contributor.cmtememberLuo, Bo B
dc.thesis.degreeDisciplineElectrical Engineering & Computer Science
dc.thesis.degreeLevelM.S.
dc.identifier.orcid
dc.rights.accessrightsopenAccess


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record