Understanding the Security and Privacy Advice Given to Black Lives Matter Protesters
暂无分享,去创建一个
[1] Mark Levine,et al. Whose tweets? The rhetorical functions of social media use in developing the Black Lives Matter movement. , 2019, The British journal of social psychology.
[2] Mohammad Maifi Hasan Khan,et al. Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice , 2016, SOUPS.
[3] T. Monahan. Counter-surveillance as Political Intervention? , 2006 .
[4] L. Stewart,et al. Acting the Part: Examining Information Operations Within #BlackLivesMatter Discourse , 2018, Proc. ACM Hum. Comput. Interact..
[5] Sunny Consolvo,et al. "...No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices , 2015, SOUPS.
[6] C. E. Jones. The Political Repression of the Black Panther Party 1966-1971 , 1988 .
[7] Gunnar Harboe,et al. Real-World Affinity Diagramming Practices: Bridging the Paper-Digital Gap , 2015, CHI.
[8] Daniel Zappala,et al. Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications , 2017, SOUPS.
[9] Kellie Morrissey,et al. Human Computer Interaction & Health Activism , 2018, CHI Extended Abstracts.
[10] Weiyu Zhang,et al. Redefining youth activism through digital technology in Singapore , 2013 .
[11] D. Lyon. Airport Screening, Surveillance, and Social Sorting: Canadian Responses to 9/11 in Context , 2006 .
[12] Richmond Y. Wong,et al. Differential Vulnerabilities and a Diversity of Tactics , 2018, Proc. ACM Hum. Comput. Interact..
[13] M. Angela Sasse,et al. Employee Rule Breakers, Excuse Makers and Security Champions:: Mapping the risk perceptions and emotions that drive security behaviors , 2015, NSPW.
[14] M. Jackson. #Black Lives Matter , 2014, Communications Biology.
[15] Elissa M. Redmiles,et al. How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior , 2016, CCS.
[16] Claudia A. Evans-Zepeda. Technology, Activism, and Social Justice in a Digital Age , 2020 .
[17] Elissa M. Redmiles,et al. How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[18] Elissa M. Redmiles,et al. First Steps Toward Measuring the Readability of Security Advice , 2018 .
[19] Elissa M. Redmiles,et al. I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[20] Julie Uldam,et al. Corporate management of visibility and the fantasy of the post-political: Social media and surveillance , 2016, New Media Soc..
[21] Laura A. Dabbish,et al. A Typology of Perceived Triggers for End-User Security and Privacy Behaviors , 2019, SOUPS @ USENIX Security Symposium.
[22] Katta Spiel,et al. How to do better with gender on surveys , 2019, Interactions.
[23] Cormac Herley,et al. So long, and no thanks for the externalities: the rational rejection of security advice by users , 2009, NSPW '09.
[24] Victoria Y. Yoon,et al. From Facebook to the Streets: Russian Troll Ads and Black Lives Matter Protests , 2019, HICSS.
[25] Munmun De Choudhury,et al. Social Media Participation in an Activist Movement for Racial Equality , 2016, ICWSM.
[26] Angela D. R. Smith,et al. Critical Race Theory for HCI , 2020, CHI.
[27] Rick Wash,et al. Who Provides Phishing Training?: Facts, Stories, and People Like Me , 2018, CHI.
[28] Lorrie Faith Cranor,et al. Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.
[29] Lina Dencik,et al. Digital Citizenship and Surveillance| The Advent of Surveillance Realism: Public Opinion and Activist Responses to the Snowden Leaks , 2017 .
[30] Julie Uldam. Social media visibility: challenges to activism , 2018 .
[31] P. Ullrich,et al. Protesters’ Reactions to Video Surveillance of Demonstrations: Counter-Moves, Security Cultures, and the Spiral of Surveillance and Counter-Surveillance , 2018, Surveillance & Society.
[32] Victoria Carty,et al. Social Movements and New Technology: The Dynamics of Cyber Activism in the Digital Age , 2018, The Palgrave Handbook of Social Movements, Revolution, and Social Transformation.
[33] L. Stewart,et al. Examining Trolls and Polarization with a Retweet Network , 2018 .
[34] J. Monaghan,et al. Private Eyes and Public Order: Policing and Surveillance in the Suppression of Animal Rights Activists in Canada , 2011 .
[35] Deen Freelon,et al. Beyond the Hashtags: #Ferguson, #Blacklivesmatter, and the Online Struggle for Offline Justice , 2016 .
[36] Rick Wash,et al. Stories as informal lessons about security , 2012, SOUPS.
[37] Sunny Consolvo,et al. 152 Simple Steps to Stay Safe Online: Security Advice for Non-Tech-Savvy Users , 2017, IEEE Security & Privacy.
[38] Max Gedig. “‘Woke up with Death Every Morning.’ Surveillance Experiences of Black Panther Party Activists.” , 2018 .
[39] W. Peace. : Threatening Anthropology: McCarthyism and the FBI's Surveillance of Activist Anthropologists , 2005 .
[40] Hao Peng,et al. Event-Driven Analysis of Crowd Dynamics in the Black Lives Matter Online Social Movement , 2019, WWW.
[41] Sunny Consolvo,et al. The Wi-Fi privacy ticker: improving awareness & control of personal information exposure on Wi-Fi , 2010, UbiComp.
[42] James Nicholson,et al. "If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults , 2019, CHI.
[43] Clayton A. Davis,et al. The social media response to Black Lives Matter: how Twitter users interact with Black Lives Matter through hashtag use , 2017 .
[44] Oscar H. Gandy,et al. IAMCR Data Mining : Gandy 7 / 11 / 2002 1 Data mining and surveillance in the post-9 . 11 environment , 2002 .
[45] L. Whitehorn,et al. Human Rights in the United States: The Unfinished Story of Political Prisoners and Cointelpro , 2001 .
[46] Daniel J. Solove,et al. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy , 2007 .
[47] Huey p. Newton. War Against the Panthers : A Study of Repression in America , 1980 .
[48] Simon Parkin,et al. Finding Security Champions in Blends of Organisational Culture , 2017 .
[49] Dennis McCafferty,et al. Activism vs. slacktivism , 2011, Commun. ACM.
[50] Karen Holtzblatt,et al. Contextual design , 1997, INTR.
[51] F. Cain. The origins of political surveillance in Australia , 1983 .
[52] J. Noakes,et al. “What if she's from the FBI?” The effects of covert forms of social control on social movements , 2008 .
[53] Elissa M. Redmiles,et al. A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web , 2020, USENIX Security Symposium.
[54] John Peloza,et al. The Nature of Slacktivism: How the Social Observability of an Initial Act of Token Support Affects Subsequent Prosocial Action , 2014 .
[55] Gary T. Marx,et al. Thoughts on a Neglected Category of Social Movement Participant: The Agent Provocateur and the Informant , 1974, American Journal of Sociology.
[57] Vince Bruno,et al. Why employees share information security advice? Exploring the contributing factors and structural patterns of security advice sharing in the workplace , 2017, Comput. Hum. Behav..
[58] Jillian C. York,et al. Social Media and the Activist Toolkit: User Agreements, Corporate Interests, and the Information Infrastructure of Modern Social Movements , 2012 .
[59] Dean Wilson,et al. Video Activism and the ambiguities of counter-surveillance , 2010 .
[60] Steven Furnell,et al. Selecting security champions , 2011 .
[61] Alberto Hermida,et al. Twitter and video activism as tools for counter-surveillance: the case of social protests in Spain , 2018 .
[62] Yu-Hao Lee,et al. Does slacktivism hurt activism?: the effects of moral balancing and consistency in online activism , 2013, CHI.
[63] A. Acquisti,et al. Beyond the Turk: Alternative Platforms for Crowdsourcing Behavioral Research , 2016 .
[64] Kate Starbird,et al. Disinformation’s spread: bots, trolls and all of us , 2019, Nature.
[65] Alvin B. Tillery. What Kind of Movement is Black Lives Matter? The View from Twitter , 2019, The Journal of Race, Ethnicity, and Politics.
[66] Aaron D. Shaw,et al. Black Lives Matter in Wikipedia: Collective Memory and Collaboration around Online Social Movements , 2016, CSCW.
[67] Rick Wash,et al. Organization Interfaces—collaborative computing General Terms , 2022 .
[68] Matthew Smith,et al. Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice , 2019, SOUPS @ USENIX Security Symposium.
[69] Charla M. Burnett,et al. Scaling Social Movements Through Social Media: The Case of Black Lives Matter , 2018, Social Media + Society.
[70] Konstantin Beznosov,et al. On the Impact of Touch ID on iPhone Passcodes , 2015, SOUPS.
[71] Sarah J. Jackson,et al. #HashtagActivism: Networks of Race and Gender Justice , 2020 .