首页> 外文会议>IEEE Symposium on Security and Privacy >Defensive Technology Use by Political Activists During the Sudanese Revolution
【24h】

Defensive Technology Use by Political Activists During the Sudanese Revolution

机译:在苏丹革命期间,政治活动家使用防守技术

获取原文

摘要

Political activism is a worldwide force in geopolitical change and has, historically, helped lead to greater justice, equality, and stopping human rights abuses. A modern revolution—an extreme form of political activism—pits activists, who rely on technology for critical operational tasks, against a resource-rich government that controls the very telecommunications network they must use to operationalize, putting the technology they use under extreme stress. Our work presents insights about activists’ technological defense strategies from interviews with 13 political activists who were active during the 2018-2019 Sudanese revolution. We find that politics and society are driving factors of security and privacy behavior and app adoption. Moreover, a social media blockade can trigger a series of anti-censorship approaches at scale, while a complete internet blackout can cripple activists’ use of technology. Even though the activists’ technological defenses against the threats of surveillance, arrest and physical device seizure were low tech, they were largely sufficient against their adversary. Through these results, we surface key design principles, but we observe that the generalization of design recommendations often runs into fundamental tensions between the security and usability needs of different user groups. Thus, we provide a set of structured questions in an attempt to turn these tensions into opportunities for technology designers and policy makers.
机译:政治活动主义是地中国人变革的全球力量,历史上有所帮助,有助于导致更大的正义,平等和阻止人权滥用行为。一种现代革命 - 一种极端的政治活动,依赖于批判性运营任务的技术,反对资源丰富的政府,控制他们必须使用的电信网络,使他们在极端压力下使用的技术。我们的工作介绍了活动家从2018-2019苏丹革命中有效的13名政治活动家采访的技术辩护战略的见解。我们发现政治和社会是安全和隐私行为和应用程序采用的推动因素。此外,社交媒体封锁可以在规模触发一系列反审查方法,而完整的互联网停电可以瘫痪活动分子的技术。尽管活动分子对监测威胁的技术防御,逮捕和物理设备癫痫发作是低技术,但它们在很大程度上充足了他们的对手。通过这些结果,我们曲面关键设计原则,但我们观察到设计建议的泛化经常在不同用户组的安全性和可用性需求之间运行到基本紧张局势。因此,我们提供了一套结构化问题,以试图将这些紧张局势转化为技术设计师和政策制定者的机会。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号