[go: up one dir, main page]

Marwick et al., 2016 - Google Patents

Best practices for conducting risky research and protecting yourself from online harassment (Data & Society Guide)

Marwick et al., 2016

View PDF
Document ID
3674211773651128529
Author
Marwick A
Blackwell L
Lo K
Publication year
Publication venue
New York: Data and Society Institute

External Links

Snippet

Researchers conducting research into sensitive topics may face online harassment, social shaming, or other networked forms of abuse. The potential negative effects are myriad. It may be emotionally taxing for the researcher. More severe forms of harassment may pose …
Continue reading at datasociety.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
Marwick et al. Best practices for conducting risky research and protecting yourself from online harassment (Data & Society Guide)
Zeebaree et al. Social media networks security threats, risks and recommendation: A case study in the kurdistan region
Henrichsen et al. Building digital safety for journalism: A survey of selected issues
D'cruz et al. Navigating the extended reach: Target experiences of cyberbullying at work
US20070067405A1 (en) Moderated anonymous forum
Lawrence Prevalence and consequences of negative workplace cyber communications in the Australian public sector
Masur The theory of situational privacy and self-disclosure
Singh Violence against women in cyber world: a special reference to India
Islam Patriarchal masculinities and cyberbullying on Facebook: unraveling interconnections and implications in the context of Bangladesh
Strand et al. Towards a situated understanding of vulnerability—An analysis of Ugandan LGBT+ exposure to hate crimes in digital spaces
Avais et al. Awareness regarding cyber victimization among students of University of Sindh, Jamshoro
Ali Silenced online: Women's experiences of digital harassment in Pakistan
Kshetri China's data privacy regulations: A tricky tradeoff between ICT's productive utilization and cybercontrol
Crespi et al. Cyberviolence and the digital experience: reflections on a problematic issue for youth
Mukherjee et al. Unsocial media: Inclusion, representation, and safety for women on social networking platforms
Lukács To post, or not to post–that is the question: employee monitoring and employees’ right to data protection
O'Shea Use of Social Media in Employment: Should I Fire? Should I Hire?
Lee et al. Sharing experiences and seeking informal justice online: a grounded theory analysis of Zoombombing victimization on Reddit
Holt et al. Assessing racial and ethnically motivated extremist cyberattacks using open source data
Sanders et al. Crimes and safety in the online sex industry
Shahid et al. Unveiling the evil; Pakistani young girls and online harassment
Koslow Rape Shield Laws and the Social Media Revolution: Discoverability of Social Media-It's Social Not Private
Kaufhold et al. Cyber Threat Awareness, Protective Measures and Communication Preferences in Germany: Implications from Three Representative Surveys (2021-2024)
Dreker Risks, Privacy, and Harassment
Clark Do You Still “Like” Facebook?