Marwick et al., 2016 - Google Patents
Best practices for conducting risky research and protecting yourself from online harassment (Data & Society Guide)Marwick et al., 2016
View PDF- Document ID
- 3674211773651128529
- Author
- Marwick A
- Blackwell L
- Lo K
- Publication year
- Publication venue
- New York: Data and Society Institute
External Links
Snippet
Researchers conducting research into sensitive topics may face online harassment, social shaming, or other networked forms of abuse. The potential negative effects are myriad. It may be emotionally taxing for the researcher. More severe forms of harassment may pose …
- 238000011160 research 0 title abstract description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Marwick et al. | Best practices for conducting risky research and protecting yourself from online harassment (Data & Society Guide) | |
Zeebaree et al. | Social media networks security threats, risks and recommendation: A case study in the kurdistan region | |
Henrichsen et al. | Building digital safety for journalism: A survey of selected issues | |
D'cruz et al. | Navigating the extended reach: Target experiences of cyberbullying at work | |
US20070067405A1 (en) | Moderated anonymous forum | |
Lawrence | Prevalence and consequences of negative workplace cyber communications in the Australian public sector | |
Masur | The theory of situational privacy and self-disclosure | |
Singh | Violence against women in cyber world: a special reference to India | |
Islam | Patriarchal masculinities and cyberbullying on Facebook: unraveling interconnections and implications in the context of Bangladesh | |
Strand et al. | Towards a situated understanding of vulnerability—An analysis of Ugandan LGBT+ exposure to hate crimes in digital spaces | |
Avais et al. | Awareness regarding cyber victimization among students of University of Sindh, Jamshoro | |
Ali | Silenced online: Women's experiences of digital harassment in Pakistan | |
Kshetri | China's data privacy regulations: A tricky tradeoff between ICT's productive utilization and cybercontrol | |
Crespi et al. | Cyberviolence and the digital experience: reflections on a problematic issue for youth | |
Mukherjee et al. | Unsocial media: Inclusion, representation, and safety for women on social networking platforms | |
Lukács | To post, or not to post–that is the question: employee monitoring and employees’ right to data protection | |
O'Shea | Use of Social Media in Employment: Should I Fire? Should I Hire? | |
Lee et al. | Sharing experiences and seeking informal justice online: a grounded theory analysis of Zoombombing victimization on Reddit | |
Holt et al. | Assessing racial and ethnically motivated extremist cyberattacks using open source data | |
Sanders et al. | Crimes and safety in the online sex industry | |
Shahid et al. | Unveiling the evil; Pakistani young girls and online harassment | |
Koslow | Rape Shield Laws and the Social Media Revolution: Discoverability of Social Media-It's Social Not Private | |
Kaufhold et al. | Cyber Threat Awareness, Protective Measures and Communication Preferences in Germany: Implications from Three Representative Surveys (2021-2024) | |
Dreker | Risks, Privacy, and Harassment | |
Clark | Do You Still “Like” Facebook? |