Shamal Faily
Security goes to ground: on the applicability of security entrepreneurship to grassroot activism.
Faily, Shamal
Authors
Abstract
Designing security for grassroot movements raises several challenges not particular to the organisations that are catered to by conventional approaches to security design. Drawing on analogies between Social Entrepreneurship and Grassroot Activism, adopting an entrepreneurial approach to security design may lead to security design decisions which are both in-tune with a grassroot movement's aims and cost effective. This position paper considers the applicability of Security Entrepreneurship for security design in grassroot movements. Using a SWOT analysis, we discuss the strengths and weaknesses or this approach, before considering external threats and opportunities arising its prolonged adoption.
Citation
FAILY, S. 2011. Security goes to ground: on the applicability of security entrepreneurship to grassroot activism. Presented at the Workshop on HCI, politics and the city, part of the 29th Annual CHI conference on human factors in computing systems (CHI 2011), 7-8 May 2011, Vancouver, Canada.
Presentation Conference Type | Conference Paper (unpublished) |
---|---|
Conference Name | Workshop on HCI, politics and the city, part of the 29th Annual CHI conference on human factors in computing systems (CHI 2011) |
Start Date | May 7, 2011 |
End Date | May 8, 2011 |
Deposit Date | Dec 10, 2021 |
Publicly Available Date | Dec 10, 2021 |
Peer Reviewed | Peer Reviewed |
Keywords | Systems security; Security risk analysis; User-centred design; Entrepreneurship; Activism; Grassroots organisations |
Public URL | https://rgu-repository.worktribe.com/output/1446685 |
Files
FAILY 2011 Security goes to ground
(1.5 Mb)
PDF
You might also like
Privacy goals for the data lifecycle.
(2022)
Journal Article
Assessing system of systems information security risk with OASoSIS.
(2022)
Journal Article
Visualising personas as goal models to find security tensions.
(2021)
Journal Article
Evaluating privacy: determining user privacy expectations on the web.
(2021)
Journal Article
DPIA in context: applying DPIA to assess privacy risks of cyber physical systems.
(2020)
Journal Article
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search