Author of the publication

Purdah, Amanah, and Gheebat: Understanding Privacy in Bangladeshi "pious" Muslim Communities.

, , , , , and . COMPASS, page 199-214. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying Psychometrics to Measure User Comfort when Constructing a Strong Password., , and . SOUPS, page 231-242. USENIX Association, (2014)Deconstructing Cybersecurity: From Ontological Security to Ontological Insecurity., and . NSPW, page 99-110. ACM, (2020)Privacy Vulnerabilities in Public Digital Service Centers in Dhaka, Bangladesh., , , , , , and . ICTD, page 14:1-14:12. ACM, (2020)Technology Adoption Dynamics of the Press Workers in Bangladesh., , and . COMPASS, page 148-159. ACM, (2020)LociMotion: Towards Learning a Strong Authentication Secret in a Single Session., , , and . CHI, page 689:1-689:13. ACM, (2021)Of Ulti, 'hajano', and "Matachetar otanetak datam": Exploring Local Practices of Exchanging Confidential and Sensitive Information in Urban Bangladesh., , , and . Proc. ACM Hum. Comput. Interact., 3 (CSCW): 173:1-173:22 (2019)Privacy during Pandemic: A Global View of Privacy Practices around COVID-19 Apps., , , , and . COMPASS, page 215-229. ACM, (2021)A study of user password strategy for multiple accounts., , and . CODASPY, page 173-176. ACM, (2013)Passwords and interfaces: towards creating stronger passwords by using mobile phone handsets., , and . SPSM@CCS, page 105-110. ACM, (2013)Purdah, Amanah, and Gheebat: Understanding Privacy in Bangladeshi "pious" Muslim Communities., , , , , and . COMPASS, page 199-214. ACM, (2021)