Skip to main content

Showing 1–6 of 6 results for author: Jensen, R B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.16969  [pdf, other

    cs.CY cs.CR

    Security Patchworking in Lebanon: Infrastructuring Across Failing Infrastructures

    Authors: Jessica McClearn, Rikke Bjerg Jensen, Reem Talhouk

    Abstract: In this paper we bring to light the infrastructuring work carried out by people in Lebanon to establish and maintain everyday security in response to multiple simultaneously failing infrastructures. We do so through interviews with 13 participants from 12 digital and human rights organisations and two weeks of ethnographically informed fieldwork in Beirut, Lebanon, in July 2022. Through our analys… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

    Comments: To appear at ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW) 2024

  2. arXiv:2306.10149  [pdf, other

    cs.CY cs.CR

    Othered, Silenced and Scapegoated: Understanding the Situated Security of Marginalised Populations in Lebanon

    Authors: Jessica McClearn, Rikke Bjerg Jensen, Reem Talhouk

    Abstract: In this paper we explore the digital security experiences of marginalised populations in Lebanon such as LGBTQI+ identifying people, refugees and women. We situate our work in the post-conflict Lebanese context, which is shaped by sectarian divides, failing governance and economic collapse. We do so through an ethnographically informed study conducted in Beirut, Lebanon, in July 2022 and through i… ▽ More

    Submitted 16 June, 2023; originally announced June 2023.

    Comments: To appear at the USENIX Security Symposium 2023

  3. arXiv:2202.12755  [pdf, ps, other

    cs.CY cs.CR

    'Cyber security is a dark art': The CISO as soothsayer

    Authors: Joseph Da Silva, Rikke Bjerg Jensen

    Abstract: Commercial organisations continue to face a growing and evolving threat of data breaches and system compromises, making their cyber-security function critically important. Many organisations employ a Chief Information Security Officer (CISO) to lead such a function. We conducted in-depth, semi-structured interviews with 15 CISOs and six senior organisational leaders, between October 2019 and July… ▽ More

    Submitted 25 February, 2022; originally announced February 2022.

    Comments: To appear at ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW) 2022

  4. arXiv:2105.14869  [pdf, other

    cs.CR

    Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong

    Authors: Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková

    Abstract: The Anti-Extradition Law Amendment Bill protests in Hong Kong present a rich context for exploring information security practices among protesters due to their large-scale urban setting and highly digitalised nature. We conducted in-depth, semi-structured interviews with 11 participants of these protests. Research findings reveal how protesters favoured Telegram and relied on its security for inte… ▽ More

    Submitted 31 May, 2021; originally announced May 2021.

  5. arXiv:2011.00251  [pdf, ps, other

    cs.CY

    Fragmented digital connectivity and security at sea

    Authors: Rikke Bjerg Jensen

    Abstract: This paper explores how uneven and often unreliable digital connections shape the patterns and routines of everyday life, work and rest for seafarers, during long periods at sea. Such fragmented connections, which surface when the ship moves in and out of connectivity or when onboard data allowances run out, create a series of uncertainties that might unsettle individual and collective notions of… ▽ More

    Submitted 31 October, 2020; originally announced November 2020.

  6. arXiv:2010.06377  [pdf, ps, other

    cs.CR

    The Vacuity of the Open Source Security Testing Methodology Manual

    Authors: Martin R. Albrecht, Rikke Bjerg Jensen

    Abstract: The Open Source Security Testing Methodology Manual (OSSTMM) provides a "scientific methodology for the accurate characterization of operational security" [Her10, p.13]. It is extensively referenced in writings aimed at security testing professionals such as textbooks, standards and academic papers. In this work we offer a fundamental critique of OSSTMM and argue that it fails to deliver on its pr… ▽ More

    Submitted 13 October, 2020; originally announced October 2020.