CFP last date
20 May 2024
Reseach Article

An Application-centric Survey of Security and Privacy Issues: Bangladesh Perspective

by Farida Chowdhury
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 38
Year of Publication: 2020
Authors: Farida Chowdhury
10.5120/ijca2020920960

Farida Chowdhury . An Application-centric Survey of Security and Privacy Issues: Bangladesh Perspective. International Journal of Computer Applications. 175, 38 ( Dec 2020), 1-8. DOI=10.5120/ijca2020920960

@article{ 10.5120/ijca2020920960,
author = { Farida Chowdhury },
title = { An Application-centric Survey of Security and Privacy Issues: Bangladesh Perspective },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2020 },
volume = { 175 },
number = { 38 },
month = { Dec },
year = { 2020 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number38/31698-2020920960/ },
doi = { 10.5120/ijca2020920960 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:40:35.599105+05:30
%A Farida Chowdhury
%T An Application-centric Survey of Security and Privacy Issues: Bangladesh Perspective
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 38
%P 1-8
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, we have seen a number of research works reported which target different security and privacy issues in Bangladesh. To understand their scopes, it is essential to have a clear picture of the application domains they have covered and different security and privacy issues they have analysed and identified. In essence, a survey of all major works covering different security and privacy aspects with a specific focus in Bangladesh is required and is still missing. In this paper, we present an application-centric survey covering studies of security and privacy issues in Bangladesh perspective, utilising an application as well as study centric taxonomies. A total number of 19 research papers have been identified and thoroughly reviewed according to the formulated taxonomies. Finally, we present a summary of our analysis using tabular formats, clearly identifying the scopes as well as applications domains for each reviewed work.

References
  1. Rasib Khan and Ragib Hasan. Security-aware passwords and services usage in developing countries: A case study of bangladesh. In International Conference on Services Computing, pages 67–84. Springer, 2018.
  2. Bangladesh Telecommunication Regulatory Commission. Internet Subscribers Bangladesh, October 2020, (accessed December 1, 2020). http://btrc.gov.bd/content/ internet-subscribers-bangladesh-october-2020.
  3. Sam Thielman. Yahoo hack: 1bn accounts compromised by biggest data breach in history. The Guardian, 15:2016, 2016.
  4. Kimberly A Whitler and Paul W Farris. The impact of cyber attacks on brand image: Why proactive marketing expertise is needed for managing data breaches. Journal of Advertising Research, 57(1):3–9, 2017.
  5. Ashish Garg, Jeffrey Curtis, and Hilary Halper. Quantifying the financial impact of it security breaches. Information Management & Computer Security, 2003.
  6. Atreyi Kankanhalli, Hock-Hai Teo, Bernard CY Tan, and Kwok-Kee Wei. An integrative study of information systems security effectiveness. International journal of information management, 23(2):139–154, 2003.
  7. David Wright, Rachel Finn, and Rowena Rodrigues. A comparative analysis of privacy impact assessment in six countries. Journal of Contemporary European Research, 9(1), 2013.
  8. Ralph Gross and Alessandro Acquisti. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pages 71–80, 2005.
  9. Aditya Vashistha, Richard Anderson, and Shrirang Mare. Examining security and privacy research in developing regions. In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, pages 1–14, 2018.
  10. Tanjila Farah, Moniruzzaman Shojol, Maruf Hassan, and Delwar Alam. Assessment of vulnerabilities of web applications of bangladesh: A case study of xss & csrf. In 2016 sixth international conference on digital information and communication technology and its applications (DICTAP), pages 74–78. IEEE, 2016.
  11. Md Moniruzzaman, Farida Chowdhury, and Md Sadek Ferdous. Measuring vulnerabilities of bangladeshi websites. In 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), pages 1–7. IEEE, 2019.
  12. Afsana Begum, Md Maruf Hassan, Touhid Bhuiyan, and Md Hasan Sharif. Rfi and sqli based local file inclusion vulnerabilities in web applications of bangladesh. In 2016 International Workshop on Computational Intelligence (IWCI), pages 21–25. IEEE, 2016.
  13. Tanjila Farah, Delwar Alam, Md Alamgir Kabir, and Touhid Bhuiyan. Sqli penetration testing of financial web applications: Investigation of bangladesh region. In 2015 World Congress on Internet Security (WorldCIS), pages 146–151. IEEE, 2015.
  14. Delwar Alam, Md Alamgir Kabir, Touhid Bhuiyan, and Tanjila Farah. A case study of sql injection vulnerabilities assessment of. bd domain web applications. In 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec), pages 73–77. IEEE, 2015.
  15. Adil Ahmed Chowdhury, Farida Chowdhury, and Md Sadek Ferdous. A study of password security factors among bangladeshi government websites. IEEE, 2020.
  16. Muhammad Saifuddin Khan and Suborna Barua. The status and threats of information security in the banking sector of bangladesh: Policies required. Bangladesh Journal of MIS, 1(2), 2009.
  17. Mohammad Shamsus Sadekin and Md Abdul Hannan Shaikh. Security of e-banking in bangladesh. Journal of Finance and Accounting, 2016.
  18. Delwar Alam, Touhid Bhuiyan, Md Alamgir Kabir, and Tanjila Farah. Sqli vulnerabilty in education sector websites of bangladesh. In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec), pages 152–157. IEEE, 2015.
  19. Kaushik Sarker, Hasibur Rahman, Khandaker Farzana Rahman, Md Arman, Saikat Biswas, Touhid Bhuiyan, et al. A comparative analysis of the cyber security strategy of bangladesh. arXiv preprint arXiv:1905.00299, 2019.
  20. Kamal Hossain, Khabirul Alam, and Umme Saara Khan. Data Privacy in Bangladesh: A Review of Three Key Stakeholders Perspectives. In Seventh International Conference on Advances in Social Science, Economics and Management Study - SEM 2018, pages 46–50. IRED, 2018.
  21. SM Taiabul Haque, MD Romael Haque, Swapnil Nandy, Priyank Chandra, Mahdi Nasrullah Al-Ameen, Shion Guha, and Syed Ishtiaque Ahmed. Privacy vulnerabilities in public digital service centers in dhaka, bangladesh. In Proceedings of the 2020 International Conference on Information and Communication Technologies and Development, pages 1–12, 2020.
  22. Shahidul Islam Khan and Abu Sayed Md Latiful Hoque. Development of national health data warehouse bangladesh: Privacy issues and a practical solution. In 2015 18th International Conference on Computer and Information Technology (ICCIT), pages 373–378. IEEE, 2015.
  23. Syed Ishtiaque Ahmed, Shion Guha, Md Rashidujjaman Rifat, Faysal Hossain Shezan, and Nicola Dell. Privacy in repair: An analysis of the privacy challenges surrounding broken digital artifacts in bangladesh. In Proceedings of the Eighth International Conference on Information and Communication Technologies and Development, pages 1–10, 2016.
  24. Shion Guha, Mohammad Rashidujjaman Rifat, Faysal Hossain Shezan, Nicola Dell, et al. Privacy vulnerabilities in the practices of repairing broken digital artifacts in bangladesh. Information Technologies and International Development, 2017.
  25. Syed Ishtiaque Ahmed, Md Romael Haque, Shion Guha, Md Rashidujjaman Rifat, and Nicola Dell. Privacy, security, and surveillance in the global south: A study of biometric mobile sim registration in bangladesh. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pages 906–918, 2017.
  26. Syed Ishtiaque Ahmed, Md Romael Haque, Jay Chen, and Nicola Dell. Digital privacy challenges with shared mobile phone use in bangladesh. Proceedings of the ACM on Human- Computer Interaction, 1(CSCW):1–20, 2017.
  27. Syed Ishtiaque Ahmed, Md Romael Haque, Irtaza Haider, Jay Chen, and Nicola Dell. ” everyone has some personal stuff” designing to support digital privacy with shared mobile phone use in bangladesh. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pages 1–13, 2019.
Index Terms

Computer Science
Information Sciences

Keywords

Security Privacy Password Survey Bangladesh