{"id":"https://openalex.org/W1971757672","doi":"https://doi.org/10.1145/2346536.2346577","title":"Mobile communication for emerging Bangladesh","display_name":"Mobile communication for emerging Bangladesh","publication_year":2012,"publication_date":"2012-08-07","ids":{"openalex":"https://openalex.org/W1971757672","doi":"https://doi.org/10.1145/2346536.2346577","mag":"1971757672"},"language":"en","primary_location":{"id":"doi:10.1145/2346536.2346577","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2346536.2346577","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th Annual International Conference on Electronic Commerce","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043544885","display_name":"Faheem Hussain","orcid":"https://orcid.org/0000-0003-4173-3094"},"institutions":[{"id":"https://openalex.org/I146966710","display_name":"Asian University for Women","ror":"https://ror.org/01wp52t96","country_code":"BD","type":"education","lineage":["https://openalex.org/I146966710"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Faheem Hussain","raw_affiliation_strings":["Asian University for Women, Chittagong, Bangladesh","Asian University for Women , Chittagong , Bangladesh"],"affiliations":[{"raw_affiliation_string":"Asian University for Women, Chittagong, Bangladesh","institution_ids":["https://openalex.org/I146966710"]},{"raw_affiliation_string":"Asian University for Women , Chittagong , Bangladesh","institution_ids":["https://openalex.org/I146966710"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110866842","display_name":"Mohammad Sahid Ullah","orcid":null},"institutions":[{"id":"https://openalex.org/I894293524","display_name":"University of Chittagong","ror":"https://ror.org/01173vs27","country_code":"BD","type":"education","lineage":["https://openalex.org/I894293524"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Mohammad Sahid Ullah","raw_affiliation_strings":["University for Chittagong, Chittagong, Bangladesh"],"affiliations":[{"raw_affiliation_string":"University for Chittagong, Chittagong, Bangladesh","institution_ids":["https://openalex.org/I894293524"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5043544885"],"corresponding_institution_ids":["https://openalex.org/I146966710"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.18368534,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"211","last_page":"216"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13194","display_name":"ICT in Developing Communities","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11499","display_name":"ICT Impact and Policies","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6184053421020508},{"id":"https://openalex.org/keywords/information-and-communications-technology","display_name":"Information and Communications Technology","score":0.5558741092681885},{"id":"https://openalex.org/keywords/mobile-telephony","display_name":"Mobile telephony","score":0.4937466084957123},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.47046932578086853},{"id":"https://openalex.org/keywords/digital-divide","display_name":"Digital divide","score":0.4289102554321289},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4283408224582672},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42027729749679565},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3436303734779358},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3357548415660858},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2795637845993042},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11829644441604614}],"concepts":[{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6184053421020508},{"id":"https://openalex.org/C67363961","wikidata":"https://www.wikidata.org/wiki/Q5268834","display_name":"Information and Communications Technology","level":2,"score":0.5558741092681885},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.4937466084957123},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.47046932578086853},{"id":"https://openalex.org/C173655357","wikidata":"https://www.wikidata.org/wiki/Q244752","display_name":"Digital divide","level":3,"score":0.4289102554321289},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4283408224582672},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42027729749679565},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3436303734779358},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3357548415660858},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2795637845993042},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11829644441604614},{"id":"https://openalex.org/C2781307350","wikidata":"https://www.wikidata.org/wiki/Q6887221","display_name":"Mobile radio","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2346536.2346577","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2346536.2346577","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th Annual International Conference on Electronic Commerce","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/1","display_name":"No poverty","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W18446590","https://openalex.org/W1556840283","https://openalex.org/W2123005940","https://openalex.org/W2240225182","https://openalex.org/W2267947220"],"related_works":["https://openalex.org/W3165920664","https://openalex.org/W2765817684","https://openalex.org/W2997895985","https://openalex.org/W4239830581","https://openalex.org/W3206369419","https://openalex.org/W2101162540","https://openalex.org/W1915069673","https://openalex.org/W2132866589","https://openalex.org/W2403018341","https://openalex.org/W2110016748"],"abstract_inverted_index":{"Connectivity":[0],"in":[1,57,85,101,108,150,237],"social":[2,60],"and":[3,34,47,59,68,113,141,207,228,241],"economic":[4],"spheres":[5],"using":[6,136],"mobile":[7,73,137,185],"technology":[8],"is":[9,17,49],"a":[10,23,27,35,64,97,121,124,154,172,219],"global":[11],"phenomenon.":[12],"This":[13,41,118,214],"kind":[14],"of":[15,32,63,82,91,110,123,132,146,163,166,181,203,222,235],"communication":[16,45],"more":[18],"significant":[19,220],"for":[20,139],"Southern":[21],"Countries:":[22],"mean":[24],"to":[25,29,53,70,187],"develop,":[26],"way":[28],"come":[30],"out":[31],"poverty,":[33],"path":[36],"towards":[37],"an":[38,86,159],"equitable":[39],"society.":[40],"relationship":[42],"between":[43],"new":[44],"technologies":[46],"society":[48],"complex,":[50],"primarily":[51],"due":[52],"their":[54],"multidimensional":[55],"effects":[56],"personal":[58,115],"lives.":[61],"Absence":[62],"proper":[65],"policy":[66],"guideline":[67],"infrastructure":[69],"nurture":[71],"the":[72,78,92,130,147,179,192,195,201,211,223,233,238],"communications'":[74],"potentials":[75],"can":[76],"leave":[77],"users":[79],"at":[80,210],"risk":[81],"privacy":[83,111,206,236],"violations":[84],"increasingly":[87],"flattened":[88],"world.":[89],"Youths":[90],"developing":[93],"societies,":[94],"who":[95],"have":[96,177,243],"very":[98],"high":[99],"representation":[100],"ICT":[102],"usage":[103],"hence":[104],"face":[105],"greater":[106],"risks":[107,250],"terms":[109],"violation":[112],"involuntary":[114],"data":[116,142,257],"commodification.":[117],"paper,":[119],"as":[120],"part":[122],"multi-year":[125],"study,":[126],"specifically":[127],"looks":[128],"into":[129],"vulnerability":[131],"Bangladeshi":[133],"youth":[134],"population":[135],"devices,":[138],"voice":[140,255],"communications.":[143],"Bangladesh,":[144],"one":[145],"emerging":[148],"economies":[149],"South":[151],"Asia,":[152],"has":[153],"thriving":[155],"Telecom/ICT":[156],"industry":[157],"with":[158,252],"ever":[160],"growing":[161],"number":[162,221],"users,":[164],"majority":[165],"them":[167],"being":[168],"young.":[169],"Based":[170],"on":[171,183],"nationwide":[173],"representative":[174],"survey,":[175],"we":[176],"found":[178],"level":[180],"trust":[182],"existing":[184],"telephony":[186],"be":[188],"significantly":[189],"higher":[190],"than":[191],"Internet":[193],"across":[194],"country":[196],"among":[197],"all":[198],"respondents,":[199],"amid":[200],"absence":[202],"any":[204,254],"clear":[205],"security":[208],"framework":[209],"national":[212],"level.":[213],"paper":[215],"moreover":[216],"shows":[217],"that":[218],"younger":[224],"generation":[225],"(both":[226],"male":[227],"female)":[229],"are":[230],"unaware":[231],"about":[232,248],"concept":[234],"'Digital":[239],"Age'":[240],"also":[242],"little":[244],"or":[245,256],"no":[246],"idea":[247],"possible":[249],"involved":[251],"sharing":[253],"communication.":[258]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
