"Cryptocurrencies, and the blockchain technology that underlies them, have attracted much attention over the last decade from scholars, tech communities, financial institutions, states and more. The extreme volatility of the cryptocurrency market has made some people very rich and cost others almost
...
everything.Importantly, there are many indications that marginalized communities are especially attracted to this new technology while being more vulnerable to issues such as fraud and exploitation in this field. This paper reviews academic research –predominantly social scientific – on cryptocurrencies and financial blockchain to determine the extent to which they engage with the experiences, agencies, and knowledges of marginalized communities. Overall, the findings show that, bar a few important exceptions that take seriously marginalized communities, academic research has largely focused on traditionally dominant actors such as crypto evangelists, fintech developers, states, and banks. Furthermore, the knowledges of marginalized communities are almost entirely absent while research privileges already dominant theories and research methodologies. Such trends in academic research on cryptocurrencies and blockchain technology reproduce existing knowledge hierarchies and lead to the further material marginalization of already vulnerable communities. In light of these findings, we conclude with some recommendations for further research that can challenge these problematic dynamics."(Abstract)
more
"[...] this is the first anthology to specifically investigate the history and state of cyber warfare in the Middle East. It gathers an array of technical practitioners, social science scholars, and legal experts to provide a panoramic overview and cross-sectional analysis covering four main areas:
...
privacy and civil society; the types of cyber conflict; information and influence operations; and methods of countering extremism online. The book highlights the real threat of hacktivism and informational warfare between state actors and the specific issues affecting the MENA region. These include digital authoritarianism and malware attacks in the Middle East, analysis of how ISIS and the Syrian electronic army use the internet, and the impact of disinformation and cybercrime in the Gulf. The book captures the flashpoints and developments in cyber conflict in the past 10 years and offers a snapshot of the region's still-early cyber history. It also clarifies how cyber warfare may develop in the near- to medium-term future and provides ideas of how its greatest risks can be avoided." (Publisher description)
more
"This report outlines the relevance of gender norms to cybersecurity. It draws on existing research, supplemented by stakeholder and expert interviews, to assess gender-based differences in the social roles and interaction of women, men and non-binary people of all ages reflected in the distribution
...
of power (e.g. influence over policy decisions and corporate governance), access to resources (e.g. equitable access to education, wages or privacy protections), and construction of gender norms and roles (e.g. assumptions regarding victims and perpetrators of cyber-facilitated violence)." (Executive summary)
more