We are excited to announce new opportunities for internships in our team. Apply now and start your career with us!
Apply Now
The CISPA x LUMS Research Partnership on Internet For Everyone
Bridging the Digital Divide through Interdisciplinary Research.
Despite widespread Internet use, many are still excluded from digital resources. Moreover, the Internet often mirrors physical world inequalities, leaving certain groups marginalized and vulnerable. CIRCLE aims to address this societal challenge by making the Internet more accessible to marginalized groups. CIRCLE adopts an interdisciplinary approach, centering humans in all research.
The core team behind our efforts.

Directors of CIRCLE
Our alumni remain part of the CIRCLE family as collaborators, mentors, and friends.
Our peer-reviewed papers have been published in top-tier venues in Security, Privacy, and Human-Computer Interaction.
Sumair Ijaz Hashmi*, Rimsha Sarfaraz*, Lea Gröber, Mobin Javed, Katharina Krombholz. (* denotes joint authorship)
🏆 Honorable Mention at ACM CHI 2025 · 2025
Low socioeconomic populations face severe security challenges while being unable to access traditional written advice resources. We present the first study to explore the security advice landscape of low socioeconomic people in Pakistan. With 20 semi-structured interviews, we uncover how they learn and share security advice and what factors enable or limit their advice sharing. Our findings highlight that they heavily rely on community advice and intermediation to establish and maintain security-related practices (such as passwords). We uncover how shifting social environments shape advice dissemination, e.g., across different workplaces. Participants leverage their social structures to protect each other against threats that exploit their financial vulnerability and lack of digital literacy.
Lea Gröber, Waleed Arshad, Angelica Goetzen, Elissa M Redmiles, Maryam Mustafa, Katharina Krombholz.
USENIX Security 2024 · 2024
Content creators are exposed to elevated risks compared to the general Internet user. This study explores the threat landscape that creators in Pakistan are exposed to, how they protect themselves, and which support structures they rely on. We conducted a semi-structured interview study with 23 creators from diverse backgrounds who create content on various topics. Our data suggests that online threats frequently spill over into the offline world, especially for gender minorities. Creating content on sensitive topics like politics, religion, and human rights is associated with elevated risks. We find that defensive mechanisms and external support structures are non-existent, lacking, or inadequately adjusted to the sociocultural context of Pakistan.
Maryam Mustafa, Abdul Moeed Asad, Shehrbano Hassan, Urooj Haider, Zainab Durrani, and Katharina Krombholz.
CCS 2023 · 2023
The understanding of how teenagers perceive, manage and perform privacy is less well-understood in spaces outside of Western, educated, industrialised, rich and democratic countries. To fill this gap we interviewed 30 teens to investigate the privacy perceptions, practices, and experienced digital harms of young people in Pakistan, a particularly interesting context as privacy in this context is not seen as an individual right or performed within an individualistic framework but instead is influenced by a combination of factors including social norms, family dynamics and religious beliefs. Based on our findings, we developed four personas to systematize the needs and values of this specific population and then conducted focus groups with co-design activities to further explore privacy conflicts. Among other things that confirm and extend existing theories on teen's privacy practices and perceptions, our findings suggest that young women are disproportionately impacted by privacy violations and the harms extend beyond themselves to include their families.
Sumair Ijaz Hashmi*, Niklas George*, Eimaan Saqib, Fatima Ali, Nawaal Siddique, Shafay Kashif, Shahzaib Ali, Nida Ul Habib Bajwa, Mobin Javed. (* denotes joint authorship)
Extended Abstracts of ACM CHI 2023 · 2023
Voice-based phishing attacks, in which a scammer uses social engineering techniques over a phone call to convince victims to divulge sensitive information, cause losses of several million dollars. We present a pilot study of a novel intervention that trains users to recognize phishing calls by identifying the persuasion principles used by the scammer. The training is implemented via a Whatsapp chatbot that includes example audio recordings and exercises of scam calls, and how the scammer employs the principle of authority in order to persuade the victim. 50 students from a university participated in the persuasion principles training. We then conducted a simulated vishing call a few days later to test how well the participants recognize the call compared to a control group (also 50 students) that was only given a general awareness training, and was not specifically trained to recognize authority via chatbot exercises. We also conducted interviews with participants from both the groups to understand the perceived usefulness of the training.
Afaq Ashraf*, - Taha*, Nida ul Habib Bajwa, Cornelius J. König, Mobin Javed, Maryam Mustafa. (* denotes joint authorship)
🏆 IAPP SOUPS Privacy Award @ SOUPS 2023 · 2023
We explore the experiences, understandings and perceptions of cyber-threats and crimes amongst young adults in Pakistan, focusing on their mechanisms for protecting themselves, for reporting cyber threats and for managing their digital identities. Relying on data from a qualitative study with 34 participants in combination with a repertory grid analysis with 18 participants, we map users mental models and constructs of cyber crimes and threats, their understanding of digital vulnerabilities, their own personal boundaries and their moral compasses on what constitutes an invasion of privacy of other users in a country where there is little legal legislation governing cyberspace and cyber crimes. Our findings highlight the importance of platform adaptation to accommodate the unique context of countries with limited legal mandates and reporting outlets, the ways in which digital vulnerabilities impact diverse populations, and how security and privacy design can be more inclusive.
CIRCLE highlights & announcements.
Aug 30, 2025
Our recent cohort of young and passionate interns successfully completed their summer internship ❤️🔥!
Jul 4, 2025
Our awesome PhD Student Lea Gröber successfully defended her thesis and graduated with the highest grade 🚀!
May 5, 2025
Our paper got published and won an award at ACM CHI 2025 in Japan 🇯🇵!
Come do your best work with us.
This project is a collaborative effort by two partnering institutions: LUMS and CISPA.

The Lahore University of Management Sciences (LUMS) is Pakistan’s leading research intensive university, excelling in teaching and driven by a philosophy of ‘Learning Without Borders’. LUMS provides an integrated curriculum uniting disciplines to focus on solving the grand challenges of South Asia and beyond. LUMS aspires to achieve excellence and national and international leadership through unparalleled teaching and research, holistic undergraduate education, and civic engagement to serve the critical needs of society.

The CISPA Helmholtz Center for Information Security is a German national Big Science institution within the Helmholtz Association. CISPA researchers explore all aspects of information security. They address the pressing global challenges in cybersecurity, data protection and trustworthy artificial intelligence. Conducting modern foundational research as well as innovative application-oriented research, they work to protect the digital space and improve industrial applications and products. CISPA promotes scientific talent, supports promising founders, and trains experts and executives for business and industry. In this way, it carries its research findings into society and strengthens Germany’s as well as Europe’s competitiveness.
Both institutions have previously collaborated on an EU funded Erasmus+ Project: RECYPHER: Rethinking cybersecurity in Pakistan – Human factors‘ essential role