Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3290605.3300410acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Public Access

"Everyone Has Some Personal Stuff": Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh

Published: 02 May 2019 Publication History

Abstract

People in South Asia frequently share a single device among multiple individuals, resulting in digital privacy challenges. This paper explores a design concept that aims to mitigate some of these challenges through a 'tiered' privacy model. Using this model, a person creates a 'shared' account that contains data they are willing to share and that is assigned a password that will be shared. Simultaneously, they create a separate 'secret' account that contains data they prefer to keep secret and that uses a password they do not share with anyone. When a friend or family member asks to check their device, the user can tell them the password for their shared account, with their private data secure in the secret account that the other person is unaware of. We explore the benefits and trade-offs of our design through a three-week deployment with 21 participants in Bangladesh, presenting findings that show how our work aids digital privacy while also exposing the challenges that remain.

Supplementary Material

MP4 File (paper180.mp4)

References

[1]
Norah Abokhodair. 2015. Transmigrant Saudi Arabian youth and social media: privacy, intimacy and freedom of expression. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 187--190.
[2]
Norah Abokhodair and Sarah Vieweg. 2016. Privacy & Social Media in the Context of the Arab Gulf. In Proc. Conference on Designing Interactive Systems. ACM, 672--683.
[3]
Shane Ahern, Dean Eckles, Nathaniel S Good, Simon King, Mor Naaman, and Rahul Nair. 2007. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 357-- 366.
[4]
Syed Ishtiaque Ahmed, Nova Ahmed, Faheem Hussain, and Neha Kumar. 2016. Computing beyond gender-imposed limits. In Proceedings of the Second Workshop on Computing within Limits. ACM, 6.
[5]
Syed Ishtiaque Ahmed, Shion Guha, Md Rashidujjaman Rifat, Faysal Hossain Shezan, and Nicola Dell. 2016. Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh. In Proceedings of the Eighth International Conference on Information and Communication Technologies and Development. ACM, 11.
[6]
Syed Ishtiaque Ahmed, Md. Romael Haque, Jay Chen, and Nicola Dell. 2017. Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh. Proc. ACM Hum.-Comput. Interact. 1, CSCW, Article 17 (2017), 17:1--17:20 pages.
[7]
Syed Ishtiaque Ahmed, Md Romael Haque, Shion Guha, Md Rashidujjaman Rifat, and Nicola Dell. 2017. Privacy, Security, and Surveillance in the Global South: A Study of Biometric Mobile SIM Registration in Bangladesh. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 906--918. CHI 2019, May 4--9, 2019, Glasgow, Scotland UK S.I. Ahmed, M.R. Haque, I. Haider, J. Chen, and N. Dell
[8]
Syed Ishtiaque Ahmed, Steven J Jackson, Nova Ahmed, Hasan Shahid Ferdous, Md. Rashidujjaman Rifat, A. S. M. Rizvi, Shamir Ahmed, and Rifat Sabbir Mansur. 2014. Protibadi: A Platform for Fighting Sexual Harassment in Urban Bangladesh. In Proc. CHI'14. ACM, 2695--2704.
[9]
Syed Ishtiaque Ahmed, Steven J Jackson, Maruf Zaber, Mehrab Bin Morshed, Md. Habibullah Bin Ismail, and Shamim Afrose. 2013. Ecologies of Use and Design: Individual and Social Uses of Mobile Phones Within Low-Literate Rickshaw-Puller Communities in Urban Bangladesh. In Proc. DEV-4. ACM, 14:1--14:10.
[10]
Syed Ishtiaque Ahmed, Maruf Zaber, Mehrab Bin Morshed, Md. Habibullah Bin Ismail, Dan Cosley, and Steven J Jackson. 2015. Suhrid: A Collaborative Mobile Phone Interface for Low Literate People. In Proc. DEV'15. ACM, 95--103.
[11]
Android Central. 2017. Lollipop Brings Proper Multi-user Accounts to Your Phone. https://www.androidcentral.com/ lollipop-brings-proper-multi-user-accounts-your-phone. (2017). {Online; accessed July 10, 2017}.
[12]
Thierry Bardini. 2000. Bootstrapping: Douglas Engelbart, coevolution, and the origins of personal computing. Stanford University Press.
[13]
Rachel F. Baskerville. 2003. Hofstede never studied culture. Accounting, Organizations and Society 28, 1 (2003), 1--14.
[14]
Seyla Benhabib. 2005. Borders, boundaries, and citizenship. PS: Political Science & Politics 38, 4 (2005), 673--677.
[15]
Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77--101.
[16]
Jenna Burrell. 2010. Evaluating Shared Access: Social Equality and the Circulation of Mobile Phones in Rural Uganda. Journal of Computer Mediated Communication 15, 2 (2010), 230--250.
[17]
Mead Cain, Syeda Rokeya Khanam, and Shamsun Nahar. 1979. Class, patriarchy, and women's work in Bangladesh. Population and Development Review (1979), 405--438.
[18]
Hichang Cho and Anna Filippova. 2016. Networked Privacy Management in Facebook: A Mixed-methods and Multinational Study. In Proc. CSCW'16. ACM, 503--514.
[19]
Jeremy Clark and Urs Hengartner. 2008. Panic passwords: Authenticating under duress. HotSec 8 (2008), 8.
[20]
Raymundo Cornejo, Robin Brewer, Caroline Edasis, and Anne Marie Piper. 2016. Vulnerability, Sharing, and Privacy: Analyzing Art Therapy for Older Adults with Dementia. In Proc. CSCW'16. ACM, 1572-- 1583.
[21]
Nicola Dell, Vidya Vaidyanathan, Indrani Medhi, Edward Cutrell, and William Thies. 2012. Yours is better!: participant response bias in HCI. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1321--1330.
[22]
Serge Egelman. 2013. My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2369--2378.
[23]
Casey Fiesler, Michaelanne Dye, Jessica L Feuston, Chaya Hiruncharoenvate, Clayton J Hutto, Shannon Morrison, Parisa Khanipour Roshan, Umashanthi Pavalanathan, Amy S Bruckman, Munmun De Choudhury, et al. 2017. What (or Who) Is Public?: Privacy Settings and Social Media Content Sharing. In Proc. CSCW'17. 567--580.
[24]
David H Flaherty. 1989. Protecting privacy in surveillance societies. Chapel Hill: University of North Carolina Press.
[25]
Alain Forget, Sonia Chiasson, and Robert Biddle. 2007. Helping users create better passwords: Is this the right approach?. In Proceedings of the 3rd Symposium on Usable Privacy and Security. ACM, 151--152.
[26]
Nancy Fraser. 1995. Politics, culture, and the public sphere: Toward a postmodern conception. Social postmodernism: Beyond identity politics 291 (1995), 295.
[27]
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2017. Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders. Proceedings of the ACM on Human-Computer Interaction Vol. 1, CSCW (2017), Article 46.
[28]
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. "A Stalker's Paradise": How Intimate Partner Abusers Exploit Technology. (2018).
[29]
Leo A Goodman. 1961. Snowball sampling. The annals of mathematical statistics (1961), 148--170.
[30]
Ralph Gross and Alessandro Acquisti. 2005. Information Revelation and Privacy in Online Social Networks. In Proc. Workshop on Privacy in the Electronic Society. ACM, 71--80.
[31]
GSM Association. 2018. Country overview: Bangladesh. https://www.gsmaintelligence.com/research/?file= a163eddca009553979bcdfb8fd5f2ef0&download. (2018). {Online; accessed June 27, 2018}.
[32]
Jürgen Habermas. 1994. Three normative models of democracy. Constellations 1, 1 (1994), 1--10.
[33]
SM Taiabul Haque, Matthew Wright, and Shannon Scielzo. 2014. Hierarchy of users web passwords: Perceptions, practices and susceptibilities. International Journal of Human-Computer Studies 72, 12 (2014), 860--874.
[34]
Morten Hertzum. 2006. Minimal-feedback hints for remembering passwords. interactions 13, 3 (2006), 38--40.
[35]
Geert Hofstede. 1984. The Cultural Relativity of the Quality of Life Concept. Academy of Management Review 9, 3 (1984), 389--398.
[36]
Roberto Hoyle, Srijita Das, Apu Kapadia, Adam J Lee, and Kami Vaniea. 2017. Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks. In Proc. CSCW'17. 555--566.
[37]
Haiyan Jia, Pamela J Wisniewski, Heng Xu, Mary Beth Rosson, and John M Carroll. 2015. Risk-taking as a Learning Process for Shaping Teen's Online Information Privacy Behaviors. In Proc. CSCW'15. ACM, 583--599.
[38]
Joseph 'Jofish' Kaye. 2011. Self-reported Password Sharing Strategies. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, USA, 2619--2622.
[39]
Patrick Gage Kelley, Lorrie Faith Cranor, and Norman Sadeh. 2013. Privacy as part of the app decision-making process. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 3393--3402.
[40]
Ponnurangam Kumaraguru and Lorrie F Cranor. 2006. Privacy in India: Attitudes and Awareness. Privacy Enhancing Technologies (2006), 243--258.
[41]
Yifang Li, Nishant Vishwamitra, Bart P. Knijnenburg, Hongxin Hu, and Kelly Caine. 2017. Effectiveness and Users' Experience of Obfuscation As a Privacy-Enhancing Technology for Sharing Photos. Proc. ACM Hum.-Comput. Interact. 1, CSCW, Article 67 (Dec. 2017), 67:1-- 67:24 pages.
[42]
Carolyn A Lin. 1998. Exploring Personal Computer Adoption Dynamics. Journal of Broadcasting & Electronic Media 42, 1 (1998), 95--112.
[43]
Heather R Lipford, Gordon Hull, Celine Latulipe, Andrew Besmer, and Jason Watson. 2009. Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites. In Proc. CSE'09, Vol. 4. IEEE, 985--989.
[44]
Yabing Liu, Krishna P Gummadi, Balachander Krishnamurthy, and Alan Mislove. 2011. Analyzing facebook privacy settings: user expectations vs. reality. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, 61--70.
[45]
Tara Matthews, Kerwell Liao, Anna Turner, Marianne Berkovich, Robert Reeder, and Sunny Consolvo. 2016. "She'll Just Grab Any Device That's Closer": A Study of Everyday Device and Account Sharing in Households. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, 5921--5932.
[46]
Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F Churchill, and Sunny Consolvo. 2017. Stories from survivors: security practices when coping with intimate partner abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 2189--2201.
[47]
Tamir Mendel and Eran Toch. 2017. Susceptibility to Social Influence of Privacy Behaviors: Peer versus Authoritative Sources. In Proc. CSCW'17. ACM, 581--593.
[48]
Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Wash L. Rev 79, 119 (2004).
[49]
Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.
[50]
Tapan S Parikh and Koushik Ghosh. 2006. Understanding and Designing for Intermediated Information Tasks in India. IEEE Pervasive Computing 5, 2 (2006), 32--39.
[51]
Tapan S Parikh, Koushik Ghosh, and Apala Lahiri Chavan. 2003. Design studies for a financial management system for micro-credit groups in rural india. In In ACM SIGCAPH Computers and the Physically Handicapped. 15--22.
[52]
Sandra Petronio and Wesley T. Durham. 2008. Interpersonal Communication: Multiple perspectives (1st ed.). Sage Publications, USA, Chapter Communication privacy management theory, 309--322.
[53]
Norman Sadeh, Jason Hong, Lorrie F Cranor, Ian Fette, Patrick Kelley, Madhu Prabakar, and Jinghai Rao. 2009. Understanding and Capturing People's Privacy Policies in a Mobile Social Networking Application. Personal and Ubiquitous Computing 13, 6 (2009), 401--412.
[54]
N Sambasivan, G Checkley, A Batool, N Ahmed, D Nemer, LS GaytánLugo, T Matthews, S Consolvo, and E Churchill. 2018. Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association.
[55]
Nithya Sambasivan, Ed Cutrell, Kentaro Toyama, and Bonnie Nardi. 2010. Intermediated Technology Use in Developing Communities. In Proc. CHI'10. ACM, 2583--2592.
[56]
Janaki Srinivasan, Savita Bailur, Emrys Schoemaker, and Sarita Seshagiri. 2018. Privacy at the Margins: The Poverty of Privacy: Understanding Privacy Trade-Offs From Identity Infrastructure Users in India. International Journal of Communication 12 (2018), 20.
[57]
Sharifa Sultana, François Guimbretière, Phoebe Sengers, and Nicola Dell. 2018. Design Within a Patriarchal Society: Opportunities and Challenges in Designing for Rural Women in Bangladesh. (2018).
[58]
Tech Crunch. 2017. Why Android Jelly Bean 4.2's Multiple User Account Switching Is Tablet-Only? (Hint: Nokia Patented It For Phones). https://techcrunch.com/2012/10/29/ why-android-jelly-bean-4--2s-multiple-user-account-switching-is-tablet-only-\ hint-nokia-patented-it-for-phones. (2017). {Online; accessed July 10, 2017}.
[59]
Ronald L Thompson, Christopher A Higgins, and Jane M Howell. 1991. Personal Computing: Toward a Conceptual Model of Utilization. MIS quarterly (1991), 125--143.
[60]
Harry C. Triandis. 2018. Individualism and collectivism. Routledge.
[61]
Emanuel von Zezschwitz, Sigrid Ebbinghaus, Heinrich Hussmann, and Alexander De Luca. 2016. You Can't Watch This!: PrivacyRespectful Photo Browsing on Smartphones. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 4320-- 4324.
[62]
Samuel D Warren and Louis D Brandeis. 1890. The right to privacy. Harvard Law Review (1890), 193--220.
[63]
Alan F Westin. 1968. Privacy and freedom. 25 Washington and Lee Law Review. 166. (1968).
[64]
Wikipedia. 2018. Cambridge Analytica Data Scandal. https://en.wikipedia.org/wiki/Facebook%E2%80%93Cambridge_ Analytica_data_scandal. (2018). {Online; accessed April 19, 2018}.
[65]
Pamela Wisniewski, AKM Islam, Bart P Knijnenburg, and Sameer Patil. 2015. Give social Network Users the Privacy They Want. In Proc. CSCW'15. ACM, 1427--1441.
[66]
Pamela Wisniewski, Haiyan Jia, Heng Xu, Mary Beth Rosson, and John M Carroll. 2015. Preventative vs. Reactive: How Parental Mediation Influences Teens' Social Media Privacy Behaviors. In Proc. CSCW'15. ACM, 302--316.
[67]
Pamela J Wisniewski, Heng Xu, Mary Beth Rosson, and John M Carroll. 2014. Adolescent Online Safety: The Moral of the Story. In Proc. CSCW'14. ACM, 1258--1271.
[68]
Bo Zhang and Heng Xu. 2016. Privacy Nudges for Mobile Applications: Effects on the Creepiness Emotion and Privacy Attitudes. In Proc. CSCW'16. ACM, 1676--1690.

Cited By

View all
  • (2024)Ghost Readers of the Nile: Decrypting Password Sharing Habits in Chatting Applications among Egyptian WomenProceedings of the ACM on Human-Computer Interaction10.1145/36765068:MHCI(1-43)Online publication date: 24-Sep-2024
  • (2024)Hearing Community Voices in HCI4D: Establishing Safe Places to Co-Create Counter-Collective Narratives with Women Farmers in BangladeshProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642532(1-17)Online publication date: 11-May-2024
  • (2024)Computing and the Stigmatized: Trust, Surveillance, and Spatial Politics with the Sex Workers in BangladeshProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642005(1-22)Online publication date: 11-May-2024
  • Show More Cited By

Index Terms

  1. "Everyone Has Some Personal Stuff": Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
    May 2019
    9077 pages
    ISBN:9781450359702
    DOI:10.1145/3290605
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 May 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. access
    2. hci4d
    3. ictd
    4. mobile devices
    5. privacy
    6. shared use

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CHI '19
    Sponsor:

    Acceptance Rates

    CHI '19 Paper Acceptance Rate 703 of 2,958 submissions, 24%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)436
    • Downloads (Last 6 weeks)44
    Reflects downloads up to 15 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Ghost Readers of the Nile: Decrypting Password Sharing Habits in Chatting Applications among Egyptian WomenProceedings of the ACM on Human-Computer Interaction10.1145/36765068:MHCI(1-43)Online publication date: 24-Sep-2024
    • (2024)Hearing Community Voices in HCI4D: Establishing Safe Places to Co-Create Counter-Collective Narratives with Women Farmers in BangladeshProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642532(1-17)Online publication date: 11-May-2024
    • (2024)Computing and the Stigmatized: Trust, Surveillance, and Spatial Politics with the Sex Workers in BangladeshProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642005(1-22)Online publication date: 11-May-2024
    • (2024)Occupying Another’s Digital Space: Privacy of Smartphone Users as a Situated PracticeComputer Supported Cooperative Work (CSCW)10.1007/s10606-024-09492-zOnline publication date: 23-Feb-2024
    • (2024)An Exploration of How Children Can Be Proactive for Their Own Digital Privacy and Security in the Perspective of North-Eastern BangladeshHuman-Centric Smart Computing10.1007/978-981-99-7711-6_13(153-165)Online publication date: 18-Feb-2024
    • (2023)One size does not fit allProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620555(5683-5700)Online publication date: 9-Aug-2023
    • (2023)Localised Trust in a Globalised Knot: Designing Information Privacy for Digital-IDACM Journal on Computing and Sustainable Societies10.1145/36160242:1(1-37)Online publication date: 16-Aug-2023
    • (2023)A Deep Dive into User's Preferences and Behavior around Mobile Phone SharingProceedings of the ACM on Human-Computer Interaction10.1145/35795957:CSCW1(1-22)Online publication date: 16-Apr-2023
    • (2023)Community Voice as Data: Affordances of Participatory Videos for International Program DevelopmentProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581458(1-16)Online publication date: 19-Apr-2023
    • (2023)Applying a machine learning model to forecast the risks to children's online privacy and security2023 International Conference on Intelligent Systems, Advanced Computing and Communication (ISACC)10.1109/ISACC56298.2023.10084054(1-8)Online publication date: 3-Feb-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media