Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

"Privacy is not a concept, but a way of dealing with life": Localization of Transnational Technology Platforms and Liminal Privacy Practices in Cambodia

Published: 07 November 2019 Publication History

Abstract

Privacy scholarship has shown how norms of appropriate information flow and information regulatory processes vary according to environment, which change as the environment changes, including through the introduction of new technologies. This paper describes findings from a qualitative research study that examines practices and perceptions of privacy in Cambodia as the population rapidly moves into an online environment (specifically Facebook, the most popular Internet tool in Cambodia today). We empirically demonstrate how the concept of privacy differs across cultures and show how the Facebook platform, as it becomes popular worldwide, catalyzes change in norms of information regulation. We discuss how the localization of transnational technology platforms provides a key site in which to investigate changing cultural ideas about privacy, and to discover misalignments between different expectations for information flow. Finally, we explore ways that insufficient localization effort by transnational technology companies puts some of the most marginalized users at disproportionate information disclosure risk when using new Internet tools, and offer some pragmatic suggestions for how such companies could improve privacy tools for users who are far -geographically or culturally - from where the tools are designed.

References

[1]
2017. Cambodia Daily shuts with 'dictatorship' parting shot at prime minister Hun Sen. The Guardian (2017). https://www.theguardian.com/world/2017/sep/04/cambodia-daily-shuts-with-dictatorship-parting-shot-at-prime-minister-hun-sen
[2]
2019. Police crackdowns on 163 Chinese nationals related to cybercriminals in Siem Reap. Fresh News (2019). http://m.freshnewsasia.com/index.php/en/localnews/117430--2019-03--28-05-07--14.html?fbclid=IwAR1VTy_ThR9Cu8Ipyajxg4fFAv__cxqjldebFz18HEqCN39VNplj3bQbpvQ
[3]
Quarraisha Abdool Karim, Salim S Abdool Karim, Hoosen M Coovadia, and Mervyn Susser. 1998. Informed consent for HIV testing in a South African hospital: is it truly informed and truly voluntary? American journal of public health 88, 4 (1998), 637--640.
[4]
Norah Abokhodair, Adam Hodges, and Sarah Vieweg. 2017. Photo sharing in the Arab Gulf: Expressing the collective and autonomous selves. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, 696--711.
[5]
Syed Ishtiaque Ahmed, Md Romael Haque, Jay Chen, and Nicola Dell. 2017. Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (2017), 17.
[6]
Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. (1975).
[7]
Irwin Altman. 1977. Privacy regulation: Culturally universal or culturally specific? Journal of social issues 33, 3 (1977), 66--84.
[8]
Morgan G Ames. 2015. Charismatic technology. In Proceedings of The Fifth Decennial Aarhus Conference on Critical Alternatives. Aarhus University Press, 109--120.
[9]
Radio Free Asia. 2018. Cambodia to Monitor, Control Online News Ahead of Upcoming Ballot. (2018). https://www.rfa.org/english/news/cambodia/news-06042018162755.html
[10]
Subhajit Basu. 2012. Privacy protection: a tale of two cultures. Masaryk UJL & Tech. 6 (2012), 1.
[11]
Hannah Beech. 2018. Cambodia Re-Elects Its Leader, a Result Predetermined by One. New York Times (2018). https://www.nytimes.com/2018/07/29/world/asia/cambodia-election-hun-sen.html
[12]
Danah Boyd. 2014. It's complicated: The social lives of networked teens. Yale University Press.
[13]
Virginia Braun, Victoria Clarke, Nikki Hayfield, and Gareth Terry. 2019. Thematic analysis. Handbook of Research Methods in Health Social Sciences (2019), 843--860.
[14]
Nicholas Confessore. 2018. Cambridge Analytica and Facebook: The Scandal and the Fallout So Far. The New York Times (2018). https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html
[15]
Raymundo Cornejo, Robin Brewer, Caroline Edasis, and Anne Marie Piper. 2016. Vulnerability, sharing, and privacy: Analyzing art therapy for older adults with dementia. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 1572--1583.
[16]
Katie Featherstone and Jenny L Donovan. 2002. "Why don't they just tell me straight, why allocate it?" The struggle to make sense of participating in a randomised controlled trial. Social science & medicine 55, 5 (2002), 709--719.
[17]
Mary Flanagan, Daniel C Howe, and Helen Nissenbaum. 2008. Embodying values in technology: Theory and practice. Information technology and moral philosophy 322 (2008).
[18]
Cambodian Center for Independent Media. 2017. Challenges for Independent Media. (2017). https://www.ccimcambodia.org/wp-content/uploads/2018/02/Challenges-for-Independent-Media-2017-English.pdf
[19]
Tarleton Gillespie. 2010. The politics of platforms. New media & society 12, 3 (2010), 347--364.
[20]
Tarleton Gillespie. 2018. Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media. Yale University Press.
[21]
Donna Haraway. 1988. Situated knowledges: The science question in feminism and the privilege of partial perspective. Feminist studies 14, 3 (1988), 575--599.
[22]
Franklin E Huffman. 1970. Cambodian system of writing and beginning reader with drills and glossary. Vol. 13. Adam Wood.
[23]
Geeks in Cambodia. 2018. Cambodia's 2018 Social Media and Digital Statistics. (2018). http://geeksincambodia.com/ cambodias-2018-social-media-digital-statistics/
[24]
Lilly Irani, Janet Vertesi, Paul Dourish, Kavita Philip, and Rebecca E Grinter. 2010. Postcolonial computing: a lens on design and development. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 1311--1320.
[25]
Margaret Jack, Jay Chen, and Steven J Jackson. 2017. Infrastructure as creative action: Online buying, selling, and delivery in Phnom Penh. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 6511--6522.
[26]
Haiyan Jia, Pamela J Wisniewski, Heng Xu, Mary Beth Rosson, and John M Carroll. 2015. Risk-taking as a learning process for shaping teen's online information privacy behaviors. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM, 583--599.
[27]
Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. My Data Just Goes Everywhere: User Mental Models of the Internet and Implications for Privacy and Security. In Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015). 39--52.
[28]
Meta Kong. 2018. Crash kills four staffers of NGO. Phnom Penh Post (2018). https://www.phnompenhpost.com/national/crash-kills-four-staffers-ngo
[29]
Buth Reaksmey Kongkea. 2017. Monk accused in sex scandal. The Khmer Times (2017). https://www.khmertimeskh. com/88786/monk-accused-sex-scandal/
[30]
Derek Lackaff and William J Moner. 2016. Local languages, global networks: Mobile design for minority language users. In Proceedings of the 34th ACM International Conference on the Design of Communication. ACM, 14.
[31]
Brian Larkin. 2008. Signal and noise: media, infrastructure, and urban culture in Nigeria. Duke University Press.
[32]
Karen Levy, Lauren Kilgour, and Clara Berridge. 2018. Regulating privacy in public/private space: The Case of Nursing Home Monitoring Laws. (2018).
[33]
Silvia Lindtner. 2015. Hacking with Chinese characteristics: The promises of the maker movement against China's manufacturing culture. Science, Technology, & Human Values 40, 5 (2015), 854--879.
[34]
Silvia Lindtner, Ken Anderson, and Paul Dourish. 2012. Cultural appropriation: information technologies as sites of transnational imagination. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work. ACM, 77--86.
[35]
Alex John London. 2000. The ambiguity and the exigency: clarifying 'standard of care' arguments in international research. The Journal of medicine and philosophy 25, 4 (2000), 379--397.
[36]
Mary Madden, Michele Gilman, Karen Levy, and Alice Marwick. 2017. Privacy, poverty, and Big Data: A matrix of vulnerabilities for poor Americans. Wash. UL Rev. 95 (2017), 53.
[37]
Dara Mech and Ananth Baliga. 2017. Death of democracy: CNRP dissolved by Supreme Court ruling. The Phnom Penh Post (2017). https://www.phnompenhpost.com/national-post-depth-politics/death-democracy-cnrp-dissolved-supreme-court-ruling
[38]
Daniel Miller. 2011. Tales from facebook. Polity.
[39]
Rudolf Mrázek. 2018. Engineers of happy land: Technology and nationalism in a colony. Princeton University Press.
[40]
Lilly U Nguyen. 2018. "This is not who we are": Freedom as Moral Affect and the Whiteness of Mutuality. Catalyst: Feminism, Theory, Technoscience 4, 1 (2018).
[41]
Michael LaForgia Nicholas Confessore and Gabriel J.X. Dance. 2018. Facebook's Data Sharing and Privacy Rules: 5 Takeaways From Our Investigation. The New York Times (2018). https://www.nytimes.com/2018/12/18/us/politics/facebook-data-sharing-deals.html
[42]
Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.
[43]
Helen Nissenbaum. 2011. A contextual approach to privacy online. Daedalus 140, 4 (2011), 32--48.
[44]
Leysia Palen and Paul Dourish. 2003. Unpacking privacy for a networked world. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 129--136.
[45]
Cassie Quigley, Alandeom W Oliviera, Alastair Curry, and Gayle Buck. 2011. Issues and techniques in translating scientific terms from English to Khmer for a university-level text in Cambodia. Language, Culture and Curriculum 24, 2 (2011), 159--177.
[46]
Reuters. 2018. Cambodia blocks some independent news media sites: rights group. (2018). https://www.reuters.com/article/us-cambodia-election-censorship/ cambodia-blocks-some-independent-news-media-sites-rights-group-idUSKBN1KH29Q
[47]
Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gaytán-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. 2018. "Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones byWomen in South Asia. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 127--142.
[48]
Nithya Sambasivan, Ed Cutrell, Kentaro Toyama, and Bonnie Nardi. 2010. Intermediated technology use in developing communities. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2583--2592.
[49]
Adam Satariano. 2018. G.D.P.R., a New Privacy Law, Makes Europe World's Leading Tech Watchdog. The New York Times (2018). https://www.nytimes.com/2018/05/24/technology/europe-gdpr-privacy.html
[50]
Daniel J Solove. 2005. A taxonomy of privacy. U. Pa. L. Rev. 154 (2005), 477.
[51]
Janaki Srinivasan, Savita Bailur, Emrys Schoemaker, and Sarita Seshagiri. 2018. Privacy at the margins| The poverty of privacy: Understanding privacy trade-offs from identity infrastructure users in India. International Journal of Communication 12 (2018), 20.
[52]
Sharifa Sultana, François Guimbretière, Phoebe Sengers, and Nicola Dell. 2018. Design within a patriarchal society: Opportunities and challenges in designing for rural women in bangladesh. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 536.
[53]
UNESCO. 2019. UNESCO Literacy Profile Cambodia. (2019). http://www.unesco.org/new/en/phnompenh/education/ learning-throughout-life/literacy/
[54]
Siva Vaidhyanathan. 2018. Antisocial media: How Facebook disconnects us and undermines democracy. Oxford University Press.
[55]
Aditya Vashistha, Richard Anderson, and Shrirang Mare. 2018. Examining security and privacy research in developing regions. In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies. ACM, 25.
[56]
Mun Vong and Kimhean Hok. 2018. Facebooking: Youth's everyday politics in Cambodia. South East Asia Research 26, 3 (2018), 219--234.
[57]
Langdon Winner. 1980. Do artifacts have politics? Daedalus (1980), 121--136.
[58]
Pamela Wisniewski, Haiyan Jia, Heng Xu, Mary Beth Rosson, and John M Carroll. 2015. Preventative vs. reactive: How parental mediation influences teens' social media privacy behaviors. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM, 302--316.
[59]
Pamela J Wisniewski, Heng Xu, Mary Beth Rosson, and John M Carroll. 2014. Adolescent online safety: the moral of the story. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. ACM, 1258--1271.
[60]
Reporters without Borders. 2017. Cambodia: The Independent Press in Ruins. (2017). https://rsf.org/sites/default/files/cambodia_report_eng.pdf
[61]
Mike Z Yao and Jinguang Zhang. 2008. Predicting user concerns about online privacy in Hong Kong. CyberPsychology & Behavior 11, 6 (2008), 779--781.

Cited By

View all
  • (2024)The Court Speaks, But Who Listens? Automated Compliance Review of the GDPRSSRN Electronic Journal10.2139/ssrn.4709913Online publication date: 2024
  • (2024)Exploring Social Media Privacy Concerns: A Comprehensive Survey Study Across 16 Middle Eastern and North African CountriesIEEE Access10.1109/ACCESS.2024.346386912(147087-147105)Online publication date: 2024
  • (2023)Localised Trust in a Globalised Knot: Designing Information Privacy for Digital-IDACM Journal on Computing and Sustainable Societies10.1145/36160242:1(1-37)Online publication date: 16-Aug-2023
  • Show More Cited By

Index Terms

  1. "Privacy is not a concept, but a way of dealing with life": Localization of Transnational Technology Platforms and Liminal Privacy Practices in Cambodia

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Proceedings of the ACM on Human-Computer Interaction
      Proceedings of the ACM on Human-Computer Interaction  Volume 3, Issue CSCW
      November 2019
      5026 pages
      EISSN:2573-0142
      DOI:10.1145/3371885
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 November 2019
      Published in PACMHCI Volume 3, Issue CSCW

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. HCI4D
      2. ICTD
      3. cambodia
      4. privacy
      5. transnational computing

      Qualifiers

      • Research-article

      Funding Sources

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)175
      • Downloads (Last 6 weeks)40
      Reflects downloads up to 22 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)The Court Speaks, But Who Listens? Automated Compliance Review of the GDPRSSRN Electronic Journal10.2139/ssrn.4709913Online publication date: 2024
      • (2024)Exploring Social Media Privacy Concerns: A Comprehensive Survey Study Across 16 Middle Eastern and North African CountriesIEEE Access10.1109/ACCESS.2024.346386912(147087-147105)Online publication date: 2024
      • (2023)Localised Trust in a Globalised Knot: Designing Information Privacy for Digital-IDACM Journal on Computing and Sustainable Societies10.1145/36160242:1(1-37)Online publication date: 16-Aug-2023
      • (2023)Trends in Privacy Dialog Design after the GDPR: The Impact of Industry and Government ActionsProceedings of the 22nd Workshop on Privacy in the Electronic Society10.1145/3603216.3624963(107-121)Online publication date: 26-Nov-2023
      • (2023)"In Eighty Percent of the Cases, I Select the Password for Them": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179410(570-587)Online publication date: May-2023
      • (2022)Privacy Research with Marginalized GroupsProceedings of the ACM on Human-Computer Interaction10.1145/35555566:CSCW2(1-33)Online publication date: 11-Nov-2022
      • (2022)Sophistication with Limitation: Understanding Smartphone Usage by Emergent Users in IndiaProceedings of the 5th ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies10.1145/3530190.3534824(386-400)Online publication date: 29-Jun-2022
      • (2022)SoK: A Framework for Unifying At-Risk User Research2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833643(2344-2360)Online publication date: May-2022
      • (2021)Powerful Privacy Norms in Social Network DiscourseProceedings of the ACM on Human-Computer Interaction10.1145/34795655:CSCW2(1-27)Online publication date: 18-Oct-2021
      • (2021)Difficulties of Measuring Culture in Privacy StudiesProceedings of the ACM on Human-Computer Interaction10.1145/34795225:CSCW2(1-26)Online publication date: 18-Oct-2021
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Full Access

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media