Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2909609.2909661acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictdConference Proceedingsconference-collections
research-article

Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh

Published: 03 June 2016 Publication History

Abstract

This paper presents an analysis of the privacy issues associated with the practice of repairing broken digital objects in Bangladesh. Historically, research in Human-Computer Interaction (HCI), Information and Communication Technologies for Development (ICTD), and related disciplines has focused on the design and development of new interventions or technologies. As a result, the repair of old or broken technologies has been an often neglected topic of research. The goal of our work is to improve the practices surrounding the repair of digital artifacts in developing countries. Specifically, in this paper we examine the privacy challenges associated with the process of repairing digital artifacts, which usually requires that the owner of a broken artifact hand over the technology to a repairer. Findings from our ethnographic work conducted at 10 repair markets in Dhaka, Bangladesh, show a variety of ways in which the privacy of an individual's personal data may be compromised during the repair process. We also examine people's perceptions around privacy in repair and its connections with broader social and cultural values. Finally, we discuss the challenges and opportunities for future research to strengthen the repair ecosystem in developing countries. Taken together, our findings contribute to the growing discourse around post-use cycles of technology in ICTD and HCI.

References

[1]
Ahmed, S.I., Jackson, S.J., Ahmed, N., Ferdous, H.S., Rifat, M.R., Rizvi, A.S.M., Ahmed, S. and Mansur, R.S. 2014. Protibadi: A Platform for Fighting Sexual Harassment in Urban Bangladesh. In Proc. CHI'14 (2014), 2695--2704.
[2]
Ahmed, S.I., Jackson, S.J. and Rifat, M.R. 2015. Learning to fix: knowledge, collaboration and mobile phone repair in Dhaka, Bangladesh. In Proc. ICTD'15 (2015), 4:1--4:10.
[3]
Annas, G.J. 2003. HIPAA regulations-a new era of medical-record privacy? New England Journal of Medicine. 138, 15 (2003), 1486--1490.
[4]
Chiasson, S., van Oorschot, P.C. and Biddle, R. 2007. Graphical password authentication using cued click points. In Proc. Computer Security-ESORICS (2007), 359--374.
[5]
Chirumamilla, P. and Pal, J. Play and power: A ludic design proposal for ICTD. In Proc. ICTD'13 25--33.
[6]
Cranor, L.F. and Garfinkel, S. 2004. Guest Editors' Introduction: Secure or Usable? IEEE Security & Privacy. 2, 5 (2004), 16--18.
[7]
Diffie, W. and Hellman, M.E. 1976. New directions in cryptography. IEEE Transaction on Information Theory. 22, 6 (1976), 644--654.
[8]
Gross, R. and Acquisti, A. 2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (2005), 71--80.
[9]
Houston, L. 2014. Inventive Infrastructure: An Exploration of Mobile Phone. Lancaster University.
[10]
Irani, L., Vertesi, J., Dourish, P., Philip, K. and Grinter, R.E. Postcolonial computing: a lens on design and development. In Proc. CHI'10 1311--1320.
[11]
Jackson, S.J. 2013. Rethinking Repair. Media Meets Technology: Essays on Communication, Materiality and Society. T. Gillespie, P. Boczkowski, and K. Foot, eds. MIT Press.
[12]
Jackson, S.J., Ahmed, S.I. and Rifat, M.R. 2014. Learning, innovation, and sustainability among mobile phone repairers in Dhaka, Bangladesh. In Proc. DIS'14 (2014), 905--914.
[13]
Jackson, S.J. and Kang, L. 2014. Breakdown, Obsolescence, and Reuse: HCI and the Art of Repair. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Forthcoming, 2014).
[14]
Jackson, S.J., Pompe, A. and Krieshok, G. 2012. Repair worlds: maintenance, repair, and ICT for development in rural Namibia. In Proc. CSCW'12 (2012), 107--116.
[15]
Jackson, S.J., Pompe, A. and Krieshok, G. 2011. Things fall apart: maintenance, repair, and technology for education initiatives in rural Namibia. Proceedings of the 2011 iConference (2011), 83--90.
[16]
Kumaraguru, P. and Cranor, L.F. 2006. Privacy in India: Attitudes and awareness. Privacy Enhancing Technologies. (2006), 243--258.
[17]
Lepawsky, J. and Mather, C. 2011. From beginnings and endings to boundaries and edges: rethinking circulation and exchange through electronic waste. Area. 43, 3 (2011), 242--249.
[18]
Lipford, H.R., Hull, G., Latulipe, C., Besmer, A. and Watson, J. Visible flows: Contextual integrity and the design of privacy mechanisms on social network sites. In Computational Science and Engineering, 2009. CSE'09. International Conference 985--989.
[19]
Mao, W. 2003. Modern cryptography: theory and practice. Prentice Hall Professional Technical References.
[20]
Nissenbaum, H. 2004. Privacy as contextual integrity. 79, 1 (2004).
[21]
O'Donnell, M.L. 2002. FERPA: Only a piece of the privacy puzzle. JC & UL. 29, (2002), 679.
[22]
Orr, J.E. 1996. Talking about machines: An ethnography of a modern job. Cornell University Press.
[23]
Palen, L. and Dourish, P. 2003. Unpacking privacy for a networked world. In Proc. CHI'03 (2003), 129--136.
[24]
Raleigh, W.J. 1988. Attorney-Client Privileges. Barrister. 15, (1988), 49.
[25]
Sadeh, N., Hong, J., Cranor, L.F., Fette, I., Kelley, P., Prabakar, M. and Rao, J. 2009. Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing. 13, 6 (2009), 401--412.
[26]
Sen, A. 1999. Development as freedom. Oxford University Press.
[27]
Shannon, C.E. 2001. A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review. 5, 1 (2001), 3--55.
[28]
Suchman, L. 2007. Human-machine reconfigurations: Plans and situated actions. Cambridge University Press.
[29]
Warren, S.D. and Brandeis, L.D. 1890. The right to privacy. Harvard Law Review. (1890), 193--220.
[30]
Westin, A.F. 1968. Privacy and Freedom. Washington and Lee Law Review. 25, 1 (1968), 166.
[31]
Widmer, R., Oswald-Krapf, H., Sinha-Khetriwal, D., Schnellmann, M. and Böni, H. 2005. Global perspectives on e-waste. Environmental impact assesment review. 25, 5 (2005), 436--458.
[32]
Zurco, M.E. and Simson, R.T. 1996. User-centered security. In Proceedings of the 1996 workshop on New security paradigms (1996), 27--33.
[33]
2015. Child pornography found during laptop repair leads to arrest, charges. CTV News Winnipeg http://winnipeg.ctvnews.ca/child-pornography-found-during-laptop-repair-leads-to-arrest-charges-1.2548589.
[34]
Encrypt or decrypt a folder or file. Microsoft http://windows.microsoft.com/en-us/windows/encrypt-decrypt-folder-file#1TC=windows-7.

Cited By

View all
  • (2024)Exploration of User Perspectives around Software and Data-Related Challenges Associated with IoT Repair and Maintenance against Obsolescence: User Study on Software and Data Interactions and Considerations for IoT Repair and Maintenance against ObsolescenceProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685383(1-17)Online publication date: 13-Oct-2024
  • (2024)eKichabi v2: Designing and Scaling a Dual-Platform Agricultural Technology in Rural TanzaniaProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642099(1-16)Online publication date: 11-May-2024
  • (2024)Computing and the Stigmatized: Trust, Surveillance, and Spatial Politics with the Sex Workers in BangladeshProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642005(1-22)Online publication date: 11-May-2024
  • Show More Cited By

Index Terms

  1. Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICTD '16: Proceedings of the Eighth International Conference on Information and Communication Technologies and Development
    June 2016
    427 pages
    ISBN:9781450343060
    DOI:10.1145/2909609
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    In-Cooperation

    • Google Inc.
    • Microsoft: Microsoft
    • University of Michigan: University of Michigan

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 June 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Bangladesh
    2. DEV
    3. ICTD
    4. Repair
    5. developing country
    6. privacy

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICTD '16

    Acceptance Rates

    Overall Acceptance Rate 22 of 116 submissions, 19%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)46
    • Downloads (Last 6 weeks)11
    Reflects downloads up to 08 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Exploration of User Perspectives around Software and Data-Related Challenges Associated with IoT Repair and Maintenance against Obsolescence: User Study on Software and Data Interactions and Considerations for IoT Repair and Maintenance against ObsolescenceProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685383(1-17)Online publication date: 13-Oct-2024
    • (2024)eKichabi v2: Designing and Scaling a Dual-Platform Agricultural Technology in Rural TanzaniaProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642099(1-16)Online publication date: 11-May-2024
    • (2024)Computing and the Stigmatized: Trust, Surveillance, and Spatial Politics with the Sex Workers in BangladeshProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642005(1-22)Online publication date: 11-May-2024
    • (2024)User-Centred Repair: From Current Practices to Future DesignDistributed, Ambient and Pervasive Interactions10.1007/978-3-031-59988-0_4(52-71)Online publication date: 1-Jun-2024
    • (2023)A First Look into Software Security Practices in BangladeshACM Journal on Computing and Sustainable Societies10.1145/36163831:1(1-24)Online publication date: 22-Sep-2023
    • (2023)A Deep Dive into User's Preferences and Behavior around Mobile Phone SharingProceedings of the ACM on Human-Computer Interaction10.1145/35795957:CSCW1(1-22)Online publication date: 16-Apr-2023
    • (2023)No Privacy in the Electronics Repair Industry2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179413(3347-3364)Online publication date: May-2023
    • (2022)Commissioning Development: Grantmaking, Community Voices, and their Implications for ICTDProceedings of the 2022 International Conference on Information and Communication Technologies and Development10.1145/3572334.3572402(1-18)Online publication date: 27-Jun-2022
    • (2022)"Kabootar": Towards Informal, Trustworthy, and Community-Based FinTech for Marginalized ImmigrantsProceedings of the ACM on Human-Computer Interaction10.1145/35551096:CSCW2(1-32)Online publication date: 11-Nov-2022
    • (2022)The Role of Intermediaries, Terrorist Assemblage, and Re-skilling in the Adoption of Cashless Transaction Systems in BangladeshProceedings of the 5th ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies10.1145/3530190.3534810(266-279)Online publication date: 29-Jun-2022
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media