Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh

Published: 06 December 2017 Publication History

Abstract

Prior research on technology use in the Global South suggests that people in marginalized communities frequently share a single device among multiple individuals. However, the data privacy challenges and tensions that arise when people share devices have not been studied in depth. This paper presents a qualitative study with 72 participants that analyzes how families in Bangladesh currently share mobile phones, their usage patterns, and the tensions and challenges that arise as individuals seek to protect the privacy of their personal data. We show how people share devices out of economic need, but also because sharing is a social and cultural practice that is deeply embedded in Bangladeshi society. We also discuss how prevalent power relationships affect sharing practices and reveal gender dynamics that impact the privacy of women's data. Finally, we highlight strategies that participants adopted to protect their private data from the people with whom they share devices. Taken together, our findings have broad implications that advance the CSCW community's understanding of digital privacy outside the Western world.

References

[1]
Norah Abokhodair. 2015. Transmigrant Saudi Arabian Youth and Social Media: Privacy, Intimacy and Freedom of Expression. ACM, 187--190.
[2]
Norah Abokhodair and Sarah Vieweg. 2016. Privacy & Social Media in the Context of the Arab Gulf Proc. Conference on Designing Interactive Systems. ACM, 672--683.
[3]
Syed Ishtiaque Ahmed, Nova Ahmed, Faheem Hussain, and Neha Kumar. 2016 a. Computing Beyond Gender-imposed Limits. In Proc. LIMITS'16. ACM, Article No. 6.
[4]
Syed Ishtiaque Ahmed, Shion Guha, Md. Rashidujjaman Rifat, Md. Foysal Hossain, and Nicola Dell. 2016 b. Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh. In Proc. ICTD'16. ACM, Article No. 11.
[5]
Syed Ishtiaque Ahmed, Md. Romael Hoque, Shion Guha, Md. Rashidujjaman Rifat, and Nicola Dell. 2017. Privacy, Security, and Surveillance in the Global South: A Study of Biometric Mobile SIM Registration in Bangladesh. In Proc. CHI'17. ACM.
[6]
Syed Ishtiaque Ahmed, Steven J Jackson, Nova Ahmed, Hasan Shahid Ferdous, Md. Rashidujjaman Rifat, A. S. M. Rizvi, Shamir Ahmed, and Rifat Sabbir Mansur. 2014. Protibadi: A Platform for Fighting Sexual Harassment in Urban Bangladesh Proc. CHI'14. ACM, 2695--2704.
[7]
Syed Ishtiaque Ahmed, Steven J Jackson, Maruf Zaber, Mehrab Bin Morshed, Md. Habibullah Bin Ismail, and Shamim Afrose. 2013. Ecologies of Use and Design: Individual and Social Uses of Mobile Phones Within Low-Literate Rickshaw-Puller Communities in Urban Bangladesh Proc. DEV-4. ACM, 14:1--14:10.
[8]
Syed Ishtiaque Ahmed, Nusrat Jahan Mim, and Steven J Jackson. 2015 a. Residual Mobilities: Infrastructural Displacement and Post-Colonial Computing in Bangladesh Proc. CHI'15. ACM, 437--446.
[9]
Syed Ishtiaque Ahmed, Maruf Zaber, Mehrab Bin Morshed, Md. Habibullah Bin Ismail, Dan Cosley, and Steven J Jackson. 2015 b. Suhrid: A Collaborative Mobile Phone Interface for Low Literate People Proc. DEV'15. ACM, 95--103.
[10]
Android Central. 2017. Lollipop Brings Proper Multi-user Accounts to Your Phone. https://www.androidcentral.com/lollipop-brings-proper-multi-user-accounts-your-phone. (2017). {Online; accessed July 10, 2017}.
[11]
Thierry Bardini and August T. Horvath. 1995. The Social Construction of the Personal Computer User. Journal of Communication Vol. 45, 3 (1995), 40--66.
[12]
Shaowen Bardwell. 2010. Feminist HCI: Taking Stock and Outlining an Agenda for Design Proc. CHI'10. ACM, 1301--1310.
[13]
Shaowen Bardwell and Jeffrey Bardzell. 2011. Towards a Feminist HCI Methodology: Social Science, Feminism, and HCI Proc. CHI'11. ACM, 675--684.
[14]
Yahel Ben-David, Shaddi Hasan, Joyojeet Pal, Matthias Vallentin, Saurabh Panjwani, Philipp Gutheim, Jay Chen, and Eric A. Brewer. 2011. Computing Security in the Developing World: A Case for Multidisciplinary Research Proc NSDR'11. ACM, New York, NY, USA, 39--44.
[15]
Seyla Benhabib. 2002. The Claims of Culture: Equality and Diversity in the Global Era. Princeton University Press.
[16]
Jenna Burrell. 2010. Evaluating Shared Access: Social Equality and the Circulation of Mobile Phones in Rural Uganda. Journal of Computer Mediated Communication Vol. 15, 2 (2010), 230--250.
[17]
Jay Chen, Michael Paik, and Kelly McCabe. 2014. Exploring Internet Security Perceptions and Practices in Urban Ghana Proc. SOUPS'14. 129--142.
[18]
Sonia Chiasson, Paul C van Oorschot, and Robert Biddle. 2007. Graphical Password Authentication Using Cued Click Points Proc. Computer Security-ESORICS. 359--374.
[19]
Padma Chirumamilla and Joyojeet Pal. 2013. Play and Power: A Ludic Design Proposal for ICTD Proc. ICTD'13. ACM, 25--33.
[20]
Hichang Cho and Anna Filippova. 2016. Networked Privacy Management in Facebook: A Mixed-methods and Multinational Study Proc. CSCW'16. ACM, 503--514.
[21]
Julie E. Cohen. 2012. What Privacy is For. Harvard Law Review Vol. 125 (2012), 1904.
[22]
Raymundo Cornejo, Robin Brewer, Caroline Edasis, and Anne Marie Piper. 2016. Vulnerability, Sharing, and Privacy: Analyzing Art Therapy for Older Adults with Dementia Proc. CSCW'16. ACM, 1572--1583.
[23]
Andy Crabtree, Peter Tolmie, and Will Knight. 2017. Repacking "Privacy" for a Networked World. Proc. CSCW'17, 1--36.
[24]
Lorrie F Cranor and Simson Garfinkel. 2004. Guest Editors' Introduction: Secure or Usable? IEEE Security & Privacy Vol. 2, 5 (2004), 16--18.
[25]
Nicola Dell, Trevor Perrier, Neha Kumar, Mitchell Lee, Rachel Powers, and Gaetano Borriello. 2015. Digital Workflows in Global Development Organizations Proc. CSCW'15. ACM, 1659--1669.
[26]
Paul Dourish and Leysia Palen. 2003. Unpacking Privacy for a Networked World. In Proc. CHI'03. ACM, 129--136.
[27]
Casey Fiesler, Michaelanne Dye, Jessica L Feuston, Chaya Hiruncharoenvate, Clayton J Hutto, Shannon Morrison, Parisa Khanipour Roshan, Umashanthi Pavalanathan, Amy S Bruckman, Munmun De Choudhury, et almbox. 2017. What (or Who) Is Public?: Privacy Settings and Social Media Content Sharing Proc. CSCW'17. 567--580.
[28]
Ralph Gross and Alessandro Acquisti. 2005. Information Revelation and Privacy in Online Social Networks Proc. Workshop on Privacy in the Electronic Society. ACM, 71--80.
[29]
Jürgen Habermas. 1991. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. MIT Press.
[30]
Richard Heeks. 2012. IT Innovation for the Bottom of the Pyramid. Commun. ACM Vol. 55, 12 (2012), 24--27.
[31]
Geert Hofstede. 1984. The Cultural Relativity of the Quality of Life Concept. Academy of Management Review Vol. 9, 3 (1984), 389--398.
[32]
Roberto Hoyle, Srijita Das, Apu Kapadia, Adam J Lee, and Kami Vaniea. 2017. Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks Proc. CSCW'17. 555--566.
[33]
Faheem Hussain and Mashiat Mostafa. 2016. Digital Contradictions in Bangladesh: Encouragement and Deterrence of Citizen Engagement via ICTs. Information Technologies & International Development, Vol. 12, 2 (2016), 47.
[34]
Lilly Irani, Janet Vertesi, Paul Dourish, Kavita Philip, and Rebecca E Grinter. 2012. Postcolonial Computing: A Lens on Design and Development Proc. CHI'10. ACM, 1311--1320.
[35]
Steven J Jackson and Laewoo Kang. 2014. Breakdown, Obsolescence, and Reuse: HCI and the Art of Repair Proc. CHI'14.
[36]
Steven J Jackson, Alex Pompe, and Gabriel Krieshok. 2011. Things Fall Apart: Maintenance, Repair, and Technology for Education Initiatives in Rural Namibia. In Proc. iConference'11. 83--90.
[37]
Haiyan Jia, Pamela J Wisniewski, Heng Xu, Mary Beth Rosson, and John M Carroll. 2015. Risk-taking as a Learning Process for Shaping Teen's Online Information Privacy Behaviors Proc. CSCW'15. ACM, 583--599.
[38]
Gopinaath Kannabiran. 2014. Ecofeminism and Sustainable HCI. In Companion Proc. DIS'14. ACM, 185--190.
[39]
Naveena Karusala and Neha Kumar. 2017. Women's Safety in Public Spaces: Examining the Efficacy of Panic Buttons in New Delhi Proc. CHI'17. ACM, 3340--3351.
[40]
Neha Kumar. 2011. The Gender-technology Divide or Perceptions of Non-use? First Monday Vol. 11 (2011).
[41]
Priya Kumar and Sarita Schoenebeck. 2015. The Modern Day Baby Book: Enacting Good Mothering and stewarding Privacy on Facebook Proc. CSCW'15. ACM, 1302--1312.
[42]
Ponnurangam Kumaraguru and Lorrie F Cranor. 2006. Privacy in India: Attitudes and Awareness. Privacy Enhancing Technologies (2006), 243--258.
[43]
Carolyn A Lin. 1998. Exploring Personal Computer Adoption Dynamics. Journal of Broadcasting & Electronic Media, Vol. 42, 1 (1998), 95--112.
[44]
Silvia Lindtner, Bonnie Nardi, Yang Wang, Scott Mainwaring, He Jing, and Wenjing Liang. 2008. Emerging Sites of HCI Innovation: Hackerspaces, Hardware Startups and Incubators Proc. CSCW'08. ACM, 371--382.
[45]
Heather R Lipford, Gordon Hull, Celine Latulipe, Andrew Besmer, and Jason Watson. 2009. Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites Proc. CSE'09, Vol. Vol. 4. IEEE, 985--989.
[46]
Jane Mansbridge. 1983. Beyond Adversary Democracy. University of Chicago Press.
[47]
Tamir Mendel and Eran Toch. 2017. Susceptibility to Social Influence of Privacy Behaviors: Peer versus Authoritative Sources Proc. CSCW'17. ACM, 581--593.
[48]
Mehrab Bin Morshed, Michaelanne Dye, Syed Ishtiaque Ahmed, and Neha Kumar. 2017. When the Internet Goes Down in Bangladesh. In CSCW. 1591--1604.
[49]
Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Wash L. Rev, Vol. 79, 119 (2004).
[50]
Helen Nissenbaum. 2015. Obfuscation: A User's Guide for Privacy and Protest. MIT Press. https://mitpress.mit.edu/books/obfuscation
[51]
Tapan S Parikh and Koushik Ghosh. 2006. Understanding and Designing for Intermediated Information Tasks in India. IEEE Pervasive Computing Vol. 5, 2 (2006), 32--39.
[52]
Andrew Patrick and Steve Kenny. 2003. From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-computer Interactions. In Privacy Enhancing Technologies. Springer, 107--124.
[53]
Jennifer A Rode. 2011. A Theoretical Agenda for Feminist HCI. Interacting with Computers Vol. 23, 5 (2011), 393--400.
[54]
Norman Sadeh, Jason Hong, Lorrie F Cranor, Ian Fette, Patrick Kelley, Madhu Prabakar, and Jinghai Rao. 2009. Understanding and Capturing People's Privacy Policies in a Mobile Social Networking Application. Personal and Ubiquitous Computing Vol. 13, 6 (2009), 401--412.
[55]
Nithya Sambasivan, Ed Cutrell, Kentaro Toyama, and Bonnie Nardi. 2010. Intermediated Technology Use in Developing Communities Proc. CHI'10. ACM, 2583--2592.
[56]
Ferdinand David Schoeman. 1984. Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press.
[57]
Amartya Sen. 1999. Development as Freedom. Oxford University Press.
[58]
Claude E Shannon. 2001. A Mathematical Theory of Communication. ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 5, 1 (2001), 3--55.
[59]
Stephanie B. Steinhardt, Amanda Menking, Ingrid Erickson, Andrea Marshall, Asta Zelenkauskaite, and Jennifer Rode. 2015. Feminism and Feminist Approaches in Social Computing Proc ACM CSCW'15. ACM, 303--308.
[60]
Tech Crunch. 2017. Why Android Jelly Bean 4.2's Multiple User Account Switching Is Tablet-Only? (Hint: Nokia Patented It For Phones). https://techcrunch.com/2012/10/29/why-android-jelly-bean-4--2s-multiple-user-account-switching-is-tablet-only-hint-nokia-patented-it-for-phones. (2017). {Online; accessed July 10, 2017}.
[61]
David R Thomas. 2006. A General Inductive Approach for Analyzing Qualitative Evaluation Data. American Journal of Evaluation Vol. 27, 2 (2006), 237--246.
[62]
Ronald L Thompson, Christopher A Higgins, and Jane M Howell. 1991. Personal Computing: Toward a Conceptual Model of Utilization. MIS quarterly (1991), 125--143.
[63]
Peter Tolmie, Andy Crabtree, Tom Rodden, James Colley, and Ewa Luger. 2016. "This Has to Be the Cats": Personal Data Legibility in Networked Sensing Systems Proc. CSCW'16. ACM, 491--502.
[64]
Michalis Vitos, Julia Altenbuchner, Matthias Stevens, Gillian Conquest, Jerome Lewis, and Muki Haklay. 2017. Supporting Collaboration with Non-Literate Forest Communities in the Congo-Basin Proc. CSCW'17. 1576--1590.
[65]
Alan F Westin. 1968. Privacy and Freedom. Washington and Lee Law Review Vol. 25, 1 (1968), 166.
[66]
Pamela Wisniewski, AKM Islam, Bart P Knijnenburg, and Sameer Patil. 2015 a. Give social Network Users the Privacy They Want. Proc. CSCW'15. ACM, 1427--1441.
[67]
Pamela Wisniewski, Haiyan Jia, Heng Xu, Mary Beth Rosson, and John M Carroll. 2015 b. Preventative vs. Reactive: How Parental Mediation Influences Teens' Social Media Privacy Behaviors. In Proc. CSCW'15. ACM, 302--316.
[68]
Pamela J Wisniewski, Heng Xu, Mary Beth Rosson, and John M Carroll. 2014. Adolescent Online Safety: The Moral of the Story. Proc. CSCW'14. ACM, 1258--1271.
[69]
Susan P Wyche, Cliff Lampe, Nimmi Rangaswamy, Anicia Peters, Andrés Monroy-Hernández, and Judd Antin. 2014. Facebook in the Developing World: The Myths and Realities Underlying a Socially Networked World Proc. CSCW'14. ACM, 121--124.
[70]
Iris Marion Young. 2011. Justice and the Politics of Difference. Princeton University Press.
[71]
Bo Zhang and Heng Xu. 2016. Privacy Nudges for Mobile Applications: Effects on the Creepiness Emotion and Privacy Attitudes Proc. CSCW'16. ACM, 1676--1690.
[72]
Mary Ellen Zurko and Richard T Simon. 1996. User-centered Security. In Proc. Workshop on New Security Paradigms. ACM, 27--33.

Cited By

View all
  • (2025)“(Virtuous) Wives Don’t Have Anything to Hide”: Understanding Digital Privacy Perceptions and Behavior of Married Women in Rural IndiaSocial Media + Society10.1177/2056305125131366511:1Online publication date: 18-Jan-2025
  • (2025)Teens Online Behavior and Support Interventions in BangladeshACM Journal on Computing and Sustainable Societies10.1145/37048133:1(1-22)Online publication date: 31-Mar-2025
  • (2024)Understanding mobile use behavior, stigma and associated needs among female sex workers in Nepal: a qualitative studyFrontiers in Communication10.3389/fcomm.2024.12594639Online publication date: 1-Mar-2024
  • Show More Cited By

Index Terms

  1. Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Human-Computer Interaction
    Proceedings of the ACM on Human-Computer Interaction  Volume 1, Issue CSCW
    November 2017
    2095 pages
    EISSN:2573-0142
    DOI:10.1145/3171581
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 December 2017
    Published in PACMHCI Volume 1, Issue CSCW

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. access
    2. hci4d
    3. ictd
    4. mobile devices
    5. privacy
    6. shared use

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)140
    • Downloads (Last 6 weeks)16
    Reflects downloads up to 08 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)“(Virtuous) Wives Don’t Have Anything to Hide”: Understanding Digital Privacy Perceptions and Behavior of Married Women in Rural IndiaSocial Media + Society10.1177/2056305125131366511:1Online publication date: 18-Jan-2025
    • (2025)Teens Online Behavior and Support Interventions in BangladeshACM Journal on Computing and Sustainable Societies10.1145/37048133:1(1-22)Online publication date: 31-Mar-2025
    • (2024)Understanding mobile use behavior, stigma and associated needs among female sex workers in Nepal: a qualitative studyFrontiers in Communication10.3389/fcomm.2024.12594639Online publication date: 1-Mar-2024
    • (2024)The Politics of Fear and the Experience of Bangladeshi Religious Minority Communities Using Social Media PlatformsProceedings of the ACM on Human-Computer Interaction10.1145/36869268:CSCW2(1-32)Online publication date: 8-Nov-2024
    • (2024)'Women just have to accept it when the man wants it': An Investigation of the Practice of Forced Marriage and the Potential for Design InterventionsProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685371(1-14)Online publication date: 13-Oct-2024
    • (2024)Ghost Readers of the Nile: Decrypting Password Sharing Habits in Chatting Applications among Egyptian WomenProceedings of the ACM on Human-Computer Interaction10.1145/36765068:MHCI(1-43)Online publication date: 24-Sep-2024
    • (2024)eHealth Data Security and Privacy: Perspectives from Diverse Stakeholders in MalawiProceedings of the ACM on Human-Computer Interaction10.1145/36373238:CSCW1(1-26)Online publication date: 26-Apr-2024
    • (2024)"Things on the Ground are Different": Utility, Survival and Ethics in Multi-Device Ownership and Smartphone Sharing ContextsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642874(1-14)Online publication date: 11-May-2024
    • (2024)Hearing Community Voices in HCI4D: Establishing Safe Places to Co-Create Counter-Collective Narratives with Women Farmers in BangladeshProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642532(1-17)Online publication date: 11-May-2024
    • (2024)Exploring Social Media Privacy Concerns: A Comprehensive Survey Study Across 16 Middle Eastern and North African CountriesIEEE Access10.1109/ACCESS.2024.346386912(147087-147105)Online publication date: 2024
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media