skip to main content
research-article

Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh

Published:06 December 2017Publication History
Skip Abstract Section

Abstract

Prior research on technology use in the Global South suggests that people in marginalized communities frequently share a single device among multiple individuals. However, the data privacy challenges and tensions that arise when people share devices have not been studied in depth. This paper presents a qualitative study with 72 participants that analyzes how families in Bangladesh currently share mobile phones, their usage patterns, and the tensions and challenges that arise as individuals seek to protect the privacy of their personal data. We show how people share devices out of economic need, but also because sharing is a social and cultural practice that is deeply embedded in Bangladeshi society. We also discuss how prevalent power relationships affect sharing practices and reveal gender dynamics that impact the privacy of women's data. Finally, we highlight strategies that participants adopted to protect their private data from the people with whom they share devices. Taken together, our findings have broad implications that advance the CSCW community's understanding of digital privacy outside the Western world.

References

  1. Norah Abokhodair. 2015. Transmigrant Saudi Arabian Youth and Social Media: Privacy, Intimacy and Freedom of Expression. ACM, 187--190. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Norah Abokhodair and Sarah Vieweg. 2016. Privacy & Social Media in the Context of the Arab Gulf Proc. Conference on Designing Interactive Systems. ACM, 672--683. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Syed Ishtiaque Ahmed, Nova Ahmed, Faheem Hussain, and Neha Kumar. 2016 a. Computing Beyond Gender-imposed Limits. In Proc. LIMITS'16. ACM, Article No. 6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Syed Ishtiaque Ahmed, Shion Guha, Md. Rashidujjaman Rifat, Md. Foysal Hossain, and Nicola Dell. 2016 b. Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh. In Proc. ICTD'16. ACM, Article No. 11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Syed Ishtiaque Ahmed, Md. Romael Hoque, Shion Guha, Md. Rashidujjaman Rifat, and Nicola Dell. 2017. Privacy, Security, and Surveillance in the Global South: A Study of Biometric Mobile SIM Registration in Bangladesh. In Proc. CHI'17. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Syed Ishtiaque Ahmed, Steven J Jackson, Nova Ahmed, Hasan Shahid Ferdous, Md. Rashidujjaman Rifat, A. S. M. Rizvi, Shamir Ahmed, and Rifat Sabbir Mansur. 2014. Protibadi: A Platform for Fighting Sexual Harassment in Urban Bangladesh Proc. CHI'14. ACM, 2695--2704. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Syed Ishtiaque Ahmed, Steven J Jackson, Maruf Zaber, Mehrab Bin Morshed, Md. Habibullah Bin Ismail, and Shamim Afrose. 2013. Ecologies of Use and Design: Individual and Social Uses of Mobile Phones Within Low-Literate Rickshaw-Puller Communities in Urban Bangladesh Proc. DEV-4. ACM, 14:1--14:10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Syed Ishtiaque Ahmed, Nusrat Jahan Mim, and Steven J Jackson. 2015 a. Residual Mobilities: Infrastructural Displacement and Post-Colonial Computing in Bangladesh Proc. CHI'15. ACM, 437--446. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Syed Ishtiaque Ahmed, Maruf Zaber, Mehrab Bin Morshed, Md. Habibullah Bin Ismail, Dan Cosley, and Steven J Jackson. 2015 b. Suhrid: A Collaborative Mobile Phone Interface for Low Literate People Proc. DEV'15. ACM, 95--103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Android Central. 2017. Lollipop Brings Proper Multi-user Accounts to Your Phone. https://www.androidcentral.com/lollipop-brings-proper-multi-user-accounts-your-phone. (2017). {Online; accessed July 10, 2017}.Google ScholarGoogle Scholar
  11. Thierry Bardini and August T. Horvath. 1995. The Social Construction of the Personal Computer User. Journal of Communication Vol. 45, 3 (1995), 40--66.Google ScholarGoogle ScholarCross RefCross Ref
  12. Shaowen Bardwell. 2010. Feminist HCI: Taking Stock and Outlining an Agenda for Design Proc. CHI'10. ACM, 1301--1310. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Shaowen Bardwell and Jeffrey Bardzell. 2011. Towards a Feminist HCI Methodology: Social Science, Feminism, and HCI Proc. CHI'11. ACM, 675--684. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Yahel Ben-David, Shaddi Hasan, Joyojeet Pal, Matthias Vallentin, Saurabh Panjwani, Philipp Gutheim, Jay Chen, and Eric A. Brewer. 2011. Computing Security in the Developing World: A Case for Multidisciplinary Research Proc NSDR'11. ACM, New York, NY, USA, 39--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Seyla Benhabib. 2002. The Claims of Culture: Equality and Diversity in the Global Era. Princeton University Press.Google ScholarGoogle Scholar
  16. Jenna Burrell. 2010. Evaluating Shared Access: Social Equality and the Circulation of Mobile Phones in Rural Uganda. Journal of Computer Mediated Communication Vol. 15, 2 (2010), 230--250.Google ScholarGoogle ScholarCross RefCross Ref
  17. Jay Chen, Michael Paik, and Kelly McCabe. 2014. Exploring Internet Security Perceptions and Practices in Urban Ghana Proc. SOUPS'14. 129--142.Google ScholarGoogle Scholar
  18. Sonia Chiasson, Paul C van Oorschot, and Robert Biddle. 2007. Graphical Password Authentication Using Cued Click Points Proc. Computer Security-ESORICS. 359--374. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Padma Chirumamilla and Joyojeet Pal. 2013. Play and Power: A Ludic Design Proposal for ICTD Proc. ICTD'13. ACM, 25--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Hichang Cho and Anna Filippova. 2016. Networked Privacy Management in Facebook: A Mixed-methods and Multinational Study Proc. CSCW'16. ACM, 503--514. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Julie E. Cohen. 2012. What Privacy is For. Harvard Law Review Vol. 125 (2012), 1904.Google ScholarGoogle Scholar
  22. Raymundo Cornejo, Robin Brewer, Caroline Edasis, and Anne Marie Piper. 2016. Vulnerability, Sharing, and Privacy: Analyzing Art Therapy for Older Adults with Dementia Proc. CSCW'16. ACM, 1572--1583. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Andy Crabtree, Peter Tolmie, and Will Knight. 2017. Repacking "Privacy" for a Networked World. Proc. CSCW'17, 1--36.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Lorrie F Cranor and Simson Garfinkel. 2004. Guest Editors' Introduction: Secure or Usable? IEEE Security & Privacy Vol. 2, 5 (2004), 16--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Nicola Dell, Trevor Perrier, Neha Kumar, Mitchell Lee, Rachel Powers, and Gaetano Borriello. 2015. Digital Workflows in Global Development Organizations Proc. CSCW'15. ACM, 1659--1669. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Paul Dourish and Leysia Palen. 2003. Unpacking Privacy for a Networked World. In Proc. CHI'03. ACM, 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Casey Fiesler, Michaelanne Dye, Jessica L Feuston, Chaya Hiruncharoenvate, Clayton J Hutto, Shannon Morrison, Parisa Khanipour Roshan, Umashanthi Pavalanathan, Amy S Bruckman, Munmun De Choudhury, et almbox. 2017. What (or Who) Is Public?: Privacy Settings and Social Media Content Sharing Proc. CSCW'17. 567--580. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Ralph Gross and Alessandro Acquisti. 2005. Information Revelation and Privacy in Online Social Networks Proc. Workshop on Privacy in the Electronic Society. ACM, 71--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Jürgen Habermas. 1991. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. MIT Press.Google ScholarGoogle Scholar
  30. Richard Heeks. 2012. IT Innovation for the Bottom of the Pyramid. Commun. ACM Vol. 55, 12 (2012), 24--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Geert Hofstede. 1984. The Cultural Relativity of the Quality of Life Concept. Academy of Management Review Vol. 9, 3 (1984), 389--398.Google ScholarGoogle ScholarCross RefCross Ref
  32. Roberto Hoyle, Srijita Das, Apu Kapadia, Adam J Lee, and Kami Vaniea. 2017. Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks Proc. CSCW'17. 555--566. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Faheem Hussain and Mashiat Mostafa. 2016. Digital Contradictions in Bangladesh: Encouragement and Deterrence of Citizen Engagement via ICTs. Information Technologies & International Development, Vol. 12, 2 (2016), 47.Google ScholarGoogle Scholar
  34. Lilly Irani, Janet Vertesi, Paul Dourish, Kavita Philip, and Rebecca E Grinter. 2012. Postcolonial Computing: A Lens on Design and Development Proc. CHI'10. ACM, 1311--1320. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Steven J Jackson and Laewoo Kang. 2014. Breakdown, Obsolescence, and Reuse: HCI and the Art of Repair Proc. CHI'14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Steven J Jackson, Alex Pompe, and Gabriel Krieshok. 2011. Things Fall Apart: Maintenance, Repair, and Technology for Education Initiatives in Rural Namibia. In Proc. iConference'11. 83--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Haiyan Jia, Pamela J Wisniewski, Heng Xu, Mary Beth Rosson, and John M Carroll. 2015. Risk-taking as a Learning Process for Shaping Teen's Online Information Privacy Behaviors Proc. CSCW'15. ACM, 583--599. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Gopinaath Kannabiran. 2014. Ecofeminism and Sustainable HCI. In Companion Proc. DIS'14. ACM, 185--190. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Naveena Karusala and Neha Kumar. 2017. Women's Safety in Public Spaces: Examining the Efficacy of Panic Buttons in New Delhi Proc. CHI'17. ACM, 3340--3351. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Neha Kumar. 2011. The Gender-technology Divide or Perceptions of Non-use? First Monday Vol. 11 (2011).Google ScholarGoogle Scholar
  41. Priya Kumar and Sarita Schoenebeck. 2015. The Modern Day Baby Book: Enacting Good Mothering and stewarding Privacy on Facebook Proc. CSCW'15. ACM, 1302--1312. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Ponnurangam Kumaraguru and Lorrie F Cranor. 2006. Privacy in India: Attitudes and Awareness. Privacy Enhancing Technologies (2006), 243--258. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Carolyn A Lin. 1998. Exploring Personal Computer Adoption Dynamics. Journal of Broadcasting & Electronic Media, Vol. 42, 1 (1998), 95--112.Google ScholarGoogle ScholarCross RefCross Ref
  44. Silvia Lindtner, Bonnie Nardi, Yang Wang, Scott Mainwaring, He Jing, and Wenjing Liang. 2008. Emerging Sites of HCI Innovation: Hackerspaces, Hardware Startups and Incubators Proc. CSCW'08. ACM, 371--382.Google ScholarGoogle Scholar
  45. Heather R Lipford, Gordon Hull, Celine Latulipe, Andrew Besmer, and Jason Watson. 2009. Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites Proc. CSE'09, Vol. Vol. 4. IEEE, 985--989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Jane Mansbridge. 1983. Beyond Adversary Democracy. University of Chicago Press.Google ScholarGoogle Scholar
  47. Tamir Mendel and Eran Toch. 2017. Susceptibility to Social Influence of Privacy Behaviors: Peer versus Authoritative Sources Proc. CSCW'17. ACM, 581--593. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Mehrab Bin Morshed, Michaelanne Dye, Syed Ishtiaque Ahmed, and Neha Kumar. 2017. When the Internet Goes Down in Bangladesh. In CSCW. 1591--1604. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Wash L. Rev, Vol. 79, 119 (2004).Google ScholarGoogle Scholar
  50. Helen Nissenbaum. 2015. Obfuscation: A User's Guide for Privacy and Protest. MIT Press. https://mitpress.mit.edu/books/obfuscation Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Tapan S Parikh and Koushik Ghosh. 2006. Understanding and Designing for Intermediated Information Tasks in India. IEEE Pervasive Computing Vol. 5, 2 (2006), 32--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Andrew Patrick and Steve Kenny. 2003. From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-computer Interactions. In Privacy Enhancing Technologies. Springer, 107--124.Google ScholarGoogle Scholar
  53. Jennifer A Rode. 2011. A Theoretical Agenda for Feminist HCI. Interacting with Computers Vol. 23, 5 (2011), 393--400. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Norman Sadeh, Jason Hong, Lorrie F Cranor, Ian Fette, Patrick Kelley, Madhu Prabakar, and Jinghai Rao. 2009. Understanding and Capturing People's Privacy Policies in a Mobile Social Networking Application. Personal and Ubiquitous Computing Vol. 13, 6 (2009), 401--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Nithya Sambasivan, Ed Cutrell, Kentaro Toyama, and Bonnie Nardi. 2010. Intermediated Technology Use in Developing Communities Proc. CHI'10. ACM, 2583--2592. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Ferdinand David Schoeman. 1984. Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press.Google ScholarGoogle Scholar
  57. Amartya Sen. 1999. Development as Freedom. Oxford University Press.Google ScholarGoogle Scholar
  58. Claude E Shannon. 2001. A Mathematical Theory of Communication. ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 5, 1 (2001), 3--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Stephanie B. Steinhardt, Amanda Menking, Ingrid Erickson, Andrea Marshall, Asta Zelenkauskaite, and Jennifer Rode. 2015. Feminism and Feminist Approaches in Social Computing Proc ACM CSCW'15. ACM, 303--308. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Tech Crunch. 2017. Why Android Jelly Bean 4.2's Multiple User Account Switching Is Tablet-Only? (Hint: Nokia Patented It For Phones). https://techcrunch.com/2012/10/29/why-android-jelly-bean-4--2s-multiple-user-account-switching-is-tablet-only-hint-nokia-patented-it-for-phones. (2017). {Online; accessed July 10, 2017}.Google ScholarGoogle Scholar
  61. David R Thomas. 2006. A General Inductive Approach for Analyzing Qualitative Evaluation Data. American Journal of Evaluation Vol. 27, 2 (2006), 237--246.Google ScholarGoogle ScholarCross RefCross Ref
  62. Ronald L Thompson, Christopher A Higgins, and Jane M Howell. 1991. Personal Computing: Toward a Conceptual Model of Utilization. MIS quarterly (1991), 125--143. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Peter Tolmie, Andy Crabtree, Tom Rodden, James Colley, and Ewa Luger. 2016. "This Has to Be the Cats": Personal Data Legibility in Networked Sensing Systems Proc. CSCW'16. ACM, 491--502. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Michalis Vitos, Julia Altenbuchner, Matthias Stevens, Gillian Conquest, Jerome Lewis, and Muki Haklay. 2017. Supporting Collaboration with Non-Literate Forest Communities in the Congo-Basin Proc. CSCW'17. 1576--1590. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Alan F Westin. 1968. Privacy and Freedom. Washington and Lee Law Review Vol. 25, 1 (1968), 166.Google ScholarGoogle Scholar
  66. Pamela Wisniewski, AKM Islam, Bart P Knijnenburg, and Sameer Patil. 2015 a. Give social Network Users the Privacy They Want. Proc. CSCW'15. ACM, 1427--1441. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Pamela Wisniewski, Haiyan Jia, Heng Xu, Mary Beth Rosson, and John M Carroll. 2015 b. Preventative vs. Reactive: How Parental Mediation Influences Teens' Social Media Privacy Behaviors. In Proc. CSCW'15. ACM, 302--316. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Pamela J Wisniewski, Heng Xu, Mary Beth Rosson, and John M Carroll. 2014. Adolescent Online Safety: The Moral of the Story. Proc. CSCW'14. ACM, 1258--1271. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Susan P Wyche, Cliff Lampe, Nimmi Rangaswamy, Anicia Peters, Andrés Monroy-Hernández, and Judd Antin. 2014. Facebook in the Developing World: The Myths and Realities Underlying a Socially Networked World Proc. CSCW'14. ACM, 121--124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Iris Marion Young. 2011. Justice and the Politics of Difference. Princeton University Press.Google ScholarGoogle Scholar
  71. Bo Zhang and Heng Xu. 2016. Privacy Nudges for Mobile Applications: Effects on the Creepiness Emotion and Privacy Attitudes Proc. CSCW'16. ACM, 1676--1690. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Mary Ellen Zurko and Richard T Simon. 1996. User-centered Security. In Proc. Workshop on New Security Paradigms. ACM, 27--33. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!