Abstract
Prior research on technology use in the Global South suggests that people in marginalized communities frequently share a single device among multiple individuals. However, the data privacy challenges and tensions that arise when people share devices have not been studied in depth. This paper presents a qualitative study with 72 participants that analyzes how families in Bangladesh currently share mobile phones, their usage patterns, and the tensions and challenges that arise as individuals seek to protect the privacy of their personal data. We show how people share devices out of economic need, but also because sharing is a social and cultural practice that is deeply embedded in Bangladeshi society. We also discuss how prevalent power relationships affect sharing practices and reveal gender dynamics that impact the privacy of women's data. Finally, we highlight strategies that participants adopted to protect their private data from the people with whom they share devices. Taken together, our findings have broad implications that advance the CSCW community's understanding of digital privacy outside the Western world.
- Norah Abokhodair. 2015. Transmigrant Saudi Arabian Youth and Social Media: Privacy, Intimacy and Freedom of Expression. ACM, 187--190. Google Scholar
Digital Library
- Norah Abokhodair and Sarah Vieweg. 2016. Privacy & Social Media in the Context of the Arab Gulf Proc. Conference on Designing Interactive Systems. ACM, 672--683. Google Scholar
Digital Library
- Syed Ishtiaque Ahmed, Nova Ahmed, Faheem Hussain, and Neha Kumar. 2016 a. Computing Beyond Gender-imposed Limits. In Proc. LIMITS'16. ACM, Article No. 6. Google Scholar
Digital Library
- Syed Ishtiaque Ahmed, Shion Guha, Md. Rashidujjaman Rifat, Md. Foysal Hossain, and Nicola Dell. 2016 b. Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh. In Proc. ICTD'16. ACM, Article No. 11. Google Scholar
Digital Library
- Syed Ishtiaque Ahmed, Md. Romael Hoque, Shion Guha, Md. Rashidujjaman Rifat, and Nicola Dell. 2017. Privacy, Security, and Surveillance in the Global South: A Study of Biometric Mobile SIM Registration in Bangladesh. In Proc. CHI'17. ACM. Google Scholar
Digital Library
- Syed Ishtiaque Ahmed, Steven J Jackson, Nova Ahmed, Hasan Shahid Ferdous, Md. Rashidujjaman Rifat, A. S. M. Rizvi, Shamir Ahmed, and Rifat Sabbir Mansur. 2014. Protibadi: A Platform for Fighting Sexual Harassment in Urban Bangladesh Proc. CHI'14. ACM, 2695--2704. Google Scholar
Digital Library
- Syed Ishtiaque Ahmed, Steven J Jackson, Maruf Zaber, Mehrab Bin Morshed, Md. Habibullah Bin Ismail, and Shamim Afrose. 2013. Ecologies of Use and Design: Individual and Social Uses of Mobile Phones Within Low-Literate Rickshaw-Puller Communities in Urban Bangladesh Proc. DEV-4. ACM, 14:1--14:10. Google Scholar
Digital Library
- Syed Ishtiaque Ahmed, Nusrat Jahan Mim, and Steven J Jackson. 2015 a. Residual Mobilities: Infrastructural Displacement and Post-Colonial Computing in Bangladesh Proc. CHI'15. ACM, 437--446. Google Scholar
Digital Library
- Syed Ishtiaque Ahmed, Maruf Zaber, Mehrab Bin Morshed, Md. Habibullah Bin Ismail, Dan Cosley, and Steven J Jackson. 2015 b. Suhrid: A Collaborative Mobile Phone Interface for Low Literate People Proc. DEV'15. ACM, 95--103. Google Scholar
Digital Library
- Android Central. 2017. Lollipop Brings Proper Multi-user Accounts to Your Phone. https://www.androidcentral.com/lollipop-brings-proper-multi-user-accounts-your-phone. (2017). {Online; accessed July 10, 2017}.Google Scholar
- Thierry Bardini and August T. Horvath. 1995. The Social Construction of the Personal Computer User. Journal of Communication Vol. 45, 3 (1995), 40--66.Google Scholar
Cross Ref
- Shaowen Bardwell. 2010. Feminist HCI: Taking Stock and Outlining an Agenda for Design Proc. CHI'10. ACM, 1301--1310. Google Scholar
Digital Library
- Shaowen Bardwell and Jeffrey Bardzell. 2011. Towards a Feminist HCI Methodology: Social Science, Feminism, and HCI Proc. CHI'11. ACM, 675--684. Google Scholar
Digital Library
- Yahel Ben-David, Shaddi Hasan, Joyojeet Pal, Matthias Vallentin, Saurabh Panjwani, Philipp Gutheim, Jay Chen, and Eric A. Brewer. 2011. Computing Security in the Developing World: A Case for Multidisciplinary Research Proc NSDR'11. ACM, New York, NY, USA, 39--44. Google Scholar
Digital Library
- Seyla Benhabib. 2002. The Claims of Culture: Equality and Diversity in the Global Era. Princeton University Press.Google Scholar
- Jenna Burrell. 2010. Evaluating Shared Access: Social Equality and the Circulation of Mobile Phones in Rural Uganda. Journal of Computer Mediated Communication Vol. 15, 2 (2010), 230--250.Google Scholar
Cross Ref
- Jay Chen, Michael Paik, and Kelly McCabe. 2014. Exploring Internet Security Perceptions and Practices in Urban Ghana Proc. SOUPS'14. 129--142.Google Scholar
- Sonia Chiasson, Paul C van Oorschot, and Robert Biddle. 2007. Graphical Password Authentication Using Cued Click Points Proc. Computer Security-ESORICS. 359--374. Google Scholar
Digital Library
- Padma Chirumamilla and Joyojeet Pal. 2013. Play and Power: A Ludic Design Proposal for ICTD Proc. ICTD'13. ACM, 25--33. Google Scholar
Digital Library
- Hichang Cho and Anna Filippova. 2016. Networked Privacy Management in Facebook: A Mixed-methods and Multinational Study Proc. CSCW'16. ACM, 503--514. Google Scholar
Digital Library
- Julie E. Cohen. 2012. What Privacy is For. Harvard Law Review Vol. 125 (2012), 1904.Google Scholar
- Raymundo Cornejo, Robin Brewer, Caroline Edasis, and Anne Marie Piper. 2016. Vulnerability, Sharing, and Privacy: Analyzing Art Therapy for Older Adults with Dementia Proc. CSCW'16. ACM, 1572--1583. Google Scholar
Digital Library
- Andy Crabtree, Peter Tolmie, and Will Knight. 2017. Repacking "Privacy" for a Networked World. Proc. CSCW'17, 1--36.Google Scholar
Digital Library
- Lorrie F Cranor and Simson Garfinkel. 2004. Guest Editors' Introduction: Secure or Usable? IEEE Security & Privacy Vol. 2, 5 (2004), 16--18. Google Scholar
Digital Library
- Nicola Dell, Trevor Perrier, Neha Kumar, Mitchell Lee, Rachel Powers, and Gaetano Borriello. 2015. Digital Workflows in Global Development Organizations Proc. CSCW'15. ACM, 1659--1669. Google Scholar
Digital Library
- Paul Dourish and Leysia Palen. 2003. Unpacking Privacy for a Networked World. In Proc. CHI'03. ACM, 129--136. Google Scholar
Digital Library
- Casey Fiesler, Michaelanne Dye, Jessica L Feuston, Chaya Hiruncharoenvate, Clayton J Hutto, Shannon Morrison, Parisa Khanipour Roshan, Umashanthi Pavalanathan, Amy S Bruckman, Munmun De Choudhury, et almbox. 2017. What (or Who) Is Public?: Privacy Settings and Social Media Content Sharing Proc. CSCW'17. 567--580. Google Scholar
Digital Library
- Ralph Gross and Alessandro Acquisti. 2005. Information Revelation and Privacy in Online Social Networks Proc. Workshop on Privacy in the Electronic Society. ACM, 71--80. Google Scholar
Digital Library
- Jürgen Habermas. 1991. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. MIT Press.Google Scholar
- Richard Heeks. 2012. IT Innovation for the Bottom of the Pyramid. Commun. ACM Vol. 55, 12 (2012), 24--27. Google Scholar
Digital Library
- Geert Hofstede. 1984. The Cultural Relativity of the Quality of Life Concept. Academy of Management Review Vol. 9, 3 (1984), 389--398.Google Scholar
Cross Ref
- Roberto Hoyle, Srijita Das, Apu Kapadia, Adam J Lee, and Kami Vaniea. 2017. Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks Proc. CSCW'17. 555--566. Google Scholar
Digital Library
- Faheem Hussain and Mashiat Mostafa. 2016. Digital Contradictions in Bangladesh: Encouragement and Deterrence of Citizen Engagement via ICTs. Information Technologies & International Development, Vol. 12, 2 (2016), 47.Google Scholar
- Lilly Irani, Janet Vertesi, Paul Dourish, Kavita Philip, and Rebecca E Grinter. 2012. Postcolonial Computing: A Lens on Design and Development Proc. CHI'10. ACM, 1311--1320. Google Scholar
Digital Library
- Steven J Jackson and Laewoo Kang. 2014. Breakdown, Obsolescence, and Reuse: HCI and the Art of Repair Proc. CHI'14. Google Scholar
Digital Library
- Steven J Jackson, Alex Pompe, and Gabriel Krieshok. 2011. Things Fall Apart: Maintenance, Repair, and Technology for Education Initiatives in Rural Namibia. In Proc. iConference'11. 83--90. Google Scholar
Digital Library
- Haiyan Jia, Pamela J Wisniewski, Heng Xu, Mary Beth Rosson, and John M Carroll. 2015. Risk-taking as a Learning Process for Shaping Teen's Online Information Privacy Behaviors Proc. CSCW'15. ACM, 583--599. Google Scholar
Digital Library
- Gopinaath Kannabiran. 2014. Ecofeminism and Sustainable HCI. In Companion Proc. DIS'14. ACM, 185--190. Google Scholar
Digital Library
- Naveena Karusala and Neha Kumar. 2017. Women's Safety in Public Spaces: Examining the Efficacy of Panic Buttons in New Delhi Proc. CHI'17. ACM, 3340--3351. Google Scholar
Digital Library
- Neha Kumar. 2011. The Gender-technology Divide or Perceptions of Non-use? First Monday Vol. 11 (2011).Google Scholar
- Priya Kumar and Sarita Schoenebeck. 2015. The Modern Day Baby Book: Enacting Good Mothering and stewarding Privacy on Facebook Proc. CSCW'15. ACM, 1302--1312. Google Scholar
Digital Library
- Ponnurangam Kumaraguru and Lorrie F Cranor. 2006. Privacy in India: Attitudes and Awareness. Privacy Enhancing Technologies (2006), 243--258. Google Scholar
Digital Library
- Carolyn A Lin. 1998. Exploring Personal Computer Adoption Dynamics. Journal of Broadcasting & Electronic Media, Vol. 42, 1 (1998), 95--112.Google Scholar
Cross Ref
- Silvia Lindtner, Bonnie Nardi, Yang Wang, Scott Mainwaring, He Jing, and Wenjing Liang. 2008. Emerging Sites of HCI Innovation: Hackerspaces, Hardware Startups and Incubators Proc. CSCW'08. ACM, 371--382.Google Scholar
- Heather R Lipford, Gordon Hull, Celine Latulipe, Andrew Besmer, and Jason Watson. 2009. Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites Proc. CSE'09, Vol. Vol. 4. IEEE, 985--989. Google Scholar
Digital Library
- Jane Mansbridge. 1983. Beyond Adversary Democracy. University of Chicago Press.Google Scholar
- Tamir Mendel and Eran Toch. 2017. Susceptibility to Social Influence of Privacy Behaviors: Peer versus Authoritative Sources Proc. CSCW'17. ACM, 581--593. Google Scholar
Digital Library
- Mehrab Bin Morshed, Michaelanne Dye, Syed Ishtiaque Ahmed, and Neha Kumar. 2017. When the Internet Goes Down in Bangladesh. In CSCW. 1591--1604. Google Scholar
Digital Library
- Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Wash L. Rev, Vol. 79, 119 (2004).Google Scholar
- Helen Nissenbaum. 2015. Obfuscation: A User's Guide for Privacy and Protest. MIT Press. https://mitpress.mit.edu/books/obfuscation Google Scholar
Digital Library
- Tapan S Parikh and Koushik Ghosh. 2006. Understanding and Designing for Intermediated Information Tasks in India. IEEE Pervasive Computing Vol. 5, 2 (2006), 32--39. Google Scholar
Digital Library
- Andrew Patrick and Steve Kenny. 2003. From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-computer Interactions. In Privacy Enhancing Technologies. Springer, 107--124.Google Scholar
- Jennifer A Rode. 2011. A Theoretical Agenda for Feminist HCI. Interacting with Computers Vol. 23, 5 (2011), 393--400. Google Scholar
Digital Library
- Norman Sadeh, Jason Hong, Lorrie F Cranor, Ian Fette, Patrick Kelley, Madhu Prabakar, and Jinghai Rao. 2009. Understanding and Capturing People's Privacy Policies in a Mobile Social Networking Application. Personal and Ubiquitous Computing Vol. 13, 6 (2009), 401--412. Google Scholar
Digital Library
- Nithya Sambasivan, Ed Cutrell, Kentaro Toyama, and Bonnie Nardi. 2010. Intermediated Technology Use in Developing Communities Proc. CHI'10. ACM, 2583--2592. Google Scholar
Digital Library
- Ferdinand David Schoeman. 1984. Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press.Google Scholar
- Amartya Sen. 1999. Development as Freedom. Oxford University Press.Google Scholar
- Claude E Shannon. 2001. A Mathematical Theory of Communication. ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 5, 1 (2001), 3--55. Google Scholar
Digital Library
- Stephanie B. Steinhardt, Amanda Menking, Ingrid Erickson, Andrea Marshall, Asta Zelenkauskaite, and Jennifer Rode. 2015. Feminism and Feminist Approaches in Social Computing Proc ACM CSCW'15. ACM, 303--308. Google Scholar
Digital Library
- Tech Crunch. 2017. Why Android Jelly Bean 4.2's Multiple User Account Switching Is Tablet-Only? (Hint: Nokia Patented It For Phones). https://techcrunch.com/2012/10/29/why-android-jelly-bean-4--2s-multiple-user-account-switching-is-tablet-only-hint-nokia-patented-it-for-phones. (2017). {Online; accessed July 10, 2017}.Google Scholar
- David R Thomas. 2006. A General Inductive Approach for Analyzing Qualitative Evaluation Data. American Journal of Evaluation Vol. 27, 2 (2006), 237--246.Google Scholar
Cross Ref
- Ronald L Thompson, Christopher A Higgins, and Jane M Howell. 1991. Personal Computing: Toward a Conceptual Model of Utilization. MIS quarterly (1991), 125--143. Google Scholar
Digital Library
- Peter Tolmie, Andy Crabtree, Tom Rodden, James Colley, and Ewa Luger. 2016. "This Has to Be the Cats": Personal Data Legibility in Networked Sensing Systems Proc. CSCW'16. ACM, 491--502. Google Scholar
Digital Library
- Michalis Vitos, Julia Altenbuchner, Matthias Stevens, Gillian Conquest, Jerome Lewis, and Muki Haklay. 2017. Supporting Collaboration with Non-Literate Forest Communities in the Congo-Basin Proc. CSCW'17. 1576--1590. Google Scholar
Digital Library
- Alan F Westin. 1968. Privacy and Freedom. Washington and Lee Law Review Vol. 25, 1 (1968), 166.Google Scholar
- Pamela Wisniewski, AKM Islam, Bart P Knijnenburg, and Sameer Patil. 2015 a. Give social Network Users the Privacy They Want. Proc. CSCW'15. ACM, 1427--1441. Google Scholar
Digital Library
- Pamela Wisniewski, Haiyan Jia, Heng Xu, Mary Beth Rosson, and John M Carroll. 2015 b. Preventative vs. Reactive: How Parental Mediation Influences Teens' Social Media Privacy Behaviors. In Proc. CSCW'15. ACM, 302--316. Google Scholar
Digital Library
- Pamela J Wisniewski, Heng Xu, Mary Beth Rosson, and John M Carroll. 2014. Adolescent Online Safety: The Moral of the Story. Proc. CSCW'14. ACM, 1258--1271. Google Scholar
Digital Library
- Susan P Wyche, Cliff Lampe, Nimmi Rangaswamy, Anicia Peters, Andrés Monroy-Hernández, and Judd Antin. 2014. Facebook in the Developing World: The Myths and Realities Underlying a Socially Networked World Proc. CSCW'14. ACM, 121--124. Google Scholar
Digital Library
- Iris Marion Young. 2011. Justice and the Politics of Difference. Princeton University Press.Google Scholar
- Bo Zhang and Heng Xu. 2016. Privacy Nudges for Mobile Applications: Effects on the Creepiness Emotion and Privacy Attitudes Proc. CSCW'16. ACM, 1676--1690. Google Scholar
Digital Library
- Mary Ellen Zurko and Richard T Simon. 1996. User-centered Security. In Proc. Workshop on New Security Paradigms. ACM, 27--33. Google Scholar
Digital Library
Index Terms
Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh
Recommendations
Privacy, Security, and Surveillance in the Global South: A Study of Biometric Mobile SIM Registration in Bangladesh
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsWith the rapid growth of ICT adoption in the Global South, crimes over and through digital technologies have also increased. Consequently, governments have begun to undertake a variety of different surveillance programs, which in turn provoke questions ...
"Everyone Has Some Personal Stuff": Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing SystemsPeople in South Asia frequently share a single device among multiple individuals, resulting in digital privacy challenges. This paper explores a design concept that aims to mitigate some of these challenges through a 'tiered' privacy model. Using this ...
Towards Informed Practice in HCI for Development
Our paper provides an enriched understanding of the relationship between research and practice through the study of practitioners variously engaged in field research on technology interventions in the context of global development. By conducting a ...






Comments