skip to main content
10.1145/3287098.3287107acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictdConference Proceedingsconference-collections
research-article

Online sexual harassment over anonymous social media in Bangladesh

Published:04 January 2019Publication History

ABSTRACT

Prior research on anonymous social media (ASM) has studied the issue of sexual harassment and has revealed its connections to stereotyping, aggression, interpersonal relationships, and mental health among others [16, 24, 60]. However, the characteristics of such harassment in the context of low and middle-income countries (LMICs) in the global south has not received enough attention in the literature. This paper presents our findings on the use of ASM in Bangladesh based on an anonymous online survey of (n= 291) participants and semi-structured interviews with (n= 27) participants. Our study shows a wide prevalence of sexual harassment on anonymous social networks in Bangladesh, the relationship between a closely-knitted communal culture and anonymous harassment, and the lack of infrastructural support for the victims. We also propose a set of design and policy recommendations for such anonymous social media to extend the current ICTD literature on ensuring a safer online environment for women, especially in an LMIC.

References

  1. A. Adikaram. 2016. Not So Silent: How Social Support is Given and Received in Dealing with Sexual Harassment in Sri Lankan Work-Places. NSBM Journal of Management 1, 2 (2016).Google ScholarGoogle Scholar
  2. Nova Ahmed. 2016. Discussing about sexual harassment (breaking silence): The role of technology. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 459--472. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S.I. Ahmed, N. Ahmed, F. Hussain, and N. Kumar. 2016. Computing beyond gender-imposed limits. In Proceedings of the Second Workshop on Computing within Limits (ACM '16). 6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. SI Ahmed, SJ Jackson, M Zaber, MB Morshed, MHB Ismail, and S Afrose. 2013. Ecologies of Use and Design: Individual and Social Uses of Mobile Phones Within Low-Literate Rickshaw-Puller Communities in Urban Bangladesh. Proc. DEV 4, 14 (2013), 1--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Syed Ishtiaque Ahmed, Md Romael Haque, Jay Chen, and Nicola Dell. 2017. Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (2017), 17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Syed Ishtiaque Ahmed, Steven J Jackson, Nova Ahmed, Hasan Shahid Ferdous, Md Rashidujjaman Rifat, ASM Rizvi, Shamir Ahmed, and Rifat Sabbir Mansur. 2014. Protibadi: A platform for fighting sexual harassment in urban Bangladesh. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, 2695--2704. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Syed Ishtiaque Ahmed, Steven J Jackson, Nova Ahmed, Hasan Shahid Ferdous, Md Rashidujjaman Rifat, ASM Rizvi, Shamir Ahmed, and Rifat Sabbir Mansur. 2014. Protibadi: A platform for fighting sexual harassment in urban Bangladesh. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, 2695--2704. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Courtney E Ahrens. 2006. Being silenced: The impact of negative social reactions on the disclosure of rape. American Journal of Community Psychology 38, 3-4 (2006), 263--274.Google ScholarGoogle ScholarCross RefCross Ref
  9. Farhana Akter. 2018. Cyber violence against women: the case of Bangladesh. https://www.genderit.org/articles/cyber-violence-against-women-case-bangladeshGoogle ScholarGoogle Scholar
  10. Maía-del-Carmen Alarcón-del Amo, Carlota Lorenzo-Romero, and Miguel-ángel Gómez-Borja. 2016. Cultural influence on the adoption of social networking sites. International Journal of Market Research 58, 2 (2016), 277--300.Google ScholarGoogle ScholarCross RefCross Ref
  11. Monica Anderson. 2017. Nearly Half of Those Who Have Been Harassed Online Know Their Harasser. http://www.pewresearch.org/fact-tank/2017/08/08/nearly-half-of-those-who-have-been-harassed-online-know-their-harasser/Google ScholarGoogle Scholar
  12. Zahra Ashktorab and Jessica Vitak. 2016. Designing cyberbullying mitigation and prevention solutions through participatory design with teenagers. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 3895--3905. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Shah Azam. 2007. Internet adoption and usage in Bangladesh. Japanese Journal of Administrative Science 20, 1 (2007), 43--54.Google ScholarGoogle ScholarCross RefCross Ref
  14. Squadbox:Fight back against harassment. 2018. https://squadbox.org/Google ScholarGoogle Scholar
  15. Charmain Badenhorst. 2011. Legal responses to cyber bullying and sexting in South Africa. Centre for Justice and Crime Prevention (CJCP) Issue Paper 10 (2011), 1--20.Google ScholarGoogle Scholar
  16. Azy Barak. 2005. Sexual harassment on the Internet. Social Science Computer Review 23, 1 (2005), 77--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Simon Batchelor, Simon Hearn, Malcolm Peirce, Susan Sugden, and Mike Webb. 2003. ICT for development: Contributing to the millennium development goals-Lessons learned from seventeen infoDev projects. (2003).Google ScholarGoogle Scholar
  18. Eric PS Baumer, Shion Guha, Emily Quan, David Mimno, and Geri K Gay. 2015. Missing photos, suffering withdrawal, or finding freedom? How experiences of social media non-use influence the likelihood of reversion. Social Media+ Society 1, 2 (2015), 2056305115614851.Google ScholarGoogle Scholar
  19. Jodi K. Biber, Dennis Doverspike, Daniel Baznik, Alana Cober, and Barbara A. Ritter. 2002. Sexual Harassment in Online Communications: Effects of Gender and Discourse Medium. CYBERPSYCHOLOGY BEHAVIOR 5, 1 (2002).Google ScholarGoogle Scholar
  20. Shereen G Bingham and Lisa L Scherer. 1993. Factors associated with responses to sexual harassment and satisfaction with outcome. Sex Roles 29, 3-4 (1993), 239--269.Google ScholarGoogle ScholarCross RefCross Ref
  21. Jeremy Birnholtz. 2010. Adopt, adapt, abandon: Understanding why some young adults start, and then stop, using instant messaging. Computers in Human Behavior 26, 6 (2010), 1427--1433. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Erik W Black, Kelsey Mezzina, and Lindsay A Thompson. 2016. Anonymous social media-Understanding the content and context of Yik Yak. Computers in Human Behavior 57 (2016), 17--22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Lindsay Blackwell, Tianying Chen, Sarita Schoenebeck, and Cliff Lampe. 2018. When Online Harassment is Perceived as Justified. In ICWSM.Google ScholarGoogle Scholar
  24. Paul C Buchanan. 2001. Love, or harassment? How employers should deal with a touchy issue. Business Law Today (2001), 8--11.Google ScholarGoogle Scholar
  25. Jenna Burrell. 2012. Invisible users: Youth in the Internet cafés of urban Ghana. Mit Press.Google ScholarGoogle Scholar
  26. Jenna Chang. 2008. The role of anonymity in deindividuated behavior: A comparison of deindividuation theory and the social identity model of deindividuation effects (SIDE). The Pulse 6, 1 (2008), 2--8.Google ScholarGoogle Scholar
  27. Mohamed Chawki. 2009. Anonymity in cyberspace: Finding the balance between privacy and security. International Journal of Technology Transfer and Commercialisation 9, 3 (2009), 183--199.Google ScholarGoogle ScholarCross RefCross Ref
  28. Ying Chen, Yilu Zhou, Sencun Zhu, and Heng Xu. 2012. Detecting offensive language in social media to protect adolescent online safety. In Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom). IEEE, 71--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Anir Chowdhury. 2017. A tech revolution helps boost BangladeshâĂŹs development. http://blogs.worldbank.org/endpovertyinsouthasia/tech-revolution-helps-boost-bangladesh-s-development.Google ScholarGoogle Scholar
  30. Denzil Correa, Leandro Araújo Silva, Mainack Mondal, Fabrício Benevenuto, and Krishna P Gummadi. 2015. The Many Shades of Anonymity: Characterizing Anonymous Social Media Content.. In ICWSM. 71--80.Google ScholarGoogle Scholar
  31. Jill P Dimond, Michaelanne Dye, Daphne LaRose, and Amy S Bruckman. 2013. Hollaback!: the role of storytelling online in a social movement organization. In Proceedings of the 2013 conference on Computer supported cooperative work. ACM, 477--490. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Abdul Azeez Erumban and Simon B De Jong. 2006. Cross-country differences in ICT adoption: A consequence of Culture? Journal of world business 41, 4 (2006), 302--314.Google ScholarGoogle ScholarCross RefCross Ref
  33. Nawaz Farhin. 2017. Apps Anonymous: Sarahah. https://www.dhakatribune.com/feature/tech/2017/08/09/apps-anonymous-sarahahGoogle ScholarGoogle Scholar
  34. Bianca Fileborn. 2014. Online activism and street harassment: Digital justice or shouting into the ether? Griffith Journal of Law & Human Dignity 2, 1 (2014).Google ScholarGoogle Scholar
  35. Brian J Fogg. 1998. Charismatic computers: Creating more likable and persuasive interactive technologies by leveraging principles from social psychology. (1998).Google ScholarGoogle Scholar
  36. Brian J Fogg. 2002. Persuasive technology: using computers to change what we think and do. Ubiquity 2002, December (2002), 5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Andrea Forte, Nazanin Andalibi, and Rachel Greenstadt. 2017. Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians.. In CSCW. 1800--1811. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. World Economic Forum. 2017. The Global Gender Gap Report 2017. http://www3.weforum.org/docs/WEF_GGGR_2017.pdf.Google ScholarGoogle Scholar
  39. Barney G Glaser, Anselm L Strauss, and Elizabeth Strutzel. 1968. The discovery of grounded theory; strategies for qualitative research. Nursing research 17, 4 (1968), 364.Google ScholarGoogle Scholar
  40. IGI Global. {n. d.}. What is Developing Countries. https://www.igi-global.com/dictionary/developing-countries/7401Google ScholarGoogle Scholar
  41. James E Gruber and Lars Bjorn. 1986. Women's responses to sexual harassment: An analysis of sociocultural, organizational, and personal resource models. Social Science Quarterly 67, 4 (1986), 814.Google ScholarGoogle Scholar
  42. Shion Guha and Stephen B Wicker. 2015. Do birds of a feather watch each other?: Homophily and social surveillance in location based social networks. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM, 1010--1020. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Mark S Handcock and Krista J Gile. 2011. Comment: On the concept of snowball sampling. Sociological Methodology 41, 1 (2011), 367--371.Google ScholarGoogle ScholarCross RefCross Ref
  44. Laura Hlavach and William H Freivogel. 2011. Ethical implications of anonymous comments posted to online news stories. Journal of Mass Media Ethics 26, 1 (2011), 21--37.Google ScholarGoogle ScholarCross RefCross Ref
  45. Melissa R Ho, Thomas N Smyth, Matthew Kam, and Andy Dearden. 2009. Human-computer interaction for development: The past, present, and future. Information Technologies & International Development 5, 4 (2009), pp--1.Google ScholarGoogle Scholar
  46. E. Hopper. 2015. Individualist or Collectivist? How Culture Influences Behavior. Retrieved February 27, 2018 from https://healthypsych.com/individualist-or-collectivist-how-culture-influencesbehavior/Google ScholarGoogle Scholar
  47. Homa Hosseinmardi, Amir Ghasemianlangroodi, Richard Han, Qin Lv, and Shivakant Mishra. 2014. Towards understanding cyberbullying behavior in a semi-anonymous social network. In Advances in Social Networks Analysis and Mining (ASONAM), 2014 IEEE/ACM International Conference on. IEEE, 244--252. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Judith E Hupcey. 1998. Clarifying the social support theory-research linkage. Journal of advanced nursing 27, 6 (1998), 1231--1241.Google ScholarGoogle ScholarCross RefCross Ref
  49. Hoftstede Insights. 2018. Country Comparison. https://www.hofstede-insights.com/country-comparison/bangladesh/Google ScholarGoogle Scholar
  50. Md. Nazrul Islam and Jatan Kumar Saha. 2011. Country Paper on Household ICT Access and Individual ICT Usage in Bangladesh. Technical Report. Bangladesh Bureau of Statistics.Google ScholarGoogle Scholar
  51. M. Berglund J Palme. 2002. Anonymity on the Internet. (2002).Google ScholarGoogle Scholar
  52. Linda A Jackson and Jin-Liang Wang. 2013. Cultural differences in social networking site use: A comparative study of China and the United States. Computers in human behavior 29, 3 (2013), 910--921. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Steven J Jackson, Tarleton Gillespie, and Sandy Payette. 2014. The policy knot: re-integrating policy, practice and design in cscw studies of social computing. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. ACM, 588--602. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Adam N Joinson. 2001. Self-disclosure in computer-mediated communication: The role of self-awareness and visual anonymity. European journal of social psychology 31, 2 (2001), 177--192.Google ScholarGoogle Scholar
  55. Ruogu Kang, Stephanie Brown, and Sara Kiesler. 2013. Why do people seek anonymity on the internet?: informing policy and design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2657--2666. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Ruogu Kang, Laura Dabbish, and Katherine Sutton. 2016. Strangers on your phone: Why people use anonymous communication applications. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 359--370. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Naveena Karusala and Neha Kumar. 2017. Women's Safety in Public Spaces: Examining the Efficacy of Panic Buttons in New Delhi. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 3340--3351. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Farida C Khan. 2005. Gender violence and development discourse in Bangladesh. International Social Science Journal 57, 184 (2005), 219--230.Google ScholarGoogle ScholarCross RefCross Ref
  59. Robin M Kowalski and Susan P Limber. 2013. Psychological, physical, and academic correlates of cyberbullying and traditional bullying. Journal of Adolescent Health 53, 1 (2013), S13--S20.Google ScholarGoogle ScholarCross RefCross Ref
  60. Xiao Ma, Nazanin Andalibi, Louise Barkhuus, and Mor Naaman. 2017. People are either too fake or too real: opportunities and challenges in tie-based anonymity. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 1781--1793. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Catharine A MacKinnon and Catharine A MacKinnon. 1979. Sexual harassment of working women: A case of sex discrimination. Number 19. Yale University Press.Google ScholarGoogle Scholar
  62. M Madi. 2017. Sarahah: The honesty app that's got everyone talking. Video.Google ScholarGoogle Scholar
  63. Kaitlin Mahar, Amy X. Zhang, and David Karger. 2018. Squadbox: A Tool To Combat Online Harassment Using Friendsourced Moderation. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (CHI EA '18). ACM, New York, NY, USA, Article D401, 4 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Gary Marx. 2004. Internet anonymity as a reflection of broader issues involving technology and society. Asia-Pacific Review 11, 1 (2004), 142--166.Google ScholarGoogle ScholarCross RefCross Ref
  65. Miller McPherson, Lynn Smith-Lovin, and James M Cook. 2001. Birds of a feather: Homophily in social networks. Annual review of sociology 27, 1 (2001), 415--444.Google ScholarGoogle Scholar
  66. Jessica Megarry. 2014. Online incivility or sexual harassment? Conceptualising women's experiences in the digital age. Women's Studies International Forum 47, Part A (2014), 46--55.Google ScholarGoogle Scholar
  67. Mhamud Murad. 2017. Dhaka ranked second in number of active Facebook users. bdnews24 (2017).Google ScholarGoogle Scholar
  68. Papreen Nahar, Miranda Van Reeuwijk, and Ria Reis. 2013. Contextualising sexual harassment of adolescent girls in Bangladesh. Reproductive health matters 21, 41 (2013), 78--86.Google ScholarGoogle Scholar
  69. Brian Nicholson, Yanuar Nugroho, and Nimmi Rangaswamy. 2016. Social media for development: Outlining debates, theory and praxis.Google ScholarGoogle Scholar
  70. Fayika F. Nova, MD Rashidujjaman Rifat, Pratyasha Saha, S.I. Ahmed, and Shion Guha. 2018. Silenced Voices: Understanding Sexual Harassment on Anonymous Social Media Among Bangladeshi Peopley. In Proceedings of the companion publication of the 21st ACM conference on Computer supported cooperative work social computing. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Timo Tapani Ojanen, Pimpawun Boonmongkon, Ronnapoom Samakkeekarom, Nattharat Samoh, Mudjalin Cholratana, and Thomas Ebanan Guadamuz. 2015. Connections between online harassment and offline violence among youth in Central Thailand. Child abuse & neglect 44 (2015), 159--169.Google ScholarGoogle Scholar
  72. Joyojeet Pal, Tawfiq Ammari, Ramaswami Mahalingam, Ana Maria Huaita Alfaro, and Meera Lakshmanan. 2013. Marginality, aspiration and accessibility in ICTD. In Proceedings of the Sixth International Conference on Information and Communication Technologies and Development: Full Papers-Volume 1. ACM, 68--78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Tapan S Parikh and Edward D Lazowska. 2006. Designing an architecture for delivering mobile information services to the rural developing world. In Proceedings of the 15th international conference on World Wide Web. ACM, 791--800. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Jessica A. Pater, Moon K. Kim, Elizabeth D. Mynatt, and Casey Fiesler. 2016. Characterizations of Online Harassment: Comparing Policies Across Social Media Platforms. In Proceedings of the 19th International Conference on Supporting Group Work (GROUP '16). ACM, New York, NY, USA, 369--374. Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Jessica A Pater, Moon K Kim, Elizabeth D Mynatt, and Casey Fiesler. 2016. Characterizations of online harassment: Comparing policies across social media platforms. In Proceedings of the 19th International Conference on Supporting Group Work. ACM, 369--374. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Andreas Pfitzmann and Marit Hansen. 2008. Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology. http://dud.inf.tu-dresden.de/Anon_Terminology.shtml. http://dud.inf.tu-dresden.de/Anon_Terminology.shtml v0.31.Google ScholarGoogle Scholar
  77. Matthew Pittman and Brandon Reich. 2016. Social Media and Loneliness. Comput. Hum. Behav. 62, C (Sept. 2016), 155--167. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. T Postmes and R Spears. 1998. Deindividuation and antinormative behavior: A meta-analysis. Psychological Bulletin 123, 3 (5 1998), 238--259.Google ScholarGoogle Scholar
  79. Sushmita S. Preetha. 2015. Digital Sexual Harassment in Digital Bangladesh. https://www.thedailystar.net/in-focus/digital-sexual-harassment-digital-bangladesh-82480Google ScholarGoogle Scholar
  80. Sabina Faiz Rashid, Hilary Standing, Mahrukh Mohiuddin, and Farah Mahjabeen Ahmed. 2011. Creating a public space and dialogue on sexuality and rights: a case study from Bangladesh. Health Research Policy and Systems 9, 1 (2011), S12.Google ScholarGoogle ScholarCross RefCross Ref
  81. Md Rashidujjaman Rifat, Jay Chen, and Kentaro Toyama. 2017. Money, God, and SMS: Explorations in Supporting Social Action Through a Bangladeshi Mosque. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 5941--5953. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. S. Guha M. R. Rifat N. Dell S. I. Ahmed, M. R.Haque. 2017. Privacy, security, and surveillance in the Global South: A study of biometric mobile SIM registration in Bangladesh. In Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsÂă (CHI '17). Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Nithya Sambasivan, Ed Cutrell, Kentaro Toyama, and Bonnie Nardi. 2010. Intermediated technology use in developing communities. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2583--2592. Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Niloofar Safi Samghabadi, Suraj Maharjan, Alan Sprague, Raquel Diaz-Sprague, and Thamar Solorio. 2017. Detecting Nastiness in Social Media.Google ScholarGoogle Scholar
  85. Ari Schlesinger, Eshwar Chandrasekharan, Christina A. Masden, Amy S. Bruckman, W. Keith Edwards, and Rebecca E. Grinter. 2017. Situated Anonymity: Impacts of Anonymity, Ephemerality, and Hyper-Locality on Social Media. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 6912--6924. Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Shaheen Shariff and Rachel Gouin. 2006. Cyber-Dilemmas: Gendered Hierarchies, New Technologies and Cyber-Safety in Schools. Atlantis: Critical Studies in Gender, Culture Social Justice 31, 1 (2006), 27--37. http://journals.msvu.ca/index.php/atlantis/article/view/736Google ScholarGoogle Scholar
  87. Clay Shields and Brian Neil Levine. 2000. A Protocol for Anonymous Communication over the Internet. In Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS '00). ACM, New York, NY, USA, 33--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. Vivek K. Singh, Marie L. Radford, Qianjia Huang, and Susan Furrer. 2017. "They Basically Like Destroyed the School One Day": On Newer App Features and Cyberbullying in Schools. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, USA, 1210--1216. Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. We Are Social. {n. d.}. https://wearesocial.com/Google ScholarGoogle Scholar
  90. The Leading Research Experience Software. {n. d.}. https://www.qualtrics.com/Google ScholarGoogle Scholar
  91. The Daily Star. 2018. Human rights remain at alarming level: Report. https://www.thedailystar.net/country/818-women-rape-across-bangladesh-bd-2017-ain-o-salish-kendra/-ask-annual-report-1512859.Google ScholarGoogle Scholar
  92. Tamim Sujat. 2013. Ask.fm: Worth your time? https://www.thedailystar.net/news/ask-fm-worth-your-timeGoogle ScholarGoogle Scholar
  93. J Suler. 2004. The Online Disinhibition Effect. CyberPsychology Behavior 7, 3 (Jan 2004).Google ScholarGoogle ScholarCross RefCross Ref
  94. Sharifa Sultana, François Guimbretière, Phoebe Sengers, and Nicola Dell. 2018. Design Within a Patriarchal Society: Opportunities and Challenges in Designing for Rural Women in Bangladesh. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 536. Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Kentaro Toyama. 2011. Technology as amplifier in international development. In Proceedings of the 2011 iConference. ACM, 75--82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. Christopher Uggen and Amy Blackstone. 2004. Sexual Harassment as a Gendered Expression of Power. American Sociological Review 69, 1 (2004), 64--92.Google ScholarGoogle ScholarCross RefCross Ref
  97. UNICEF. {n. d.}. Girls' Education. https://www.unicef.org/bangladesh/education_463.htmGoogle ScholarGoogle Scholar
  98. Heidi Vandebosch and Katrien Van Cleemput. 2008. Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychology & Behavior 11, 4 (2008), 499--503.Google ScholarGoogle ScholarCross RefCross Ref
  99. Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, and Ben Y. Zhao. 2014. Whispers in the Dark: Analysis of an Anonymous Social Network. In Proceedings of the 2014 Conference on Internet Measurement Conference (IMC '14). ACM, New York, NY, USA, 137--150. Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. Mark Warschauer and Morgan Ames. 2010. CAN ONE LAPTOP PER CHILD SAVE THE WORLD'S POOR? Journal of International Affairs 64, 1 (2010), 33--51. http://www.jstor.org/stable/24385184Google ScholarGoogle Scholar
  101. Mark Warschauer, Michele Knobel, and Leeann Stone. 2004. Technology and equity in schooling: Deconstructing the digital divide. Educational policy 18, 4 (2004), 562--588.Google ScholarGoogle Scholar
  102. S Arzu Wasti and Lilia M Cortina. 2002. Coping in context: Sociocultural determinants of responses to sexual harassment. Journal of personality and social psychology 83, 2 (2002), 394.Google ScholarGoogle ScholarCross RefCross Ref
  103. wikipedia. {n. d.}. Facebook real-name policy controversy. https://en.wikipedia.org/w/index.php?title=Facebook_realname_policy_controversy&oldid=835271369Google ScholarGoogle Scholar
  104. Donghee Yvette Wohn, Casey Fiesler, Libby Hemphill, Munmun De Choudhury, and J. Nathan Matias. 2017. How to Handle Online Risks?: Discussing Content Curation and Moderation in Social Media. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '17). ACM, New York, NY, USA, 1271--1276. Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Susan Wyche. 2015. Exploring mobile phone and social media use in a Nairobi slum: a case for alternative approaches to design in ICTD. In Proceedings of the Seventh International Conference on Information and Communication Technologies and Development. ACM, 12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  106. Habiba Zaman. 1999. Violence against women in Bangladesh: issues and responses. In Women's Studies International Forum, Vol. 22. Elsevier, 37--48.Google ScholarGoogle Scholar
  107. Saraban Tahura Zaman, Lisa Gansheimer, Sofia Bordin Rolim, and Tahrima Mridha. 2017. Legal Action on Cyber Violence Against Women. Dhaka: Bangladesh Legal Aid Services Trust (BLAST). http://www.blast.org.bd/Google ScholarGoogle Scholar
  108. Adam G. Zimmerman. 2012. Online Aggression: Influences of Anonymity and Social Modeling. Ph.D. Dissertation.Google ScholarGoogle Scholar

Index Terms

  1. Online sexual harassment over anonymous social media in Bangladesh

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICTD '19: Proceedings of the Tenth International Conference on Information and Communication Technologies and Development
        January 2019
        422 pages
        ISBN:9781450361224
        DOI:10.1145/3287098

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 January 2019

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate22of116submissions,19%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader