ABSTRACT
Prior research on anonymous social media (ASM) has studied the issue of sexual harassment and has revealed its connections to stereotyping, aggression, interpersonal relationships, and mental health among others [16, 24, 60]. However, the characteristics of such harassment in the context of low and middle-income countries (LMICs) in the global south has not received enough attention in the literature. This paper presents our findings on the use of ASM in Bangladesh based on an anonymous online survey of (n= 291) participants and semi-structured interviews with (n= 27) participants. Our study shows a wide prevalence of sexual harassment on anonymous social networks in Bangladesh, the relationship between a closely-knitted communal culture and anonymous harassment, and the lack of infrastructural support for the victims. We also propose a set of design and policy recommendations for such anonymous social media to extend the current ICTD literature on ensuring a safer online environment for women, especially in an LMIC.
- A. Adikaram. 2016. Not So Silent: How Social Support is Given and Received in Dealing with Sexual Harassment in Sri Lankan Work-Places. NSBM Journal of Management 1, 2 (2016).Google Scholar
- Nova Ahmed. 2016. Discussing about sexual harassment (breaking silence): The role of technology. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 459--472. Google Scholar
Digital Library
- S.I. Ahmed, N. Ahmed, F. Hussain, and N. Kumar. 2016. Computing beyond gender-imposed limits. In Proceedings of the Second Workshop on Computing within Limits (ACM '16). 6. Google Scholar
Digital Library
- SI Ahmed, SJ Jackson, M Zaber, MB Morshed, MHB Ismail, and S Afrose. 2013. Ecologies of Use and Design: Individual and Social Uses of Mobile Phones Within Low-Literate Rickshaw-Puller Communities in Urban Bangladesh. Proc. DEV 4, 14 (2013), 1--14. Google Scholar
Digital Library
- Syed Ishtiaque Ahmed, Md Romael Haque, Jay Chen, and Nicola Dell. 2017. Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (2017), 17. Google Scholar
Digital Library
- Syed Ishtiaque Ahmed, Steven J Jackson, Nova Ahmed, Hasan Shahid Ferdous, Md Rashidujjaman Rifat, ASM Rizvi, Shamir Ahmed, and Rifat Sabbir Mansur. 2014. Protibadi: A platform for fighting sexual harassment in urban Bangladesh. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, 2695--2704. Google Scholar
Digital Library
- Syed Ishtiaque Ahmed, Steven J Jackson, Nova Ahmed, Hasan Shahid Ferdous, Md Rashidujjaman Rifat, ASM Rizvi, Shamir Ahmed, and Rifat Sabbir Mansur. 2014. Protibadi: A platform for fighting sexual harassment in urban Bangladesh. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, 2695--2704. Google Scholar
Digital Library
- Courtney E Ahrens. 2006. Being silenced: The impact of negative social reactions on the disclosure of rape. American Journal of Community Psychology 38, 3-4 (2006), 263--274.Google Scholar
Cross Ref
- Farhana Akter. 2018. Cyber violence against women: the case of Bangladesh. https://www.genderit.org/articles/cyber-violence-against-women-case-bangladeshGoogle Scholar
- Maía-del-Carmen Alarcón-del Amo, Carlota Lorenzo-Romero, and Miguel-ángel Gómez-Borja. 2016. Cultural influence on the adoption of social networking sites. International Journal of Market Research 58, 2 (2016), 277--300.Google Scholar
Cross Ref
- Monica Anderson. 2017. Nearly Half of Those Who Have Been Harassed Online Know Their Harasser. http://www.pewresearch.org/fact-tank/2017/08/08/nearly-half-of-those-who-have-been-harassed-online-know-their-harasser/Google Scholar
- Zahra Ashktorab and Jessica Vitak. 2016. Designing cyberbullying mitigation and prevention solutions through participatory design with teenagers. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 3895--3905. Google Scholar
Digital Library
- Shah Azam. 2007. Internet adoption and usage in Bangladesh. Japanese Journal of Administrative Science 20, 1 (2007), 43--54.Google Scholar
Cross Ref
- Squadbox:Fight back against harassment. 2018. https://squadbox.org/Google Scholar
- Charmain Badenhorst. 2011. Legal responses to cyber bullying and sexting in South Africa. Centre for Justice and Crime Prevention (CJCP) Issue Paper 10 (2011), 1--20.Google Scholar
- Azy Barak. 2005. Sexual harassment on the Internet. Social Science Computer Review 23, 1 (2005), 77--92. Google Scholar
Digital Library
- Simon Batchelor, Simon Hearn, Malcolm Peirce, Susan Sugden, and Mike Webb. 2003. ICT for development: Contributing to the millennium development goals-Lessons learned from seventeen infoDev projects. (2003).Google Scholar
- Eric PS Baumer, Shion Guha, Emily Quan, David Mimno, and Geri K Gay. 2015. Missing photos, suffering withdrawal, or finding freedom? How experiences of social media non-use influence the likelihood of reversion. Social Media+ Society 1, 2 (2015), 2056305115614851.Google Scholar
- Jodi K. Biber, Dennis Doverspike, Daniel Baznik, Alana Cober, and Barbara A. Ritter. 2002. Sexual Harassment in Online Communications: Effects of Gender and Discourse Medium. CYBERPSYCHOLOGY BEHAVIOR 5, 1 (2002).Google Scholar
- Shereen G Bingham and Lisa L Scherer. 1993. Factors associated with responses to sexual harassment and satisfaction with outcome. Sex Roles 29, 3-4 (1993), 239--269.Google Scholar
Cross Ref
- Jeremy Birnholtz. 2010. Adopt, adapt, abandon: Understanding why some young adults start, and then stop, using instant messaging. Computers in Human Behavior 26, 6 (2010), 1427--1433. Google Scholar
Digital Library
- Erik W Black, Kelsey Mezzina, and Lindsay A Thompson. 2016. Anonymous social media-Understanding the content and context of Yik Yak. Computers in Human Behavior 57 (2016), 17--22. Google Scholar
Digital Library
- Lindsay Blackwell, Tianying Chen, Sarita Schoenebeck, and Cliff Lampe. 2018. When Online Harassment is Perceived as Justified. In ICWSM.Google Scholar
- Paul C Buchanan. 2001. Love, or harassment? How employers should deal with a touchy issue. Business Law Today (2001), 8--11.Google Scholar
- Jenna Burrell. 2012. Invisible users: Youth in the Internet cafés of urban Ghana. Mit Press.Google Scholar
- Jenna Chang. 2008. The role of anonymity in deindividuated behavior: A comparison of deindividuation theory and the social identity model of deindividuation effects (SIDE). The Pulse 6, 1 (2008), 2--8.Google Scholar
- Mohamed Chawki. 2009. Anonymity in cyberspace: Finding the balance between privacy and security. International Journal of Technology Transfer and Commercialisation 9, 3 (2009), 183--199.Google Scholar
Cross Ref
- Ying Chen, Yilu Zhou, Sencun Zhu, and Heng Xu. 2012. Detecting offensive language in social media to protect adolescent online safety. In Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom). IEEE, 71--80. Google Scholar
Digital Library
- Anir Chowdhury. 2017. A tech revolution helps boost BangladeshâĂŹs development. http://blogs.worldbank.org/endpovertyinsouthasia/tech-revolution-helps-boost-bangladesh-s-development.Google Scholar
- Denzil Correa, Leandro Araújo Silva, Mainack Mondal, Fabrício Benevenuto, and Krishna P Gummadi. 2015. The Many Shades of Anonymity: Characterizing Anonymous Social Media Content.. In ICWSM. 71--80.Google Scholar
- Jill P Dimond, Michaelanne Dye, Daphne LaRose, and Amy S Bruckman. 2013. Hollaback!: the role of storytelling online in a social movement organization. In Proceedings of the 2013 conference on Computer supported cooperative work. ACM, 477--490. Google Scholar
Digital Library
- Abdul Azeez Erumban and Simon B De Jong. 2006. Cross-country differences in ICT adoption: A consequence of Culture? Journal of world business 41, 4 (2006), 302--314.Google Scholar
Cross Ref
- Nawaz Farhin. 2017. Apps Anonymous: Sarahah. https://www.dhakatribune.com/feature/tech/2017/08/09/apps-anonymous-sarahahGoogle Scholar
- Bianca Fileborn. 2014. Online activism and street harassment: Digital justice or shouting into the ether? Griffith Journal of Law & Human Dignity 2, 1 (2014).Google Scholar
- Brian J Fogg. 1998. Charismatic computers: Creating more likable and persuasive interactive technologies by leveraging principles from social psychology. (1998).Google Scholar
- Brian J Fogg. 2002. Persuasive technology: using computers to change what we think and do. Ubiquity 2002, December (2002), 5. Google Scholar
Digital Library
- Andrea Forte, Nazanin Andalibi, and Rachel Greenstadt. 2017. Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians.. In CSCW. 1800--1811. Google Scholar
Digital Library
- World Economic Forum. 2017. The Global Gender Gap Report 2017. http://www3.weforum.org/docs/WEF_GGGR_2017.pdf.Google Scholar
- Barney G Glaser, Anselm L Strauss, and Elizabeth Strutzel. 1968. The discovery of grounded theory; strategies for qualitative research. Nursing research 17, 4 (1968), 364.Google Scholar
- IGI Global. {n. d.}. What is Developing Countries. https://www.igi-global.com/dictionary/developing-countries/7401Google Scholar
- James E Gruber and Lars Bjorn. 1986. Women's responses to sexual harassment: An analysis of sociocultural, organizational, and personal resource models. Social Science Quarterly 67, 4 (1986), 814.Google Scholar
- Shion Guha and Stephen B Wicker. 2015. Do birds of a feather watch each other?: Homophily and social surveillance in location based social networks. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM, 1010--1020. Google Scholar
Digital Library
- Mark S Handcock and Krista J Gile. 2011. Comment: On the concept of snowball sampling. Sociological Methodology 41, 1 (2011), 367--371.Google Scholar
Cross Ref
- Laura Hlavach and William H Freivogel. 2011. Ethical implications of anonymous comments posted to online news stories. Journal of Mass Media Ethics 26, 1 (2011), 21--37.Google Scholar
Cross Ref
- Melissa R Ho, Thomas N Smyth, Matthew Kam, and Andy Dearden. 2009. Human-computer interaction for development: The past, present, and future. Information Technologies & International Development 5, 4 (2009), pp--1.Google Scholar
- E. Hopper. 2015. Individualist or Collectivist? How Culture Influences Behavior. Retrieved February 27, 2018 from https://healthypsych.com/individualist-or-collectivist-how-culture-influencesbehavior/Google Scholar
- Homa Hosseinmardi, Amir Ghasemianlangroodi, Richard Han, Qin Lv, and Shivakant Mishra. 2014. Towards understanding cyberbullying behavior in a semi-anonymous social network. In Advances in Social Networks Analysis and Mining (ASONAM), 2014 IEEE/ACM International Conference on. IEEE, 244--252. Google Scholar
Digital Library
- Judith E Hupcey. 1998. Clarifying the social support theory-research linkage. Journal of advanced nursing 27, 6 (1998), 1231--1241.Google Scholar
Cross Ref
- Hoftstede Insights. 2018. Country Comparison. https://www.hofstede-insights.com/country-comparison/bangladesh/Google Scholar
- Md. Nazrul Islam and Jatan Kumar Saha. 2011. Country Paper on Household ICT Access and Individual ICT Usage in Bangladesh. Technical Report. Bangladesh Bureau of Statistics.Google Scholar
- M. Berglund J Palme. 2002. Anonymity on the Internet. (2002).Google Scholar
- Linda A Jackson and Jin-Liang Wang. 2013. Cultural differences in social networking site use: A comparative study of China and the United States. Computers in human behavior 29, 3 (2013), 910--921. Google Scholar
Digital Library
- Steven J Jackson, Tarleton Gillespie, and Sandy Payette. 2014. The policy knot: re-integrating policy, practice and design in cscw studies of social computing. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. ACM, 588--602. Google Scholar
Digital Library
- Adam N Joinson. 2001. Self-disclosure in computer-mediated communication: The role of self-awareness and visual anonymity. European journal of social psychology 31, 2 (2001), 177--192.Google Scholar
- Ruogu Kang, Stephanie Brown, and Sara Kiesler. 2013. Why do people seek anonymity on the internet?: informing policy and design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2657--2666. Google Scholar
Digital Library
- Ruogu Kang, Laura Dabbish, and Katherine Sutton. 2016. Strangers on your phone: Why people use anonymous communication applications. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 359--370. Google Scholar
Digital Library
- Naveena Karusala and Neha Kumar. 2017. Women's Safety in Public Spaces: Examining the Efficacy of Panic Buttons in New Delhi. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 3340--3351. Google Scholar
Digital Library
- Farida C Khan. 2005. Gender violence and development discourse in Bangladesh. International Social Science Journal 57, 184 (2005), 219--230.Google Scholar
Cross Ref
- Robin M Kowalski and Susan P Limber. 2013. Psychological, physical, and academic correlates of cyberbullying and traditional bullying. Journal of Adolescent Health 53, 1 (2013), S13--S20.Google Scholar
Cross Ref
- Xiao Ma, Nazanin Andalibi, Louise Barkhuus, and Mor Naaman. 2017. People are either too fake or too real: opportunities and challenges in tie-based anonymity. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 1781--1793. Google Scholar
Digital Library
- Catharine A MacKinnon and Catharine A MacKinnon. 1979. Sexual harassment of working women: A case of sex discrimination. Number 19. Yale University Press.Google Scholar
- M Madi. 2017. Sarahah: The honesty app that's got everyone talking. Video.Google Scholar
- Kaitlin Mahar, Amy X. Zhang, and David Karger. 2018. Squadbox: A Tool To Combat Online Harassment Using Friendsourced Moderation. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (CHI EA '18). ACM, New York, NY, USA, Article D401, 4 pages. Google Scholar
Digital Library
- Gary Marx. 2004. Internet anonymity as a reflection of broader issues involving technology and society. Asia-Pacific Review 11, 1 (2004), 142--166.Google Scholar
Cross Ref
- Miller McPherson, Lynn Smith-Lovin, and James M Cook. 2001. Birds of a feather: Homophily in social networks. Annual review of sociology 27, 1 (2001), 415--444.Google Scholar
- Jessica Megarry. 2014. Online incivility or sexual harassment? Conceptualising women's experiences in the digital age. Women's Studies International Forum 47, Part A (2014), 46--55.Google Scholar
- Mhamud Murad. 2017. Dhaka ranked second in number of active Facebook users. bdnews24 (2017).Google Scholar
- Papreen Nahar, Miranda Van Reeuwijk, and Ria Reis. 2013. Contextualising sexual harassment of adolescent girls in Bangladesh. Reproductive health matters 21, 41 (2013), 78--86.Google Scholar
- Brian Nicholson, Yanuar Nugroho, and Nimmi Rangaswamy. 2016. Social media for development: Outlining debates, theory and praxis.Google Scholar
- Fayika F. Nova, MD Rashidujjaman Rifat, Pratyasha Saha, S.I. Ahmed, and Shion Guha. 2018. Silenced Voices: Understanding Sexual Harassment on Anonymous Social Media Among Bangladeshi Peopley. In Proceedings of the companion publication of the 21st ACM conference on Computer supported cooperative work social computing. ACM. Google Scholar
Digital Library
- Timo Tapani Ojanen, Pimpawun Boonmongkon, Ronnapoom Samakkeekarom, Nattharat Samoh, Mudjalin Cholratana, and Thomas Ebanan Guadamuz. 2015. Connections between online harassment and offline violence among youth in Central Thailand. Child abuse & neglect 44 (2015), 159--169.Google Scholar
- Joyojeet Pal, Tawfiq Ammari, Ramaswami Mahalingam, Ana Maria Huaita Alfaro, and Meera Lakshmanan. 2013. Marginality, aspiration and accessibility in ICTD. In Proceedings of the Sixth International Conference on Information and Communication Technologies and Development: Full Papers-Volume 1. ACM, 68--78. Google Scholar
Digital Library
- Tapan S Parikh and Edward D Lazowska. 2006. Designing an architecture for delivering mobile information services to the rural developing world. In Proceedings of the 15th international conference on World Wide Web. ACM, 791--800. Google Scholar
Digital Library
- Jessica A. Pater, Moon K. Kim, Elizabeth D. Mynatt, and Casey Fiesler. 2016. Characterizations of Online Harassment: Comparing Policies Across Social Media Platforms. In Proceedings of the 19th International Conference on Supporting Group Work (GROUP '16). ACM, New York, NY, USA, 369--374. Google Scholar
Digital Library
- Jessica A Pater, Moon K Kim, Elizabeth D Mynatt, and Casey Fiesler. 2016. Characterizations of online harassment: Comparing policies across social media platforms. In Proceedings of the 19th International Conference on Supporting Group Work. ACM, 369--374. Google Scholar
Digital Library
- Andreas Pfitzmann and Marit Hansen. 2008. Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology. http://dud.inf.tu-dresden.de/Anon_Terminology.shtml. http://dud.inf.tu-dresden.de/Anon_Terminology.shtml v0.31.Google Scholar
- Matthew Pittman and Brandon Reich. 2016. Social Media and Loneliness. Comput. Hum. Behav. 62, C (Sept. 2016), 155--167. Google Scholar
Digital Library
- T Postmes and R Spears. 1998. Deindividuation and antinormative behavior: A meta-analysis. Psychological Bulletin 123, 3 (5 1998), 238--259.Google Scholar
- Sushmita S. Preetha. 2015. Digital Sexual Harassment in Digital Bangladesh. https://www.thedailystar.net/in-focus/digital-sexual-harassment-digital-bangladesh-82480Google Scholar
- Sabina Faiz Rashid, Hilary Standing, Mahrukh Mohiuddin, and Farah Mahjabeen Ahmed. 2011. Creating a public space and dialogue on sexuality and rights: a case study from Bangladesh. Health Research Policy and Systems 9, 1 (2011), S12.Google Scholar
Cross Ref
- Md Rashidujjaman Rifat, Jay Chen, and Kentaro Toyama. 2017. Money, God, and SMS: Explorations in Supporting Social Action Through a Bangladeshi Mosque. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 5941--5953. Google Scholar
Digital Library
- S. Guha M. R. Rifat N. Dell S. I. Ahmed, M. R.Haque. 2017. Privacy, security, and surveillance in the Global South: A study of biometric mobile SIM registration in Bangladesh. In Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsÂă (CHI '17). Google Scholar
Digital Library
- Nithya Sambasivan, Ed Cutrell, Kentaro Toyama, and Bonnie Nardi. 2010. Intermediated technology use in developing communities. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2583--2592. Google Scholar
Digital Library
- Niloofar Safi Samghabadi, Suraj Maharjan, Alan Sprague, Raquel Diaz-Sprague, and Thamar Solorio. 2017. Detecting Nastiness in Social Media.Google Scholar
- Ari Schlesinger, Eshwar Chandrasekharan, Christina A. Masden, Amy S. Bruckman, W. Keith Edwards, and Rebecca E. Grinter. 2017. Situated Anonymity: Impacts of Anonymity, Ephemerality, and Hyper-Locality on Social Media. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 6912--6924. Google Scholar
Digital Library
- Shaheen Shariff and Rachel Gouin. 2006. Cyber-Dilemmas: Gendered Hierarchies, New Technologies and Cyber-Safety in Schools. Atlantis: Critical Studies in Gender, Culture Social Justice 31, 1 (2006), 27--37. http://journals.msvu.ca/index.php/atlantis/article/view/736Google Scholar
- Clay Shields and Brian Neil Levine. 2000. A Protocol for Anonymous Communication over the Internet. In Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS '00). ACM, New York, NY, USA, 33--42. Google Scholar
Digital Library
- Vivek K. Singh, Marie L. Radford, Qianjia Huang, and Susan Furrer. 2017. "They Basically Like Destroyed the School One Day": On Newer App Features and Cyberbullying in Schools. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, USA, 1210--1216. Google Scholar
Digital Library
- We Are Social. {n. d.}. https://wearesocial.com/Google Scholar
- The Leading Research Experience Software. {n. d.}. https://www.qualtrics.com/Google Scholar
- The Daily Star. 2018. Human rights remain at alarming level: Report. https://www.thedailystar.net/country/818-women-rape-across-bangladesh-bd-2017-ain-o-salish-kendra/-ask-annual-report-1512859.Google Scholar
- Tamim Sujat. 2013. Ask.fm: Worth your time? https://www.thedailystar.net/news/ask-fm-worth-your-timeGoogle Scholar
- J Suler. 2004. The Online Disinhibition Effect. CyberPsychology Behavior 7, 3 (Jan 2004).Google Scholar
Cross Ref
- Sharifa Sultana, François Guimbretière, Phoebe Sengers, and Nicola Dell. 2018. Design Within a Patriarchal Society: Opportunities and Challenges in Designing for Rural Women in Bangladesh. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 536. Google Scholar
Digital Library
- Kentaro Toyama. 2011. Technology as amplifier in international development. In Proceedings of the 2011 iConference. ACM, 75--82. Google Scholar
Digital Library
- Christopher Uggen and Amy Blackstone. 2004. Sexual Harassment as a Gendered Expression of Power. American Sociological Review 69, 1 (2004), 64--92.Google Scholar
Cross Ref
- UNICEF. {n. d.}. Girls' Education. https://www.unicef.org/bangladesh/education_463.htmGoogle Scholar
- Heidi Vandebosch and Katrien Van Cleemput. 2008. Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychology & Behavior 11, 4 (2008), 499--503.Google Scholar
Cross Ref
- Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, and Ben Y. Zhao. 2014. Whispers in the Dark: Analysis of an Anonymous Social Network. In Proceedings of the 2014 Conference on Internet Measurement Conference (IMC '14). ACM, New York, NY, USA, 137--150. Google Scholar
Digital Library
- Mark Warschauer and Morgan Ames. 2010. CAN ONE LAPTOP PER CHILD SAVE THE WORLD'S POOR? Journal of International Affairs 64, 1 (2010), 33--51. http://www.jstor.org/stable/24385184Google Scholar
- Mark Warschauer, Michele Knobel, and Leeann Stone. 2004. Technology and equity in schooling: Deconstructing the digital divide. Educational policy 18, 4 (2004), 562--588.Google Scholar
- S Arzu Wasti and Lilia M Cortina. 2002. Coping in context: Sociocultural determinants of responses to sexual harassment. Journal of personality and social psychology 83, 2 (2002), 394.Google Scholar
Cross Ref
- wikipedia. {n. d.}. Facebook real-name policy controversy. https://en.wikipedia.org/w/index.php?title=Facebook_realname_policy_controversy&oldid=835271369Google Scholar
- Donghee Yvette Wohn, Casey Fiesler, Libby Hemphill, Munmun De Choudhury, and J. Nathan Matias. 2017. How to Handle Online Risks?: Discussing Content Curation and Moderation in Social Media. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '17). ACM, New York, NY, USA, 1271--1276. Google Scholar
Digital Library
- Susan Wyche. 2015. Exploring mobile phone and social media use in a Nairobi slum: a case for alternative approaches to design in ICTD. In Proceedings of the Seventh International Conference on Information and Communication Technologies and Development. ACM, 12. Google Scholar
Digital Library
- Habiba Zaman. 1999. Violence against women in Bangladesh: issues and responses. In Women's Studies International Forum, Vol. 22. Elsevier, 37--48.Google Scholar
- Saraban Tahura Zaman, Lisa Gansheimer, Sofia Bordin Rolim, and Tahrima Mridha. 2017. Legal Action on Cyber Violence Against Women. Dhaka: Bangladesh Legal Aid Services Trust (BLAST). http://www.blast.org.bd/Google Scholar
- Adam G. Zimmerman. 2012. Online Aggression: Influences of Anonymity and Social Modeling. Ph.D. Dissertation.Google Scholar
Index Terms
Online sexual harassment over anonymous social media in Bangladesh
Recommendations
Silenced Voices: Understanding Sexual Harassment on Anonymous Social Media Among Bangladeshi People
CSCW '18 Companion: Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social ComputingThis paper presents the findings on the use of Anonymous Social Media (ASM) in Bangladesh based on an anonymous online survey of 291 participants and semi-structured interviews with 27 participants. Our study shows a wide prevalence of sexual harassment ...
Characterizations of Online Harassment: Comparing Policies Across Social Media Platforms
GROUP '16: Proceedings of the 2016 ACM International Conference on Supporting Group WorkHarassment in online spaces is increasingly part of public debate and concern. Pervasive problems like cyberbullying, hate speech, and the glorification of self-harm have highlighted the breadth and depth of harassment taking place online. In this study ...
Social Support, Reciprocity, and Anonymity in Responses to Sexual Abuse Disclosures on Social Media
Seeking and providing support is challenging. When people disclose sensitive information, audience responses can substantially impact the discloser's wellbeing. We use mixed methods to understand responses to online sexual abuse-related disclosures on ...




Comments