skip to main content
research-article
Open Access

"Facebook Promotes More Harassment": Social Media Ecosystem, Skill and Marginalized Hijra Identity in Bangladesh

Published:22 April 2021Publication History
Skip Abstract Section

Abstract

Social interaction across multiple online platforms is a challenge for gender and sexual minorities (GSM) due to the stigmatization they face, which increases the complexity of their self-presentation decisions. These online interactions and identity disclosures can be more complicated for GSM in non-Western contexts due to consequentially different audiences and perceived affordances by the users, and limited baseline understanding of the conflation of these two with local norms and the opportunities they practically represent. Using focus group discussions and semi-structured interviews, we engaged with 61 Hijra individuals from Bangladesh, a severely stigmatized GSM from south Asia, to understand their overall online participation and disclosure behaviors through the lens of personal social media ecosystems. We find that along with platform audiences, affordances, and norms, participant skill/knowledge, and cultural influences also impact navigation through multiple platforms, resulting in differential benefits from privacy features. This impacts how Hijra perceive online spaces, and shape their self-presentation and disclosure behaviors over time. Content Warning: This paper discusses graphic contents (e.g. rape and sexual harassment) related to Hijra.

References

  1. [n.d.]. https://badhanbd.org/about-us/Google ScholarGoogle Scholar
  2. [n.d.]. Bangladesh Minimum Wage Rate 2019. https://www.minimum-wage.org/international/bangladeshGoogle ScholarGoogle Scholar
  3. [n.d.]. Bigo live--live stream, live video, live chat - apps on google play. https://play.google.com/store/apps/details? id=sg.bigo.liveGoogle ScholarGoogle Scholar
  4. 2014. Facebook Diversity. https://www.facebook.com/photo.php?fbid=567587973337709Google ScholarGoogle Scholar
  5. Muhammad Ahmed Abdullah, Zeeshan Basharat, Bilal Kamal, Nargis Yousaf Sattar, Zahra Fatima Hassan, Asghar Dil Jan, and Anum Shafqat. 2012. Is social exclusion pushing the Pakistani Hijras (Transgenders) towards commercial sex work? a qualitative study. BMC international health and human rights 12, 1 (2012), 32.Google ScholarGoogle Scholar
  6. Alex A Ahmed. 2018. Trans Competent Interaction Design: A Qualitative Study on Voice, Identity, and Technology. Interacting with Computers 30, 1 (2018), 53--71.Google ScholarGoogle ScholarCross RefCross Ref
  7. Ibtisam Ahmed. 2017. The Hijra community and the complex path to decolonising gender in Bangladesh. https: //bit.ly/33ygAwXGoogle ScholarGoogle Scholar
  8. Syed Ishtiaque Ahmed, Md Romael Haque, Jay Chen, and Nicola Dell. 2017. Digital privacy challenges with shared mobile phone use in bangladesh. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (2017), 1--20.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Syed Ishtiaque Ahmed, Steven J Jackson, Maruf Zaber, Mehrab Bin Morshed, Md Habibullah Bin Ismail, and Sharmin Afrose. 2013. Ecologies of use and design: individual and social practices of mobile phone use within low-literate rickshawpuller communities in urban Bangladesh. In Proceedings of the 4th Annual Symposium on Computing for Development. 1--10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Sigma Ainul, Ashish Bajracharya, Laura Reichenbach, and Kate Gilles. 2017. Adolescents in Bangladesh: A situation analysis of programmatic approaches to sexual and reproductive health education and services. (2017).Google ScholarGoogle Scholar
  11. Arshad Altaf, Aysha Zahidie, and Ajmal Agha. 2012. Comparing risk factors of HIV among hijra sex workers in Larkana and other cities of Pakistan: an analytical cross sectional study. BMC public health 12, 1 (2012), 279.Google ScholarGoogle Scholar
  12. Nazanin Andalibi, Oliver L Haimson, Munmun De Choudhury, and Andrea Forte. 2018. Social support, reciprocity, and anonymity in responses to sexual abuse disclosures on social media. ACM Transactions on Computer-Human Interaction (TOCHI) 25, 5 (2018), 1--35.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Nazanin Andalibi, Pinar Ozturk, and Andrea Forte. 2017. Sensitive Self-disclosures, Responses, and Social Support on Instagram: the case of# depression. In Proceedings of the 2017 ACM conference on computer supported cooperative work and social computing. 1485--1500.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Keith Atkinson, Jaclyn Barnes, Judith Albee, Peter Anttila, Judith Haataja, Kanak Nanavati, Kelly Steelman, and Charles Wallace. 2016. Breaking barriers to digital literacy: An intergenerational social-cognitive approach. In Proceedings of the 18th International ACM SIGACCESS Conference on Computers and Accessibility. 239--244.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Abdul Aziz and Sameena Azhar. 2019. Social exclusion and official recognition of hijra in Bangladesh. (2019).Google ScholarGoogle Scholar
  16. Paola Bacchetta. 1999. When the (Hindu) nation exiles its queers. Social Text 61 (1999), 141--166.Google ScholarGoogle Scholar
  17. Miriam Bartsch and Tobias Dienlin. 2016. Control your Facebook: An analysis of online privacy literacy. Computers in Human Behavior 56 (2016), 147--154.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Adam Bates, Trish Hobman, and Beth T Bell. 2020. "Let Me Do What I Please With It... Don't Decide My Identity For Me": LGBTQ+ Youth Experiences of Social Media in Narrative Identity Development. Journal of Adolescent Research 35, 1 (2020), 51--83.Google ScholarGoogle ScholarCross RefCross Ref
  19. Eric PS Baumer, Shion Guha, Emily Quan, David Mimno, and Geri K Gay. 2015. Missing photos, suffering withdrawal, or finding freedom? How experiences of social media non-use influence the likelihood of reversion. Social Media+ Society 1, 2 (2015), 2056305115614851.Google ScholarGoogle Scholar
  20. Max Bearak. 2016. Why terms like 'transgender' don't work for India's 'third-gender' communities. https: //wapo.st/2yXVvOjGoogle ScholarGoogle Scholar
  21. France Bélanger and Robert E Crossler. 2011. Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly (2011), 1017--1041.Google ScholarGoogle Scholar
  22. Victoria Betton, Rohan Borschmann, Mary Docherty, Stephen Coleman, Mark Brown, and Claire Henderson. 2015. The role of social media in reducing stigma and discrimination. The British Journal of Psychiatry 206, 6 (2015), 443--444.Google ScholarGoogle ScholarCross RefCross Ref
  23. Brent L Bilodeau and Kristen A Renn. 2005. Analysis of LGBT identity development models and implications for practice. New directions for student services 2005, 111 (2005), 25--39.Google ScholarGoogle Scholar
  24. Rena Bivens. 2017. The gender binary will not be deprogrammed: Ten years of coding gender on Facebook. New Media & Society 19, 6 (2017), 880--898.Google ScholarGoogle ScholarCross RefCross Ref
  25. Rena Bivens and Oliver L Haimson. 2016. Baking gender into social media design: How platforms shape categories for users and advertisers. Social Media+ Society 2, 4 (2016), 2056305116672486.Google ScholarGoogle Scholar
  26. Lindsay Blackwell, Jean Hardy, Tawfiq Ammari, Tiffany Veinot, Cliff Lampe, and Sarita Schoenebeck. 2016. LGBT parents and social media: Advocacy, privacy, and disclosure during shifting social movements. In Proceedings of the 2016 CHI conference on human factors in computing systems. ACM, 610--622.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. C Bowker Geoffrey and Susan Leigh Star. 1999. Sorting Things out: classification and its consequences.Google ScholarGoogle Scholar
  28. D Boyd. 2008. Why youth (heart) social network sites: The changing place of digital media in teenage social life. Youth, identity, and digital media (2008), 119--142.Google ScholarGoogle Scholar
  29. Melanie E Brewster, Bonnie Moradi, Cirleen DeBlaere, and Brandon L Velez. 2013. Navigating the borderlands: The roles of minority stressors, bicultural self-efficacy, and cognitive flexibility in the mental health of bisexual individuals. Journal of Counseling Psychology 60, 4 (2013), 543.Google ScholarGoogle ScholarCross RefCross Ref
  30. Janne CH Bromseth. 2002. Public places--public activities. Methodological approaches and ethical dilemmas in research on computer-mediated communication contexts. SKIKT'Researchers--Researching IT in context, University of Oslo (2002), 33--61.Google ScholarGoogle Scholar
  31. Liam Bullingham and Ana C Vasconcelos. 2013. "The presentation of self in the online world': Goffman and the study of online identities. Journal of information science 39, 1 (2013), 101--112.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Venkatesan Chakrapani, Priya Babu, and Timothy Ebenezer. 2004. Hijras in sex work face discrimination in the Indian health-care system. Research for sex work 7 (2004), 12--14.Google ScholarGoogle Scholar
  33. Yunan Chen and Heng Xu. 2013. Privacy management in dynamic groups: understanding information privacy in medical practices. In Proceedings of the 2013 conference on Computer supported cooperative work. 541--552.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Margaret Cooper and Kristina Dzara. 2010. The Facebook revolution: LGBT identity and activism. In LGBT identity and online new media. Routledge, 114--126.Google ScholarGoogle Scholar
  35. Katie Davis and Emily Weinstein. 2017. Identity development in the digital age: An Eriksonian perspective. In Identity, sexuality, and relationships among emerging adults in the digital age. IGI Global, 1--17.Google ScholarGoogle Scholar
  36. Ralf De Wolf, Koen Willaert, and Jo Pierson. 2014. Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior 35 (2014), 444--454.Google ScholarGoogle ScholarCross RefCross Ref
  37. Mintu Deshwara and Andrew Eagle. 2017. Taking on taboos. https://www.thedailystar.net/backpage/taking-taboos-1486447Google ScholarGoogle Scholar
  38. Tribune Desk. 2019. Report: Bribery threat risk high in Bangladesh. https://www.dhakatribune.com/bangladesh/ corruption/2019/11/14/report-bribery-threat-risk-high-in-bangladeshGoogle ScholarGoogle Scholar
  39. Michael A DeVito, Jeremy Birnholtz, and Jeffery T Hancock. 2017. Platforms, people, and perception: Using affordances to understand self-presentation on social media. In Proceedings of the 2017 ACM conference on computer supported cooperative work and social computing. ACM, 740--754.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Michael A DeVito, Jeremy Birnholtz, Jeffery T Hancock, Megan French, and Sunny Liu. 2018. How people form folk theories of social media feeds and what it means for how we study self-presentation. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Michael A DeVito, Ashley Marie Walker, and Jeremy Birnholtz. 2018. 'Too Gay for Facebook': Presenting LGBTQ+ Identity Throughout the Personal Social Media Ecosystem. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 44.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Sreyoshi Dey. 2019. Queering Virtual Groups: Exploring Facebook Groups as a space for identity construction and social justice among the LGBTQ community in India. (2019).Google ScholarGoogle Scholar
  43. Stefanie Duguay. 2016. "He has a way gayer Facebook than I do": Investigating sexual identity disclosure and context collapse on a social networking site. New Media & Society 18, 6 (2016), 891--907.Google ScholarGoogle ScholarCross RefCross Ref
  44. Casey Fiesler, Alyson Young, Tamara Peyton, Amy S Bruckman, Mary Gray, Jeff Hancock, and Wayne Lutters. 2015. Ethics for studying online sociotechnical systems in a big data world. In Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative Work & Social Computing. 289--292.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Luciano Floridi. 2014. Open data, data protection, and group privacy. Philosophy & Technology 27, 1 (2014), 1--3.Google ScholarGoogle ScholarCross RefCross Ref
  46. M Paz Galupo, Tiana E Krum, D Brienne Hagen, Kirsten A Gonzalez, and LA Bauerband. 2014. Disclosure of transgender identity and status in the context of friendship. Journal of LGBT Issues in Counseling 8, 1 (2014), 25--42.Google ScholarGoogle ScholarCross RefCross Ref
  47. Shane Gannon. 2007. With Respect to Sex: Negotiating Hijra Identity in South India. Journal of the History of Sexuality 16, 2 (2007), 328--330.Google ScholarGoogle ScholarCross RefCross Ref
  48. Franca Garzotto and Heidi Schelhowe. 2008. Marginalized young people: inclusion through ICT. In Proceedings of the 7th international Conference on interaction Design and Children. 101--104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Banhishikha Ghosh. 2017. Representation of the Hijra: Need for Social Work Intervention. (12 2017).Google ScholarGoogle Scholar
  50. Tarleton Gillespie. 2014. The relevance of algorithms. Media technologies: Essays on communication, materiality, and society 167 (2014), 167.Google ScholarGoogle Scholar
  51. Barney G Glaser, Anselm L Strauss, and Elizabeth Strutzel. 1968. The discovery of grounded theory; strategies for qualitative research. Nursing research 17, 4 (1968), 364.Google ScholarGoogle Scholar
  52. Ina Goel. 2016. Hijra communities of Delhi. Sexualities 19, 5-6 (2016), 535--546.Google ScholarGoogle ScholarCross RefCross Ref
  53. Erving Goffman et al. 1978. The presentation of self in everyday life. Harmondsworth London.Google ScholarGoogle Scholar
  54. Oliver L Haimson. 2016. Transgender experiences with online harassment. In Social Computing Symposium.Google ScholarGoogle Scholar
  55. Oliver L Haimson. 2017. The Social Complexities of Transgender Identity Disclosure on Social Network Sites. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 280--285.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Oliver L Haimson, Jed R Brubaker, Lynn Dombrowski, and Gillian R Hayes. 2015. Disclosure, stress, and support during gender transition on Facebook. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. 1176--1190.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Oliver L Haimson, Jed R Brubaker, Courtney Loder, Lynn Dombrowski, and Gillian R Hayes. 2015. User Response to Facebook's Custom Gender Options. iConference 2015 Proceedings (2015).Google ScholarGoogle Scholar
  58. Oliver L Haimson, Dykee Gorrell, Denny L Starks, and Zu Weinger. 2020. Designing Trans Technology: Defining Challenges and Envisioning Community-Centered Solutions. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Oliver L Haimson and Anna Lauren Hoffmann. 2016. Constructing and enforcing" authentic" identity online: Facebook, real names, and non-normative identities. First Monday 21, 6 (2016).Google ScholarGoogle Scholar
  60. SM Taiabul Haque, Pratyasha Saha, Muhammad Sajidur Rahman, and Syed Ishtiaque Ahmed. 2019. Of Ulti,'hajano', and "Matachetar otanetak datam" Exploring Local Practices of Exchanging Confidential and Sensitive Information in Urban Bangladesh. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 1--22.Google ScholarGoogle Scholar
  61. Eszter Hargittai and Aaron Shaw. 2015. Mind the skills gap: the role of Internet know-how and gender in differentiated contributions to Wikipedia. Information, communication & society 18, 4 (2015), 424--442.Google ScholarGoogle Scholar
  62. Adnan Hossain. 2017. The paradox of recognition: hijra, third gender and sexual rights in Bangladesh. Culture, Health & Sexuality 19, 12 (2017), 1418--1431.Google ScholarGoogle ScholarCross RefCross Ref
  63. Vikas Jayadeva. 2017. Understanding the Mental Health of the Hijra Women of India. American Journal of Psychiatry Residents' Journal 12, 05 (2017), 7--9.Google ScholarGoogle ScholarCross RefCross Ref
  64. Lubna Jebin and Umme Farhana. 2015. The Rights of Hijras in Bangladesh: An Overview. (06 2015).Google ScholarGoogle Scholar
  65. Shagun Jhaver, Sucheta Ghoshal, Amy Bruckman, and Eric Gilbert. 2018. Online harassment and content moderation: The case of blocklists. ACM Transactions on Computer-Human Interaction (TOCHI) 25, 2 (2018), 1--33.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Adam N Joinson. 2008. Looking at, looking up or keeping up with people? Motives and use of Facebook. In Proceedings of the SIGCHI conference on Human Factors in Computing Systems. 1027--1036.Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Os Keyes. 2018. The misgendering machines: Trans/HCI implications of automatic gender recognition. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 1--22.Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Asif Yar Khan. 2016. Police to rein in 'fake' Hijras. https://www.thehindu.com/news/cities/Hyderabad/police-to-rein-in-fake-hijras/article8278342.eceGoogle ScholarGoogle Scholar
  69. Sharful Islam Khan, Mohammed Iftekher Hussain, Shaila Parveen, Mahbubul Islam Bhuiyan, Gorkey Gourab, Golam Faruk Sarker, Shohael Mahmud Arafat, and Joya Sikder. 2009. Living on the extreme margin: social exclusion of the transgender population (hijra) in Bangladesh. Journal of health, population, and nutrition 27, 4 (2009), 441.Google ScholarGoogle ScholarCross RefCross Ref
  70. Kyle Knight. 2014. Surveying Nepal's Sexual and Gender Minorities: An Inclusive Approach. (2014).Google ScholarGoogle Scholar
  71. Kyle Knight. 2017. "I Want to Live With My Head Held High": Abuses in Bangladesh's Legal Recognition of Hijras. https://www.hrw.org/report/2016/12/23/i-want-live-my-head-held-high/abuses-bangladeshs-legal-recognition-hijrasGoogle ScholarGoogle Scholar
  72. P Krishna. 2010. Sexuality, queerness and Internet technologies in Indian context. The Centre for Internet and Society 13 (2010).Google ScholarGoogle Scholar
  73. Neha Kumar, Marisol Wong-Villacres, Naveena Karusala, Aditya Vishwanath, Arkadeep Kumar, and Azra Ismail. 2019. Aspirations-based design. In Proceedings of the Tenth International Conference on Information and Communication Technologies and Development. 1--11.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Laura E Kuper and Brian S Mustanski. 2014. Using narrative analysis to identify patterns of Internet influence on the identity development of same-sex attracted youth. Journal of Adolescent Research 29, 4 (2014), 499--532.Google ScholarGoogle ScholarCross RefCross Ref
  75. Mark R Leary and Robin M Kowalski. 1990. Impression management: A literature review and two-component model. Psychological bulletin 107, 1 (1990), 34.Google ScholarGoogle Scholar
  76. Ada Lerner, Helen Yuxun He, Anna Kawakami, Silvia Catherine Zeamer, and Roberto Hoyle. 2020. Privacy and Activism in the Transgender Community. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Eden Litt and Eszter Hargittai. 2016. The imagined audience on social network sites. Social Media+ Society 2, 1 (2016), 2056305116633482.Google ScholarGoogle Scholar
  78. Sonia Livingstone. 2007. Strategies of parental regulation in the media-rich home. Computers in human behavior 23, 2 (2007), 920--941.Google ScholarGoogle Scholar
  79. Carien Lubbe. 2013. LGBT parents and their children: Non-Western research and perspectives. In LGBT-Parent Families. Springer, 209--223.Google ScholarGoogle Scholar
  80. Jose Marichal. 2013. Political Facebook groups: Micro-activism and the digital front stage. First Monday 18, 12 (2013).Google ScholarGoogle Scholar
  81. Julie McCarthy. 2014. A journey of pain and beauty: On becoming transgender in India. NPR (National Public Radio) (2014).Google ScholarGoogle Scholar
  82. Elizabeth McConnell, Bálint Néray, Bernie Hogan, Aaron Korpak, Antonia Clifford, and Michelle Birkett. 2018. ?Everybody puts their whole life on Facebook": Identity Management and the online social networks of LGBTQ youth. International journal of environmental research and public health 15, 6 (2018), 1078.Google ScholarGoogle Scholar
  83. Indrani Medhi, SN Nagasena Gautama, and Kentaro Toyama. 2009. A comparison of mobile money-transfer UIs for non-literate and semi-literate users. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1741--1750.Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Aleksa Milanovi?. 2017. The Impact of Western Society onto the Identity Politics of Sexual and Gender Minorities in Colonial and Post-colonial India. In Regimes of Invisibility in Contemporary Art, Theory and Culture. Springer, 61--73.Google ScholarGoogle Scholar
  85. Rahul Mitra. 2010. Resisting the spectacle of pride: Queer Indian bloggers as interpretive communities. Journal of broadcasting & electronic media 54, 1 (2010), 163--178.Google ScholarGoogle ScholarCross RefCross Ref
  86. Rahul Mitra and Radhika Gajjala. 2008. Queer blogging in Indian digital diasporas: A dialogic encounter. Journal of Communication Inquiry 32, 4 (2008), 400--423.Google ScholarGoogle ScholarCross RefCross Ref
  87. Serena Nanda. 1986. The Hijras of India: Cultural and individual dimensions of an institutionalized third gender role. Journal of Homosexuality 11, 3-4 (1986), 35--54.Google ScholarGoogle ScholarCross RefCross Ref
  88. David Nemer. 2016. Online favela: The use of social media by the marginalized in Brazil. Information Technology for Development 22, 3 (2016), 364--379.Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. David Nemer, Shad Gross, and Nic True. 2013. Materializing digital inequalities: the digital artifacts of the marginalized in Brazil. In Proceedings of the Sixth International Conference on Information and Communications Technologies and Development: Notes-Volume 2. 108--111.Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. Alireza Nili, Mary Tate, and David Johnstone. 2017. A framework and approach for analysis of focus group data in information systems research. Communications of the Association for Information Systems 40, Article 1 (2017), 1--21.Google ScholarGoogle Scholar
  91. Sladjana V Nørskov and Morten Rask. 2011. Observation of online communities: A discussion of online and offline observer roles in studying development, cooperation and coordination in an open source software environment. In Forum Qualitative Sozialforschung/Forum: Qualitative Social Research, Vol. 12.Google ScholarGoogle Scholar
  92. Fayika Farhat Nova, Michael Ann DeVito, Pratyasha Saha, Kazi Shohanur Rashid, Shashwata Roy Turzo, Sadia Afrin, and Shion Guha. 2020. Understanding How Marginalized Hijra in Bangladesh Navigate Complex Social Media Ecosystem. In Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing. 353--358.Google ScholarGoogle Scholar
  93. Fayika Farhat Nova, MD Rifat, Pratyasha Saha, Syed Ishtiaque Ahmed, and Shion Guha. 2019. Online sexual harassment over anonymous social media in Bangladesh. In Proceedings of the Tenth International Conference on Information and Communication Technologies and Development. ACM, 1.Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. Fayika Farhat Nova, Pratyasha Saha, Md Shafiur Raihan Shafi, and Shion Guha. 2019. Sharing Of Public Harassment Experiences on Social Media in Bangladesh. In Conference Companion Publication of the 2019 on Computer Supported Cooperative Work and Social Computing. 324--329.Google ScholarGoogle Scholar
  95. Joyojeet Pal, Tawfiq Ammari, Ramaswami Mahalingam, Ana Maria Huaita Alfaro, and Meera Lakshmanan. 2013. Marginality, aspiration and accessibility in ICTD. In Proceedings of the Sixth International Conference on Information and Communication Technologies and Development: Full Papers-Volume 1. 68--78.Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. Yong Jin Park. 2013. Digital literacy and privacy behavior online. Communication Research 40, 2 (2013), 215--236.Google ScholarGoogle ScholarCross RefCross Ref
  97. Yong Jin Park, Scott W Campbell, and Nojin Kwak. 2012. Affect, cognition and reward: Predictors of privacy protection online. Computers in Human Behavior 28, 3 (2012), 1019--1027.Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. Yong Jin Park and S Mo Jang. 2014. Understanding privacy knowledge and skill in mobile communication. Computers in Human Behavior 38 (2014), 296--303.Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. Vrushali Patil. 2018. The heterosexual matrix as imperial effect. Sociological Theory 36, 1 (2018), 1--26.Google ScholarGoogle ScholarCross RefCross Ref
  100. Signe Ravn, Ashley Barnwell, and Barbara Barbosa Neves. 2020. What Is "publicly available data"? Exploring blurred public--private boundaries and ethical practices through a case study on Instagram. Journal of Empirical Research on Human Research Ethics 15, 1--2 (2020), 40--45.Google ScholarGoogle Scholar
  101. Alan Rubel. 2016. The Black Box Society: The Secret Algorithms that Control Money and Information, by Frank Pasquale. Cambridge: Harvard University Press, 2015. 320 pp. ISBN 978-0674368279. Business Ethics Quarterly 26, 4 (2016), 568--571.Google ScholarGoogle Scholar
  102. Noorie Safa. 2016. Inclusion of Excluded: Integrating Need-Based Concerns of Hijra Population in Mainstream Development. Sociology and Anthropology 4 (2016), 450--458.Google ScholarGoogle ScholarCross RefCross Ref
  103. Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gaytán-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. 2018. "Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 127--142.Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. Nithya Sambasivan, Ed Cutrell, Kentaro Toyama, and Bonnie Nardi. 2010. Intermediated technology use in developing communities. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2583--2592.Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Riddhi Sandil, Matthew Robinson, Melanie E Brewster, Stephanie Wong, and Elizabeth Geiger. 2015. Negotiating multiple marginalizations: Experiences of South Asian LGBQ individuals. Cultural Diversity and Ethnic Minority Psychology 21, 1 (2015), 76.Google ScholarGoogle ScholarCross RefCross Ref
  106. Morgan Klaus Scheuerman, Stacy M Branham, and Foad Hamidi. 2018. Safe spaces and safe places: Unpacking technology-mediated experiences of safety and harm with transgender people. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 155.Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. Morgan Klaus Scheuerman, Jacob M Paul, and Jed R Brubaker. 2019. How Computers See Gender: An Evaluation of Gender Classification in Commercial Facial Analysis Services. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 1--33.Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. Syeda S. Shawkat. 2016. Construction of the Hijra Identity. Ph.D. Dissertation. BRAC University. http://dspace.bracu. ac.bd/xmlui/bitstream/handle/10361/7804/16217005_ESS.pdf'sequence=1&isAllowed=yGoogle ScholarGoogle Scholar
  109. GC Spivak. 1988. Can the subaltern speak? Can the subaltern speak? Reflections on the history of an idea (pp. 21--78).Google ScholarGoogle Scholar
  110. Jennifer Jiyoung Suh, Miriam J Metzger, Scott A Reid, and Amr El Abbadi. 2018. Distinguishing group privacy from personal privacy: The effect of group inference technologies on privacy perceptions and behaviors. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 1--22.Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Sharifa Sultana and Syed Ishtiaque Ahmed. 2019. Witchcraft and hci: Morality, modernity, and postcolonial computing in rural bangladesh. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. Catalina L Toma and Cassandra L Carlson. 2015. How do Facebook users believe they come across in their profiles?: A meta-perception approach to investigating Facebook self-presentation. Communication Research Reports 32, 1 (2015), 93--101.Google ScholarGoogle ScholarCross RefCross Ref
  113. Kentaro Toyama. 2017. Design, needs, and aspirations in international development. In International Conference on Social Implications of Computers in Developing Countries. Springer, 24--32.Google ScholarGoogle ScholarCross RefCross Ref
  114. Zeynep Turan, Hasan Tinmaz, and Yuksel Goktas. 2013. The reasons for non-use of social networking websites by university students. Comunicar 21, 41 (2013), 137--145.Google ScholarGoogle ScholarCross RefCross Ref
  115. Jessica Vitak and Jinyoung Kim. 2014. You can't block people offline: examining how Facebook's affordances shape the disclosure process. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. ACM, 461--474.Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. Ashley Marie Walker and Michael A DeVito. 2020. "'More gay'fits in better": Intracommunity Power Dynamics and Harms in Online LGBTQ+ Spaces. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. Joe Wallen. 2019. Transgender community in Bangladesh finally granted full voting rights. https://bit.ly/2MjbEqrGoogle ScholarGoogle Scholar
  118. Yanbo Wang, Qingfei Min, and Shengnan Han. 2016. Understanding the effects of trust and risk on individual behavior toward social media platforms: A meta-analysis of the empirical evidence. Computers in Human Behavior 56 (2016), 34--44.Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. Bradley M Weisz, Diane M Quinn, and Michelle K Williams. 2016. Out and healthy: Being more ?out" about a concealable stigmatized identity may boost the health benefits of social support. Journal of Health Psychology 21, 12 (2016), 2934--2943.Google ScholarGoogle ScholarCross RefCross Ref
  120. Yan Zhang and Barbara M Wildemuth. 2009. Qualitative analysis of content. Applications of social research methods to questions in information and library science 308 (2009), 319.Google ScholarGoogle Scholar
  121. Qinfeng Zhu, Marko Skoric, and Fei Shen. 2017. I shield myself from thee: Selective avoidance on social media during political protests. Political Communication 34, 1 (2017), 112--131.Google ScholarGoogle ScholarCross RefCross Ref
  122. Michael Zimmer. 2010. "But the data is already public": on the ethics of research in Facebook. Ethics and information technology 12, 4 (2010), 313--325.Google ScholarGoogle Scholar
  123. Diane L Zosky and Robert Alberts. 2016. What's in a name? Exploring use of the word queer as a term of identification within the college-aged LGBT community. Journal of Human Behavior in the Social Environment 26, 7-8 (2016), 597--607.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. "Facebook Promotes More Harassment": Social Media Ecosystem, Skill and Marginalized Hijra Identity in Bangladesh

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Proceedings of the ACM on Human-Computer Interaction
          Proceedings of the ACM on Human-Computer Interaction  Volume 5, Issue CSCW1
          CSCW
          April 2021
          5016 pages
          EISSN:2573-0142
          DOI:10.1145/3460939
          Issue’s Table of Contents

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 22 April 2021
          Published in pacmhci Volume 5, Issue CSCW1

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader