Proceedings of the 14th International Conference on Human-Computer Interaction With Mobile Devices and Services 2012
DOI: 10.1145/2371574.2371636
|View full text |Cite
|
Sign up to set email alerts
|

Degrees of sharing

Abstract: This paper explores the phone and mobile media sharing relationships of a group of young mobile phone users in Khayelitsha, South Africa. Intensive sharing took place within peer and intimate relationships, while resource sharing characterized relationships with a more extensive circle, including members of the older generation. Phones were kept open to others to avoid inferences of stinginess, disrespect, or secretiveness and the use of privacy features (such as passwords) was complicated by conflicts between… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…Mobile phones are designed as single-user personal devices, but they are often shared with family members and friends, especially in low-income environments [64,119]. People who are aware of the privacy risks of phone sharing use ad-hoc measures such as renaming files (i.e., security by obscurity), using folder-or application-level locks [64], and using multiple storage cards [136] to hide content from others, but none of these methods offer a suitable solution since people tend to share their passwords with others because of social obligations [51,68,147].…”
Section: Unintended Technology Usementioning
confidence: 99%
See 1 more Smart Citation
“…Mobile phones are designed as single-user personal devices, but they are often shared with family members and friends, especially in low-income environments [64,119]. People who are aware of the privacy risks of phone sharing use ad-hoc measures such as renaming files (i.e., security by obscurity), using folder-or application-level locks [64], and using multiple storage cards [136] to hide content from others, but none of these methods offer a suitable solution since people tend to share their passwords with others because of social obligations [51,68,147].…”
Section: Unintended Technology Usementioning
confidence: 99%
“…Thus, the predominant type of sharing in developing regions is for mutual use. Sociocultural norms (culture) also influence sharing, more in developing regions compared to developed regions, and often lead to forced sharing (e.g., sharing a phone with a friend due to social pressure) [27,147]. Lack of knowledge (knowledge gap) and self-confidence to operate phones also lead people to request outside help (i.e., intermediation [127]) that could lead to unexpected privacy risks.…”
Section: Motivations For Phone Sharingmentioning
confidence: 99%
“…Here people might borrow a phone to make a call because they have run out of airtime, to browse the internet because their data-bundle is depleted, or to take a photo using a better camera. Particularly in resource-constrained communities, phone-sharing practices [27,28] are also about resourcesharing [36] and not just building and maintaining social and community relationships. In addition, a difficult to overlook fact, particularly in resource-constrained, urban settings is the relationship between mobile phones and crime.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, a difficult to overlook fact, particularly in resource-constrained, urban settings is the relationship between mobile phones and crime. For instance, the participants in Walton et al's study of mobile media sharing practices of young people in Khayelitsha, a township in Cape Town, South Africa, "experienced chronic insecurity because of high crime rates, and their mobile phones were often targeted in petty theft and more serious crimes" [36].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation