2017
DOI: 10.1145/3134652
|View full text |Cite
|
Sign up to set email alerts
|

Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh

Abstract: Prior research on technology use in the Global South suggests that people in marginalized communities frequently share a single device among multiple individuals. However, the data privacy challenges and tensions that arise when people share devices have not been studied in depth. This paper presents a qualitative study with 72 participants that analyzes how families in Bangladesh currently share mobile phones, their usage patterns, and the tensions and challenges that arise as individuals seek to protect the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
43
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 98 publications
(44 citation statements)
references
References 54 publications
1
43
0
Order By: Relevance
“…1 Some partners may desire not only to monitor an intimate partner, but also to be monitored, for convenience (e.g., "I like my partner to know when I'm on my way home so we can make evening plans") [21], for safety (e.g., to inform trusted contacts of one's location to provide a "virtual escort" while walking alone) [22], or for other reasons. In other contexts, there may be social or cultural assumptions of family access and sharing, often along gendered lines [23,24]. (In fact, some industry groups have gone so far as to say that because devices are often shared within households and families, device identifiers should not be considered "personally identifying" under privacy laws [25].…”
Section: Monitoring In Intimate Relationshipsmentioning
confidence: 99%
“…1 Some partners may desire not only to monitor an intimate partner, but also to be monitored, for convenience (e.g., "I like my partner to know when I'm on my way home so we can make evening plans") [21], for safety (e.g., to inform trusted contacts of one's location to provide a "virtual escort" while walking alone) [22], or for other reasons. In other contexts, there may be social or cultural assumptions of family access and sharing, often along gendered lines [23,24]. (In fact, some industry groups have gone so far as to say that because devices are often shared within households and families, device identifiers should not be considered "personally identifying" under privacy laws [25].…”
Section: Monitoring In Intimate Relationshipsmentioning
confidence: 99%
“…Information gathering practices of marginalized people in resource-constrained settings are primarily based on interactions with friends and family members [86], which at times expose them to unintended privacy risks. For example, siblings trade favors when they encounter traces of digital activities while helping each other navigate digital spaces [27]. Moreover, misconceptions about a local culture by developers or designers may result in inappropriate threat modeling.…”
Section: Culturementioning
confidence: 99%
“…For example, beneficiary-users socially-negotiated their privacy with intermediaryusers when they anticipated arrival of confidential information [107] by using simple measures such as callbacks instead of leaving private information with intermediary-users. Similarly, people reported different privacy preferences when sharing phones with their parents, children, siblings, and friends [27].…”
Section: Contextmentioning
confidence: 99%
See 2 more Smart Citations