skip to main content
10.5555/3291228.3291240guideproceedingsArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

"Privacy is not for me, it's for those rich women": performative privacy practices on mobile phones by women in South Asia

Published: 12 August 2018 Publication History

Abstract

Women in South Asian own fewer personal devices like laptops and phones than women elsewhere in the world. Further, cultural expectations dictate that they should share mobile phones with family members and that their digital activities be open to scrutiny by family members. In this paper, we report on a qualitative study conducted in India, Pakistan, and Bangladesh about how women perceive, manage, and control their personal privacy on shared phones. We describe a set of five performative practices our participants employed to maintain individuality and privacy, despite frequent borrowing and monitoring of their devices by family and social relations. These practices involved management of phone and app locks, content deletion, technology avoidance, and use of private modes. We present design opportunities for maintaining privacy on shared devices that are mindful of the social norms and values in the South Asian countries studied, including to improve discovery of privacy controls, offer content hiding, and provide algorithmic understanding of multiple-user use cases. Our suggestions have implications for enhancing the agency of user populations whose social norms shape their phone use.

References

[1]
Norah Abokhodair and Sarah Vieweg. 2016. Privacy & social media in the context of the Arab Gulf. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems, 672-683.
[2]
Syed Ishtiaque Ahmed, Nova Ahmed, Faheem Hussain, and Neha Kumar. 2016. Computing beyond gender-imposed limits. In Proceedings of the Second Workshop on Computing within Limits, 6.
[3]
Syed Ishtiaque Ahmed, MD Haque, Jay Chen, and Nicola Dell. 2017. Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh. CSCW.
[4]
Deena Alghamdi, Ivan Flechais, and Marina Jirotka. 2015. Security Practices for Households Bank Customers in the Kingdom of Saudi Arabia. In SOUPS, 297-308.
[5]
Arjun Appadurai. 1996. Modernity al large: cultural dimensions of globalization. U of Minnesota Press.
[6]
Jakob E Bardram. 2005. The trouble with login: on usability and computer security in ubiquitous computing. Personal and Ubiquitous Computing 9, 6: 357-367.
[7]
AJ Bernheim Brush and Kori M Inkpen. 2007. Yours, mine and ours? Sharing and use of technology in domestic environments. In UbiComp, 109-126.
[8]
Lorrie Faith Cranor, Adam L Durity, Abigail Marsh, and Blase Ur. 2014. Parents' and teens' perspectives on privacy in a technology-filled world. In Proc. SOUPS.
[9]
Kelly Derby, BETH EASTERLING, and others. 2012. Snooping in Romantic Relationships. College Student Journal 46, 2.
[10]
Jill P Dimond, Casey Fiesler, and Amy S Bruckman. 2011. Domestic violence and information communication technologies. Interacting with Computers 23, 5: 413-421.
[11]
Serge Egelman, AJ Brush, and Kori M Inkpen. 2008. Family accounts: a new paradigm for user accounts within the home environment. In Proceedings of the 2008 ACM conference on Computer supported cooperative work, 669-678.
[12]
Serge Egelman, Sakshi Jain, Rebecca S. Portnoff, Kerwell Liao, Sunny Consolvo, and David Wagner. 2014. Are You Ready to Lock? In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14), 750-761.
[13]
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2017. Digital technologies and intimate partner violence: a qualitative analysis with multiple stakeholders. PACM: Human-Computer Interaction: Computer-Supported Cooperative Work and Social Computing (CSCW) Vol 1.
[14]
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. "A Stalker's Paradise": How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 667.
[15]
Arup Kumar Ghosh, Karla Badillo-Urquiola, Shion Guha, Joseph J LaViola Jr, and Pamela J Wisniewski. 2018. Safety vs. Surveillance: What Children Have to Say about Mobile Apps for Parental Control. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 124.
[16]
GSMA. 2015. Bridging the gender gap: Mobile access and usage in low-and middle-income countries.
[17]
GSMA. 2018. The Mobile Gender Gap Report 2018.
[18]
Marian Harbach, Emanuel Von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith. 2014. It's a hard lock life: A field study of smartphone (un) locking behavior and risk perception. In Symposium on usable privacy and security (SOUPS), 213-230.
[19]
Eiji Hayashi, Oriana Riva, Karin Strauss, AJ Brush, and Stuart Schechter. 2012. Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications. In Proceedings of the Eighth Symposium on Usable Privacy and Security, 2.
[20]
Jeffrey James. 2011. Sharing mobile phones in developing countries: Implications for the digital divide. Technological Forecasting and Social Change 78, 4: 729-735.
[21]
Jeffrey James. 2016. Mobile phone use in Africa: Implications for inequality and the digital divide. In The Impact of Mobile Phones on Poverty and Inequality in Developing Countries. Springer, 89-93.
[22]
Kelby Johnson. 2003. Telecenters and the gender dimension: an examination of how engendered telecenters are diffused in Africa.
[23]
Amy K Karlson, AJ Brush, and Stuart Schechter. 2009. Can i borrow your phone?: understanding concerns when sharing mobile phones. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1647-1650.
[24]
Neha Kumar. 2015. The gender-technology divide or perceptions of non-use? First Monday 20, 11.
[25]
Ann Light, Ilda Ladeira, Jahmeilah Roberson, N Bidwell, Nimmi Rangaswamy, Nithya Sambasivan, and Shikoh Gitau. 2010. Gender matters: Female perspectives in ICT4D research.
[26]
Karen Danna Lynch. 2005. Advertising motherhood: Image, ideology, and consumption. Berkeley journal of sociology: 32-57.
[27]
Market Research Society of India. 2011. The New SEC system. Retrieved from http://mruc.net/uploads/posts/b17695616c422ec8d9dadafc1c3eec26.pdf
[28]
Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Luís Carriço, and Konstantin Beznosov. 2016. Snooping on mobile phones: Prevalence and trends. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016).
[29]
Tara Matthews, Kerwell Liao, Anna Turner, Marianne Berkovich, Robert Reeder, and Sunny Consolvo. 2016. She'll just grab any device that's closer: A Study of Everyday Device & Account Sharing in Households. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 5921-5932.
[30]
Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F Churchill, and Sunny Consolvo. 2017. Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2189-2201.
[31]
Michelle L Mazurek, JP Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, and others. 2010. Access control for home data sharing: Attitudes, needs and practices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 645-654.
[32]
Laura L Murphy and Alexandra E Priebe. 2011. "My co-wife can borrow my mobile phone!" Gendered Geographies of Cell Phone Usage and Significance for Rural Kenyans. Gender, Technology and Development 15, 1: 1-23.
[33]
Bonnie Nardi, Ravi Vatrapu, and Torkil Clemmensen. 2011. Comparative informatics. interactions 18, 2: 28-33.
[34]
David Nemer. 2016. "LAN Houses Are for Boys and Telecenters Are for Girls:" CTCs As Gendered Spaces. In Proceedings of the Eighth International Conference on Information and Communication Technologies and Development (ICTD '16), 54:1-54:4.
[35]
Jacki O'Neill, Kentaro Toyama, Jay Chen, Berthel Tate, and Aysha Siddique. 2016. The increasing sophistication of mobile media sharing in lower-middle-class Bangalore. In Proceedings of the Eighth International Conference on Information and Communication Technologies and Development, 17.
[36]
Nimmi Rangaswamy and Nithya Sambasivan. 2011. Cutting Chai, Jugaad, and Here Pheri: towards UbiComp for a global community. Personal and Ubiquitous Computing 15, 6: 553- 564.
[37]
Nimmi Rangaswamy and Supriya Singh. 2009. Personalizing the shared mobile phone. Internationalization, design and global development: 395-403.
[38]
Nithya Sambasivan and Paul M Aoki. 2017. Imagined Connectivities: Synthesized Conceptions of Public Wi-Fi in Urban India. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 5917-5928.
[39]
Nithya Sambasivan, Garen Checkley, Nova Ahmed, and Amna Batool. 2017. Gender equity in technologies: considerations for design in the global south. interactions 25, 1: 58-61.
[40]
Nithya Sambasivan, Ed Cutrell, Kentaro Toyama, and Bonnie Nardi. 2010. Intermediated technology use in developing communities. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2583-2592.
[41]
Stuart Schechter. 2013. The user is the enemy, and (s) he keeps reaching for that bright shiny power button. In Workshop on Home Usable Privacy and Security (HUPS).
[42]
Thomas N Smyth, Satish Kumar, Indrani Medhi, and Kentaro Toyama. 2010. Where there's a will there's a way: mobile media sharing in urban india. In Proceedings of the SIGCHI conference on Human Factors in computing systems, 753- 762.
[43]
Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, and Sarah Tucker. 2007. Intimate partner violence, technology, and stalking. Violence against women 13, 8: 842- 856.
[44]
Molly Steenson and Jonathan Donner. 2009. Beyond the personal and private: Modes of mobile phone sharing in urban India. The reconstruction of space and time: Mobile communication practices 1: 231-250.
[45]
Julie Stephens and others. 2004. Beyond binaries in motherhood research. Family matters, 69: 88.
[46]
Sarah Revi Sterling, Leslie Dodson, and Hawra Al-Rabaan. 2014. The fog phone: water, women, and HCID. interactions 21, 6: 42-45.
[47]
Sharifa Sultana, François Guimbretière, Phoebe Sengers, and Nicola Dell. 2018. Design Within a Patriarchal Society: Opportunities and Challenges in Designing for Rural Women in Bangladesh.
[48]
Divy Thakkar, Nithya Sambasivan, Purva Kulkarni, Pratap Kalenahalli Sudarshan, and Kentaro Toyama. 2018. The Unexpected Entry and Exodus of Women in Computing and HCI in India. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 352.
[49]
David R Thomas. 2006. A general inductive approach for analyzing qualitative evaluation data. American journal of evaluation 27, 2: 237-246.
[50]
Rick Wash. 2010. Folk models of home computer security. In Proceedings of the Sixth Symposium on Usable Privacy and Security, 11.
[51]
Pamela Wisniewski. 2018. The Privacy Paradox of Adolescent Online Safety: A Matter of Risk Prevention or Risk Resilience? IEEE Security & Privacy 16, 2: 86-90.
[52]
Pamela Wisniewski, Arup Kumar Ghosh, Heng Xu, Mary Beth Rosson, and John M Carroll. 2017. Parental Control vs. Teen Self-Regulation: Is there a middle ground for mobile online safety? In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 51-69.
[53]
Delanie Woodlock. 2017. The abuse of technology in domestic violence and stalking. Violence against women 23, 5: 584-602.
[54]
2016. What of the women who hide cash to feed their children or to escape abuse? Scroll.in. Retrieved from https://scroll.in/article/821255/note-demonetisation-what-of-the-women-who-hide-cash-to-feed-their-children-or-toescape-abuse
[55]
Census of India, 2011. Retrieved from http://www.censusindia.gov.in/2011census/F-series/F-1.html
[56]
Pakistan Bureau of Statistics.
[57]
Bangladesh Bureau of Statistics. Retrieved from http://www.bbs.gov.bd/

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
SOUPS '18: Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security
August 2018
457 pages
ISBN:9781931971454

Sponsors

  • Google Inc.
  • NSF
  • Facebook: Facebook

In-Cooperation

Publisher

USENIX Association

United States

Publication History

Published: 12 August 2018

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 15 of 49 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media