ABSTRACT
This paper presents an analysis of the privacy issues associated with the practice of repairing broken digital objects in Bangladesh. Historically, research in Human-Computer Interaction (HCI), Information and Communication Technologies for Development (ICTD), and related disciplines has focused on the design and development of new interventions or technologies. As a result, the repair of old or broken technologies has been an often neglected topic of research. The goal of our work is to improve the practices surrounding the repair of digital artifacts in developing countries. Specifically, in this paper we examine the privacy challenges associated with the process of repairing digital artifacts, which usually requires that the owner of a broken artifact hand over the technology to a repairer. Findings from our ethnographic work conducted at 10 repair markets in Dhaka, Bangladesh, show a variety of ways in which the privacy of an individual's personal data may be compromised during the repair process. We also examine people's perceptions around privacy in repair and its connections with broader social and cultural values. Finally, we discuss the challenges and opportunities for future research to strengthen the repair ecosystem in developing countries. Taken together, our findings contribute to the growing discourse around post-use cycles of technology in ICTD and HCI.
- Ahmed, S.I., Jackson, S.J., Ahmed, N., Ferdous, H.S., Rifat, M.R., Rizvi, A.S.M., Ahmed, S. and Mansur, R.S. 2014. Protibadi: A Platform for Fighting Sexual Harassment in Urban Bangladesh. In Proc. CHI'14 (2014), 2695--2704. Google ScholarDigital Library
- Ahmed, S.I., Jackson, S.J. and Rifat, M.R. 2015. Learning to fix: knowledge, collaboration and mobile phone repair in Dhaka, Bangladesh. In Proc. ICTD'15 (2015), 4:1--4:10. Google ScholarDigital Library
- Annas, G.J. 2003. HIPAA regulations-a new era of medical-record privacy? New England Journal of Medicine. 138, 15 (2003), 1486--1490. Google ScholarCross Ref
- Chiasson, S., van Oorschot, P.C. and Biddle, R. 2007. Graphical password authentication using cued click points. In Proc. Computer Security-ESORICS (2007), 359--374. Google ScholarDigital Library
- Chirumamilla, P. and Pal, J. Play and power: A ludic design proposal for ICTD. In Proc. ICTD'13 25--33. Google ScholarDigital Library
- Cranor, L.F. and Garfinkel, S. 2004. Guest Editors' Introduction: Secure or Usable? IEEE Security & Privacy. 2, 5 (2004), 16--18. Google ScholarDigital Library
- Diffie, W. and Hellman, M.E. 1976. New directions in cryptography. IEEE Transaction on Information Theory. 22, 6 (1976), 644--654. Google ScholarDigital Library
- Gross, R. and Acquisti, A. 2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (2005), 71--80. Google ScholarDigital Library
- Houston, L. 2014. Inventive Infrastructure: An Exploration of Mobile Phone. Lancaster University.Google Scholar
- Irani, L., Vertesi, J., Dourish, P., Philip, K. and Grinter, R.E. Postcolonial computing: a lens on design and development. In Proc. CHI'10 1311--1320. Google ScholarDigital Library
- Jackson, S.J. 2013. Rethinking Repair. Media Meets Technology: Essays on Communication, Materiality and Society. T. Gillespie, P. Boczkowski, and K. Foot, eds. MIT Press.Google Scholar
- Jackson, S.J., Ahmed, S.I. and Rifat, M.R. 2014. Learning, innovation, and sustainability among mobile phone repairers in Dhaka, Bangladesh. In Proc. DIS'14 (2014), 905--914. Google ScholarDigital Library
- Jackson, S.J. and Kang, L. 2014. Breakdown, Obsolescence, and Reuse: HCI and the Art of Repair. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Forthcoming, 2014). Google ScholarDigital Library
- Jackson, S.J., Pompe, A. and Krieshok, G. 2012. Repair worlds: maintenance, repair, and ICT for development in rural Namibia. In Proc. CSCW'12 (2012), 107--116. Google ScholarDigital Library
- Jackson, S.J., Pompe, A. and Krieshok, G. 2011. Things fall apart: maintenance, repair, and technology for education initiatives in rural Namibia. Proceedings of the 2011 iConference (2011), 83--90. Google ScholarDigital Library
- Kumaraguru, P. and Cranor, L.F. 2006. Privacy in India: Attitudes and awareness. Privacy Enhancing Technologies. (2006), 243--258. Google ScholarDigital Library
- Lepawsky, J. and Mather, C. 2011. From beginnings and endings to boundaries and edges: rethinking circulation and exchange through electronic waste. Area. 43, 3 (2011), 242--249. Google ScholarCross Ref
- Lipford, H.R., Hull, G., Latulipe, C., Besmer, A. and Watson, J. Visible flows: Contextual integrity and the design of privacy mechanisms on social network sites. In Computational Science and Engineering, 2009. CSE'09. International Conference 985--989. Google ScholarDigital Library
- Mao, W. 2003. Modern cryptography: theory and practice. Prentice Hall Professional Technical References. Google ScholarDigital Library
- Nissenbaum, H. 2004. Privacy as contextual integrity. 79, 1 (2004).Google Scholar
- O'Donnell, M.L. 2002. FERPA: Only a piece of the privacy puzzle. JC & UL. 29, (2002), 679.Google Scholar
- Orr, J.E. 1996. Talking about machines: An ethnography of a modern job. Cornell University Press.Google Scholar
- Palen, L. and Dourish, P. 2003. Unpacking privacy for a networked world. In Proc. CHI'03 (2003), 129--136. Google ScholarDigital Library
- Raleigh, W.J. 1988. Attorney-Client Privileges. Barrister. 15, (1988), 49.Google Scholar
- Sadeh, N., Hong, J., Cranor, L.F., Fette, I., Kelley, P., Prabakar, M. and Rao, J. 2009. Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing. 13, 6 (2009), 401--412. Google ScholarDigital Library
- Sen, A. 1999. Development as freedom. Oxford University Press.Google Scholar
- Shannon, C.E. 2001. A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review. 5, 1 (2001), 3--55. Google ScholarDigital Library
- Suchman, L. 2007. Human-machine reconfigurations: Plans and situated actions. Cambridge University Press. Google ScholarDigital Library
- Warren, S.D. and Brandeis, L.D. 1890. The right to privacy. Harvard Law Review. (1890), 193--220. Google ScholarCross Ref
- Westin, A.F. 1968. Privacy and Freedom. Washington and Lee Law Review. 25, 1 (1968), 166.Google Scholar
- Widmer, R., Oswald-Krapf, H., Sinha-Khetriwal, D., Schnellmann, M. and Böni, H. 2005. Global perspectives on e-waste. Environmental impact assesment review. 25, 5 (2005), 436--458.Google Scholar
- Zurco, M.E. and Simson, R.T. 1996. User-centered security. In Proceedings of the 1996 workshop on New security paradigms (1996), 27--33. Google ScholarDigital Library
- 2015. Child pornography found during laptop repair leads to arrest, charges. CTV News Winnipeg http://winnipeg.ctvnews.ca/child-pornography-found-during-laptop-repair-leads-to-arrest-charges-1.2548589.Google Scholar
- Encrypt or decrypt a folder or file. Microsoft http://windows.microsoft.com/en-us/windows/encrypt-decrypt-folder-file#1TC=windows-7.Google Scholar
Index Terms
- Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh
Recommendations
Privacy, Security, and Surveillance in the Global South: A Study of Biometric Mobile SIM Registration in Bangladesh
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsWith the rapid growth of ICT adoption in the Global South, crimes over and through digital technologies have also increased. Consequently, governments have begun to undertake a variety of different surveillance programs, which in turn provoke questions ...
Values in Repair
CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing SystemsThis paper examines the question of "values in repair" -- the distinct forms of meaning and care that may be built into human-technology interactions through individual and collective acts of repair. Our work draws on research in HCI and the social ...
Learning to fix: knowledge, collaboration and mobile phone repair in Dhaka, Bangladesh
ICTD '15: Proceedings of the Seventh International Conference on Information and Communication Technologies and DevelopmentPractices of technology repair in developing country contexts play crucial and often overlooked roles in supporting ICTD goals of access and sustainability. They also constitute complex and neglected sites of technical skill, knowledge, and learning. ...
Comments