skip to main content
10.1145/2909609.2909661acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictdConference Proceedingsconference-collections
research-article

Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh

Authors Info & Claims
Published:03 June 2016Publication History

ABSTRACT

This paper presents an analysis of the privacy issues associated with the practice of repairing broken digital objects in Bangladesh. Historically, research in Human-Computer Interaction (HCI), Information and Communication Technologies for Development (ICTD), and related disciplines has focused on the design and development of new interventions or technologies. As a result, the repair of old or broken technologies has been an often neglected topic of research. The goal of our work is to improve the practices surrounding the repair of digital artifacts in developing countries. Specifically, in this paper we examine the privacy challenges associated with the process of repairing digital artifacts, which usually requires that the owner of a broken artifact hand over the technology to a repairer. Findings from our ethnographic work conducted at 10 repair markets in Dhaka, Bangladesh, show a variety of ways in which the privacy of an individual's personal data may be compromised during the repair process. We also examine people's perceptions around privacy in repair and its connections with broader social and cultural values. Finally, we discuss the challenges and opportunities for future research to strengthen the repair ecosystem in developing countries. Taken together, our findings contribute to the growing discourse around post-use cycles of technology in ICTD and HCI.

References

  1. Ahmed, S.I., Jackson, S.J., Ahmed, N., Ferdous, H.S., Rifat, M.R., Rizvi, A.S.M., Ahmed, S. and Mansur, R.S. 2014. Protibadi: A Platform for Fighting Sexual Harassment in Urban Bangladesh. In Proc. CHI'14 (2014), 2695--2704. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ahmed, S.I., Jackson, S.J. and Rifat, M.R. 2015. Learning to fix: knowledge, collaboration and mobile phone repair in Dhaka, Bangladesh. In Proc. ICTD'15 (2015), 4:1--4:10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Annas, G.J. 2003. HIPAA regulations-a new era of medical-record privacy? New England Journal of Medicine. 138, 15 (2003), 1486--1490. Google ScholarGoogle ScholarCross RefCross Ref
  4. Chiasson, S., van Oorschot, P.C. and Biddle, R. 2007. Graphical password authentication using cued click points. In Proc. Computer Security-ESORICS (2007), 359--374. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Chirumamilla, P. and Pal, J. Play and power: A ludic design proposal for ICTD. In Proc. ICTD'13 25--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cranor, L.F. and Garfinkel, S. 2004. Guest Editors' Introduction: Secure or Usable? IEEE Security & Privacy. 2, 5 (2004), 16--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Diffie, W. and Hellman, M.E. 1976. New directions in cryptography. IEEE Transaction on Information Theory. 22, 6 (1976), 644--654. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Gross, R. and Acquisti, A. 2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (2005), 71--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Houston, L. 2014. Inventive Infrastructure: An Exploration of Mobile Phone. Lancaster University.Google ScholarGoogle Scholar
  10. Irani, L., Vertesi, J., Dourish, P., Philip, K. and Grinter, R.E. Postcolonial computing: a lens on design and development. In Proc. CHI'10 1311--1320. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Jackson, S.J. 2013. Rethinking Repair. Media Meets Technology: Essays on Communication, Materiality and Society. T. Gillespie, P. Boczkowski, and K. Foot, eds. MIT Press.Google ScholarGoogle Scholar
  12. Jackson, S.J., Ahmed, S.I. and Rifat, M.R. 2014. Learning, innovation, and sustainability among mobile phone repairers in Dhaka, Bangladesh. In Proc. DIS'14 (2014), 905--914. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jackson, S.J. and Kang, L. 2014. Breakdown, Obsolescence, and Reuse: HCI and the Art of Repair. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Forthcoming, 2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jackson, S.J., Pompe, A. and Krieshok, G. 2012. Repair worlds: maintenance, repair, and ICT for development in rural Namibia. In Proc. CSCW'12 (2012), 107--116. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Jackson, S.J., Pompe, A. and Krieshok, G. 2011. Things fall apart: maintenance, repair, and technology for education initiatives in rural Namibia. Proceedings of the 2011 iConference (2011), 83--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Kumaraguru, P. and Cranor, L.F. 2006. Privacy in India: Attitudes and awareness. Privacy Enhancing Technologies. (2006), 243--258. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Lepawsky, J. and Mather, C. 2011. From beginnings and endings to boundaries and edges: rethinking circulation and exchange through electronic waste. Area. 43, 3 (2011), 242--249. Google ScholarGoogle ScholarCross RefCross Ref
  18. Lipford, H.R., Hull, G., Latulipe, C., Besmer, A. and Watson, J. Visible flows: Contextual integrity and the design of privacy mechanisms on social network sites. In Computational Science and Engineering, 2009. CSE'09. International Conference 985--989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Mao, W. 2003. Modern cryptography: theory and practice. Prentice Hall Professional Technical References. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Nissenbaum, H. 2004. Privacy as contextual integrity. 79, 1 (2004).Google ScholarGoogle Scholar
  21. O'Donnell, M.L. 2002. FERPA: Only a piece of the privacy puzzle. JC & UL. 29, (2002), 679.Google ScholarGoogle Scholar
  22. Orr, J.E. 1996. Talking about machines: An ethnography of a modern job. Cornell University Press.Google ScholarGoogle Scholar
  23. Palen, L. and Dourish, P. 2003. Unpacking privacy for a networked world. In Proc. CHI'03 (2003), 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Raleigh, W.J. 1988. Attorney-Client Privileges. Barrister. 15, (1988), 49.Google ScholarGoogle Scholar
  25. Sadeh, N., Hong, J., Cranor, L.F., Fette, I., Kelley, P., Prabakar, M. and Rao, J. 2009. Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing. 13, 6 (2009), 401--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Sen, A. 1999. Development as freedom. Oxford University Press.Google ScholarGoogle Scholar
  27. Shannon, C.E. 2001. A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review. 5, 1 (2001), 3--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Suchman, L. 2007. Human-machine reconfigurations: Plans and situated actions. Cambridge University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Warren, S.D. and Brandeis, L.D. 1890. The right to privacy. Harvard Law Review. (1890), 193--220. Google ScholarGoogle ScholarCross RefCross Ref
  30. Westin, A.F. 1968. Privacy and Freedom. Washington and Lee Law Review. 25, 1 (1968), 166.Google ScholarGoogle Scholar
  31. Widmer, R., Oswald-Krapf, H., Sinha-Khetriwal, D., Schnellmann, M. and Böni, H. 2005. Global perspectives on e-waste. Environmental impact assesment review. 25, 5 (2005), 436--458.Google ScholarGoogle Scholar
  32. Zurco, M.E. and Simson, R.T. 1996. User-centered security. In Proceedings of the 1996 workshop on New security paradigms (1996), 27--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. 2015. Child pornography found during laptop repair leads to arrest, charges. CTV News Winnipeg http://winnipeg.ctvnews.ca/child-pornography-found-during-laptop-repair-leads-to-arrest-charges-1.2548589.Google ScholarGoogle Scholar
  34. Encrypt or decrypt a folder or file. Microsoft http://windows.microsoft.com/en-us/windows/encrypt-decrypt-folder-file#1TC=windows-7.Google ScholarGoogle Scholar

Index Terms

  1. Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICTD '16: Proceedings of the Eighth International Conference on Information and Communication Technologies and Development
      June 2016
      427 pages
      ISBN:9781450343060
      DOI:10.1145/2909609

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 June 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate22of116submissions,19%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader