skip to main content
10.1145/2998181.2998338acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

Photo Sharing in the Arab Gulf: Expressing the Collective and Autonomous Selves

Published: 25 February 2017 Publication History

Abstract

Current research demonstrates that when people engage in social photo sharing, they are mindful of how audiences perceive and interact with their photos. We extend this vein of inquiry to focus on photo sharing in the context of the Arab Gulf. We provide insight into how this activity is practiced in a region governed by strict adherence to cultural norms and Islamic traditions that dictate how to "appropriately" share content in digital settings. In particular, we look at the relationship between photo sharing and its effects on identity and self-presentation. To understand how Saudi and Qatari participants represent themselves through photo sharing applications, we conducted 42 face-to-face interviews. Our results reveal that Arab Gulf users engage in photo sharing practices that construct a collective self, distinct from an autonomous self. This collective self often trumps the autonomous self in shaping photo sharing practices.

References

[1]
Norah Abokhodair, and Sarah Vieweg. (2016). Privacy & Social Media in the Context of the Arab Gulf . In Proceedings of the ACM conference on Designing Interactive Systems (DIS'16).
[2]
Norah Abokhodair, Sofiane Abbar, Sarah Vieweg, and Yelena Mejova. (2016). Privacy and Twitter in Qatar: Traditional Values in the Digital World. In Proceedings of the ACM conference on Web Sciences (WebSci'16).
[3]
Shane Ahern, Dean Eckles, Nathaniel S. Good, Simon King, Mor Naaman, and Rahul Nair. Overexposed?: Privacy Patterns And Considerations In Online And Mobile Photo Sharing. In Proceedings of the SIGCHI conference on Human factors in computing systems 2007 Apr 29 (pp. 357--366).
[4]
Al-Meezan. "Law No. 11 of 2004 Issuing the Penal Code." Al Meezan. Accessed 2016: http://www.almeezan.qa/LawPage.aspx?id=26.
[5]
Yeslam Al-Saggaf. (2016). An Exploratory Study of Attitudes towards Privacy in Social Media and the Threat of Blackmail: The Views of a Group of Saudi Women. The Electronic Journal of Information Systems in Developing Countries 75.
[6]
Anders Albrechtslund. (2008). Online Social Networking as Participatory Surveillance. First Monday. 13, 3.
[7]
Imam Afroz Ali. Is photography prohibited in Islam? (n.d.). Retrieved August 05, 2016, from http://www.imranhosein.org/faq/59-general/229is-photography-prohibited-in-islam.html
[8]
Hashem Abdullah Almakrami. (2015). Online Self-Disclosure Across Cultures: A Study of Facebook Use in Saudi Arabia and Australia. (Doctoral dissertation, Queensland University of Technology).
[9]
Mona AlMunajjed. (1997). Women in Saudi Arabia Today. NY: St. Martin's Press.
[10]
Shaykh Muhammad Salih AlMunajjid. (1998). Ruling on photographs Islamqa.info. Retrieved August 05, 2016, from https://islamqa.info/en/365
[11]
Yousef Alsharkh. (2012). The Social Media Effect on the Families of the Saudi Society from the Perspective of the Youth (Doctoral dissertation, Arizona State University).
[12]
Tamara Alsheikh, Jennifer A. Rode, and Siân E. Lindley. 2011. (Whose) value-sensitive design: a study of long- distance relationships in an Arabic cultural context. In Proceedings of the ACM 2011 conference on Computer supported cooperative work (CSCW '11). ACM, NY, NY, USA, 75--84.
[13]
Nazanin Andalibi, Pinar Ozturk, and Andrea Forte. 2015. Depression-related Imagery on Instagram. In Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative Work & Social Computing (CSCW'15 Companion). ACM, NY, NY, USA, 231--234.
[14]
Saeideh Bakhshi, David A. Shamma, and Eric Gilbert. (2014). Faces engage us: Photos with faces attract more likes and comments on instagram. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'14). pp. 965--974.
[15]
Joseph Bayer, Nicole B. Ellison, Sarita Y. Schoenebeck, and Emily B. Falk. (2015). Sharing The Small Moments: Ephemeral Social Interaction On Snapchat. Information, Communication & Society. pp. 1--22.
[16]
Puig de la Bellacasa. (2012). 'Nothing comes without its world': thinking with care. The Sociological Review, 60:2. 197--216.
[17]
Danah Boyd. (2014). It's complicated: The social lives of networked teens. Yale University Press.
[18]
Amy Bruckman. (1996). Gender Swapping On The Internet. High Noon On The Electronic Frontier: Conceptual Issues In Cyberspace (1996): 317--326.
[19]
Michelle Carter. (2015). Me, My self, and I(T): Conceptualizing Information Technology Identity and Its Implications. MIS Quarterly, vol. 39, no. 4.
[20]
Jennifer Charteris, Sue Gregory, and Yvonne Masters. (2014). Snapchat 'selfies': The case of disappearing data'. Hegarty, B., McDonald, j., & Loke, S. K., Rhetoric and Reality: Critical perspectives on educational technology, pp. 389--393.
[21]
Andy Crabtree, Tom Rodden, and John Mariani. (2009). Collaborating around collections: informing the continued development of photoware. In Proceedings Of The 2004 ACM Conference On Computer Supported Cooperative Work (CSCW'09). pp. 396--405.
[22]
Judith S. Donath. (1999). Identity and Deception in The Virtual Community. Communities in Cyberspace: 29--59.
[23]
Robert Elliott and Ladislav Timulak. (2005). Descriptive And Interpretive Approaches To Qualitative Research. A handbook of research methods for clinical and health psychology: 147--159.
[24]
Shelly D. Farnham and Elizabeth F. Churchill. (2011). Faceted Identity, Faceted Lives: Social And Technical Issues With Being Yourself Online. In Proceedings of the ACM 2011 conference on Computer supported cooperative work (pp. 359--368). ACM.
[25]
David Frohlich, Allan Kuchinsky, Celine Pering, Abbe Don, and Steven Ariss. (2002). Requirements for photoware. In Proceedings Of The 2002 ACM Conference On Computer Supported Cooperative Work (CSCW'02). New Orleans, Louisiana, USA, pp. 166--175.
[26]
Dennis Gamarcha. (2015). 10 Photography Tips And Etiquette In Qatar. Retrieved August 05, 2016, From:http://Www.Denxio.Com/2015/12/02/10Photography-Tips-And-Etiquette-In-Qatar/
[27]
Howard Gardner and Katie Davis. (2013). The app generation: How today's youth navigate identity, intimacy, and imagination in a digital world. Yale University Press.
[28]
Saudi Gazette. (2015). The Downside of Street Photography in Saudi Arabia. Accessed August 05, 2016. http://english.alarabiya.net/en/media/digital/2015/0 2/07/The-downside-of-street-photography-inSaudi-Arabia.html.
[29]
Erving Goffman. (1959). The Presentation Of Self In Everyday Life. Harmondsworth. N.Y.
[30]
Oliver L. Haimson, Anne E. Bowser, Edward F. Melcer, and Elizabeth F. Churchill. (2015). Online Inspiration and Exploration for Identity Reinvention. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, NY, NY, USA, 3809--3818.
[31]
Edward T. Hall. (1976). Beyond Culture. Anchor Books, NY, NY.
[32]
Geert Hofstede, Gert Jan Hofstede, and Michael Minkov. (2005). Cultures And Organizations : Software Of The Mind. NY: NY : McGraw-Hill.
[33]
Bernie Hogan. "The Presentation of Self In The Age Of Social Media: Distinguishing Performances And Exhibitions Online." Bulletin of Science, Technology & Society (2010): 0270467610385893.
[34]
John Hooker. (2012). Cultural Differences in Business Communication. In The Handbook of Intercultural Discourse and Communication, Christina Bratt Paulston, Scott F. Kiesling, Elizabeth S. Rangel (editors), pgs. 389--407. Wiley-Blackwell.
[35]
Nancy A. Van House. (2009). Collocated Photo Sharing, Story-Telling, And The Performance Of Self. International Journal of Human Computer Studies, vol. 67, no. 12, pp. 1073--1086.
[36]
Karen Elliott House. (2012). On Saudi Arabia: Its People, Past, Religion, Fault Lines - and Future. Alfred a Knopf Incorporated.
[37]
Yuheng Hu, Lydia Manikonda, and Subbarao Kambhampati. (2014). What We Instagram: A First Analysis of Instagram Photo Content and User Types. In International AAAI Conference on Web and Social Media. Retrieved from http://www.aaai.org/ocs/index.php/ICWSM/ICWS M14/paper/view/8118.
[38]
Ben Hubbard. (2015). Young Saudis, Bound by Conservative Strictures, Find Freedom on Their Phones. Retrieved August 05, 2016, from http://www.nytimes.com/2015/05/23/world/middle east/saudi-arabia-youths-cellphone-appsfreedom.html
[39]
Lyndon Kennedy, Mor Naaman, Shane Ahern, Rahul Nair, and Tye Rattenbury. 2007. How flickr helps us make sense of the world: context and content in community-contributed media collections. In Proceedings of the 15th ACM international conference on Multimedia (MM '07). ACM, NY, NY, USA, 631--640.
[40]
Amanda Lenhart, Maeve Duggan, Andrew Perrin, Renee Stepler, Harrison Rainie, and Kim Parker. (2015). Teens, Social Media & Technology Overview 2015.
[41]
Amanda Lenhart. (2015). Teen, Social Media and Technology Overview 2015. Pew Research Center.
[42]
Sian Lindley and Andrew Monk. (2006). Designing appropriate affordances for electronic photo sharing media. In CHI '06 Extended Abstracts on Human Factors in Computing Systems (CHI EA '06). ACM, NY, NY, USA, 1031--1036.
[43]
Eden Litt, Erin Spottswood, Jeremy Birnholtz, Jeff T. Hancock, Madeline E. Smith, and Lindsay Reynolds. 2014. Awkward encounters of an "other" kind: collective self-presentation and face threat on facebook. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing (CSCW '14). ACM, NY, NY, USA, 449--460.
[44]
Mary K. Madden, and Aaron Smith. (2010). Reputation Management And Social Media: How People Monitor Their Identity And Search For Others Online. Pew Internet & American Life Project. Washington, D.C.
[45]
Adriana M. Manago, Michael B. Graham, Patricia M. Greenfield, and Goldie Salimkhan. (2008). Self-Presentation and Gender On Myspace. Journal of Applied Developmental Psychology 29.6 (2008): 446--458.
[46]
Alice Marwick, danah boyd. (2010). I Tweet Honestly, I Tweet Passionately: Twitter Users, Context Collapse, And The Imagined Audience. New Media & Society, vol. 13, no. 1, pp. 114--133.
[47]
Alice Marwick, Diego M. Diaz, and John Palfrey. (2010). Youth, Privacy And Reputation. Harvard Law School Public Law & Legal Theory Working Paper Series, 10--29.
[48]
Helen Chapin Metz and The Library of Congress. Federal Research Division. (1993) Saudi Arabia: A Country Study. Washington, D.C.: Federal Research Division, Library of Congress: For sale by the Supt. of Docs., U.S. G.P.O. {Online Text} Retrieved from the Library of Congress, https://www.loc.gov/item/93028506.
[49]
Andrew D. Miller and W. Keith Edwards. (2007). Give And Take: A Study Of Consumer PhotoSharing Culture And Practice. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '07). ACM, NY, NY, USA, 347--356.
[50]
Alan Mislove, Hema Swetha Koppula, Krishna P. Gummadi, Peter Druschel, and Bobby Bhattacharjee. 2008. Growth of the flickr social network. In Proceedings of the first workshop on Online social networks (WOSN '08). ACM, NY, NY, USA, 25--30.
[51]
Melissa G. Moyer, Lesley Milroy, and Pieter Muysken. (1997). One Speaker, Two Languages: Cross-Disciplinary Perspectives on CodeSwitching. Journal of Linguistic Anthropology, 7(2), 237--239.
[52]
Caryle Murphy. (2012). Saudi Arabia's Youth and the Kingdom's Future. Woodrow Wilson International Center for Scholars' Environmental Change and Security Program.
[53]
Caryle Murphy. (2013). A Kingdom's Future: Saudi Arabia Through the Eyes of Its Twentysomethings. Washington, D.C. 20004: Woodrow Wilson International Center for Scholars.
[54]
The National. (2014). Be Wary of UAE's Photography Laws, Lawyers Say. Accessed 2016. http://www.thenational.ae/uae/be-wary-of-uaesphotography-laws-lawyers-say.
[55]
Arab News. (2016). Saudi social media users ranked 7th in world. Accessed on Apr 2016. http://www.arabnews.com/saudiarabia/news/835236.
[56]
Michael Quinn Patton. (2005). Qualitative research. John Wiley & Sons, Ltd.
[57]
Nicole A. Poltash. (2012). Snapchat and sexting: A snapshot of baring your bare essentials. Rich. JL & Tech., vol. 19, pp. 1.
[58]
ICT Ministy Qatar. (2014). IctQATAR's Rassed Unveils Findings of New Study into Social Media Usage in Qatar. Retrieved May 12, 2016, from http://www.ictqatar.qa/en/newsevents/news/ictqatar's-rassed-unveils-findingsnew-study-social-media-usage-qatar
[59]
Damian Radcliffe. (2015). Social Media in the Middle East: The Story of 2014. Retrieved August 2015 from https://damianradcliffe.files.wordpress.com/2015/0 1/damian-radcliffe-social-media-in-the-middleeast-the-story-of-2014.pdf
[60]
Franziska Roesner, Brain T. Gill, and Tadayoshi Kohno. (2014). Sex, lies, or kittens' investigating the use of snapchat's self-destructing messages. In Financial Cryptography And Data Security, pp. 64--76: Springer Berlin Heidelberg.
[61]
Alan Sandstrom and Pamela Effrein Sandstron. (1995). The use and misue of Anthropological methods in liberary and infromation science.
[62]
Mai Sartawi. (2012). GCC Demographic Shift Intergenerational Risk-transfer at Play. Kuwait Financial Centre "Markaz" Research.Accessed 2016. https://www.markaz.com/MARKAZ/media/Marka z/Documents/Business Activities/DemographicsResearchMarkazResearch-June-2012.pdf.
[63]
Rana Sobh and Russell Belk. "Domains of privacy and hospitality in Arab Gulf homes." Journal of Islamic Marketing 2.2 (2011): 125--137.
[64]
Richard Spencer. (2015). Return Of The Religious Police Worries Reformers In Saudi Arabia. In The Telegraph. http://www.telegraph.co.uk/news/worldnews/midd leeast/saudiarabia/11421226/Return-of-thereligious-police-worry-reformers-in-SaudiArabia.html.
[65]
Sheldon Stryker, Peter J. Burke. (2000). The Past, Present, And Future Of An Identity Theory. Social Psychology Quarterly, pp. 284--297.
[66]
Sonja Utz, Nicole Muscanell, and Cameran Khalid. (2015). Snapchat Elicits More Jealousy Than Facebook: A Comparison Of Snapchat And Facebook Use. Cyberpsychology, Behavior, and Social Networking, vol. 18, no. 3, pp. 141--146, 2015.
[67]
Sarah Vieweg and Adam Hodges. (2016). Surveillance & Modesty on Social Media: How Qataris Navigate Modernity and Maintain Tradition. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16). ACM, NY, NY, USA, 527--538.
[68]
Jon M. Wargo.(2015). Spatial Stories with Nomadic Narrators: Affect, Snapchat, and Feeling Embodiment in Youth Mobile Composing. In Journal of Language and Literacy Education. Vol. 11 Issue 1.
[69]
Jill Palzkill Woelfer and David G. Hendry. 2012. Homeless Young People On Social Network Sites. In Proceedings Of The Sigchi Conference On Human Factors In Computing Systems (Chi '12). ACM, NY, Ny, Usa, 2825--2834.
[70]
Mai Yamani. (2000). Changed identities : the challenge of the new generation in Saudi Arabia. London : Washington, DC: London : Royal Institute of International Affairs
[71]
Michael Zhang. (2015). Street Photography in Saudi Arabia Could Lead You Straight to Jail. Retrieved August 05, 2016, from http://petapixel.com/2015/02/08/streetphotography-saudi-arabia-lead-straight-jail/

Cited By

View all
  • (2024)Localised Trust in a Globalised Knot: Designing Information Privacy for Digital-IDACM Journal on Computing and Sustainable Societies10.1145/36160242:1(1-37)Online publication date: 13-Jan-2024
  • (2024)National Identity in Qatar: A Systematic Literature ReviewStudies in Ethnicity and Nationalism10.1111/sena.1241724:2(145-164)Online publication date: 17-Mar-2024
  • (2024)Exploring Social Media Privacy Concerns: A Comprehensive Survey Study Across 16 Middle Eastern and North African CountriesIEEE Access10.1109/ACCESS.2024.346386912(147087-147105)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. Photo Sharing in the Arab Gulf: Expressing the Collective and Autonomous Selves

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CSCW '17: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing
    February 2017
    2556 pages
    ISBN:9781450343350
    DOI:10.1145/2998181
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 February 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cultural values
    2. identity
    3. inclusive design
    4. islam
    5. photo sharing
    6. privacy
    7. qatar
    8. saudi arabia
    9. self-presentation
    10. social computing
    11. social media

    Qualifiers

    • Research-article

    Conference

    CSCW '17
    Sponsor:
    CSCW '17: Computer Supported Cooperative Work and Social Computing
    February 25 - March 1, 2017
    Oregon, Portland, USA

    Acceptance Rates

    CSCW '17 Paper Acceptance Rate 183 of 530 submissions, 35%;
    Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

    Upcoming Conference

    CSCW '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)46
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Localised Trust in a Globalised Knot: Designing Information Privacy for Digital-IDACM Journal on Computing and Sustainable Societies10.1145/36160242:1(1-37)Online publication date: 13-Jan-2024
    • (2024)National Identity in Qatar: A Systematic Literature ReviewStudies in Ethnicity and Nationalism10.1111/sena.1241724:2(145-164)Online publication date: 17-Mar-2024
    • (2024)Exploring Social Media Privacy Concerns: A Comprehensive Survey Study Across 16 Middle Eastern and North African CountriesIEEE Access10.1109/ACCESS.2024.346386912(147087-147105)Online publication date: 2024
    • (2023)A Tale of Two Cultures: Comparing Interpersonal Information Disclosure Norms on TwitterProceedings of the ACM on Human-Computer Interaction10.1145/36100457:CSCW2(1-40)Online publication date: 4-Oct-2023
    • (2023)Comfort Activism: Online Photography for Social Change in a Minority GroupProceedings of the ACM on Human-Computer Interaction10.1145/35794687:CSCW1(1-33)Online publication date: 16-Apr-2023
    • (2023)Surveillance as information practiceJournal of the Association for Information Science and Technology10.1002/asi.2473474:4(444-460)Online publication date: 18-Jan-2023
    • (2022)Aunties, strangers, and the FBIProceedings of the Eighteenth USENIX Conference on Usable Privacy and Security10.5555/3563609.3563630(387-406)Online publication date: 8-Aug-2022
    • (2022)Women's Perspectives on Harm and Justice after Online HarassmentProceedings of the ACM on Human-Computer Interaction10.1145/35557756:CSCW2(1-23)Online publication date: 11-Nov-2022
    • (2022)Moderation as Empowerment: Creating and Managing Women-Only Digital Safe SpacesProceedings of the ACM on Human-Computer Interaction10.1145/35552046:CSCW2(1-36)Online publication date: 11-Nov-2022
    • (2022)Designing for Culturally Sensitive Cultural ChangeProceedings of the 2022 ACM Designing Interactive Systems Conference10.1145/3532106.3533512(599-611)Online publication date: 13-Jun-2022
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media