skip to main content
10.1145/3025453.3025961acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Privacy, Security, and Surveillance in the Global South: A Study of Biometric Mobile SIM Registration in Bangladesh

Published: 02 May 2017 Publication History

Abstract

With the rapid growth of ICT adoption in the Global South, crimes over and through digital technologies have also increased. Consequently, governments have begun to undertake a variety of different surveillance programs, which in turn provoke questions regarding citizens' privacy rights. However, both the concepts of privacy and of citizens' corresponding political rights have not been well-developed in HCI for non-Western contexts. This paper presents findings from a three-month long ethnography and online survey (n=606) conducted in Bangladesh, where the government recently imposed mandatory biometric registration for every mobile phone user. Our analysis surfaces important privacy and safety concerns regarding identity, ownership, and trust, and reveals the cultural and political challenges of imposing biometric registration program in Bangladesh. We also discuss how alternative designs of infrastructure, technology, and policy may better meet stakeholders' competing needs in the Global South.

References

[1]
Norah Abokhodair. 2015. Transmigrant Saudi Arabian Youth and Social Media: Privacy, Intimacy and Freedom of Expression. 187--190. Retrieved from http://dx.doi.org/10.1145/2702613.2702629
[2]
Norah Abokhodair and Sarah Vieweg. 2016. Privacy & Social Media in the Context of the Arab Gulf. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems., 672--683. Retrieved from http://dx.doi.org/10.1145/2901790.2901873
[3]
Syed Ishtiaque Ahmed, Nova Ahmed, Faheem Hussain, and Neha Kumar. 2016. Computing beyond gender-imposed limits. In In Proc. LIMITS'16, Article No. 6.
[4]
Syed Ishtiaque Ahmed, Shion Guha, Md. Rashidujjaman Rifat, Md. Foysal Hossain, and Nicola Dell. Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh. In In Proceedings of the Eighth International Conference on Information and Communication Technologies and Development, Article No. 11. Retrieved from http://dx.doi.org/10.1145/2909609.2909661
[5]
Syed Ishtiaque Ahmed, Steven J Jackson, Nova Ahmed, Hasan Shahid Ferdous, Md. Rashidujjaman Rifat, A. S. M. Rizvi, Shamir Ahmed, and Rifat Sabbir Mansur. 2014. Protibadi: A Platform for Fighting Sexual Harassment in Urban Bangladesh. In In Proc. CHI'14, 2695--2704.
[6]
Syed Ishtiaque Ahmed, Steven J Jackson, and Md. Rashidujjaman Rifat. 2015. Learning to fix: knowledge, collaboration and mobile phone repair in Dhaka, Bangladesh. In In Proc. ICTD'15, 4:1--4:10.
[7]
Syed Ishtiaque Ahmed, Nusrat Jahan Mim, and Steven J Jackson. 2015. Residual Mobilities: Infrastructural Displacement and Post-Colonial Computing in Bangladesh. In In Proc. CHI'15, 437--446.
[8]
Joseph Allchin. The Rise of Extremism in Bangladesh. Foreign Affairs. Retrieved from https://www.foreignaffairs.com/articles/bangladesh/2016-06-09/rise-extremism-bangladesh
[9]
Louise Amoore. 2006. Biometric borders: Governing mobilities in the war on terror. Political geography 25, 3: 336--351.
[10]
George J Annas. 2003. HIPAA regulations-a new era of medical-record privacy? New England Journal of Medicine 138, 15: 1486--1490.
[11]
BBC News. Bangladesh war crimes trial: Key accused. Retrieved from http://www.bbc.com/news/world-asia-20970123
[12]
Seyla Benhabib. 2002. The claims of culture: Equality and diversity in the global era. Princeton University Press.
[13]
Jenna Burrell. 2010. Evaluating Shared Access: social equality and the circulation of mobile phones in rural Uganda. Journal of Computer Mediated Communication 15, 2: 230--250.
[14]
Sonia Chiasson, Paul C van Oorschot, and Robert Biddle. 2007. Graphical password authentication using cued click points. In In Proc. Computer Security-ESORICS, 359--374.
[15]
Julie E. Cohen. What privacy is for. Harvard Law Review 125: 1904.
[16]
Juliet Corbin and Anselm Strauss. 1994. Grounded theory methodology. Handbook of qualitative research: 273--285.
[17]
Carl DiSalvo, Phoebe Sengers, and Hrönn Brynjarsdóttir. 2010. Mapping the landscape of sustainable HCI. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1975--1984.
[18]
Kevin P. Donovan and Aaron K. Martin. 2014. The rise of African SIM registration: The emerging dynamics of regulatory change. First Monday Speccial Issue. Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/4351/3820
[19]
Mary Flanagan, Daniel C. Howe, and Helen Nissenbaum. 2008. Embodying Values in Technology: Theory and Practice. In Information Technology and Moral Philosophy, John Weckert (ed.). Cambridge University Press, 322--353. Retrieved from http://www.nyu.edu/projects/nissenbaum/papers/Flanagan,%20Howe%20&%20Nissenbaum%20-%20Embodying%20Values.pdf
[20]
Michel Foucault. 1977. Discipline and punish: The birth of the prison. Vintage.
[21]
Mehboob Geelani. 2011. Numbers and NREGA. The Caravan.
[22]
Koushik Ghosh, Tapan S Parikh, and Apala Lahiri Chavan. 2003. Design considerations for a financial management system for rural, semi-literate users. In In Proc CHI EA'03, 824--825.
[23]
Henry A Giroux. 2015. Totalitarian paranoia in the post-Orwellian surveillance state. Cultural Studies 29, 2: 108--140.
[24]
Ralph Gross and Alessandro Acquisti. 2005. Information revelation and privacy in online social networks. In In Proceedings of the 2005 ACM workshop on Privacy in the electronic society, 71--80.
[25]
Jürgen Habermas. 1991. The structural transformation of the public sphere: An inquiry into a category of bourgeois society. MIT Press.
[26]
Geert Hofstede. 1984. The cultural relativity of the quality of life concept. Academy of Management Review 9, 3: 389--398.
[27]
Faheem Hussain and Mashiat Mostafa. 2016. Digital Contradictions in Bangladesh: Encouragement and Deterrence of Citizen Engagement via ICTs. Information Technologies & International Development 12, 2: 47.
[28]
Lilly Irani, Janet Vertesi, Paul Dourish, Kavita Philip, and Rebecca E Grinter. 2010. Postcolonial computing: a lens on design and development. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1311--1320.
[29]
Muhammad Zahidul Islam. 2015. SIM re-registration a must in Bangladesh. The Daily Star. Retrieved from http://www.thedailystar.net/frontpage/sim-re-registration-must-139189
[30]
Steven J Jackson, Syed Ishtiaque Ahmed, and Md. Rashidujjaman Rifat. 2014. Learning, innovation, and sustainability among mobile phone repairers in Dhaka, Bangladesh. In In Proc. DIS'14, 905--914.
[31]
Steven J Jackson, Alex Pompe, and Gabriel Krieshok. 2012. Repair worlds: maintenance, repair, and ICT for development in rural Namibia. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, 107--116.
[32]
Elida KU Jacobsen. 2012. Unique Identification: Inclusion and surveillance in the Indian biometric assemblage. Security Dialogue 43, 5: 457--474.
[33]
Aditya Johri and Janaki Srinivasan. 2014. The role of data in aligning the "unique identity" infrastructure in India. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, 697--709.
[34]
Reetika Khera. 2011. The UID Project and Welfare Schemes. Economic and Political Weekly XLVI, 9.
[35]
Nir Kshetri. 2015. Cybercrime and Cybersecurity Issues in the BRICS Economies. Journal of Global Information Technology Management 18, 4: 245--249.
[36]
Neha Kumar. 2015. The gender-technology divide or perceptions of non-use. First Monday 20, 11.
[37]
Neha Kumar and Tapan Parikh. 2013. Mobiles, music, and materiality. In In Proc. CHI'13, 2863--2872.
[38]
Ponnurangam Kumaraguru and Lorrie F Cranor. 2006. Privacy in India: Attitudes and awareness. Privacy Enhancing Technologies: 243--258.
[39]
Heather R Lipford, Gordon Hull, Celine Latulipe, Andrew Besmer, and Jason Watson. Visible flows: Contextual integrity and the design of privacy mechanisms on social network sites. In In Computational Science and Engineering, 2009. CSE'09. International Conference, 985--989.
[40]
David Lyon. 2003. Technology vs "terrorism": circuits of city surveillance since September 11th. International Journal of Urban and Regional Research 27, 3: 666--678.
[41]
David Lyon. 2007. Surveillance studies: An overview. Polity.
[42]
Jane Mansbridge. 1983. Beyond adversary democracy. University of Chicago Press.
[43]
Arindam Mukherjee. 2011. Aadhar, A Few Basic Issues. Outlook.
[44]
Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash L. Rev 79, 119.
[45]
Helen Nissenbaum. 2015. Obfuscation: A User's Guide for Privacy and Protest. MIT Press. Retrieved from https://mitpress.mit.edu/books/obfuscation
[46]
Nimmi Rangaswamy and Sumitra Nair. 2010. The mobile phone store ecology in a Mumbai slum community: Hybrid networks for enterprise. Information technologies & international development 6, 3: pp--51.
[47]
Aruna Roy. 2011. Aadhaar Bound to Fail. The Hindu, Kochi Edition.
[48]
Norman Sadeh, Jason Hong, Lorrie F Cranor, Ian Fette, Patrick Kelley, Madhu Prabakar, and Jinghai Rao. 2009. Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13, 6: 401--412.
[49]
Yasar Guneri Sahin and Tuncay Ercan. 2008. Detection of hidden hostile/terrorist groups in harsh territories by using animals as mobile biological sensors. Sensors 8, 7: 4365--4383.
[50]
Nithya Sambasivan, Ed Cutrell, Kentaro Toyama, and Bonnie Nardi. 2010. Intermediated technology use in developing communities. In In Proc. CHI'10, 2583--2592.
[51]
Daniel J. Solove. 2011. Why privacy matters even if you have "nothing to hide." Chronicle of Higher Education 15. Retrieved from http://www.chronicle.com/article/Why-Privacy-Matters-Even-if/127461
[52]
Susan Leigh Star and Geoffrey C Bowker. 2007. Enacting silence: Residual categories as a challenge for ethics, information systems, and communication. Ethics and Information Technology 9, 4: 273--280.
[53]
Arifuzzaman Tuhin. 2016. Fear around filgerprints for SIM registration. NTV Opinions. Retrieved from http://www.ntvbd.com/opinion/39175/%E0%A6%B8%E0%A6%BF%E0%A6%AE-%E0%A6%A8%E0%A6%BF%E0%A6%AC%E0%A6%A8%E0%A7%8D%E0%A6%A7%E0%A6%A8%E0%A7%87-%E0%A6%86%E0%A6%99%E0%A7%81%E0%A6%B2%E0%A7%87%E0%A6%B0-%E0%A6%9B%E0%A6%BE%E0%A6%AA-%E0%A6%A8%E0%A6%BF%E0%A7%9F%E0%A7%87-%E0%A6%AD%E0%A7%9F
[54]
Samuel D Warren and Louis D Brandeis. 1890. The right to privacy. Harvard Law Review: 193--220.
[55]
Alan F Westin. 1968. Privacy and Freedom. Washington and Lee Law Review 25, 1: 166.
[56]
Wikipedia Aricle. Attacks by Islamic extremists in Bangladesh. Retrieved from https://en.wikipedia.org/wiki/Attacks_by_Islamic_extremists_in_Bangladesh
[57]
Wikipedia Article. International Crimes Tribunal (Bangladesh). Retrieved from https://en.wikipedia.org/wiki/International_Crimes_Tribunal_(Bangladesh)
[58]
David Murakami Wood. 2007. Beyond the Panopticon? Foucault and surveillance studies. Space, knowledge and power: Foucault and geography: 245--263.
[59]
Bauman Zygmunt and David Lyon. 2013. Liquid Surveillance: A Conversation. John Wiley & Sons.
[60]
2013. Bangladesh's ICT Act Stoops to New Lows. Global Voices. Retrieved from https://advox.globalvoices.org/2013/09/18/bangladeshs-ict-act-stoops-to-new-lows/
[61]
2015. Trial biometric SIM registration begins Wednesday. Dhaka Tribune. Retrieved from http://www.dhakatribune.com/bangladesh/2015/oct/20/trial-biometric-sim-registration-begins-wednesday
[62]
2016. Statistics and facts on mobile internet usage. Statista: The Statistical Portal. Retrieved from https://www.statista.com/topics/779/mobile-internet/
[63]
2016. HC questions legality of biometric SIM registration. The Daily Star. Retrieved from http://www.thedailystar.net/country/hc-questions-legality-biometric-sim-registration-791002
[64]
2016. HC okays biometric SIM registration. The Daily Star. Retrieved from http://www.thedailystar.net/country/hc-okays-biometric-registration-sim-1208071
[65]
2016. Deadline for biometric re-registration of SIM cards extended by a month. bdnews24.com. Retrieved from http://bdnews24.com/bangladesh/2016/04/30/deadline-for-biometric-re-registration-of-sim-cards-extended-by-a-month
[66]
2016. "Biometrically registered Robi SIMs" used in fraud, money stolen from bKash accounts: Chittagong police. bdnews24.com. Retrieved from http://bdnews24.com/bangladesh/2016/05/23/biometrically-registered-robi-sims-used-in-fraud-money-stolen-from-bkash-accounts-chittagong-police
[67]
2016. Retailers bio-metrically registering SIMs without users' knowledge: BTRC. The Daily Ittefaq. Retrieved from http://www.clickittefaq.com/retailers-bio-metrically-registering-sims-without-users-knowledge-btrc/
[68]
2016. BIOMETRIC SIM REGISTRATION?: Retailers to face punishment for fee collection. New Age. Retrieved from http://newagebd.net/197633/biometric-sim-registration-retailers-to-face-punishment-for-fee-collection/
[69]
"Biometric SIM registration to help identify criminals." The Daily Samakal. Retrieved from http://www.samakal.net/2016/05/02/5392
[70]
Mass Surveillance. Wikipedia Article. Retrieved from https://en.wikipedia.org/wiki/Mass_surveillance
[71]
Online Survey on Biometric SIM registration in Bangladesh. Retrieved from https://docs.google.com/a/csebuet.org/forms/d/1H3EhWnmAS1tgbrFKNYilpqNH4RaNtwMCqFp7CDeXpq8/edit?usp=drive_web

Cited By

View all
  • (2024)How WEIRD is usable privacy and security research?Proceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699082(3241-3258)Online publication date: 14-Aug-2024
  • (2024)eHealth Data Security and Privacy: Perspectives from Diverse Stakeholders in MalawiProceedings of the ACM on Human-Computer Interaction10.1145/36373238:CSCW1(1-26)Online publication date: 26-Apr-2024
  • (2024)"Things on the Ground are Different": Utility, Survival and Ethics in Multi-Device Ownership and Smartphone Sharing ContextsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642874(1-14)Online publication date: 11-May-2024
  • Show More Cited By

Index Terms

  1. Privacy, Security, and Surveillance in the Global South: A Study of Biometric Mobile SIM Registration in Bangladesh

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems
      May 2017
      7138 pages
      ISBN:9781450346559
      DOI:10.1145/3025453
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 May 2017

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. bangladesh
      2. hci4d
      3. ictd
      4. privacy
      5. security
      6. surveillance

      Qualifiers

      • Research-article

      Conference

      CHI '17
      Sponsor:

      Acceptance Rates

      CHI '17 Paper Acceptance Rate 600 of 2,400 submissions, 25%;
      Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

      Upcoming Conference

      CHI 2025
      ACM CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2025
      Yokohama , Japan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)71
      • Downloads (Last 6 weeks)9
      Reflects downloads up to 13 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)How WEIRD is usable privacy and security research?Proceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699082(3241-3258)Online publication date: 14-Aug-2024
      • (2024)eHealth Data Security and Privacy: Perspectives from Diverse Stakeholders in MalawiProceedings of the ACM on Human-Computer Interaction10.1145/36373238:CSCW1(1-26)Online publication date: 26-Apr-2024
      • (2024)"Things on the Ground are Different": Utility, Survival and Ethics in Multi-Device Ownership and Smartphone Sharing ContextsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642874(1-14)Online publication date: 11-May-2024
      • (2024)Hearing Community Voices in HCI4D: Establishing Safe Places to Co-Create Counter-Collective Narratives with Women Farmers in BangladeshProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642532(1-17)Online publication date: 11-May-2024
      • (2024)Computing and the Stigmatized: Trust, Surveillance, and Spatial Politics with the Sex Workers in BangladeshProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642005(1-22)Online publication date: 11-May-2024
      • (2024)ICT tools for addressing mobility needs of Rohingya refugees with disabilities: practical challenges and solutionsInformation Technology for Development10.1080/02681102.2024.232786430:4(644-664)Online publication date: 8-Mar-2024
      • (2024)Soil Business: Exploring Business Opportunities in Soil Systems for Sustainable Growth in the Global SouthSustainable Soil Systems in Global South10.1007/978-981-97-5276-8_11(317-339)Online publication date: 12-Nov-2024
      • (2023)A First Look into Software Security Practices in BangladeshACM Journal on Computing and Sustainable Societies10.1145/36163831:1(1-24)Online publication date: 22-Sep-2023
      • (2023)Understanding Women's Perspectives on Smart Home Security Systems in Patriarchal Societies of Malawi.Proceedings of the 2023 ACM Designing Interactive Systems Conference10.1145/3563657.3595971(1078-1092)Online publication date: 10-Jul-2023
      • (2023)User Perceptions and Experiences of Targeted Ads on Social Media Platforms: Learning from Bangladesh and IndiaProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581498(1-15)Online publication date: 19-Apr-2023
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media