Privacy, Patriarchy, and Participation on Social Media

Technology use in India is highly gendered across diverse socioeconomic backgrounds, and women have only recently come to widely adopt smartphones, mobile internet, and social media---even in urban India. We present an in-depth qualitative investigation of the appropriation of social computing technologies by women from urban, middle-income households in New Delhi and Bangalore, India. Our findings highlight the additional burden that these women must contend with, on account of gender, as they engage on social media. We discuss these findings to make three contributions. First, we extend conversations on gender in Human-Computer Interaction (HCI) by discussing how design in patriarchal contexts might be rooted in existing efforts towards change and appropriation. Second, we expand understandings of privacy in HCI as being situated in the relationship between the individual and the collective. Third, we discuss how looking at our participants' social media use across multiple platforms leads to greater insight into the link between social media engagement and privacy.

[1]  T. Cao,et al.  To Return or Not to Return , 2021 .

[2]  B. McSweeney Hofstede’s Model of National Cultural Differences and their Consequences: A Triumph of Faith - a Failure of Analysis , 2002, Organizational Collaboration.

[3]  Neha Kumar,et al.  Empowerment on the Margins: The Online Experiences of Community Health Workers , 2019, CHI.

[4]  Naveena Karusala,et al.  Aspirations-based design , 2019, ICTD.

[5]  Jeremy Birnholtz,et al.  'Too Gay for Facebook' , 2018, Proceedings of the ACM on Human-Computer Interaction.

[6]  Josephine Lau,et al.  Alexa, Are You Listening? , 2018, Proc. ACM Hum. Comput. Interact..

[7]  Ann Blandford,et al.  Privacy Unraveling Around Explicit HIV Status Disclosure Fields in the Online Geosocial Hookup App Grindr , 2018, Proc. ACM Hum. Comput. Interact..

[8]  Alfred Kobsa,et al.  When SNS Privacy Settings Become Granular , 2018, Proc. ACM Hum. Comput. Interact..

[9]  Rui Sun,et al.  Departing and Returning , 2018, Proc. ACM Hum. Comput. Interact..

[10]  Neha Kumar,et al.  Engaging Solidarity in Data Collection Practices for Community Health , 2018, Proc. ACM Hum. Comput. Interact..

[11]  Lujo Bauer,et al.  The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios , 2018, Proc. ACM Hum. Comput. Interact..

[12]  Natalia Criado,et al.  Multiparty privacy in social media , 2018, Commun. ACM.

[13]  Richard J. Anderson,et al.  Examining Security and Privacy Research in Developing Regions , 2018, COMPASS.

[14]  Alfred Kobsa,et al.  Collective Privacy Management in Social Media , 2018, ACM Trans. Comput. Hum. Interact..

[15]  Naveena Karusala,et al.  Designing for Intersections , 2018, Conference on Designing Interactive Systems.

[16]  Andruid Kerne,et al.  Queer Visibility: Supporting LGBT+ Selective Visibility on Social Media , 2018, CHI.

[17]  Phoebe Sengers,et al.  Design Within a Patriarchal Society: Opportunities and Challenges in Designing for Rural Women in Bangladesh , 2018, CHI.

[18]  Naveena Karusala,et al.  "Only if you use English you will get to more things": Using Smartphones to Navigate Multilingualism , 2018, CHI.

[19]  Nicola Dell,et al.  “A Stalker's Paradise”: How Intimate Partner Abusers Exploit Technology , 2018, CHI.

[20]  Dan Cosley,et al.  Privacy Lies: Understanding How, When, and Why People Lie to Protect Their Privacy in Multiple Online Contexts , 2018, CHI.

[21]  Bidit Lal Dey,et al.  Selfie appropriation by young British South Asian adults: Reifying, endorsing and reinforcing dual cultural identity in social media , 2018, Inf. Technol. People.

[22]  Susan P. Wyche,et al.  Gender, Mobile, and Mobile Internet| Kenyan Women’s Rural Realities, Mobile Internet Access, and “Africa Rising” , 2018 .

[23]  James Shanahan,et al.  Social media cultivating perceptions of privacy: A 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users , 2018, New Media Soc..

[24]  Nova Ahmed,et al.  Gender equity in technologies , 2018, Interactions.

[25]  LI YAO,et al.  When SNS Privacy Settings Become Granular: Investigating Users’ Choices, Rationales, and Influences on Their Social Experience , 2018 .

[26]  David Nemer,et al.  "Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia , 2018, SOUPS @ USENIX Security Symposium.

[27]  Jay Chen,et al.  Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh , 2017, Proc. ACM Hum. Comput. Interact..

[28]  Susan R. Fussell,et al.  Beyond Information Content , 2017, Proc. ACM Hum. Comput. Interact..

[29]  Naveena Karusala,et al.  Care as a Resource in Underserved Learning Environments , 2017, Proc. ACM Hum. Comput. Interact..

[30]  Cliff Lampe,et al.  Classification and Its Consequences for Online Harassment , 2017, Proc. ACM Hum. Comput. Interact..

[31]  Nicola Dell,et al.  Digital Technologies and Intimate Partner Violence , 2017, Proc. ACM Hum. Comput. Interact..

[32]  Leila Bahri Identity Related Threats, Vulnerabilities and Risk Mitigation in Online Social Networks: A Tutorial , 2017, CCS.

[33]  Molly Wright Steenson,et al.  Beyond the Personal and Private: Modes of Mobile Phone Sharing in Urban India , 2017 .

[34]  Betsy DiSalvo,et al.  Navigating Media Use: Chinese Parents and Their Overseas Adolescent Children on WeChat , 2017, Conference on Designing Interactive Systems.

[35]  Oliver L. Haimson The Social Complexities of Transgender Identity Disclosure on Social Network Sites , 2017, CHI Extended Abstracts.

[36]  Wendy E. Mackay,et al.  "WhatsApp is for family; Messenger is for friends": Communication Places in App Ecosystems , 2017, CHI.

[37]  Naveena Karusala,et al.  Women's Safety in Public Spaces: Examining the Efficacy of Panic Buttons in New Delhi , 2017, CHI.

[38]  Yongick Jeong,et al.  Privacy concerns on social networking sites: Interplay among posting types, content, and audiences , 2017, Comput. Hum. Behav..

[39]  Jeremy P. Birnholtz,et al.  Platforms, People, and Perception: Using Affordances to Understand Self-Presentation on Social Media , 2017, CSCW.

[40]  Zahra Ashktorab,et al.  Identifying Women's Experiences With and Strategies for Mitigating Negative Effects of Online Harassment , 2017, CSCW.

[41]  P. Arora,et al.  Slumdog romance: Facebook love and digital privacy at the margins , 2017, Media, culture, and society.

[42]  Nicola J. Bidwell,et al.  Gender and Participation: Critical Reflection on Zenzeleni Networks in Mankosi, South Africa , 2016, AfriCHI.

[43]  Ben L. Marder,et al.  Strength matters: Self-presentation to the strongest audience rather than lowest common denominator when faced with multiple audiences in social network sites , 2016, Comput. Hum. Behav..

[44]  Pamela J. Wisniewski,et al.  Dear Diary: Teens Reflect on Their Weekly Online Risk Experiences , 2016, CHI.

[45]  Tawfiq Ammari,et al.  LGBT Parents and Social Media: Advocacy, Privacy, and Disclosure during Shifting Social Movements , 2016, CHI.

[46]  Norah Abokhodair,et al.  Privacy & Social Media in the Context of the Arab Gulf , 2016, Conference on Designing Interactive Systems.

[47]  Sarah Vieweg,et al.  Surveillance & Modesty on Social Media: How Qataris Navigate Modernity and Maintain Tradition , 2016, CSCW.

[48]  Paul Dourish,et al.  Why study technology non-use? , 2015, First Monday.

[49]  Neha Kumar,et al.  The gender-technology divide or perceptions of non-use? , 2015, First Monday.

[50]  Tawanna Dillahunt,et al.  "If god gives me the chance i will design my own phone": exploring mobile phone repair and postcolonial approaches to design in rural Kenya , 2015, UbiComp.

[51]  Ineke Buskens,et al.  Women and ICT in Africa and the Middle East : changing selves, changing societies , 2015 .

[52]  Anicia N. Peters,et al.  Cultural influences on Facebook practices: A comparative study of college students in Namibia and the United States , 2015, Comput. Hum. Behav..

[53]  A. Hurtig,et al.  Socio-cultural and service delivery dimensions of maternal mortality in rural central India: a qualitative exploration using a human rights lens , 2015, Global health action.

[54]  Susan R. Fussell,et al.  Retrospective Analysis of Cognitive and Affective Responses in Intercultural and Intracultural Conversations , 2015 .

[55]  Paul Dourish,et al.  On the importance and implications of studying technology non-use , 2015, Interactions.

[56]  David Tuffley,et al.  The Gender Digital Divide in Developing Countries , 2014, Future Internet.

[57]  Neha Kumar,et al.  Facebook for self-empowerment? A study of Facebook adoption in urban India , 2014, New Media Soc..

[58]  Sarita Yardi Schoenebeck,et al.  Giving up Twitter for Lent: how and why we take breaks from social media , 2014, CHI.

[59]  Susan R. Fussell,et al.  Intercultural Awareness: Cultural and Relational Effects on Awareness Information Gathering Behavior , 2014 .

[60]  Silvia Lindtner,et al.  Introduction to This Special Issue on Transnational HCI , 2014, Hum. Comput. Interact..

[61]  Silvia Lindtner,et al.  Multisited Design: An Analytical Lens for Transnational HCI , 2014, Hum. Comput. Interact..

[62]  S. Revi Sterling,et al.  Minding the gaps: cultural, technical and gender-based barriers to mobile use in oral-language Berber communities in Morocco , 2013, ICTD.

[63]  Tapan S. Parikh,et al.  Understanding barriers to information access and disclosure for HIV+ women , 2013, ICTD.

[64]  N. Rangaswamy,et al.  Digital leisure for development: reframing new media practice in the global South , 2013 .

[65]  Ellie Harmon,et al.  Stories of the Smartphone in everyday discourse: conflict, tension & instability , 2013, CHI.

[66]  Madeline E. Smith,et al.  Limiting, leaving, and (re)lapsing: an exploration of facebook non-use practices and experiences , 2013, CHI.

[67]  Tawanna Dillahunt,et al.  Deep conservation in urban India and its implications for the design of conservation technologies , 2013, CHI.

[68]  Nicola J. Bidwell,et al.  Toward an Afro-Centric Indigenous HCI Paradigm , 2013, Int. J. Hum. Comput. Interact..

[69]  Jessica Vitak The Impact of Context Collapse and Privacy on Social Network Site Disclosures , 2012 .

[70]  Pamela J. Wisniewski,et al.  Fighting for my space: coping mechanisms for sns boundary regulation , 2012, CHI.

[71]  Joshua Evan Blumenstock,et al.  Differences in phone use between men and women: quantitative evidence from Rwanda , 2012, ICTD '12.

[72]  Silvia Lindtner,et al.  Cultural appropriation: information technologies as sites of transnational imagination , 2012, CSCW.

[73]  Cliff Lampe,et al.  "Why won't you be my Facebook friend?": strategies for managing context collapse in the workplace , 2012, iConference '12.

[74]  Baiyun Chen,et al.  Investigating Instructional Strategies for Using Social Media in Formal and Informal Learning. , 2012 .

[75]  M. Hilbert,et al.  Digital Gender Divide or Technologically Empowered Women in Developing Countries? A Typical Case of Lies, Damned Lies, and Statistics , 2011 .

[76]  Amy Bruckman,et al.  Domestic violence and information communication technologies , 2011, Interact. Comput..

[77]  Katharina Reinecke,et al.  Improving performance, perceived usability, and aesthetics with culturally adaptive user interfaces , 2011, TCHI.

[78]  Silvia Lindtner,et al.  Transnational HCI: humans, computers, and interactions in transnational contexts , 2011, CHI Extended Abstracts.

[79]  Airi Lampinen,et al.  We're in it together: interpersonal management of disclosure in social network services , 2011, CHI.

[80]  Danah Boyd,et al.  I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience , 2011, New Media Soc..

[81]  Laura Murphy,et al.  “My co-wife can borrow my mobile phone!” , 2011 .

[82]  Nathan Eagle,et al.  Mobile divides: gender, socioeconomic status, and mobile phone use in Rwanda , 2010, ICTD.

[83]  Pei-Luen Patrick Rau,et al.  The Influence of Cultural Differences on the Use of Social Network Services and the Formation of Social Capital , 2010, Int. J. Hum. Comput. Interact..

[84]  Danah Boyd,et al.  Facebook privacy settings: Who cares? , 2010, First Monday.

[85]  David M. Nicol,et al.  unFriendly: Multi-party Privacy Risks in Social Networks , 2010, Privacy Enhancing Technologies.

[86]  Heather Richter Lipford,et al.  Moving beyond untagging: photo privacy in a tagged world , 2010, CHI.

[87]  Shaowen Bardzell,et al.  Feminist HCI: taking stock and outlining an agenda for design , 2010, CHI.

[88]  Jacob Kramer-Duffield,et al.  Friends only: examining a privacy-enhancing behavior in facebook , 2010, CHI.

[89]  Gary Marsden,et al.  After access: challenges facing mobile-only internet users in the developing world , 2010, CHI.

[90]  Eli Blevis,et al.  Examining appropriation, re-use, and maintenance for sustainability , 2010, CHI Extended Abstracts.

[91]  A. Morgan,et al.  Health assets in a global context : theory, methods, action , 2010 .

[92]  A. Morgan,et al.  Health assets in a global context : theory, methods, action , 2010 .

[93]  Jenna Burrell,et al.  Evaluating Shared Access: social equality and the circulation of mobile phones in rural Uganda , 2010, J. Comput. Mediat. Commun..

[94]  Philip Johnson,et al.  Uses and Gratifications of Twitter: An Examination of User Motives and Satisfaction of Twitter Use , 2009 .

[95]  S. Radhakrishnan Professional Women, Good Families: Respectable Femininity and the Cultural Politics of a “New” India , 2009 .

[96]  E. Green,et al.  Mobile Connections: An Exploration of the Place of Mobile Phones in Friendship Relations , 2009 .

[97]  Alex S. Taylor,et al.  Resilience in the face of innovation: Household trials with BubbleBoard , 2009, Int. J. Hum. Comput. Stud..

[98]  Cliff Lampe,et al.  Changes in use and perception of facebook , 2008, CSCW.

[99]  Seounmi Youn Parental Influence and Teens’ Attitude toward Online Privacy Protection , 2008 .

[100]  J. Donner The Use of Mobile Phones by Microentrepreneurs in Kigali, Rwanda: Changes to Social and Business Networks , 2007 .

[101]  Panayiotis Zaphiris,et al.  Cultural Differences in Collaborative Authoring of Wikipedia , 2006, J. Comput. Mediat. Commun..

[102]  S. Berg Snowball Sampling—I , 2006 .

[103]  Victor Jupp,et al.  The SAGE Dictionary of Social Research Methods , 2006 .

[104]  V. Braun,et al.  Using thematic analysis in psychology , 2006 .

[105]  Sonia Dalmia,et al.  The Institution of Dowry in India: Why It Continues To Prevail , 2005 .

[106]  Sophia Huyer,et al.  Women, ICT and the information society: global perspectives and initiatives , 2005, CWIT '05.

[107]  Wendy March,et al.  Designing technology for community appropriation , 2005, CHI EA '05.

[108]  Sarah Lucas,et al.  Sexual-Minority and Heterosexual Youths' Peer Relationships: Experiences, Expectations, and Implications for Well-Being , 2004 .

[109]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[110]  A. Mathie,et al.  From clients to citizens: Asset-based Community Development as a strategy for community-driven development , 2003 .

[111]  Helene Gelderblom,et al.  The effects of culture on performance achieved through the use of human computer interaction , 2003 .

[112]  C. Mohanty “Under Western Eyes” Revisited: Feminist Solidarity through Anticapitalist Struggles , 2003, Signs: Journal of Women in Culture and Society.

[113]  G. Hofstede Culture′s Consequences: Comparing Values, Behaviors, Institutions and Organizations Across Nations , 2001 .

[114]  E. W. Gould,et al.  Crosscurrents: cultural dimensions and global Web user-interface design , 2000, INTR.

[115]  J. McKnight,et al.  Assets‐based community development , 1996 .

[116]  Ann Swidler CULTURE IN ACTION: SYMBOLS AND STRATEGIES* , 1986 .

[117]  G. Hofstede Cultural dimensions in management and planning , 1984 .

[118]  Gerald Grow,et al.  Association for Education in Journalism and Mass Communication , 1982 .

[119]  I. Altman Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .

[120]  J. Freedman,et al.  Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .

[121]  R. Purdue Listen to the Drums—The Compulsory Joint Return , 1942 .