ABSTRACT
South Asia faces one of the largest gender gaps online globally, and online safety is one of the main barriers to gender-equitable Internet access [GSMA, 2015]. To better understand the gendered risks and coping practices online in South Asia, we present a qualitative study of the online abuse experiences and coping practices of 199 people who identified as women and 6 NGO staff from India, Pakistan, and Bangladesh, using a feminist analysis. We found that a majority of our participants regularly contended with online abuse, experiencing three major abuse types: cyberstalking, impersonation, and personal content leakages. Consequences of abuse included emotional harm, reputation damage, and physical and sexual violence. Participants coped through informal channels rather than through technological protections or law enforcement. Altogether, our findings point to opportunities for designs, policies, and algorithms to improve women's safety online in South Asia.
- 2017. Hamara Internet: Measuring Pakistani women's experiences of online violence. Technical Report.Google Scholar
- 2017. Hindustan Times: Stalkers' delight: Mobile numbers of girls for sale in UP recharge shops. https://goo.gl/bfVEDkGoogle Scholar
- 2017. How 'Doxxing' Became a Mainstream Tool in the Culture Wars - The New York Times. https://www.nytimes.com/2017/08/30/technology/doxxingprotests.html. (Accessed on 09/15/2018).Google Scholar
- 2017. Legal action on cyber violence against women. (12 2017).Google Scholar
- 2018. Definitions - Cyber Civil Rights Initiative. https://www.cybercivilrights.org/definitions/. (Accessed on 09/15/2018).Google Scholar
- 2018. Sexual Harassment. https://www.eeoc.gov/laws/types/sexualharassment.cfmGoogle Scholar
- Lila Abu-Lughod. 2002. Do Muslim women really need saving? Anthropological reflections on cultural relativism and its others. American anthropologist 104, 3 (2002), 783--790.Google Scholar
- Syed Ishtiaque Ahmed, Md Romael Haque, Shion Guha, Md Rashidujjaman Rifat, and Nicola Dell. 2017. Privacy, security, and surveillance in the Global South: A study of biometric mobile SIM registration in Bangladesh. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 906--918. Google ScholarDigital Library
- Syed Ishtiaque Ahmed, Steven J Jackson, Nova Ahmed, Hasan Shahid Ferdous, Md Rashidujjaman Rifat, ASM Rizvi, Shamir Ahmed, and Rifat Sabbir Mansur. 2014. Protibadi: A platform for fighting sexual harassment in urban Bangladesh. Proceedings of the 32nd annual ACM conference on Human factors in computing systems, 2695--2704. Google ScholarDigital Library
- Chang Ailsa. 2017. Familiar-Looking Numbers Are The Latest Twist In Robocalls. NPR (2017).Google Scholar
- Eileen M Alexy, Ann W Burgess, Timothy Baker, and Shirley A Smoyak. 2005. Perceptions of cyberstalking among college students. Brief treatment and crisis intervention 5, 3 (2005), 279.Google Scholar
- Ferenak Amidi. 2018. Giving Social Media in Iran and Afghanistan a More Gender Balanced Voice. https://www.youtube.com/watch?v=BwhdA6Q1xQEGoogle Scholar
- Dascalescu Ana. 2018. Doxxing Can Ruin Your life. Here's How (You Can Avoid It). Heimdal security (2018).Google Scholar
- Nazanin Andalibi, Oliver L Haimson, Munmun De Choudhury, and Andrea Forte. 2016. Understanding social media disclosures of sexual abuse through the lenses of support seeking and anonymity. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 3906--3918. Google ScholarDigital Library
- John Ashcroft. 2001. Stalking and domestic violence: A report to Congress. No. NCJ 186157, Washington, DC: U.S. Department of Justice 13 (2001).Google Scholar
- Sethi Ashpreet. 2012. Getting Aadhaar card big challenge for transgenders | Deccan Herald. https://www.deccanherald.com/content/250353/gettingaadhaar-card-big-challenge.html. (Accessed on 09/17/2018).Google Scholar
- Shreya Bhandari and Jennifer C Hughes. 2017. Lived Experiences of Women Facing Domestic Violence in India. Journal of Social Work in the Global Community 2, 1 (2017), 2.Google ScholarCross Ref
- Ananya Bhattacharya. 2018. In India, the internet is a place for urban dwellers, men and youngsters Quartz India. https://qz.com/india/1211218/in-indiathe-internet-is-a-place-for-urban-dwellers-men-and-youngsters/. (Accessed on 01/04/2019).Google Scholar
- Lindsay Blackwell, Jill P Dimond, Sarita Schoenebeck, and Cliff Lampe. 2017. Classification and Its Consequences for Online Harassment: Design Insights from HeartMob. PACMHCI 1, CSCW (2017), 24--1. Google ScholarDigital Library
- Jan Blom, Divya Viswanathan, Mirjana Spasojevic, Janet Go, Karthik Acharya, and Robert Ahonius. 2010. Fear and the city: role of mobile services in harnessing safety and security in urban use contexts. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1841--1850. Google ScholarDigital Library
- danah boyd. 2012. Truth, Lies, and 'Doxxing': The Real Moral of the Gawker/Reddit Story. Wired (2012).Google Scholar
- Wanda Cassidy, Margaret Jackson, and Karen N Brown. 2009. Sticks and stones can break my bones, but how can pixels hurt me? Students experiences with cyber-bullying. School psychology international 30, 4 (2009), 383--402.Google Scholar
- Maitrayee Chaudhuri. 2004. Feminism in India. (2004).Google Scholar
- Radhika Chopra. 2003. Rethinking Pro-Feminism: Men, Work and Family in India. (2003).Google Scholar
- Danielle Keats Citron. 2014. Hate crimes in cyberspace. Harvard University Press.Google ScholarDigital Library
- Danielle Keats Citron and Mary Anne Franks. 2014. Criminalizing revenge porn. Wake Forest L. Rev. 49 (2014), 345.Google Scholar
- Danielle J Corple. 2016. Beyond the Gender Gap: Understanding Women's Participation in Wikipedia. (2016).Google Scholar
- Chhaya Datar. 1993. The struggle against violence. Calcutta: Stree (1993).Google Scholar
- Jill P Dimond, Michaelanne Dye, Daphne LaRose, and Amy S Bruckman. 2013. Hollaback!: the role of storytelling online in a social movement organization. Proceedings of the 2013 conference on Computer supported cooperative work, 477-- 490. Google ScholarDigital Library
- Jill P Dimond, Casey Fiesler, and Amy S Bruckman. 2011. Domestic violence and information communication technologies. Interacting with Computers 23, 5 (2011), 413--421. Google ScholarDigital Library
- Karthik Dinakar, Birago Jones, Catherine Havasi, Henry Lieberman, and Rosalind Picard. 2012. Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Transactions on Interactive Intelligent Systems (TiiS) 2, 3 (2012), 18. Google ScholarDigital Library
- David Finkelhor, Kimberly Mitchell, and Janis Wolak. {n. d.}. Highlights of the Youth Internet Safety Survey. Juvenile Justice Fact Sheet - FS200104 (pgs. 1--2). Technical Report. Washingtion, DC.Google Scholar
- Jerry Finn. 2004. A survey of online harassment at a university campus. Journal of Interpersonal violence 19, 4 (2004), 468--483.Google ScholarCross Ref
- World Economic Forum. 2017. The Global Gender Gap Report 2017. (2017). https://www.weforum.org/reports/the-global-gender-gap-report-2017Google Scholar
- Jesse Fox and Wai Yen Tang. 2017. Women's experiences with general and sexual harassment in online video games: Rumination, organizational responsiveness, withdrawal, and coping strategies. New Media & Society 19, 8 (2017), 1290--1307.Google ScholarCross Ref
- Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2017. Digital technologies and intimate partner violence: a qualitative analysis with multiple stakeholders. PACM: Human-Computer Interaction: Computer-Supported Cooperative Work and Social Computing (CSCW) Vol 1 (2017). Google ScholarDigital Library
- Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. "A Stalker's Paradise": How Intimate Partner Abusers Exploit Technology. Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 667. Google ScholarDigital Library
- FTC. 2017. Phishing. FTC (2017).Google Scholar
- Imran Gabol and Taser Subhani. 2016. Qandeel Baloch murdered by brother in Multan. Dawn. https://www.dawn.com/news/1271213Google Scholar
- Oana Goga, Giridhari Venkatadri, and Krishna P Gummadi. 2015. The doppelg´ 'anger bot attack: Exploring identity impersonation in online social networks. In Proceedings of the 2015 Internet Measurement Conference. ACM, 141-- 153. Google ScholarDigital Library
- GSMA. 2015. Bridging the gender gap: Mobile access and usage in low-and middle-income countries. (2015).Google Scholar
- GSMA. 2018. The Mobile Gender Gap Report. (2018).Google Scholar
- Debarati Halder and K Jaishankar. 2013. Revenge porn by teens in the United States and India: A socio-legal analysis. International Annals of Criminology 51, 1--2 (2013), 85--111.Google ScholarCross Ref
- Michael James Heron, Pauline Belford, and Ayse Goker. 2014. Sexism in the circuitry: female participation in male-dominated popular computer culture. ACM SIGCAS Computers and Society 44, 4 (2014), 18--29. Google ScholarDigital Library
- The Hindu. 2018. The Right To Love. (09 2018). https://www.thehindu.com/opinion/editorial/the-right-to-love/article24885401.eceGoogle Scholar
- Saroop Ijaz. 2018. Another Transgender Woman Killed in Pakistan. Human Rights Watch. https://www.hrw.org/news/2018/05/08/another-transgenderwoman-killed-pakistanGoogle Scholar
- Mayank Jain. 2016. India's internet population is exploding but women are not logging in. Scroll.in (26 9 2016). https://scroll.in/article/816892/indias-internetpopulation-is-exploding-but-women-are-not-logging-iniaGoogle Scholar
- Lakshman Jeyaseelan, Shuba Kumar, Nithya Neelakantan, Abraham Peedicayil, Rajamohanam Pillai, and Nata Duvvury. 2007. Physical spousal violence against women in India: some risk factors. Journal of biosocial science 39, 5 (2007), 657--670.Google ScholarCross Ref
- Shagun Jhaver, Sucheta Ghoshal, Amy Bruckman, and Eric Gilbert. 2018. Online harassment and content moderation: The case of blocklists. ACM Transactions on Computer-Human Interaction (TOCHI) 25, 2 (2018), 12. Google ScholarDigital Library
- Heidi Bart Johnston and Ruchira Tabassum Naved. 2008. Spousal violence in Bangladesh: a call for a public-health response. Journal of health, population, and nutrition 26, 3 (2008), 366.Google Scholar
- Naveena Karusala and Neha Kumar. 2017. Women's Safety in Public Spaces: Examining the Efficacy of Panic Buttons in New Delhi. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 3340--3351. Google ScholarDigital Library
- Colleen M Koch. 2017. To Catch a Catfish: A Statutory Solution for Victims of Online Impersonation. U. Colo. L. Rev. 88 (2017), 233.Google Scholar
- Michael A Koenig, Rob Stephenson, Saifuddin Ahmed, Shireen J Jejeebhoy, and Jacquelyn Campbell. 2006. Individual and contextual determinants of domestic violence in North India. American journal of public health 96, 1 (2006), 132--138.Google Scholar
- Anja Kovacs, Richa Kaul Padte, and Shobha SV. 2013. Don't let it stand: An Exploratory Study of Women and Verbal Online Abuse in India. (4 2013).Google Scholar
- Amanda Lenhart, Michele Ybarra, Kathryn Zickuhr, and Myeshia Price-Feeney. 2016. Online harassment, digital abuse, and cyberstalking in America. Data and Society Research Institute.Google Scholar
- Ania Loomba and Ritty A Lukose. 2012. South Asian Feminisms. Duke University Press.Google Scholar
- Shadma Malik. 2017. The spectre of online sexual harassment | The Daily Star. The Daily Star. https://www.thedailystar.net/opinion/society/the-spectreonline-sexual-harassment-1510252Google Scholar
- Alice Marwick and Ross Miller. 2014. Online harassment, defamation, and hateful speech: A primer of the legal landscape. (2014).Google Scholar
- Christina Masden and W Keith Edwards. 2015. Understanding the role of community in online dating. Proceedings of the 33rd annual ACM conference on human factors in computing systems, 535--544. Google ScholarDigital Library
- Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F Churchill, and Sunny Consolvo. 2017. Stories from survivors: Privacy & security practices when coping with intimate partner abuse. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2189--2201. Google ScholarDigital Library
- Mary Meeker. {n. d.}. 2015 Internet Trends. http://www.kpcb.com/blog/2015internet-trends 00000.Google Scholar
- Niveditha Menon. 2008. Domestic violence in India: Identifying types of control and coping mechanisms in violent relationships. (2008).Google Scholar
- Nivedita Menon. 2015. Is Feminism about'Women'? Economic and Political Weekly 50, 17 (2015), 37--44.Google Scholar
- Chandra Talpade Mohanty. 1988. Under Western eyes: Feminist scholarship and colonial discourses. Feminist review 30 (1988), 61--88.Google Scholar
- Ellen Nakashima. 2007. Sexual Threats Stifle Some Female Bloggers. Washington Post (30 4 2007).Google Scholar
- Bonnie Nardi, Ravi Vatrapu, and Torkil Clemmensen. 2011. Comparative informatics. interactions 18, 2 (2011), 28--33. Google ScholarDigital Library
- Express news service. 2016. Girl commits suicide after morphed pics appear on Facebook. (2016). http://www.newindianexpress.com/states/tamilnadu/Girl-commits-suicide-after-morphed-pics-appear-on-Facebook/2016/06/28/ article3503206.eceGoogle Scholar
- Market Research Society of India. 2011. The New SEC system. (5 2011). http://mruc.net/uploads/posts/b17695616c422ec8d9dadafc1c3eec26.pdfGoogle Scholar
- FE online. 2018. Muzaffarpur shelter home case: Major crackdown by Bihar government - The Financial Express. https://www.financialexpress.com/india-news/muzaffarpur-shelter-home-case-major-crackdown-by-bihargovernment/1267581/Google Scholar
- Tim Owen, Wayne Noble, and Faye Christabel Speed. 2017. Silenced by Free Speech: How cyberabuse affects debate and democracy. In New Perspectives on Cybercrime. Springer, 159--174.Google Scholar
- Joyojeet Pal, Tawfiq Ammari, Ramaswami Mahalingam, Ana Maria Huaita Alfaro, and Meera Lakshmanan. 2013. Marginality, aspiration and accessibility in ICTD. In Proceedings of the Sixth International Conference on Information and Communication Technologies and Development: Full Papers-Volume 1. ACM, 68-- 78. Google ScholarDigital Library
- Hanna Papanek. 1971. Purdah in Pakistan: seclusion and modern occupations for women. Journal of Marriage and the Family (1971), 517--530.Google Scholar
- Justin W Patchin and Sameer Hinduja. 2006. Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth violence and juvenile justice 4, 2 (2006), 148--169.Google ScholarCross Ref
- Jessica A Pater, Moon K Kim, Elizabeth D Mynatt, and Casey Fiesler. 2016. Characterizations of online harassment: Comparing policies across social media platforms. Proceedings of the 19th International Conference on Supporting Group Work, 369--374. Google ScholarDigital Library
- JW Pennebaker. 2011. The secret life of pronouns: How our words reflect who we are. New York, NY: Bloomsbury (2011).Google ScholarCross Ref
- Fauzia Rabbani, F Qureshi, and Narjis Rizvi. 2008. Perspectives on domestic violence: case study from Karachi, Pakistan. (2008).Google Scholar
- Raad Rahman. 2017. No Country for Bangladesh's Gay Men. New York Times. https://www.nytimes.com/2017/06/30/opinion/bangladesh-lgbt-gay.htmlGoogle Scholar
- Lee Rainie. 2017. PEW survey: Online harassment. (2017).Google Scholar
- Srila Roy. 2012. New south Asian feminisms: Paradoxes and possibilities. Zed Books Ltd.Google Scholar
- Rebecca Ruiz. 2018. Deepfakes are about to make revenge porn so much worse. Mashable (24 6 2018). https://mashable.com/2018/06/24/deepfakes-revengeporn-domestic-violence/#KSN0cUpieOqcGoogle Scholar
- Kohn Sally. 2015. I Got Doxxed So You Don't Have To. Daily Beast (2015).Google Scholar
- Nithya Sambasivan, Garen Checkley, Nova Ahmed, and Amna Batool. 2017. Gender equity in technologies: considerations for design in the global south. interactions 25, 1 (2017), 58--61. Google ScholarDigital Library
- Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laurely Gaytan-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. {n. d.}. "Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia. SOUPS 2018. Google ScholarDigital Library
- Nithya Sambasivan and Jess Holbrook. 2018. Toward responsible AI for the next billion users. Interactions 26, 1 (2018), 68--71. Google ScholarDigital Library
- Nithya Sambasivan, Nimmi Rangaswamy, Ed Cutrell, and Bonnie Nardi. 2009. Ubicomp4D: infrastructure and interaction for international development--the case of urban indian slums. In Proceedings of the 11th international conference on Ubiquitous computing. ACM, 155--164. Google ScholarDigital Library
- Doug Shadel and David Dudley. 2015. 'Are You Real?' - Inside an Online Dating Scam. AARP.Google Scholar
- Ranjit Singh and Steven J Jackson. 2017. From Margins to Seams: Imbrication, Inclusion, and Torque in the Aadhaar Identification Project. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 4776-- 4824. Google ScholarDigital Library
- Sushma Sood. 1990. Violence against women. Arihant Pub.Google Scholar
- Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, and Sarah Tucker. 2007. Intimate partner violence, technology, and stalking. Violence against women 13, 8 (2007), 842--856.Google Scholar
- Newsweek staff. 2018. Suicide spurs web regulation in North Korea. (2018). https://www.newsweek.com/suicide-spurs-web-regulation-southkorea-92485Google Scholar
- Michele Stephanie. 2015. I Was Catfished: This Is What I Decided to Do About It. Huffington Post (2015).Google Scholar
- David R Thomas. 2006. A general inductive approach for analyzing qualitative evaluation data. American journal of evaluation 27, 2 (2006), 237--246.Google Scholar
- Patricia Godeke Tjaden and Nancy Thoennes. 1998. Stalking in America: Findings from the national violence against women survey. (1998).Google Scholar
- Michael Trice. 2015. Putting GamerGate in context: how group documentation informs social media activity. Proceedings of the 33rd Annual International Conference on the Design of Communication, 37. Google ScholarDigital Library
- Aditya Vashistha, Richard Anderson, and Shrirang Mare. 2018. Examining Security and Privacy Research in Developing Regions. In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies. ACM, 25. Google ScholarDigital Library
- Jessica Vitak, Kalyani Chadha, Linda Steiner, and Zahra Ashktorab. 2017. Identifying Women's Experiences With and Strategies for Mitigating Negative Effects of Online Harassment. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 1231--1245. Google ScholarDigital Library
- Laura Vitis and Fairleigh Gilmour. 2017. Dick pics on blast: A woman's resistance to online sexual harassment using humour, art and Instagram. Crime, media, culture 13, 3 (2017), 335--355.Google Scholar
- Nancy E Willard. 2007. Cyberbullying and cyberthreats: Responding to the challenge of online social aggression, threats, and distress. Research Press. Google ScholarDigital Library
- Benjamin Wittes, Cody Poplin, Quinta Jurecic, and Clara Spera. 2016. Sextortion: Cybersecurity, teenagers, and remote sexual assault. Center for Technology at Brookings. https://www.brookings.edu/wpcontent/uploads/2016/05/sextortion1--1.pdf. Accessed 16 (2016).Google Scholar
- Janis Wolak and David Finkelhor. 2016. Sextortion: Findings from a survey of 1,631 victims. (2016).Google Scholar
- Delanie Woodlock. 2017. The abuse of technology in domestic violence and stalking. Violence against women 23, 5 (2017), 584--602.Google Scholar
- Rubeena Zakar, Muhammad Zakria Zakar, and Alexander Krämer. 2012. Voices of strength and struggle: Women's coping strategies against spousal violence in Pakistan. Journal of interpersonal violence 27, 16 (2012), 3268--3298.Google ScholarCross Ref
Index Terms
- "They Don't Leave Us Alone Anywhere We Go": Gender and Digital Abuse in South Asia
Recommendations
Threats, Abuses, Flirting, and Blackmail: Gender Inequity in Social Media Voice Forums
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing SystemsHCI4D researchers and practitioners have leveraged voice forums to enable people with literacy, socioeconomic, and connectivity barriers to access, report, and share information. Although voice forums have received impassioned usage from low-income, low-...
Design Within a Patriarchal Society: Opportunities and Challenges in Designing for Rural Women in Bangladesh
CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing SystemsThis paper examines the opportunities and issues that arise in designing technologies to support low-income rural women in Bangladesh. Through a qualitative, empirical study with 90 participants, we reveal systemic everyday challenges that women face ...
Emerging Adults' Coping Strategies: Longitudinal Linkages to their Involvement in Cyber Aggression and Cyber Victimization
The present study examined coping strategies for cyber victimization among 270 130 women emerging adults, and how these strategies related to cyber aggression one year later Time 2. The most frequently utilized coping strategies among emerging adults ...
Comments