[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Social Photo-Elicitation: The Use of Communal Production of Meaning to Hear a Vulnerable Population

Published: 01 November 2018 Publication History

Abstract

We report on an initial ethnographic exploration of the situation of sex-trafficking survivors in Nepal. In the course of studying trafficking survivors in a protected-living situation created by a non-governmental organization in Nepal, we adapted photo-elicitation to hear the voices of the survivors by making the technique more communal. Bringing sociality to the forefront of the method reduced the pressure on survivors to assert voices as individuals, allowing them to speak. We make three contributions to research. First, we propose a communal form of photo-elicitation as a method to elicit values in sensitive settings. Second, we present the complex circumstances of the survivors as they undergo rehabilitation and move towards life with a "new normal". Third, our work adds to HCI and CSCW literature on understanding specific concerns of trafficking survivors and aims to inform designs that can support reintegration of survivors in society. The values that the survivors hold and their notion of future opportunities suggest possession of limited but important social capital in some domains that could be leveraged to aid reintegration.

References

[1]
Nazanin Andalibi, Oliver L Haimson, Munmun De Choudhury, and Andrea Forte. 2016. Understanding social media disclosures of sexual abuse through the lenses of support seeking and anonymity. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 3906--3918.
[2]
Marko Balabanović, Lonny L Chu, and Gregory J Wolff. 2000. Storytelling with digital photographs. In Proceedings of the SIGCHI conference on Human Factors in Computing Systems. ACM, 564--571.
[3]
Shaowen Bardzell. 2010. Feminist HCI: taking stock and outlining an agenda for design. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 1301--1310.
[4]
Eric PS Baumer and M Silberman. 2011. When the implication is not to design (technology). In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2271--2274.
[5]
Margot Brereton, Alessandro Soro, Kate Vaisutis, and Paul Roe. 2015. The messaging kettle: Prototyping connection over a distance between adult children and older parents. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 713--716.
[6]
Margot Brereton, Malavika Vasudevan, Tshering Dema, Jessica L Cappadonna, Cara Wilson, and Paul Roe. 2017. The Ambient Birdhouse: Bringing birds inside to learn about birds outside. In Proceedings of the 2016 ACM Conference Companion Publication on Designing Interactive Systems . ACM, 321--324.
[7]
Finn Brunton and Helen Nissenbaum. 2015. Obfuscation: A user's guide for privacy and protest .Mit Press.
[8]
Jillian Cameron. 2017. Women in Nepal and Yemen: Second-Class Citizens. Global Majority E-Journal (2017), 49.
[9]
Tara Capel, Dhaval Vyas, and Margot Brereton. 2017. Women in Crisis Situations: Empowering and Supporting Women Through ICTs. In IFIP Conference on Human-Computer Interaction. Springer, 64--84.
[10]
Paul Chandler and John Sweller. 1996. Cognitive load while learning to use a computer program. Applied cognitive psychology, Vol. 10, 2 (1996), 151--170.
[11]
Catherine Chen and Karen Marcovici. 2003. Exploring the status of reintegrated girls: A participatory study. Kathmandu: Columbia University and Save the Children USA (2003).
[12]
Rachel Clarke, Peter Wright, Madeline Balaam, and John McCarthy. 2013. Digital portraits: photo-sharing after domestic violence. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 2517--2526.
[13]
John Collier. 1957. Photography in anthropology: a report on two experiments. American anthropologist, Vol. 59, 5 (1957), 843--859.
[14]
Andy Crabtree, Terry Hemmings, Tom Rodden, Keith Cheverst, Karen Clarke, Guy Dewsbury, John Hughes, and Mark Rouncefield. 2003. Designing with care: Adapting cultural probes to inform design in sensitive settings. In Proceedings of OzCHI 2003. Ergonomics Society of Australia, 4--13.
[15]
Andy Crabtree, Tom Rodden, and John Mariani. 2004. Collaborating around collections: informing the continued development of photoware. In Proceedings of the 2004 ACM conference on Computer supported cooperative work. ACM, 396--405.
[16]
Mary Crawford and Michelle R Kaufman. 2008. Sex trafficking in Nepal: Survivor characteristics and long-term outcomes. Violence against women, Vol. 14, 8 (2008), 905--916.
[17]
Tawanna R Dillahunt. 2014. Fostering social capital in economically distressed communities. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 531--540.
[18]
Silvia Dominguez and Celeste Watkins. 2003. Creating networks for survival and mobility: Social capital among African-American and Latin-American low-income mothers. Social problems, Vol. 50, 1 (2003), 111--135.
[19]
Sarah Fox, Rachel Rose Ulgado, and Daniela Rosner. 2015. Hacking culture, not devices: Access and recognition in feminist hackerspaces. In Proceedings of the 18th ACM conference on Computer supported cooperative work & social computing. ACM, 56--68.
[20]
John Frederick and Thomas L Kelly. 2000. Fallen angels: The sex workers of South Asia .Roli Books.
[21]
David Frohlich, Allan Kuchinsky, Celine Pering, Abbe Don, and Steven Ariss. 2002. Requirements for photoware. In Proceedings of the 2002 ACM conference on Computer supported cooperative work. ACM, 166--175.
[22]
Shaul M Gabbay and Roger TAJ Leenders. 1999. CSC: The structure of advantage and disadvantage. In Corporate social capital and liability. Springer, 1--14.
[23]
Aakash Gautam, Chandani Shrestha, Andrew Kulak, Steve Harrison, and Deborah Tatar. 2018. Participatory tensions in working with a vulnerable population. In Proceedings of the 15th Participatory Design Conference. ACM, 26.
[24]
Bill Gaver, Tony Dunne, and Elena Pacenti. 1999. Design: cultural probes. interactions, Vol. 6, 1 (1999), 21--29.
[25]
Mark S Granovetter. 1977. The strength of weak ties. In Social networks . Elsevier, 347--367.
[26]
Stephen Groves. 2016. Nepal earthquake survivors are falling prey to human trafficking. Public Radio International (2016). https://www.pri.org/stories/2016--11--15/nepal-earthquake-survivors-are-falling-prey-human-trafficking
[27]
Monique Hennink and Padam Simkhada. 2004. Sex trafficking in Nepal: context and process. Asian and Pacific Migration Journal, Vol. 13, 3 (2004), 305--338.
[28]
Sigma Huda. 2006. Sex trafficking in South Asia. International journal of gynecology & obstetrics, Vol. 94, 3 (2006), 374--381.
[29]
Lilly Irani, Janet Vertesi, Paul Dourish, Kavita Philip, and Rebecca E Grinter. 2010. Postcolonial computing: a lens on design and development. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 1311--1320.
[30]
Sushma Joshi. 2001. `Cheli-Beti': Discourses of trafficking and constructions of gender, citizenship and nation in modern Nepal. South Asia: Journal of South Asian Studies, Vol. 24, s1 (2001), 157--175.
[31]
Dean Karlan, Markus Mobius, Tanya Rosenblat, and Adam Szeidl. 2009. Trust and social collateral. The Quarterly Journal of Economics, Vol. 124, 3 (2009), 1307--1361.
[32]
Michelle R Kaufman and Mary Crawford. 2011. Research and activism review: Sex trafficking in Nepal: A review of intervention and prevention programs. Violence against women, Vol. 17, 5 (2011), 651--665.
[33]
Michelle R Kaufman, Jennifer J Harman, and Deepti Khati Shrestha. 2012. Let's talk about sex: Development of a sexual health program for Nepali women. AIDS Education and Prevention, Vol. 24, 4 (2012), 327--338.
[34]
Prabhat Lamichhane, Mahesh Puri, Jyotsna Tamang, and Bishnu Dulal. 2011. Women's status and violence against young married women in rural Nepal. BMC Women's Health, Vol. 11, 1 (2011), 19.
[35]
Christopher A Le Dantec and W Keith Edwards. 2008. Designs on dignity: perceptions of technology among the homeless. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 627--636.
[36]
Nan Lin. 2017. Building a network theory of social capital. In Social capital . Routledge, 3--28.
[37]
Vaishali S Mahendra, P Bhattarai, D Dahal, and Siobhan Crowley. 2001. Community perceptions of trafficking and its determinants in Nepal. Kathmandu, Nepal: The Asia Foundation (2001).
[38]
Michael Massimi and Ronald M Baecker. 2011. Dealing with death in design: developing systems for the bereaved. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1001--1010.
[39]
Michael Massimi, Jill P Dimond, and Christopher A Le Dantec. 2012. Finding a new normal: the role of technology in life disruptions. In Proceedings of the acm 2012 conference on computer supported cooperative work. ACM, 719--728.
[40]
Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F Churchill, and Sunny Consolvo. 2017. Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 2189--2201.
[41]
Richard E Mayer, Julie Heiser, and Steve Lonn. 2001. Cognitive constraints on multimedia learning: When presenting more material results in less understanding. Journal of educational psychology, Vol. 93, 1 (2001), 187.
[42]
Indrani Medhi-Thies, Pedro Ferreira, Nakull Gupta, Jacki O'Neill, and Edward Cutrell. 2015. KrishiPustak: A social networking system for low-literate farmers. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing . ACM, 1670--1681.
[43]
Lauren M Menger, Michelle R Kaufman, Jennifer J Harman, Samantha W Tsang, and Deepti Khati Shrestha. 2015. Unveiling the silence: women's sexual health and experiences in Nepal. Culture, health & sexuality, Vol. 17, 3 (2015), 359--373.
[44]
Wendy Moncur, Lorna Gibson, and Daniel Herron. 2016. The role of digital technologies during relationship breakdowns. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 371--382.
[45]
Cosmin Munteanu, Heather Molyneaux, and Susan O'Donnell. 2014. Fieldwork with vulnerable populations. interactions, Vol. 21, 1 (2014), 50--53.
[46]
Christopher Musello. 1980. Studying the home mode: An exploration of family photography and visual communication. Studies in Visual Communication, Vol. 6, 1 (1980), 23--42.
[47]
Madeline Plauché and Udhyakumar Nallasamy. 2007. Speech interfaces for equitable access to information technology. Information Technologies & International Development, Vol. 4, 1 (2007), pp--69.
[48]
Meena Poudel. 2009. Dealing with hidden issues: Social rejection experienced by trafficked women in Nepal . Ph.D. Dissertation. Newcastle University.
[49]
Robert D Putnam. 2000. Bowling alone: America's declining social capital. In Culture and politics . Springer, 223--234.
[50]
John Rawls. 1974. Some reasons for the maximin criterion. The American Economic Review, Vol. 64, 2 (1974), 141--146.
[51]
Agha Ali Raza, Farhan Ul Haq, Zain Tariq, Mansoor Pervaiz, Samia Razaq, Umar Saif, and Roni Rosenfeld. 2013. Job opportunities through entertainment: Virally spread speech-based services for low-literate users. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2803--2812.
[52]
Paul Resnick. 2001. Beyond bowling together: Sociotechnical capital. HCI in the New Millennium, Vol. 77 (2001), 247--272.
[53]
Jahmeilah Roberson and Bonnie Nardi. 2010. Survival needs and social inclusion: Technology use among the homeless. In Proceedings of the 2010 ACM conference on Computer supported cooperative work. ACM, 445--448.
[54]
Dona Schwartz. 1989. Visual ethnography: Using photography in qualitative research. Qualitative sociology, Vol. 12, 2 (1989), 119--154.
[55]
Jyoti Sharma. 2015. Sex trafficking in Nepal: women's experiences of reintegration . Ph.D. Dissertation. The University of Queensland.
[56]
Jonathan Taplin. 2017. Move Fast and Break Things .Little, Brown and Company.
[57]
Nick Taylor, Ursula Hurley, and Philip Connolly. 2016. Making community: the wider role of makerspaces in public life. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 1415--1425.
[58]
Kamal Thapa Kshetri, Yesoda Banjade, and Govind Subedi. 2016. Trafficking in Persons National Report . Technical Report. National Human Rights Commission Nepal.
[59]
Austin L Toombs, Shaowen Bardzell, and Jeffrey Bardzell. 2015. The proper care and feeding of hackerspaces: Care ethics and cultures of making. In Proceedings of the 33rd annual ACM conference on human factors in computing systems. ACM, 629--638.
[60]
Nancy A Van House. 2009. Collocated photo sharing, story-telling, and the performance of self. International Journal of Human-Computer Studies, Vol. 67, 12 (2009), 1073--1086.
[61]
Max Van Kleek, Dave Murray-Rust, Amy Guy, Kieron O'hara, and Nigel Shadbolt. 2016. Computationally mediated pro-social deception. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 552--563.
[62]
Aditya Vashistha, Edward Cutrell, Gaetano Borriello, and William Thies. 2015. Sangeet swara: A community-moderated voice forum in rural india. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 417--426.
[63]
John Vines, Roisin McNaney, Rachel Clarke, Stephen Lindsay, John McCarthy, Steve Howard, Mario Romero, and Jayne Wallace. 2013. Designing for-and with-vulnerable people. In CHI'13 Extended Abstracts on Human Factors in Computing Systems. ACM, 3231--3234.
[64]
John Vines, Roisin McNaney, Amey Holden, Ivan Poliakov, Peter Wright, and Patrick Olivier. 2017. Our year with the glass: expectations, letdowns and ethical dilemmas of technology trials with vulnerable people. Interacting with Computers, Vol. 29, 1 (2017), 27--44.
[65]
Michalis Vitos, Julia Altenbuchner, Matthias Stevens, Gillian Conquest, Jerome Lewis, and Muki Haklay. 2017. Supporting collaboration with non-literate forest communities in the congo-basin. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, Vol. 2017. ACM, 1576--1590.
[66]
Dhaval Vyas and Tawanna Dillahunt. 2017. Everyday Resilience: Supporting Resilient Strategies Among Low Socioeconomic Status Communities. Proc. ACM Hum.-Comput. Interact., Vol. 1, CSCW, Article 105 (Dec. 2017), bibinfonumpages21 pages.
[67]
Jenny Waycott, Hilary Davis, Anja Thieme, Stacy Branham, John Vines, and Cosmin Munteanu. 2015. Ethical encounters in HCI: Research in sensitive settings. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 2369--2372.
[68]
Michael Woolcock. 1998. Social capital and economic development: Toward a theoretical synthesis and policy framework. Theory and society, Vol. 27, 2 (1998), 151--208.
[69]
Kayoko Yoshikawa, Tara M Shakya, Krishna C Poudel, and Masamine Jimba. 2014. Acceptance of wife beating and its association with physical violence towards women in Nepal: a cross-sectional study using couple's data. PloS one, Vol. 9, 4 (2014), e95829.

Cited By

View all
  • (2023)Benefits of Community Voice: A Framework for Understanding Inclusion of Community Voice in HCI4DProceedings of the ACM on Human-Computer Interaction10.1145/36101747:CSCW2(1-26)Online publication date: 4-Oct-2023
  • (2023)Participatory Noticing through Photovoice: Engaging Arts- and Community-Based Approaches in Design ResearchProceedings of the 2023 ACM Designing Interactive Systems Conference10.1145/3563657.3596041(2489-2508)Online publication date: 10-Jul-2023
  • (2023)“Information-Backward but Sex-Forward”: Navigating Masculinity towards Intimate Wellbeing and Heterosexual RelationshipsProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581478(1-16)Online publication date: 19-Apr-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 2, Issue CSCW
November 2018
4104 pages
EISSN:2573-0142
DOI:10.1145/3290265
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 2018
Published in PACMHCI Volume 2, Issue CSCW

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ethnography
  2. global south
  3. hci4d
  4. photo-elicitation
  5. sensitive setting

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)58
  • Downloads (Last 6 weeks)7
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Benefits of Community Voice: A Framework for Understanding Inclusion of Community Voice in HCI4DProceedings of the ACM on Human-Computer Interaction10.1145/36101747:CSCW2(1-26)Online publication date: 4-Oct-2023
  • (2023)Participatory Noticing through Photovoice: Engaging Arts- and Community-Based Approaches in Design ResearchProceedings of the 2023 ACM Designing Interactive Systems Conference10.1145/3563657.3596041(2489-2508)Online publication date: 10-Jul-2023
  • (2023)“Information-Backward but Sex-Forward”: Navigating Masculinity towards Intimate Wellbeing and Heterosexual RelationshipsProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581478(1-16)Online publication date: 19-Apr-2023
  • (2022)Liberating Stories about a Terrorist AttackProceedings of the 2022 International Conference on Information and Communication Technologies and Development10.1145/3572334.3572380(1-7)Online publication date: 27-Jun-2022
  • (2022)Empowering Participation Within Structures of DependencyProceedings of the Participatory Design Conference 2022 - Volume 110.1145/3536169.3537781(75-86)Online publication date: 19-Aug-2022
  • (2022)Photo Analysis for Characterizing Food-Related Behavior and Photo Elicitation to Set-Up a Mixed Reality Environment for Social Eating Among Older Adults Living at HomeHCI International 2022 – Late Breaking Papers: HCI for Health, Well-being, Universal Access and Healthy Aging10.1007/978-3-031-17902-0_36(510-523)Online publication date: 16-Oct-2022
  • (2021)Reflections on Assets-Based Design: A Journey Towards A Collective of Assets-Based ThinkersProceedings of the ACM on Human-Computer Interaction10.1145/34795455:CSCW2(1-32)Online publication date: 18-Oct-2021
  • (2021)Examining the Intersections of Race, Religion & Community Technologies: A Photovoice StudyProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445418(1-19)Online publication date: 6-May-2021
  • (2021)Requirements Elicitation for Collaborative Systems: A Systematic Review2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD)10.1109/CSCWD49262.2021.9437880(297-304)Online publication date: 5-May-2021
  • (2021)Capturing recovery capital: using photovoice to unravel recovery and desistanceAddiction Research & Theory10.1080/16066359.2021.200378730:4(237-245)Online publication date: 30-Nov-2021
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media