[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2908131.2908146acmconferencesArticle/Chapter ViewAbstractPublication PageswebsciConference Proceedingsconference-collections
research-article

Privacy and twitter in qatar: traditional values in the digital world

Published: 22 May 2016 Publication History

Abstract

We explore the meaning of "privacy" from the perspective of Qatari nationals as it manifests in digital environments. Although privacy is an essential and widely respected value in many cultures, the way in which it is understood and enacted depends on context. It is especially vital to understand user behaviors regarding privacy in the digital sphere, where individuals increasingly publish personal information. Our mixed-methods analysis of 18K Twitter posts that mention "privacy" focuses on the face-to-face and digital contexts in which privacy is mentioned, and how those contexts lead to varied ideologies regarding privacy. We find that in the Arab Gulf, the need for privacy is often supported by Quranic text, advice on how to protect privacy is frequently discussed, and the use of paternalistic language by men when discussing women's privacy is common. Above all, privacy is framed as a communal attribute, including not only the individual, but the behavior of those around them; it even extends beyond one's lifespan. We contribute an analysis and description of these previously unexplored interpretations of privacy, which play a role in how users navigate social media.

References

[1]
Norah Abokhodair, and Sarah Vieweg. (2016). Privacy & Social Media in the Context of the Arab Gulf. Submitted to the Conference on Designing Interactive Systems (DIS' 16).
[2]
Norah Abokhodair, Daisy Yoo, and David W. McDonald. "Dissecting a social botnet: Growth, content and influence in Twitter." Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM, 2015.
[3]
Nitin Agarwal, Merlyna Lim, and Rolf T. Wigand. 2012. Online collective action and the role of social media in mobilizing opinions: A case study on women's right-to-drive campaigns in Saudi Arabia. Web 2.0 Technologies and Democratic Governance (pp. 99--123): Springer.
[4]
Al-Meezan. Ed. The Permanent Constitution of the State of Qatar. Qatar Legal Portal (Al-Meezan). Retrieved on Feb 2016 from http://www.almeezan.qa/LawArticles.aspx?LawArticleID=25790.
[5]
Tamara Al-Sheikh, Jennifer A. Rode, and Siân E. Lindley. 2011. (Whose) value-sensitive design: a study of long-distance relationships in an Arabic cultural context. In Proceedings of the ACM 2011 conference on Computer supported cooperative work (CSCW '11), 75--84.
[6]
Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding.
[7]
Irwin Altman. 1976. Privacy: A Conceptual Analysis. Environment and behavior, 8(1), 7--29.
[8]
Ali S. Bahammam. 1987. Architectural patterns of privacy in Saudi Arabian housing. Unpublished Electronic Thesis. McGill University, Monteal.
[9]
Luis Fernando Baron, Norah Abokhodair & Maria Garrido. 2013. Human and Political Grievances for Mobilization Different Roles of Facebook during the Egyptian Arab Spring. Proceedings of the 12th International Conference on Social Implications of Computers in Developing Countries.
[10]
David M. Blei, Andrew Y. Ng, and Michael I. Jordan. 2003. Latent dirichlet allocation. The Journal of Machine Learning research: 993--1022.
[11]
Peter C. Dodd. 1973. Family honor and the forces of change in Arab society. International Journal of Middle East Studies, 4(01), 40--54.
[12]
Doha News. 2013. Qatar Has 4th Highest Percentage of Facebook Users in the Arab World. Retrieved on June 2013 from http://dohanews.co/qatar-has-4th-highest-percentage-of-facebook-users-in.
[13]
Eman El-Shenawi. 2015. Qatar Revives Strict 'Reflect Respect' Dress Code Campaign. Al Arabiya News. Retrieved on Feb, 2016 from http://english.alarabiya.net/en/media/advertising-and-pr/2015/05/06/Qatar-revives-strict-Reflect-Respect-dress-code-campaign-.html.
[14]
Maha Faisal, and Asmaa Alsumait. 2011. Social network privacy and trust concerns. In the Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services.
[15]
Shelly D. Farnham, and Elizabeth F. Churchill. 2011. Faceted identity, faceted lives: social and technical issues with being yourself online. In the Proceedings of the ACM 2011 conference on computer supported cooperative work.
[16]
Batya Friedman, Kristina Hook, Brian Gill, Lina Eidmar, Catherine Sallmander Prien, and Rachel Severson. 2008. Personlig integritet: a comparative study of perceptions of privacy in public places in Sweden and the United States. In Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges (NordiCHI '08), 142--151.
[17]
David Garcia, Ingmar Weber, and Venkata Rama Kiran Garimella. "Gender asymmetries in reality and fiction: The bechdel test of social media." arXiv preprint arXiv:1404.0163 (2014).
[18]
Hala Guta, and Magdalena Karolak. 2015. Veiling and blogging: social media as sites of identity negotiation and expression among Saudi women. Journal of International Women's Studies 16.2: 115.
[19]
Muhammad Aslam Hayat. 2007. Privacy and Islam: From the Quran to data protection in Pakistan. Information & Communications Technology Law 16.2: 137--148.
[20]
Susan C. Herring. 2001. Computer-mediated Discourse. In: Deborah Schiffrin, Deborah Tannen, and Heidi E. Hamilton (Eds.) The Handbook of Discourse Analysis (612--634). Oxford: Blackwell Publishers.
[21]
Geert Hofstede, and Michael Minkov. 1991. Cultures and organizations: Software of the mind. Vol 2. London: McGraw-Hill.
[22]
Gavin Jancke, Gina Danielle Venolia, Jonathan Grudin, Jonathan J. Cadiz, and Anoop Gupta. 2001. Linking public spaces: technical and social issues. In Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 530--537.
[23]
Sahar Khamis, and Katherine Vaughn. 2011. Cyberactivism in the Egyptian revolution: How civic engagement and citizen journalism tilted the balance. Arab Media and Society 14.3 (2011): 1--25.
[24]
Ponnurangam Kumaraguru, and Lorrie Cranor. 2005. Privacy in India: Attitudes and awareness. Privacy Enhancing Technologies. Springer Berlin Heidelberg.
[25]
May Lwin, Jochen Wirtz, and Jerome D. Williams. 2007. Consumer online privacy concerns and responses: a power--responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35(4), 572--585.
[26]
Ali Sayed Mohamed. 2012. On the Road to Democracy: Egyptian bloggers and the Internet 2010. Journal of Arab & Muslim Media Research. 4(2), 253--272.
[27]
Azza Abdel-Azim Mohamed. "Online Privacy Concerns Among Social Networks' Users." Cross-Cultural Communication 6.4 (2011): 74--89.
[28]
Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.
[29]
Zulkeplee Othman, Rosemary Aird, and Laurie Buys. 2015. "Privacy, modesty, hospitality, and the design of Muslim homes: A literature review." Frontiers of Architectural Research. 4.1: 12--23.
[30]
Damian Radcliffe. 2015. Social Media in the Middle East: The Story of 2014. Retrieved August 2015 from https://damianradcliffe.files.wordpress.com/2015/01/damian-radcliffe-social-media-in-the-middle-east-the-story-of-2014.pdf
[31]
Asifa Siraj. 2011. Meanings of modesty and the hijab amongst Muslim women in Glasgow, Scotland. Gender, Place & Culture, 18(6), 716--731.
[32]
Jure Snoj. 2013. Qatar's Population - by Nationality. BQ Magazine. Retrieved Feb, 2016 from www.bq-magazine.com/economy/2013/12/population-qatar.
[33]
Rana Sobh, and Russell W. Belk. 2011. Privacy and gendered spaces in Arab Gulf homes. Home Cultures, 8(3), 317--340.
[34]
Sofiane Abbar, Yelena Mejova, and Ingmar Weber. 2015. You tweet what you eat: Studying food consumption through twitter. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, pages 3197--3206, New York, NY, USA.
[35]
Daniel J. Solove. 2008. Understanding privacy. Cambridge, Mass.: Harvard University Press
[36]
Jai-Yeol Son, and Sung S. Kim. 2008. Internet users' information privacy-protective responses: a taxonomy and a nomological model. Mis Quarterly. 503--52
[37]
Sarah Vieweg, and Adam Hodges. 2016. Surveillance & Modesty on Social Media: How Qataris Navigate Modernity and Maintain Tradition. In Proceedings of the ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2016).
[38]
Elaine J. Yuan, Miao Feng, and James A. Danowski. 2013. "Privacy" in semantic networks on Chinese social media: The case of Sina Weibo. Journal of Communication 63.6: 1011--1031.

Cited By

View all
  • (2024)AI Privacy in Context: A Comparative Study of Public and Institutional Discourse on Conversational AI Privacy in the US and Chinese Social MediaSocial Media + Society10.1177/2056305124129084510:4Online publication date: 28-Oct-2024
  • (2024)Tracking During Ramadan: Examining the Intersection of Menstrual and Religious Tracking Practices Among Muslim Women in the United StatesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642374(1-19)Online publication date: 11-May-2024
  • (2024)Understanding Cultural and Religious Values Relating to Awareness of Women’s Intimate Health among Arab MuslimsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642207(1-18)Online publication date: 11-May-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WebSci '16: Proceedings of the 8th ACM Conference on Web Science
May 2016
392 pages
ISBN:9781450342087
DOI:10.1145/2908131
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 May 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Twitter
  2. arab world
  3. gender
  4. honor
  5. islam
  6. mixed methods
  7. privacy
  8. qatar

Qualifiers

  • Research-article

Conference

WebSci '16
Sponsor:
WebSci '16: ACM Web Science Conference
May 22 - 25, 2016
Hannover, Germany

Acceptance Rates

WebSci '16 Paper Acceptance Rate 13 of 70 submissions, 19%;
Overall Acceptance Rate 245 of 933 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)34
  • Downloads (Last 6 weeks)4
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)AI Privacy in Context: A Comparative Study of Public and Institutional Discourse on Conversational AI Privacy in the US and Chinese Social MediaSocial Media + Society10.1177/2056305124129084510:4Online publication date: 28-Oct-2024
  • (2024)Tracking During Ramadan: Examining the Intersection of Menstrual and Religious Tracking Practices Among Muslim Women in the United StatesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642374(1-19)Online publication date: 11-May-2024
  • (2024)Understanding Cultural and Religious Values Relating to Awareness of Women’s Intimate Health among Arab MuslimsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642207(1-18)Online publication date: 11-May-2024
  • (2024)Exploring Social Media Privacy Concerns: A Comprehensive Survey Study Across 16 Middle Eastern and North African CountriesIEEE Access10.1109/ACCESS.2024.346386912(147087-147105)Online publication date: 2024
  • (2024)Saudi Women’s Identities and Their Online Practices Across Social Media PlatformsSaudi Youth10.1007/978-981-99-9867-8_8(163-181)Online publication date: 27-May-2024
  • (2023)The Growth of Social Commerce: How It Is Affected by Users’ Privacy ConcernsJournal of Theoretical and Applied Electronic Commerce Research10.3390/jtaer1801003718:1(725-743)Online publication date: 22-Mar-2023
  • (2022)A comparative study on surveillance and privacy regulations (the UAE vs. the USA and the EU)Journal of Governance and Regulation10.22495/jgrv11i1art211:1(20-26)Online publication date: 5-Jan-2022
  • (2022)User concerns regarding information sharing on social networking sites: The user’s perspective in the context of national culturePLOS ONE10.1371/journal.pone.026315717:1(e0263157)Online publication date: 31-Jan-2022
  • (2022)Moderation as Empowerment: Creating and Managing Women-Only Digital Safe SpacesProceedings of the ACM on Human-Computer Interaction10.1145/35552046:CSCW2(1-36)Online publication date: 11-Nov-2022
  • (2022)”Ask this from the person who has private stuff”: Privacy Perceptions, Behaviours and Beliefs Beyond W.E.I.R.DProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3501883(1-17)Online publication date: 29-Apr-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media