{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:21:40Z","timestamp":1751516500957,"version":"3.41.0"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030773915"},{"type":"electronic","value":"9783030773922"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77392-2_18","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:06:05Z","timestamp":1625267165000},"page":"281-296","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices"],"prefix":"10.1007","author":[{"given":"Mahdi Nasrullah","family":"Al-Ameen","sequence":"first","affiliation":[]},{"given":"Tanjina","family":"Tamanna","sequence":"additional","affiliation":[]},{"given":"Swapnil","family":"Nandy","sequence":"additional","affiliation":[]},{"given":"Huzeyfe","family":"Kocabas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","unstructured":"Abokhodair, N., Vieweg, S.: Privacy & social media in the context of the arab gulf. In: Proceedings of the 2016 ACM Conference on Designing Interactive Systems, DIS 2016, pp. 672\u2013683. Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2901790.2901873","DOI":"10.1145\/2901790.2901873"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Ahmed, S.I., Guha, S., Rifat, M.R., Shezan, F.H., Dell, N.: Privacy in repair: an analysis of the privacy challenges surrounding broken digital artifacts in Bangladesh. In: Proceedings of the Eighth International Conference on Information and Communication Technologies and Development, pp. 1\u201310 (2016)","DOI":"10.1145\/2909609.2909661"},{"key":"18_CR3","doi-asserted-by":"publisher","unstructured":"Ahmed, S.I., Guha, S., Rifat, M.R., Shezan, F.H., Dell, N.: Privacy in repair: an analysis of the privacy challenges surrounding broken digital artifacts in Bangladesh. In: Proceedings of the Eighth International Conference on Information and Communication Technologies and Development, ICTD 2016, pp. 11:1\u201311:10. ACM, New York (2016). https:\/\/doi.org\/10.1145\/2909609.2909661","DOI":"10.1145\/2909609.2909661"},{"key":"18_CR4","doi-asserted-by":"publisher","unstructured":"Ahmed, S.I., Haque, M.R., Chen, J., Dell, N.: Digital privacy challenges with shared mobile phone use in Bangladesh. In Proceedings of the ACM on Human-Computer Interaction, (CSCW), vol. 1, pp. 17:1\u201317:20 (December 2017). https:\/\/doi.org\/10.1145\/3134652","DOI":"10.1145\/3134652"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Ahmed, S.I., Haque, M.R., Chen, J., Dell, N.: Digital privacy challenges with shared mobile phone use in Bangladesh. In: Proceedings of the ACM on Human-Computer Interaction, (CSCW), vol. 1, p. 17 (2017)","DOI":"10.1145\/3134652"},{"key":"18_CR6","doi-asserted-by":"publisher","unstructured":"Ahmed, S.I., et al.: Protibadi: a platform for fighting sexual harassment in urban bangladesh. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2014, pp. 2695\u20132704. Association for Computing Machinery, New York (2014). https:\/\/doi.org\/10.1145\/2556288.2557376","DOI":"10.1145\/2556288.2557376"},{"key":"18_CR7","doi-asserted-by":"publisher","unstructured":"Al-Ameen, M.N., Tamanna, T., Nandy, S., Ahsan, M.A.M., Chandra, P., Ahmed, S.I.: We don\u2019t give a second thought before providing our information: understanding users\u2019 perceptions of information collection by apps in urban Bangladesh. In: Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS 2020), pp. 32\u201343. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3378393.3402244","DOI":"10.1145\/3378393.3402244"},{"key":"18_CR8","unstructured":"Alghamdi, D., Flechais, I., Jirotka, M.: Security practices for households bank customers in the kingdom of Saudi Arabia. In: Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security, SOUPS 2015, pp. 297\u2013308. USENIX Association, USA (2015)"},{"key":"18_CR9","volume-title":"Understanding Your Users: A Practical Guide to User Research Methods","author":"K Baxter","year":"2015","unstructured":"Baxter, K., Courage, C., Caine, K.: Understanding Your Users: A Practical Guide to User Research Methods, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2015)","edition":"2"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Blevis, E.: Sustainable interaction design: invention & disposal, renewal & reuse. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 503\u2013512 (2007)","DOI":"10.1145\/1240624.1240705"},{"key":"18_CR11","unstructured":"Boyatzis, R.E.: Transforming Qualitative Information: Thematic Analysis and Code Development. Sage, Thousand Oaks (1998)"},{"issue":"2","key":"18_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77\u2013101 (2006)","journal-title":"Qual. Res. Psychol."},{"key":"18_CR13","unstructured":"Chen, J., Paik, M., McCabe, K.: Exploring internet security perceptions and practices in urban Ghana. In: Proceedings of the Tenth USENIX Conference on Usable Privacy and Security, SOUPS 2014, pp. 129\u2013142. USENIX Association, USA (2014)"},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.deveng.2017.12.002","volume":"3","author":"C Cobb","year":"2018","unstructured":"Cobb, C., Sudar, S., Reiter, N., Anderson, R., Roesner, F., Kohno, T.: Computer security for data collection technologies. Dev. Eng. 3, 1\u201311 (2018)","journal-title":"Dev. Eng."},{"key":"18_CR15","doi-asserted-by":"publisher","unstructured":"Crabtree, A., Tolmie, P., Knight, W.: Repacking \u2018privacy\u2019 for a networked world. Comput. Supported Coop. Work 26(4-6), 453\u2013488 (2017). https:\/\/doi.org\/10.1007\/s10606-017-9276-y","DOI":"10.1007\/s10606-017-9276-y"},{"key":"18_CR16","doi-asserted-by":"publisher","unstructured":"Dodson, L.L., Sterling, S.R., Bennett, J.K.: Minding the gaps: cultural, technical and gender-based barriers to mobile use in oral-language Berber communities in morocco. In: Proceedings of the Sixth International Conference on Information and Communication Technologies and Development, ICTD 2013, vol. 1, pp. 79\u201388. Association for Computing Machinery, New York (2013). https:\/\/doi.org\/10.1145\/2516604.2516626","DOI":"10.1145\/2516604.2516626"},{"key":"18_CR17","unstructured":"Flor\u00eancio, D., Herley, C., Van Oorschot, P.C.: An administrator\u2019s guide to internet password research. In: 28th Large Installation System Administration Conference (LISA 2014), pp. 44\u201361 (2014)"},{"key":"18_CR18","unstructured":"Frik, A., Nurgalieva, L., Bernd, J., Lee, J., Schaub, F., Egelman, S.: Privacy and security threat models and mitigation strategies of older adults. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) (2019)"},{"key":"18_CR19","unstructured":"Habib, H., et al.: Away from prying eyes: analyzing usage and understanding of private browsing. In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), pp. 159\u2013175 (2018)"},{"key":"18_CR20","doi-asserted-by":"publisher","unstructured":"Haque, S.M.T., et al.: Privacy vulnerabilities in public digital service centers in Dhaka, Bangladesh. In: Proceedings of the 2020 International Conference on Information and Communication Technologies and Development, ICTD 2020, Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3392561.3394642","DOI":"10.1145\/3392561.3394642"},{"key":"18_CR21","unstructured":"Havron, S., Freed, D., Chatterjee, R., McCoy, D., Dell, N., Ristenpart, T.: Clinical computer security for victims of intimate partner violence. In: 28th USENIX Security Symposium, pp. 105\u2013122 (2019)"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Houston, L., Jackson, S.J., Rosner, D.K., Ahmed, S.I., Young, M., Kang, L.: Values in repair. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 1403\u20131414 (2016)","DOI":"10.1145\/2858036.2858470"},{"key":"18_CR23","unstructured":"Ion, I., Reeder, R., Consolvo, S.: ...no one can hack my mind: Comparing expert and non-expert security practices. In: Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security, SOUPS 2015, pp. 327\u2013346. USENIX Association, USA (2015)"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Jackson, S.J., Ahmed, S.I., Rifat, M.R.: Learning, innovation, and sustainability among mobile phone repairers in Dhaka, Bangladesh. In: Proceedings of the 2014 Conference on Designing Interactive Systems, pp. 905\u2013914 (2014)","DOI":"10.1145\/2598510.2598576"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Jang, E.H.B., et al.: Trust and technology repair infrastructures in the remote rural Philippines: Navigating urban-rural seams. In: Proceedings of the ACM on Human-Computer Interaction (CSCW), vol. 3, pp. 1\u201325 (2019)","DOI":"10.1145\/3359201"},{"key":"18_CR26","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/11767831_16","volume":"3856","author":"P Kumaraguru","year":"2006","unstructured":"Kumaraguru, P., Cranor, L.: Privacy in India: attitudes and awareness. Priv. Enhancing Technol. 3856, 243\u2013258 (2006)","journal-title":"Priv. Enhancing Technol."},{"key":"18_CR27","doi-asserted-by":"publisher","unstructured":"Mazurek, M.L., et al.: Measuring password guess ability for an entire university. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS 2013, pp. 173\u2013186. Association for Computing Machinery, New York (2013). https:\/\/doi.org\/10.1145\/2508859.2516726","DOI":"10.1145\/2508859.2516726"},{"key":"18_CR28","first-page":"591","volume":"7","author":"L McCormick","year":"2014","unstructured":"McCormick, L.: The internet and social media sites: A shift in privacy norms resulting in the exploitation and abuse of adolescents and teens in dating relationships. Alb. Gov\u2019t L. Rev. 7, 591 (2014)","journal-title":"Alb. Gov\u2019t L. Rev."},{"issue":"41","key":"18_CR29","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/S0968-8080(13)41696-8","volume":"21","author":"P Nahar","year":"2013","unstructured":"Nahar, P., Van Reeuwijk, M., Reis, R.: Contextualising sexual harassment of adolescent girls in Bangladesh. Reprod. Health matters 21(41), 78\u201386 (2013)","journal-title":"Reprod. Health matters"},{"key":"18_CR30","first-page":"119","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum, H.: Privacy as contextual integrity. Wash L. Rev 79, 119 (2004)","journal-title":"Wash L. Rev"},{"key":"18_CR31","doi-asserted-by":"publisher","unstructured":"Nova, F.F., Rifat, M.R., Saha, P., Ahmed, S.I., Guha, S.: Online sexual harassment over anonymous social media in Bangladesh. In: Proceedings of the Tenth International Conference on Information and Communication Technologies and Development, ICTD 2019, pp. 1:1\u20131:12. ACM, New York (2019). https:\/\/doi.org\/10.1145\/3287098.3287107","DOI":"10.1145\/3287098.3287107"},{"key":"18_CR32","unstructured":"Nthala, N., Flechais, I.: Informal support networks: an investigation into home data security practices. In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), pp. 63\u201382 (2018)"},{"key":"18_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-40956-4_8","volume-title":"Privacy Enhancing Technologies","author":"AS Patrick","year":"2003","unstructured":"Patrick, A.S., Kenny, S.: From privacy legislation to interface design: implementing information privacy in human-computer interactions. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 107\u2013124. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-40956-4_8"},{"issue":"1","key":"18_CR34","doi-asserted-by":"publisher","first-page":"S12","DOI":"10.1186\/1478-4505-9-S1-S12","volume":"9","author":"SF Rashid","year":"2011","unstructured":"Rashid, S.F., Standing, H., Mohiuddin, M., Ahmed, F.M.: Creating a public space and dialogue on sexuality and rights: a case study from Bangladesh. Health Res. Policy Syst. 9(1), S12 (2011)","journal-title":"Health Res. Policy Syst."},{"key":"18_CR35","unstructured":"Ruoti, S., Monson, T., Wu, J., Zappala, D., Seamons, K.: Weighing context and trade-offs: How suburban adults selected their online security posture. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 211\u2013228 (2017)"},{"key":"18_CR36","unstructured":"Sambasivan, N., et al.: Privacy is not for me, it\u2019s for those rich women: performative privacy practices on mobile phones by women in south Asia. In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), pp. 127\u2013142. USENIX Association, Baltimore (August 2018). https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/sambasivan"},{"key":"18_CR37","doi-asserted-by":"publisher","unstructured":"Sambasivan, N., Rangaswamy, N., Cutrell, E., Nardi, B.: Ubicomp4d: infrastructure and interaction for international development-the case of urban Indian slums. In: Proceedings of the 11th International Conference on Ubiquitous Computing, UbiComp 2009, pp. 155\u2013164. Association for Computing Machinery, New York (2009). https:\/\/doi.org\/10.1145\/1620545.1620570","DOI":"10.1145\/1620545.1620570"},{"key":"18_CR38","doi-asserted-by":"publisher","unstructured":"Sambasivan, N., Weber, J., Cutrell, E.: Designing a phone broadcasting system for urban sex workers in India. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2011, pp. 267\u2013276. Association for Computing Machinery, New York (2011). https:\/\/doi.org\/10.1145\/1978942.1978980","DOI":"10.1145\/1978942.1978980"},{"key":"18_CR39","doi-asserted-by":"publisher","unstructured":"Seng, S., Kocabas, H., Al-Ameen, M.N., Wright, M.: Poster: Understanding user\u2019s decision to interact with potential phishing posts on Facebook using a vignette study. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, pp. 2617\u20132619. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3319535.3363270","DOI":"10.1145\/3319535.3363270"},{"key":"18_CR40","unstructured":"of Statistics, B.B.: Literacy assessment survey 2008 (November 2008). http:\/\/www.un-bd.org\/Docs\/Publication\/Bangladesh_Literacy_Assessment_Survey_2008.pdf"},{"key":"18_CR41","doi-asserted-by":"publisher","unstructured":"Sultana, S., et al.: Understanding the sensibility of social media use and privacy with Bangladeshi Facebook group users. In: Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS 2020), pp. 317\u2013318. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3378393.3402235","DOI":"10.1145\/3378393.3402235"},{"key":"18_CR42","doi-asserted-by":"publisher","unstructured":"Vashistha, A., Anderson, R., Mare, S.: Examining security and privacy research in developing regions. In: Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS 2018), COMPASS-18, Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3209811.3209818","DOI":"10.1145\/3209811.3209818"},{"key":"18_CR43","doi-asserted-by":"crossref","unstructured":"Wash, R.: Folk models of home computer security. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, pp. 1\u201316 (2010)","DOI":"10.1145\/1837110.1837125"},{"key":"18_CR44","unstructured":"Zou, Y., Mhaidli, A.H., McCall, A., Schaub, F.: I\u2019ve got nothing to lose: Consumers\u2019 risk perceptions and protective actions after the Equifax data breach. In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), pp. 197\u2013216 (2018)"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77392-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:07:32Z","timestamp":1751494052000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77392-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030773915","9783030773922"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77392-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}