{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:28:14Z","timestamp":1776115694270,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":118,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Sciences and Engineering Research Council","award":["RGPIN-2018-0"],"award-info":[{"award-number":["RGPIN-2018-0"]}]},{"DOI":"10.13039\/501100000155","name":"Social Sciences and Humanities Research Council of Canada","doi-asserted-by":"publisher","award":["Social Sciences and Humanities Research Council"],"award-info":[{"award-number":["Social Sciences and Humanities Research Council"]}],"id":[{"id":"10.13039\/501100000155","id-type":"DOI","asserted-by":"publisher"}]},{"name":"International Fulbright Centennial Fellowship of Syed Ishtiaque Ahmed"},{"DOI":"10.13039\/501100000196","name":"Canada Foundation for Innovation","doi-asserted-by":"publisher","award":["37608"],"award-info":[{"award-number":["37608"]}],"id":[{"id":"10.13039\/501100000196","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100015668","name":"Ontario Ministry of Research and Innovation","doi-asserted-by":"publisher","award":["37608"],"award-info":[{"award-number":["37608"]}],"id":[{"id":"10.13039\/501100015668","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1145\/3460112.3471957","type":"proceedings-article","created":{"date-parts":[[2021,9,23]],"date-time":"2021-09-23T12:39:58Z","timestamp":1632400798000},"page":"199-214","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Purdah, Amanah, and Gheebat: Understanding Privacy in Bangladeshi \u201cpious\u201d Muslim Communities"],"prefix":"10.1145","author":[{"given":"Mohammad Rashidujjaman","family":"Rifat","sequence":"first","affiliation":[{"name":"University of Toronto"}]},{"given":"Mahiratul","family":"Jannat","sequence":"additional","affiliation":[{"name":"University of Dhaka"}]},{"given":"Mahdi Nasrullah","family":"Al-Ameen","sequence":"additional","affiliation":[{"name":"Utah State University"}]},{"given":"S M Taiabul","family":"Haque","sequence":"additional","affiliation":[{"name":"University of Central Missouri"}]},{"given":"Muhammad Ashad","family":"Kabir","sequence":"additional","affiliation":[{"name":"Charles Sturt University"}]},{"given":"Syed Ishtiaque","family":"Ahmed","sequence":"additional","affiliation":[{"name":"University of Toronto"}]}],"member":"320","published-online":{"date-parts":[[2021,9,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Norah Abokhodair. 2017. Transnational Saudi Arabian youth and Facebook: enacting privacy and identity. Ph.D. Dissertation. Available at https:\/\/digital.lib.washington.edu\/researchworks\/bitstream\/handle\/1773\/40611\/Abokhodair_washington_0250E_17719.pdf?sequence=1."},{"key":"e_1_3_2_1_2_1","article-title":"Privacy and social media use in the Arabian Gulf: Saudi Arabian & Qatari traditional values in the digital world","volume":"3","author":"Abokhodair Norah","year":"2017","unstructured":"Norah Abokhodair, Sofiane Abbar, Sarah Vieweg, and Yelena Mejova. 2017. Privacy and social media use in the Arabian Gulf: Saudi Arabian & Qatari traditional values in the digital world. The Journal of Web Science 3, 1 (2017).","journal-title":"The Journal of Web Science"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901873"},{"key":"e_1_3_2_1_4_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Adams Devon","year":"2018","unstructured":"Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, and Elissa\u00a0M Redmiles. 2018. Ethics emerging: the story of privacy and security perceptions in virtual reality. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 427\u2013442."},{"key":"e_1_3_2_1_5_1","volume-title":"Caste and social stratification among Muslims in India","author":"Ahmad Imtiaz","unstructured":"Imtiaz Ahmad. 1978. Caste and social stratification among Muslims in India. South Asia Books."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909609.2909661"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134652"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025961"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300410"},{"key":"e_1_3_2_1_10_1","unstructured":"Taslima Akter Bryan Dosono Tousif Ahmed Apu Kapadia and Bryan Semaan. [n.d.]. \u201cI am uncomfortable sharing what I can\u2019t see\u201d: Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. life 6([n.\u00a0d.]) 38."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3378393.3402244"},{"key":"e_1_3_2_1_12_1","unstructured":"Al-Islam. [n.d.]. Diseases of the Soul: Pretending Virtuousness (riya) | Al-Islam.org. https:\/\/www.al-islam.org\/articles\/diseases-soul-pretending-virtuousness-riya. (Accessed on 04\/06\/2021)."},{"key":"e_1_3_2_1_13_1","volume-title":"Engineering & Industrial Applications Colloquium (BEIAC)","author":"Zalikha\u00a0Mohd Amar Nur","unstructured":"Nur Zalikha\u00a0Mohd Amar, Zulhabri Ismail, and Hafez Salleh. 2012. Guidelines for internal arrangement of Islamic house. In 2012 IEEE Business, Engineering & Industrial Applications Colloquium (BEIAC). IEEE, 189\u2013194."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-7660.00041"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/1527476418806092"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/0743558419884692"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1596\/23022"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207727"},{"key":"e_1_3_2_1_19_1","volume-title":"Varieties of civil religion","author":"Bellah N","unstructured":"Robert\u00a0N Bellah and Phillip\u00a0E Hammond. 2013. Varieties of civil religion. Wipf and Stock Publishers."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Elizabeth Buie and Mark Blythe. 2013. Spirituality: there\u2019s an app for that!(but not a lot of research). In CHI\u201913 Extended Abstracts on Human Factors in Computing Systems. 2315\u20132324.","DOI":"10.1145\/2468356.2468754"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Mead Cain Syeda\u00a0Rokeya Khanam and Shamsun Nahar. 1979. Class patriarchy and women\u2019s work in Bangladesh. Population and Development review(1979) 405\u2013438.","DOI":"10.2307\/1972079"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3001913.3001919"},{"key":"e_1_3_2_1_23_1","unstructured":"Kathy Charmaz. 2006. Constructing grounded theory: A practical guide through qualitative analysis. sage."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2016.8302"},{"key":"e_1_3_2_1_25_1","unstructured":"Kevin\u00a0J Christiano William\u00a0H Swatos\u00a0Jr and Peter Kivisto. 2015. Sociology of religion: Contemporary developments. Rowman & Littlefield."},{"key":"e_1_3_2_1_26_1","first-page":"199","article-title":"Pragmatism, Positivism, and Principles in Fourth Amendment Theory","volume":"41","author":"Cloud Morgan","year":"1993","unstructured":"Morgan Cloud. 1993. Pragmatism, Positivism, and Principles in Fourth Amendment Theory. UCLA L. Rev. 41(1993), 199.","journal-title":"UCLA L. Rev."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819960"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293440"},{"key":"e_1_3_2_1_29_1","volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS}","author":"Cranor Lorrie\u00a0Faith","year":"2014","unstructured":"Lorrie\u00a0Faith Cranor, Adam\u00a0L Durity, Abigail Marsh, and Blase Ur. 2014. Parents\u2019 and teens\u2019 perspectives on privacy in a technology-filled world. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 19\u201335."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol.\u00a064","author":"Das Sanchari","year":"2020","unstructured":"Sanchari Das, Robert\u00a0S Gutzwiller, Rod\u00a0D Roscoe, Prashanth Rajivan, Yang Wang, L Jean\u00a0Camp, and Roberto Hoyle. 2020. Humans and Technology for Inclusive Privacy and Security. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol.\u00a064. SAGE Publications Sage CA: Los Angeles, CA, 461\u2013464."},{"key":"e_1_3_2_1_31_1","first-page":"1013","article-title":"Understanding consumer information privacy in the realm of internet commerce: Personhood and pragmatism, pop-tarts and six-packs","volume":"84","author":"DeMarco A","year":"2005","unstructured":"David\u00a0A DeMarco. 2005. Understanding consumer information privacy in the realm of internet commerce: Personhood and pragmatism, pop-tarts and six-packs. Tex. L. Rev. 84(2005), 1013.","journal-title":"Tex. L. Rev."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1538-4616.2009.00219.x"},{"key":"e_1_3_2_1_33_1","first-page":"15","article-title":"Traditional Islamic-Arab house: vocabulary and syntax","volume":"10","year":"2010","unstructured":"Abdel-moniem El-Shorbagy. 2010. Traditional Islamic-Arab house: vocabulary and syntax. International Journal of Civil & Environmental Engineering IJCEE-IJENS 10, 04 (2010), 15\u201320.","journal-title":"International Journal of Civil & Environmental Engineering IJCEE-IJENS"},{"key":"e_1_3_2_1_34_1","volume-title":"Designs for the pluriverse: Radical interdependence, autonomy, and the making of worlds","author":"Escobar Arturo","unstructured":"Arturo Escobar. 2018. Designs for the pluriverse: Radical interdependence, autonomy, and the making of worlds. Duke University Press."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1177\/0038038595029004008"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Shelley Feldman and Florence\u00a0E McCarthy. 1983. Purdah and changing patterns of social control among rural women in Bangladesh. Journal of Marriage and the Family(1983) 949\u2013959.","DOI":"10.2307\/351808"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463160.1463176"},{"key":"e_1_3_2_1_38_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Frik Alisa","year":"2019","unstructured":"Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and security threat models and mitigation strategies of older adults. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.2307\/795891"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Leo\u00a0A Goodman. 1961. Snowball sampling. The annals of mathematical statistics(1961) 148\u2013170.","DOI":"10.1214\/aoms\/1177705148"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.45"},{"key":"e_1_3_2_1_42_1","volume-title":"The global religious landscape","author":"Hackett Conrad","year":"2012","unstructured":"Conrad Hackett, Brian Grim, Marcin Stonawski, Vegard Skirbekk, Michaela Potan\u010dokov\u00e1, and G Abel. 2012. The global religious landscape. Washington, DC: Pew Research Center(2012)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392561.3394642"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 3, CSCW(2019)","author":"Haque M\u00a0Taiabul","year":"2019","unstructured":"SM\u00a0Taiabul Haque, Pratyasha Saha, Muhammad\u00a0Sajidur Rahman, and Syed\u00a0Ishtiaque Ahmed. 2019. Of Ulti, \u2018hajano\u2019, and \u201cMatachetar otanetak datam\u201d Exploring Local Practices of Exchanging Confidential and Sensitive Information in Urban Bangladesh. Proceedings of the ACM on Human-Computer Interaction 3, CSCW(2019), 1\u201322."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1177\/026272801103100201"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Rakibul Hasan David Crandall Mario Fritz and Apu Kapadia. 2020. Automatically Detecting Bystanders in Photos to Reduce Privacy Risks. (2020).","DOI":"10.1109\/SP40000.2020.00097"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300597"},{"key":"e_1_3_2_1_48_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Hayes Jordan","year":"2019","unstructured":"Jordan Hayes, Smirity Kaushik, Charlotte\u00a0Emily Price, and Yang Wang. 2019. Cooperative privacy and security: Learning from people with visual impairments and their allies. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.2307\/1121541"},{"key":"e_1_3_2_1_50_1","unstructured":"Geert Hofstede. 1984. Culture\u2019s consequences: International differences in work-related values. Vol.\u00a05. sage."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557133"},{"key":"e_1_3_2_1_52_1","unstructured":"Maimuna Huq. 2013. Reading the Qur\u2019an in Bangladesh. Islamic Reform in South Asia(2013) 283."},{"key":"e_1_3_2_1_53_1","volume-title":"The ubiquity of Islam: religion and society in Bangladesh. Pacific Affairs","author":"Huque Ahmed\u00a0Shafiqul","year":"1987","unstructured":"Ahmed\u00a0Shafiqul Huque and Muhammad\u00a0Yeahia Akhter. 1987. The ubiquity of Islam: religion and society in Bangladesh. Pacific Affairs (1987), 200\u2013225."},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 3, CSCW(2019)","author":"Jack C","year":"2019","unstructured":"Margaret\u00a0C Jack, Pang Sovannaroth, and Nicola Dell. 2019. \u201d Privacy is not a concept, but a way of dealing with life\u201d Localization of Transnational Technology Platforms and Liminal Privacy Practices in Cambodia. Proceedings of the ACM on Human-Computer Interaction 3, CSCW(2019), 1\u201319."},{"key":"e_1_3_2_1_55_1","unstructured":"William James and Frederick Burkhardt. 1975. Pragmatism. Vol.\u00a01. Harvard University Press."},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 3, CSCW(2019)","author":"Han\u00a0Beol Jang Esther","year":"2019","unstructured":"Esther Han\u00a0Beol Jang, Philip Garrison, Ronel\u00a0Vincent Vistal, Maria Theresa\u00a0D Cunanan, Maria\u00a0Theresa Perez, Philip Martinez, Matthew\u00a0William Johnson, John\u00a0Andrew Evangelista, Syed\u00a0Ishtiaque Ahmed, Josephine Dionisio, 2019. Trust and Technology Repair Infrastructures in the Remote Rural Philippines: Navigating Urban-Rural Seams. Proceedings of the ACM on Human-Computer Interaction 3, CSCW(2019), 1\u201325."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322355"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1177\/1088868306294588"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3309074.3309076"},{"key":"e_1_3_2_1_60_1","volume-title":"Blockchain\u2019s roles in strengthening cybersecurity and protecting privacy. Telecommunications policy 41, 10","author":"Kshetri Nir","year":"2017","unstructured":"Nir Kshetri. 2017. Blockchain\u2019s roles in strengthening cybersecurity and protecting privacy. Telecommunications policy 41, 10 (2017), 1027\u20131038."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_2_1_62_1","volume-title":"The Qur\u2019an: an encyclopedia","author":"Leaman Oliver","unstructured":"Oliver Leaman. 2006. The Qur\u2019an: an encyclopedia. Routledge."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICHI.2017.29"},{"key":"e_1_3_2_1_64_1","first-page":"858","article-title":"Privacy: an anthropological perspective on the right to be let alone","volume":"8","author":"Lundsgarade P","year":"1970","unstructured":"Henry\u00a0P Lundsgarade. 1970. Privacy: an anthropological perspective on the right to be let alone. Hous. L. Rev. 8(1970), 858.","journal-title":"Hous. L. Rev."},{"key":"e_1_3_2_1_65_1","volume-title":"Networked privacy: How teenagers negotiate context in social media. New media & society 16, 7","author":"Marwick E","year":"2014","unstructured":"Alice\u00a0E Marwick and Danah Boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New media & society 16, 7 (2014), 1051\u20131067."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516726"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376167"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1177\/097317411000500202"},{"key":"e_1_3_2_1_69_1","volume-title":"Islam in South Asia in practice","author":"Metcalf D","unstructured":"Barbara\u00a0D Metcalf. 2009. Islam in South Asia in practice. Princeton University Press."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/219663.219683"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445259"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376572"},{"key":"e_1_3_2_1_73_1","volume-title":"Sita\u2019s daughters: Coming out of purdah: The Rajput women of Khalapur revisited","author":"Minturn Leigh","unstructured":"Leigh Minturn, Swaran Kapoor, 1993. Sita\u2019s daughters: Coming out of purdah: The Rajput women of Khalapur revisited. Oxford University Press on Demand."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9833.2008.00433.x"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_17"},{"key":"e_1_3_2_1_76_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79(2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0026749X07003186"},{"key":"e_1_3_2_1_78_1","volume-title":"Islamic Reform in South Asia","author":"Osella Filippo","unstructured":"Filippo Osella and Caroline Osella. 2013. Islamic Reform in South Asia. Cambridge University Press."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.foar.2014.12.001"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_81_1","volume-title":"Purdah: Separate worlds and symbolic shelter. Comparative studies in society and history 15, 3","author":"Papanek Hanna","year":"1973","unstructured":"Hanna Papanek. 1973. Purdah: Separate worlds and symbolic shelter. Comparative studies in society and history 15, 3 (1973), 289\u2013325."},{"key":"e_1_3_2_1_82_1","first-page":"275","article-title":"A definition of privacy","volume":"27","author":"Parker B","year":"1973","unstructured":"Richard\u00a0B Parker. 1973. A definition of privacy. Rutgers L. Rev. 27(1973), 275.","journal-title":"Rutgers L. Rev."},{"key":"e_1_3_2_1_83_1","volume-title":"Data science and its relationship to big data and data-driven decision making. Big data 1, 1","author":"Provost Foster","year":"2013","unstructured":"Foster Provost and Tom Fawcett. 2013. Data science and its relationship to big data and data-driven decision making. Big data 1, 1 (2013), 51\u201359."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345658"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978945"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025960"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415199"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1177\/0038038507082320"},{"key":"e_1_3_2_1_89_1","volume-title":"Islam and Muslim society in south Asia. Contributions to Indian sociology 17, 2","author":"Robinson Francis","year":"1983","unstructured":"Francis Robinson. 1983. Islam and Muslim society in south Asia. Contributions to Indian sociology 17, 2 (1983), 185\u2013203."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0026749X07002922"},{"key":"e_1_3_2_1_91_1","volume-title":"Digital parenting: designing children\u2019s safety. People and Computers XXIII Celebrating People and Technology","author":"Rode A","year":"2009","unstructured":"Jennifer\u00a0A Rode. 2009. Digital parenting: designing children\u2019s safety. People and Computers XXIII Celebrating People and Technology (2009), 244\u2013251."},{"key":"e_1_3_2_1_92_1","volume-title":"Covering Islam: How the media and the experts determine how we see the rest of the world (Fully revised edition)","author":"Said W","year":"2008","unstructured":"Edward\u00a0W Said. 2008. Covering Islam: How the media and the experts determine how we see the rest of the world (Fully revised edition). Random House."},{"key":"e_1_3_2_1_93_1","volume-title":"Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Sambasivan Nithya","year":"2018","unstructured":"Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura\u00a0Sanely Gayt\u00e1n-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. 2018. \u201d Privacy is not for me, it\u2019s for those rich women\u201d: Performative Privacy Practices on Mobile Phones by Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 127\u2013142."},{"key":"e_1_3_2_1_94_1","first-page":"1","article-title":"Value of al-amanah in human\u2019life","volume":"5","author":"Samsudin Sofiah\u00a0Bt","year":"2015","unstructured":"Sofiah\u00a0Bt Samsudin and Md\u00a0Sirajul Islam. 2015. Value of al-amanah in human\u2019life. International Journal of Scientific and Research Publications 5, 4(2015), 1\u20133.","journal-title":"International Journal of Scientific and Research Publications"},{"key":"e_1_3_2_1_95_1","volume-title":"Makes Europe World\u015b Leading Tech Watchdog.","author":"Satariano Adam","year":"2018","unstructured":"Adam Satariano. 2018. GDPR, a New Privacy Law, Makes Europe World\u015b Leading Tech Watchdog. (2018)."},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1080\/09663690120115010"},{"key":"e_1_3_2_1_97_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Segreti M","year":"2017","unstructured":"Sean\u00a0M Segreti, William Melicher, Saranga Komanduri, Darya Melicher, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie\u00a0Faith Cranor, and Michelle\u00a0L Mazurek. 2017. Diversify to survive: making passwords stronger with adaptive policies. In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017). 1\u201312."},{"key":"e_1_3_2_1_98_1","volume-title":"Identity and violence: The illusion of destiny","author":"Sen Amartya","unstructured":"Amartya Sen. 2007. Identity and violence: The illusion of destiny. Penguin Books India."},{"key":"e_1_3_2_1_99_1","volume-title":"Towards Inclusive Privacy Protections in the Cloud. In International Conference on Applied Cryptography and Network Security. Springer, 337\u2013359","author":"Sharma Tanusree","year":"2020","unstructured":"Tanusree Sharma, Tian Wang, Carlo Di\u00a0Giulio, and Masooda Bashir. 2020. Towards Inclusive Privacy Protections in the Cloud. In International Conference on Applied Cryptography and Network Security. Springer, 337\u2013359."},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.2307\/3481326"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300586"},{"key":"e_1_3_2_1_102_1","volume-title":"Rural Wellbeing in Bangladesh. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1\u201313","author":"Sultana Sharifa","year":"2020","unstructured":"Sharifa Sultana, Zinnat Sultana, and Syed\u00a0Ishtiaque Ahmed. 2020. Parareligious-HCI: Designing for\u2019Alternative\u2019Rationality in Rural Wellbeing in Bangladesh. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1\u201313."},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.83"},{"key":"e_1_3_2_1_104_1","volume-title":"Fourth Asia Pacific Interdisciplinary Research in Accounting Conference. Citeseer, 1\u201319","author":"Triyuwono Iwan","year":"2004","unstructured":"Iwan Triyuwono. 2004. Trust (Amanah), the divine symbol: Interpretations in the context of Islamic banking and accounting practices. In Fourth Asia Pacific Interdisciplinary Research in Accounting Conference. Citeseer, 1\u201319."},{"key":"e_1_3_2_1_105_1","unstructured":"Bryan\u00a0S Turner. 1985. Religion and social theory. (1985)."},{"key":"e_1_3_2_1_106_1","volume-title":"dataism and dataveillance: Big Data between scientific paradigm and ideology. Surveillance & society 12, 2","author":"Van\u00a0Dijck Jos\u00e9","year":"2014","unstructured":"Jos\u00e9 Van\u00a0Dijck. 2014. Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology. Surveillance & society 12, 2 (2014), 197\u2013208."},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209811.3209818"},{"key":"e_1_3_2_1_108_1","unstructured":"Greg Walton. 2001. China\u2019s golden shield: corporations and the development of surveillance technology in the People\u2019s Republic of China. Rights & Democracy."},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2010.5514526"},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/3171533.3171538"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488038"},{"key":"e_1_3_2_1_112_1","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin F","year":"1968","unstructured":"Alan\u00a0F Westin. 1968. Privacy and freedom. Washington and Lee Law Review 25, 1 (1968), 166.","journal-title":"Washington and Lee Law Review"},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"crossref","unstructured":"Elizabeth\u00a0H White. 1977. Purdah. Frontiers: A Journal of Women Studies(1977) 31\u201342.","DOI":"10.2307\/3346105"},{"key":"e_1_3_2_1_114_1","volume-title":"Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. 302\u2013316","author":"Wisniewski Pamela","year":"2015","unstructured":"Pamela Wisniewski, Haiyan Jia, Heng Xu, Mary\u00a0Beth Rosson, and John\u00a0M Carroll. 2015. \u201d Preventative\u201d vs.\u201d Reactive\u201d How Parental Mediation Influences Teens\u2019 Social Media Privacy Behaviors. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. 302\u2013316."},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207761"},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531696"},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240710"},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518710"}],"event":{"name":"COMPASS '21: ACM SIGCAS Conference on Computing and Sustainable Societies","location":"Virtual Event Australia","acronym":"COMPASS '21","sponsor":["SIGCAS ACM Special Interest Group on Computers and Society"]},"container-title":["ACM SIGCAS Conference on Computing and Sustainable Societies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460112.3471957","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460112.3471957","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T17:04:07Z","timestamp":1756832647000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460112.3471957"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":118,"alternative-id":["10.1145\/3460112.3471957","10.1145\/3460112"],"URL":"https:\/\/doi.org\/10.1145\/3460112.3471957","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]},"assertion":[{"value":"2021-09-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}