Access the full text.
Sign up today, get DeepDyve free for 14 days.
Daniel Solove (2007)
The Future of Reputation: Gossip, Rumor, and Privacy on the Internet
Amarolinda Saccol, Nicolau Reinhard (2006)
The Hospitality Metaphor as a theoretical lens for understanding the ICT adoption processJournal of Information Technology, 21
C. Renzetti, Raymond Lee (1994)
Researching Sensitive TopicsJournal of Marketing Research, 33
D. Boyd
Friends, friendsters and MySpace top 8: writing community into being on social network sites
G. Thomas, S. Wyatt, F. Henwood, N. Miller, P. Senker (2000)
Access is not the only problem: Using and controlling the Internet.
B. Barendregt
The ghost in the phone and other tales of Indonesian modernity
Richard Ling (2008)
New Tech, New Ties: How Mobile Communication Is Reshaping Social Cohesion
Nicola Green (2002)
On the Move: Technology, Mobility, and the Mediation of Social Time and SpaceThe Information Society, 18
M. Castells
Rise of the Network Society: Economy, Society and Culture
D. Friedman (2000)
Privacy and TechnologySocial Philosophy and Policy, 17
GSMA
Women & Mobile: A Global Opportunity – A Study on the Mobile Phone Gender Gap in Low and Middle Income Countries
C. Berry, F. Martin, A. Yue, L. Spigel (2003)
Mobile cultures : new media in queer Asia
S. Geest, W. Bleek (1987)
Lying informants : a fieldwork experience from GhanaPopulation and Development Review, 13
R. Hill (1995)
Researching Sensitive Topics in Marketing: The Special Case of Vulnerable PopulationsJournal of Public Policy & Marketing, 14
D. Boyd (2006)
Friends, Friendsters, and Top 8: Writing community into being on social network sitesFirst Monday, 11
(2006)
Cell Phone Culture: Mobile Technology in Everyday Life
S. Nachman (1984)
Lies My Informants Told MeJournal of Anthropological Research, 40
Rebecca Grinter, Margery Eldridge (2001)
Y Do Tngrs Luv 2 Txt Msg?
R. Yin (1984)
Case Study Research: Design and Methods
C. Medlin (2007)
Case Study Research
Christena Nippert-Eng (2010)
Islands of Privacy
J. Agar (2004)
Constant Touch: a Global History of the Mobile Phone
J. Wajcman, M. Bittman, Judith Brown (2009)
Intimate connections: the impact of the mobile phone on work/life boundaries
E. Goffman (1959)
The Presentation of Self in Everyday Life
W. Lonner, J. Berry, G. Hofstede (1980)
Culture′s Consequences: International Differences in Work-Related Values
M. Lamont, Virág Molnár (2002)
The Study of Boundaries in the Social SciencesReview of Sociology, 28
Purpose – Qualitative and quantitative research on mobile phone use by youth worldwide has been a recurrent theme for social scientists since the early 1990s in the USA, Europe and some parts of Asia. However, very little work is known about this subject contextualized in the often more conservative Arab societies of the Middle East. The purpose of this paper is to provide a foundation for discourse in this area through the study of mobile phone use patterns of a highly educated group of young Saudi women vis‐à‐vis privacy. Design/methodology/approach – A mixed interpretative approach was used with a quantitative survey initially conducted to gain a broad idea about the social practices around mobile use, followed by the use of a qualitative method (focus groups), aimed to focus the discussion on the concept of privacy and how the participants negotiate their use of mobile services in light of this. Findings – Variable user behaviour was found with regards to privacy, as their own individual view or societal view is driven not only by the capabilities of the technology, but how it is provided, particularly when there is indication of government monitoring of data content. It was also found that there is a duality between individuals' view of privacy with regard to other individuals and their perception of privacy with regard to their own government. Research limitations/implications – The sensitive nature of the context (Saudi female participants in case study) makes this research unique but had its own challenges, which the researchers attempted to address by using an interpretative and qualitative collection of data. Unfortunately, it was not possible to gather similar data from male youth for comparison, due to the completely segregated nature of this society. Future research will attempt to address this. Practical implications – This research provides information that could be used by mobile phone manufacturers, marketers, content and application providers and telecommunication companies in the process of designing, marketing and providing relevant products and services for this increasingly important population segment. Especially in light of the fact that they share some similarities with youth around the world in their attachment to their mobile phones, but the way it is used to negotiate their various work, home and social domains vis‐à‐vis privacy, is unique. Originality/value – The paper presents key findings on an under‐researched group of Saudi youth; its practices and motivations for mobile use, the particular domain of privacy and how this is negotiated in an Islamic social and cultural context. It also shows there are at least two distinct levels of privacy, and one has a greater influence than the other, on how Saudi Arabian women negotiate their lives in various domains within their society. In fact, the evidence would lead us to believe that one of these privacy levels (individual‐government) has almost no influence on these women's consumption of mobile technology. These young women place importance on their individual‐individual privacy space and are negotiating this privacy boundary among their peers, thereby defining in use, their own particular notion of privacy.
Journal of Islamic Marketing – Emerald Publishing
Published: Jun 22, 2012
Keywords: Middle East; Women; Privacy; Mobile technology; Mobile phones; Social practices; Islamic marketing
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.