{"id":"https://openalex.org/W7140280461","doi":"https://doi.org/10.48550/arxiv.2603.22637","title":"When Data Protection Fails to Protect: Law, Power, and Postcolonial Governance in Bangladesh","display_name":"When Data Protection Fails to Protect: Law, Power, and Postcolonial Governance in Bangladesh","publication_year":2026,"publication_date":"2026-03-23","ids":{"openalex":"https://openalex.org/W7140280461","doi":"https://doi.org/10.48550/arxiv.2603.22637"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.22637","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.22637","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.22637","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015629549","display_name":"Pratyasha Saha","orcid":"https://orcid.org/0000-0003-2987-672X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Saha, Pratyasha","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130547738","display_name":"Anita Say Chan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chan, Anita Say","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5103026409","display_name":"Sharifa Sultana","orcid":"https://orcid.org/0000-0003-2906-7391"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sultana, Sharifa","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015629549"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13194","display_name":"ICT in Developing Communities","score":0.24809999763965607,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13194","display_name":"ICT in Developing Communities","score":0.24809999763965607,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.11810000240802765,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12943","display_name":"COVID-19 Digital Contact Tracing","score":0.08079999685287476,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.7782999873161316},{"id":"https://openalex.org/keywords/sociotechnical-system","display_name":"Sociotechnical system","score":0.6283000111579895},{"id":"https://openalex.org/keywords/data-governance","display_name":"Data governance","score":0.6010000109672546},{"id":"https://openalex.org/keywords/scholarship","display_name":"Scholarship","score":0.5751000046730042},{"id":"https://openalex.org/keywords/corporate-governance","display_name":"Corporate governance","score":0.5555999875068665},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.5044000148773193},{"id":"https://openalex.org/keywords/digitization","display_name":"Digitization","score":0.426800012588501},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.3898000121116638},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.3671000003814697}],"concepts":[{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.7782999873161316},{"id":"https://openalex.org/C127627568","wikidata":"https://www.wikidata.org/wiki/Q1639361","display_name":"Sociotechnical system","level":2,"score":0.6283000111579895},{"id":"https://openalex.org/C196879817","wikidata":"https://www.wikidata.org/wiki/Q872685","display_name":"Data governance","level":4,"score":0.6010000109672546},{"id":"https://openalex.org/C2778061430","wikidata":"https://www.wikidata.org/wiki/Q188823","display_name":"Scholarship","level":2,"score":0.5751000046730042},{"id":"https://openalex.org/C39389867","wikidata":"https://www.wikidata.org/wiki/Q380767","display_name":"Corporate governance","level":2,"score":0.5555999875068665},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.5044000148773193},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.430400013923645},{"id":"https://openalex.org/C2779308522","wikidata":"https://www.wikidata.org/wiki/Q843958","display_name":"Digitization","level":2,"score":0.426800012588501},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.41679999232292175},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.3898000121116638},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3671000003814697},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.3370000123977661},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.3370000123977661},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.32429999113082886},{"id":"https://openalex.org/C3116431","wikidata":"https://www.wikidata.org/wiki/Q31728","display_name":"Public administration","level":1,"score":0.32280001044273376},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.31779998540878296},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.3156000077724457},{"id":"https://openalex.org/C3090818","wikidata":"https://www.wikidata.org/wiki/Q1172506","display_name":"General Data Protection Regulation","level":3,"score":0.3133000135421753},{"id":"https://openalex.org/C169437150","wikidata":"https://www.wikidata.org/wiki/Q8458","display_name":"Human rights","level":2,"score":0.30469998717308044},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.29670000076293945},{"id":"https://openalex.org/C207267971","wikidata":"https://www.wikidata.org/wiki/Q120208","display_name":"Emerging technologies","level":2,"score":0.2944999933242798},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2874999940395355},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.28200000524520874},{"id":"https://openalex.org/C2777433830","wikidata":"https://www.wikidata.org/wiki/Q7551332","display_name":"Social protection","level":2,"score":0.2809999883174896},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.27900001406669617},{"id":"https://openalex.org/C189922023","wikidata":"https://www.wikidata.org/wiki/Q17056348","display_name":"Information governance","level":4,"score":0.2556000053882599},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.2554999887943268},{"id":"https://openalex.org/C2776310101","wikidata":"https://www.wikidata.org/wiki/Q1524235","display_name":"Global governance","level":3,"score":0.25200000405311584}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.22637","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.22637","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.22637","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.22637","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Rapid":[0],"digitization":[1],"across":[2],"government":[3],"services,":[4],"financial":[5],"platforms,":[6],"and":[7,13,41,76,108,112,140,162],"telecommunications":[8],"has":[9,26],"intensified":[10],"the":[11,24,32,37,42,96,117,141,182,195,199],"collection":[12],"processing":[14],"of":[15,79,89,102,120,145,184,198],"large":[16],"scale":[17],"personal":[18,122],"data":[19,58,82,105,148,160,185],"in":[20,47,69],"Bangladesh.":[21],"In":[22],"response,":[23],"state":[25],"introduced":[27],"multiple":[28],"regulatory":[29,138],"instruments,":[30],"including":[31],"Personal":[33],"Data":[34,44],"Protection":[35],"Ordinance,":[36,40],"Cyber":[38],"Security":[39],"National":[43],"Governance":[45],"Ordinance":[46],"2025.":[48],"While":[49],"these":[50,65,90,151],"initiatives":[51],"signal":[52],"an":[53,99],"emerging":[54,81,129],"legal":[55,75,111,143],"regime":[56,84,130],"for":[57],"protection,":[59],"little":[60],"scholarly":[61],"work":[62],"examines":[63],"how":[64],"frameworks":[66,152],"operate":[67],"collectively":[68],"practice.":[70],"This":[71,174],"paper":[72,97,175],"presents":[73],"a":[74,86,188],"institutional":[77,113,135],"analysis":[78],"Bangladeshs":[80,103],"protection":[83,106,119,186],"through":[85],"systematic":[87],"review":[88],"three":[91],"ordinances.":[92],"Through":[93],"this":[94,128],"review,":[95],"provides":[98],"integrated":[100],"mapping":[101],"evolving":[104],"framework":[107],"identifies":[109],"key":[110],"barriers":[114],"that":[115,127],"undermine":[116],"effective":[118],"citizens":[121],"data.":[123],"Our":[124],"findings":[125],"reveal":[126],"is":[131],"constrained":[132],"by":[133,180,194],"limited":[134],"independence,":[136],"uneven":[137],"capacity,":[139],"misaligned":[142],"assumption":[144],"individualized,":[146],"autonomous":[147],"subjects.":[149],"Furthermore,":[150],"invisibilize":[153],"prevalent":[154],"sociotechnical":[155,190],"layers,":[156],"such":[157],"as":[158,187],"informal":[159,196],"flows":[161],"mediated":[163],"access":[164],"via":[165],"human":[166],"bridges,":[167],"rendering":[168],"formal":[169],"protections":[170],"difficult":[171],"to":[172,177],"operationalize.":[173],"contributes":[176],"HCI":[178],"scholarship":[179],"expanding":[181],"concept":[183],"complex":[189],"design":[191],"problem":[192],"shaped":[193],"infrastructures":[197],"Global":[200],"South.":[201]},"counts_by_year":[],"updated_date":"2026-03-26T06:10:45.909354","created_date":"2026-03-26T00:00:00"}
