skip to main content
10.1145/3314344.3332486acmconferencesArticle/Chapter ViewAbstractPublication PagescompassConference Proceedingsconference-collections
research-article

Identity at the margins: examining refugee experiences with digital identity systems in Lebanon, Jordan, and Uganda

Published:03 July 2019Publication History

ABSTRACT

This paper examines refugees' experiences with and perspectives on the digital identity systems used by humanitarian organizations to collect, manage, and share their personal data. Through a qualitative study with 198 refugees in Lebanon, Jordan, and Uganda, we show how existing humanitarian identity systems present numerous challenges for refugees. For example, we find that refugees have little to no knowledge of the institutional systems and processes through which their personal data is managed and used. In addition, refugees are typically not able to exercise agency with regard to data that is collected about them (e.g., given choices about the data collected). At the same time, we show how refugees make active efforts to negotiate the various identities available to them, consciously weighing the benefits and constraints associated with different statuses to maximize their access to services, eligibility for employment, and spatial mobility. We use Bardzell's lens of feminist interaction design [8] to make sense of these findings and suggest a path forward that engages refugees in the design of improved identity management systems.

References

  1. Konstantin Aal, Marios Mouratidis, Anne Weibert, and Volker Wulf. 2016. Challenges of CI initiatives in a political unstable situation-case study of a computer club in a refugee camp. In Proceedings of the 19th International Conference on Supporting Group Work. ACM, 409--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Konstantin Aal, Anne Weibert, Reem Talhouk, Vasilis Vlachokyriakos, Karen Fisher, and Volker Wulf. 2018. Refugees & Technology: Determining the Role of HCI Research. In Proceedings of the 2018 ACM Conference on Supporting Groupwork. ACM, 362--364. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Arthur Allison, James Currall, Michael Moss, and Susan Stuart. 2005. Digital identity matters. Journal of the American Society for Information Science and Technology 56, 4 (2005), 364--372. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Asam Almohamed and Dhaval Vyas. 2016. Designing for the Marginalized: A step towards understanding the lives of refugees and asylum seekers. In Proceedings of the 2016 ACM Conference Companion Publication on Designing Interactive Systems. ACM, 165--168. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Asam Almohamed and Dhaval Vyas. 2016. Vulnerability of displacement: challenges for integrating refugees and asylum seekers in host communities. In Proceedings of the 28th Australian Conference on Computer-Human Interaction. ACM, 125--134. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Asam Almohamed, Dhaval Vyas, and Jinglan Zhang. 2017. Rebuilding social capital: engaging newly arrived refugees in participatory design. In Proceedings of the 29th Australian Conference on Computer-Human Interaction. ACM, 59--67. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jennifer Baranoff, R Israel Gonzales, Jay Liu, Heidi Yang, and Jimin Zheng. 2015. Lantern: Empowering refugees through community-generated guidance using near field communication. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 7--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Shaowen Bardzell. 2010. Feminist HCI: taking stock and outlining an agenda for design. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 1301--1310. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Roy F Baumeister and Mark Muraven. 1996. Identity as adaptation to social, cultural, and historical context. Journal of adolescence 19, 5 (1996), 405--416.Google ScholarGoogle ScholarCross RefCross Ref
  10. Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77--101.Google ScholarGoogle Scholar
  11. Deana Brown and Rebecca E Grinter. 2016. Designing for transient use: A human-in-the-loop translation platform for refugees. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 321--330. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Rogers Brubaker and Frederick Cooper. 2000. Beyond âĂIJidentityâĂİ. Theory and society 29, 1 (2000), 1--47.Google ScholarGoogle Scholar
  13. Ana Maria Bustamante Duarte, Auriol Degbelo, and Christian Kray. 2018. Exploring Forced Migrants (Re) settlement & the Role of Digital Services. In Proceedings of 16th European Conference on Computer-Supported Cooperative Work-Exploratory Papers. European Society for Socially Embedded Technologies (EUSSET).Google ScholarGoogle Scholar
  14. Catherine Cheney. 2019. How digital identity can address both protection and inclusion. https://www.devex.com/news/how-digital-identity-can-address-both-protection-and-inclusion-94449. (2019).Google ScholarGoogle Scholar
  15. City of Helsinki. 2018. Participation Game. https://www.hel.fi/helsinki/en/administration/participate/channels/participation-model/participation-game/. (2018).Google ScholarGoogle Scholar
  16. Lizzie Coles-Kemp, Rikke Bjerg Jensen, and Reem Talhouk. 2018. In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 584. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Paul Currion, Bryan Pon, and Emrys Schoemaker. 2018. Identity at the Margins: refugee identity and data management. Caribou Digital Publishing (2018).Google ScholarGoogle Scholar
  18. Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, and Andrew Williams. 2012. Hummingbird: Privacy at the time of twitter. In Security and Privacy (SP), 2012 IEEE Symposium on. Citeseer, 285--299. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Bernhard Debatin, Jennette P Lovejoy, Ann-Kathrin Horn, and Brittany N Hughes. 2009. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of computer-mediated communication 15, 1 (2009), 83--108.Google ScholarGoogle ScholarCross RefCross Ref
  20. James D Fearon. 1999. What is identity (as we now use the word). Unpublished manuscript, Stanford University, Stanford, Calif (1999).Google ScholarGoogle Scholar
  21. Karen E Fisher, Reem Talhouk, Katya Yefimova, Dalya Al-Shahrabi, Eiad Yafi, Sam Ewald, and Rob Comber. 2017. Za'atari Refugee Cookbook: Relevance, Challenges and Design Considerations. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 2576--2583. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Karen E Fisher, Katya Yefimova, and Eiad Yafi. 2016. Future's Butterflies: Co-Designing ICT Wayfaring Technology with Refugee Syrian Youth. In Proceedings of the The 15th International Conference on Interaction Design and Children. ACM, 25--36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Leo A Goodman. 1961. Snowball sampling. The annals of mathematical statistics (1961), 148--170.Google ScholarGoogle Scholar
  24. Donna Haraway. 1988. Situated knowledges: The science question in feminism and the privilege of partial perspective. Feminist studies 14, 3 (1988), 575--599.Google ScholarGoogle Scholar
  25. Richard Hugman, Eileen Pittaway, and Linda Bartolomei. 2011. When âĂŸdo no harmâĂŹis not enough: The ethics of research with refugees and other vulnerable groups. The British Journal of Social Work 41, 7 (2011), 1271--1287.Google ScholarGoogle ScholarCross RefCross Ref
  26. Azalea Irani, Kriti Nelavelli, Kristin Hare, Paula Bondal, and Neha Kumar. 2018. Refuge Tech: An Assets-Based Approach to Refugee Resettlement. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, LBW554. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Konstantinos Kazakos, Siddhartha Asthana, Madeline Balaam, Mona Duggal, Amey Holden, Limalemla Jamir, Nanda Kishore Kannuri, Saurabh Kumar, Amarendar Reddy Manindla, Subhashini Arcot Manikam, et al. 2016. A real-time ivr platform for community radio. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 343--354. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. MarkLatonero, Keith Hiatt, Antonella Napolitano, Giulia Clericetti, and Melanie Penagos. 2019. Digital Identity in the Migration and Refugee Context: Italy Case Study. Data and Society (2019), 1--45.Google ScholarGoogle Scholar
  29. Mark R Leary and Robin M Kowalski. 1990. Impression management: A literature review and two-component model. Psychological bulletin 107, 1 (1990), 34.Google ScholarGoogle Scholar
  30. Alvaro Martin, Ana Isabel Segovia, et al. 2018. Digital Identity: the current state of affairs. Technical Report.Google ScholarGoogle Scholar
  31. Wim Meeus, Jurjen Iedema, Marianne Helsen, and Wilma Vollebergh. 1999. Patterns of adolescent identity development: Review of literature and longitudinal analysis. Developmental review 19, 4 (1999), 419--461.Google ScholarGoogle Scholar
  32. Sara Nabil, Reem Talhouk, Julie Trueman, David S Kirk, Simon Bowen, and Peter Wright. 2018. Decorating Public and Private Spaces: Identity and Pride in a Refugee Camp. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, LBW552. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Hamid Nach and Albert Lejeune. 2009. The impact of information technology on identity: Framing the research agenda. (2009).Google ScholarGoogle Scholar
  34. Jean S Phinney. 1990. Ethnic identity in adolescents and adults: review of research. Psychological bulletin 108, 3 (1990), 499.Google ScholarGoogle Scholar
  35. Samar Sabie, Jay Chen, Azza Abouzied, Fatma Hashim, Harleen Kahlon, and Steve Easterbrook. 2017. Shelter Dynamics in Refugee and IDP Camps: Customization, Permanency, and Opportunities. In Proceedings of the 2017 Workshop on Computing Within Limits. ACM, 11--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Paul Schmitt, Daniel Iland, Elizabeth Belding, Brian Tomaszewski, Ying Xu, and Carleen Maitland. 2016. Community-level access divides: A refugee camp case study. In Proceedings of the Eighth International Conference on Information and Communication Technologies and Development. ACM, 25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Seteney Shami. 1996. Transnationalism and refugee studies: Rethinking forced migration and identity in the Middle East. Journal of Refugee Studies 9, 1 (1996), 3--26.Google ScholarGoogle ScholarCross RefCross Ref
  38. Anouk Smeekes, Maykel Verkuyten, Elif Çelebi, Ceren Acartürk, and Samed Onkun. 2017. Social identity continuity and mental health among Syrian refugees in Turkey. Social psychiatry and psychiatric epidemiology 52, 10 (2017), 1317--1324.Google ScholarGoogle Scholar
  39. O Stickel, D Hornung, K Aal, M Rohde, and V Wulf. 2015. 3D Printing with Marginalized Children-An Exploration in a Palestinian Refugee Camp, ECSCW 2015: Proceedings of the 14th European Conference on Computer Supported Cooperative Work, 19-23 September 2015, Oslo, Norway, Nina Boulus-Rødje, Gunnar Ellingsen, Tone Bratteteig, Margunn Aanestad, Pernille Bjørn. Springer, URL: doi 10 (2015), 978--3.Google ScholarGoogle ScholarCross RefCross Ref
  40. Reem Talhouk, Tom Bartindale, Kyle Montague, Sandra Mesmar, Chaza Akik, A Ghassani, M Najem, H Ghattas, Patrick Olivier, and Madeline Balaam. 2017. Implications of synchronous IVR radio on Syrian refugee health and community dynamics. In Proceedings of the 8th International Conference on Communities and Technologies. ACM, 193--202. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Reem Talhouk, Ana Bustamante, Konstantin Aal, Anne Weibert, Koula Charitonos, and Vasilis Vlachokyriakos. 2018. HCI and refugees: experiences and reflections. Interactions 25, 4 (2018), 46--51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Reem Talhouk, Sandra Mesmar, Anja Thieme, Madeline Balaam, Patrick Olivier, Chaza Akik, and Hala Ghattas. 2016. Syrian refugees and digital health in Lebanon: Opportunities for improving antenatal health. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 331--342. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Reem Talhouk, Vasillis Vlachokyriakos, Anne Weibert, Konstantin Aal, Syed Ishtiaque Ahmed, Karen Fisher, and Volker Wulf. 2017. Refugees & HCI Workshop: The Role of HCI in Responding to the Refugee Crisis. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 558--565. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Uganda Office of the Prime Minister. 2018. Refugees Management. https://opm.go.ug/refugees-management/. (2018).Google ScholarGoogle Scholar
  45. UNHCR. 2018. Biometric Identity Management System. http://www.unhcr.org/en-us/protection/basic/550c304c9/biometric-identity-management-system.html. (2018).Google ScholarGoogle Scholar
  46. UNHCR. 2018. Jordan Factsheet. https://reliefweb.int/report/jordan/unhcr-jordan-factsheet-june-2018. (2018).Google ScholarGoogle Scholar
  47. UNHCR. 2018. Lebanon. http://www.unhcr.org/lb/shelter. (2018).Google ScholarGoogle Scholar
  48. UNHCR. 2018. PRIMES: Population Registration and Identity Management EcoSystem. https://www.unhcr.org/primes.html. (2018).Google ScholarGoogle Scholar
  49. UNHCR. 2018. Registration via ProGres. http://www.unhcr.org/en-us/registration.html. (2018).Google ScholarGoogle Scholar
  50. UNHCR. 2018. Syrian Regional Refugee Response. https://data2.unhcr.org/en/situations/syria/location/36. (2018).Google ScholarGoogle Scholar
  51. UNHCR. 2018. Uganda. https://data2.unhcr.org/en/country/uga. (2018).Google ScholarGoogle Scholar
  52. Sara Vannini, Ricardo Gomez, Megan Carney, and Katharyne Mitchell. 2018. Interdisciplinary Approaches to Refugee and Migration Studies: Lessons from Collaborative Research on Sanctuary in the Changing Times of Trump. Migration and Society 1, 1 (2018), 164--174.Google ScholarGoogle ScholarCross RefCross Ref
  53. Alan S Waterman. 1982. Identity development from adolescence to adulthood: An extension of theory and a review of research. Developmental psychology 18, 3 (1982), 341.Google ScholarGoogle Scholar
  54. Edgar A Whitley, Uri Gal, and Annemette Kjaergaard. 2014. Who do you think you are? A review of the complex interplay between information systems, identification and identity. (2014).Google ScholarGoogle Scholar
  55. Ying Xu, Adrian Holzer, Carleen Maitland, and Denis Gillet. 2017. Community building with co-located social media: A field experiment with syrian refugees. In Proceedings of the Ninth International Conference on Information and Communication Technologies and Development. ACM, 16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Ying Xu and Carleen Maitland. 2016. Communication Behaviors When Displaced: A Case Study of Za'atari Syrian Refugee Camp. In Proceedings of the Eighth International Conference on Information and Communication Technologies and Development. ACM, 58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Ying Xu and Carleen Maitland. 2017. Mobilizing Assets: Data-Driven Community Development with Refugees. In Proceedings of the Ninth International Conference on Information and Communication Technologies and Development. ACM, 10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Ying Xu, Carleen Maitland, and Brian Tomaszewski. 2015. Promoting participatory community building in refugee camps with mapping technology. In Proceedings of the Seventh International Conference on Information and Communication Technologies and Development. ACM, 67. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Dr Eiad Yafi and Karen E Fisher. 2018. Syrian Youth in ZaâĂŹatari Refugee Camp as ICT Wayfarers: An Exploratory Study Using LEGO and Storytelling. (2018).Google ScholarGoogle Scholar
  60. Eiad Yafi, Katya Yefimova, and Karen E Fisher. 2018. Young Hackers: Hacking Technology at Za'atari Syrian Refugee Camp. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, CS21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. George Yerousis, Konstantin Aal, Thomas von Rekowski, David W Randall, Markus Rohde, and Volker Wulf. 2015. Computer-enabled project spaces: Connecting with Palestinian refugees across camp boundaries. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 3749--3758. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    COMPASS '19: Proceedings of the 2nd ACM SIGCAS Conference on Computing and Sustainable Societies
    July 2019
    290 pages
    ISBN:9781450367141
    DOI:10.1145/3314344

    Copyright © 2019 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 3 July 2019

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    COMPASS '19 Paper Acceptance Rate25of50submissions,50%Overall Acceptance Rate25of50submissions,50%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader