ABSTRACT
There has been a growing body of work on migration within the HCI community, as well as within the social science and public policy communities. More specifically, human-centered security researchers have been exploring the needs and concerns of migrants, starting to contend with the harms created by digital technologies and experienced by those who are and have been marginalized. Case studies through which migration and (digital) security within the HCI domain intersect have been localized to specific contexts such as, e.g., particular issues related to data processing and sharing in refugee camps, or a narrow set of security threats and harms experienced by migrant workers in their new places of work. However, more holistic approaches to understanding the intersections of migration and (digital) security are yet to be fully explored while accounting for the past (including home country security practices, use of localized digital technologies, and interactions with technologies throughout the migration journey), the present (current security practices and experiences in the place or country migrants are situated), and the future migrants are trying to secure for themselves and their families. This workshop aims to build a community of HCI researchers interested in how migration and (digital) security intersect to braid together research narratives, perspectives, and methods, design for inclusive technologies, and build an agenda for future research and practice.
- Konstantin Aal, Anne Weibert, Reem Talhouk, Vasilis Vlachokyriakos, Karen Fisher, and Volker Wulf. 2018. Refugees & Technology: Determining the Role of HCI Research. In ACM Conference on Supporting Groupwork. 362–364.Google ScholarDigital Library
- Noura Abdi, Tess Despres, Ruba Abu-Salma, and Julia Bernd. 2022. In-Home Smart Devices: Quantifying Bystander Privacy Experiences and Social Norms in Different Situations. In Annual Symposium on Applications of Contextual Integrity (CI Symposium).Google Scholar
- Tanisha Afnan, Yixin Zou, Maryam Mustafa, Mustafa Naseem, and Florian Schaub. 2022. Aunties, Strangers, and the FBI: Online Privacy Concerns and Experiences of Muslim-American Women. In Symposium on Usable Privacy and Security (SOUPS). 387–406.Google Scholar
- Syed Ishtiaque Ahmed, Md Romael Haque, Jay Chen, and Nicola Dell. 2017. Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh. Proceedings of the ACM on Human-Computer Interaction 1, CSCW(2017), 1–20.Google ScholarDigital Library
- Martin R Albrecht, Jorge Blasco, Rikke Bjerg Jensen, and Lenka Mareková. 2021. Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong. In USENIX Security Symposium (USENIX Security). 3363–3380.Google Scholar
- Asam Hamed Abbas Almohamed, Reem Talhouk, and Dhaval Vyas. 2022. Towards a Conceptual Framework for Understanding the Challenges in Refugee Re-settlement. Proceedings of the ACM on Human-Computer Interaction 6, GROUP(2022), 1–27.Google ScholarDigital Library
- Julia Bernd, Ruba Abu-Salma, Junghyun Choy, and Alisa Frik. 2022. Balancing Power Dynamics in Smart Homes: Nannies’ Perspectives on How Cameras Reflect and Affect Relationships. In Symposium on Usable Privacy and Security (SOUPS). 687–706.Google Scholar
- Julia Bernd, Ruba Abu-Salma, and Alisa Frik. 2020. Bystanders’ Privacy: The Perspectives of Nannies on Smart Home Surveillance. In USENIX Workshop on Free and Open Communications on the Internet (FOCI).Google Scholar
- Deana Brown and Rebecca E Grinter. 2016. Designing for Transient Use: A Human-in-the-loop Translation Platform for Refugees. In CHI Conference on Human Factors in Computing Systems. 321–330.Google ScholarDigital Library
- Lizzie Coles-Kemp and Rikke Bjerg Jensen. 2019. Accessing a New Land: Designing for a Social Conceptualisation of Access. In CHI Conference on Human Factors in Computing Systems. 1–12.Google ScholarDigital Library
- Lizzie Coles-Kemp, Rikke Bjerg Jensen, and Reem Talhouk. 2018. In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities. In CHI Conference on Human Factors in Computing Systems. 1–13.Google Scholar
- Rianne Dekker, Godfried Engbersen, Jeanine Klaver, and Hanna Vonk. 2018. Smart Refugees: How Syrian Asylum Migrants Use Social Media Information in Migration Decision-Making. Social Media+ Society 4, 1 (2018), 2056305118764439.Google Scholar
- Tamy Guberek, Allison McDonald, Sylvia Simioni, Abraham H Mhaidli, Kentaro Toyama, and Florian Schaub. 2018. Keeping a Low Profile?: Technology, Risk and Privacy among Undocumented Immigrants. In CHI Conference on Human Factors in Computing Systems. 1–15.Google ScholarDigital Library
- Rakibul Hasan, Kavous Salehzadeh Niksirat, Jose Such, Kévin Huguenin, Mary Jean Amon, Ruba Abu-Salma, Yaxing Yao, Mathias Humbert, and Gergely Biczók. 2022. PETS Workshop on Interdependent and Multi-party Privacy. Retrieved October 11, 2022 from https://sites.google.com/asu.edu/idp-pets22/homeGoogle Scholar
- Joey Chiao-Yin Hsiao and Tawanna R Dillahunt. 2018. Technology to Support Immigrant Access to Social Capital and Adaptation to a New Country. Proceedings of the ACM on Human-Computer Interaction 2, CSCW(2018), 1–21.Google Scholar
- Faheem Hussain, Abdullah Hasan Safir, Dina Sabie, Zulkarin Jahangir, and Syed Ishtiaque Ahmed. 2020. Infrastructuring Hope: Solidarity, Leadership, Negotiation, and ICT among the Rohingya Refugees in Bangladesh. In International Conference on Information and Communication Technologies and Development (Guayaquil, Ecuador) (ICTD2020). Association for Computing Machinery, New York, NY, USA, Article 12, 12 pages. https://doi.org/10.1145/3392561.3394640Google ScholarDigital Library
- Margaret C Jack, Sopheak Chann, Steven J Jackson, and Nicola Dell. 2021. Networked Authoritarianism at the Edge: The Digital and Political Transitions of Cambodian Village Officials. Proceedings of the ACM on Human-Computer Interaction 5, CSCW1(2021), 1–25.Google ScholarDigital Library
- Tomasz Janowski, Elsa Estevez, and Rehema Baguma. 2018. Platform Governance for Sustainable Development: Reshaping Citizen-Administration Relationships in the Digital Age. Government Information Quarterly 35, 4 (2018), S1–S16.Google ScholarCross Ref
- Rikke Bjerg Jensen, Lizzie Coles-Kemp, and Reem Talhouk. 2020. When the Civic Turn Turns Digital: Designing Safe and Secure Refugee Resettlement. In CHI Conference on Human Factors in Computing Systems. 1–14.Google Scholar
- Maximilian Krüger, Konstantin Aal, Volker Wulf, Franziska Maria Tachtler, Reem Talhouk, Ana María Bustamante Duarte, Karen E Fisher, Eiad Yafi, and Koula Charitonos. 2019. Technology at/of the Border: A Workshop about Stories and Experiences. In International Conference on Communities & Technologies-Transforming Communities. 336–342.Google ScholarDigital Library
- Koen Leurs and Philipp Seuferling. 2022. Migration and the Deep Time of Media Infrastructures. Communication, Culture and Critique 15, 2 (2022), 290–297.Google ScholarCross Ref
- Sun Sun Lim, Hichang Cho, and Milagros Rivera Sanchez. 2009. Online Privacy, Government Surveillance and National ID Cards. Commun. ACM 52, 12 (2009), 116–120.Google ScholarDigital Library
- PDC Places. 2022. Embracing Cosmologies: Expanding Worlds of Participatory Design. Retrieved October 11, 2022 from https://pdc2022.org/places/Google Scholar
- Trine Rask Nielsen and Naja Holten Møller. 2022. Data as a Lens for Understanding what Constitutes Credibility in Asylum Decision-making. Proceedings of the ACM on Human-Computer Interaction 6, GROUP(2022), 1–23.Google ScholarDigital Library
- Markus Rohde, Konstantin Aal, Kaoru Misaki, Dave Randall, Anne Weibert, and Volker Wulf. 2016. Out of Syria: Mobile Media in Use at the Time of Civil War. International Journal of Human-Computer Interaction 32, 7(2016), 515–531.Google ScholarCross Ref
- Dina Sabie, Cansu Ekmekcioglu, and Syed Ishtiaque Ahmed. 2022. A Decade of International Migration Research in HCI: Overview, Challenges, Ethics, Impact, and Future Directions. ACM Transactions on Computer-Human Interaction (TOCHI) 29, 4(2022), 1–35.Google ScholarDigital Library
- Dina Sabie, Samar Sabie, and Syed Ishtiaque Ahmed. 2020. Memory through Design: Supporting Cultural Identity for Immigrants through a Paper-Based Home Drafting Tool. In CHI Conference on Human Factors in Computing Systems. 1–16.Google ScholarDigital Library
- Dina Sabie, Reem Talhouk, Cansu Ekmekcioglu, Carleen Maitland, Volker Wulf, Eiad Yafi, Samar Sabie, Asam Almohamed, Safa’a AbuJarour, Kahina Le Louvier, 2021. Migration and Mobility in HCI: Rethinking Boundaries, Methods, and Impact. In CHI Conference on Human Factors in Computing Systems (Extended Abstracts). 1–6.Google ScholarDigital Library
- Angela M Schöpke-Gonzalez and Florian Schaub. 2022. Mobile Phones at Borders: Logics of Deterrence and Survival in the Mediterranean Sea and Sonoran Desert. Information, Communication & Society(2022), 1–17.Google Scholar
- Kristen M Scott, Sonja Mei Wang, Milagros Miceli, Pieter Delobelle, Karolina Sztandar-Sztanderska, and Bettina Berendt. 2022. Algorithmic Tools in Public Employment Services: Towards a Jobseeker-Centric Perspective. In ACM Conference on Fairness, Accountability, and Transparency. 2138–2148.Google ScholarDigital Library
- Emrys Shoemaker, Gudrun Svava Kristinsdottir, Tanuj Ahuja, Dina Baslan, Bryan Pon, Paul Currion, Pius Gumisizira, and Nicola Dell. 2019. Identity at the Margins: Data Justice and Refugee Experiences with Digital Identity Systems in Lebanon, Jordan, and Uganda. In ACM SIGCAS Conference on Computing and Sustainable Societies. 206–217.Google ScholarDigital Library
- Lucy Simko, Ada Lerner, Samia Ibtasam, Franziska Roesner, and Tadayoshi Kohno. 2018. Computer Security and Privacy for Refugees in the United States. In IEEE Symposium on Security and Privacy (SP). IEEE, 409–423.Google Scholar
- Julia Slupska, Selina Cho, Marissa Begonia, Ruba Abu-Salma, Nayanatara Prakash, and Mallika Balakrishnan. 2022. “They Look at Vulnerability and Use That to Abuse You”: Participatory Threat Modelling with Migrant Domestic Workers. In USENIX Security Symposium (USENIX Security). 323–340.Google Scholar
- Enno Steinbrink, Lilian Reichert, Michelle Mende, and Christian Reuter. 2021. Digital Privacy Perceptions of Asylum Seekers in Germany: An Empirical Study about Smartphone Usage during the Flight. Proceedings of the ACM on Human-Computer Interaction 5, CSCW2(2021), 1–24.Google ScholarDigital Library
- Franziska Tachtler, Reem Talhouk, Toni Michel, Petr Slovák, and Geraldine Fitzpatrick. 2021. Unaccompanied Migrant Youth and Mental Health Technologies: A Social-Ecological Approach to Understanding and Designing. In CHI Conference on Human Factors in Computing Systems. 1–19.Google ScholarDigital Library
- Reem Talhouk, Konstantin Aal, Anne Weibert, Max Krüger, Volker Wulf, Karen Fisher, Franziska Tachtler, Suleman Shahid, Syed Ishtiaque Ahmed, and Ana Maria Bustamante Duarte. 2019. Refugees & HCI SiG: Situating HCI within Humanitarian Research. In CHI Conference on Human Factors in Computing Systems (Extended Abstracts). 1–4.Google ScholarDigital Library
- Reem Talhouk, Syed Ishtiaque Ahmed, Volker Wulf, Clara Crivellaro, Vasilis Vlachokyriakos, and Patrick Olivier. 2016. Refugees and HCI SIG: The Role of HCI in Responding to the Refugee Crisis. In CHI Conference on Human Factors in Computing Systems (Extended Abstracts). 1073–1076.Google ScholarDigital Library
- Reem Talhouk, Lizzie Coles-Kemp, Rikke Bjerg Jensen, Madeline Balaam, Andrew Garbett, Hala Ghattas, Vera Araujo-Soares, Balsam Ahmad, and Kyle Montague. 2020. Food Aid Technology: The Experience of a Syrian Refugee Community in Coping with Food Insecurity. Proceedings of the ACM on Human-Computer Interaction 4, CSCW2(2020), 1–25.Google ScholarDigital Library
- Reem Talhouk, Kyle Montague, Hala Ghattas, Vera Araujo-Soares, Balsam Ahmad, and Madeline Balaam. 2022. Refugee Food Insecurity & Technology: Surfacing Experiences of Adaptation, Navigation, Negotiation and Sharing. Proceedings of the ACM on Human-Computer Interaction (2022), 1–32.Google ScholarDigital Library
- Reem Talhouk, Vasillis Vlachokyriakos, Anne Weibert, Konstantin Aal, Syed Ishtiaque Ahmed, Karen Fisher, and Volker Wulf. 2017. Refugees & HCI Workshop: The Role of HCI in Responding to the Refugee Crisis. In CHI Conference on Human Factors in Computing Systems (Extended Abstracts). 558–565.Google Scholar
- Reem Talhouk and Eiad Yafi. 2021. Middle Eastern Reflections on Forced Migration, Solidarity, and HCI Research. Interactions 28, 2 (2021), 48–51.Google ScholarDigital Library
- Linnet Taylor and Fran Meissner. 2020. A Crisis of Opportunity: Market-Making, Big Data, and the Consolidation of Migration as Risk. Antipode 52, 1 (2020), 270–290.Google ScholarCross Ref
- Ana Valdivia, Claudia Aradau, Tobias Blanke, and Sarah Perret. 2022. Neither Opaque nor Transparent: A Transdisciplinary Methodology to Investigate Datafication at the EU Borders. Big Data & Society 9, 2 (2022), 20539517221124586.Google ScholarCross Ref
Index Terms
- Diverse Migration Journeys and Security Practices: Engaging with Longitudinal Perspectives of Migration and (Digital) Security
Recommendations
Exploring the Firewall Security Consistency in Cloud Computing during Live Migration
ICCCNT '16: Proceedings of the 7th International Conference on Computing Communication and Networking TechnologiesVirtualization technology adds great opportunities and challenges to the cloud computing paradigm. Resource management can be efficiently enhanced by employing Live Virtual Machine Migration (LVMM) techniques. Based on the literature of LVMM ...
Improving Total Migration Time in Live Virtual Machine Migration
ICCCT '15: Proceedings of the Sixth International Conference on Computer and Communication Technology 2015Virtualization is the key underlying technology enabling cloud providers to host services for a large number of customers. Live migration is an essential feature of virtualization that allows transfer of virtual machines from one physical server to ...
Employee Information Security Practices: A Framework and Research Agenda
Employee information security practices are pivotal to prevent, detect, and respond to security incidents. This article synthesizes insights from research on challenges related to employee information security practices and measures to address them. ...
Comments