skip to main content
10.1145/3544549.3573800acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
extended-abstract

Diverse Migration Journeys and Security Practices: Engaging with Longitudinal Perspectives of Migration and (Digital) Security

Authors Info & Claims
Published:19 April 2023Publication History

ABSTRACT

There has been a growing body of work on migration within the HCI community, as well as within the social science and public policy communities. More specifically, human-centered security researchers have been exploring the needs and concerns of migrants, starting to contend with the harms created by digital technologies and experienced by those who are and have been marginalized. Case studies through which migration and (digital) security within the HCI domain intersect have been localized to specific contexts such as, e.g., particular issues related to data processing and sharing in refugee camps, or a narrow set of security threats and harms experienced by migrant workers in their new places of work. However, more holistic approaches to understanding the intersections of migration and (digital) security are yet to be fully explored while accounting for the past (including home country security practices, use of localized digital technologies, and interactions with technologies throughout the migration journey), the present (current security practices and experiences in the place or country migrants are situated), and the future migrants are trying to secure for themselves and their families. This workshop aims to build a community of HCI researchers interested in how migration and (digital) security intersect to braid together research narratives, perspectives, and methods, design for inclusive technologies, and build an agenda for future research and practice.

References

  1. Konstantin Aal, Anne Weibert, Reem Talhouk, Vasilis Vlachokyriakos, Karen Fisher, and Volker Wulf. 2018. Refugees & Technology: Determining the Role of HCI Research. In ACM Conference on Supporting Groupwork. 362–364.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Noura Abdi, Tess Despres, Ruba Abu-Salma, and Julia Bernd. 2022. In-Home Smart Devices: Quantifying Bystander Privacy Experiences and Social Norms in Different Situations. In Annual Symposium on Applications of Contextual Integrity (CI Symposium).Google ScholarGoogle Scholar
  3. Tanisha Afnan, Yixin Zou, Maryam Mustafa, Mustafa Naseem, and Florian Schaub. 2022. Aunties, Strangers, and the FBI: Online Privacy Concerns and Experiences of Muslim-American Women. In Symposium on Usable Privacy and Security (SOUPS). 387–406.Google ScholarGoogle Scholar
  4. Syed Ishtiaque Ahmed, Md Romael Haque, Jay Chen, and Nicola Dell. 2017. Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh. Proceedings of the ACM on Human-Computer Interaction 1, CSCW(2017), 1–20.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Martin R Albrecht, Jorge Blasco, Rikke Bjerg Jensen, and Lenka Mareková. 2021. Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong. In USENIX Security Symposium (USENIX Security). 3363–3380.Google ScholarGoogle Scholar
  6. Asam Hamed Abbas Almohamed, Reem Talhouk, and Dhaval Vyas. 2022. Towards a Conceptual Framework for Understanding the Challenges in Refugee Re-settlement. Proceedings of the ACM on Human-Computer Interaction 6, GROUP(2022), 1–27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Julia Bernd, Ruba Abu-Salma, Junghyun Choy, and Alisa Frik. 2022. Balancing Power Dynamics in Smart Homes: Nannies’ Perspectives on How Cameras Reflect and Affect Relationships. In Symposium on Usable Privacy and Security (SOUPS). 687–706.Google ScholarGoogle Scholar
  8. Julia Bernd, Ruba Abu-Salma, and Alisa Frik. 2020. Bystanders’ Privacy: The Perspectives of Nannies on Smart Home Surveillance. In USENIX Workshop on Free and Open Communications on the Internet (FOCI).Google ScholarGoogle Scholar
  9. Deana Brown and Rebecca E Grinter. 2016. Designing for Transient Use: A Human-in-the-loop Translation Platform for Refugees. In CHI Conference on Human Factors in Computing Systems. 321–330.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Lizzie Coles-Kemp and Rikke Bjerg Jensen. 2019. Accessing a New Land: Designing for a Social Conceptualisation of Access. In CHI Conference on Human Factors in Computing Systems. 1–12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Lizzie Coles-Kemp, Rikke Bjerg Jensen, and Reem Talhouk. 2018. In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities. In CHI Conference on Human Factors in Computing Systems. 1–13.Google ScholarGoogle Scholar
  12. Rianne Dekker, Godfried Engbersen, Jeanine Klaver, and Hanna Vonk. 2018. Smart Refugees: How Syrian Asylum Migrants Use Social Media Information in Migration Decision-Making. Social Media+ Society 4, 1 (2018), 2056305118764439.Google ScholarGoogle Scholar
  13. Tamy Guberek, Allison McDonald, Sylvia Simioni, Abraham H Mhaidli, Kentaro Toyama, and Florian Schaub. 2018. Keeping a Low Profile?: Technology, Risk and Privacy among Undocumented Immigrants. In CHI Conference on Human Factors in Computing Systems. 1–15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Rakibul Hasan, Kavous Salehzadeh Niksirat, Jose Such, Kévin Huguenin, Mary Jean Amon, Ruba Abu-Salma, Yaxing Yao, Mathias Humbert, and Gergely Biczók. 2022. PETS Workshop on Interdependent and Multi-party Privacy. Retrieved October 11, 2022 from https://sites.google.com/asu.edu/idp-pets22/homeGoogle ScholarGoogle Scholar
  15. Joey Chiao-Yin Hsiao and Tawanna R Dillahunt. 2018. Technology to Support Immigrant Access to Social Capital and Adaptation to a New Country. Proceedings of the ACM on Human-Computer Interaction 2, CSCW(2018), 1–21.Google ScholarGoogle Scholar
  16. Faheem Hussain, Abdullah Hasan Safir, Dina Sabie, Zulkarin Jahangir, and Syed Ishtiaque Ahmed. 2020. Infrastructuring Hope: Solidarity, Leadership, Negotiation, and ICT among the Rohingya Refugees in Bangladesh. In International Conference on Information and Communication Technologies and Development (Guayaquil, Ecuador) (ICTD2020). Association for Computing Machinery, New York, NY, USA, Article 12, 12 pages. https://doi.org/10.1145/3392561.3394640Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Margaret C Jack, Sopheak Chann, Steven J Jackson, and Nicola Dell. 2021. Networked Authoritarianism at the Edge: The Digital and Political Transitions of Cambodian Village Officials. Proceedings of the ACM on Human-Computer Interaction 5, CSCW1(2021), 1–25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Tomasz Janowski, Elsa Estevez, and Rehema Baguma. 2018. Platform Governance for Sustainable Development: Reshaping Citizen-Administration Relationships in the Digital Age. Government Information Quarterly 35, 4 (2018), S1–S16.Google ScholarGoogle ScholarCross RefCross Ref
  19. Rikke Bjerg Jensen, Lizzie Coles-Kemp, and Reem Talhouk. 2020. When the Civic Turn Turns Digital: Designing Safe and Secure Refugee Resettlement. In CHI Conference on Human Factors in Computing Systems. 1–14.Google ScholarGoogle Scholar
  20. Maximilian Krüger, Konstantin Aal, Volker Wulf, Franziska Maria Tachtler, Reem Talhouk, Ana María Bustamante Duarte, Karen E Fisher, Eiad Yafi, and Koula Charitonos. 2019. Technology at/of the Border: A Workshop about Stories and Experiences. In International Conference on Communities & Technologies-Transforming Communities. 336–342.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Koen Leurs and Philipp Seuferling. 2022. Migration and the Deep Time of Media Infrastructures. Communication, Culture and Critique 15, 2 (2022), 290–297.Google ScholarGoogle ScholarCross RefCross Ref
  22. Sun Sun Lim, Hichang Cho, and Milagros Rivera Sanchez. 2009. Online Privacy, Government Surveillance and National ID Cards. Commun. ACM 52, 12 (2009), 116–120.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. PDC Places. 2022. Embracing Cosmologies: Expanding Worlds of Participatory Design. Retrieved October 11, 2022 from https://pdc2022.org/places/Google ScholarGoogle Scholar
  24. Trine Rask Nielsen and Naja Holten Møller. 2022. Data as a Lens for Understanding what Constitutes Credibility in Asylum Decision-making. Proceedings of the ACM on Human-Computer Interaction 6, GROUP(2022), 1–23.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Markus Rohde, Konstantin Aal, Kaoru Misaki, Dave Randall, Anne Weibert, and Volker Wulf. 2016. Out of Syria: Mobile Media in Use at the Time of Civil War. International Journal of Human-Computer Interaction 32, 7(2016), 515–531.Google ScholarGoogle ScholarCross RefCross Ref
  26. Dina Sabie, Cansu Ekmekcioglu, and Syed Ishtiaque Ahmed. 2022. A Decade of International Migration Research in HCI: Overview, Challenges, Ethics, Impact, and Future Directions. ACM Transactions on Computer-Human Interaction (TOCHI) 29, 4(2022), 1–35.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Dina Sabie, Samar Sabie, and Syed Ishtiaque Ahmed. 2020. Memory through Design: Supporting Cultural Identity for Immigrants through a Paper-Based Home Drafting Tool. In CHI Conference on Human Factors in Computing Systems. 1–16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Dina Sabie, Reem Talhouk, Cansu Ekmekcioglu, Carleen Maitland, Volker Wulf, Eiad Yafi, Samar Sabie, Asam Almohamed, Safa’a AbuJarour, Kahina Le Louvier, 2021. Migration and Mobility in HCI: Rethinking Boundaries, Methods, and Impact. In CHI Conference on Human Factors in Computing Systems (Extended Abstracts). 1–6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Angela M Schöpke-Gonzalez and Florian Schaub. 2022. Mobile Phones at Borders: Logics of Deterrence and Survival in the Mediterranean Sea and Sonoran Desert. Information, Communication & Society(2022), 1–17.Google ScholarGoogle Scholar
  30. Kristen M Scott, Sonja Mei Wang, Milagros Miceli, Pieter Delobelle, Karolina Sztandar-Sztanderska, and Bettina Berendt. 2022. Algorithmic Tools in Public Employment Services: Towards a Jobseeker-Centric Perspective. In ACM Conference on Fairness, Accountability, and Transparency. 2138–2148.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Emrys Shoemaker, Gudrun Svava Kristinsdottir, Tanuj Ahuja, Dina Baslan, Bryan Pon, Paul Currion, Pius Gumisizira, and Nicola Dell. 2019. Identity at the Margins: Data Justice and Refugee Experiences with Digital Identity Systems in Lebanon, Jordan, and Uganda. In ACM SIGCAS Conference on Computing and Sustainable Societies. 206–217.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Lucy Simko, Ada Lerner, Samia Ibtasam, Franziska Roesner, and Tadayoshi Kohno. 2018. Computer Security and Privacy for Refugees in the United States. In IEEE Symposium on Security and Privacy (SP). IEEE, 409–423.Google ScholarGoogle Scholar
  33. Julia Slupska, Selina Cho, Marissa Begonia, Ruba Abu-Salma, Nayanatara Prakash, and Mallika Balakrishnan. 2022. “They Look at Vulnerability and Use That to Abuse You”: Participatory Threat Modelling with Migrant Domestic Workers. In USENIX Security Symposium (USENIX Security). 323–340.Google ScholarGoogle Scholar
  34. Enno Steinbrink, Lilian Reichert, Michelle Mende, and Christian Reuter. 2021. Digital Privacy Perceptions of Asylum Seekers in Germany: An Empirical Study about Smartphone Usage during the Flight. Proceedings of the ACM on Human-Computer Interaction 5, CSCW2(2021), 1–24.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Franziska Tachtler, Reem Talhouk, Toni Michel, Petr Slovák, and Geraldine Fitzpatrick. 2021. Unaccompanied Migrant Youth and Mental Health Technologies: A Social-Ecological Approach to Understanding and Designing. In CHI Conference on Human Factors in Computing Systems. 1–19.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Reem Talhouk, Konstantin Aal, Anne Weibert, Max Krüger, Volker Wulf, Karen Fisher, Franziska Tachtler, Suleman Shahid, Syed Ishtiaque Ahmed, and Ana Maria Bustamante Duarte. 2019. Refugees & HCI SiG: Situating HCI within Humanitarian Research. In CHI Conference on Human Factors in Computing Systems (Extended Abstracts). 1–4.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Reem Talhouk, Syed Ishtiaque Ahmed, Volker Wulf, Clara Crivellaro, Vasilis Vlachokyriakos, and Patrick Olivier. 2016. Refugees and HCI SIG: The Role of HCI in Responding to the Refugee Crisis. In CHI Conference on Human Factors in Computing Systems (Extended Abstracts). 1073–1076.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Reem Talhouk, Lizzie Coles-Kemp, Rikke Bjerg Jensen, Madeline Balaam, Andrew Garbett, Hala Ghattas, Vera Araujo-Soares, Balsam Ahmad, and Kyle Montague. 2020. Food Aid Technology: The Experience of a Syrian Refugee Community in Coping with Food Insecurity. Proceedings of the ACM on Human-Computer Interaction 4, CSCW2(2020), 1–25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Reem Talhouk, Kyle Montague, Hala Ghattas, Vera Araujo-Soares, Balsam Ahmad, and Madeline Balaam. 2022. Refugee Food Insecurity & Technology: Surfacing Experiences of Adaptation, Navigation, Negotiation and Sharing. Proceedings of the ACM on Human-Computer Interaction (2022), 1–32.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Reem Talhouk, Vasillis Vlachokyriakos, Anne Weibert, Konstantin Aal, Syed Ishtiaque Ahmed, Karen Fisher, and Volker Wulf. 2017. Refugees & HCI Workshop: The Role of HCI in Responding to the Refugee Crisis. In CHI Conference on Human Factors in Computing Systems (Extended Abstracts). 558–565.Google ScholarGoogle Scholar
  41. Reem Talhouk and Eiad Yafi. 2021. Middle Eastern Reflections on Forced Migration, Solidarity, and HCI Research. Interactions 28, 2 (2021), 48–51.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Linnet Taylor and Fran Meissner. 2020. A Crisis of Opportunity: Market-Making, Big Data, and the Consolidation of Migration as Risk. Antipode 52, 1 (2020), 270–290.Google ScholarGoogle ScholarCross RefCross Ref
  43. Ana Valdivia, Claudia Aradau, Tobias Blanke, and Sarah Perret. 2022. Neither Opaque nor Transparent: A Transdisciplinary Methodology to Investigate Datafication at the EU Borders. Big Data & Society 9, 2 (2022), 20539517221124586.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Diverse Migration Journeys and Security Practices: Engaging with Longitudinal Perspectives of Migration and (Digital) Security

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI EA '23: Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems
      April 2023
      3914 pages
      ISBN:9781450394222
      DOI:10.1145/3544549

      Copyright © 2023 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 19 April 2023

      Check for updates

      Qualifiers

      • extended-abstract
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate6,164of23,696submissions,26%

      Upcoming Conference

      CHI '24
      CHI Conference on Human Factors in Computing Systems
      May 11 - 16, 2024
      Honolulu , HI , USA
    • Article Metrics

      • Downloads (Last 12 months)181
      • Downloads (Last 6 weeks)12

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format