Conference PaperPDF Available

Identity at the margins: examining refugee experiences with digital identity systems in Lebanon, Jordan, and Uganda

Authors:

Abstract

This paper examines refugees' experiences with and perspectives on the digital identity systems used by humanitarian organizations to collect, manage, and share their personal data. Through a qualitative study with 198 refugees in Lebanon, Jordan, and Uganda, we show how existing humanitarian identity systems present numerous challenges for refugees. For example, we find that refugees have little to no knowledge of the institutional systems and processes through which their personal data is managed and used. In addition, refugees are typically not able to exercise agency with regard to data that is collected about them (e.g., given choices about the data collected). At the same time, we show how refugees make active efforts to negotiate the various identities available to them, consciously weighing the benefits and constraints associated with different statuses to maximize their access to services, eligibility for employment, and spatial mobility. We use Bardzell's lens of feminist interaction design [8] to make sense of these findings and suggest a path forward that engages refugees in the design of improved identity management systems.
Identity at the Margins: Examining Refugee Experiences with
Digital Identity Systems in Lebanon, Jordan, and Uganda
Emrys Shoemaker
Caribou Digital
emrys@cariboudigital.net
Gudrun Svava Kristinsdottir
Cornell Tech
gsk72@cornell.edu
Tanuj Ahuja
Cornell Tech
ta364@cornell.edu
Dina Baslan
Independent Researcher
dina.baslan@gmail.com
Bryan Pon
Caribou Digital
bryan@cariboudigital.net
Paul Currion
Caribou Digital
paulcurrion@gmail.com
Pius Gumisizira
Caribou Digital
piusgumisiriza@yahoo.com
Nicola Dell
Cornell Tech
nixdell@cornell.edu
ABSTRACT
This paper examines refugees’ experiences with and perspectives on
the digital identity systems used by humanitarian organizations to
collect, manage, and share their personal data. Through a qualitative
study with 198 refugees in Lebanon, Jordan, and Uganda, we show
how existing humanitarian identity systems present numerous
challenges for refugees. For example, we nd that refugees have
little to no knowledge of the institutional systems and processes
through which their personal data is managed and used. In addition,
refugees are typically not able to exercise agency with regard to
data that is collected about them (e.g., given choices about the
data collected). At the same time, we show how refugees make
active eorts to negotiate the various identities available to them,
consciously weighing the benets and constraints associated with
dierent statuses to maximize their access to services, eligibility for
employment, and spatial mobility. We use Bardzell’s lens of feminist
interaction design [
8
] to make sense of these ndings and suggest
a path forward that engages refugees in the design of improved
identity management systems.
KEYWORDS
HCI4D; ICTD; refugees; identity; displaced populations.
ACM Reference format:
Emrys Shoemaker, Gudrun Svava Kristinsdottir, Tanuj Ahuja, Dina Baslan,
Bryan Pon, Paul Currion, Pius Gumisizira, and Nicola Dell. 2019. Identity at
the Margins: Examining Refugee Experiences with Digital Identity Systems
in Lebanon, Jordan, and Uganda. In Proceedings of ACM SIGCAS Confer-
ence on Computing and Sustainable Societies, Accra, Ghana, July 3–5, 2019
(COMPASS ’19), 12 pages.
https://doi.org/10.1145/3314344.3332486
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for prot or commercial advantage and that copies bear this notice and the full citation
on the rst page. Copyrights for components of this work owned by others than the
author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior specic permission
and/or a fee. Request permissions from permissions@acm.org.
COMPASS ’19, July 3–5, 2019, Accra, Ghana
©
2019 Copyright held by the owner/author(s). Publication rights licensed to Associa-
tion for Computing Machinery.
ACM ISBN 978-1-4503-6714-1/19/07.. .$15.00
https://doi.org/10.1145/3314344.3332486
1 INTRODUCTION
Humanitarian organizations that provide services to refugees across
the world are embracing increasingly sophisticated digital systems
for managing the identities and personal data of the beneciaries
they serve. These digital identity management systems have the po-
tential to provide organizations with simplied reporting, reduction
in fraud, improved service delivery, and increased convenience for
both organizations and refugees. However, identity and personal in-
formation are intrinsically powerful and sensitive topics and, given
the vulnerable nature of the refugees being served, the complexities
and risks associated with these large-scale systems are amplied.
Navigating these complexities requires us to understand the expe-
riences of the individuals that are subjected to these systems, and
balance the operational benets with an empathetic assessment of
how these systems impact individuals’ privacy, dignity, and agency.
This paper contributes a qualitative study examining refugees’
experiences with, and perspectives on, the digital identity systems
that humanitarian organizations use to collect, manage, and share
their personal data. We conducted semi-structured interviews and
focus groups with 198 refugees, in and out of camps, in Lebanon,
Jordan, and Uganda in 2018. We describe the various digital identity
systems that refugees encounter as they work to establish identities
that grant them legal refugee status and entitlement to services
(e.g., food, shelter, health services). We also uncover numerous
challenges that result as individuals struggle to navigate the systems
that organizations use to collect their personal information and
biometric data (e.g., ngerprints and iris scan).
For example, we show how individuals have little to no knowl-
edge or visibility into the institutional processes through which
their personal data is managed and shared, including which organi-
zations have access to their data. This lack of transparency often
results in confusion, disappointment, and anxiety about the safety
and privacy of their information. Despite these concerns, refugees
are desperate for assistance and often have no choice but to provide
organizations with all of the information that they request.
In addition, refugees are rarely oered the opportunity to exer-
cise agency with regards to data that is collected on them (e.g., given
choices about what data is collected or how it is shared). Never-
theless, many refugees make active eorts to negotiate the various
COMPASS ’19, July 3–5, 2019, Accra, Ghana E. Schoemaker et al.
identities available to them, consciously weighing the benets and
constraints associated with dierent statuses (such as registered vs.
unregistered) in eorts to maximize their access to services.
Moreover, despite acknowledging that they do not know the
criteria that organizations use to assess their vulnerability and eli-
gibility for assistance, we nd that many refugees actively work to
redene their family structure in ways they perceive will maximize
the services they receive, such as selectively registering only the
woman and children. However, such actions can impact household
power dynamics, since women registered as heads of households
are given control over the family’s resources (e.g., food and shelter)
in communities where traditionally men are the decision-makers.
We use Bardzell’s lens of feminist HCI [
8
] to further analyze and
make sense of our ndings. For example, we discuss how current
identity management systems target a “universal” refugee and fail
to account for dierent points of view or partial perspectives that
may exist in dierent contexts. As a result, individual refugees
are unable to negotiate exibility in the nature of their identity or
their eligibility for services. This further results in refugees striving
to (re)dene themselves in ways that better t existing identity
systems, especially if it may result in additional benets.
We discuss how challenges with existing identity management
systems impact the broader ecologies in which they are deployed,
such as how diculties obtaining and renewing identities restrict
refugees’ mobility or access to basic services essential for survival.
We also highlight important information and power asymmetries
between refugees and the organizations tasked with advocating for
them, with organizations possessing a signicant amount of power
over refugees, who are desperate and have no choice but to comply
with any demands made of them by organizations. In light of these
insights, we suggest a starting point for engaging refugees in the
design of improved identity management systems, which may lead
to benets for both humanitarian organizations and refugees.
2 RELATED WORK
The concept of identity and its importance in the social, cultural,
and historical lives of humans has been discussed at length in psy-
chology and the social sciences (e.g., [
29
,
31
,
34
,
53
,
54
]), and has
been shown to have direct relationships to social, cultural, and his-
torial contexts [
9
]. Theoretically, ‘identity’ refers to social category,
dened by membership rules and socially distinguishable features
that a person takes a special pride in, or views as unchangeable
but socially consequential [
20
]. The theoretical concept of iden-
tity has also been critiqued for being ‘asked to do too much’ [
12
]
and as a result may have limited analytic utility. Brubaker and
Cooper [
12
] argue for more specicity and application of the con-
cept, while Whitley et al. [
54
] argue for greater attention to the
interplay between the distinct phenomena of information systems,
identication, and identity. In our work, we focus on the identi-
cation of individuals as refugees by humanitarian organizations
and institutions, whilst being sensitive to the broader concept of
identity as a theoretical social category.
Given the strong inuence identity has in dening social and
cultural milieus, it becomes especially crucial to study identity in
the context of refugees and displaced populations. Although there
have been abstract mentions in the literature of the linkage between
identity and refugees [
37
,
38
], there is little literature available that
discusses the changing nature of refugee identities in the digital age.
With the global proliferation of digital technologies, digital identity
is now fundamental in dening a refugee’s status, especially in
camps. Although prior research has explored digital identity in
general (e.g., [
3
,
30
,
33
]), very few empirical studies specically
focus on digital identities in the context of refugees.
Our research also contributes to a growing body of work examin-
ing the role of the computing community in responding to refugee
crises [
2
,
41
,
43
,
52
]. For example, shelter dynamics is an important
topic that is closely related to our work on identity and registration
systems, since shelters are often assigned using information pro-
vided to these systems. Sabie et al. [
35
] used ethnographic methods
in Syrian and Iraqi camps to explore cultural and social dynamics
around shelter. Building on this, Nabil et al. [
32
] did eldwork in
Jordan that shows how decorating shelters provides an escape from
the camp and compensates for loss of identity, home, and leisure.
Connection and community-building within refugee communi-
ties has also received recent attention in the literature. For example,
Almohamed and Vyas [
4
] use ethnographic research to identify
themes around social isolation, cultural backdrops, and the role of
technology in the lives of refugees and asylum seekers. Aal et al.
expose challenges with physical and social infrastructure through
analyzing a refugee camp computer club [
1
], while Schmitt et al.
examined community-level physical access divides in camps [
36
].
Xu et al. conducted a study to promote participatory community
building via mapping technologies [
58
], and further discussed data-
driven community development in follow-up work [57].
Other research highlights vulnerabilities associated with reset-
tlement [
5
] and the role of digital technologies in helping refugees
to integrate into new environments and attain independence [
7
,
26
].
In addition, work has examined the security threats and vulnera-
bilities associated with refugees in the digital tech space [
13
,
16
], a
topic that our work touches on as well. A variety of strategies have
also been used to help refugees rebuild social capital and a sense of
community in displaced environments [
6
], including community
radio [27], co-located social media platforms to help refugees nd
their voices [
55
], human-in-the-loop messaging to reduce language
barriers [
11
], leveraging social ties to bridge the social and economic
divide by forming computer clubs in Palestinian camps [
61
], and
utilizing the importance of food in camps to develop social capital
[
21
]. This research is orthogonal to our work, which focuses more
on how refugees interact with organizations and the digital systems
that organizations use to make refugees legible to the organization.
Another set of papers have worked to understand refugees’ ac-
cess to or usage of health services in camps. Talhouk et al. [
42
] used
focus groups to identify contextual and cultural factors that can
inform the design of digital technologies to support refugee ante-
natal care. Carrying this forward, they then explored the concept
of refugee-led community radio shows to deliver health informa-
tion and discussed community dynamics in utilizing technology
for health [
40
]. Focusing more directly on technology access and
use, research has explored refugees’ use of the Internet and mobile
communication devices, both in adult populations [
56
] and with
youth [
60
]. Ya et al. studied how Syrian youth at the Za’atari Camp
in Jordan use information and mobile technologies in their daily
Identity at the Margins COMPASS ’19, July 3–5, 2019, Accra, Ghana
lives [
59
]. Fisher et al. conducted participatory design workshops
at a Syrian refugee camp in Jordan to learn how youth help others
to use technology [
22
]. Boulus-Rødje et al. worked with children
in Palestinian refugee camps and explored issues around digital
fabrication in developmental and educational settings [39].
Our research contributes to this literature with the rst study
of refugees experiences with, and perspectives on, the digital sys-
tems that humanitarian service providers use to render people
legible to their organizations. We highlight numerous challenges
that refugees navigate as they struggle to maximize the services
that they are entitled to, discussing how information and power
asymmetries negatively impact refugees’ ability to exercise agency
and control over their personal information and identities.
3 RESEARCH METHODS
Research Sites:
We conducted our IRB-approved study with 198
refugees in Lebanon, Jordan and Uganda, in and out of camps, in
2018. We chose Lebanon and Jordan because they have absorbed
one of the refugee movements as people have ed Syria, yet oer
dierences in terms of identity systems in use. As of December 2017,
Lebanon had 1,018,057 registered refugees and asylum-seekers,
predominantly in the Bekaa Valley but also in urban and peri-urban
areas around Beirut [
47
]. We spoke with refugees in the Bekaa
Valley and in central and peri-urban Beirut. Lebanon is distinct
because most refugees are in informal tented settlements, and the
registration and data management systems have reected this.
In 2018 Jordan had the second highest share of refugees compared
to its population in the world, 89 refugees per 1,000 inhabitants [
46
].
Although the majority of Syrian refugees in Jordan live in urban
areas, 126,490 refugees live in camps, with Zaatari and Azraq, the
two largest, hosting 78,554 and 41,089 respectively [
50
]. We spoke
with refugees in both these camps and in the capital, Amman, in
February 2018. Jordan is distinct for its highly developed camps
and the use of advanced biometric technologies.
As of 28 February 2018 there were 1,444,873 refugees and asy-
lum seekers in Uganda, with 21% in Yumbe, the location of Bidi
Bidi camp [
51
]. We spoke with refugees in Bidi Bidi in March 2018.
Uganda is distinct because the government, through its Oce of
the Prime Minister (OPM) [
44
], has taken the lead in registering
and managing refugee data. It also has one of the most progressive
policies towards refugees, granting them legal recognition and giv-
ing each refugee household ownership of a small parcel of land.
Recruitment:
Participants were recruited through a combination
of invitation by partner organizations, personal networks, and
snowball sampling [
23
]. Save the Children, an international NGO,
provided logistical and initial recruitment support, inviting ben-
eciaries to participate. We also drew on our research assistants’
personal networks to access community-based organizations active
in supporting refugees. At all sites we used snowball sampling, [
23
]
asking participants to introduce us to people they knew.
Qualitative Methods:
We used a combination of semi-structured
interviews and focus groups to engage with participants (see Table
1). Our question guides were structured around topics identied
in the literature, stakeholder interviews, and pilot research. We
All Lebanon Jordan Uganda
Total participants 198 65 58 75
Men 86 27 16 43
Women 112 38 42 32
Interviews 39 9 4 26
Focus groups 23 9 8 6
Table 1: Summary of participants and research methods
sought an understanding of: refugees’ experiences using identity
credentials before displacement; their rst experience of registra-
tion and using new identity credentials; using refugee credentials
to obtain services; everyday experiences of proving who you are;
and managing dierent identity credentials. We also probed partici-
pants’ understanding of how organizations manage their data, and
the barriers and workarounds used to maximize access to services.
Interviews and focus groups took place in a mix of locations,
including NGO oces in camps, homes, food distribution points,
and shops. We began by explaining the purpose of our research
and obtaining the participant’s consent. Sessions lasted approxi-
mately one hour and were conducted in the participant’s choice of
English or Arabic. The majority of participants in Lebanon and Jor-
dan (approx. 80%) chose Arabic, while participants in Uganda were
more evenly split between both English and Arabic. Sessions were
audio recorded with permission from participants. In a few cases,
participants declined to be audio recorded and so instead we took
detailed handwritten notes. Participants were not compensated.
Participants:
Table 1 provides some demographic information
about our participants at each research site. In total, we spoke with
198 refugees: 86 men and 112 women. Almost all of our participants
had access to a mobile phone, either owning their own device or
sharing a device with family members and/or friends. The most
common applications that participants reported using were Face-
book and WhatsApp, which participants ubiquitously described
using to keep in contact with family members or friends, both in
the host country and in other countries (e.g., back in their home
countries). In addition, mobile money applications were commonly
mentioned as being useful for sending and receiving money.
Data Analysis:
Audio recordings were professionally translated
into English (if necessary) and transcribed. We then analyzed the
transcripts and our copious eld notes thematically [
10
], beginning
with a comprehensive reading of the transcripts during which we
identied initial codes. We performed multiple passes over the data
to iteratively rene codes and ensure they accurately represented
the data. Coding was performed by two research assistants with
input, supervision, and discussion with the broader group after each
iteration. Our nal set of 57 codes were formalized in a codebook
that was used to perform a detailed analysis of all transcripts. Exam-
ples of codes include biometric data,UN card renewal, and political
persecution. We clustered related codes into high-level themes that
represent our prominent ndings. Examples of themes include pri-
vacy concerns,challenges with registration, and lack of transparency.
COMPASS ’19, July 3–5, 2019, Accra, Ghana E. Schoemaker et al.
We emphasize that the nature of our data is qualitative, not quan-
titative, so we do not report on raw numbers of participants who
made certain statements in our data and analysis.
4 ESTABLISHING DIFFERENT IDENTITIES
When individuals ee their own country and enter that of a host
government, they also enter a network of organizations and sys-
tems that are part of the humanitarian response. The organizations
and systems that make up the humanitarian response labels and
classies people in order to make them legible to the systems em-
ployed by organizations to manage the provision of services. The
labels and classications are used to organize and ration the provi-
sion of scarce resources, according to diverse and complex criteria.
Some categories, such as specic nationalities, genders or ages are
categorized as priorities for the provision of services, and dierent
organizations have dierent priorities. For example, UNHCR, the
UN’s Refugee Agency, serves all refugees and has a legal mandate to
recognize refugee status. By contrast, UNICEF, the United Nations
Children’s Fund, prioritizes young people, while the priorities of
many non-governmental organizations (NGOs) are set by donors.
As organizations interact with individual refugees, they create
records and issue credentials in order to identify and authenticate
that people are who they say they are. Through the journey of
interacting with these diverse organizations and services, individ-
ual refugees collect many dierent identity credentials, from the
UNHCR registration document that identies them as a recognized
refugee to temporary project-related credentials issued by NGOs.
Refugees frequently end up being identied by multiple organiza-
tions, possessing and managing multiple identity credentials, with
dierent identities holding dierent functions and levels of impor-
tance in the refugees’ lives. Common to many of these systems
that record an individual’s data is that they are increasingly digital,
with biometric and biographical data recorded in computerized
systems. We describe refugees’ dierent identity credentials and
the processes for obtaining them before discussing the challenges
refugees face managing these credentials.
4.1 Registration with UNHCR
Our ndings show that the most important identity credential for
most refugees is a UNHCR identity document, which typically
consists of a physical ID card or piece of paper with a barcode. This
credential is obtained through ocial registration with UNHCR
and provides legal recognition of refugee status. It is a material
symbol of the refugee’s legal status and entitlement to benets,
and is critically important for establishing identity and accessing
services from multiple organizations. For example, the World Food
Program and other NGOs that provide services on behalf of UNHCR,
distribute assistance to refugees based on their registration status
with UNHCR. As such, a person’s ability to obtain food, shelter,
health, and other essential services is strongly tied to their UNHCR
registration card. As one participant said,
“The [UNHCR] card is the very important one. At the
distribution centers it’s what they use to give you a
ration card. Secondly, when you go to the hospital, and
thirdly it shows that you are a refugee.” (Focus group,
Uganda, Woman)
As this quote suggests, the UNHCR registration card is also im-
portant because it conrms the refugee’s right to be in the host coun-
try, which is particularly important in countries, such as Lebanon
and Jordan, that limit refugees mobility, access to employment, or
state services. Many participants said that their UN registration
document was very important to carry with them and how it was
often inspected by security forces who stop refugees and demand
they prove their status and identity. One participant said,
“In Syria we never had to carry any documents with us.
Right now, in Lebanon, the situation is very dierent.
Having to carry IDs at all times causes stress because
if the military catches us without IDs, we could be in
trouble.” (P8, Lebanon, Woman).
Interestingly, our analysis revealed that this legal status can
impact men and women dierently, with women often possess-
ing greater mobility than men because security forces stop and
interrogate men more than women. One participant explained,
“When the military come to the house, they don’t talk
to women, only men.” (Focus group, Lebanon, Man)
We learned from our participants that registration with UNHCR
takes place in dedicated centers equipped with private interview
spaces and biometric scanning equipment. Each refugee participates
in an in-person interview that can take up to a few hours. If the
refugee has a family, the whole family is registered as a single
unit, with one adult designated as head of the household. During
registration, participants said that they were asked many personal
questions about life in their home country, reasons for becoming a
refugee, experiences getting to the camp, etc. A participant said,
“[The UNHCR] asks about the experience you had, how
you were in Syria, what you used to do, and what is the
reason that made you leave to here for refuge, and these
things. We gave them a summary, how we arrived, and
how we arrived to them.” (Focus group, Jordan, Man)
Many of these questions aim to enable the UNHCR and other
aid organizations to perform vulnerability assessments, in which
refugees who are deemed to be more vulnerable or high-risk may
receive additional assistance. These vulnerability assessments are
based on complex criteria that are largely opaque to refugees, who
are often nervous about the interview because they fear making
mistakes and failing to get access to much needed services, a chal-
lenge we discuss in detail in Section 5.3. The data collected about the
family is usually stored in proGres [
49
], the identity management
software used by the UNHCR.
In addition to collecting the refugee’s biographical information,
the UN representative also records their biometric data, including
ngerprints, iris scans, and facial images, which are typically stored
in the UNHCR’s Biometric Identity Management System (BIMS)
[
45
], which integrates with proGres. In Jordan, biometric data was
collected by Irisguard, a private biometrics company that provides
their technology to the humanitarian sector.
When we asked participants for their opinions regarding bio-
metric data collection, we discovered that most refugees view the
process positively since it allows organizations to control the dis-
tribution of services and curb fraud. A participant in Jordan said,
Identity at the Margins COMPASS ’19, July 3–5, 2019, Accra, Ghana
“My personal take on the procedure is very positive,
because there are thousands and thousands of refugees
here, so you need a solid identication system to identify
them all accurately. So in terms of documenting the
identities in the computer system, the eye scan is the
most reliable .. . simply because it is the one thing that
you cannot forge. Any documents can be forged, the eye
scan no.” (P34, Jordan, Woman)
Although we found that participants generally viewed the link-
ing of services like food distribution to people’s biometric data as
a positive step, biometric verication was not able to solve all of
the fraud or corruption issues that our participants described. For
example, our data revealed how refugees believe some people who
are responsible for distributing food to communities steal a portion
of the food for themselves. One participant said,
“The ones who ooad [the food trucks]. They are just
taking [it] and we are left with little food . . . now that’s
a big problem .. . they take two kilos from each person’s
12 kilograms [of food].” (P100, Uganda, Woman)
Finally, although the vast majority of our participants viewed
biometric data collection as a positive step, a small number did
express concerns about the biometric systems. These concerns
most often stemmed from rumours and perceptions rather than
issues like data sensitivity. For example, one participant said,
“I heard stories that the eye scanner might steal my
eyes, is that true? Many people are afraid of it.” (P170,
Uganda, Woman)
4.2 Registration with other organizations
In addition to UNHCR, people also register with a wide range of
other organizations in an eort to access desperately needed ser-
vices. These services are often refugees only source of support,
particularly in countries refugees have limited access to labor mar-
kets or state welfare services. One participant said,
“Only people who are here illegally don’t approach
any NGOs for services, they live a very rough life in
makeshift shelters, cold weather, no food or supplies.
(Focus group, Lebanon, Man)
Some participants described how they registered with any orga-
nization that they came across, sometimes losing track of all the
organizations that they registered with. One participant explained,
“For me, I registered in so many organizations that I
do not even remember any of their names. Whenever
we found or heard of an organization we went and
registered every time.” (P184, Lebanon, Woman)
Although registering with multiple organizations required peo-
ple to provide the same information over and over again, they said
they did not mind the repetition if it led to assistance. One said,
“We don’t get tired [when they ask the same questions
over and over] because all we want is to get help. If help
can come, no problem.” (Focus group, Uganda, Woman)
However, our analysis showed that registering with so many
organizations led to confusion and frustration among the refugees.
In many cases, refugees were unable to associate specic services
received with the organization responsible. They also frequently
confused dierent organizations and did not understand how the
organizations made decisions about who to help. A participant said,
“I registered with a Danish organization and received
nothing, not even bed blankets. I registered and went
through a whole process and when I thought I was -
nally getting something, they informed me that I did
not make the grantee list.” (P59, Lebanon, Woman)
As this quote suggests, refugees often lack knowledge or aware-
ness of the assessment criteria used by organizations to apportion
scarce resources, leading to disappointment and frustration when
organizations who recorded their information failed to deliver any
benets. Nevertheless, many participants still registered with any
organization that might oer assistance. One participant said,
“At the beginning other NGOs showed up and registered
refugees with the promise of assistance. Most of them
didn’t deliver on promises. Refugees lost trust in them
and they have suspicions of corruption in the humani-
tarian system, where they think NGOs take [refugee]
names for their numbers and funding but don’t deliver
to refugees. However, they still register with anyone who
oers help, like a drowning person hanging to a straw
in the ocean.” (Focus group, Lebanon, Man)
5 CHALLENGES MANAGING IDENTITIES
Having described the dierent types of identities that refugees cre-
ate as they try to obtain assistance from humanitarian organizations,
we now discuss additional challenges that our analysis surfaced as
refugees work to establish and manage these credentials.
5.1 Registration is time-consuming & laborious
A big issue for participants was that the process of registering with
organizations was time-consuming and laborious. Many partici-
pants described that it could take months or even years to register
with the UNHCR, with delays arising due to a variety of reasons. For
example, in Lebanon and Jordan, obtaining refugee status was com-
plicated by the host government’s restrictions around the formal
registration of new refugees, and the waiting time before refugees
could register ranged from months to years. This can result, as it
does in Lebanon, in what UNHCR terms ‘de-facto’ refugees—people
who are not legally recognized as refugees but who UNHCR serves
as though they were, providing the same services and support.
To overcome the long waiting times before registering, some
participants described how they used connections at the UN to
manipulate the waiting times for appointments. One told us,
“I would go to the UN, I made an appointment. Of course
they gave me one in nine months, and honestly, I pulled
some strings and I made the appointment earlier. I know
someone who works [at the UN], and he made it sooner
. . . It was in September, he rescheduled it to April. Five
months early.” (P182, Lebanon, Man)
In Uganda, participants described the diculties of waiting out-
side in long lines for days trying to register. A participant said,
“We would stay from morning to sunset waiting to be
registered, even the children suered from the sun. There
was no water to drink. People were suering ... some
COMPASS ’19, July 3–5, 2019, Accra, Ghana E. Schoemaker et al.
people were insulting us. They said that we Sudanese
were dirty.” (P45, Uganda, Woman)
As this quote suggests, many refugees reported that they were
often shouted at or humiliated by people who lived in the host
country. However, in these situations, they felt that they had no
choice but to endure the humiliation since they badly needed the
assistance that was being provided. One participant said,
“You just obey because you are from a foreign land.
You humble yourself because you need the food.” (P69,
Uganda, Male)
Even after refugees reached the front of the line and began the
registration process, obtaining an identity card often took multiple
days, in part because of the overwhelming number of people who
needed to be registered. A participant described,
“The process was very laborious and long. You could
not just walk into the interview room. The numbers of
people were overwhelming. It took a minimum of three
days. They interview you today, take your photo the
next day .. . And on the third day, you go and pick up
your card.” (P58, Uganda, Woman)
5.2 Renewing or changing data is dicult
Our participants also faced challenges changing or renewing their
information. In Lebanon and Jordan, the UNHCR requires all refugees
to renew their registration periodically, but many participants said
that it was dicult or impossible to do so. One participant said,
“For us, it is the renewal issue that is a nightmare ... and
it is stressing us all. We need to renew the UN papers
[every] one or two years, and in many cases we are not
able to do that.” P164, Lebanon, Woman
Once again, participants described how they were only able to
obtain an appointment with the UNHCR to renew their registration
months or years in the future. Being unable to renew registration
documents caused signicant problems for our participants, espe-
cially men, who may be stopped by security forces and found to
have expired papers. One participant described being taken away
and interrogated by police for several days. He told us,
“[The policeman] looked at me and said your card has
expired. I said I knew it was, but I was working on
renewing it. They told me to get in the car. I got in with
them and they took me for three days to the intelligence
agency.” (Focus group participant, Lebanon, Man)
Our participants also discussed how UN and other organization
workers were in a position of power over refugees, which made the
refugees afraid to follow-up too frequently on the status of their
case since, if they annoyed the UN workers, they could use their
power to discriminate against or make the refugees’ lives more
dicult. One participant told us,
“Maybe if I bother [the UN ocer] with many visits
and annoy him, he can just strike out my name.” (P124,
Jordan, Man)
In addition to diculties renewing UNHCR identity documents,
our participants described how changes in personal status, such as
getting married, created challenges because updating their regis-
tration is dicult and takes a long time. One said,
“Transferring something from one le to the next is a
hassle. Like marriage. I am in my parents le. I want to
marry a girl who is in her parents le. For us to have
our own le, it is very hard. Tomorrow . ..try calling the
UN. Ask them to give you an appointment and say you
want to review or edit my le ... they will say it would
take a year.” (P82, Lebanon, Man)
Similarly, trying to record the birth of a new child requires
refugees to navigate many dierent bureaucratic systems to register
the birth before being able to try and add the child’s information
to their UNHCR le. As one participant described,
“Newborns have to be added to the [family’s] UNHCR
le. A birth certicate is issued from hospital. This paper
is certied from mukhtar [town chief] who gives them
the new ocial birth certicate. Then they go to the mu-
nicipality to get it certied and registered in the system.
Then they take that to UNHCR to add children to their
le. It’s very dicult to communicate with UNHCR.
(Focus group participant, Lebanon, Man)
5.3 Identity systems lack transparency
Another major challenge that our analysis surfaced is how, from
the refugees’ perspectives, existing identity systems suer from a
severe lack of transparency, including when their data is collected,
updated, used, and shared. Many participants explained that, when
asking detailed and intrusive personal questions during registration
processes, representatives from various organizations (including
the UNHCR) often did not explain why they needed all this informa-
tion or how it would be used, despite humanitarian organizations
commitment to ‘informed consent’ [
25
]. One reason for this lack
of explanation was due to workers at registration centers being
overwhelmed by the number of refugees. As one participant said,
“They did not explain [why they need this information].
They were also asking under pressure because the pop-
ulation was too big. That did not give us time to ask.
(P46, Uganda, Man)
Despite not understanding why their personal data was being
collected, how it would be used, or how it would result in services
that help them, our participants explained that they really did not
have any choice but to provide the information that organizations
requested from them. One participant described,
“You as a refugee, any information .. .that is going to
take place, you cannot say that you don’t want to. You
just humble yourself and do it. If you don’t want to, that
means that you are bringing suering upon yourself.
(P31, Uganda, Man)
In addition to being required to provide all information requested
from them without understanding how it would be used, our par-
ticipants discussed how the ow of information occurs in only one
direction: they provide information to organizations but are unable
to get information back from organizations. Many participants said
their attempts to contact organizations after registering with them
were unsuccessful. For example, a participant in Lebanon who was
having diculty registering her daughter in school due to lack
of documentation said she was told to call the UNHCR “hotline”,
Identity at the Margins COMPASS ’19, July 3–5, 2019, Accra, Ghana
but this line was never answered. Other participants faced similar
challenges trying to renew their UNHCR registration. One said,
“I went to renew [my registration] and they gave me a
number to call. I called the number, and they said your
card is not eligible.” (P47, Lebanon, Man)
In the absence of ocial explanations for why organizations need
certain pieces of information, refugees often came up with their own
explanations. For example, although a refugee’s biometric data is
primarily collected to verify their identity when receiving services,
one participant perceived this data would be used to determine her
ethnicity and therefore her eligibility for refugee status. She said,
“They did [the biometric scans] because they wanted to
conrm if I was a Ugandan or Sudanese. I was scared
about the whole process.” (P121, Uganda, Woman)
Participants were also acutely aware that the information they
provided was somehow linked to vulnerability assessments that
organizations perform to determine who is eligible for assistance.
The lack of transparency into how these vulnerability assessments
are calculated meant that our participants usually did not under-
stand an organization’s criteria for distributing aid and, in many
cases, believed that the process was unfair. One participant said,
“We see [other] families with same aged children. Some
of them even have cars and still they receive food aid.
My brother has four young children, he receives nothing
from the UN.” (P185, Lebanon, Woman)
Several participants also perceived that only those who had
“wasta” or connections seemed to receive certain benets or favors.
For example, one participant described how it was impossible to
nd employment unless you knew the right people, telling us,
“In short, it is only the people that have wasta . . . they
get work and that is that.” (P120, Jordan, Man)
Without ocial explanations of how vulnerability assessments
are calculated, refugees formed their own perceptions of factors
inuencing their eligibility for assistance and then took steps to
try and maximize their chances of receiving services. For example,
many participants perceived that if a man registered as part of the
household, the family would be denied aid. One participant said,
“During this time, the UN has been denying a lot of
people the assistance they are providing. There are some
people who see it that if there is a man, that they won’t
get assistance.” (P182, Lebanon, Man)
As a result of this perception, we heard numerous stories of how
men would choose to not register with UNHCR. Instead, the woman
and children would register, with the woman listed as the head of
the household. As one NGO employee said,
“We met a lot of men whose wife and children are regis-
tered, and [he] did not register . . . the men with family,
they don’t want to register, but they register their fam-
ily.” (NGO employee, Lebanon, Woman)
Registering the woman as the head of the household gave her
control over the assistance that the family received, such as food,
shelter, and, in Uganda, ownership of the plot of land granted to
each refugee household. However, this new dynamic of female-
headed households also led to a range of unforeseen consequences,
particularly since all our participants are from relatively patriarchal
societies in which men are typically the decision-makers and con-
trol the family life. For example, one participant in Uganda, who
also worked with an NGO that provided support to families and
survivors of domestic violence, described how the women being
the head of household issue is a big cause of domestic violence.
Men want their position and control back, and may abuse women
to get it. Further, we observed additional gender dynamics that
arose when organizations, including UNHCR, assigned community
leadership roles to legally-registered women. One man said,
“The UN . . . assigned a woman as the head of this neigh-
borhood. So how are we expected to talk and deal with
her . . . it bothers me. It’s hard for me accept issues re-
lated to my life decided by not only a woman, but also
a strange woman to me.” (P124, Jordan, Man)
5.4 Data privacy and information sharing
We turn now to our participants feelings towards the privacy of
their personal data and how it might be shared across organizations.
Personal data privacy is particularly important for refugees, who
have often ed persecution and fear being targeted if identied. In
addition, the increasingly digital nature of identication systems
means it is easier for organizations to share data than ever before.
As discussed in Section 4.2, many participants gave their per-
sonal information to any organization that might provide assistance.
However, our analysis shows that the data sharing practices of or-
ganizations is opaque and most participants had no idea if or how
organizations might share their personal information with other
organizations. As one participant in Jordan put it, “we never asked
and we really do not know..
When asked how much they cared if organizations shared their
data with others, we received a range of answers. Some participants
viewed data sharing among organizations as a positive and said
that they did not mind if UNHCR shared their information since it
might lead to additional opportunities for employment or assistance.
Other participants said that they did not care about organizations
sharing men’s data, but did not think it was appropriate to share
women’s personal information. As one participant said,
“I would kill them if they share the women’s photos and
information. This demeans the women more than the
men.” (P124, Jordan, Man)
Some participants were so concerned about the potential con-
sequences of data sharing that they avoided registering altogether.
For example, a Syrian refugee living with his family in a one-room
apartment in Lebanon told us,
“Everybody was registering with the UN, but we did
not. We were suspicious and scared. We don’t know if
the UN shares information with anyone, so that is why
I did not share many things with them.” (Focus group
participant, Lebanon, Man)
Many participants felt that some of the information they pro-
vided was safe for organizations to share (e.g., their names or family
size) but were concerned that sharing other kinds of information
that they had been required to provide might lead to future political
persecution or immigration problems. One participant told us,
COMPASS ’19, July 3–5, 2019, Accra, Ghana E. Schoemaker et al.
“The most important question [UNHCR] asked is: what
area in Syria are you from, what is your political ideol-
ogy, have you been a part of protests? .. .the problem is
when they share the questions with the embassies for
resettlement, they go back to the initial le. For example,
if someone has participated in organizing protests or
revolts, this aects his [immigration] case with some
countries.” (P82, Lebanon, Man)
Our participants’ fear of political persecution extended beyond
their concerns regarding information sharing among organizations
and impacted their own sharing practices on social media. But, in
contrast to the lack of knowledge or ability to manage and control
the personal data held by humanitarian organizations, participants
described how they actively manage personal privacy on social
media. Some discussed how they avoided revealing political infor-
mation, for example, by refraining from engaging in conversations
online that touched on the topic of politics. A participant said,
“Mostly when I am chatting [on Facebook], I ask [my
friends] what is happening in their life, when can we
meet again, future plans . . . For me the topic I don’t talk
about is politics. Because it is what caused us problems
that made us refugees. I have fear of it. Sometimes I feel
like if I engage in such talk, someone may just come
and attack me.” (P71, Uganda, Man)
Other participants described how they, and other refugees they
knew, went even further by using fake names on any email accounts
or social media proles in an eort to hide their identities from the
authorities. One participant told us,
“My email is a pseudonym. My prole is a pseudonym.
There is no real name ...Because they will apprehend
me, catch or arrest me immediately for anything. Most
people [use fake names].” (P147, Lebanon, Man)
Yet another participant believed that it did not matter if people
hid their names or not, the government would be able to know
about anything that the participant posted online, telling us,
“With Facebook there is no privacy. When you have
your photos, whether you are hiding or not for security
reasons, already they know.” (P71, Uganda, Man)
In addition to concerns about online surveillance and tracking
of social media activity by authorities, participants worried about
physical inspection of their devices by security forces and described
how they tried to manage these risks. One participant in Lebanon
explained how he had been stopped, interrogated, and beaten at
security checkpoints. During these interrogations, he was glad he
had left the smartphone he used behind, a conscious decision to
prevent the police going through his phone, either identifying his
contacts or using the content to further detain or harass him.
6 DISCUSSION
Our analysis shows how the current state of humanitarian iden-
tity systems presents many challenges for refugees. We now use
Bardzell’s feminist HCI framework [
8
] of six design qualities (plu-
ralism, ecology, embodiment, self-disclosure, advocacy, and partic-
ipation) to make sense of these challenges and suggest a starting
point for the design of improved identity management systems.
6.1 Pluralism
The quality of pluralism refers to “design artifacts that resist any
single, totalizing, or universal point of view” [
8
]. Our analysis sug-
gests that the digital systems used by humanitarian organizations
to manage beneciary data have been designed for a typical (i.e.,
“universal”) refugee rather than to support diverse or partial per-
spectives of dierent refugees in dierent contexts [
24
]. Indeed,
although our research took place with diverse communities in mul-
tiple countries, many of the digital systems in use were the same
UNHCR systems despite contextual and cultural dierences.
UNHCR’s ProGres is designed to be a universal registration
system, intended for use in the diverse contexts in which the or-
ganisation operates. There is evidence that the same universal,
totalising design leads to common experiences and outcomes for
refugees beyond the three countries our research focused on [
28
].
Latonero et al.’s 2019 study of refugee experiences in Italy, includ-
ing interactions with UNHCR’s ProGres, found "The systems that
use identity data to classify individuals along political and economic
lines can have lasting eects on their rights and freedoms." They also
found common experiences in relation to informed consent and
agency, noting that "Migrants exchange identity data for resources
without meaningful consent" [
28
]. More broadly, there are eorts
to standardize the digital management of refugee support, with
organizations such as the UN’s World Food Programme seeking to
integrate all its support through their beneciary management plat-
form SCOPE [
14
], and aid providers such as the UK’s Department
for International Development funding research into universal stan-
dards for refugee registration [
17
]. The commonality of Latonero et
al.’s ndings and the trend towards system standardization points
towards possible generalizability of our broader ndings, although
further research is needed to conrm this conclusion.
However, although this universal approach to rendering refugees
legible to organizations has many benets for the organizations
(such as simplied reporting, training, and system maintenance),
we see that it leads to challenges for individual refugees who are
constrained within the institutional bounds of these systems. For
example, many refugees have no choice as to what identities or reg-
istration cards they are eligible for, or the categories and labels that
organizations assign to them. Further, whilst these categories, such
as refugee status or specic vulnerability criteria that determine
access to specic services, are based on assessments of refugee
needs, individual refugees are unable to negotiate exibility in the
nature of the identity or in their identication and eligibility.
In contrast to the systems used to register and manage service
delivery, we show how the social media platforms that refugees
use to share information do a better job of supporting pluralism
and dierent points of view. Although social media platforms such
as Facebook and Twitter have well-described limitations and con-
straints around privacy and exibility over data sharing and identity
construction (e.g., [
18
,
19
]), they oer far greater means of individ-
ual end-user agency and control over personal data. Many refugees
exercised individual control in the use of these systems, for example
using fake names, being careful about revealing information online
(not least political aliation or views), or using dierent phones in
specic contexts (i.e., not taking their phone from Lebanon to Syria).
This shows that individual refugees have the capacity and desire to
Identity at the Margins COMPASS ’19, July 3–5, 2019, Accra, Ghana
exercise control and manage digital platforms, which would apply
to institutional systems as much as it does to social media platforms.
In other words, when individuals are able to express dierent points
of view and exercise control over personal data, they do.
6.2 Ecology
The quality of ecology integrates an awareness of design artifacts’
eects in their broadest contexts of use, as well as an awareness
of how design artifacts aect all stakeholders [
8
]. It invites us to
attend to the ways that design artifacts reexively design us. This
quality manifests in our data in several ways.
For example, UNHCR’s registration system includes the designa-
tion of a “head of household”, the person that is issued food rations
and, in the case of Uganda, granted ownership of the government-
issued plot of land. This designation is part of UNHCR’s registration
system, which works the same in Lebanon, Jordan, and Uganda as it
would anywhere else. The head of household is typically the eldest
family member. The universalism of this sociotechnical system has
diverse eects. It structures the family relationship so that it is
legible to a system that then confers rights and privileges—either
conrming the man as the head of the household or, in some cases,
restructuring the family unit. This restructuring of family life by reg-
istration systems can take dierent forms. For example in Uganda,
because women often ed before male relatives, they were regis-
tered as heads of households, making them the ocial recipients
of UNHCR rations and Ugandan government land. Many women
described how this granted them a greater degree of agency and
control over their family life. It also meant they took the place for-
merly occupied by their husbands or male family members, which
sometimes caused problems when the men subsequently arrived
and sought to reclaim their position of power and authority.
Another example of ecology can be found in the power asymme-
tries between refugees and those responsible for providing services
to them. Specically, we show how refugees lack of power and
desperation for services make them vulnerable to exploitation. For
example, in Uganda, refugees were forced to hand over a portion
of their food ration to the people who delivered the food to their
homes. These examples illustrate the diverse relationships between
sociotechnical systems and their broader contexts of use, as well
as how social life and relationships interact with technology, with
both positive and negative outcomes.
6.3 Embodiment
The quality of embodiment urges “focalizing the agency of inter-
action not on the interface or its designer, but the bodies, motivat-
ing drives, and primordial urges of users” [
8
]. In our research, we
see many ways in which the identity management systems that
determine refugees’ legal status and eligibility for services have far-
reaching consequences for refugees’ “bodies, motivating drives, and
primordial urges.For example, refugees’ legal recognition through
registration with UNHCR was often instrumental in gaining access
to basic, tangible services that were essential for survival, including
shelter, food, and health services. In addition, challenges renewing
refugee status sometimes led to mobility problems for refugees,
especially men. We heard stories from participants of how they
would be stopped and interrogated by security forces, and detained
or beaten up if they did not possess valid identication.
Given the high stakes for refugees when it comes to how the data
they provide to organizations does or does not result in tangible
benets necessary for survival, it is unsurprising that they strive to
actively negotiate the identities available to them (despite limited
opportunities to do so), consciously weighing the benets and con-
straints associated with dierent statuses in order to access services,
ensure eligibility for employment, and preserve spatial mobility.
For example, many refugees have partial, or perceived, knowledge
of organizations’ registration processes, which leads them to adopt
dierent strategies in negotiating these processes—including avoid-
ing registration completely in some cases or selectively registering
members of households because they perceive that female-headed
households receive more benets than male-headed households. In
addition, many refugees we spoke with voiced concerns about reg-
istration interview questions, such as place of origin, and anxiety
about the consequences of this data being shared (e.g., on future
immigration opportunities or safety from political persecution).
6.4 Self-disclosure
The quality of self-disclosure refers to the extent to which software
renders visible the ways it eects users as subjects [
8
]. It calls users’
awareness to what the software is trying to make of them and cre-
ates opportunities for users to (re)dene themselves to become the
kind of user the software is for, or set aside the parts of themselves
that are less relevant to the software. In other words, the software
gives users an identity they are pressured into accepting.
The quality of self-disclosure on the part of humanitarian reg-
istration systems is particularly important in our context. Indeed,
the very process of registration and the establishment of eligibility
to specic services rests on institutionally dened categories into
which individual refugees must conform. At the same time, refugees
and other displaced persons are by denition extremely vulnerable.
They are desperate for assistance and, as our data shows, many
will strive to dene themselves in ways that make them legible to
these systems if there is even a chance that it will lead to additional
services. In these contexts, the organizations collecting the data
hold all of the power, which also highlights challenges obtaining
true consent to collect and share people’s personal data [25].
The lack of self-disclosure of these systems is also apparent in
individuals’ lack of understanding of how organizations make de-
cisions about their eligibility for services, in ways that echo other
types of systems where black-box processes, such as algorithms,
determine important outcomes. The experience of people who have
little to no understanding of how organizations assess their vul-
nerability or needs is similar to the increasing number of ways
in which unknown algorithms determine the choices and options
available to individuals all over the world, from credit scores and
search results to online prices and news information. Transparency
of these vital decision-making processes could enable broader un-
derstanding of how organizations distribute scarce resources, yet
such self-disclosure might also invite eorts to game the system.
At the heart of this debate is of course the nature of the relation-
ship between institutions and individuals, and who gets to decide
whether trust and transparency can co-exist.
COMPASS ’19, July 3–5, 2019, Accra, Ghana E. Schoemaker et al.
6.5 Advocacy
The quality of advocacy focuses on ensuring technology is pro-
gressive and attempts to bring about political emancipation [
8
].
Although the UNHCR and other organizations in our research os-
tensibly exist to advocate for refugees and improve their quality of
life, these organizations are also focused on and working within the
status quo, and must conform to the political, social, and cultural
environments of the countries in which they operate. For example,
we saw how, when host governments say that no more refugees
are allowed to be registered, the UNHCR must follow their deci-
sion, even if it negatively impacts refugees. As such, organizations
need to pay attention to the ways in which they may perpetuate
regressive and harmful practices and structures [8].
Another way that the quality of advocacy manifests in our work
is in how refugees who were desperate for services chose to share
sensitive personal information with organizations despite skepti-
cism that those organizations would deliver the services promised.
In these examples, participants described how they worried that the
very organizations supposed to advocate for them instead used their
data in ways that only beneted the organization (i.e., to obtain
funding) but did not provide benets to refugees.
We also see many examples of how, when organizations’ prac-
tices and policies clash with refugees needs and opinions, the orga-
nizations have all the power, with refugees often forced to conform
to organizations’ requirements. For example, in most cases, refugees
have no choice but to share their data if they want access to services.
They are also required to provide all the information requested, with
no choices for holding some information back or asking that certain
pieces of information not be shared with other organizations.
Many systems also currently prevent refugees from being able
to advocate for themselves. For example, the descriptions we heard
of ways in which individuals were unable to inuence or change
the systems that recorded their information illustrate how those
systems, and the processes they are part of, do not allow space for
individuals to control the data systems hold about them. Further-
more, as digital systems enable easy sharing of data, refugees have
limited ability to control where their data goes. We heard many
people describe their surprise and concern about how organizations
had shared their personal data with others.
We also acknowledge the bias towards refugees’ perspectives
in our study. The goal of our work was to examine refugees’ ex-
periences with, and perspectives on, the digital identity systems
that humanitarian organizations use to collect and manage their
personal data. As such, we did not talk with organizations to un-
derstand their side of the story, and acknowledge that many of the
challenges our data surfaced engage with complex, nuanced, and
non-trivial issues that organizations work to try and overcome.
6.6 Participation
Finally, the quality of participation refers to valuing participatory
processes that lead to the creation of interactive systems [
8
]. In our
research, the design of digital humanitarian systems generally fol-
lowed a top-down approach, focusing on organizations as the users
of such systems, catering to the organizations’ needs, priorities, and
perspectives, and making refugees legible in ways determined by
those organizations. But our study shows that refugees themselves
are also an important category of “users” of these systems, with
dierent needs and priorities than organizations. Unfortunately,
the design of current digital identity systems has not prioritized
the participation of refugees, leading to challenges for refugees as
they seek to establish and manage identities via these systems.
We hypothesize that participatory methods, in which refugees
are treated as active contributors to the design of humanitarian
systems, might result in many benets for both organizations and
refugees. For example, the increased condence in systems that
better account for refugees’ concerns and priorities might lead to
higher rates of registration and stronger protections for vulnerable
beneciaries. In addition, there might be increased eciency due to
more accurate data as refugees work to maintain up-to-date records;
or there might be resource savings that result from a transfer of the
eort required to perform data management from organizational
sta to individuals. Of course, beyond the benets to organizations
is the greater control and dignity for refugees themselves that would
result from systems designed around their needs and interests.
Encouragingly, and based in part on our work, the UNHCR has
recognized the need to be able to consult better with refugees and
other displaced populations on issues of digital identity. Over the
past few months, our team has engaged with the UNHCR in a
project to design a participatory toolkit that will provide refugees
with opportunities to participate in the design or customization
of UNHCR systems deployed in their specic country or context.
The toolkit will facilitate consultations with refugees on key is-
sues, including their views on registration and identity manage-
ment, recommendations for improvements, identifying dierent
experiences, including dierential access or discrimination (e.g.
for refugee women and girls), privacy and information sharing
concerns, perceptions of biometric technologies, and more.
Our early prototypes draw inspiration from prior work on par-
ticipatory toolkits, such as the city of Helsinki’s Participation Game
[
15
] that enables city employees, residents, and other stakehold-
ers to provide input to improve the city’s operations and services.
The goal is for the new UNHCR participatory toolkit to eventually
become a part of PRIMES (Population Registration and Identity
Management Ecosystem) [
48
], the UNCHR’s ecosystem of inter-
operable tools, which will be the digital platform for beneciaries,
UNHCR, and other partners to interact in the digital sphere.
7 CONCLUSION
This paper examines refugees’ experiences with and perspectives
on the digital identity systems used by humanitarian organizations
to collect, manage, and share their personal data. We show how
refugees face many challenges negotiating the digital systems that
render them legible to service providers, discuss strategies refugees
employ to exercise agency and control within these systems, and
demonstrate the impact of these systems on their social relation-
ships. We use Bardzell’s lens of feminist HCI [
8
] to make sense of
these challenges and suggest a starting point for engaging refugees
in the design of improved identity management systems.
ACKNOWLEDGMENTS
We sincerely thank all our participants. This work was funded by
DFID under contract number PO40107257.
Identity at the Margins COMPASS ’19, July 3–5, 2019, Accra, Ghana
REFERENCES
[1]
Konstantin Aal, Marios Mouratidis, Anne Weibert, and Volker Wulf. 2016. Chal-
lenges of CI initiatives in a political unstable situation-case study of a computer
club in a refugee camp. In Proceedings of the 19th International Conference on
Supporting Group Work. ACM, 409–412.
[2]
Konstantin Aal, Anne Weibert, Reem Talhouk, Vasilis Vlachokyriakos, Karen
Fisher, and Volker Wulf. 2018. Refugees & Technology: Determining the Role of
HCI Research. In Proceedings of the 2018 ACM Conference on Supporting Groupwork.
ACM, 362–364.
[3]
Arthur Allison, James Currall, Michael Moss, and Susan Stuart. 2005. Digital
identity matters. Journal of the American Society for Information Science and
Technology 56, 4 (2005), 364–372.
[4]
Asam Almohamed and Dhaval Vyas. 2016. Designing for the Marginalized: A step
towards understanding the lives of refugees and asylum seekers. In Proceedings of
the 2016 ACM Conference Companion Publication on Designing Interactive Systems.
ACM, 165–168.
[5]
Asam Almohamed and Dhaval Vyas. 2016. Vulnerability of displacement: chal-
lenges for integrating refugees and asylum seekers in host communities. In
Proceedings of the 28th Australian Conference on Computer-Human Interaction.
ACM, 125–134.
[6]
Asam Almohamed, Dhaval Vyas, and Jinglan Zhang. 2017. Rebuilding social
capital: engaging newly arrived refugees in participatory design. In Proceedings
of the 29th Australian Conference on Computer-Human Interaction. ACM, 59–67.
[7]
Jennifer Barano, R Israel Gonzales, Jay Liu, Heidi Yang, and Jimin Zheng. 2015.
Lantern: Empowering refugees through community-generated guidance using
near eld communication. In Proceedings of the 33rd Annual ACM Conference
Extended Abstracts on Human Factors in Computing Systems. ACM, 7–12.
[8]
Shaowen Bardzell. 2010. Feminist HCI: taking stock and outlining an agenda for
design. In Proceedings of the SIGCHI conference on human factors in computing
systems. ACM, 1301–1310.
[9]
Roy F Baumeister and Mark Muraven. 1996. Identity as adaptation to social,
cultural, and historical context. Journal of adolescence 19, 5 (1996), 405–416.
[10]
Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology.
Qualitative research in psychology 3, 2 (2006), 77–101.
[11]
Deana Brown and Rebecca E Grinter. 2016. Designing for transient use: A
human-in-the-loop translation platform for refugees. In Proceedings of the 2016
CHI Conference on Human Factors in Computing Systems. ACM, 321–330.
[12]
Rogers Brubaker and Frederick Cooper. 2000. Beyond âĂIJidentityâĂİ. Theory
and society 29, 1 (2000), 1–47.
[13]
Ana Maria Bustamante Duarte, Auriol Degbelo, and Christian Kray. 2018. Explor-
ing Forced Migrants (Re) settlement & the Role of Digital Services. In Proceedings
of 16th European Conference on Computer-Supported Cooperative Work-Exploratory
Papers. European Society for Socially Embedded Technologies (EUSSET).
[14]
Catherine Cheney. 2019. How digital identity can address
both protection and inclusion. https://www.devex.com/news/
how-digital- identity-can-address-both-protection-and-inclusion- 94449.
(2019).
[15]
City of Helsinki. 2018. Participation Game. https://www.hel./helsinki/en/
administration/participate/channels/participation-model/participation- game/.
(2018).
[16]
Lizzie Coles-Kemp, Rikke Bjerg Jensen, and Reem Talhouk. 2018. In a New Land:
Mobile Phones, Amplied Pressures and Reduced Capabilities. In Proceedings of
the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 584.
[17]
Paul Currion, Bryan Pon, and Emrys Schoemaker. 2018. Identity at the Margins:
refugee identity and data management. Caribou Digital Publishing (2018).
[18]
Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, and Andrew Williams.
2012. Hummingbird: Privacy at the time of twitter. In Security and Privacy (SP),
2012 IEEE Symposium on. Citeseer, 285–299.
[19]
Bernhard Debatin, Jennette P Lovejoy,Ann-Kathrin Horn, and Brittany N Hughes.
2009. Facebook and online privacy: Attitudes, behaviors, and unintended conse-
quences. Journal of computer-mediated communication 15, 1 (2009), 83–108.
[20]
James D Fearon. 1999. What is identity (as we now use the word). Unpublished
manuscript, Stanford University, Stanford, Calif (1999).
[21]
Karen E Fisher, Reem Talhouk, Katya Yemova, Dalya Al-Shahrabi, Eiad Ya, Sam
Ewald, and Rob Comber. 2017. Za’atari Refugee Cookbook: Relevance, Challenges
and Design Considerations. In Proceedings of the 2017 CHI Conference Extended
Abstracts on Human Factors in Computing Systems. ACM, 2576–2583.
[22]
Karen E Fisher, Katya Yemova, and Eiad Ya. 2016. Future’s Butteries: Co-
Designing ICT Wayfaring Technology with Refugee Syrian Youth. In Proceedings
of the The 15th International Conference on Interaction Design and Children. ACM,
25–36.
[23]
Leo A Goodman. 1961. Snowball sampling. The annals of mathematical statistics
(1961), 148–170.
[24]
Donna Haraway. 1988. Situated knowledges: The science question in feminism
and the privilege of partial perspective. Feminist studies 14, 3 (1988), 575–599.
[25]
Richard Hugman, Eileen Pittaway, and Linda Bartolomei. 2011. When âĂŸdo no
harmâĂŹis not enough: The ethics of research with refugees and other vulnerable
groups. The British Journal of Social Work 41, 7 (2011), 1271–1287.
[26]
Azalea Irani, Kriti Nelavelli, Kristin Hare, Paula Bondal, and Neha Kumar. 2018.
Refuge Tech: An Assets-Based Approach to Refugee Resettlement. In Extended
Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems.
ACM, LBW554.
[27]
Konstantinos Kazakos, Siddhartha Asthana, Madeline Balaam, Mona Duggal,
Amey Holden, Limalemla Jamir, Nanda Kishore Kannuri, Saurabh Kumar,
Amarendar Reddy Manindla, Subhashini Arcot Manikam, et al
.
2016. A real-time
ivr platform for community radio. In Proceedings of the 2016 CHI Conference on
Human Factors in Computing Systems. ACM, 343–354.
[28]
Mark Latonero, Keith Hiatt, Antonella Napolitano, Giulia Clericetti, and Melanie
Penagos. 2019. Digital Identity in the Migration and Refugee Context: Italy Case
Study. Data and Society (2019), 1–45.
[29]
Mark R Leary and Robin M Kowalski. 1990. Impression management: A literature
review and two-component model. Psychological bulletin 107, 1 (1990), 34.
[30]
Alvaro Martin, Ana Isabel Segovia, et al
.
2018. Digital Identity: the current state
of aairs. Technical Report.
[31]
Wim Meeus, Jurjen Iedema, Marianne Helsen, and Wilma Vollebergh. 1999.
Patterns of adolescent identity development: Review of literature and longitudinal
analysis. Developmental review 19, 4 (1999), 419–461.
[32]
Sara Nabil, Reem Talhouk, Julie Trueman, David S Kirk, Simon Bowen, and
Peter Wright. 2018. Decorating Public and Private Spaces: Identity and Pride
in a Refugee Camp. In Extended Abstracts of the 2018 CHI Conference on Human
Factors in Computing Systems. ACM, LBW552.
[33]
Hamid Nach and Albert Lejeune. 2009. The impact of information technology
on identity: Framing the research agenda. (2009).
[34]
Jean S Phinney. 1990. Ethnic identity in adolescents and adults: review of research.
Psychological bulletin 108, 3 (1990), 499.
[35]
Samar Sabie, Jay Chen, Azza Abouzied, Fatma Hashim, Harleen Kahlon, and
Steve Easterbrook. 2017. Shelter Dynamics in Refugee and IDP Camps: Cus-
tomization, Permanency, and Opportunities. In Proceedings of the 2017 Workshop
on Computing Within Limits. ACM, 11–20.
[36]
Paul Schmitt, Daniel Iland, Elizabeth Belding, Brian Tomaszewski, Ying Xu, and
Carleen Maitland. 2016. Community-level access divides: A refugee camp case
study. In Proceedings of the Eighth International Conference on Information and
Communication Technologies and Development. ACM, 25.
[37]
Seteney Shami. 1996. Transnationalism and refugee studies: Rethinking forced
migration and identity in the Middle East. Journal of Refugee Studies 9, 1 (1996),
3–26.
[38]
Anouk Smeekes, Maykel Verkuyten, Elif Çelebi, Ceren Acartürk, and Samed
Onkun. 2017. Social identity continuity and mental health among Syrian refugees
in Turkey. Social psychiatry and psychiatric epidemiology 52, 10 (2017), 1317–1324.
[39]
O Stickel, D Hornung, K Aal, M Rohde, and V Wulf. 2015. 3D Printing with
Marginalized Children-An Exploration in a Palestinian Refugee Camp, ECSCW
2015: Proceedings of the 14th European Conference on Computer Supported
Cooperative Work, 19-23 September 2015, Oslo, Norway, Nina Boulus-Rødje,
Gunnar Ellingsen, Tone Bratteteig, Margunn Aanestad, Pernille Bjørn. Springer,
URL: doi 10 (2015), 978–3.
[40]
Reem Talhouk, Tom Bartindale, Kyle Montague, Sandra Mesmar, Chaza Akik,
A Ghassani, M Najem, H Ghattas, Patrick Olivier, and Madeline Balaam. 2017.
Implications of synchronous IVR radio on Syrian refugee health and community
dynamics. In Proceedings of the 8th International Conference on Communities and
Technologies. ACM, 193–202.
[41]
Reem Talhouk, Ana Bustamante, Konstantin Aal, Anne Weibert, Koula
Charitonos, and Vasilis Vlachokyriakos. 2018. HCI and refugees: experiences
and reections. Interactions 25, 4 (2018), 46–51.
[42]
Reem Talhouk, Sandra Mesmar, Anja Thieme, Madeline Balaam, Patrick Olivier,
Chaza Akik, and Hala Ghattas. 2016. Syrian refugees and digital health in
Lebanon: Opportunities for improving antenatal health. In Proceedings of the 2016
CHI Conference on Human Factors in Computing Systems. ACM, 331–342.
[43]
Reem Talhouk, Vasillis Vlachokyriakos, Anne Weibert, Konstantin Aal, Syed Ish-
tiaque Ahmed, Karen Fisher, and Volker Wulf. 2017. Refugees & HCI Workshop:
The Role of HCI in Responding to the Refugee Crisis. In Proceedings of the 2017
CHI Conference Extended Abstracts on Human Factors in Computing Systems. ACM,
558–565.
[44]
Uganda Oce of the Prime Minister. 2018. Refugees Management. https://opm.
go.ug/refugees-management/. (2018).
[45]
UNHCR. 2018. Biometric Identity Management System. http://www.unhcr.
org/en-us/protection/basic/550c304c9/biometric- identity-management- system.
html. (2018).
[46]
UNHCR. 2018. Jordan Factsheet. https://reliefweb.int/report/jordan/
unhcr-jordan- factsheet-june- 2018. (2018).
[47] UNHCR. 2018. Lebanon. http://www.unhcr.org/lb/shelter. (2018).
[48]
UNHCR. 2018. PRIMES: Population Registration and Identity Management
EcoSystem. https://www.unhcr.org/primes.html. (2018).
[49]
UNHCR. 2018. Registration via ProGres. http://www.unhcr.org/en- us/
registration.html. (2018).
COMPASS ’19, July 3–5, 2019, Accra, Ghana E. Schoemaker et al.
[50]
UNHCR. 2018. Syrian Regional Refugee Response. https://data2.unhcr.org/en/
situations/syria/location/36. (2018).
[51] UNHCR. 2018. Uganda. https://data2.unhcr.org/en/country/uga. (2018).
[52]
Sara Vannini, Ricardo Gomez, Megan Carney, and Katharyne Mitchell. 2018.
Interdisciplinary Approaches to Refugee and Migration Studies: Lessons from
Collaborative Research on Sanctuary in the Changing Times of Trump. Migration
and Society 1, 1 (2018), 164–174.
[53]
Alan S Waterman. 1982. Identity development from adolescence to adulthood:
An extension of theory and a review of research. Developmental psychology 18, 3
(1982), 341.
[54]
Edgar A Whitley, Uri Gal, and Annemette Kjaergaard. 2014. Who do you think
you are? A review of the complex interplay between information systems, iden-
tication and identity. (2014).
[55]
Ying Xu, Adrian Holzer, Carleen Maitland, and Denis Gillet. 2017. Community
building with co-located social media: A eld experiment with syrian refugees.
In Proceedings of the Ninth International Conference on Information and Commu-
nication Technologies and Development. ACM, 16.
[56]
Ying Xu and Carleen Maitland. 2016. Communication Behaviors When Displaced:
A Case Study of Za’atari Syrian Refugee Camp. In Proceedings of the Eighth
International Conference on Information and Communication Technologies and
Development. ACM, 58.
[57]
Ying Xu and Carleen Maitland. 2017. Mobilizing Assets: Data-Driven Community
Development with Refugees. In Proceedings of the Ninth International Conference
on Information and Communication Technologies and Development. ACM, 10.
[58]
Ying Xu, Carleen Maitland, and Brian Tomaszewski. 2015. Promoting partic-
ipatory community building in refugee camps with mapping technology. In
Proceedings of the Seventh International Conference on Information and Communi-
cation Technologies and Development. ACM, 67.
[59]
Dr Eiad Ya and Karen E Fisher. 2018. Syrian Youth in ZaâĂŹatari Refugee Camp
as ICT Wayfarers: An Exploratory Study Using LEGO and Storytelling. (2018).
[60]
Eiad Ya, Katya Yemova, and Karen E Fisher. 2018. Young Hackers: Hacking
Technology at Za’atari Syrian Refugee Camp. In Extended Abstracts of the 2018
CHI Conference on Human Factors in Computing Systems. ACM, CS21.
[61]
George Yerousis, Konstantin Aal, Thomas von Rekowski, David W Randall,
Markus Rohde, and Volker Wulf. 2015. Computer-enabled project spaces: Con-
necting with Palestinian refugees across camp boundaries. In Proceedings of the
33rd Annual ACM Conference on Human Factors in Computing Systems. ACM,
3749–3758.
... The most frequently cited ethical issue categorized under the value category of autonomy was data being collected without sufficient informed consent (n = 91). For example, Shoemaker et al. [89] found through interviews with refugees that they are frequently being asked by humanitarian organizations to provide personal information that the respondents considered intrusive, without being offered a justification on why this was relevant. ...
... Over 85% of studies (n = 187) included ethical issues that were raised by interviews or other kinds of consultations with experts. Examples here include Shoemaker et al. [89], who conducted qualitative interviews with 198 refugees in Lebanon, Jordan, and Uganda, Vannini et al. [97], who interviewed nine representatives from organizations assisting transborder migrants in the United States, and Açιkyιldιz [98], who interviewed 17 humanitarian aid workers about their organizations' use of biometric data. Fifteen studies included a systematic review of the literature. ...
... Related to the ethical value category of autonomy, more than 15% of studies (n = 35) mentioned that a refusal to provide information could lead to being excluded from receiving assistance. This issue is illustrated by Shoemaker et al. [89] who documented how refugees felt that they lacked a choice on whether or not to provide personal information to the UN High Commissioner for Refugees (UNHCR) as their ability to access assistance depended on it. Detailed guidance has been created by the International Rescue Committee on how to obtain proper consent [104], whereas the ICRC has published the legal basis for situations when data processing is permissible-even when consent cannot be assumed or obtained [36]. ...
Article
Full-text available
Background Humanitarian organizations are rapidly expanding their use of data in the pursuit of operational gains in effectiveness and efficiency. Ethical risks, particularly from artificial intelligence (AI) data processing, are increasingly recognized yet inadequately addressed by current humanitarian data protection guidelines. This study reports on a scoping review that maps the range of ethical issues that have been raised in the academic literature regarding data processing of people affected by humanitarian crises. Methods We systematically searched databases to identify peer-reviewed studies published since 2010. Data and findings were standardized, grouping ethical issues into the value categories of autonomy, beneficence, non-maleficence, and justice. The study protocol followed Arksey and O’Malley’s approach and PRISMA reporting guidelines. Results We identified 16,200 unique records and retained 218 relevant studies. Nearly one in three (n = 66) discussed technologies related to AI. Seventeen studies included an author from a lower-middle income country while four included an author from a low-income country. We identified 22 ethical issues which were then grouped along the four ethical value categories of autonomy, beneficence, non-maleficence, and justice. Slightly over half of included studies (n = 113) identified ethical issues based on real-world examples. The most-cited ethical issue (n = 134) was a concern for privacy in cases where personal or sensitive data might be inadvertently shared with third parties. Aside from AI, the technologies most frequently discussed in these studies included social media, crowdsourcing, and mapping tools. Conclusions Studies highlight significant concerns that data processing in humanitarian contexts can cause additional harm, may not provide direct benefits, may limit affected populations’ autonomy, and can lead to the unfair distribution of scarce resources. The increase in AI tool deployment for humanitarian assistance amplifies these concerns. Urgent development of specific, comprehensive guidelines, training, and auditing methods is required to address these ethical challenges. Moreover, empirical research from low and middle-income countries, disproportionally affected by humanitarian crises, is vital to ensure inclusive and diverse perspectives. This research should focus on the ethical implications of both emerging AI systems, as well as established humanitarian data management practices. Trial registration Not applicable.
... Furthermore, the lack of documentation can make it challenging to recognize and build upon their previous educational achievements (Atesok et al., 2019 ;Lambrechts, 2020 ). From a legal perspective, undocumented refugee children often face significant barriers to accessing rights and services (Shoemaker, 2019 ). Without identity documents, proving their age, nationality, or family ties becomes difficult, which is crucial in asylum procedures and in accessing child protection services (Cheesman, 2022 ). ...
... To ensure effective data management and protection, the study underscored the importance of integrating document portability into a broader ecosystem of interagency arrangements, including recognizing certifications (Madon & Schoemaker, 2021 ). Shoemaker et al. (2019 ) examined refugees' challenges when using humanitarian identity systems, such as UNHCR's ProGres, SCOPE, and PRIMES. Using semi-structured interviews and focus groups, they found that these systems were designed for a typical refugee but limit refugees' agency and flexibility in accessing services (Shoemaker et al., 2019 ). ...
... Shoemaker et al. (2019 ) examined refugees' challenges when using humanitarian identity systems, such as UNHCR's ProGres, SCOPE, and PRIMES. Using semi-structured interviews and focus groups, they found that these systems were designed for a typical refugee but limit refugees' agency and flexibility in accessing services (Shoemaker et al., 2019 ). The lack of self-disclosure in these systems was also observed, and refugees had a limited understanding of how organizations determine their eligibility for services (Shoemaker et al., 2019 ). ...
Article
The focus of this scoping review is to identify studies, reports, and other relevant sources from the peer-reviewed and grey literature that reports on refugee children’s access and barriers to portable identity, education, and health records at different stages during the migration process. The child refugee crisis has become a global concern as many individuals risk their lives to escape the political violence, persecution, and war. Forcibly displaced children face the genuine challenge of being unable to acquire documents pre-migration or having documents lost, stolen, or destroyed during transit. Still, little is known about refugee children’s challenges when accessing and maintaining personal records while moving within and across borders. We will consolidate existing information and analyze the barriers that limit access to identity, education, and health records at different stages of migration and the policies and practices to address record portability and interoperability problems. This work is part of a program of study that seeks to understand the institutional, social, and political aspects of a refugee child’s environment that potentiate their resilience under conditions of extreme stress. The study included academic literature focused on the production, preservation, or transmission of records pertaining to identification, education, or health of refugee children, adolescents, and young adults. The review process was limited to documents written in the English language. We employed the framework proposed by Arksey and O’Malley1 for the methodological synthesis of research, as well as the modifications recommended by Levac and colleagues.2 Results of the search strategy were compiled and presented using the extended reporting guidelines for scoping reviews, as suggested by the Preferred Reporting Items for Systematic Reviews and Meta-Analyzes (PRISMA).3 Several bibliographic and grey literature databases, including PubMed, CINAHL, Embase, Tandfonline, Proquest, Cochrane Database of Systematic Reviews, Scopus, Google Scholar, Google search engine, and UN agency websites, were searched to identify relevant studies. Using electronic literature searches, 87 articles were identified, of which 8 were deemed eligible for inclusion in this study. In addition, we identified 7 news articles and 10 reports from international organizations, most of which were focused on issues related to education record portability, as well as initiatives aimed at recognizing digital credentials for refugee young people. All eligible documents were categorized into three themes based on the analysis targets: (1) examining the challenges faced by refugees in utilizing humanitarian identity systems; (2) highlighting the need for digital credentials for refugees; and (3) exploring the potential benefits of digital health interventions for refugees. Specifically, our search showed that digital identity systems need to be more flexible and tailored to individual refugee needs. With regard to education records, the retrieved grey literature prioritizes adults’ needs, but adopting digital credentials and blockchain technology may solve traditional recognition systems’ constraints, ensuring that refugee children’s education is also supported. In contrast, digital health interventions, including EHRs and mobile health applications, have been better studied and shown to positively impact healthcare access, patient outcomes, and chronic disease management for refugees in high-resource host countries. Despite this potential for positive outcomes, the portability of health records remains an under-researched and under-resourced area of a refugee child’s life. The increasing number of refugee children globally necessitates urgent solutions to address their need for portable identity, education, and health records. This review highlights the potential of digital interventions to improve refugee children’s lives, including their resettlement outcomes. Furthermore, recent innovations like blockchain technology and digital credentials offer promising solutions for advancing equity for refugee children. Developing adaptable digital solutions and resources can enhance refugee children’s access to health and education services, while also enabling them to obtain necessary documentation and identity verification for accessing basic rights and services. Read the full text here: https://link.springer.com/epdf/10.1007/s12134-024-01156-7?sharing_token=5P4j2B478mQFG3P4W-UKWfe4RwlQNchNByi7wbcMAY4e6UfpQUp5y4K5aiUiVfYFJrRN8mEnBLhaMPiy1LUbxcPnrTxDzhyZuUOyRPYJ-dMj1ceVWp8zEScRZ9oQq4FlKWcwkW0sJLnhRgGq2kBgb42MJHUn69E6MpgXRaqeWBQ%3D
... This autonomy enhances privacy, fosters trust by removing dependence on single entities for data protection, and ensures transparency and traceability of all transactions and data changes. Shoemaker et al. (2019) provide a comprehensive overview of the challenges faced by existing humanitarian identity systems, particularly in managing personal data for refugees across various countries. They identified numerous obstacles but also emphasized refugees' active involvement in meeting their own needs. ...
Article
Full-text available
This article explores the potential of Distributed Ledger Technology (DLT), with a focus on blockchain, to address key challenges related to the security, ownership, and management of personal data. We trace the foundational work of Haber and Stornetta, who introduced the core principles of blockchain to secure digital records within the real economy. Building on this, Nakamoto’s innovations in blockchain technology introduced a native crypto-asset, which not only aligns and concentrates the interests of network participants but also resolves the previously unsolved “double-spending problem.” This breakthrough decentralizes the verification and control of recorded information, enhancing security in monetary transactions.Migrants often face challenges related to rights protection, identity management, and limited access to financial services. Blockchain applications, with their strengths in secure data storage, transparent transactions, and reliable identity verification, offer promising solutions. In this article, we examine real-world blockchain applications that enhance identity management and foster financial inclusion for migrants. Blockchain provides an infrastructure that empowers individuals with greater control over their financial and personal data, particularly through self-sovereign identity (SSI) and the use of stablecoins as global currencies. These innovations are becoming foundational components of a new digital ecosystem for information and finance.
Article
In this paper we bring to light the infrastructuring work carried out by people in Lebanon to establish and maintain everyday security in response to multiple simultaneously failing infrastructures. We do so through interviews with 13 participants from 12 digital and human rights organisations and two weeks of ethnographically informed fieldwork in Beirut, Lebanon, in July 2022. Through our analysis we develop the notion of security patchworking that makes visible the infrastructuring work necessitated to secure basic needs such as electricity provision, identity authentication and financial resources. Such practices are rooted in differing mechanisms of protection that often result in new forms of insecurity. We discuss the implications for CSCW and HCI researchers and point to security patchworking as a lens to be used when designing technologies to support infrastructuring, while advocating for collaborative work across CSCW and security research.
Preprint
Full-text available
Background Humanitarian organizations are rapidly expanding their use of data in the pursuit of operational gains in effectiveness and efficiency. Ethical risks, particularly from artificial intelligence (AI) data processing, are increasingly recognized yet inadequately addressed by current humanitarian data protection guidelines. This study reports on a scoping review that maps the range of ethical issues that have been raised in the academic literature regarding data processing of people affected by humanitarian crises. Methods We systematically searched databases to identify peer-reviewed studies published since 2010. Data and findings were standardized, grouping ethical issues into the value categories of autonomy, beneficence, non-maleficence, and justice. The study protocol followed Arksey and O’Malley’s approach and PRISMA reporting guidelines. Results We identified 8,387 unique records and retained 98 relevant studies. One in four (n = 25) discussed technologies related to artificial intelligence. Seven studies included an author from a lower-middle income country while none included an author from a low-income country. We identified 22 ethical issues which were then grouped along the four ethical value categories of autonomy, beneficence, non-maleficence, and justice. Slightly over half of included studies (n = 52) identified ethical issues based on real-world examples. The most-cited ethical issue (n = 74) was a concern for privacy in cases where personal or sensitive data might be inadvertently shared with third parties. The technologies most frequently discussed in these studies included social media, crowdsourcing, and mapping tools. Conclusions Studies highlight significant concerns that data processing in humanitarian contexts can cause additional harm, may not provide direct benefits, may limit affected populations’ autonomy, and can lead to the unfair distribution of scarce resources. The anticipated increase in AI tool deployment for humanitarian assistance amplifies these concerns. Urgent development of specific, comprehensive guidelines, training, and auditing methods are required to address these ethical challenges. Moreover, empirical research from low and middle-income countries, disproportionally affected by humanitarian crises, is vital to ensure inclusive and diverse perspectives. This research should focus on the ethical implications of both emerging AI systems as well as established humanitarian data management practices. Trial registration Not applicable.
Article
In this essay, I discuss the United Nations and its activities as they pertain to the use of blockchain technology. I argue that while this technology is rather new, the United Nations has been open to using such technological innovations to better solve human rights challenges that include fighting to end child trafficking, better distributing food aid, and reducing carbon emissions. Finally, the essay discusses the future prospects for blockchain technology and the UN.
Article
Full-text available
We reflect on the experience of a cross-disciplinary collaboration between scholars in the fields of geography, anthropology, communication, and information studies, and suggest paths for future research on sanctuary and migration studies that are based on interdisciplinary approaches. After situating sanctuary in a wider theoretical, historical, and global context, we discuss the origins and contemporary expressions of sanctuary both within and beyond faith-based organizations. We include the role of collective action, personal stories, and artistic expressions as part of the new sanctuary movement, as well as the social and political forms of outrage that lead to rekindling protest and protection of undocumented immigrants, refugees, and other minorities and vulnerable populations. We conclude with a discussion on the urgency for interdisciplinary explorations of these kinds of new, contemporary manifestations of sanctuary, and suggest paths for further research to deepen the academic dialogue on the topic.
Conference Paper
Full-text available
Conflicts in Iraq and Syria have forced millions of minorities to flee their countries and seek refuge elsewhere. This paper investigates the factors that affect the social capital of newly arrived refugees in Australia and the role of information and communication technology in supporting the rebuilding of their social capital. We present the findings from 3 participatory design workshops involving 14 newly arrived refugees form persecuted minorities in Iraq and Syria. Our findings highlight three main factors that affect social capital for newcomer refugees: cultural adjustment, organizational support, and social activities and support. We discuss our approach that helped refugees voice their concerns and challenges and provide possible venues for design to support the rebuilding of social capital in a refugee context. CCS CONCEPTS • Human-centered computing ~ HCI theory, concepts and models KEYWORDS Newly arrived Refugee, Participatory Design, ICT, HCI
Conference Paper
Full-text available
We share insights from exploratory research with Syrian youth at the Za'atari Refugee Camp in Jordan about the role of information and mobile technology in their daily lives, and how they serve as information, communication and technology (ICT) wayfarers. Survey findings (n=174) show most youth own mobiles and SIM cards, and WhatsApp and Google are the most popular apps/engines. Design Workshop data contradicted youth survey self-reports of being heavy ICT users on behalf of others. Instead, narrative-drawings (n=50) created using LEGO Mini-Figures depicted situations involving primarily instrumental assistance, with fewer representations of informational, technological and emotional assistance, per Dervin's Sense-Making framework. Depicting mostly events in Syria, with several in Za'atari, the narrative-drawings reflect the youths' affinity for the forms of assistance outlined in the fourth Geneva Convention. The research informed longer workshops in the camp setting in accordance with the methodology's original aim to co-design ICT mediary devices that support the youths' mediary behavior, as represented by their narrative-drawings and survey data, and in support of UN Sustainable Development Goals.
Conference Paper
Full-text available
In recent years, large numbers of forced migrants have arrived in urban areas all around the world. Access to relevant information and suitable technology can help forced migrants, mainly refugees and asylum seekers, to cope with several of the challenges they face in this process. We conducted a qualitative study with ten forced migrants and six social workers and a staff member of a collective lodging for young forced migrants in Münster, Germany. The goal was to identify challenges and needs in this specific context, find criteria for assessing digital support services for forced migrants, and suggest general aspects of improvement. We analyzed 36 existing mobile applications and web services useful for forced migrants upon arrival and during (re)settlement. Our results highlight some critical issues to be addressed through digital services for forced migrants regarding information reliability, timeliness, and complexity, as well as an occasional lack of experience with geospatial services.
Conference Paper
Full-text available
Framed within the theoretical lens of positive and negative security, this paper presents a study of newcomers to Sweden and the roles of mobile phones in the establishment of a new life. Using creative engagement methods through a series of workshops, two researchers engaged 70 adult participants enrolled into further education colleges in Sweden. Group narratives about mobile phone use were captured in creative outputs, researcher observations and notes and were analysed using thematic analysis. Key findings show that the mobile phone offers security for individuals and a safe space for newcomers to establish a new life in a new land as well as capitalising on other spaces of safety, such as maintaining old ties. This usage produces a series of threats and vulnerabilities beyond traditional technological security thinking related to mobile phone use. The paper concludes with recommendations for policies and support strategies for those working with newcomers.
Conference Paper
Full-text available
Zaatari, the world's largest Syrian refugee camp, currently hosts around 80,000 Syrian refugees. Located in the desert, the camp has become the fifth biggest city in Jordan. Previous examinations of crisis-housing in refugee camps have assessed re-appropriation of shelters in order to improve functionality. In this paper, we show how interior adornment serves a purpose in refugee lives that goes beyond that of functionality. Our analysis of fieldwork conducted in Zaatari camp show how decorating provides an escape from the camp and compensates for loss of identity, home and leisure. Within contexts of austerity, decorating spaces is a valuable and vital aspect of living, coping and supporting people's sense of identity and pride. Through painting and decorating both public and private 'spaces', refugees transform them into 'places', creating a sense of home. We highlight how the capability of decorating, crafting and making is an enactment of freedom within contexts of political restrictions and resource limitations.
Conference Paper
Refugee integration is a long process that follows resettlement into a country where refugees not only face language and culture barriers but also difficulties integrating into the workforce, receiving a good education and accessing healthcare. In addition to the UNHCR, the UN refugee agency, there are countless organizations and nonprofits around the world focused on trying to facilitate this process and provide support where needed. This paper presents preliminary user research undertaken in Clarkston, Georgia (USA), to study the process. We used qualitative research methods including contextual analysis and semi-structured interviews to evaluate the ease of integration for refugees who have relocated to Clarkston. We took a human-centered design approach to identify the gaps in the current process and to present preliminary design recommendations.
Conference Paper
An unprecedented 65 million people around the world are forcibly displaced. As stakeholders call for technological innovation to address the realities of the global migration crisis, HCI researchers in and outside of academia engage with the issues faced by humanitarian responders, refugees and communities. Our exploratory study at UNHCR Za'atari Syrian Refugee Camp in Jordan highlights the creative ways young people co-opt technology to perform information work. We collected data through a survey, diaries, and observations. Findings offer important insights. First, hacking at Za'atari is highly gendered, with only boys observed engaging in the activity. Second, the range of young hackers' activities indicate the following: a) youth help their family and community through technology; b) benefits include getting paid and feeling empowered by their role of technology experts; and c) a connected learning environment emerges. Finally, the physical location where youth are co-opting technology is important in building capacity.