1,637
Views
20
CrossRef citations to date
0
Altmetric
ARTICLES

Identity at the margins: data justice and refugee experiences with digital identity systems in Lebanon, Jordan, and Uganda

, , &

References

  • Aal, K., Mouratidis, M., Weibert, A., & Wulf, V. (2016). Challenges of CI initiatives in a political unstable situation-case study of a computer club in a refugee camp. In Proceedings of the 19th international conference on supporting group work (pp. 409–412).
  • Allison, A., Currall, J., Moss, M., & Stuart, S. (2005). Digital identity matters. Journal of the American Society for Information Science and Technology, 56(4), 364–372. https://doi.org/10.1002/(ISSN)1532-2890
  • Almohamed, A., & Vyas, D. (2016a). Designing for the marginalized: A step towards understanding the lives of refugees and asylum seekers. In Proceedings of the 2016 acm conference companion publication on designing interactive systems (pp. 165–168).
  • Almohamed, A., & Vyas, D. (2016b). Vulnerability of displacement: Challenges for integrating refugees and asylum seekers in host communities. In Proceedings of the 28th Australian conference on computer-human interaction (pp. 125–134).
  • Almohamed, A., Vyas, D., & Zhang, J. (2017). Rebuilding social capital: Engaging newly arrived refugees in participatory design. In Proceedings of the 29th Australian conference on computer-human interaction (pp. 59–67).
  • Anderson, B. (2006). Imagined communities: Reflections on the origin and spread of nationalism. Verso books.
  • Arora, P. (2016). Bottom of the data pyramid: Big data and the global south. International Journal of Communication, 10, 19. https://repub.eur.nl/pub/94979.
  • Åsberg, C., & Lykke, N. (2010). Feminist technoscience studies. Sage Publications.
  • Barad, K. (1996). Meeting the universe halfway: Realism and social constructivism without contradiction. In: L. H. Nelson & J. Nelson (Eds), Feminism, science, and the philosophy of science. Synthese library (studies in epistemology, logic, methodology, and philosophy of science), Vol. 256. Springer.
  • Barad, K. (2007). Meeting the universe halfway: Quantum physics and the entanglement of matter and meaning. Duke University Press.
  • Baranoff, J., Gonzales, R. I., Liu, J., Yang, H., & Zheng, J. (2015). Lantern: Empowering refugees through community-generated guidance using near field communication. In Proceedings of the 33rd annual ACM conference extended abstracts on human factors in computing systems (pp. 7–12).
  • Barth, F. (1998). Ethnic groups and boundaries: The social organization of culture difference. Waveland Press.
  • Baumeister, R. F., & Muraven, M. (1996). Identity as adaptation to social, cultural, and historical context. Journal of Adolescence, 19(5), 405–416. https://doi.org/10.1006/jado.1996.0039
  • Bradotti, R. (2012). Nomadic ethics, the cambridge companion to deleuze. Cambridge University Press.
  • Braidotti, R., & Regan, L. (2017). Our times are always out of joint: Feminist relational ethics in and of the world today: An interview with Rosi Braidotti. Women: A Cultural Review, 28(3), 171–192. https://doi.org/10.1080/09574042.2017.1355683.
  • Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101. https://doi.org/10.1191/1478088706qp063oa
  • Brown, D., & Grinter, R. E (2016). Designing for transient use: A human-in-the-loop translation platform for refugees. In Proceedings of the 2016 chi conference on human factors in computing systems (pp. 321–330).
  • Brubaker, R., & Cooper, F. (2000). Beyond “identity”. Theory and Society, 29(1), 1–47. https://doi.org/10.1023/A:1007068714468
  • Bustamante Duarte, A. M., Degbelo, A., & Kray, C (2018). Exploring forced migrants (Re) settlement & the role of digital services. In Proceedings of 16th European conference on computer-supported cooperative work-exploratory papers.
  • Butler, J. (1990). Gender trouble, feminist theory, and psychoanalytic discourse. Feminism/postmodernism 327 x.
  • Butler, J. (2014). Reflections on ethics, destructiveness, and life: Rosi Braidotti and the Posthuman. In B. Blaagaard (Ed.), The subject of Rosi Braidotti: Politics and concepts (pp. 21–28). Bloomsbury Academic. https://doi.org/10.5040/9781472594426.0008.
  • Coles-Kemp, L., Jensen, R. B., & Talhouk, R. (2018). In a new land: Mobile phones, amplified pressures and reduced capabilities. In Proceedings of the 2018 chi conference on human factors in computing systems (p. 584).
  • Currion, P., Pon, B., & Schoemaker, E. (2018). Identity at the margins: Refugee identity and data management. Caribou Digital Publishing.
  • Dencik, L., Hintz, A., & Cable, J. (2016). Towards data justice? The ambiguity of anti-surveillance resistance in political activism. Big Data & Society, 3(2), 2053951716679678. https://doi.org/10.1177/2053951716679678
  • Diamond, C. (1991). The realistic spirit: Wittgenstein, philosophy, and the mind. MIT Press.
  • Fearon, J. D (1999). What is identity (as we now use the word). Unpublished manuscript, Stanford University, Stanford, Calif.
  • Fisher, K. E., Talhouk, R., Yefimova, K., Al-Shahrabi, D., Yafi, E., Ewald, S., & Comber, R (2017). Za'atari refugee cookbook: Relevance, challenges and design considerations. In Proceedings of the 2017 chi conference extended abstracts on human factors in computing systems (pp. 2576–2583).
  • Fisher, K. E., Yefimova, K., & Yafi, E. (2016). Future's butterflies: Co-designing ICT wayfaring technology with refugee syrian youth. In Proceedings of the 15th international conference on interaction design and children (pp. 25–36).
  • Foucault, M. (1980). The history of sexuality. Volume one: An introduction. Vintage Books.
  • Gagliardone, I. (2014). New media and the developmental state in Ethiopia. African Affairs, 113(451), 279–299. https://doi.org/10.1093/afraf/adu017
  • Gilligan, C. (1993). In a different voice: Psychological theory and women's development. Harvard University Press.
  • Goodman, L. A. (1961). Snowball sampling. The Annals of Mathematical Statistics, 32(1), 148–170. https://doi.org/10.1214/aoms/1177705148
  • Gupta, A., & Ferguson, J. (1997). Culture, power, place: Ethnography at the end of an era. In A. Gupta & J. Ferguson (Eds.), Culture, power, place: Explorations in critical anthropology (pp. 1--29). Duke University Press.
  • Haraway, D. (1988). Situated knowledges: The science question in feminism and the privilege of partial perspective. Feminist Studies, 14(3), 575–599. https://doi.org/10.2307/3178066
  • Haraway, D. (2006). A cyborg manifesto: Science, technology, and socialist-feminism in the late 20th century. In: J. Weiss, J. Nolan, J. Hunsinger, & P. Trifonas (Eds), The international handbook of virtual learning environments. Springer.
  • Heeks, R., & Renken, J. (2018). Data justice for development: What would it mean? Information Development, 34(1), 90–102. https://doi.org/10.1177/0266666916678282.
  • Hugman, R., Pittaway, E., & Bartolomei, L. (2011). When “do no harm” is not enough: The ethics of research with refugees and other vulnerable groups. The British Journal of Social Work, 41(7), 1271–1287. https://doi.org/10.1093/bjsw/bcr013
  • Irani, A., Nelavelli, K., Hare, K., Bondal, P., & Kumar, N. (2018). Refuge tech: An assets-based approach to refugee resettlement. In Extended abstracts of the 2018 chi conference on human factors in computing systems (p. LBW554).
  • Johnson, J. A. (2014). From open data to information justice. Ethics and Information Technology, 16(4), 263–274. https://doi.org/10.1007/s10676-014-9351-8
  • Johnstone, J. (2007). Technology as empowerment: A capability approach to computer ethics. Ethics and Information Technology, 9(1), 73–87. https://doi.org/10.1007/s10676-006-9127-x
  • Kazakos, K., Asthana, S., Balaam, M., Duggal, M., Holden, A., Jamir, L., Kannuri, N. K., Kumar, S., Manindla, A. R., Manikam, S. A., & Murthy, G. V. S.. (2016). A real-time ivr platform for community radio. In Proceedings of the 2016 chi conference on human factors in computing systems (pp. 343–354).
  • King, R. (1995). Migrations, globalization and place. In D. Massey & P. Jess (Eds.), A place in the world?: Places, cultures and globalization. Oxford University Press.
  • Latour, B. (2004). Politics of nature. Harvard University Press.
  • Latour, B. (2012). We have never been modern. Harvard University Press.
  • Laugier, S. (2013). Why we need ordinary language philosophy. University of Chicago Press.
  • Leary, M. R., & Kowalski, R. M. (1990). Impression management: A literature review and two-component model. Psychological Bulletin, 107(1), 34. https://doi.org/10.1037/0033-2909.107.1.34
  • Lyon, D. (2009). Identifying citizens: Id cards as surveillance. Polity.
  • Mamo, L., & Fishman, J. R. (2013). Why justice? Introduction to the special issue on entanglements of science, ethics, and justice. Science, Technology, & Human Values, 38(2), 159–175. https://doi.org/10.1177/0162243912473162
  • Martin, A., & Segovia, A. I.. (2018). Digital identity: The current state of affairs (Tech. Rep.).
  • Masiero, S., & Das, S. (2019). Datafying anti-poverty programmes: Implications for data justice. Information, Communication & Society, 22(7), 916–933. https://doi.org/10.1080/1369118X.2019.1575448
  • Mastercard (2020). Aid Network. https://www.mastercard.us/en-us/governments/find-solutions/humanitarian-aid.html.
  • Meeus, W., Iedema, J., Helsen, M., & Vollebergh, W. (1999). Patterns of adolescent identity development: Review of literature and longitudinal analysis. Developmental Review, 19(4), 419–461. https://doi.org/10.1006/drev.1999.0483
  • Microsoft. (n.d.). SDG Fund – Business and the United Nations. Case Study. https://www.sdgfund.org/sites/default/files/business-and-un/SDGF_BFP_HKSCSRI_Business_and_SDGs-MICROSOFT.pdf.
  • Muralidharan, K., Niehaus, P., & Sukhtankar, S. (2016). Building state capacity: Evidence from biometric smartcards in India. American Economic Review, 106(10), 2895–2929. https://doi.org/10.1257/aer.20141346
  • Nach, H., & Lejeune, A. (2009, June 6). The impact of information technology on identity: Framing the research agenda. Proceedings of the Administrative Sciences Association of Canada (ASAC) Conference, 2009. https://ssrn.com/abstract=1713332.
  • The New Humanitarian (2018). Audit finds UN refugee agency critically mismanaged donor funds in Uganda. https://www.thenewhumanitarian.org/news/2018/11/28/audit-finds-un-refugee-agency-critically-mismanaged-donor-funds-uganda.
  • Nussbaum, M. (2003). Capabilities as fundamental entitlements: Sen and social justice. Feminist Economics, 9(2–3), 33–59. https://doi.org/10.1080/1354570022000077926
  • Phinney, J. S. (1990). Ethnic identity in adolescents and adults: Review of research. Psychological Bulletin, 108(3), 499. https://doi.org/10.1037/0033-2909.108.3.499
  • Poolman, C. (2012). Humanity in the capabilities approach to development. POLIS Journal, 7, 366–408.
  • Ramadan, A., & Fregonese, S. (2017). Hybrid sovereignty and the state of exception in the palestinian refugee camps in Lebanon. Annals of the American Association of Geographers, 107(4), 949–963. https://doi.org/10.1080/24694452.2016.1270189
  • Raymond, N. A. (2017). Beyond “Do No Harm” and individual consent: Reckoning with the emerging ethical challenges of civil society’s use of data. In L. Taylor, L. Floridi, & B. van der Sloot (Eds), Group privacy. Philosophical studies series, Vol. 126. Springer.
  • Saini, S., Sharma, S., Gulati, A., Hussain, S., & von Braun, J. (2017, August 15). Indian food and welfare schemes: Scope for digitization towards cash transfers. ZEF-Discussion Papers on Development Policy No. 241. https://doi.org/10.2139/ssrn.3019115.
  • Schmitt, P., Iland, D., Belding, E., Tomaszewski, B., Xu, Y., & Maitland, C (2016). Community-level access divides: A refugee camp case study. In Proceedings of the eighth international conference on information and communication technologies and development (p. 25).
  • Segovia (2020). https://www.thesegovia.com/.
  • Shami, S. (1996). Transnationalism and refugee studies: Rethinking forced migration and identity in the Middle East. Journal of Refugee Studies, 9(1), 3–26. https://doi.org/10.1093/jrs/9.1.3
  • Smeekes, A., Verkuyten, M., Çelebi, E., Acartürk, C., & Onkun, S. (2017). Social identity continuity and mental health among Syrian refugees in Turkey. Social Psychiatry and Psychiatric Epidemiology, 52(10), 1317–1324. https://doi.org/10.1007/s00127-017-1424-7
  • Spivak, R. G. G. C., & Said, E. W.. (1988). Selected subaltern studies. Oxford University Press.
  • Stickel, O., Hornung, D., Aal, K., Rohde, M., & Wulf, V. (2015). 3D Printing with Marginalized Children-An Exploration in a Palestinian Refugee Camp. In ECSCW 2015: Proceedings of the 14th European Conference on Computer Supported Cooperative Work, 19–23 September 2015, Oslo, Norway, Nina Boulus-Rødje, Gunnar Ellingsen, Tone Bratteteig, Margunn Aanestad, Pernille Bjørn. Springer.
  • Tajfel, H., & Turner, J. C. (1979). An integrative theory of intergroup conflict. In W. G. Austin & S. Worchel (Eds.), The social psychology of intergroup relations (pp. 33–47). Brooks/Cole.
  • Talhouk, R., Bartindale, T., Montague, K., Mesmar, S., Akik, C., Ghassani, A., & Balaam, M. (2017). Implications of synchronous IVR radio on Syrian refugee health and community dynamics. In Proceedings of the 8th international conference on communities and technologies (pp. 193–202).
  • Talhouk, R., Mesmar, S., Thieme, A., Balaam, M., Olivier, P., Akik, C., & Ghattas, H. (2016). Syrian refugees and digital health in Lebanon: Opportunities for improving antenatal health. In Proceedings of the 2016 chi conference on human factors in computing systems (pp. 331–342).
  • Taylor, L. (2017). What is data justice? The case for connecting digital rights and freedoms globally. Big Data & Society, 4(2), 2053951717736335. https://doi.org/10.1177/2053951717736335
  • Taylor, L., & Broeders, D. (2015). In the name of development: Power, profit and the datafication of the global south. Geoforum, 64, 229-–237. https://doi.org/10.1016/j.geoforum.2015.07.002.
  • Tuastad, D. (2017). “State of exception” or “state in exile”? The fallacy of appropriating agamben on Palestinian refugee camps. Third World Quarterly, 38(9), 2159–2170. https://doi.org/10.1080/01436597.2016.1256765
  • Uganda Office of the Prime Minister (2018). Refugees management. https://opm.go.ug/refugees-management.
  • UNHCR (2018a). Biometric identity management system. http://www.unhcr.org/en-us/protection/basic/550c304c9/biometric-identity-management-system.html.
  • UNHCR (2018b). Bridging the identity divide – is portable user-centric identity management the answer? https://www.unhcr.org/blogs/bridging-identity-divide-portable-user-centric-identity-management-answer/.
  • UNHCR (2018c). Introduction to the guidance on registration and identity management. https://www.unhcr.org/registration-guidance/chapter1/introduction-to-the-guidance-on-registration/.
  • UNHCR (2018d). Jordan factsheet. https://reliefweb.int/report/jordan/unhcr-jordan-factsheet-june-2018.
  • UNHCR (2018e). Lebanon. http://www.unhcr.org/lb/shelter.
  • UNHCR (2018f). PRIMES: Population registration and identity management EcoSystem. https://www.unhcr.org/primes.html.
  • UNHCR (2018g). Registration via ProGres. http://www.unhcr.org/en-us/registration.html.
  • UNHCR (2018h). Syrian regional refugee response. https://data2.unhcr.org/en/situations/syria/location/36.
  • UNHCR (2018i). Uganda. https://data2.unhcr.org/en/country/uga.
  • UNHCR (2019). Displaced & disconnected. https://www.unhcr.org/innovation/wp-content/uploads/2019/04/Displaced-Disconnected-WEB.pdf.
  • UNHCR (2020). Registration tools. https://www.unhcr.org/registration-guidance/chapter3/registration-tools/.
  • Wajcman, J. (2004). Technofeminism. Polity.
  • Waterman, A. S. (1982). Identity development from adolescence to adulthood: An extension of theory and a review of research. Developmental Psychology, 18(3), 341–358. https://doi.org/10.1037/0012-1649.18.3.341
  • Whitley, E. A., Gal, U., & Kjaergaard, A. (2014). Who do you think you are? A review of the complex interplay between information systems, identification and identity. Springer.
  • World Vision International (2020). Last mile mobile solutions. https://lmms.org/.
  • Xu, Y., Holzer, A., Maitland, C., & Gillet, D. (2017). Community building with co-located social media: A field experiment with syrian refugees. In Proceedings of the ninth international conference on information and communication technologies and development (p. 16).
  • Xu, Y., & Maitland, C. (2016). Communication behaviors when displaced: A case study of Za'atari Syrian refugee camp. In Proceedings of the eighth international conference on information and communication technologies and development (p. 58).
  • Xu, Y., & Maitland, C. (2017). Mobilizing assets: Data-driven community development with refugees. In Proceedings of the ninth international conference on information and communication technologies and development (p. 10).
  • Xu, Y., Maitland, C., & Tomaszewski, B. (2015). Promoting participatory community building in refugee camps with mapping technology. In Proceedings of the seventh international conference on information and communication technologies and development (p. 67).
  • Yafi, D. E., & Fisher, K. E. (2018). Syrian youth in Za’atari refugee camp as ICT wayfarers: An exploratory study using LEGO and storytelling. In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS ’18). Association for Computing Machinery, New York, NY, USA, Article 32, 1–12. https://doi.org/10.1145/3209811.3209873.
  • Yafi, E., Yefimova, K., & Fisher, K. E. (2018). Young hackers: Hacking technology at Za'atari Syrian refugee camp. In Extended abstracts of the 2018 chi conference on human factors in computing systems (p. CS21).
  • Yerousis, G., Aal, K., von Rekowski, T., Randall, D. W., Rohde, M., & Wulf, V. (2015). Computer-enabled project spaces: Connecting with Palestinian refugees across camp boundaries. In Proceedings of the 33rd annual acm conference on human factors in computing systems (pp. 3749–3758).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.