Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3290605.3300411acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Accessing a New Land: Designing for a Social Conceptualisation of Access

Published: 02 May 2019 Publication History

Abstract

This paper presents a study of mobile phone use by people settling in a new land to access state provided digital services. It shows that digital literacy and access to technology are not the only resources and capabilities needed to successfully access digital services and do not guarantee a straightforward resettlement process. Using creative engagement methods, the research involved 132 "newcomers" seeking to settle in Sweden. Ribot and Peluso's theory of access (2003) was employed to examine the complex web of access experienced by our participants. We uncover that when communities are dealing with high levels of precarity, their primary concerns are related to accessing the benefits of a service, rather than controlling access. Broadening the HCI framework, the paper concludes that a sociotechnical model of access needs to connect access control and access benefit to facilitate the design of an effective digital service.

References

[1]
Khorshed Alam and Sophia Imran. 2015. The digital divide and social inclusion among refugee migrants: A case in regional Australia. Information Technology & People 28, 2 (2015), 344--365.
[2]
Asam Almohamed and Dhaval Vyas. 2016. Designing for the Marginalized: A step towards understanding the lives of refugees and asylum seekers. In Proceedings of the 2016 ACM Conference Companion Publication on Designing Interactive Systems. ACM, 165--168.
[3]
Susan Banki. 2013. Precarity of place: a complement to the growing precariat literature. Global Discourse 3, 3--4 (2013), 450--463.
[4]
Shannon Crawford Barniskis. 2014. Makerspaces and teaching artists. Teaching Artist Journal 12, 1 (2014), 6--14.
[5]
Emily Cochran Bech, Karin Borevi, and Per Mouritsen. 2017. A 'civic turn' in Scandinavian family migration policies? Comparing Denmark, Norway and Sweden. Comparative migration studies 5, 1 (2017), 7. Accessing a New Land CHI'19, May 2019, Glasgow, UK
[6]
David E Bell and Leonard J LaPadula. 1975. Computer security model: Unified exposition and multics interpretation. MITRE Corp., Bedford, MA, Tech. Rep. ESD-TR-75--306, June (1975).
[7]
Eric Brewer, Michael Demmer, Bowei Du, Melissa Ho, Matthew Kam, Sergiu Nedevschi, Joyojeet Pal, Rabin Patra, Sonesh Surana, and Kevin Fall. 2005. The case for technology in developing regions. Computer 38, 6 (2005), 25--38.
[8]
Grete Brochmann and Anniken Hagelund. 2012. Immigration policy and the Scandinavian welfare state 1945--2010. Palgrave Macmillan.
[9]
Judith Butler. 2006. Precarious life: The powers of mourning and violence. Verso.
[10]
Lizzie Coles-Kemp and René Rydhof Hansen. 2017. Walking the line: The everyday security ties that bind. In International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, 464--480.
[11]
Lizzie Coles-Kemp, Rikke Bjerg Jensen, and Reem Talhouk. 2018. In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 584.
[12]
Negin Dahya and Sarah Dryden-Peterson. 2017. Tracing pathways to higher education for refugees: the role of virtual support networks and mobile phones for women in refugee camps. Comparative Education 53, 2 (2017), 284--301.
[13]
Paul Dunphy, John Vines, Lizzie Coles-Kemp, Rachel Clarke, Vasilis Vlachokyriakos, Peter Wright, John McCarthy, and Patrick Olivier. 2014. Understanding the experience-centeredness of privacy and security technologies. In Proceedings of the 2014 New Security Paradigms Workshop. ACM, 83--94.
[14]
Nancy Ettlinger. 2007. Precarity unbound. Alternatives 32, 3 (2007), 319--340.
[15]
Ana Ferreira, Luis Antunes, David Chadwick, and Ricardo Correia. 2010. Grounding information security in healthcare. International Journal of Medical Informatics 79, 4 (2010), 268--283.
[16]
Ana Ferreira, David Chadwick, Pedro Farinha, Ricardo Correia, Gansen Zao, Rui Chilro, and Luis Antunes. 2009. How to securely break into RBAC: the BTG-RBAC model. In Computer Security Applications Conference, 2009. ACSAC'09. Annual. IEEE, 23--31.
[17]
Antonio Ferreira, Ricardo Cruz-Correia, Luis Antunes, Pedro Farinha, E Oliveira-Palhares, David W Chadwick, and Altamiro Costa-Pereira. 2006. How to break access control in a controlled manner. In ComputerBased Medical Systems, 2006. CBMS 2006. 19th IEEE International Symposium on. IEEE, 847--854.
[18]
Karen E Fisher. 2018. 5 Information Worlds of Refugees. Digital Lifeline?: ICTs for Refugees and Displaced Persons (2018), 79.
[19]
Karen E. Fisher and Eiad Yafi. 2018. Syrian Youth in Za'Atari Refugee Camp As ICT Wayfarers: An Exploratory Study Using LEGO and Storytelling. In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS '18). ACM, New York, NY, USA, Article 32, 12 pages.
[20]
Karen E Fisher, Katya Yefimova, and Eiad Yafi. 2016. Future's Butterflies: Co-Designing ICT Wayfaring Technology with Refugee Syrian Youth. In Proceedings of the The 15th International Conference on Interaction Design and Children. ACM, 25--36.
[21]
Anthony Giddens. 1984. The constitution of society: Outline of the theory of structure. Berkeley.
[22]
Marie Gillespie, Lawrence Ampofo, Margaret Cheesman, Becky Faith, Evgenia Iliadou, Ali Issa, Souad Osseiran, and Dimitris Skleparis. 2016. Mapping refugee media journeys: Smartphones and social media networks. (2016).
[23]
Dieter Gollmann. 2007. Security models. In The History of Information Security. Elsevier, 623--635.
[24]
Donna Haraway. 1985. A Cyborg Manifesto: Science, technology, and socialist-feminism in the late twentieth century. The cybercultures reader 291 (1985).
[25]
Nicholas Harney. 2013. Precarity, affect and problem solving with mobile phones by asylum seekers, refugees and migrants in Naples, Italy. Journal of Refugee Studies 26, 4 (2013), 541--557.
[26]
Natalie Helbig, J Ramón Gil-García, and Enrico Ferro. 2009. Understanding the complexity of electronic government: Implications from the digital divide literature. Government Information Quarterly 26, 1 (2009), 89--97.
[27]
Heather Horn. 2015. Coding a Way Out of the Refugee Crisis.
[28]
Heather A Horst and Erin B Taylor. 2014. The role of mobile phones in the mediation of border crossings: A study of Haiti and the Dominican Republic. The Australian Journal of Anthropology 25, 2 (2014), 155--170.
[29]
Philip G Inglesant and M Angela Sasse. 2010. The true cost of unusable password policies: password use in the wild. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 383--392.
[30]
Michelle C Johnson. 2013. Culture's calling: mobile phones, gender, and the making of an African migrant village in Lisbon. Anthropological Quarterly (2013), 163--190.
[31]
Asmita Kabra. 2018. Displacement, resettlement, and livelihood restoration: safeguard standards in practice. Development in Practice 28, 2 (2018), 269--279.
[32]
Dorothea Kleine. 2009. The ideology behind the technology--Chilean microentrepreneurs and public ICT policies. Geoforum 40, 2 (2009), 171--183.
[33]
Annemaree Lloyd, Mary Anne Kennan, Kim M Thompson, and Asim Qayyum. 2013. Connecting with new information landscapes: information literacy practices of refugees. Journal of Documentation 69, 1 (2013), 121--144.
[34]
Catherine A Lutz and Jane L Collins. 1993. A World Brightly Different: Photographic Conventions 1950--1986. University of Chicago Press.
[35]
Johan Magnusson, Dina Koutsikouri, and Päivärinta. 2018. Balanserande Styring av Utveckling vid Försäkringskassan. Slutrapport.
[36]
Carleen Maitland and Rakesh Bharania. 2017. Balancing Security and Other Requirements in Hastily Formed Networks: The Case of the Syrian Refugee Response. (2017).
[37]
Carleen Maitland and Ying Xu. 2015. A social informatics analysis of refugee mobile phone use: a case study of Za'atari Syrian Refugee Camp. (2015).
[38]
Bill McSweeney. 1999. Security, identity and interests: a sociology of international relations. Vol. 69. Cambridge University Press.
[39]
Indrani Medhi and Renee Kuriyan. 2007. Text-free UI: prospects and challenges for ICT access. In Proceedings of the 9th international conference on social implications of computers in developing countries, Sao Paulo, Brazil.
[40]
Cecilia Menjívar and Daniel Kanstroom. 2013. Constructing Immigrant'Illegality': Critiques, Experiences, and Responses. Cambridge University Press.
[41]
Melanie Nind and Jane Seale. 2009. Concepts of access for people with learning difficulties: towards a shared understanding. Disability & Society 24, 3 (2009), 273--287.
[42]
UK Cabinet Office. 2013. Government Digital Strategy: December 2013.
[43]
Ilse Oosterlaken. 2012. The capability approach, technology and design: Taking stock and looking ahead. In The capability approach, technology and design. Springer, 3--26.
[44]
Anastasia N Panagakos and Heather A Horst. 2006. Return to Cyberia: technology and the social worlds of transnational migrants. Global Networks 6, 2 (2006), 109--124. CHI'19, May 2019, Glasgow, UK Coles-Kemp and Jensen
[45]
Marcel Paret and Shannon Gleeson. 2016. Precarity and agency through a migration lens. Citizenship Studies 20, 3--4 (2016), 277--294.
[46]
Charles P Pfleeger and Shari Lawrence Pfleeger. 2002. Security in computing. Prentice Hall Professional Technical Reference.
[47]
Jesse C Ribot and Nancy Lee Peluso. 2003. A theory of access. Rural sociology 68, 2 (2003), 153--181.
[48]
Paul Roe. 2008. The 'value' of positive security. Review of International Studies 34, 4 (2008), 777--794.
[49]
Markus Rohde, Konstantin Aal, Kaoru Misaki, Dave Randall, Anne Weibert, and Volker Wulf. 2016. Out of Syria: Mobile Media in Use at the Time of Civil War. International Journal of Human-Computer Interaction 32, 7 (2016), 515--531.
[50]
Gillian Rose. 2016. Visual methodologies: An introduction to researching with visual materials. sage.
[51]
Ravi S Sandhu, Edward J Coyne, Hal L Feinstein, and Charles E Youman. 1996. Role-based access control models. Computer 29, 2 (1996), 38--47.
[52]
Siddharth Sareen. 2017. Who Governs Local Access in Jharkhand? Mechanisms of Access to Government Services. In Forum for Development Studies, Vol. 44. Taylor & Francis, 249--274.
[53]
Urmimala Sarkar, Andrew J Karter, Jennifer Y Liu, Nancy E Adler, Robert Nguyen, Andrea López, and Dean Schillinger. 2011. Social disparities in internet patient portal use in diabetes: evidence that the digital divide extends beyond access. Journal of the American Medical Informatics Association 18, 3 (2011), 318--321.
[54]
Martina Angela Sasse, Sacha Brostoff, and Dirk Weirich. 2001. Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT technology journal 19, 3 (2001), 122--131.
[55]
Carl-Ulrik Schierup, Aleksandra Ålund, and Branka Likic-Brboric. 2015. Migration, precarization and the democratic deficit in global governance. International migration 53, 3 (2015), 50--63.
[56]
Amartya Sen. 1985. Commodities and capabilities. Lectures in economics: Theory, institutions. Policy 7 (1985).
[57]
Amartya Sen. 2005. Human rights and capabilities. Journal of human development 6, 2 (2005), 151--166.
[58]
Nazli Senses. 2016. Rethinking migration in the context of precarity: The case of Turkey. Critical Sociology 42, 7--8 (2016), 975--987.
[59]
Mimi Sheller. 2016. On the Maintenance of Humanity: Learning from Refugee Mobile Practices. (2016).
[60]
Mario Sicuranza and Angelo Esposito. 2013. An access control model for easy management of patient privacy in EHR systems. In Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for. IEEE, 463--470.
[61]
Julie Soleil Archambault. 2011. Breaking up 'because of the phone' and the transformative potential of information in Southern Mozambique. New Media & Society 13, 3 (2011), 444--456.
[62]
UNHCR. 2016. Connecting Refugees: How Internet and Mobile Connectivity Can Improve Refugee Well-Being and Transform Humanitarian Action.
[63]
Alexander JAM Van Deursen and Jan AGM Van Dijk. 2014. The digital divide shifts to differences in usage. New media & society 16, 3 (2014), 507--526.
[64]
Steven Vertovec. 2009. Transnationalism. London and New York: Routledge (2009).
[65]
John Vines, Mark Blythe, Paul Dunphy, and Andrew Monk. 2011. Eighty something: banking for the older old. In Proceedings of the 25th BCS Conference on Human-Computer Interaction. British Computer Society, 64--73.
[66]
Melissa Wall, Madeline Otis Campbell, and Dana Janbek. 2017. Syrian refugees and information precarity. new media & society 19, 2 (2017), 240--254.
[67]
Raelene Wilding. 2009. Refugee youth, social inclusion, and ICTs: can good intentions go bad? Journal of Information, Communication and Ethics in Society 7, 2/3 (2009), 159--174.
[68]
Susan Wyche, Nightingale Simiyu, and Martha E Othieno. 2016. Mobile phones as amplifiers of social inequality among rural Kenyan women. ACM Transactions on Computer-Human Interaction (TOCHI) 23, 3 (2016), 14.

Cited By

View all
  • (2024)Security Patchworking in Lebanon: Infrastructuring Across Failing InfrastructuresProceedings of the ACM on Human-Computer Interaction10.1145/36373978:CSCW1(1-26)Online publication date: 26-Apr-2024
  • (2024)"I'm Constantly in This Dilemma": How Migrant Technology Professionals Perceive Social Media Recommendation AlgorithmsProceedings of the ACM on Human-Computer Interaction10.1145/36373428:CSCW1(1-33)Online publication date: 26-Apr-2024
  • (2024)Hostile Systems: A Taxonomy of Harms Articulated by Citizens Living with Socio-Economic DeprivationProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642562(1-17)Online publication date: 11-May-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
May 2019
9077 pages
ISBN:9781450359702
DOI:10.1145/3290605
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 May 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access theory
  2. digital services
  3. mobile phone
  4. refugees

Qualifiers

  • Research-article

Funding Sources

  • EPSRC

Conference

CHI '19
Sponsor:

Acceptance Rates

CHI '19 Paper Acceptance Rate 703 of 2,958 submissions, 24%;
Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

Upcoming Conference

CHI '25
CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)108
  • Downloads (Last 6 weeks)18
Reflects downloads up to 26 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Security Patchworking in Lebanon: Infrastructuring Across Failing InfrastructuresProceedings of the ACM on Human-Computer Interaction10.1145/36373978:CSCW1(1-26)Online publication date: 26-Apr-2024
  • (2024)"I'm Constantly in This Dilemma": How Migrant Technology Professionals Perceive Social Media Recommendation AlgorithmsProceedings of the ACM on Human-Computer Interaction10.1145/36373428:CSCW1(1-33)Online publication date: 26-Apr-2024
  • (2024)Hostile Systems: A Taxonomy of Harms Articulated by Citizens Living with Socio-Economic DeprivationProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642562(1-17)Online publication date: 11-May-2024
  • (2024)Politics of the Past: Understanding the Role of Memory, Postmemory, and Remembrance in Navigating the History of Migrant FamiliesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642496(1-17)Online publication date: 11-May-2024
  • (2024)Digital Security — A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00027(697-716)Online publication date: 19-May-2024
  • (2024)Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00004(617-634)Online publication date: 19-May-2024
  • (2023)Othered, silenced and scapegoatedProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620496(4625-4642)Online publication date: 9-Aug-2023
  • (2023)The importance of information acquisition to settlement services literacy for humanitarian migrants in AustraliaPLOS ONE10.1371/journal.pone.028004118:1(e0280041)Online publication date: 6-Jan-2023
  • (2023)‘Ought’ should not assume ‘Can’? Basic Capabilities in Cybersecurity to Ground Sen’s Capability ApproachProceedings of the 2023 New Security Paradigms Workshop10.1145/3633500.3633506(76-91)Online publication date: 18-Sep-2023
  • (2023)Literacy and the Process of Becoming Home: Learnings from an Interactive Storytelling-InitiativeProceedings of the ACM on Human-Computer Interaction10.1145/35795037:CSCW1(1-29)Online publication date: 16-Apr-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media