SlideShare a Scribd company logo
information practices of
humanitarian organizations
serving the undocumented:
towards a conceptualization of
digital sanctuary
Sara Vannini, University of Washington
roadmap
1. context: migration - and the US
2. sanctuary: theoretical underpinnings and
current practices
3. data and information: security, privacy, risks
4. humanitarian organizations info practices: a
case study
5. towards a conceptualization of digital
sanctuary
context
we are now witnessing the highest levels of displacement on record
[Source: UNHCR, 2016]
[Source: UNHCR, 2016]
Photo: thomasinlowell.com/tomblog/
© Tomas Castelazo, www.tomascastelazo.com / Wikimedia Commons
the most heavily patrolled land border in the world
● the wall
● deportation force
● detention centers
● attack to “sanctuary administrations”
● end DACA and TPS programs
Trump’s immigration policy
Photo: datasaurus-rex.com(AP Photo/Jacquelyn Martin)
Photograph: Jewel Samad/AFP/Getty Images
Photo: tribunaemportugues.com/
sanctuary
sanctuary:
the provision of a safe space
in the face of a threat
[Rabben, 2016; Carney et al., 2017]
asylum seekers, migrants, people under the threat of detention,
deportation, or incarceration
sanctuary: conceptualizations
faith-based theme present in all of the major religions
and many of the smaller spiritual traditions:
• welcoming and protecting the stranger
• spatial institutionalization of religious structures
[Rabben, 2016; Snyder, 2012]
sanctuary: conceptualizations
Europe: offer of protection through church asylum to
those accused of crimes by sovereign forms of power
• both tradition and recognized by the law (England
1000+ years)
• abolished mostly in XVII and XVII centuries - in favor
of the rule of law and progress
[Shoemaker, 2011]
sanctuary: conceptualizations
Practices as alternative form of justice continued in
many part of the world:
• actual provision or symbolic act of defiance
• ethical values and protection = necessary opposition
when wrongful decisions or political expediency
[Shoemaker, 2011]
sanctuary practices and symbols adopted by and
merged with numerous secular institutions, but its
religious origins remain important:
• faith-based actors still critical partners
• strong collective memory as a religiously-sanctioned
form of alternative justice remains
• faith-based actors’ readiness to contest policies and
laws that abrogate the higher law of God
sanctuary: conceptualizations
[Ager, 2011; Barnett and Stein, 2012; Cunningham, 1995; Marfleet,
2011; Miller, 2015; Rabben, 2016; Riera and Poiriet, 2014]
the sanctuary movement
the sanctuary movement
data and information
ICTs introduce new security risks:
○ security breakages
○ leaks
○ inadvertent disclosure
○ hacks
○ court requests
maintaining privacy is especially difficult for those
who are marginalized in other areas of life
[Eubanks, 2017; Marwick & Boyd, 2018]
"the ability to achieve privacy often
requires the privilege to make choices
and create structures that make such
freedoms possible”
[Marwick & Boyd, 2018]
freedom vs coercion
privilege vs marginalization
power privilege vs systematic structural oppression
[Eubanks, 2017; Marwick & Boyd, 2018]
technology, information and data –
● how can we protect/not put at further risks
the most vulnerable?
● what would a digital sanctuary look like?
humanitarian information
practices
Humanitarian organizations rely on:
• people’s privacy self-management
• third parties for data security
• low tech methods for privacy protection
Humanitarian organizations lack training on data
privacy management
Humanitarian organizations rely on:
• people’s privacy self-management
• third parties for data security
• low tech methods for privacy protection
Humanitarian organizations lack training on data
privacy management
digital sanctuary
less data
less technology
“oath of non-harm for an age of big data”
● do not collect data for data’s sake, nor keep it
just because I can
● remember [that] the technologies I design are
not aimed at data points, probabilities, or
patterns, but at human beings
[Eubanks, 2017]
“can higher education save the web?”
● audit student data repositories and policies
associated with third-party providers
○ data policies of third-party vendors?
○ student’ agency?
● have a standard about how to handle external
inquiries for student data and information
● rethink student-tracking protocols
[Collier, 2017]
ways forward?
less data
more support - exposure - voice
thank you!
• Gomez, R., Vannini, S., et al. (submitted) Humanitarian
Organizations Information Practices: procedures and
privacy concerns for serving the Undocumented.
• Vannini, S., Gomez, R., Carney, M. A., Mitchell, K. (in
press, Aug. 2018). Interdisciplinary approaches to refugee
and migration studies: Lessons from collaborative research
on sanctuary in the changing times of Trump. Migration
and Society (Vol. 1,1).
• Carney, M. A., Mitchell, K., Gomez, R., Vannini,
S. (2017) Sanctuary Planet: A Global Sanctuary Movement
for the Time of Trump. Environment and Planning D:
Society and Space.

More Related Content

What's hot

9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
orosalobarbio
 
Using social media to address professional issues in LIS
Using social media to address professional issues in LISUsing social media to address professional issues in LIS
Using social media to address professional issues in LIS
MmIT - Multimedia Information Technology Group for CILIP
 
Terrorism
TerrorismTerrorism
Terrorism
Jashan Kainth
 
Linked Ocean Data
Linked Ocean DataLinked Ocean Data
Linked Ocean Data
Adam Leadbetter
 
IAOS 2018 - Official statistics and Indigenous People – the state of play and...
IAOS 2018 - Official statistics and Indigenous People – the state of play and...IAOS 2018 - Official statistics and Indigenous People – the state of play and...
IAOS 2018 - Official statistics and Indigenous People – the state of play and...
StatsCommunications
 
FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?
Robin Rice
 

What's hot (6)

9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
Using social media to address professional issues in LIS
Using social media to address professional issues in LISUsing social media to address professional issues in LIS
Using social media to address professional issues in LIS
 
Terrorism
TerrorismTerrorism
Terrorism
 
Linked Ocean Data
Linked Ocean DataLinked Ocean Data
Linked Ocean Data
 
IAOS 2018 - Official statistics and Indigenous People – the state of play and...
IAOS 2018 - Official statistics and Indigenous People – the state of play and...IAOS 2018 - Official statistics and Indigenous People – the state of play and...
IAOS 2018 - Official statistics and Indigenous People – the state of play and...
 
FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?FAIR vs GDPR: which will win?
FAIR vs GDPR: which will win?
 

Similar to towards a conceptualization of digital sanctuary

Lak15workshop vulnerability
Lak15workshop vulnerabilityLak15workshop vulnerability
Lak15workshop vulnerability
Sharon Slade
 
Student vulnerability, agency and learning analytics: an exploration
Student vulnerability, agency and learning analytics: an explorationStudent vulnerability, agency and learning analytics: an exploration
Student vulnerability, agency and learning analytics: an exploration
University of South Africa (Unisa)
 
Collecting, analysing & using student data: Breaking or serving cycles of in...
Collecting, analysing  & using student data: Breaking or serving cycles of in...Collecting, analysing  & using student data: Breaking or serving cycles of in...
Collecting, analysing & using student data: Breaking or serving cycles of in...
University of South Africa (Unisa)
 
Balancing cost, quality and access with care in online education: the role of...
Balancing cost, quality and access with care in online education: the role of...Balancing cost, quality and access with care in online education: the role of...
Balancing cost, quality and access with care in online education: the role of...
University of South Africa (Unisa)
 
CM2017conf Keynote Bronwyn Hemsley SOCIAL MEDIA and AAC
CM2017conf Keynote Bronwyn Hemsley SOCIAL MEDIA and AACCM2017conf Keynote Bronwyn Hemsley SOCIAL MEDIA and AAC
CM2017conf Keynote Bronwyn Hemsley SOCIAL MEDIA and AAC
Bronwyn Hemsley
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
University of South Africa (Unisa)
 
A brave new world: student surveillance in higher education
A brave new world: student surveillance in higher educationA brave new world: student surveillance in higher education
A brave new world: student surveillance in higher education
University of South Africa (Unisa)
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
Charleston Conference
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of Information
Fiona Beals
 
Big data and development
Big data and developmentBig data and development
Big data and development
Simone Sala
 
Knowledge organisation and ethics
Knowledge organisation and ethicsKnowledge organisation and ethics
Knowledge organisation and ethics
CILIP
 
NACDD: Navigating Healthcare Using Supported Decision Making (David Lord & Di...
NACDD: Navigating Healthcare Using Supported Decision Making (David Lord & Di...NACDD: Navigating Healthcare Using Supported Decision Making (David Lord & Di...
NACDD: Navigating Healthcare Using Supported Decision Making (David Lord & Di...
National Association of Councils on Developmental Disabilities
 
9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx
Kenneth James Alamillo
 
9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx
BenjieBarlaan
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
Mark Jhon Oxillo
 
9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf
RegineArellano2
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
leejhayacosido
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
JhouBautista
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
rommelaa
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
leejhayacosido
 

Similar to towards a conceptualization of digital sanctuary (20)

Lak15workshop vulnerability
Lak15workshop vulnerabilityLak15workshop vulnerability
Lak15workshop vulnerability
 
Student vulnerability, agency and learning analytics: an exploration
Student vulnerability, agency and learning analytics: an explorationStudent vulnerability, agency and learning analytics: an exploration
Student vulnerability, agency and learning analytics: an exploration
 
Collecting, analysing & using student data: Breaking or serving cycles of in...
Collecting, analysing  & using student data: Breaking or serving cycles of in...Collecting, analysing  & using student data: Breaking or serving cycles of in...
Collecting, analysing & using student data: Breaking or serving cycles of in...
 
Balancing cost, quality and access with care in online education: the role of...
Balancing cost, quality and access with care in online education: the role of...Balancing cost, quality and access with care in online education: the role of...
Balancing cost, quality and access with care in online education: the role of...
 
CM2017conf Keynote Bronwyn Hemsley SOCIAL MEDIA and AAC
CM2017conf Keynote Bronwyn Hemsley SOCIAL MEDIA and AACCM2017conf Keynote Bronwyn Hemsley SOCIAL MEDIA and AAC
CM2017conf Keynote Bronwyn Hemsley SOCIAL MEDIA and AAC
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
 
A brave new world: student surveillance in higher education
A brave new world: student surveillance in higher educationA brave new world: student surveillance in higher education
A brave new world: student surveillance in higher education
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of Information
 
Big data and development
Big data and developmentBig data and development
Big data and development
 
Knowledge organisation and ethics
Knowledge organisation and ethicsKnowledge organisation and ethics
Knowledge organisation and ethics
 
NACDD: Navigating Healthcare Using Supported Decision Making (David Lord & Di...
NACDD: Navigating Healthcare Using Supported Decision Making (David Lord & Di...NACDD: Navigating Healthcare Using Supported Decision Making (David Lord & Di...
NACDD: Navigating Healthcare Using Supported Decision Making (David Lord & Di...
 
9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx
 
9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx9-ictasplatformforchange-180206004734(1).pptx
9-ictasplatformforchange-180206004734(1).pptx
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf9-ictasplatformforchange-180206004734.pdf
9-ictasplatformforchange-180206004734.pdf
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 

More from Sara Vannini

Visual Methodologies in Participatory ICT4D
Visual Methodologies in Participatory ICT4DVisual Methodologies in Participatory ICT4D
Visual Methodologies in Participatory ICT4D
Sara Vannini
 
Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants
Privacy and Security guidelines for Humanitarian Work with Undocumented MigrantsPrivacy and Security guidelines for Humanitarian Work with Undocumented Migrants
Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants
Sara Vannini
 
Unmasking ICT through visual methodologies in participatory ICT4D
Unmasking ICT through visual methodologies in participatory ICT4DUnmasking ICT through visual methodologies in participatory ICT4D
Unmasking ICT through visual methodologies in participatory ICT4D
Sara Vannini
 
Mobile phones and other information practices among undocumented migrants at ...
Mobile phones and other information practices among undocumented migrants at ...Mobile phones and other information practices among undocumented migrants at ...
Mobile phones and other information practices among undocumented migrants at ...
Sara Vannini
 
Fotohistorias - Security and Activism: using participatory photography to eli...
Fotohistorias - Security and Activism: using participatory photography to eli...Fotohistorias - Security and Activism: using participatory photography to eli...
Fotohistorias - Security and Activism: using participatory photography to eli...
Sara Vannini
 
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...
Sara Vannini
 
FOTOHISTORIAS: vidas en la frontera, en EEUU y en el territorio.
FOTOHISTORIAS:  vidas en la frontera, en EEUU y en el territorio.FOTOHISTORIAS:  vidas en la frontera, en EEUU y en el territorio.
FOTOHISTORIAS: vidas en la frontera, en EEUU y en el territorio.
Sara Vannini
 
Dissertation Defense - Social Representations of CMCs in Mozambique
Dissertation Defense - Social Representations of CMCs in MozambiqueDissertation Defense - Social Representations of CMCs in Mozambique
Dissertation Defense - Social Representations of CMCs in Mozambique
Sara Vannini
 
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...
Sara Vannini
 
Participatory re-action: reflecting on a Design-Based Research approach in ICT4D
Participatory re-action: reflecting on a Design-Based Research approach in ICT4DParticipatory re-action: reflecting on a Design-Based Research approach in ICT4D
Participatory re-action: reflecting on a Design-Based Research approach in ICT4D
Sara Vannini
 
Reasons for non-use: a study on Mozambican telecentres,
 Reasons for non-use: a study on Mozambican telecentres, Reasons for non-use: a study on Mozambican telecentres,
Reasons for non-use: a study on Mozambican telecentres,
Sara Vannini
 
Photo-Elicitation @ CIRN 2013
Photo-Elicitation @ CIRN 2013Photo-Elicitation @ CIRN 2013
Photo-Elicitation @ CIRN 2013
Sara Vannini
 
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...Formal & Informal Learning practices in Community Multimedia Centres in Mozam...
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...
Sara Vannini
 
PhD progresses @ 4th Cross-Field Residential Seminar
PhD progresses @ 4th Cross-Field Residential SeminarPhD progresses @ 4th Cross-Field Residential Seminar
PhD progresses @ 4th Cross-Field Residential Seminar
Sara Vannini
 
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation study
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation studyIFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation study
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation study
Sara Vannini
 
RE-ACT @ Crossfield
RE-ACT @ CrossfieldRE-ACT @ Crossfield
RE-ACT @ Crossfield
Sara Vannini
 
Inbound and Outbound Information and Communication Flows
Inbound and Outbound Information and Communication FlowsInbound and Outbound Information and Communication Flows
Inbound and Outbound Information and Communication Flows
Sara Vannini
 
Intro ai Telecentri e ai CMC in Mozambico
Intro ai Telecentri e ai CMC in MozambicoIntro ai Telecentri e ai CMC in Mozambico
Intro ai Telecentri e ai CMC in Mozambico
Sara Vannini
 
Intro to ICT4D, digital divide, and telecentres
Intro to ICT4D, digital divide, and telecentresIntro to ICT4D, digital divide, and telecentres
Intro to ICT4D, digital divide, and telecentres
Sara Vannini
 
Social Representations of CMCs in Mozambique: work in progress @ TASCHA
Social Representations of CMCs in Mozambique: work in progress @ TASCHASocial Representations of CMCs in Mozambique: work in progress @ TASCHA
Social Representations of CMCs in Mozambique: work in progress @ TASCHA
Sara Vannini
 

More from Sara Vannini (20)

Visual Methodologies in Participatory ICT4D
Visual Methodologies in Participatory ICT4DVisual Methodologies in Participatory ICT4D
Visual Methodologies in Participatory ICT4D
 
Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants
Privacy and Security guidelines for Humanitarian Work with Undocumented MigrantsPrivacy and Security guidelines for Humanitarian Work with Undocumented Migrants
Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants
 
Unmasking ICT through visual methodologies in participatory ICT4D
Unmasking ICT through visual methodologies in participatory ICT4DUnmasking ICT through visual methodologies in participatory ICT4D
Unmasking ICT through visual methodologies in participatory ICT4D
 
Mobile phones and other information practices among undocumented migrants at ...
Mobile phones and other information practices among undocumented migrants at ...Mobile phones and other information practices among undocumented migrants at ...
Mobile phones and other information practices among undocumented migrants at ...
 
Fotohistorias - Security and Activism: using participatory photography to eli...
Fotohistorias - Security and Activism: using participatory photography to eli...Fotohistorias - Security and Activism: using participatory photography to eli...
Fotohistorias - Security and Activism: using participatory photography to eli...
 
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...
 
FOTOHISTORIAS: vidas en la frontera, en EEUU y en el territorio.
FOTOHISTORIAS:  vidas en la frontera, en EEUU y en el territorio.FOTOHISTORIAS:  vidas en la frontera, en EEUU y en el territorio.
FOTOHISTORIAS: vidas en la frontera, en EEUU y en el territorio.
 
Dissertation Defense - Social Representations of CMCs in Mozambique
Dissertation Defense - Social Representations of CMCs in MozambiqueDissertation Defense - Social Representations of CMCs in Mozambique
Dissertation Defense - Social Representations of CMCs in Mozambique
 
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...
 
Participatory re-action: reflecting on a Design-Based Research approach in ICT4D
Participatory re-action: reflecting on a Design-Based Research approach in ICT4DParticipatory re-action: reflecting on a Design-Based Research approach in ICT4D
Participatory re-action: reflecting on a Design-Based Research approach in ICT4D
 
Reasons for non-use: a study on Mozambican telecentres,
 Reasons for non-use: a study on Mozambican telecentres, Reasons for non-use: a study on Mozambican telecentres,
Reasons for non-use: a study on Mozambican telecentres,
 
Photo-Elicitation @ CIRN 2013
Photo-Elicitation @ CIRN 2013Photo-Elicitation @ CIRN 2013
Photo-Elicitation @ CIRN 2013
 
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...Formal & Informal Learning practices in Community Multimedia Centres in Mozam...
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...
 
PhD progresses @ 4th Cross-Field Residential Seminar
PhD progresses @ 4th Cross-Field Residential SeminarPhD progresses @ 4th Cross-Field Residential Seminar
PhD progresses @ 4th Cross-Field Residential Seminar
 
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation study
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation studyIFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation study
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation study
 
RE-ACT @ Crossfield
RE-ACT @ CrossfieldRE-ACT @ Crossfield
RE-ACT @ Crossfield
 
Inbound and Outbound Information and Communication Flows
Inbound and Outbound Information and Communication FlowsInbound and Outbound Information and Communication Flows
Inbound and Outbound Information and Communication Flows
 
Intro ai Telecentri e ai CMC in Mozambico
Intro ai Telecentri e ai CMC in MozambicoIntro ai Telecentri e ai CMC in Mozambico
Intro ai Telecentri e ai CMC in Mozambico
 
Intro to ICT4D, digital divide, and telecentres
Intro to ICT4D, digital divide, and telecentresIntro to ICT4D, digital divide, and telecentres
Intro to ICT4D, digital divide, and telecentres
 
Social Representations of CMCs in Mozambique: work in progress @ TASCHA
Social Representations of CMCs in Mozambique: work in progress @ TASCHASocial Representations of CMCs in Mozambique: work in progress @ TASCHA
Social Representations of CMCs in Mozambique: work in progress @ TASCHA
 

Recently uploaded

cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 

Recently uploaded (11)

cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 

towards a conceptualization of digital sanctuary

  • 1. information practices of humanitarian organizations serving the undocumented: towards a conceptualization of digital sanctuary Sara Vannini, University of Washington
  • 2. roadmap 1. context: migration - and the US 2. sanctuary: theoretical underpinnings and current practices 3. data and information: security, privacy, risks 4. humanitarian organizations info practices: a case study 5. towards a conceptualization of digital sanctuary
  • 4. we are now witnessing the highest levels of displacement on record [Source: UNHCR, 2016]
  • 7. © Tomas Castelazo, www.tomascastelazo.com / Wikimedia Commons
  • 8. the most heavily patrolled land border in the world
  • 9.
  • 10. ● the wall ● deportation force ● detention centers ● attack to “sanctuary administrations” ● end DACA and TPS programs Trump’s immigration policy
  • 11. Photo: datasaurus-rex.com(AP Photo/Jacquelyn Martin) Photograph: Jewel Samad/AFP/Getty Images Photo: tribunaemportugues.com/
  • 13. sanctuary: the provision of a safe space in the face of a threat [Rabben, 2016; Carney et al., 2017] asylum seekers, migrants, people under the threat of detention, deportation, or incarceration
  • 14. sanctuary: conceptualizations faith-based theme present in all of the major religions and many of the smaller spiritual traditions: • welcoming and protecting the stranger • spatial institutionalization of religious structures [Rabben, 2016; Snyder, 2012]
  • 15. sanctuary: conceptualizations Europe: offer of protection through church asylum to those accused of crimes by sovereign forms of power • both tradition and recognized by the law (England 1000+ years) • abolished mostly in XVII and XVII centuries - in favor of the rule of law and progress [Shoemaker, 2011]
  • 16. sanctuary: conceptualizations Practices as alternative form of justice continued in many part of the world: • actual provision or symbolic act of defiance • ethical values and protection = necessary opposition when wrongful decisions or political expediency [Shoemaker, 2011]
  • 17. sanctuary practices and symbols adopted by and merged with numerous secular institutions, but its religious origins remain important: • faith-based actors still critical partners • strong collective memory as a religiously-sanctioned form of alternative justice remains • faith-based actors’ readiness to contest policies and laws that abrogate the higher law of God sanctuary: conceptualizations [Ager, 2011; Barnett and Stein, 2012; Cunningham, 1995; Marfleet, 2011; Miller, 2015; Rabben, 2016; Riera and Poiriet, 2014]
  • 21.
  • 22. ICTs introduce new security risks: ○ security breakages ○ leaks ○ inadvertent disclosure ○ hacks ○ court requests
  • 23.
  • 24. maintaining privacy is especially difficult for those who are marginalized in other areas of life [Eubanks, 2017; Marwick & Boyd, 2018]
  • 25. "the ability to achieve privacy often requires the privilege to make choices and create structures that make such freedoms possible” [Marwick & Boyd, 2018]
  • 26. freedom vs coercion privilege vs marginalization power privilege vs systematic structural oppression [Eubanks, 2017; Marwick & Boyd, 2018]
  • 27. technology, information and data – ● how can we protect/not put at further risks the most vulnerable? ● what would a digital sanctuary look like?
  • 29.
  • 30. Humanitarian organizations rely on: • people’s privacy self-management • third parties for data security • low tech methods for privacy protection Humanitarian organizations lack training on data privacy management
  • 31. Humanitarian organizations rely on: • people’s privacy self-management • third parties for data security • low tech methods for privacy protection Humanitarian organizations lack training on data privacy management
  • 34. “oath of non-harm for an age of big data” ● do not collect data for data’s sake, nor keep it just because I can ● remember [that] the technologies I design are not aimed at data points, probabilities, or patterns, but at human beings [Eubanks, 2017]
  • 35. “can higher education save the web?” ● audit student data repositories and policies associated with third-party providers ○ data policies of third-party vendors? ○ student’ agency? ● have a standard about how to handle external inquiries for student data and information ● rethink student-tracking protocols [Collier, 2017]
  • 37. less data more support - exposure - voice
  • 38. thank you! • Gomez, R., Vannini, S., et al. (submitted) Humanitarian Organizations Information Practices: procedures and privacy concerns for serving the Undocumented. • Vannini, S., Gomez, R., Carney, M. A., Mitchell, K. (in press, Aug. 2018). Interdisciplinary approaches to refugee and migration studies: Lessons from collaborative research on sanctuary in the changing times of Trump. Migration and Society (Vol. 1,1). • Carney, M. A., Mitchell, K., Gomez, R., Vannini, S. (2017) Sanctuary Planet: A Global Sanctuary Movement for the Time of Trump. Environment and Planning D: Society and Space.