{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T03:36:21Z","timestamp":1771040181937,"version":"3.50.1"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030125530","type":"print"},{"value":"9783030125547","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12554-7_5","type":"book-chapter","created":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T06:03:35Z","timestamp":1567749815000},"page":"87-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["\u201cDo No Harm\u201d in the Age of Big Data: Data, Ethics, and the Refugees"],"prefix":"10.1007","author":[{"given":"Patrick","family":"Vinck","sequence":"first","affiliation":[]},{"given":"Phuong N.","family":"Pham","sequence":"additional","affiliation":[]},{"given":"Albert Ali","family":"Salah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,7]]},"reference":[{"issue":"2","key":"5_CR1","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s10551-016-3061-6","volume":"143","author":"S Brusoni","year":"2017","unstructured":"Brusoni S, Vaccaro A (2017) Ethics, technology and organizational innovation. J Bus Ethics 143(2):223\u2013226","journal-title":"J Bus Ethics"},{"key":"5_CR2","unstructured":"CHS (2014) The core humanitarian standard on quality and accountability. CHS Alliance, Group URD and the Sphere Project"},{"issue":"2","key":"5_CR3","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1080\/19331681.2017.1309310","volume":"14","author":"N Couldry","year":"2017","unstructured":"Couldry N (2017) Surveillance-democracy. J Inf Technol Polit 14(2):182\u2013188","journal-title":"J Inf Technol Polit"},{"key":"5_CR4","first-page":"93","volume":"55","author":"K Crawford","year":"2014","unstructured":"Crawford K, Schultz J (2014) Big data and due process: toward a framework to redress predictive privacy harms. BCL Rev 55:93","journal-title":"BCL Rev"},{"key":"5_CR5","first-page":"28","volume":"92","author":"K Cukier","year":"2013","unstructured":"Cukier K, Mayer-Schoenberger V (2013) The rise of big data: how it\u2019s changing the way we think about the world. Foreign Aff 92:28","journal-title":"Foreign Aff"},{"key":"5_CR6","unstructured":"Jacobsen KL (2015) Humanitarian technology: revisiting the do no harm debate. ODI humanitarian practice network. \n                  https:\/\/odihpn.org\/blog\/humanitarian-technology-revisiting-the-%C2%91do-no-harm%C2%92-debate\/"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Jones P (2017) Human rights, group rights, and peoples\u2019 rights. In: Human rights. Routledge, pp 277\u2013304","DOI":"10.4324\/9781315199955-7"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Kammourieh L, Baar T, Berens J, Letouz\u00e9 E, Manske J, Palmer J, Sangokoya D, Vinck P (2017) Group privacy in the age of big data. In: Group privacy. Springer, pp 37\u201366","DOI":"10.1007\/978-3-319-46608-8_3"},{"key":"5_CR9","unstructured":"Kemp S (2017) Digital in 2017 global overview report. We are social and hootsuite. \n                  https:\/\/wearesocial.com\/special-reports\/digital-in-2017-global-overview\/"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Kitchin R (2014) The data revolution: big data, open data, data infrastructures and their consequences. Sage Publications","DOI":"10.4135\/9781473909472"},{"issue":"3","key":"5_CR11","first-page":"27","volume":"48","author":"M Kosciejew","year":"2014","unstructured":"Kosciejew M (2014) Proposing a charter of personal data rights. Inf Manag J 48(3):27\u201332","journal-title":"Inf Manag J"},{"issue":"3","key":"5_CR12","doi-asserted-by":"publisher","first-page":"544","DOI":"10.2307\/3105385","volume":"27","author":"Melvin Kranzberg","year":"1986","unstructured":"Kranzberg M (1986) Technology and history: \u201cKranzberg\u2019s laws\u201d. Technol Cult 27(3):544\u2013560","journal-title":"Technology and Culture"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Latonero M, Gold Z (2015) Data, human rights & human security. Hum Rights Hum Secur","DOI":"10.2139\/ssrn.2643728"},{"key":"5_CR14","unstructured":"Letouz\u00e9 E, Vinck P, Kammourieh L (2015) The law, politics and ethics of cell phone data analytics. Data-pop alliance white paper series data-pop alliance, World Bank Group, Harvard humanitarian initiative, MIT Media Lab and Overseas Development Institute"},{"issue":"2","key":"5_CR15","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1257\/jep.21.2.153","volume":"21","author":"SD Levitt","year":"2007","unstructured":"Levitt SD, List JA (2007) What do laboratory experiments measuring social preferences reveal about the real world? J Econ Perspect 21(2):153\u2013174","journal-title":"J Econ Perspect"},{"key":"5_CR16","unstructured":"Mancini F, Letouze EF, Meier P, Vinck P, Musila GM, Muggah R, Diniz G, Puig\u00a0Larrauri H, Matveeva A, O\u2019Reilly M (2013) New technology and the prevention of violence and conflict. United States Institute of Peace"},{"key":"5_CR17","unstructured":"McDonald SM (2016) Ebola: a big data disaster-privacy, property, and the law of disaster experimentation. The Centre for Internet and Society"},{"issue":"884","key":"5_CR18","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1017\/S1816383112000318","volume":"93","author":"P Meier","year":"2011","unstructured":"Meier P (2011) New information technologies and their impact on the humanitarian sector. Int Rev Red Cross 93(884):1239\u20131263","journal-title":"Int Rev Red Cross"},{"key":"5_CR19","unstructured":"O\u2019Neil C (2017) Weapons of math destruction: how big data increases inequality and threatens democracy. Broadway Books"},{"key":"5_CR20","unstructured":"Parker B (2019) New UN deal with data mining firm Palantir raises protection concerns. The new humanitarian. \n                  http:\/\/www.thenewhumanitarian.org\/news\/2019\/02\/05\/un-palantir-deal-data-mining-protection-concerns-wfp\/"},{"issue":"4","key":"5_CR21","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1016\/j.geoforum.2009.04.004","volume":"40","author":"L Parks","year":"2009","unstructured":"Parks L (2009) Digging into Google earth: an analysis of \u201ccrisis in Darfur\u201d. Geoforum 40(4):535\u2013545","journal-title":"Geoforum"},{"issue":"2","key":"5_CR22","first-page":"106","volume":"14","author":"PN Pham","year":"2012","unstructured":"Pham PN, Vinck P (2012) Technology, conflict early warning systems, public health, and human rights. Health Hum Rights 14(2):106\u2013117","journal-title":"Health Hum Rights"},{"key":"5_CR23","unstructured":"Rogers EM (2003) Diffusion of innovations, 5th edn. Simon & Schuster International"},{"key":"5_CR24","unstructured":"Salah AA, Pentland A, Lepri B, Letouz\u00e9 E, Vinck P, de\u00a0Montjoye YA, Dong X, Da\u011fdelen \u00d6 (2018) Data for refugees: the D4R challenge on mobility of Syrian refugees in Turkey. arXiv preprint \n                  arXiv:180700523"},{"issue":"1","key":"5_CR25","doi-asserted-by":"publisher","first-page":"9","DOI":"10.5038\/1911-9933.11.1.1454","volume":"11","author":"Kristin Sandvik","year":"2017","unstructured":"Sandvik K, Raymond N (2017) Beyond the protective effect: towards a theory of harm for information communication technologies in mass atrocity response. Genocide Stud Prev Int J 11(1)","journal-title":"Genocide Studies and Prevention"},{"issue":"7","key":"5_CR26","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1177\/0191453714537263","volume":"40","author":"WE Scheuerman","year":"2014","unstructured":"Scheuerman WE (2014) Whistleblowing as civil disobedience: the case of Edward Snowden. Philos Social Crit 40(7):609\u2013628","journal-title":"Philos Social Crit"},{"key":"5_CR27","unstructured":"Smith B (2017) The need for a digital Geneva convention. The official Microsoft blog, 14"},{"key":"5_CR28","unstructured":"Sphere (2018) The sphere handbook: humanitarian charter and minimum standards in humanitarian response, 4th edn. Practical Action Publishing"},{"issue":"2","key":"5_CR29","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1177\/0263775815608851","volume":"34","author":"L Taylor","year":"2016","unstructured":"Taylor L (2016) No place to hide? The ethics and analytics of tracking mobility using mobile phone data. Environ Plann D Soc Space 34(2):319\u2013336","journal-title":"Environ Plann D Soc Space"},{"key":"5_CR30","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.geoforum.2015.07.002","volume":"64","author":"L Taylor","year":"2015","unstructured":"Taylor L, Broeders D (2015) In the name of development: power, profit and the datafication of the global south. Geoforum 64:229\u2013237","journal-title":"Geoforum"},{"key":"5_CR31","unstructured":"de\u00a0Terwangne C (2014) The right to be forgotten and informational autonomy in the digital environment. In: The ethics of memory in a digital age. Springer, pp 82\u2013101"},{"key":"5_CR32","unstructured":"US Department of Health, Education, and Welfare (1978) The national commission for the protection of human subjects of biomedical and behavioral research, The Belmont report: ethical principles and guidelines for the protection of human subjects of research. Department of health, education, and welfare, U.S"},{"issue":"2","key":"5_CR33","doi-asserted-by":"publisher","first-page":"197","DOI":"10.24908\/ss.v12i2.4776","volume":"12","author":"J Dijck Van","year":"2014","unstructured":"Van Dijck J (2014) Datafication, dataism and dataveillance: big data between scientific paradigm and ideology. Surveill Soc 12(2):197\u2013208","journal-title":"Surveill Soc"},{"key":"5_CR34","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-319-57959-7_10","volume-title":"The EU General Data Protection Regulation (GDPR)","author":"Paul Voigt","year":"2017","unstructured":"Voigt P, von\u00a0dem Bussche A (2017) The EU general data protection regulation (GDPR). A practical guide, 1st edn. Springer International Publishing, Cham"}],"container-title":["Guide to Mobile Data Analytics in Refugee Scenarios"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12554-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T06:04:46Z","timestamp":1567749886000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12554-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030125530","9783030125547"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12554-7_5","relation":{},"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"7 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}