{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:48:25Z","timestamp":1776084505491,"version":"3.50.1"},"reference-count":124,"publisher":"Oxford University Press (OUP)","issue":"3","license":[{"start":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T00:00:00Z","timestamp":1678406400000},"content-version":"vor","delay-in-days":1,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,13]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The Rohingya ethnic group is one of the most persecuted minorities, whose specific circumstances pose unique and interesting challenges. The digital revolution is transforming the world and is leaving refugees behind (UNHCR). In this paper, we present a multiphase user centred approach we used to explore how Rohingya refugees could access assistance by utilizing technology they already have or share; both early on and long after they arrived in a new country. The findings we present from phase 1, which was an early participatory design phase, were confirmed and endorsed by the Rohingya community, UNHCR and local charities during phase 3. These findings, suggest that concepts aiming to assist Rohingya refugees should primarily focus on: safety, social capital, upskilling, and language translation. Finally, we present the iterative user centred design, implementation, and evaluation of one of these concepts focusing on safety, before being deployed within the Rohingya community in Malaysia.<\/jats:p>","DOI":"10.1093\/iwc\/iwad026","type":"journal-article","created":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T11:45:43Z","timestamp":1678448743000},"page":"481-509","source":"Crossref","is-referenced-by-count":6,"title":["Investigating Technology Concepts to Support Rohingya Refugees in Malaysia"],"prefix":"10.1093","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8211-0569","authenticated-orcid":false,"given":"Theodoros","family":"Georgiou","sequence":"first","affiliation":[{"name":"Heriot-Watt University , Computer Science, EH14 4AS, Edinburgh, UK"}]},{"given":"Lynne","family":"Baillie","sequence":"additional","affiliation":[{"name":"Heriot-Watt University , Computer Science, EH14 4AS, Edinburgh, UK"}]},{"given":"Gina","family":"Netto","sequence":"additional","affiliation":[{"name":"Heriot-Watt University , School of Energy, Geoscience, Infrastructure and Society, , EH14 4AS, Edinburgh, UK"},{"name":"The Urban Institute , School of Energy, Geoscience, Infrastructure and Society, , EH14 4AS, Edinburgh, UK"}]},{"given":"Sean","family":"Paterson","sequence":"additional","affiliation":[{"name":"Heriot-Watt University , Computer Science, EH14 4AS, Edinburgh, UK"}]}],"member":"286","published-online":{"date-parts":[[2023,3,9]]},"reference":[{"key":"2023101406513254600_ref1","article-title":"Rohingya alphabet, pronunciation and language","author":"Ager","year":"1998","journal-title":"Omniglot."},{"key":"2023101406513254600_ref2","doi-asserted-by":"crossref","DOI":"10.1111\/soc4.12802","article-title":"Mobile communication and refugees: an analytical review of academic literature","volume":"14","author":"Alencar","year":"2020","journal-title":"Sociol. Compass"},{"key":"2023101406513254600_ref3","first-page":"165","volume-title":"DIS 2016 Companion, Proceedings of the 2016 ACM Conference on Designing Interactive Systems: Fuse","author":"Almohamed","year":"2016"},{"key":"2023101406513254600_ref4","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1145\/3152771.3152778","volume-title":"Proceedings of the 29th Australian Conference on Human-Computer Interaction (OzCHI 2017)","author":"Almohamed","year":"2017"},{"key":"2023101406513254600_ref5","volume-title":"Proceedings of The 26th BCS Conference on Human Computer Interaction (HCI)","author":"Armagno","year":"2012"},{"key":"2023101406513254600_ref6","doi-asserted-by":"crossref","first-page":"2521","DOI":"10.1145\/2556288.2557353","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14)","author":"Ayoade","year":"2014"},{"key":"2023101406513254600_ref7","doi-asserted-by":"crossref","DOI":"10.4324\/9781351024662","volume-title":"Access to Higher Education: Refugees\u2019 Stories from Malaysia (1st Edn)","author":"Bailey","year":"2018"},{"key":"2023101406513254600_ref8","first-page":"100","volume-title":"Proceedings of the 7th international conference on Multimodal interfaces (ICMI '05)","author":"Baillie","year":"2005"},{"key":"2023101406513254600_ref9","first-page":"114","article-title":"Determining what individual SUS scores mean: adding an adjective rating scale","volume":"4","author":"Bangor","year":"2009","journal-title":"J. Usability Stud."},{"key":"2023101406513254600_ref10","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1080\/10447310802205776","article-title":"An empirical evaluation of the system usability scale","volume":"24","author":"Bangor","year":"2008","journal-title":"Int. J. Hum. Comput. Int."},{"key":"2023101406513254600_ref11","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1080\/23269995.2014.881139","article-title":"Precarity of place: a complement to the growing precariat literature","volume":"3","author":"Banki","year":"2013","journal-title":"Glob. Discourse"},{"key":"2023101406513254600_ref12","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1145\/1978942.1979041","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11)","author":"Bardzell","year":"2011"},{"key":"2023101406513254600_ref13","volume-title":"Myanmar Rohingya: What You Need to Know About the Crisis","author":"BBC News Asia","year":"2020"},{"key":"2023101406513254600_ref14","doi-asserted-by":"crossref","first-page":"1050","DOI":"10.1080\/1369118X.2017.1309444","article-title":"Rape: is there an app for that? An empirical analysis of the features of anti-rape apps","volume":"21","author":"Bivens","year":"2018","journal-title":"Inf. Commun. Soc."},{"key":"2023101406513254600_ref15","first-page":"1","volume-title":"Proceedings of the 2010 ICSE Workshop on Cooperative and Human Aspects of Software Engineering (CHASE '10)","author":"Blake","year":"2010"},{"key":"2023101406513254600_ref16","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1080\/07448481.2018.1446439","article-title":"Enlisting friends to reduce sexual victimization risk: there\u2019s an app for that\u2026 but nobody uses it","volume":"66","author":"Blayney","year":"2018","journal-title":"J. Am. Coll. Heal."},{"key":"2023101406513254600_ref17","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1145\/513665.513670","article-title":"The design collaboratorium: a place for usability design","volume":"9","author":"B\u00f8dker","year":"2002","journal-title":"ACM Trans. Comput. Hum. Interact."},{"key":"2023101406513254600_ref18","first-page":"185","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Boehner","year":"2012"},{"key":"2023101406513254600_ref19","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1145\/1240624.1240789","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '07)","author":"Boehner","year":"2007"},{"key":"2023101406513254600_ref20","first-page":"207","volume-title":"Usability Evaluation In Industry","author":"Brooke","year":"1996"},{"key":"2023101406513254600_ref21","first-page":"1","article-title":"Refugee and the post-trauma journeys in the fuzzy front end of co-creative practices","volume":"2","author":"Brown","year":"2018","journal-title":"Participatory Design Conference (PDC)"},{"key":"2023101406513254600_ref22","first-page":"321","article-title":"Designing for transient use","author":"Brown","year":"2016","journal-title":"Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16)"},{"key":"2023101406513254600_ref23","volume-title":"Keynote Address to Connected Communities Festival","author":"Brydon-Miller","year":"2013"},{"key":"2023101406513254600_ref24","first-page":"20","article-title":"Desperate lives: urban refugee women in Malaysia and Egypt","volume":"34","author":"Buscher","year":"2010","journal-title":"Forced Migr Rev"},{"key":"2023101406513254600_ref25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3145472","article-title":"Participatory design and participatory research: an HCI case study with young forced migrants","volume":"25","author":"Bustamante Duarte","year":"2018","journal-title":"ACM Tran. Comput. Hum. Interact."},{"key":"2023101406513254600_ref26","first-page":"1522","article-title":"Measurement invariance of the NASA TLX","volume":"3","author":"Bustamante","year":"2008","journal-title":"Proc. Hum. Factors Ergon. Soc."},{"key":"2023101406513254600_ref27","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1186\/s12939-018-0833-x","article-title":"The health needs and access barriers among refugees and asylum-seekers in Malaysia: a qualitative study","volume":"17","author":"Chuah","year":"2018","journal-title":"Int. J. Equity Health"},{"key":"2023101406513254600_ref28","first-page":"1","volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18)","author":"Coles-Kemp","year":"2018"},{"key":"2023101406513254600_ref29","first-page":"827","volume-title":"British Medical Journal","author":"Costello","year":"2000"},{"key":"2023101406513254600_ref30","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1080\/03050068.2016.1259877","article-title":"Tracing pathways to higher education for refugees: the role of virtual support networks and mobile phones for women in refugee camps","volume":"53","author":"Dahya","year":"2017","journal-title":"Comp. Educ."},{"key":"2023101406513254600_ref31","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1177\/2050157915592657","article-title":"App-centric mobile media and commoditization: implications for the future of the open web","volume":"4","author":"Daubs","year":"2016","journal-title":"Mob. Media Commun."},{"key":"2023101406513254600_ref32","first-page":"672","volume-title":"Digital Participation: Engaging Diverse and Marginalised Communities","author":"Davis","year":"2016"},{"key":"2023101406513254600_ref33","first-page":"46","volume-title":"Proceedings of the Fifth International Conference on Information and Communication Technologies and Development (ICTD '12)","author":"Dearden","year":"2012"},{"key":"2023101406513254600_ref34","first-page":"1","article-title":"The ethical limits of bungee research in ICTD","author":"Dearden","year":"2015","journal-title":"IEEE International Symposium on Technology and Society (ISTAS)"},{"key":"2023101406513254600_ref35","first-page":"2220","volume-title":"Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16)","author":"Dell","year":"2016"},{"key":"2023101406513254600_ref36","volume-title":"Washington Post","author":"Dewey","year":"2014"},{"key":"2023101406513254600_ref37","doi-asserted-by":"crossref","first-page":"1836","DOI":"10.1080\/1369183X.2015.1023184","article-title":"Return wishes of refugees in the Netherlands: the role of integration, host national identification and perceived discrimination","volume":"41","author":"Di Saint Pierre","year":"2015","journal-title":"J. Ethn. Migr. Stud."},{"key":"2023101406513254600_ref38","volume-title":"Proceedings of the 16th European Conference on Computer Supported Cooperative Work","author":"Duarte","year":"2018"},{"key":"2023101406513254600_ref39","author":"Education for Rohingya Refugee Children in Malaysia","year":"2020"},{"key":"2023101406513254600_ref40","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/2930674.2930701","volume-title":"Proceedings of the The 15th International Conference on Interaction Design and Children (IDC '16)","author":"Fisher","year":"2016"},{"key":"2023101406513254600_ref41","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.ins.2009.08.004","article-title":"Collective intelligence in law enforcement\u2014the WikiCrimes system","volume":"180","author":"Furtado","year":"2010","journal-title":"Inf. Sci."},{"key":"2023101406513254600_ref42","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/MIS.2012.80","article-title":"Open government and citizen participation in law enforcement via crowd mapping","volume":"27","author":"Furtado","year":"2012","journal-title":"IEEE Intell. Syst."},{"key":"2023101406513254600_ref43","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/1015530.1015555","article-title":"Cultural probes and the value of uncertainty","volume":"11","author":"Gaver","year":"2004","journal-title":"Interactions"},{"key":"2023101406513254600_ref44","doi-asserted-by":"crossref","first-page":"27","DOI":"10.21834\/ebpj.v5i14.2242","article-title":"Developing a demographic, human capital values and economic profiling of Rohingya refugees workers in Malaysia","volume":"5","author":"Ghazali","year":"2020","journal-title":"Environ Behav Proc J"},{"key":"2023101406513254600_ref45","author":"Grandi","year":"2018"},{"key":"2023101406513254600_ref46","article-title":"The site formerly known as ghetto tracker is thankfully dead","author":"Greenfield","year":"2013","journal-title":"The Atlantic."},{"key":"2023101406513254600_ref47","first-page":"1","volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18)","author":"Guberek","year":"2018"},{"key":"2023101406513254600_ref48","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1177\/154193120605000909","article-title":"NASA-task load index (NASA-TLX); 20 years later","volume":"50","author":"Hart","year":"2006","journal-title":"Proceedings of the Human Factors and Ergonomics Society"},{"key":"2023101406513254600_ref49","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/S0166-4115(08)62386-9","article-title":"Development of NASA-TLX (task load index): results of empirical and theoretical research","volume":"52","author":"Hart","year":"1988","journal-title":"Adv. Psychol."},{"key":"2023101406513254600_ref50","volume-title":"Cross-Cultural Research and Methodology Series","author":"Hofstede","year":"1984"},{"key":"2023101406513254600_ref51","article-title":"GhettoTracker is the worst site on the internet","author":"Holmes","year":"2013","journal-title":"Pando."},{"key":"2023101406513254600_ref52","first-page":"1","volume-title":"Proceedings of the 2020 International Conference on Information and Communication Technologies and Development (ICTD 2020)","author":"Hussain","year":"2020"},{"key":"2023101406513254600_ref53","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1177\/S0038038501000219","article-title":"Technologies, texts and affordances","volume":"35","author":"Hutchby","year":"2001","journal-title":"Sociology"},{"key":"2023101406513254600_ref54","first-page":"1","volume-title":"Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (CHI EA '18)","author":"Irani","year":"2018"},{"key":"2023101406513254600_ref55","first-page":"1311","article-title":"Postcolonial computing","volume":"2","author":"Irani","year":"2010","journal-title":"Proc. SIGCHI Conf. Hum. Factor Comput. Syst."},{"key":"2023101406513254600_ref56","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s00779-016-0982-0","article-title":"Beyond \u201cyesterday\u2019s tomorrow\u201d: future-focused mobile interaction design by and for emergent users","volume":"21","author":"Jones","year":"2017","journal-title":"Pers. Ubiquit. Comput."},{"key":"2023101406513254600_ref57","first-page":"266","article-title":"The World Caf\u00e9 \u2013 Shaping Our Futures through Conversations that Matter","volume-title":"J. Organ. Chang. Manag.","author":"Juanita","year":"2005"},{"key":"2023101406513254600_ref58","first-page":"112","volume-title":"Architecture and Feminisms","author":"Kalms","year":"2018"},{"key":"2023101406513254600_ref59","first-page":"3340","volume-title":"Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17)","author":"Karusala","year":"2017"},{"key":"2023101406513254600_ref60","volume-title":"Translation Through Text: How Nowall Can Help Refugees Overcome the Language Barrier","author":"Kirk","year":"2016"},{"key":"2023101406513254600_ref61","volume-title":"NUIs for New Worlds: New Interaction Forms and Interfaces for Mobile Applications in Developing Countries - In Workshops of 2012 CHI Conference on Human Factors in Computing Systems (CHI '12)","author":"Knoche","year":"2012"},{"key":"2023101406513254600_ref62","volume-title":"Forbes","author":"Kosner","year":"2012"},{"key":"2023101406513254600_ref63","first-page":"183","article-title":"Making refugees (dis)appear: identifying refugees and asylum seekers in Thailand and Malaysia","volume":"11","author":"Lego","year":"2018","journal-title":"Austrian J. South-East Asian Studies"},{"key":"2023101406513254600_ref64","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1080\/15228835.2013.861784","article-title":"Survivor feedback on a safety decision aid smartphone application for college-age women in abusive relationships","volume":"31","author":"Lindsay","year":"2013","journal-title":"J. Technol. Hum. Serv."},{"key":"2023101406513254600_ref65","first-page":"1","volume-title":"2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI)","author":"Liu","year":"2017"},{"key":"2023101406513254600_ref66","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MC.2018.2701624","article-title":"Now you see it, now you don\u2019t: digital connectivity in marginalized communities","volume":"51","author":"Maitland","year":"2018","journal-title":"Computer"},{"key":"2023101406513254600_ref67","doi-asserted-by":"crossref","first-page":"e0225684","DOI":"10.1371\/journal.pone.0225684","article-title":"The opportunities and risks of mobile phones for refugees\u2019 experience: a scoping review","volume":"14","author":"Mancini","year":"2019","journal-title":"PLoS One"},{"key":"2023101406513254600_ref68","doi-asserted-by":"crossref","first-page":"3795","DOI":"10.1098\/rsta.2008.0119","article-title":"People are people, but technology is not technology","volume":"366","author":"Marsden","year":"2008","journal-title":"Philos. Trans. R. Soc. A Math. Phys. Eng. Sci."},{"key":"2023101406513254600_ref69","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1080\/1369183X.2013.869475","article-title":"A longitudinal study of interethnic contacts in Germany: estimates from a multilevel growth curve model","volume":"41","author":"Martinovic","year":"2015","journal-title":"J. Ethn. Migr. Stud."},{"key":"2023101406513254600_ref70","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1177\/2050157916639347","article-title":"Perpetual contact as a communicative affordance: opportunities, constraints, and emotions","volume":"4","author":"Mascheroni","year":"2016","journal-title":"Mob. Media Commun."},{"key":"2023101406513254600_ref71","first-page":"1","volume-title":"Proceedings of 2007 International Conference on Information and Communication Technologies and Development","author":"Maunder","year":"2007"},{"key":"2023101406513254600_ref72","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1177\/1077801219832124","article-title":"A content analysis of personal safety apps: are they keeping us safe or making us more vulnerable?","volume":"26","author":"Maxwell","year":"2020","journal-title":"Violence Against Women"},{"key":"2023101406513254600_ref73","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1145\/1242572.1242690","volume-title":"Proceedings of the 16th International Conference on World Wide Web - WWW \u201807","author":"Medhi","year":"2007"},{"key":"2023101406513254600_ref74","first-page":"1670","volume-title":"Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15)","author":"Medhi-Thies","year":"2015"},{"key":"2023101406513254600_ref75","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/j.geoforum.2013.02.001","article-title":"Crowdsourcing urban surveillance: the development of homeland security markets for environmental sensor networks","volume":"49","author":"Monahan","year":"2013","journal-title":"Geoforum"},{"key":"2023101406513254600_ref76","article-title":"To save everything click here: the folly of technological solutionism","author":"Morozov","year":"2013","journal-title":"In PublicAffairs, 4"},{"key":"2023101406513254600_ref77","author":"Moving Languages \u2013 Mobile Virtual Learning for Languages","year":".."},{"key":"2023101406513254600_ref78","first-page":"1125","volume-title":"Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications","author":"Muller","year":"2012","edition":"3rd"},{"key":"2023101406513254600_ref79","first-page":"29","article-title":"Refugees and space in urban areas in Malaysia","volume":"34","author":"Nah","year":"2018","journal-title":"Forced Migr Rev"},{"key":"2023101406513254600_ref80","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1093\/police\/paw022","article-title":"Police response to domestic violence: a case study of TecSOS Mobile phone use in the London metropolitan police service","volume":"10","author":"Natarajan","year":"2016","journal-title":"Policing"},{"key":"2023101406513254600_ref81","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1080\/1369183X.2021.1941818","article-title":"Resilience, smartphone use and language among urban refugees in the global south","volume":"48","author":"Netto","year":"2022","journal-title":"J. Ethn. Migr. Stud."},{"key":"2023101406513254600_ref82","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1057\/s41599-020-00606-8","article-title":"Poverty and precarious employment: the case of Rohingya refugee construction workers in peninsular Malaysia","volume":"7","author":"Nungsari","year":"2020","journal-title":"Humanit. Soc. Sci. Commun."},{"key":"2023101406513254600_ref83","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1080\/13621025.2016.1158356","article-title":"Precarity and agency through a migration lens","volume":"20","author":"Paret","year":"2016","journal-title":"Citizsh. Stud."},{"key":"2023101406513254600_ref84","first-page":"1","volume-title":"Proceedings of the Seventh International Conference on Information and Communication Technologies and Development (ICTD '15)","author":"Peterson Bishop","year":"2015"},{"key":"2023101406513254600_ref85","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1177\/1362480618779401","article-title":"\u201cNow you\u2019re connected\u201d: Carceral visuality and police power on MobilePatrol","volume":"24","author":"Revier","year":"2020","journal-title":"Theor. Criminol."},{"key":"2023101406513254600_ref86","first-page":"1","volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18)","author":"Robinson","year":"2018"},{"key":"2023101406513254600_ref87","volume-title":"Language of the Rohingya to be digitised: \u201cIt legitimises the struggle\u201d","author":"The Guardian","year":"2017"},{"key":"2023101406513254600_ref88","doi-asserted-by":"crossref","first-page":"46","DOI":"10.31580\/apss.v4i2.719","article-title":"Livelihood sustainability among Rohingya refugees: a case study in Taman Senangin, Seberang Perai, Penang","volume":"4","author":"Salim","year":"2019","journal-title":"Asia Proc. Soc. Sci."},{"key":"2023101406513254600_ref89","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1111\/gec3.12010","article-title":"Refugees and the City: an urban discussion","volume":"6","author":"Sanyal","year":"2012","journal-title":"Geogr. Compass"},{"key":"2023101406513254600_ref90","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1007\/s11623-013-0173-3","article-title":"Crowdsourcing and cloudsourcing CCTV surveillance","volume":"37","author":"Schafer","year":"2013","journal-title":"Datenschutz Und Datensicherheit - DuD"},{"key":"2023101406513254600_ref91","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1111\/imig.12171","article-title":"Migration, precarization and the democratic deficit in global governance","volume":"53","author":"Schierup","year":"2015","journal-title":"Int. Migr."},{"key":"2023101406513254600_ref92","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1109\/SP.2018.00023","volume-title":"Proceedings of 2018 IEEE Symposium on Security and Privacy (SP)","author":"Simko","year":"2018"},{"key":"2023101406513254600_ref93","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1093\/jrs\/fev009","article-title":"Risk factors associated with culture shock among asylum seekers from Darfur","volume":"29","author":"Slonim-Nevo","year":"2016","journal-title":"J. Refug. Stud."},{"key":"2023101406513254600_ref94","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1515\/commun-2017-0041","article-title":"The way Syrian refugees in Turkey use media: understanding \u201cconnected refugees\u201d through a non-media-centric and local approach","volume":"43","author":"Smets","year":"2018","journal-title":"Communications"},{"key":"2023101406513254600_ref95","first-page":"249","article-title":"Forced migration in Southeast Asia\u2014a brief overview of current research","volume":"12","author":"Stange","year":"2019","journal-title":"Austrian J. South-East Asian Studies"},{"key":"2023101406513254600_ref96","first-page":"1073","volume-title":"Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '16)","author":"Talhouk","year":"2016"},{"key":"2023101406513254600_ref97","doi-asserted-by":"crossref","first-page":"1583","DOI":"10.1145\/3322276.3322335","volume-title":"Proceedings of the 2019 on Designing Interactive Systems Conference (DIS '19)","author":"Talhouk","year":"2019"},{"key":"2023101406513254600_ref98","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1177\/0021886304272851","article-title":"The world caf\u00e9 in Singapore: creating a learning culture through dialogue. In","volume":"41","author":"Tan","year":"2005","journal-title":"J. Appl. Behav. Sci."},{"key":"2023101406513254600_ref99","first-page":"16","article-title":"Refugees and social exclusion\u00a0: what the literature says","volume":"XXVI","author":"Taylor","year":"2004","journal-title":"Migration Action"},{"key":"2023101406513254600_ref100","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1016\/j.ijintrel.2008.09.003","article-title":"Perceived discrimination and acculturation among Iranian refugees in the Netherlands","volume":"32","author":"Te Lindert","year":"2008","journal-title":"Int. J. Intercult. Relat."},{"key":"2023101406513254600_ref101","doi-asserted-by":"crossref","DOI":"10.1596\/31952","volume-title":"Network shutdown in Myanmar","author":"Telenor group","year":"2019"},{"key":"2023101406513254600_ref102","volume-title":"The Unicode\u00ae Standard Version 11.0. Core Specification","author":"The Unicode Consortium","year":"2018"},{"key":"2023101406513254600_ref103","article-title":"Rohingya crisis response","author":"Translators Without Borders","year":"2017","journal-title":"Rohingya Zuban."},{"key":"2023101406513254600_ref104","author":"Translators without Borders","year":"2018"},{"key":"2023101406513254600_ref105","article-title":"TWB and KoBo Inc develop speech recognition technology to capture voices of speakers of marginalized languages","author":"Translators without Borders","year":"2020","journal-title":"TWB Communications."},{"key":"2023101406513254600_ref106","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1080\/1369118X.2013.808359","article-title":"Crowdsourcing CCTV surveillance on the internet","volume":"17","author":"Trottier","year":"2014","journal-title":"Inf. Commun. Soc."},{"key":"2023101406513254600_ref107","volume-title":"Connecting refugees: how Internet and mobile connectivity can improve refugee well-being and transform humanitarian action","author":"UNHCR","year":"2016"},{"key":"2023101406513254600_ref108","volume-title":"Rohingya emergency","author":"UNHCR","year":"2018"},{"key":"2023101406513254600_ref109","volume-title":"Refugee Response in Bangladesh","author":"UNHCR","year":"2020"},{"key":"2023101406513254600_ref110","volume-title":"Convention and Protocol","author":"United Nations High Commissioner for Refugees","year":"1951"},{"key":"2023101406513254600_ref111","author":"United Nations Office for the Coordination of Humanitarian Affairs","year":"2019"},{"key":"2023101406513254600_ref112","doi-asserted-by":"crossref","first-page":"1233","DOI":"10.1145\/2470654.2466159","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13)","author":"Uzor","year":"2013"},{"key":"2023101406513254600_ref113","doi-asserted-by":"crossref","first-page":"1179","DOI":"10.1145\/2207676.2208568","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '12)","author":"Uzor","year":"2012"},{"key":"2023101406513254600_ref114","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4324\/9781315668109","volume-title":"Men\u2019s Intrusion, Women\u2019s Embodiment: A Critical Analysis of Street Harassment","author":"Vera-Gray","year":"2016"},{"key":"2023101406513254600_ref115","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1080\/13552074.2015.1013669","article-title":"SafetiPin: an innovative mobile app to collect data on women\u2019s safety in Indian cities","volume":"23","author":"Viswanath","year":"2015","journal-title":"Gend. Dev."},{"key":"2023101406513254600_ref116","article-title":"The ethical pitfalls of crime prevention apps","author":"Williams","year":"2016","journal-title":"Center for Digital Ethics & Policy."},{"key":"2023101406513254600_ref117","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1177\/1362480617750507","article-title":"Viral justice? Online justice-seeking, intimate partner violence and affective contagion","volume":"23","author":"Wood","year":"2019","journal-title":"Theor. Criminol."},{"key":"2023101406513254600_ref118","doi-asserted-by":"crossref","first-page":"1093","DOI":"10.1177\/1524838020985560","article-title":"Primary crime prevention apps: a typology and scoping review","volume":"23","author":"Wood","year":"2021","journal-title":"Trauma, Violence, & Abuse."},{"key":"2023101406513254600_ref119","first-page":"1","article-title":"Using cultural probes in HCI4D\/ICTD: a design case study from Bungoma, Kenya","volume":"4","author":"Wyche","year":"2020","journal-title":"Proc. ACM on Hum. Comput. Interact."},{"key":"2023101406513254600_ref120","first-page":"1","volume-title":"Proceedings of the Seventh International Conference on Information and Communication Technologies and Development (ICTD '15)","author":"Xu","year":"2015"},{"key":"2023101406513254600_ref121","first-page":"1","volume-title":"Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (CHI EA '18)","author":"Yafi","year":"2018"},{"key":"2023101406513254600_ref122","first-page":"71","article-title":"Policy towards Rohingya refugees: a comparative analysis of Bangladesh, Malaysia, and Thailand","volume":"61","author":"Yesmin","year":"2016","journal-title":"J. Asiatic Soc. Bangladesh (Hum.)"},{"key":"2023101406513254600_ref123","first-page":"361","volume-title":"Proceedings 2019 IEEE Region 10 Conference (TENCON)","author":"Zaman","year":"2019"},{"key":"2023101406513254600_ref124","first-page":"271","volume-title":"Proceedings of the 2018 ACM Conference Companion Publication on Designing Interactive Systems (DIS '18 Companion)","author":"Zeb","year":"2018"}],"container-title":["Interacting with Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/iwc\/article-pdf\/35\/3\/481\/52076077\/iwad026.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/iwc\/article-pdf\/35\/3\/481\/52076077\/iwad026.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,14]],"date-time":"2023-10-14T06:52:42Z","timestamp":1697266362000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/iwc\/article\/35\/3\/481\/7074528"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,9]]},"references-count":124,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,3,9]]},"published-print":{"date-parts":[[2023,10,13]]}},"URL":"https:\/\/doi.org\/10.1093\/iwc\/iwad026","relation":{},"ISSN":["0953-5438","1873-7951"],"issn-type":[{"value":"0953-5438","type":"print"},{"value":"1873-7951","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2023,5]]},"published":{"date-parts":[[2023,3,9]]}}}