{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:48:34Z","timestamp":1776106114719,"version":"3.50.1"},"reference-count":67,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Hessian Ministry of Higher Education, Research, Science and the Arts","award":["National Research Center for Applied Cybersecurity ATHENE"],"award-info":[{"award-number":["National Research Center for Applied Cybersecurity ATHENE"]}]},{"name":"German Federal Ministry of Education and Research","award":["National Research Center for Applied Cybersecurity ATHENE"],"award-info":[{"award-number":["National Research Center for Applied Cybersecurity ATHENE"]}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"crossref","award":["251805230\/GRK 2050"],"award-info":[{"award-number":["251805230\/GRK 2050"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2021,10,13]]},"abstract":"<jats:p>Since 2015, an increased number of asylum seekers is coming to Europe. These migration movements increasingly rely on digital infrastructure, such as mobile internet access and online services, in order to reach their targeted destination countries. Asylum seekers often use smartphones for information and communication purposes. Even though there are many positive aspects in the use of such technologies, researchers have to consider the perceived risks of this specific user group. This work aims at investigating the use of mobile information technologies by asylum seekers during their flight, especially taking privacy into account. Thus, it examines asylum seekers' digital privacy perceptions and identifies privacy protection behaviors by conducting a qualitative interview study with 14 asylum seekers who applied for asylum in Germany. The results show that asylum seekers are often aware of the various risks deriving from the use of smartphones and ICT, such as surveillance and persecution by state or non-state actors as well as extortion by criminals. Based on this, this work furthermore outlines different strategies used to manage these risks. Since the lack of privacy and trust leads to avoidance behavior, the insights of this study provide valuable information for the design of assistance apps and collaboration platforms, which appropriately address the specific needs for digital privacy in the context of flight, or for the conception of privacy-enhancing technologies helping to achieve this.<\/jats:p>","DOI":"10.1145\/3479526","type":"journal-article","created":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T02:32:07Z","timestamp":1634610727000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Digital Privacy Perceptions of Asylum Seekers in Germany: An Empirical Study about Smartphone Usage during the Flight"],"prefix":"10.1145","volume":"5","author":[{"given":"Enno","family":"Steinbrink","sequence":"first","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"given":"Lilian","family":"Reichert","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"given":"Michelle","family":"Mende","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"given":"Christian","family":"Reuter","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,10,18]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"3rd AFU International Conference: Towards Advanced Scientific Knowledge (TASK2019)","author":"AbuJarour Safa'a","year":"2019","unstructured":"Safa'a AbuJarour. 2019. Smartphone App Adoption at Home and on the Move: The Case of Syrians. In 3rd AFU International Conference: Towards Advanced Scientific Knowledge (TASK2019) in Business Sciences. Al Falah University, Al Garhoud, Dubai."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.04840"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the 25th European Conference on Information Systems (ECIS)","author":"AbuJarour Safa'a","year":"2017","unstructured":"Safa'a AbuJarour and Hanna Krasnova. 2017. Understanding the role of ICTs in promoting social inclusion: The case of syrian refugees in Germany. In Proceedings of the 25th European Conference on Information Systems (ECIS) (Guimaraes, Portugal). Association for Information Systems, Atlanta, GA, USA, 1792--1806. http:\/\/aisel.aisnet.org\/ecis2017_rp\/115"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the 37th International Conference on Information Systems (ICIS) (Dublin). Association for Information Systems","author":"AbuJarour Safa'a","year":"2016","unstructured":"Safa'a AbuJarour, Hanna Krasnova, Helena Wenninger, Jane Fedorowicz, Sebastian Olbrich, Chee-Wee Tan, Viswanath Venkatesh, and Cathy Urquhart. 2016. No Leveraging Technology for Refugee Integration: How Can We Help?. In Proceedings of the 37th International Conference on Information Systems (ICIS) (Dublin). Association for Information Systems, Atlanta, GA, USA, 1--16."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134652"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/soc4.12802"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908805.2909415"},{"key":"e_1_2_1_8_1","volume-title":"Maria Gabrielsen Jumpert, and Raphael Gellert","author":"Bellanova Rocco","year":"2016","unstructured":"Rocco Bellanova, Maria Gabrielsen Jumpert, and Raphael Gellert. 2016. Give Us Your Phone and We May Grant You Asylum. PRIO Blogs. https:\/\/blogs.prio.org\/2016\/10\/give-us-your-phone-and-we-may-grant-you-asylum\/"},{"key":"e_1_2_1_9_1","volume-title":"Handbook of Privacy and Privacy-Enhancing Technologies: The case of Intelligent Software Agents","author":"Blarkom G.W.","unstructured":"G.W. Blarkom, John J. Borking, and J.G. Eddy Olk. 2003. Handbook of Privacy and Privacy-Enhancing Technologies: The case of Intelligent Software Agents. In PISA Consortium. CBP (Dutch Data Protection Authority), The Hague."},{"key":"e_1_2_1_10_1","volume-title":"Exploring Internet Security Perceptions and Practices in Urban Ghana. In 10th Symposium On Usable Privacy and Security (SOUPS 2014","author":"Chen Jay","year":"2014","unstructured":"Jay Chen, Michael Paik, and Kelly McCabe. 2014. Exploring Internet Security Perceptions and Practices in Urban Ghana. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). USENIX Association, Menlo Park, CA, USA, 129--142. https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/chen"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300411"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174158"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305118764439"},{"key":"e_1_2_1_14_1","volume-title":"UNHCR viewpoint: ?Refugee' or ?migrant' -- Which is right? UNHCR","author":"Edwards Adrian","year":"2016","unstructured":"Adrian Edwards. 2015. UNHCR viewpoint: ?Refugee' or ?migrant' -- Which is right? UNHCR, Geneva, Switzerland. https:\/\/www.unhcr.org\/news\/latest\/2016\/7\/55df0e556\/unhcr-viewpoint-refugee-migrant-right.html"},{"key":"e_1_2_1_15_1","volume-title":"Mediennutzung durch Fl\u00fcchtlinge vor, w\"ahrend und nach der Flucht. Freie Universit\u00e4t Berlin","author":"Emmer Martin","unstructured":"Martin Emmer, Carola Richter, and Marlene Kunst. 2016. Flucht 2.0: Mediennutzung durch Fl\u00fcchtlinge vor, w\"ahrend und nach der Flucht. Freie Universit\u00e4t Berlin, Berlin, Germany. https:\/\/www.polsoz.fu-berlin.de\/kommwiss\/arbeitsstellen\/internationale_kommunikation\/Media\/Flucht-2_0.pdf"},{"key":"e_1_2_1_16_1","unstructured":"European Commission. 2020. economic migrant | Migration and Home Affairs. https:\/\/ec.europa.eu\/home-affairs\/what-we-do\/networks\/european_migration_network\/glossary_search\/economic-migrant_en"},{"key":"e_1_2_1_17_1","volume-title":"Record number of over 1.2 million first time asylum seekers registered","author":"Office European Statistics","year":"2015","unstructured":"European Statistics Office. 2016. Record number of over 1.2 million first time asylum seekers registered in 2015. Technical Report. European Statistics Office. https:\/\/ec.europa.eu\/eurostat\/documents\/2995521\/7203832\/3-04032016-AP-EN.pdf"},{"key":"e_1_2_1_18_1","first-page":"891","article-title":"Refugees and the Biometric Future: the Impact of Biometrics on Refugees and Asylum Seekers","volume":"42","author":"Farraj Achraf","year":"2011","unstructured":"Achraf Farraj. 2011. Refugees and the Biometric Future: the Impact of Biometrics on Refugees and Asylum Seekers. Columbia Human Rights Law Review, Vol. 42, 3 (2011), 891--942.","journal-title":"Columbia Human Rights Law Review"},{"key":"e_1_2_1_19_1","unstructured":"Federal Office for Migration and Refugees. 2018. Safe countries of origin. Federal Office for Migration and Refugees. https:\/\/www.bamf.de\/EN\/Themen\/AsylFluechtlingsschutz\/Sonderverfahren\/SichereHerkunftsstaaten\/sichereherkunftsstaaten-node.html"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781446282243"},{"key":"e_1_2_1_21_1","unstructured":"Federal Ministry for Economic Cooperation and Development. 2020. Fl\u00fcchtlinge und Asylsuchende. Federal Ministry for Economic Cooperation and Development. https:\/\/www.bmz.de\/de\/themen\/Sonderinitiative-Fluchtursachen-bekaempfen-Fluechtlinge-reintegrieren\/hintergrund\/definition_fluechtling\/index.jsp"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.13140\/RG.2.2.15633.22888"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305118764440"},{"key":"e_1_2_1_24_1","volume-title":"Ali Shajrawi, Kinan Madi, Abodi Nova, and Aleksi Tzatzev.","author":"di Giovann Janine","year":"2013","unstructured":"Janine di Giovann, Marianne Nari Fisher, Ali Shajrawi, Kinan Madi, Abodi Nova, and Aleksi Tzatzev. 2013. Lost. Syrian Refugees and the Information Gap. Internews. https:\/\/www.internews.org\/sites\/default\/files\/resources\/Internews_Lost_SyriaReport_Nov2013_web.pdf"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.2307\/588533"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.17169\/fqs-6.2.476"},{"key":"e_1_2_1_27_1","unstructured":"Bernhard Gr\u00fcndling. 2020. App-based (Im) plausible Deniability for Android. Ph.D. Dissertation. Johannes Kepler University Linz."},{"key":"e_1_2_1_28_1","unstructured":"GSMA. 2017. Refugees and Identity: Considerations for mobile-enabled registration and aid delivery. Technical Report. GSMA Intelligence London United Kingdom. https:\/\/www.gsma.com\/mobilefordevelopment\/resources\/refugees-and-identity\/"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173688"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1816383117000637"},{"key":"e_1_2_1_31_1","volume-title":"Gina Maria Schmidbauer-Wolf, and Christian Reuter","author":"Herbert Franziska","year":"2021","unstructured":"Franziska Herbert, Gina Maria Schmidbauer-Wolf, and Christian Reuter. 2021. Who Should Get My Private Data in Which Case? Evidence in the Wild. In Mensch und Computer 2021. ACM, Ingolstadt."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.8010979"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274339"},{"key":"e_1_2_1_34_1","volume-title":"RQDA: R-based qualitative data analysis","author":"Huang Ronggui","year":"2014","unstructured":"Ronggui Huang. 2014. RQDA: R-based qualitative data analysis. http:\/\/rqda.r-forge.r-project.org\/"},{"key":"e_1_2_1_35_1","unstructured":"International Organization for Migration. 2017. MigApp. https:\/\/www.iom.int\/migapp"},{"key":"e_1_2_1_36_1","unstructured":"International Rescue Commitee. 2017. Using ICT to Facilitate Access to Information and Accountability to Affected Populations in Urban Areas: A review of the ServiceInfo and Refugee.Info Platforms. https:\/\/www.rescue.org\/sites\/default\/files\/document\/1713\/usingicttofacilitateweb.pdf"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376245"},{"key":"e_1_2_1_38_1","volume-title":"Data Protection and Digital Agency for Refugees","author":"Kaurin Dragana","unstructured":"Dragana Kaurin. 2019. Data Protection and Digital Agency for Refugees. Centre of International Governance Innovation, Waterloo, ON, Canada. https:\/\/www.cigionline.org\/sites\/default\/files\/documents\/WRC%20Research%20Paper%20no.12.pdf"},{"key":"e_1_2_1_39_1","unstructured":"Patrick Kingsley. 2015. People smugglers using Facebook to lure migrants into 'Italy trips'. The Guardian. https:\/\/www.theguardian.com\/world\/2015\/may\/08\/people-smugglers-using-facebook-to-lure-migrants-into-italy-trips"},{"key":"e_1_2_1_40_1","unstructured":"Chris K\u00f6ver and Vasilis Tsianos. 2015. Smartphones sind f\u00fcr Fl\u00fcchtlinge \u00fcberlebenswichtig. WIRED. https:\/\/www.wired.de\/collection\/latest\/ohne-smartphones-hatten-fluchtlinge-kaum-eine-chance-sagt-der-migrationsforscher"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305118764432"},{"key":"e_1_2_1_42_1","volume-title":"Refugee Connectivity: A Survey of Mobile Phones, Mental Health, and Privacy at a Syrian Refugee Camp in Greece. Harvard Humanitarian Initiative","author":"Latonero Mark","year":"2017","unstructured":"Mark Latonero, Danielle Poole, and Jos Berens. 2017. Refugee Connectivity: A Survey of Mobile Phones, Mental Health, and Privacy at a Syrian Refugee Camp in Greece. Harvard Humanitarian Initiative, Cambridge, MA, USA. http:\/\/hhi.harvard.edu\/publications\/refugee-connectivity-survey-mobile-phones-mental-health-and-privacy-syrian-refugee-camp"},{"key":"e_1_2_1_43_1","unstructured":"Dave Lee. 2015. Facebook amends 'real name' policy after protests. BBC News. https:\/\/www.bbc.com\/news\/technology-35109045"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531693"},{"key":"e_1_2_1_45_1","volume-title":"Proceedings on Privacy Enhancing Technologies (PoPETs)","volume":"2021","author":"Linsner Sebastian","year":"2021","unstructured":"Sebastian Linsner, Franz Kuntke, Enno Steinbrink, Jonas Franken, and Christian Reuter. 2021. The Role of Privacy in Digitalization -- Analysing the German Farmers' Perspective. Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2021, 3 (2021), 334--350. https:\/\/www.petsymposium.org\/2021\/files\/papers\/issue3\/popets-2021-0050.pdf"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531632"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3375174"},{"key":"e_1_2_1_48_1","unstructured":"Ministry of Security and Justice. 2016. 2016 ANNUAL REPORT Migration and Asylum in the Netherlands. Technical Report. Ministry of Security and Justice."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2016.1153013"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.33965\/is2020_202006C018"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287098.3287144"},{"key":"e_1_2_1_52_1","volume-title":"AMCIS 2014 Proceedings. Association for Information Systems, Savannah, United States, 1--12","author":"Pozzi Giulia","year":"2014","unstructured":"Giulia Pozzi, Federico Pigni, and Claudio Vitari. 2014. Affordance theory in the IS discipline: A review and synthesis of the literature. In AMCIS 2014 Proceedings. Association for Information Systems, Savannah, United States, 1--12. https:\/\/halshs.archives-ouvertes.fr\/halshs-01923663\/file\/Pozzi%202014AMCIS%20Affordance_aisel.pdf"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2016.1177300"},{"key":"e_1_2_1_54_1","unstructured":"Antti Salovaara. 2012. Repurposive appropriation and creative technology use in human-computer interaction. Ph.D. Dissertation. University of Helsinki Helsinki Finland. http:\/\/hdl.handle.net\/10138\/37289"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1093\/rsq\/hdx021"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314344.3332486"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00023"},{"key":"e_1_2_1_58_1","first-page":"224","article-title":"Mobiflage: Deniable storage encryptionfor mobile devices","volume":"11","author":"Skillen Adam","year":"2013","unstructured":"Adam Skillen and Mohammad Mannan. 2013. Mobiflage: Deniable storage encryptionfor mobile devices. IEEE Transactions on Dependable and Secure Computing, Vol. 11, 3 (2013), 224--237.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3311754"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3215846"},{"key":"e_1_2_1_61_1","volume-title":"Media Use During Escape: A Contribution to Refugees' Collective Agency. spheres Journal for Digital Cultures","author":"Ullrich Maria","year":"2017","unstructured":"Maria Ullrich. 2017. Media Use During Escape: A Contribution to Refugees' Collective Agency. spheres Journal for Digital Cultures, Vol. 4 (2017), 1--11."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444815591967"},{"key":"e_1_2_1_63_1","unstructured":"Alan F. Westin. 1967. Privacy and Freedom. Athenum New York NY USA."},{"key":"e_1_2_1_64_1","unstructured":"WhatsApp LLC. 2021. Using one WhatsApp account on multiple phones or with multiple phone numbers. WhatsApp LLC. https:\/\/faq.whatsapp.com\/general\/verification\/using-one-whatsapp-account-on-multiple-phones-or-with-multiple-phone-numbers\/?lang=en"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441783"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820073"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1504\/ijmbs.2017.083245"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479526","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3479526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T04:59:44Z","timestamp":1752469184000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479526"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,13]]},"references-count":67,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2021,10,13]]}},"alternative-id":["10.1145\/3479526"],"URL":"https:\/\/doi.org\/10.1145\/3479526","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,13]]},"assertion":[{"value":"2021-10-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}