{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T14:31:16Z","timestamp":1775226676817,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544549.3573800","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T07:31:00Z","timestamp":1681975860000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Diverse Migration Journeys and Security Practices: Engaging with Longitudinal Perspectives of Migration and (Digital) Security"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5316-9956","authenticated-orcid":false,"given":"Ruba","family":"Abu-Salma","sequence":"first","affiliation":[{"name":"King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8470-056X","authenticated-orcid":false,"given":"Reem","family":"Talhouk","sequence":"additional","affiliation":[{"name":"School of Design, Northumbria University, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6041-178X","authenticated-orcid":false,"given":"Jose","family":"Such","sequence":"additional","affiliation":[{"name":"King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2010-9006","authenticated-orcid":false,"given":"Claudia","family":"Aradau","sequence":"additional","affiliation":[{"name":"King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9121-9985","authenticated-orcid":false,"given":"Francesca","family":"Meloni","sequence":"additional","affiliation":[{"name":"King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3697-0706","authenticated-orcid":false,"given":"Shijing","family":"He","sequence":"additional","affiliation":[{"name":"King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2452-0687","authenticated-orcid":false,"given":"Syed Ishtiaque","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Computer Science, University of Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5575-4382","authenticated-orcid":false,"given":"Cansu","family":"Ekmekcioglu","sequence":"additional","affiliation":[{"name":"Faculty of Information, University of Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1717-4456","authenticated-orcid":false,"given":"Dina","family":"Sabie","sequence":"additional","affiliation":[{"name":"Computer Science, University of Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6546-6723","authenticated-orcid":false,"given":"Rikke Bjerg","family":"Jensen","sequence":"additional","affiliation":[{"name":"Information Security Group, Royal Holloway University of London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1609-5257","authenticated-orcid":false,"given":"Jessica","family":"McClearn","sequence":"additional","affiliation":[{"name":"Information Security Group, Royal Holloway University of London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8787-5410","authenticated-orcid":false,"given":"Anne","family":"Weibert","sequence":"additional","affiliation":[{"name":"Institute for Information Systems and New Media, University of Siegen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5686-0566","authenticated-orcid":false,"given":"Max","family":"Kr\u00fcger","sequence":"additional","affiliation":[{"name":"University of Siegen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4173-3094","authenticated-orcid":false,"given":"Faheem","family":"Hussain","sequence":"additional","affiliation":[{"name":"School for the Future of Innovation in Society, Arizona State University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0564-0851","authenticated-orcid":false,"given":"Rehema","family":"Baguma","sequence":"additional","affiliation":[{"name":"Makerere University, Uganda"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3148330.3152160"},{"key":"e_1_3_3_1_2_1","volume-title":"In-Home Smart Devices: Quantifying Bystander Privacy Experiences and Social Norms in Different Situations. In Annual Symposium on Applications of Contextual Integrity (CI Symposium).","author":"Abdi Noura","year":"2022","unstructured":"Noura Abdi, Tess Despres, Ruba Abu-Salma, and Julia Bernd. 2022. In-Home Smart Devices: Quantifying Bystander Privacy Experiences and Social Norms in Different Situations. In Annual Symposium on Applications of Contextual Integrity (CI Symposium)."},{"key":"e_1_3_3_1_3_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS). 387\u2013406","author":"Afnan Tanisha","year":"2022","unstructured":"Tanisha Afnan, Yixin Zou, Maryam Mustafa, Mustafa Naseem, and Florian Schaub. 2022. Aunties, Strangers, and the FBI: Online Privacy Concerns and Experiences of Muslim-American Women. In Symposium on Usable Privacy and Security (SOUPS). 387\u2013406."},{"key":"e_1_3_3_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134652"},{"key":"e_1_3_3_1_5_1","volume-title":"Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong. In USENIX Security Symposium (USENIX Security). 3363\u20133380","author":"Albrecht R","year":"2021","unstructured":"Martin\u00a0R Albrecht, Jorge Blasco, Rikke\u00a0Bjerg Jensen, and Lenka Marekov\u00e1. 2021. Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong. In USENIX Security Symposium (USENIX Security). 3363\u20133380."},{"key":"e_1_3_3_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492856"},{"key":"e_1_3_3_1_7_1","volume-title":"Balancing Power Dynamics in Smart Homes: Nannies\u2019 Perspectives on How Cameras Reflect and Affect Relationships. In Symposium on Usable Privacy and Security (SOUPS). 687\u2013706","author":"Bernd Julia","year":"2022","unstructured":"Julia Bernd, Ruba Abu-Salma, Junghyun Choy, and Alisa Frik. 2022. Balancing Power Dynamics in Smart Homes: Nannies\u2019 Perspectives on How Cameras Reflect and Affect Relationships. In Symposium on Usable Privacy and Security (SOUPS). 687\u2013706."},{"key":"e_1_3_3_1_8_1","volume-title":"Bystanders\u2019 Privacy: The Perspectives of Nannies on Smart Home Surveillance. In USENIX Workshop on Free and Open Communications on the Internet (FOCI).","author":"Bernd Julia","year":"2020","unstructured":"Julia Bernd, Ruba Abu-Salma, and Alisa Frik. 2020. Bystanders\u2019 Privacy: The Perspectives of Nannies on Smart Home Surveillance. In USENIX Workshop on Free and Open Communications on the Internet (FOCI)."},{"key":"e_1_3_3_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858230"},{"key":"e_1_3_3_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300411"},{"key":"e_1_3_3_1_11_1","volume-title":"Amplified Pressures and Reduced Capabilities. In CHI Conference on Human Factors in Computing Systems. 1\u201313","author":"Coles-Kemp Lizzie","year":"2018","unstructured":"Lizzie Coles-Kemp, Rikke\u00a0Bjerg Jensen, and Reem Talhouk. 2018. In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities. In CHI Conference on Human Factors in Computing Systems. 1\u201313."},{"key":"e_1_3_3_1_12_1","volume-title":"Smart Refugees: How Syrian Asylum Migrants Use Social Media Information in Migration Decision-Making. Social Media+ Society 4, 1","author":"Dekker Rianne","year":"2018","unstructured":"Rianne Dekker, Godfried Engbersen, Jeanine Klaver, and Hanna Vonk. 2018. Smart Refugees: How Syrian Asylum Migrants Use Social Media Information in Migration Decision-Making. Social Media+ Society 4, 1 (2018), 2056305118764439."},{"key":"e_1_3_3_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173688"},{"key":"e_1_3_3_1_14_1","volume-title":"PETS Workshop on Interdependent and Multi-party Privacy. Retrieved","author":"Hasan Rakibul","year":"2022","unstructured":"Rakibul Hasan, Kavous Salehzadeh\u00a0Niksirat, Jose Such, K\u00e9vin Huguenin, Mary\u00a0Jean Amon, Ruba Abu-Salma, Yaxing Yao, Mathias Humbert, and Gergely Bicz\u00f3k. 2022. PETS Workshop on Interdependent and Multi-party Privacy. Retrieved October 11, 2022 from https:\/\/sites.google.com\/asu.edu\/idp-pets22\/home"},{"key":"e_1_3_3_1_15_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 2, CSCW(2018)","author":"Chiao-Yin Hsiao Joey","year":"2018","unstructured":"Joey Chiao-Yin Hsiao and Tawanna\u00a0R Dillahunt. 2018. Technology to Support Immigrant Access to Social Capital and Adaptation to a New Country. Proceedings of the ACM on Human-Computer Interaction 2, CSCW(2018), 1\u201321."},{"key":"e_1_3_3_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392561.3394640"},{"key":"e_1_3_3_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449124"},{"key":"e_1_3_3_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2018.09.002"},{"key":"e_1_3_3_1_19_1","volume-title":"When the Civic Turn Turns Digital: Designing Safe and Secure Refugee Resettlement. In CHI Conference on Human Factors in Computing Systems. 1\u201314","author":"Jensen Rikke\u00a0Bjerg","year":"2020","unstructured":"Rikke\u00a0Bjerg Jensen, Lizzie Coles-Kemp, and Reem Talhouk. 2020. When the Civic Turn Turns Digital: Designing Safe and Secure Refugee Resettlement. In CHI Conference on Human Factors in Computing Systems. 1\u201314."},{"key":"e_1_3_3_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328320.3328408"},{"key":"e_1_3_3_1_21_1","doi-asserted-by":"publisher","DOI":"10.1093\/ccc\/tcac019"},{"key":"e_1_3_3_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1610252.1610283"},{"key":"e_1_3_3_1_23_1","volume-title":"Retrieved","author":"Places PDC","year":"2022","unstructured":"PDC Places. 2022. Embracing Cosmologies: Expanding Worlds of Participatory Design. Retrieved October 11, 2022 from https:\/\/pdc2022.org\/places\/"},{"key":"e_1_3_3_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492825"},{"key":"e_1_3_3_1_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2016.1177300"},{"key":"e_1_3_3_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490555"},{"key":"e_1_3_3_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376636"},{"key":"e_1_3_3_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3441352"},{"key":"e_1_3_3_1_29_1","volume-title":"Mobile Phones at Borders: Logics of Deterrence and Survival in the Mediterranean Sea and Sonoran Desert. Information","author":"Sch\u00f6pke-Gonzalez M","year":"2022","unstructured":"Angela\u00a0M Sch\u00f6pke-Gonzalez and Florian Schaub. 2022. Mobile Phones at Borders: Logics of Deterrence and Survival in the Mediterranean Sea and Sonoran Desert. Information, Communication & Society(2022), 1\u201317."},{"key":"e_1_3_3_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3534631"},{"key":"e_1_3_3_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314344.3332486"},{"key":"e_1_3_3_1_32_1","volume-title":"Computer Security and Privacy for Refugees in the United States. In IEEE Symposium on Security and Privacy (SP). IEEE, 409\u2013423","author":"Simko Lucy","year":"2018","unstructured":"Lucy Simko, Ada Lerner, Samia Ibtasam, Franziska Roesner, and Tadayoshi Kohno. 2018. Computer Security and Privacy for Refugees in the United States. In IEEE Symposium on Security and Privacy (SP). IEEE, 409\u2013423."},{"key":"e_1_3_3_1_33_1","volume-title":"Participatory Threat Modelling with Migrant Domestic Workers. In USENIX Security Symposium (USENIX Security). 323\u2013340","author":"Slupska Julia","year":"2022","unstructured":"Julia Slupska, Selina Cho, Marissa Begonia, Ruba Abu-Salma, Nayanatara Prakash, and Mallika Balakrishnan. 2022. \u201cThey Look at Vulnerability and Use That to Abuse You\u201d: Participatory Threat Modelling with Migrant Domestic Workers. In USENIX Security Symposium (USENIX Security). 323\u2013340."},{"key":"e_1_3_3_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479526"},{"key":"e_1_3_3_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445470"},{"key":"e_1_3_3_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3311754"},{"key":"e_1_3_3_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2886427"},{"key":"e_1_3_3_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415205"},{"key":"e_1_3_3_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-022-09423-w"},{"key":"e_1_3_3_1_40_1","volume-title":"Refugees & HCI Workshop: The Role of HCI in Responding to the Refugee Crisis. In CHI Conference on Human Factors in Computing Systems (Extended Abstracts). 558\u2013565","author":"Talhouk Reem","year":"2017","unstructured":"Reem Talhouk, Vasillis Vlachokyriakos, Anne Weibert, Konstantin Aal, Syed\u00a0Ishtiaque Ahmed, Karen Fisher, and Volker Wulf. 2017. Refugees & HCI Workshop: The Role of HCI in Responding to the Refugee Crisis. In CHI Conference on Human Factors in Computing Systems (Extended Abstracts). 558\u2013565."},{"key":"e_1_3_3_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448373"},{"key":"e_1_3_3_1_42_1","doi-asserted-by":"publisher","DOI":"10.1111\/anti.12583"},{"key":"e_1_3_3_1_43_1","doi-asserted-by":"publisher","DOI":"10.1177\/20539517221124586"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544549.3573800","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544549.3573800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:57Z","timestamp":1750178817000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544549.3573800"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":43,"alternative-id":["10.1145\/3544549.3573800","10.1145\/3544549"],"URL":"https:\/\/doi.org\/10.1145\/3544549.3573800","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}