{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:50:20Z","timestamp":1776113420369,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":108,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T00:00:00Z","timestamp":1714608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,2]]},"DOI":"10.1145\/3613905.3651081","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:15:21Z","timestamp":1715415321000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Seeing Human Rights at Sea: How to Align Tech Development with the Needs of Maritime Human Rights Investigators and Affected Communities"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4007-6563","authenticated-orcid":false,"given":"Jamie","family":"Hancock","sequence":"first","affiliation":[{"name":"The Alan Turing Institute, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5689-7131","authenticated-orcid":false,"given":"Ruoyun","family":"Hui","sequence":"additional","affiliation":[{"name":"The Alan Turing Institute, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5102-6564","authenticated-orcid":false,"given":"Jatinder","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Technology, University of Cambridge, United Kingdom and The Alan Turing Institute, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7382-4278","authenticated-orcid":false,"given":"Anjali","family":"Mazumder","sequence":"additional","affiliation":[{"name":"The Alan Turing Institute, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3434177"},{"key":"e_1_3_3_3_2_1","unstructured":"Amnesty International. 2024. About Amnesty\u2019s Citizen Evidence Lab. https:\/\/citizenevidence.org\/about-us\/"},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72837-7"},{"key":"e_1_3_3_3_4_1","unstructured":"Rae Baker. 2019. OSINT on the Ocean: Maritime Intelligence Gathering Techniques. https:\/\/wondersmithrae.medium.com\/osint-on-the-ocean-maritime-intelligence-gathering-techniques-2ee39e554fe1"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292015"},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/03091325221074691"},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118924396.wbiea2517"},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461702.3462612"},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025512"},{"key":"e_1_3_3_3_10_1","volume-title":"The SAGE Handbook of Qualitative Research (5 ed.)","author":"Brinkmann Svend","unstructured":"Svend Brinkmann. 2017. The Interview. In The SAGE Handbook of Qualitative Research (5 ed.), Norman\u00a0K. Denzin and Yvonna\u00a0S. Lincoln (Eds.). SAGE Publications, Thousand Oaks, CA."},{"key":"e_1_3_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/1548512918795738"},{"key":"e_1_3_3_3_13_1","unstructured":"Chatham House. 2024. Chatham House Rule. https:\/\/www.chathamhouse.org\/about-us\/chatham-house-rule"},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0373463311000749"},{"key":"e_1_3_3_3_15_1","volume-title":"Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Chen Christine","year":"2019","unstructured":"Christine Chen, Nicola Dell, and Franziska Roesner. 2019. Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 89\u2013104. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/chen"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020"},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00055"},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555186"},{"key":"e_1_3_3_3_19_1","article-title":"Challenges in Codifying Events Within Large and Diverse Data Sets of Human Rights Documentation: Memory, Intent, and Bias","volume":"14","author":"Deutch Jeff","year":"2020","unstructured":"Jeff Deutch. 2020. Challenges in Codifying Events Within Large and Diverse Data Sets of Human Rights Documentation: Memory, Intent, and Bias. International Journal of Communication 14, 0 (9 2020), 17. https:\/\/ijoc.org\/index.php\/ijoc\/article\/view\/8520","journal-title":"International Journal of Communication"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2021.1889384"},{"key":"e_1_3_3_3_21_1","unstructured":"Sam Dubberley. 2015. Protecting the Victim\u2019s Identity. Should we be thinking about the... | by Eyewitness Media Hub | First Draft Footnotes | Medium. https:\/\/medium.com\/1st-draft\/protecting-the-victim-s-identity-3b7df432ec09"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/faf.12285"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557196"},{"key":"e_1_3_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.7551\/MITPRESS"},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1017\/9781316838952.008"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.marpol.2018.10.026"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1093\/icesjms"},{"key":"e_1_3_3_3_31_1","unstructured":"Forensic Architecture. 2022. Drift-backs in the Aegean Sea. https:\/\/aegean.forensic-architecture.org\/"},{"key":"e_1_3_3_3_32_1","unstructured":"Forensic Architecture. 2024. Forensic Architecture. https:\/\/forensic-architecture.org\/about\/agency"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.oneear.2022.08.006"},{"key":"e_1_3_3_3_34_1","volume-title":"Digital Witness: Using Open Source Information for Human Rights Investigation, Documentation, and Accountability, Sam Dubberly, A\u00a0Koenig, and D\u00a0Murray (Eds.)","author":"Freeman Lindsay","unstructured":"Lindsay Freeman. 2019. Prosecuting Atrocity Crimes with Open Source Evidence. In Digital Witness: Using Open Source Information for Human Rights Investigation, Documentation, and Accountability, Sam Dubberly, A\u00a0Koenig, and D\u00a0Murray (Eds.). Oxford University Press, Chapter\u00a03, 48\u201367."},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.14197\/atr.20121786"},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376647"},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781849208574"},{"key":"e_1_3_3_3_38_1","unstructured":"Global Fishing Watch. 2024. About Us. https:\/\/globalfishingwatch.org\/about-us\/"},{"key":"e_1_3_3_3_39_1","unstructured":"Global Fishing Watch. 2024. Transparency for a Sustainable Ocean | Global Fishing Watch. https:\/\/globalfishingwatch.org\/"},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42438-022-00352-x"},{"key":"e_1_3_3_3_42_1","unstructured":"Greenpeace. 2020. Choppy Waters: Forced labour and illegal fishing in Taiwan\u2019s distant water fisheries. Technical Report. https:\/\/www.greenpeace.org\/static\/planet4-southeastasia-stateless\/2020\/03\/b87c6229-2020-choppy-waters-en.pdf"},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","unstructured":"Karin Hansson Teresa Cerratto\u00a0Pargman and Anna Dahlgren. 2020. Datafication and cultural heritage: provocations threats and design opportunities. (2020). https:\/\/doi.org\/10.18420\/ECSCW2020_WS05 Publisher: [object Object].","DOI":"10.18420\/ECSCW2020_WS05"},{"key":"e_1_3_3_3_45_1","volume-title":"Disobedient Sensing and Border Struggles at the Maritime Frontier of EUrope \u2013 spheres. Spheres 4 (6","author":"Heller Charles","year":"2017","unstructured":"Charles Heller, Lorenzo Pezzani, and Maurice Stierl. 2017. Disobedient Sensing and Border Struggles at the Maritime Frontier of EUrope \u2013 spheres. Spheres 4 (6 2017). https:\/\/spheres-journal.org\/contribution\/disobedient-sensing-and-border-struggles-at-the-maritime-frontier-of-europe\/"},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1215\/08992363-2683639"},{"key":"e_1_3_3_3_47_1","unstructured":"Eliot Higgins. 2023. How Open Source Evidence was Upheld in a Human Rights Court - bellingcat. https:\/\/www.bellingcat.com\/resources\/2023\/03\/28\/how-open-source-evidence-was-upheld-in-a-human-rights-court\/"},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1080\/02681102.2019.1667289"},{"key":"e_1_3_3_3_49_1","volume-title":"More than 2,000 enslaved fishermen rescued in 6 months","author":"Htusan Esther","year":"2015","unstructured":"Esther Htusan and Margie Mason. 2015. More than 2,000 enslaved fishermen rescued in 6 months. Associated Press (9 2015). https:\/\/www.ap.org\/explore\/seafood-from-slaves\/more-than-2, 000-enslaved-fishermen-rescued-in-6-months.htm"},{"key":"e_1_3_3_3_50_1","unstructured":"Human Rights at Sea. 2022. Geneva Declaration on Human Rights at Sea. https:\/\/www.humanrightsatsea.org\/sites\/default\/files\/media-files\/2022-02\/GDHRAS_Jan_2022_Final_online_version_sp%20%281%29.pdf"},{"key":"e_1_3_3_3_51_1","unstructured":"Human Rights Watch. 2024. Digital Investigations Lab. https:\/\/www.hrw.org\/topic\/technology-and-rights\/digital-investigations-lab"},{"key":"e_1_3_3_3_52_1","unstructured":"ILO. 2024. Using technology to eliminate forced labour on the ocean. http:\/\/www.ilo.org\/global\/topics\/sdg-2030\/goal-8\/target-8-7\/accelerator-lab\/projects\/mpfund\/WCMS_856957\/lang\u2013en\/index.htm"},{"key":"e_1_3_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1111\/DISA.12286"},{"key":"e_1_3_3_3_54_1","volume-title":"The SAGE Handbook of Qualitative Research (5 ed.)","author":"Kamberelis George","unstructured":"George Kamberelis, Greg Dimitriadis, and Alyson Welker. 2017. Focus Group Research and\/in Figured Worlds. In The SAGE Handbook of Qualitative Research (5 ed.), Norman\u00a0K. Denzin and Yvonna\u00a0S. Lincoln (Eds.). SAGE Publications, Thousand Oaks, CA."},{"key":"e_1_3_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAN56228.2022.10007411"},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI58124.2022.00259"},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3212384"},{"key":"e_1_3_3_3_58_1","doi-asserted-by":"publisher","unstructured":"A.\u00a0M. Klimkowska and I. Lee. 2017. A prealiminary study of ship detection from uav images based on color space conversion and image segmentation. The International Archives of the Photogrammetry Remote Sensing and Spatial Information Sciences XLII-2-W6 2W6 (8 2017) 189\u2013193. https:\/\/doi.org\/10.5194\/ISPRS-ARCHIVES-XLII-2-W6-189-2017","DOI":"10.5194\/ISPRS-ARCHIVES-XLII-2-W6-189-2017"},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1093\/jicj"},{"key":"e_1_3_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97283-1_7"},{"key":"e_1_3_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1353\/hrq.2020.0019"},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0373463314000253"},{"key":"e_1_3_3_3_65_1","volume-title":"Public eyes: satellite imagery, the globalization of transparency, and new networks of surveillance. Information technologies and global politics: The changing scope of power and governance","author":"Litfin T","year":"2002","unstructured":"Karen\u00a0T Litfin. 2002. Public eyes: satellite imagery, the globalization of transparency, and new networks of surveillance. Information technologies and global politics: The changing scope of power and governance (2002), 65\u201388."},{"key":"e_1_3_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0373463313000374"},{"key":"e_1_3_3_3_67_1","volume-title":"The IUU fishing index","author":"Macfadyen G","year":"2019","unstructured":"G Macfadyen, G Hosch, N Kaysser, and L Tagziria. 2019. The IUU fishing index, 2019. Poseidon Aquatic resource management limited and the global initiative against transnational organized crime. Global Initiative. https:\/\/globalinitiative. net\/wp-content\/uploads\/2019\/02\u00a0...."},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.3389\/FMARS.2020.589000"},{"key":"e_1_3_3_3_69_1","unstructured":"MarineTraffic. 2024. MarineTraffic. https:\/\/www.marinetraffic.com\/en\/ais\/home\/centerx:-12.0\/centery:25.0\/zoom:4"},{"key":"e_1_3_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40152-020-00201-2"},{"key":"e_1_3_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.marpol.2016.02.009"},{"key":"e_1_3_3_3_72_1","volume-title":"accountability, human rights and good governance : where is the nexus?. Mousaion (1","author":"Masuku Mehluli","year":"2012","unstructured":"Mehluli Masuku. 2012. Archives, accountability, human rights and good governance : where is the nexus?. Mousaion (1 2012). https:\/\/journals.co.za\/doi\/abs\/10.10520\/EJC144282"},{"key":"e_1_3_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.5194\/ISPRSARCHIVES-XL-1-W1-233-2013"},{"key":"e_1_3_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1093\/jicj"},{"key":"e_1_3_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2104563118"},{"key":"e_1_3_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2016238117"},{"key":"e_1_3_3_3_78_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"McGregor E.","year":"2017","unstructured":"Susan\u00a0E. McGregor, Elizabeth\u00a0Anne Watkins, Mahdi\u00a0Nasrullah Al-Ameen, Kelly Caine, and Franziska Roesner. 2017. When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 505\u2013522. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/mcgregor"},{"key":"e_1_3_3_3_80_1","doi-asserted-by":"crossref","unstructured":"Ella McPherson Isabel\u00a0Guenette Thornton and Matt Mahmoudi. 2019. Open Source Investigations and the Technology-Driven Knowledge Controversy in Human Rights Fact-Finding.","DOI":"10.1093\/law\/9780198836063.003.0005"},{"key":"e_1_3_3_3_81_1","volume-title":"The seductions of quantification: measuring human rights, gender violence, and sex trafficking","author":"Merry Sally\u00a0Engle","unstructured":"Sally\u00a0Engle Merry. 2016. The seductions of quantification: measuring human rights, gender violence, and sex trafficking. The University of Chicago Press. 249 pages."},{"key":"e_1_3_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951720966781"},{"key":"e_1_3_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.22.1.129"},{"key":"e_1_3_3_3_84_1","volume-title":"To save everything, click here: the folly of technological solutionism","author":"Morozov Evgeny","unstructured":"Evgeny Morozov. 2013. To save everything, click here: the folly of technological solutionism (first edition ed.). PublicAffairs."},{"key":"e_1_3_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1126\/SCIADV.1701833"},{"key":"e_1_3_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-023-06825-8"},{"key":"e_1_3_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.abp8200"},{"key":"e_1_3_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.marpol.2020.103937"},{"key":"e_1_3_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243919852672"},{"key":"e_1_3_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCM58628.2023.10159062"},{"key":"e_1_3_3_3_91_1","volume-title":"Digital Witness: Using Open Source Information for Human Rights Investigation","author":"Rahman Zara","year":"1988","unstructured":"Zara Rahman and Gabriela Ivens. 2019. Ethics in Open Source Investigations in: Digital Witness. In Digital Witness: Using Open Source Information for Human Rights Investigation, Documentation, and Accountability, Sam Dubberley, Alexa Koenig, and Daragh Murray (Eds.). Oxford University Press, Oxford, Chapter\u00a011. https:\/\/opil.ouplaw.com\/display\/10.1093\/law\/9780198836063.001.0001\/law-9780198836063-chapter-12"},{"key":"e_1_3_3_3_92_1","doi-asserted-by":"publisher","DOI":"10.1093\/JHUMAN"},{"key":"e_1_3_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781446282243"},{"key":"e_1_3_3_3_94_1","doi-asserted-by":"publisher","unstructured":"T. Reize R. M\u00fcller and R. Kiefl. 2013. An Interative Grahical User Interface for Maritime Security Services. The International Archives of the Photogrammetry Remote Sensing and Spatial Information Sciences XL-7-W2 7W2 (10 2013) 201\u2013206. https:\/\/doi.org\/10.5194\/ISPRSARCHIVES-XL-7-W2-201-2013","DOI":"10.5194\/ISPRSARCHIVES-XL-7-W2-201-2013"},{"key":"e_1_3_3_3_95_1","volume-title":"Coding and Analyzing Qualitative Data","author":"Rivas Carol","unstructured":"Carol Rivas. 2012. Coding and Analyzing Qualitative Data. In Researching Society and Culture, Clive Sale (Ed.). SAGE Publications, Thousand Oaks, CA., Chapter\u00a021."},{"key":"e_1_3_3_3_96_1","doi-asserted-by":"publisher","DOI":"10.1002\/WIDM.1266"},{"key":"e_1_3_3_3_97_1","doi-asserted-by":"publisher","DOI":"10.3389\/FCOMP.2023.1185760"},{"key":"e_1_3_3_3_98_1","volume-title":"The Coding Manual For Qualitative Researchers","author":"Salda\u00f1a Johnny","unstructured":"Johnny Salda\u00f1a. 2021. The Coding Manual For Qualitative Researchers Fourth Edition. SAGE Publications, Thousand Oaks, CA. 960 pages."},{"key":"e_1_3_3_3_99_1","doi-asserted-by":"publisher","DOI":"10.1201\/9780203301302-8"},{"key":"e_1_3_3_3_100_1","doi-asserted-by":"publisher","DOI":"10.1080\/15710880701875068"},{"key":"e_1_3_3_3_101_1","doi-asserted-by":"publisher","DOI":"10.1080\/2157930X.2020.1854249"},{"key":"e_1_3_3_3_102_1","unstructured":"Seafood Watch. 2024. Seafood Social Risk Tool. https:\/\/www.seafoodwatch.org\/our-projects\/seafood-social-risk-tool"},{"key":"e_1_3_3_3_103_1","volume-title":"Sampling","author":"Seale Clive","unstructured":"Clive Seale. 2012. Sampling. In Researching Society and Culture, Clive Seale (Ed.). SAGE Publications, Thousand Oaks, CA., Chapter\u00a09. https:\/\/uk.sagepub.com\/en-gb\/eur\/node\/53906\/print"},{"key":"e_1_3_3_3_104_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-28916-2"},{"key":"e_1_3_3_3_105_1","unstructured":"ShipSpotting. 2024. ShipSpotting.com. https:\/\/www.shipspotting.com\/"},{"key":"e_1_3_3_3_106_1","doi-asserted-by":"publisher","DOI":"10.1111\/glob.12077"},{"key":"e_1_3_3_3_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025615"},{"key":"e_1_3_3_3_108_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0373463314000654"},{"key":"e_1_3_3_3_109_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2100341118"},{"key":"e_1_3_3_3_111_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315067339"},{"key":"e_1_3_3_3_112_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-018-07118-9"},{"key":"e_1_3_3_3_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470716"},{"key":"e_1_3_3_3_115_1","unstructured":"Nick Waters Emmanuel Freudenthal and Logan Williams. 2020. Frontex at Fault: European Border Force Complicit in \u2018Illegal\u2019 Pushbacks. https:\/\/www.bellingcat.com\/news\/2020\/10\/23\/frontex-at-fault-european-border-force-complicit-in-illegal-pushbacks\/"},{"key":"e_1_3_3_3_116_1","doi-asserted-by":"publisher","DOI":"10.1126\/SCIADV.ABQ2109"},{"key":"e_1_3_3_3_117_1","doi-asserted-by":"publisher","unstructured":"Elizabeth White. 2023. Closing cases with open-source: Facilitating the use of user-generated open-source evidence in international criminal investigations through the creation of a standing investigative mechanism. Leiden Journal of International Law (2023) 1\u201323. https:\/\/doi.org\/10.1017\/S0922156523000444","DOI":"10.1017\/S0922156523000444"},{"key":"e_1_3_3_3_118_1","article-title":"The Art of Coding and Thematic Exploration in Qualitative Research","volume":"15","author":"Williams Michael","year":"2019","unstructured":"Michael Williams and Tami Moser. 2019. The Art of Coding and Thematic Exploration in Qualitative Research. International Management Review 15, 1 (2019).","journal-title":"International Management Review"},{"key":"e_1_3_3_3_119_1","doi-asserted-by":"publisher","DOI":"10.1093\/scipol"},{"key":"e_1_3_3_3_120_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2018.01.033"}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Extended Abstracts of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613905.3651081","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613905.3651081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:57:09Z","timestamp":1750291029000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613905.3651081"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,2]]},"references-count":108,"alternative-id":["10.1145\/3613905.3651081","10.1145\/3613905"],"URL":"https:\/\/doi.org\/10.1145\/3613905.3651081","relation":{},"subject":[],"published":{"date-parts":[[2024,5,2]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}