Investigating Concerns of Security and Privacy Among Rohingya Refugees in Malaysia
AI-generated Key Points
- Security and privacy concerns of refugee communities are increasingly pressing in the context of global migration
- Rohingya refugees, a stateless Muslim minority group in Myanmar, were forced to flee their homes due to conflict and violence
- Many Rohingya fled to neighboring countries such as Bangladesh and ended up in refugee camps, while others migrated to Malaysia and live within the community as urban refugees
- Rohingya refugees in Malaysia are not legally recognized and have limited access to public resources such as healthcare and education, exacerbating their security and privacy challenges
- The study investigates the implications of security and privacy for Rohingya refugees in Malaysia, with a focus on available technological assistance that is accessible to them
- Participants demonstrated high levels of knowledge pertaining to privacy awareness and safety measures aimed at avoiding profiling and tracking that may lead to exploitation
- Privacy policies and consent protocols for social media platforms like TikTok were deemed inappropriate by the Rohingya participants
- Money was viewed as the most private object by many participants due to exploitation by authorities such as police
- Marginalized urban refugees may have limited access to digital technologies which can result in digital exclusion with serious implications for their security and privacy
- Ensuring appropriate technology use is more delicate for stateless Rohingya refugees living in an urban population like Malaysia where they lack legal recognition
- The findings highlight the need for a human-centered approach when designing technological solutions that factor in specific requirements related to security and privacy challenges faced by marginalized communities like the Rohingya refugees.
Authors: Theodoros Georgiou, Lynne Baillie, Ryan Shah
Abstract: The security and privacy of refugee communities have emerged as pressing concerns in the context of increasing global migration. The Rohingya refugees are a stateless Muslim minority group in Myanmar who were forced to flee their homes after conflict broke out, with many fleeing to neighbouring countries and ending up in refugee camps, such as in Bangladesh. However, others migrated to Malaysia and those who arrive there live within the community as urban refugees. However, the Rohingya in Malaysia are not legally recognized and have limited and restricted access to public resources such as healthcare and education. This means they face security and privacy challenges, different to other refugee groups, which are often compounded by this lack of recognition, social isolation and lack of access to vital resources. This paper discusses the implications of security and privacy of the Rohingya refugees, focusing on available and accessible technological assistance, uncovering the heightened need for a human-centered approach to design and implementation of solutions that factor in these requirements. Overall, the discussions and findings presented in this paper on the security and privacy of the Rohingya provides a valuable resource for researchers, practitioners and policymakers in the wider HCI community.
Ask questions about this paper to our AI assistant
You can also chat with multiple papers at once here.
Assess the quality of the AI-generated content by voting
Why do we need votes?
Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.
Similar papers summarized with our AI tools
Navigate through even more similar papers through atree representation
Look for similar papers (in beta version)
By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.
Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.