Food Aid Technology

Over half of Syrian refugee households in Lebanon are food insecure with some reliant on an electronic voucher (e-voucher) system for food aid. The interplay between the digitisation of food aid, within the socio-technical context of refugees, and community collaborative practices is yet to be investigated. Through design engagements and interviews with refugees and shop owners we explore the experiences of a Syrian refugee community in Lebanon using the e-voucher system. We provide insights into the socio-technical environment in which the e-voucher system is dispensing aid, the information and power asymmetries experienced, refugee collaborative coping practices and how they interplay with the e-voucher system. We highlight the need for: (1) expanding refugee digital capabilities to encompass understandings of aid technologies and identifying trusted intermediaries and (2) for technologies to support in upholding humanitarian principles and mitigating power and information asymmetries. Lastly, we call for CSCW researchers and humanitarian innovators to consider how humanitarian technologies can enable refugee collaborative practices and adopt everyday security as a lens for designing aid technologies. The paper contributes to CSCW knowledge regarding the interplay between aid technologies and refugees? socio-technical contexts and practices that provides a basis for future technological designs for collaborative technologies for refugee food security.

[1]  Geraldine Fitzpatrick,et al.  Supporting the Supporters of Unaccompanied Migrant Youth: Designing for Social-ecological Resilience , 2020, CHI.

[2]  Christian Kray,et al.  Exploring Forced Migrants (Re)settlement & the Role of Digital Services , 2018, ECSCW Exploratory Papers.

[3]  Nick Vaughan-Williams,et al.  Vernacular theories of everyday (in)security: The disruptive potential of non-elite knowledge , 2016 .

[4]  Amit Prakash,et al.  The politics of anti-poverty artefacts: lessons from the computerization of the food security system in Karnataka , 2015, ICTD.

[5]  Rob Comber,et al.  Za'atari Refugee Cookbook: Relevance, Challenges and Design Considerations , 2017, CHI Extended Abstracts.

[6]  Thomas Ludwig,et al.  CrowdMonitor: Mobile Crowd Sensing for Assessing Physical and Digital Activities of Citizens during Emergencies , 2015, CHI.

[7]  Tapan S. Parikh,et al.  Understanding and designing for intermediated information tasks in India , 2006, IEEE Pervasive Computing.

[8]  Patrick Olivier,et al.  Syrian Refugees and Digital Health in Lebanon: Opportunities for Improving Antenatal Health , 2016, CHI.

[9]  Kristin Bergtora Sandvik,et al.  Humanitarian technology: a critical research agenda , 2014, International Review of the Red Cross.

[10]  Jinan Usta,et al.  Assessment of reproductive health and violence against women among displaced Syrians in Lebanon , 2014, BMC Women's Health.

[11]  Lizzie Coles-Kemp,et al.  In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities , 2018, CHI.

[12]  E. Renold,et al.  The use of vignettes in qualitative research , 1999 .

[13]  Carleen Maitland,et al.  Digital Developments: Harbingers of Humanitarian Change? , 2019 .

[14]  Rima R. Habib,et al.  Ethical, methodological, and contextual challenges in research in conflict settings: the case of Syrian refugee children in Lebanon , 2019, Conflict and Health.

[15]  Kyle Montague,et al.  A Call For Embedding Dignity In Humanitarian Technologies , 2019, C&T.

[16]  Nicola Dell,et al.  Identity at the margins: examining refugee experiences with digital identity systems in Lebanon, Jordan, and Uganda , 2019, COMPASS.

[17]  Syed Ishtiaque Ahmed,et al.  Exile Within Borders: Understanding the Limits of the Internally Displaced People (IDPs) in Iraq , 2019, LIMITS.

[18]  Geraldine Fitzpatrick,et al.  Think globally, act locally: a case study of a free food sharing community and social networking , 2014, CSCW.

[19]  Adrian Holzer,et al.  Community Building with Co-located Social Media: A Field Experiment with Syrian Refugees , 2017, ICTD.

[20]  Maja Janmyr,et al.  Precarity in Exile: The Legal Status of Syrian Refugees in Lebanon , 2016 .

[21]  Mark Duffield,et al.  Challenging environments: Danger, resilience and the aid industry , 2012 .

[22]  M. Angela Sasse,et al.  The true cost of unusable password policies: password use in the wild , 2010, CHI.

[23]  Silvia Masiero,et al.  New routes to cashlessness? ICTs, demonetisation, and the Indian informal economy , 2017 .

[24]  M. Duffield The resilience of the ruins: towards a critique of digital humanitarianism , 2016 .

[25]  Margot Brereton,et al.  Sharing, Saving, and Living Well on Less: Supporting Social Connectedness to Mitigate Financial Hardship , 2016, Int. J. Hum. Comput. Interact..

[26]  Stephen Lindsay,et al.  The joy of cheques: trust, paper and eighty somethings , 2012, CSCW.

[27]  Virginia Braun,et al.  Successful Qualitative Research: A practical guide for beginners , 2013, QMiP Bulletin.

[28]  Badri Bahadur Dulal,et al.  Hazard Analysis and Critical Control Point (HACCP) , 2015 .

[29]  Ishita Ghosh,et al.  The persistence of paper: a case study in microfinance from Ghana , 2015, ICTD.

[30]  Sarah E Parkinson,et al.  Negotiating health and life: Syrian refugees and the politics of access in Lebanon. , 2015, Social science & medicine.

[31]  Shekar Bose,et al.  Hazard analysis and critical control point (HACCP) in seafood processing: An analysis of its application and use in regulation in the Sultanate of Oman , 2017 .

[32]  Marcus Foth,et al.  Food talks back: exploring the role of mobile applications in reducing domestic food wastage , 2014, OZCHI.

[33]  Silvia Masiero,et al.  Explaining trust in large biometric infrastructures: A critical realist case study of India's Aadhaar project , 2018, Electron. J. Inf. Syst. Dev. Ctries..

[34]  J. Creswell,et al.  Determining Validity in Qualitative Inquiry , 2000 .

[35]  Paul Dourish,et al.  Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena , 2006, Hum. Comput. Interact..

[36]  Patrick Olivier,et al.  Implications of Synchronous IVR Radio on Syrian Refugee Health and Community Dynamics , 2017, C&T.

[37]  Lizzie Coles-Kemp,et al.  Accessing a New Land: Designing for a Social Conceptualisation of Access , 2019, CHI.

[38]  Susana Moreno Romero,et al.  WFP experiences of vulnerability assessment of Syrian refugees in Lebanon , 2015 .

[39]  S. Masiero,et al.  Datafying anti-poverty programmes: implications for data justice , 2019, Information, Communication & Society.

[40]  Richard J. Anderson,et al.  Examining Security and Privacy Research in Developing Regions , 2018, COMPASS.

[41]  Dhaval Vyas,et al.  Rebuilding social capital: engaging newly arrived refugees in participatory design , 2017, OZCHI.

[42]  Ekram Mustafa El-Huni WFP e-voucher programme in Lebanon , 2015 .

[43]  Dhaval Vyas,et al.  Vulnerability of displacement: challenges for integrating refugees and asylum seekers in host communities , 2016, OZCHI.

[44]  Carleen F. Maitland,et al.  Community-Level Access Divides: A Refugee Camp Case Study , 2016, ICTD.

[45]  Clara Crivellaro,et al.  Food Democracy in the Making: Designing with Local Food Networks , 2018, CHI.

[46]  Katja Lindskov Jacobsen,et al.  The Politics of Humanitarian Technology: Good Intentions, Unintended Consequences and Insecurity , 2015 .

[47]  Margot Brereton,et al.  Building connections: technology design for living on a low income , 2016, PDC.

[48]  Tawanna Dillahunt,et al.  Online Grocery Delivery Services: An Opportunity to Address Food Disparities in Transportation-scarce Areas , 2019, CHI.

[49]  Daniel A. Epstein,et al.  Women's Health, Wellbeing, & Empowerment , 2019, CSCW Companion.

[50]  Jad Chaaban,et al.  Targeting mechanisms for cash transfers using regional aggregates , 2018, Food Security.

[51]  Helmut Krcmar,et al.  Supporting Refugees in Everyday Life- Intercultural Design Evaluation of an Application for Local Information , 2017, PACIS.

[52]  Bertrand Taithe,et al.  Data hubris? Humanitarian information systems and the mirage of technology , 2016 .

[53]  R. Sanyal,et al.  A no-camp policy: Interrogating informal settlements in Lebanon , 2017 .

[54]  Graham Smith,et al.  Into Cerberus' Lair: Bringing the Idea of Security to Light 1 , 2005 .

[55]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[56]  Kyle Montague,et al.  Involving Syrian Refugees in Design Research: Lessons Learnt from the Field , 2019, Conference on Designing Interactive Systems.

[57]  Neha Kumar,et al.  Refuge Tech: An Assets-Based Approach to Refugee Resettlement , 2018, CHI Extended Abstracts.

[58]  Maha Aly,et al.  Empathy Up , 2017, CHI Extended Abstracts.

[59]  Konstantin Aal,et al.  HCI and refugees , 2018, Interactions.

[60]  Jacki O'Neill,et al.  Working Digital Money into a Cash Economy: The Collaborative Work of Loan Payment , 2017, Computer Supported Cooperative Work (CSCW).

[61]  Nahla Hwalla,et al.  Development and validation of an Arab family food security scale. , 2014, The Journal of nutrition.

[62]  Richard Buchanan,et al.  Design Research and the New Learning , 2001, Design Issues.

[63]  Jay Chen,et al.  Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh , 2017, Proc. ACM Hum. Comput. Interact..

[64]  Adrian Holzer,et al.  Towards a Principled Approach to Humanitarian Information and Communication Technology , 2017, ICTD.

[65]  Belet Weyne Food and Agriculture Organization , 1949, International Organization.

[66]  Rebecca E. Grinter,et al.  Designing for Transient Use: A Human-in-the-loop Translation Platform for Refugees , 2016, CHI.

[67]  WulfVolker,et al.  Finding Language Classes , 2019 .