Feeds:
Posts
Comments

Archive for November, 2012

The November 14, 2012, Technology Salon NYC (TSNYC) focused on ways that ICTs can support work with children who migrate. An earlier post covers the discussion around Population Council’s upcoming ‘Adolescent Girls on the Move’ report. The current post focuses on the strategic use of data visualization for immigration advocacy, based on opening points from Brian Root and Enrique Piracés of Human Rights Watch (HRW).

Visualizing the US Detention Network and the transfers between detention centers.

The project

The HRW initiative used data to track and visualize the movement of people through the US immigration detention system after noticing that U.S. Immigration and Customs Enforcement (ICE) was moving people very freely without notifying their families or attorneys. HRW was aware of the problem but not its pervasiveness. The team obtained some large data sets from the US government via Freedom of Information Act (FOIA) requests. They used the data to track individuals’ routes through the immigration detention system, eventually mapping the whole system out at both aggregate levels and the level of individual. The patterns in the data informed HRW’s advocacy at the state and federal levels. In the process, HRW was able to learn some key lessons on advocacy and the importance of targeting data visualizations to specific advocacy purposes.

Data advocacy and storytelling

The data set HRW obtained included over 5.4 million records of 2.3 million people, with 10-12 variables. The team was able to connect these records to individuals, which helped tell a meaningful story to a broad audience. By mapping out all the US facilities involved and using geo-location to measure the distance that any individual had been transferred, the number of times an individual from Country X in Age Range X was transferred from one facility to another was visible, and patterns could be found. For example, often people on the East Coast were transferred to Texas, where there is a low ratio of immigration lawyers per detainee.

Even though the team had data and good stories to tell with the data, the two were not enough to create change. Human rights are often not high priority for decision makers, but budgeting is; so the team attached a cost to each vector that would allow HRW to tell decision makers how much was being spent for each of these unnecessary transfers.

They were also able to produce aggregated data at the local level. They created a state dashboard so that people could understand the data at the state level, since the detention facilities are state-run. The data highlighted local-level inefficiencies. The local press was then able to tell locally relevant stories, thus generating public opinion around the issue. This is a good example of the importance of moving from data to story telling in order to strengthen advocacy work.

HRW conveyed information and advocated both privately and publicly for change in the system. Their work resulted in the issuing of a new directive in January 2012.

FOIA and the data set

Obtaining data via FOIA acts can be quite difficult if an organization is a known human rights advocate. For others it can be much easier. It is a process of much letter sending and sometimes legal support.

Because FOIA data comes from the source, validation is not a major issue. Publishing methodologies openly helps with validation because others can observe how data are being used. In the case of HRW, data interpretations were shared with the US Government for discussion and refutation. The organization’s strength is in its credibility, thus HRW makes every effort to be conservative with data interpretation before publishing or making any type of statement.

One important issue is knowing what data to ask for and what is possible or available. Phrasing the FOI request to obtain the right data can be a challenge. In addition, sometimes agencies do not know how to generate the requested information from their data systems. Google searches for additional data sets that others have obtained can help. Sites such as CREW (Citizens for Responsibility and Ethics in Washington), which has 20,000 documents open on Scribd, and the Government Attic project, which collects and lists FOI requests, are attempting to consolidate existing FOI information.

The type of information available in the US could help identify which immigration facilities are dealing with the under-18 population and help speculate on the flow of child migrants. Gender and nationality variables could also tell stories about migration in the US. In addition, the data can be used to understand probability: If you are a Mexican male in San Jose, California, what is the likelihood of being detained? Of being deported?

The US Government collects and shares this type of data, however many other countries do not. Currently only 80 countries have FOI laws. Obtaining these large data sets is both a question of whether government ministries are collecting statistics and whether there are legal mechanisms to obtain data and information.

Data parsing

Several steps and tools helped HRW with data parsing. To determine whether data were stable, data were divided by column and reviewed, using a SHELL. Then the data were moved to a database (MySQL), however other programs may be a better choice. A set of programs and scripts was built to analyze the data, and detention facilities were geo-located using GeoNames. The highest quality result was used to move geo-location down to the block level and map all the facilities. Then TileMill and Quantum GIS (QGIS) were used to make maps and ProtoViz (now D3) was used to create data visualizations.

Once the data were there, common variables were noted throughout the different fields and used to group and link information and records to individuals. Many individuals had been in the system multiple times. The team then looked at different ways that the information could be linked. They were able to measure time, distance and the “bounce factor”, eg.., how many times an individual was transferred from one place to the other.

Highlighting problematic cases: One man’s history of transfers.

Key learning:

Remember the goal. Visualization tools are very exciting, and it is easy to be seduced by cool visualizations. It is critical to keep in mind the goal of the project. In the HRW case the goal was to change policy, so the team needed to create visualizations that would specifically lead to policy change. In discussions with the advocacy team, they defined that the visualizations needed to 1) demonstrate the complexity 2) allow people to understand the distance 3) show the vast numbers of people being moved.

Privacy. It is possible to link together individual records and other information to tell a broader story, but one needs to be very careful about this type of information identifying individuals and putting them at risk. For this reason not all information needs to be shared publicly for advocacy purposes. It can be visualized in private conversations with decision makers.

Data and the future

Open data, open source, data visualization, and big data are shaping the world we are embedded in. More and more information is being released, whether through open data, FOIA or information leaks like Wikileaks. Organizations need to begin learning how to use this information in more and better ways.

Many thanks to the Women’s Refugee Commission and the International Rescue Committee for hosting the Salon.

The next Technology Salon NYC will be coming up soon. Stay tuned for more information, and if you’d like to receive notifications about future salons, sign up for the mailing list!

Read Full Post »

The November 14, 2012, Technology Salon NYC focused on ways that ICTs can support work with children who migrate. Our lead discussants were:  Sarah Engebretsen and Kate Barker from Population Council, and Brian Root and Enrique Piracés from Human Rights Watch.

This post summarizes discussions that surfaced around the Population Council’s upcoming Girls on the Move report, which looks at adolescent girls’ (ages 10-19) internal and regional migration in ‘developing’ countries, including opportunity and risk. (In a second blog post I will cover Human Rights Watch’s points and resulting discussions.)

The Girls on the Move report (to be released in February 2013) will synthesize current evidence, incorporate results of specially commissioned research, illustrate experiences of migrant girls, provide examples of promising policies and programs, and offer concrete action-oriented recommendations.

1) How are migrant girls using ICTs?

While the report’s focus is not technology, the research team notes that there is some evidence showing that adolescent girls are using ICTs for:

  • Extending social networks. In China and Southeast Asia, migrant girls are building and accessing personal networks through mobiles and texting. This is especially pronounced among girls who work long hours in tedious jobs in factories, and who do not have much time with family and friends. Text messaging helps them maintain connections with existing social networks. It also gives them space for flirtation, which may not be something they can do in their former rural context because of cultural norms that look down on flirtatious behavior.
  • Finding new jobs. Both boys and girls use mobiles and text messaging for exchanging quick news about job openings. This suggests there could be an opening for program interventions that would connect to migrant children through texting, and that might supply information on community resources, for example, where to go in cases of threat or emergency—that might then propagate across migrant virtual networks.
  • Sending remittances. Based on research with adolescent girls and drawing from examples of adult migrants, it seems likely that a vast majority of migrant girls save money and send it to their families. Evidence on how girl migrants are using remittances is limited, but a survey conducted in Kenya found that 90% of adult migrants had sent money home to families in other parts of Kenya via mobile phone in the 30 days before the survey. There is more research needed on adolescent girls’ remittance patterns. Research is also lacking on adolescent girls’ access to and use of mobile phones and on whether mobile phones are owned or borrowed from another person who is the handset owner. Remittances, however, as one participant pointed out, are obviously only sent by mobile in countries with functioning mobile money systems.
  • Keeping in touch with family back home. In Western Kenya, migrant brides who are very isolated placed great importance on mobiles to stay in touch with family and friends back home. Facebook is very popular in some countries for keeping in touch with families and friends back home. In Johannesburg and Somalia, for example, one participant said “Facebook is huge.” Migrating adolescent girls and domestic working girls in Burkina Faso, however, do not have Internet access at all, via mobiles or otherwise.

2) Areas where ICTs could support work on child protection and migration

  • Child Protection Systems There is a general global move towards developing child protection systems that work for different kinds of vulnerable children. These efforts are important in the transit phase and right upon arrival as these phases are particularly risky for children who migrate. ICTs can play a role in managing information that is part of these systems. Ways to connect community child protection systems into district and national systems need more investigation.
  • Reporting abuse and getting help One example of ways that ICTs are supporting child protection in India and several other countries is Child Help Lines. ChildLine India received almost 23 million calls as of March 2012, with 62% of callers between the ages of 11 and 18. The helplines provide vulnerable groups of children and youth with referrals to local services, and in the best cases they are public-private partnerships that link with national and state governments. Of note is that boys call in more often than girls, and this raises questions about girls’ access to phones to actually make a call to obtain support. It also points to the need for differentiated strategies to reach both boys and girls.

3) Technology and exclusion

  • Social exclusion and access is a specific challenge due to the pronounced social exclusion of many migrant girls, particularly those who are married or working in socially isolated jobs such as child domestic workers. Girls in these situations may not have any access to technology at all, including to mobile phones.  Girls and women especially tend to have less access than men; they are often not the owners of devices. There is a research gap here, as no one actually knows how many migrating adolescent girls access mobiles and how many can borrow a phone for use. It is not clear if girls have their own phones, or if they are using an employer’s or a friend’s phone or a public call box. This would be a key factor in terms of working with adolescent girls and understanding risk and designing programs.
  • Technology should build on – not be seen as a replacement for – social networks. Girls access to social capital is a huge underlying topic. There is normally a rupture in social networks when girls move. They become socially isolated and this puts them at great risk. Domestic girl workers leave home and become more vulnerable to exploitation —  they have no friends or family around them, and they may not be able to access communication technologies. For this reason it is critical to understand that technology cannot replace social networks. A social network is needed first, and then ICTs can allow girls to remain in touch with those in their network. It is very important to think about understanding and/or building social networks before pushing the idea of technology or incorporating technologies.

4) ICTs and potential risk to child migrants

  • SMS, anonymity and privacy. According to a study one participant was involved in, some children and youth report feeling that they can speak up more freely by SMS since they can text privately even in close quarters. Others noted that some organizations are incorporating online counseling services for similar reasons. A study in Nigeria is ongoing regarding this same topic, and in Southeast Asia it has been shown that girls often use text messages to flirt using an alternate identity.
  • Retaliation. Concerns were raised regarding the possibility for retaliation if a child reports abuse or uses a mobile for flirting and the phone is confiscated.  Practices of self-protection and message deleting are not very well implemented in most cases. A participant noted that some of the low-end phones in Tanzania and Kenya periodically delete outgoing messages and only keep 15 messages on the phone at a time. This can help somewhat, though it is not a feature that is particularly aimed at protection and privacy, rather, it is more a function of low memory space. Safer Mobile is one initiative that looks at risk and privacy; however, like most efforts looking at risk, it is focused on political conflict and human rights situations, not at privacy and protection for child migrants or other types of abuse reporting that children may be involved in.

5) Research gaps and challenges

  • Migration contexts. It was emphasized that migration during an emergency situation is very different from a voluntary migration, or seasonal migration. Work is being done around communication with disaster or emergency affected populations via the Communication with Disaster Affected Communities (CDAC) Network, but this theme does not seem to be one of widespread discussion among US-based NGOs and humanitarian organizations.
  • Migrants are not necessarily disadvantaged however a bias exists in that researchers tend to look for disadvantage or those who are disadvantaged. They often ask questions that are biased towards showing that migrants are disadvantaged, but this is not always the case. Sometimes migrating children are the most advantaged. In some contexts migrating requires family support and funds to migrate, and those with the least amount of resources may not be able to move. In some cases migrant children have a huge, strong family structure. In others, children are escaping early marriage, their parents’ passing away or other difficult situations.
  • Integrated information and data crossing. One issue with research around migrants is that most looks solely at migrants and does not cross migration with other information. Many girls migrate with the idea that they will be able to get an education, for example, but there is not a lot of information on whether migrating girls have more or less access to education. The literature tends to focus on girls in the worst situations. In addition, although there are 4 times as many internal migrants as there are international migrants, focus tends to be on international migration.

In a second post, I will cover Human Rights Watch’s work on using data visualization to advocate for the rights of immigrants in the US.

Many thanks to our lead discussants from the Population Council and to the Women’s Refugee Commission and the International Rescue Committee for hosting! The next Technology Salon NYC will be coming up in January 2013. Stay tuned for more information and if you’d like to receive notifications about future salons, sign up for the mailing list!

Also, if you have research or examples of how child and youth migrants are using ICTs before, during or after their journey, or information on how organizations are using ICTs to support the process, please let me know.

Related posts and resources:

How can ICTs support and protect children who migrate?

New communication tools and disaster affected communities

Empowering communities with technology tools to protect children

Children on the Move website

Read Full Post »

This is a guest post from David Schaub-Jones who works with SeeSaw, a social venture that focuses on how technology can strengthen sanitation and water providers in developing countries. Follow SeeSaw on Twitter:  @ontheseesaw.

In June, two organisations focussed on using ICT (Information and Communications Technology) in the water and sanitation sector joined forces in Cape Town. SeeSaw, a social enterprise that customises ICT to support sanitation and water providers and iComms, a University of Cape Town research unit (Information for Community Oriented Municipal Services) co-hosted a two day event to look at how ICT tools are changing the way that public services function in developing countries.

(from SeeSaw’s website.)

There are growing expectations that harnessing ICT intelligently can bring about radical improvements in the way that health, education and other sectors function, particularly in developing countries. SeeSaw and iComms wanted to look at this in more detail – and to build on the open sharing of experience to provide general principles to those planning to harness ICT for public service delivery. Their overarching goal is to help practitioners cut through much of the complexity and hype surrounding ICT usage and give them a robust set of guidelines with which to plan and negotiate partnerships and projects on the ground.

The event brought together 30+ practitioners – with water sector professionals from across Southern Africa joined by their colleagues from the health sector – a sector that has been quick to innovate, try different approaches and learn lessons. A full write-up of the event can be found here in the Water Information Network of South Africa’s October Newsletter. (See www.win-sa.org).

Key messages

1) Putting in place an effective ICT system can make a visible impact on the ground. It can pay for itself quite quickly in terms of efficiency gains and even costs saved. Yet a fair amount of thought must go into designing the system to fit the local context – just transplanting a system that has worked in one place to a new environment is generally a recipe for trouble.

2) An important spin-off result of looking at how to use ICT is that the effort taken to design a responsive system forces stakeholders to reflect more closely on the existing structures, process and current information flows. This can have significant benefits even if no system is later built.

3) A recommendation is to spend due time and effort in understanding the system, asking direct stakeholders what information they currently get, what information they need and then seeing how and whether ICT systems can be used to gather data that can generate additional, better or faster information and get it to where it is needed (in a way that suits the working patterns of those individuals).

4) For impact at any significant scale it is crucial that ICT systems, whether in healthcare or water and sanitation, integrate with existing government systems. There is a great risk of fragmentation – too many organisations piloting new ICT systems put in place technologies or processes that cannot easily be absorbed into existing government systems (or worse still, undermine these).

5) A lot of initiatives, particularly in the healthcare system, have tried to harness ICT to get people to do what is good for them. And only that. For instance, cellphones used to gather field information can be restricted so that they can only do one thing and no longer function as a phone. Airtime and data bundles used for transmitting information can be isolated to only contribute to ‘the project’. The disadvantage is that this turns the device into something used only for work, something alien and otherwise ‘not useful’. Alternatives do exist though and can be productive. If frontline workers being asked to use phones and new ICT tools are permitted – sometimes on a limited basis – to use them for their own purposes (browsing the internet, accessing facebook, receiving SMS) then they are more likely to engage with the project, look after the equipment, etc. A balance is surely needed, but a quid pro quo arrangement can be a sensible approach. This was characterised as “give them pizza with their broccoli”!

6) ICT tools can be incredibly powerful at improving the flow of data and, from there, the flow of information. But what if the flow of information is not the real problem? There are many issues that undermine healthcare or water and sanitation systems – and a lot of them have little to do with information. Cultural conflicts, different worldviews, individual rivalries, dysfunctional facilities – all of these can be the ‘sand in the gearbox’. Don’t assume that a new ICT system is going to solve all problems – after all, these are tools, not a panacea to what are typically complex and entrenched challenges.

Next Steps

SeeSaw and iComms are now exploring how to take forward research into how to improve information flows and how incentives shape the behaviour of different stakeholders within any ICT system designed for the water and sanitation sector. A similar event is also planned for East Africa in early 2013.

If you are interested in hearing more about these topics, subscribe to SeeSaw’s newsletter for more details.

Read Full Post »