Information seeking, technology use, and vulnerability among migrants at the U.S.-Mexico border

Bryce Newell, Ricardo Gomez, Veronica Guajardo

Research output: Contribution to journalArticleScientificpeer-review

25 Citations (Scopus)
54 Downloads (Pure)

Abstract

Through interviews with migrants and migrant aid-workers at a shelter in the border town of Nogales, Mexico, we examine how undocumented migrants are seeking, acquiring, understanding, and using information prior to, and during, migration across the U.S.-Mexico border. Our study examines migrants’ perceptions of humanitarian service and the use of so-called “border disturbance technologies” by activists to help prevent the death of migrants in the desert, finding that migrants appreciate water-caching efforts but generally distrust technologies they feel could subject them to surveillance by border agents. Exploratory in nature and based on a small sample, our findings are not necessarily representative of the broader population, but provide rich evidence of the prevalence of word-of-mouth information seeking and use of cell phones over other information technologies, and explore the ambivalent nature of information technology use in the vulnerable setting of life at the border. In particular, we find that mobile phones help migrants meet their communication needs, but also increase their exposure to crime and abuse.
Original languageEnglish
Pages (from-to)176-191
Number of pages16
JournalThe Information Society
Volume32
Issue number2
DOIs
Publication statusPublished - 2016

Keywords

  • Information Science
  • information seeking
  • Surveillance
  • border
  • Migrants
  • Migration
  • Mexico
  • united states
  • Qualitative Research
  • empirical research
  • Empirical
  • Irregular immigration
  • Immigration
  • migrant workers
  • migrants
  • Immigrants

Fingerprint Dive into the research topics of 'Information seeking, technology use, and vulnerability among migrants at the U.S.-Mexico border'. Together they form a unique fingerprint.

  • Cite this