pith. machine review for the scientific record. sign in

arxiv: 2604.05386 · v1 · submitted 2026-04-07 · 💻 cs.HC · cs.CY

Recognition: 2 theorem links

· Lean Theorem

Transient Non-Use: How People in Migration Experience Digital Disconnection

Anamika Rajendran, Augusto Penzo Jara, Jonathan Leuenberger, Shiva Darian, Tajwar-Ul Hoque

Authors on Pith no claims yet

Pith reviewed 2026-05-10 19:38 UTC · model grok-4.3

classification 💻 cs.HC cs.CY
keywords ICT non-usedigital disconnectionmigrationtechnology transitionsprotective strategiessystemic exclusionHCI designborder experiences
0
0 comments X

The pith

People in migration avoid digital technologies in shifting ways that serve protection and respond to exclusion across three transition phases.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper investigates how migrants intentionally and unintentionally avoid ICTs like devices and information during border transitions. Interviews with 32 people in El Paso reveal non-use practices tied to time, risk, and institutional demands. These practices are framed in three phases: understanding the situation, negotiating with systems, and resolving outcomes. If accurate, this view treats non-use as a normal part of migration rather than a design flaw to fix. It implies that technology systems should support disconnection without assuming constant use.

Core claim

ICT non-use during migration is transient and context-dependent, operating both as a protective strategy against risks and as an outcome of systemic exclusion by institutions and technologies. The analysis maps these experiences onto three phases of transition—understanding, negotiating, and resolving—showing how avoidance changes with external pressures rather than remaining fixed.

What carries the argument

The three-phase transition framework of understanding, negotiating, and resolving, which extends the concept of non-use by linking it to migration timelines and demands.

If this is right

  • Non-use shifts according to time, risk levels, and institutional requirements during migration.
  • Non-use serves simultaneously as a protective strategy and a reaction to systemic exclusion.
  • Design should treat non-use as both intentional and unintentional conditions instead of a failure to correct.
  • Systems can anticipate non-use without penalizing users for disconnection.
  • Technology for migrants must account for phases where avoidance is expected rather than assuming continuous adoption.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The three-phase model could help analyze digital disconnection in other groups facing temporary instability, such as displaced workers or asylum seekers in new locations.
  • Designers might add features allowing easy reconnection after protective non-use periods without data loss or penalties.
  • Policy efforts could target institutional rules that force non-use, reducing exclusion by making systems more accessible during transitions.
  • Longer-term studies tracking the same individuals across multiple borders could test whether the phases repeat or evolve differently.

Load-bearing premise

That patterns observed in 32 interviews from one border city represent typical ICT non-use across varied migration settings.

What would settle it

Finding that non-use experiences in another migration context, such as a different border region or country, follow fixed patterns unrelated to the three phases of understanding, negotiating, and resolving.

read the original abstract

People experiencing migration endure many transitions across borders, technologies, and social systems. While HCI research often emphasizes this community's adoption of technology, less attention has been paid to practices of technological non-use. This paper investigates how information and communication technologies (ICTs) are intentionally and unintentionally avoided, withheld, or not used during migration. Drawing on interviews with 32 people experiencing migration in the border city of El Paso, Texas, USA between February and May 2025, we identify a range of non-use experiences, including device, informational, and protective non-use. We extend the concept of non-use by situating it within the three phases of transitions: understanding, negotiating, and resolving. We show how ICT non-use shifts with time, risk, and institutional demands. Our analysis demonstrates that non-use functions both as a protective strategy and as a response to systemic exclusion, and concludes with design principles that anticipate non-use as both intentional and unintentional design conditions rather than as punitive failure.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 1 minor

Summary. The paper examines ICT non-use among people experiencing migration, drawing on 32 interviews conducted in El Paso, Texas, between February and May 2025. It identifies forms of non-use (device, informational, and protective) and situates them within a three-phase transition framework of understanding, negotiating, and resolving. The work argues that non-use shifts with time, risk, and institutional demands, functions simultaneously as a protective strategy and response to systemic exclusion, and derives design principles that treat non-use as an anticipated condition rather than a failure to be corrected.

Significance. If the empirical claims are adequately supported, the paper makes a useful contribution to HCI by extending non-use scholarship into transient migration settings, where disconnection is shaped by both agency and structural constraints. The dual framing of non-use (protective and exclusionary) and the resulting design principles offer concrete guidance for systems that must accommodate intermittent or absent connectivity. The interview-based approach surfaces mechanisms that quantitative adoption studies often overlook.

major comments (2)
  1. [Methods / Data Analysis] The manuscript provides no description of the qualitative analysis methods, coding procedures, or how the three-phase framework (understanding, negotiating, resolving) was inductively or deductively derived from the interview transcripts. Without this information, the central claims about temporal shifts, risk dynamics, and dual functions of non-use cannot be evaluated for rigor or traceability to the data.
  2. [Findings / Discussion] The three-phase transition model and associated design principles are positioned as broadly applicable to migration contexts, yet they rest on a single-site sample of 32 interviews in one U.S.-Mexico border city. The paper should explicitly address whether and how the observed patterns generalize beyond El Paso’s specific policy environment, device availability, and institutional actors, or qualify the scope of the design implications accordingly.
minor comments (1)
  1. [Abstract] The abstract states the interview period as February–May 2025; confirm whether this is a typographical error for 2024 or an intentional future reference, and ensure consistency with the full methods description.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for their constructive and detailed feedback, which helps us clarify the methodological foundations and scope of our work. We address each major comment below.

read point-by-point responses
  1. Referee: [Methods / Data Analysis] The manuscript provides no description of the qualitative analysis methods, coding procedures, or how the three-phase framework (understanding, negotiating, resolving) was inductively or deductively derived from the interview transcripts. Without this information, the central claims about temporal shifts, risk dynamics, and dual functions of non-use cannot be evaluated for rigor or traceability to the data.

    Authors: We agree that the absence of a detailed account of our qualitative analysis methods limits the ability to assess the traceability of our claims. In the revised manuscript, we will add a new subsection under Methods that explicitly describes our inductive thematic analysis process. This will include the steps for open coding of the 32 interview transcripts, the development of axial codes around non-use types and transition phases, the iterative refinement of themes through team discussions, and the specific analytic path by which the three-phase framework (understanding, negotiating, resolving) emerged from patterns in the data. We will also provide illustrative examples of how participant quotes were mapped to phases and to the dual protective/exclusionary functions of non-use. revision: yes

  2. Referee: [Findings / Discussion] The three-phase transition model and associated design principles are positioned as broadly applicable to migration contexts, yet they rest on a single-site sample of 32 interviews in one U.S.-Mexico border city. The paper should explicitly address whether and how the observed patterns generalize beyond El Paso’s specific policy environment, device availability, and institutional actors, or qualify the scope of the design implications accordingly.

    Authors: We acknowledge that the study is grounded in a single border-city context and that El Paso’s particular policy environment, institutional actors, and device-access conditions shape the observed non-use practices. In the revised manuscript, we will expand the Discussion and add a dedicated Limitations subsection to qualify the scope of our claims. We will state that the three-phase model and design principles are offered as transferable insights derived from this transient migration setting rather than as universally generalizable findings, and we will discuss how patterns may differ in other regions with distinct legal, technological, or support infrastructures. We will also outline directions for future multi-site research to examine the framework’s applicability elsewhere. revision: yes

Circularity Check

0 steps flagged

No circularity; qualitative framework derived from external interview data

full rationale

The paper is a descriptive qualitative study drawing on 32 interviews conducted in El Paso. It identifies non-use practices and situates them in a three-phase transition framework (understanding, negotiating, resolving) extracted from the interview transcripts. No equations, fitted parameters, predictions, or self-citations are present that would reduce any claim to its own inputs by construction. The derivation chain consists of thematic analysis of external primary data, which is independent of the reported findings and does not exhibit self-definition, smuggling of ansatzes, or load-bearing self-citation. This is the expected non-circular outcome for empirical HCI work of this type.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

The central claim rests on interpretive analysis of localized qualitative interviews without specified validation steps or external benchmarks; the three-phase transition model is applied without independent justification in the abstract.

axioms (1)
  • domain assumption The 32 interviews in El Paso capture representative non-use experiences during migration transitions.
    The study is limited to one location and time period (Feb-May 2025) with no mention of broader validation.

pith-pipeline@v0.9.0 · 5484 in / 1308 out tokens · 49198 ms · 2026-05-10T19:38:17.319961+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

Reference graph

Works this paper leans on

60 extracted references · 12 canonical work pages

  1. [1]

    Guy J Abel and Nikola Sander. 2014. Quantifying global international migration flows.Science343, 6178 (2014), 1520–1522

  2. [2]

    Khorshed Alam and Sophia Imran. 2015. The digital divide and social inclusion among refugee migrants: A case in regional Australia.Information Technology & People28, 2 (2015), 344–365

  3. [3]

    Idil Atak, Sara Asalya, and Jona Zyfi. 2024. Vulnerability of asylum seekers and undocumented migrants in Toronto.Canadian Journal of Law and Society/La Revue Canadienne Droit et Société39, 1 (2024), 88–109

  4. [4]

    Rashika Bahl, Shanton Chang, Dana McKay, George Buchanan, and Marc Cheong

  5. [5]

    InProceedings of the 2025 ACM SIGIR Conference on Human Information Interaction and Retrieval

    A Whole New World: Migrant Journeys Through Digital Information Land- scapes. InProceedings of the 2025 ACM SIGIR Conference on Human Information Interaction and Retrieval. 247–262

  6. [6]

    Max Bain, Jaesung Huh, Tengda Han, and Andrew Zisserman. 2023. WhisperX: Time-Accurate Speech Transcription of Long-Form Audio.INTERSPEECH 2023 (2023)

  7. [7]

    Pitaevskii and S

    Alexander Betts, Louise Bloom, Josiah Kaplan, and Naohiko Omata. 2016.Refugee Economies: Forced Displacement and Development. Oxford University Press. doi:10. 1093/acprof:oso/9780198795681.001.0001

  8. [8]

    Gregor Broll and Steve Benford. 2005. Seamful Design for Location-Based Mobile Games, Vol. 3711. 155–166. doi:10.1007/11558651_16

  9. [9]

    Matthew Brunwasser. 2015. A 21st-century migrant’s essentials: Food, shelter, smartphone.The New York Times25 (2015)

  10. [10]

    Camilo. 2024. Migrants in Mexico have used CBP One app 64 million times to re- quest entry into U.S. CBS NEWS. https://www.cbsnews.com/news/immigration- cbp-one-app-migrants-mexico-64-million/

  11. [11]

    Eleonora Castagnone. 2011. Transit migration: a piece of the complex mobility puzzle. The case of Senegalese migration.Cahiers de l’Urmis13 (2011)

  12. [12]

    Shanton Chang. 2019. Digital Journeys: A Perspective on Understanding the Digital Experiences of.Journal of International Students, 2017 Vol. 7 (2)7, 2 (2019), 347–466

  13. [13]

    Juan Chen, Gilbert C Gee, Michael S Spencer, Sheldon H Danziger, and David T Takeuchi. 2009. Perceived social standing among Asian immigrants in the US: Do reasons for immigration matter?Social Science Research38, 4 (2009), 858–869

  14. [14]

    Menzie Chinn and Robert Fairlie. 2004. The Determinants of the Global Digital Divide: A Cross-Country Analysis of Computer and Internet Penetration.Oxford Economic Papers59 (09 2004). doi:10.1093/oep/gpl024

  15. [15]

    Viorica Cristina Cormos,. 2022. The processes of adaptation, assimilation and integration in the country of migration: A psychosocial perspective on place identity changes.Sustainability14, 16 (2022), 10296

  16. [16]

    Blackmagic Design. 2025. DaVinci Resolve (Version 18.6) [Computer software]. https://www.blackmagicdesign.com/products/davinciresolve

  17. [17]

    2011.Refugee education: A global review

    Sarah Dryden-Peterson. 2011.Refugee education: A global review. United Nations High Commissioner for Refugees Geneva, Switzerland

  18. [18]

    Jia Tina Du. 2023. Understanding the information journeys of late-life migrants to inform support design: Information seeking driven by a major life transition. Information Processing & Management60, 2 (2023), 103172

  19. [19]

    Kathryn Ecclestone, Gert Biesta, and Martin Hughes. 2009. Transitions in the lifecourse: The role of identity, agency and structure. InTransitions and learning through the lifecourse. Routledge, 25–39

  20. [20]

    Fisher, Reem Talhouk, Katya Yefimova, Dalya Al-Shahrabi, Eiad Yafi, Sam Ewald, and Rob Comber

    Karen E. Fisher, Reem Talhouk, Katya Yefimova, Dalya Al-Shahrabi, Eiad Yafi, Sam Ewald, and Rob Comber. 2017. Za’atari Refugee Cookbook: Relevance, Challenges and Design Considerations. InProceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems(Denver, Colorado, USA)(CHI EA ’17). Association for Computing Machinery, ...

  21. [21]

    Karen E Fisher, Eiad Yafi, Carleen Maitland, and Ying Xu. 2019. Al Osool: Under- standing information behavior for community development at Za’atari Syrian refugee camp. InProceedings of the 9th International Conference on Communities & Technologies-Transforming Communities. 273–282

  22. [22]

    Fisher, Katya Yefimova, and Eiad Yafi

    Karen E. Fisher, Katya Yefimova, and Eiad Yafi. 2016. Future’s Butterflies: Co- Designing ICT Wayfaring Technology with Refugee Syrian Youth. InProceedings of the The 15th International Conference on Interaction Design and Children(Manch- ester, United Kingdom)(IDC ’16). Association for Computing Machinery, New Transient Non-Use: How People in Migration E...

  23. [23]

    Marie Gillespie, Souad Osseiran, and Margie Cheesman. 2018. Syrian refugees and the digital passage to Europe: Smartphone infrastructures and affordances. Social media+ society4, 1 (2018), 2056305118764440

  24. [24]

    Yidnekachew Redda Haile. 2021. The liberalities and tyrannies of ICTs for vulner- able migrants: The status quo, gaps and directions.arXiv preprint arXiv:2108.09782 (2021)

  25. [25]

    International Organization for Migration (IOM). n.d.. MigApp. https://www.iom. int/migapp. Accessed: 2025-09-11

  26. [26]

    Sophie Isobel. 2021. Trauma-informed qualitative research: Some methodological and practical considerations.International journal of mental health nursing30 (2021), 1456–1469

  27. [27]

    Yong Ju Jung, Ellen L Rubenstein, and Hyewon Park. 2025. Transitions in older adulthood: A conceptual proposal incorporating the maker movement, lifelong learning, and information behavior.Journal of the Association for Information Science and Technology(2025)

  28. [28]

    Eltahir F Kabbar and Barbara J Crump. 2006. The factors that influence adoption of ICTs by recent refugee immigrants to New Zealand.Informing Science9 (2006), 111

  29. [29]

    Brian Larkin. 2013. The Politics and Poetics of Infrastructure.Annual Review of Anthropology42 (2013), 327–343. doi:10.1146/annurev-anthro-092412-155522

  30. [30]

    Mark Latonero and Paula Kift. 2018. On digital passages and borders: Refugees and the new infrastructure for movement and control.Social Media+ Society4, 1 (2018), 2056305118764432

  31. [31]

    Annemaree Lloyd, Mary Anne Kennan, Kim M Thompson, and Asim Qayyum

  32. [32]

    Connecting with new information landscapes: information literacy prac- tices of refugees.Journal of Documentation69, 1 (2013), 121–144

  33. [33]

    2018.Digital lifeline?: ICTs for refugees and displaced persons

    Carleen Maitland. 2018.Digital lifeline?: ICTs for refugees and displaced persons. MIT Press

  34. [34]

    Afaf Ibrahim Meleis, Linda M Sawyer, Eun-Ok Im, DeAnne K Hilfinger Messias, and Karen Schumacher. 2000. Experiencing transitions: an emerging middle- range theory.Advances in nursing science23, 1 (2000), 12–28

  35. [35]

    Maria Merisalo and Jussi S Jauhiainen. 2020. Digital divides among asylum- related migrants: Comparing internet use and smartphone ownership.Tijdschrift voor economische en sociale geografie111, 5 (2020), 689–704

  36. [36]

    Mikal and Braden Woodfield

    Jude P. Mikal and Braden Woodfield. 2015. Refugees, Post-Migration Stress, and Internet Use.Qualitative Health Research25 (2015), 1319 – 1333. https: //api.semanticscholar.org/CorpusID:26050818

  37. [37]

    2024.The walls have eyes: surviving migration in the age of artificial intelligence

    Petra Molnar. 2024.The walls have eyes: surviving migration in the age of artificial intelligence. The New Press

  38. [38]

    Bryce Clayton Newell, Ricardo Gomez, and Verónica E Guajardo. 2016. Informa- tion seeking, technology use, and vulnerability among migrants at the United States–Mexico border.The Information Society32, 3 (2016), 176–191

  39. [39]

    Sarah Nikkhah, Angela P Murillo, Alyson Leigh Young, and Andrew D Miller

  40. [40]

    Coming to America: Iranians’ use of Telegram for immigration information seeking.Aslib Journal of Information Management72, 4 (2020), 561–585

  41. [41]

    Michael Quinn Patton. 2015. Qualitative research & evaluation methods: Inte- grating theory and practice.(No Title)(2015)

  42. [42]

    Ian Ruthven. 2022. An information behavior theory of transitions.Journal of the Association for Information Science and Technology73, 4 (2022), 579–593

  43. [43]

    Ian Ruthven, Steven Buchanan, and Cara Jardine. 2018. Relationships, envi- ronment, health and development: The information needs expressed online by young first-time mothers.Journal of the Association for Information Science and Technology69, 8 (2018), 985–995

  44. [44]

    Christine Satchell and Paul Dourish. 2009. Beyond the user: use and non-use in HCI. InProceedings of the 21st annual conference of the Australian computer-human interaction special interest group: Design: Open 24/7. 9–16

  45. [45]

    Neil Selwyn. 2004. Reconsidering political and popular understandings of the digital divide.New media & society6, 3 (2004), 341–362

  46. [46]

    Bryan C Semaan, Lauren M Britton, and Bryan Dosono. 2016. Transition Re- silience with ICTs: ’Identity Awareness’ in Veteran Re-Integration. InProceedings of the 2016 CHI Conference on human factors in computing systems. 2882–2894

  47. [47]

    Enno Steinbrink, Lilian Reichert, Michelle Mende, and Christian Reuter. 2021. Digital Privacy Perceptions of Asylum Seekers in Germany: An Empirical Study about Smartphone Usage during the Flight.Proc. ACM Hum.-Comput. Interact.5, CSCW2, Article 382 (Oct. 2021), 24 pages. doi:10.1145/3479526

  48. [48]

    Anselm Strauss and Juliet Corbin. 1994. Grounded theory methodology: An overview. (1994)

  49. [49]

    Talhouk, T

    R. Talhouk, T. Bartindale, K. Montague, S. Mesmar, C. Akik, A. Ghassani, M. Najem, H. Ghattas, P. Olivier, and M. Balaam. 2017. Implications of Synchronous IVR Radio on Syrian Refugee Health and Community Dynamics. InProceedings of the 8th International Conference on Communities and Technologies(Troyes, France)(C&T ’17). Association for Computing Machiner...

  50. [50]

    Reem Talhouk, Sandra Mesmar, Anja Thieme, Madeline Balaam, Patrick Olivier, Chaza Akik, and Hala Ghattas. 2016. Syrian Refugees and Digital Health in Lebanon: Opportunities for Improving Antenatal Health. InProceedings of the 2016 CHI Conference on Human Factors in Computing Systems(San Jose, California, USA)(CHI ’16). Association for Computing Machinery,...

  51. [51]

    Alexander JAM Van Deursen and Ellen J Helsper. 2015. The third-level digital divide: Who benefits most from being online? InCommunication and information technologies annual. Vol. 10. Emerald Group Publishing Limited, 29–52

  52. [52]

    Alexander JAM Van Deursen and Jan AGM Van Dijk. 2014. The digital divide shifts to differences in usage.New media & society16, 3 (2014), 507–526

  53. [53]

    Alexander JAM Van Deursen and Jan AGM Van Dijk. 2019. The first-level digital divide shifts from inequalities in physical access to inequalities in material access. New media & society21, 2 (2019), 354–375

  54. [54]

    Jan AGM Van Dijk. 2006. Digital divide research, achievements and shortcomings. Poetics34, 4-5 (2006), 221–235

  55. [55]

    Alan Vernon, K Deriche, and S Eisenhauer. 2016. Connecting refugees.How Internet and Mobile Connectivity can Improve Refugee Well-Being and Transform Humanitarian Action. Geneva: UNHCR(2016)

  56. [56]

    Melissa Wall, Madeline Otis Campbell, and Dana Janbek. 2017. Syrian refugees and information precarity.New Media & Society19, 2 (2017), 240–254. arXiv:https://doi.org/10.1177/1461444815591967 doi:10.1177/1461444815591967

  57. [57]

    2004.Technology and social inclusion: Rethinking the digital divide

    Mark Warschauer. 2004.Technology and social inclusion: Rethinking the digital divide. MIT press

  58. [58]

    Rebekah Willson. 2019. Transitions theory and liminality in information be- haviour research: Applying new theories to examine the transition to early career academic.Journal of Documentation75, 4 (2019), 838–856

  59. [59]

    Ying Xu, Carleen Maitland, and Brian Tomaszewski. 2015. Promoting partic- ipatory community building in refugee camps with mapping technology. In Proceedings of the Seventh International Conference on Information and Com- munication Technologies and Development(Singapore, Singapore)(ICTD ’15). Association for Computing Machinery, New York, NY, USA, Articl...

  60. [60]

    2024.Accompaniment with Im/migrant Communities: Engaged Ethnography

    Kristin Elizabeth Yarris and Whitney L Duncan. 2024.Accompaniment with Im/migrant Communities: Engaged Ethnography. University of Arizona Press. CHI ’26, April 13–17, 2026, Barcelona, Spain Leuenberger et al. A Appendix A: Semi-Structured Interview Protocol Question Themes: •Introductions, ICT use –Information ecosystems –Social media usage –News and info...