Add like
Add dislike
Add to saved papers

An eye for an 'I:' a critical assessment of artificial intelligence tools in migration and asylum management.

The promise of artificial intelligence has been originally to put technology at the service of people utilizing powerful information processors and 'smart' algorithms to quickly perform time-consuming data analysis. It soon though became apparent that the capacity of artificial intelligence to scrape and analyze big data would be particularly useful in surveillance policies. In the wider areas of migration and asylum management, increasingly sophisticated artificial intelligence tools have been used to register and manage vulnerable populations without much concern about the potential misuses of the data collected and the overall ethical and legal underpinnings of these operations. This article examines three cases in point. The first case investigates the United Nations High Commissioner for Refugees' decision to deploy a biometric matching engine engaging artificial intelligence to make accessing identification documents easier for both refugees and asylum seekers and the states and organizations they interact with. The second case focuses on the New Zealand government's introduction of artificial intelligence to improve border security and streamline immigration. The third case looks at data scraping and biometric recognition tools implemented by the United States government to track (and eventually deport) undocumented migrants. The article first shows how states and international organizations are increasingly turning to artificial intelligence tools to support the implementation of their immigration policies and programs. Subsequently, the article also outlines how even despite well-intentioned efforts, the decision to use artificial intelligence tools to increase efficiency and support the implementation of migration or asylum management policies and programs often involves jeopardizing or altogether sacrificing individuals' human rights, including privacy and security, and raises concerns about vulnerability and transparency.

Full text links

We have located links that may give you full text access.
Can't access the paper?
Try logging in through your university/institutional subscription. For a smoother one-click institutional access experience, please use our mobile app.

Related Resources

For the best experience, use the Read mobile app

Mobile app image

Get seemless 1-tap access through your institution/university

For the best experience, use the Read mobile app

All material on this website is protected by copyright, Copyright © 1994-2024 by WebMD LLC.
This website also contains material copyrighted by 3rd parties.

By using this service, you agree to our terms of use and privacy policy.

Your Privacy Choices Toggle icon

You can now claim free CME credits for this literature searchClaim now

Get seemless 1-tap access through your institution/university

For the best experience, use the Read mobile app