{"id":35842,"date":"2019-06-20T00:00:00","date_gmt":"2019-06-20T05:00:00","guid":{"rendered":"http:\/\/ready-for-feedback3.com\/shape-history\/fmr\/behnam-crabtree\/"},"modified":"2024-08-28T07:56:45","modified_gmt":"2024-08-28T12:56:45","slug":"behnam-crabtree","status":"publish","type":"fmr_content","link":"https:\/\/www.fmreview.org\/fr\/ethics\/behnam-crabtree\/","title":{"rendered":"Big data, little ethics: confidentiality and consent"},"content":{"rendered":"<p><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\">People who experience violence or exclusion often share their traumatic experiences with service providers while receiving care \u2013 care that is most effective when individuals can be open and honest and know that what they share will remain confidential. In recent years, however, the International Rescue Committee (IRC) has seen the safety and confidentiality of data relating to the protection of individuals of concern being increasingly diluted. This trend can be traced in part to a seemingly innocuous change in the way we track and measure programmes. <\/span><\/span><\/span><\/p>\n<p><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\">In the past decade there has been a shift towards the generation and use of \u2018big data\u2019 \u2013 large volumes of structured or unstructured data. However, a lack of accountability and little understanding of the unique risks associated with protection data have encouraged a movement among large donors to request more (and more specific) data, which could be potentially damaging to individuals. <\/span><\/span><\/span><\/p>\n<p><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\">These requests are not just for over-arching, aggregated data, which are widely valued and shared in standardised, useful formats through information-sharing protocols. Rather, some influential donors are making increased demands for individual survivors\u2019 information \u2013 and have a misplaced confidence in how they might be able to use that information. Failing to protect privacy and confidentiality can result in stigma and retribution, and ultimately will erode help-seeking behaviour, threaten the reputations of service providers, and put staff and vulnerable people at risk. <\/span><\/span><\/span><\/p>\n<p><span><span><span><strong><span lang=\"EN-US\" xml_lang=\"EN-US\"><span>Demand for data<\/span><\/span><\/strong><\/span><\/span><\/span><\/p>\n<p><span><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span>At the core of work with displaced survivors of violence (including of gender-based violence) and in the protection of children and those with specific needs is their right to confidentiality. Trust between service providers and clients is essential to providing effective help, and typically depends on assurances of privacy. <span>Service providers are ethically obligated to protect client privacy and to ensure they do no harm. These precepts date back to the earliest versions of the Hippocratic Oath and are reaffirmed in the normative frameworks of social work and international aid, including those governing how information is managed in humanitarian settings. <\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\">How data are gathered, stored and secured, and how and why they are shared with other actors, demands diligence. To that end, IRC and other service providers have invested in building inter-agency systems and processes to ensure data are managed in a safe and ethical manner. These include the Child Protection Information Management System,<a href=\"#_edn1\" id=\"_ednref1\" name=\"_ednref1\"><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span><span><span>[1]<\/span><\/span><\/span><\/span><\/span><\/span><\/a> the Gender-based Violence Information Management System<a href=\"#_edn2\" id=\"_ednref2\" name=\"_ednref2\"><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span><span><span>[2]<\/span><\/span><\/span><\/span><\/span><\/span><\/a> and the Protection Information Management Initiative.<a href=\"#_edn3\" id=\"_ednref3\" name=\"_ednref3\"><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span><span><span>[3]<\/span><\/span><\/span><\/span><\/span><\/span><\/a> Inherent within these systems is the recognition that sound data sharing and reporting by donors and at coordination level can lead to multiple benefits by revealing gaps in programming, strengthening coordination and identifying opportunities for advocacy to improve programming. Each system includes clear and comprehensive data-sharing protocols and practices. <\/span><\/span><\/span><\/p>\n<p><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\">Yet despite these systems (some of which have been in place for a decade or more), the erosion of confidentiality practices is increasing. I<\/span>n some locations, donors\u2019 very broad interpretations of confidentiality and consent<span> have diluted accepted standards, for example by arguing that once consent has been given to one organisation, that consent extends to the sharing of data with any other related party. <\/span><\/span><\/span><\/p>\n<p><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\">Donors are also making increased demands for sensitive, <\/span>personally identifiable case management and incident information<span>. This takes many forms, including: requests for proprietary access to data (whereby they own the data and make ultimate decisions about its use), the creation of unprotected paper libraries of case management files that can be accessed at will, and even insistence on participation in confidential case management sessions. Such demands are often exacerbated by donors harassing service providers, including by threatening to withdraw funding if the data are withheld. The demand for confidential data has reached a level that compromises programmes for vulnerable women and children and people with specific needs, threatens reporting, discourages people from seeking assistance, and undermines client safety. <\/span><\/span><\/span><\/p>\n<p><span><span><strong><span lang=\"EN-US\" xml_lang=\"EN-US\">Consequences for protection programming<\/span><\/strong><\/span><\/span><\/p>\n<p><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\">Examples of these harmful practices abound globally, affecting frontline staff and the people we serve.<a href=\"#_edn4\" id=\"_ednref4\" name=\"_ednref4\"><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span><span><span>[4]<\/span><\/span><\/span><\/span><\/span><\/span><\/a> In East Africa, untrained staff from a donor agency adopted supervisor-like roles over specialised, trained service provider staff, forcing referrals to their own agency and conducting follow-up contact with survivors for which their consent had not been obtained.<\/span><\/span><\/span><\/p>\n<p><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\">In Asia, a donor agency drafted standard operating procedures that called for \u2018responsibility meetings\u2019 \u2013 essentially forced mediation sessions \u2013 to be<\/span><span lang=\"EN-US\" xml_lang=\"EN-US\"> an \u2018option\u2019 for survivors of intimate partner violence. Survivors declining to participate in this mediation with the perpetrator were referred to the refugee camp leadership for administrative or legal action. This fails to recognise the long-established evidence that, rather than resulting in the abuser choosing to stop using violence to control others, facilitated mediation (especially when applied by minimally trained staff) can introduce further threats to safety for survivors or staff.<a href=\"#_edn5\" id=\"_ednref5\" name=\"_ednref5\"><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span><span><span>[5]<\/span><\/span><\/span><\/span><\/span><\/span><\/a><\/span><\/span><\/span><\/p>\n<p><span><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span><span>In another location in East Africa<\/span><\/span><\/span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span><span>, caseworkers were working to relocate one female survivor to a safe location. Before the relocation could take place, staff from the donor agency funding the programme requested that the survivor be handed over to the male community leadership to be held indefinitely at a male community leader\u2019s house, a request that staff presented as an attempt at mediation. Mediation should always be voluntary and is not a recommended intervention, especially if facilitated by untrained staff. In the process of making this request to move the survivor, the donor staff revealed her identity, and told the male leadership that the implementing agency\u2019s caseworker was at fault for the survivor seeking help.&nbsp;Thankfully, the survivor ultimately got to safety with the help of the implementing organisation and other agencies but the violations of ethical principles and of the commitment to do no harm in this case of wrongful disclosure are clear. <\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\">Each of these examples is further complicated by questions of cultural bias and paternalism. If these activities were taking place in the Global North, no doubt there would be objections and reforms would be demanded. And yet these compromises to client safety in Southern contexts continue without attracting widespread outrage and without a push for reform to mitigate these risks and hold accountable those with power. International non-governmental organisations (NGOs) can at times push back against donor pressure and threats, but local NGOs are generally more at the mercy of funders\u2019 demands and are often faced with the prospect of either giving in or being shut down. This is a fundamental and dangerous abuse of power that can no longer be ignored.<\/span><\/span><\/span><\/p>\n<p><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\">Although there has been some positive development, for example the introduction of the European Union\u2019s General Data Protection Regulation (GDPR), which focuses on the need to protect individuals\u2019 data, little has been done to hold the main humanitarian donors accountable or to standardise an ethical approach that applies globally and is not limited to certain locations. Instead, we now see open and active resistance to basic, internationally recognised ethical standards that should guide our work without question. Relationships between service providers and donor agencies should be based on partnership and mutual understanding, not coercion. Access to data should follow that same logic and must be based on shared and agreed standards. <\/span><\/span><\/span><\/p>\n<p><span><span><strong><span lang=\"EN-US\" xml_lang=\"EN-US\">Recommendations<\/span><\/strong><\/span><\/span><\/p>\n<p><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\">These evolving, harmful practices force the need for a new humanitarian imperative that builds on existing data protection legislation such as the GDPR but establishes the mandatory ethical management of data regardless of geographic location, under which standards are clear and uniformly followed and accountability mechanisms established. Accordingly, humanitarian actors should:<\/span><\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><span><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span>ensure the safety and dignity of clients as the first priority, including by extensively regulating data-sharing protocols to ensure confidentiality, consent and related protections<\/span><\/span><\/span><\/span><\/span><\/li>\n<li><span><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span>follow agreed <span>standards for safe and ethical data management as set forth in inter-agency efforts<\/span><\/span><\/span><\/span><\/span><\/span><\/li>\n<li><span><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span>recognise the value, and support the availability, of aggregated, anonymised data for analysis that leads to improvements in services, coordination and advocacy<\/span><\/span><\/span><\/span><\/span><\/li>\n<li><span><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span>restore and defend the definitions of consent and confidentiality, recognising that having a \u2018<span>mandate\u2019 does not replace consent and cannot be used as a specific reason for sharing data <\/span><\/span><\/span><\/span><\/span><\/span><\/li>\n<li><span><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span>unite local and international organisations to jointly reject irresponsible and harmful data practices<\/span><\/span><\/span><\/span><\/span><\/li>\n<li><span><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span>create an international body to identify and hold accountable fund-managing agencies who engage in harmful data practices and violate established standards<\/span><\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span>While working hard to be of assistance, humanitarian actors often lose sight of the fact that clients\u2019 files should be considered in exactly the same way as their own personal medical or mental health records. Policymakers and donors must remember that behind each number and statistic are the girls, women, boys and men who, despite the risks of doing so, sought services. We owe it to them to work together to ensure that their rights to confidentiality, dignity and safety are protected.<\/span><\/span><\/span><\/span><\/span><br \/>\n&nbsp;<\/p>\n<p><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\">Nicole Behnam <\/span><a href=\"mailto:Nicole.Behnam@rescue.org\"><em>Nicole.Behnam@rescue.org<\/em><\/a><br \/>\n<span>Senior Technical Director <\/span><\/span><\/span><\/p>\n<p><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\">Kristy Crabtree <\/span><a href=\"mailto:Kristy.Crabtree@rescue.org\"><em>Kristy.Crabtree@rescue.org<\/em><\/a><br \/>\n<span>Information Management and Technology Advisor <\/span><\/span><\/span><\/p>\n<p><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\">Violence Prevention and Response Unit, International Rescue Committee <\/span><a href=\"http:\/\/www.rescue.org\"><em>www.rescue.org<\/em><\/a><em> <\/em><\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span><span><a href=\"#_ednref1\" id=\"_edn1\" name=\"_edn1\"><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span><span>[1]<\/span><\/span><\/span><\/span><\/span><\/a> <a href=\"\/\/qeh3\/fmr\/FMR%2061%20Ethics\/05%20Finalised%20articles\/www.cpims.org\/\"><span><span>www.cpims.org<\/span><\/span><\/a><\/span><\/span><\/p>\n<p><span><span><a href=\"#_ednref2\" id=\"_edn2\" name=\"_edn2\"><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span><span>[2]<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/a> <a href=\"http:\/\/www.gbvims.com\"><span><span>www.gbvims.com<\/span><\/span><\/a> <\/span><\/span><\/p>\n<p><span><span><a href=\"#_ednref3\" id=\"_edn3\" name=\"_edn3\"><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span><span>[3]<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/a> <a href=\"https:\/\/pim.guide\/\"><span><span>https:\/\/pim.guide<\/span><\/span><\/a><\/span><\/span><\/p>\n<p><span><span><a href=\"#_ednref4\" id=\"_edn4\" name=\"_edn4\"><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span><span>[4]<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/a><span lang=\"EN-US\" xml_lang=\"EN-US\"><span> These examples are factual but some identifying information has been removed. They are drawn from IRC\u2019s work although many other organisations have also identified similar issues with large donors. <\/span><\/span><\/span><\/span><\/p>\n<p><span><span><a href=\"#_ednref5\" id=\"_edn5\" name=\"_edn5\"><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span><span><span lang=\"EN-US\" xml_lang=\"EN-US\"><span><span>[5]<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/a><span lang=\"EN-US\" xml_lang=\"EN-US\"><span> \u201c<span>The mediation process itself maintains and contributes to the male abuser\u2019s ongoing power and control over women and adolescent girls. The process of mediation presumes that both parties can speak equally freely, confidently and safely.\u201d IRC (2018) <\/span>\u2018Intimate Partner Violence and Mediation\u2019, GBV Blended Curriculum<\/span><\/span><br \/>\n<a href=\"https:\/\/gbvresponders.org\/wp-content\/uploads\/2018\/12\/5-Intimate-Partner-Violence-and-Mediation-PDF.pdf\"><span><span>https:\/\/gbvresponders.org\/wp-content\/uploads\/2018\/12\/5-Intimate-Partner-Violence-and-Mediation-PDF.pdf<\/span><\/span><\/a><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>People who experience violence or exclusion often share their traumatic experiences with service providers while receiving care \u2013 care that is most effective when individuals can be open and honest and know that what they share will remain confidential. In recent years, however, the International Rescue Committee (IRC) has seen the safety and confidentiality of&hellip;<\/p>\n","protected":false},"featured_media":0,"parent":38933,"menu_order":0,"template":"","fmr_themes":[],"fmr_region":[],"fmr_issue":[109],"fmr_year":[],"fmr_content_type":[27],"fmr_languages":[36],"fmr_list_years":[568],"class_list":["post-35842","fmr_content","type-fmr_content","status-publish","hentry","fmr_issue-109","fmr_content_type-article","fmr_languages-english","fmr_list_years-568","entry","no-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Big data, little ethics: confidentiality and consent - Forced Migration Review<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fmreview.org\/ethics\/behnam-crabtree\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Big data, little ethics: confidentiality and consent - Forced Migration Review\" \/>\n<meta property=\"og:description\" content=\"People who experience violence or exclusion often share their traumatic experiences with service providers while receiving care \u2013 care that is most effective when individuals can be open and honest and know that what they share will remain confidential. In recent years, however, the International Rescue Committee (IRC) has seen the safety and confidentiality of&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fmreview.org\/ethics\/behnam-crabtree\/\" \/>\n<meta property=\"og:site_name\" content=\"Forced Migration Review\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-28T12:56:45+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.fmreview.org\/ethics\/behnam-crabtree\/\",\"url\":\"https:\/\/www.fmreview.org\/ethics\/behnam-crabtree\/\",\"name\":\"Big data, little ethics: confidentiality and consent - Forced Migration Review\",\"isPartOf\":{\"@id\":\"https:\/\/www.fmreview.org\/#website\"},\"datePublished\":\"2019-06-20T05:00:00+00:00\",\"dateModified\":\"2024-08-28T12:56:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.fmreview.org\/ethics\/behnam-crabtree\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.fmreview.org\/ethics\/behnam-crabtree\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.fmreview.org\/ethics\/behnam-crabtree\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.fmreview.org\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FMR 61 &#8211; the ETHICS issue\",\"item\":\"https:\/\/www.fmreview.org\/ethics\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Big data, little ethics: confidentiality and consent\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.fmreview.org\/#website\",\"url\":\"https:\/\/www.fmreview.org\/\",\"name\":\"Forced Migration Review\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.fmreview.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.fmreview.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.fmreview.org\/#organization\",\"name\":\"Forced Migration Review\",\"url\":\"https:\/\/www.fmreview.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.fmreview.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.fmreview.org\/wp-content\/uploads\/2024\/02\/FMR_logo1.svg\",\"contentUrl\":\"https:\/\/www.fmreview.org\/wp-content\/uploads\/2024\/02\/FMR_logo1.svg\",\"width\":53,\"height\":62,\"caption\":\"Forced Migration Review\"},\"image\":{\"@id\":\"https:\/\/www.fmreview.org\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Big data, little ethics: confidentiality and consent - Forced Migration Review","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fmreview.org\/ethics\/behnam-crabtree\/","og_locale":"fr_FR","og_type":"article","og_title":"Big data, little ethics: confidentiality and consent - Forced Migration Review","og_description":"People who experience violence or exclusion often share their traumatic experiences with service providers while receiving care \u2013 care that is most effective when individuals can be open and honest and know that what they share will remain confidential. In recent years, however, the International Rescue Committee (IRC) has seen the safety and confidentiality of&hellip;","og_url":"https:\/\/www.fmreview.org\/ethics\/behnam-crabtree\/","og_site_name":"Forced Migration Review","article_modified_time":"2024-08-28T12:56:45+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.fmreview.org\/ethics\/behnam-crabtree\/","url":"https:\/\/www.fmreview.org\/ethics\/behnam-crabtree\/","name":"Big data, little ethics: confidentiality and consent - Forced Migration Review","isPartOf":{"@id":"https:\/\/www.fmreview.org\/#website"},"datePublished":"2019-06-20T05:00:00+00:00","dateModified":"2024-08-28T12:56:45+00:00","breadcrumb":{"@id":"https:\/\/www.fmreview.org\/ethics\/behnam-crabtree\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fmreview.org\/ethics\/behnam-crabtree\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.fmreview.org\/ethics\/behnam-crabtree\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fmreview.org\/fr\/"},{"@type":"ListItem","position":2,"name":"FMR 61 &#8211; the ETHICS issue","item":"https:\/\/www.fmreview.org\/ethics\/"},{"@type":"ListItem","position":3,"name":"Big data, little ethics: confidentiality and consent"}]},{"@type":"WebSite","@id":"https:\/\/www.fmreview.org\/#website","url":"https:\/\/www.fmreview.org\/","name":"Forced Migration Review","description":"","publisher":{"@id":"https:\/\/www.fmreview.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fmreview.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.fmreview.org\/#organization","name":"Forced Migration Review","url":"https:\/\/www.fmreview.org\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.fmreview.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.fmreview.org\/wp-content\/uploads\/2024\/02\/FMR_logo1.svg","contentUrl":"https:\/\/www.fmreview.org\/wp-content\/uploads\/2024\/02\/FMR_logo1.svg","width":53,"height":62,"caption":"Forced Migration Review"},"image":{"@id":"https:\/\/www.fmreview.org\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.fmreview.org\/fr\/wp-json\/wp\/v2\/fmr_content\/35842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fmreview.org\/fr\/wp-json\/wp\/v2\/fmr_content"}],"about":[{"href":"https:\/\/www.fmreview.org\/fr\/wp-json\/wp\/v2\/types\/fmr_content"}],"version-history":[{"count":1,"href":"https:\/\/www.fmreview.org\/fr\/wp-json\/wp\/v2\/fmr_content\/35842\/revisions"}],"predecessor-version":[{"id":37538,"href":"https:\/\/www.fmreview.org\/fr\/wp-json\/wp\/v2\/fmr_content\/35842\/revisions\/37538"}],"up":[{"embeddable":true,"href":"https:\/\/www.fmreview.org\/fr\/wp-json\/wp\/v2\/fmr_content\/38933"}],"wp:attachment":[{"href":"https:\/\/www.fmreview.org\/fr\/wp-json\/wp\/v2\/media?parent=35842"}],"wp:term":[{"taxonomy":"fmr_themes","embeddable":true,"href":"https:\/\/www.fmreview.org\/fr\/wp-json\/wp\/v2\/fmr_themes?post=35842"},{"taxonomy":"fmr_region","embeddable":true,"href":"https:\/\/www.fmreview.org\/fr\/wp-json\/wp\/v2\/fmr_region?post=35842"},{"taxonomy":"fmr_issue","embeddable":true,"href":"https:\/\/www.fmreview.org\/fr\/wp-json\/wp\/v2\/fmr_issue?post=35842"},{"taxonomy":"fmr_year","embeddable":true,"href":"https:\/\/www.fmreview.org\/fr\/wp-json\/wp\/v2\/fmr_year?post=35842"},{"taxonomy":"fmr_content_type","embeddable":true,"href":"https:\/\/www.fmreview.org\/fr\/wp-json\/wp\/v2\/fmr_content_type?post=35842"},{"taxonomy":"fmr_languages","embeddable":true,"href":"https:\/\/www.fmreview.org\/fr\/wp-json\/wp\/v2\/fmr_languages?post=35842"},{"taxonomy":"fmr_list_years","embeddable":true,"href":"https:\/\/www.fmreview.org\/fr\/wp-json\/wp\/v2\/fmr_list_years?post=35842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}