[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3543758.3549886acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmundcConference Proceedingsconference-collections
short-paper

Digital Security Story Cards for Women with a Refugee and Migrant Background

Published: 15 September 2022 Publication History

Abstract

Our work focuses on the design process of a prototype of “story cards” to address, learn and reflect on digital security topics through dialogue and storytelling, for women with a refugee and migrant background. We describe crucial aspects behind the design process of the prototype, including related work, the process behind the identification of needs and challenges around digital security and ICT usage of our target group, as well as our findings, limitations, reflections, and opportunities for future work. With this contribution, we want to shed light on the necessity of digital security learning materials that are accessible and adequate to the needs of individuals and groups, particularly women, with a refugee and migrant background.

References

[1]
Khorshed Alam and Sophia Imran. 2015. The digital divide and social inclusion among refugee migrants: A case in regional Australia. Information Technology & People(2015). https://doi.org/10.1108/ITP-04-2014-0083
[2]
Taghreed Alshehri, Reuben Kirkham, and Patrick Olivier. 2020. Scenario co-creation cards: A culturally sensitive tool for eliciting values. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–14. https://doi.org/10.1145/3313831.3376608
[3]
Clive Boddy. 2005. Projective techniques in market research: valueless subjectivity or insightful reality? A look at the evidence for the usefulness, reliability and validity of projective techniques in market research. International Journal of Market Research 47, 3 (2005), 239–254. https://doi.org/10.1177/147078530504700304
[4]
Jessica E Bodford. 2017. Blurring safety between online and offline worlds: archival, correlational, and experimental evidence of generalized threat in the digital age. Arizona State University.
[5]
Suzana Brown, Faheem Hussain, and Ali M Masoumifar. 2019. Refugees and ICTs: Identifying the key trends and gaps in peer-reviewed scholarship. In International Conference on Social Implications of Computers in Developing Countries. Springer, 687–697. https://doi.org/10.1007/978-3-030-18400-1_56
[6]
Cyberwomen. 2019. Holistic digital security training curriculum for women human rights defenders. https://cyber-women.com/
[7]
Association for Progressive Communications (APC). 2021. FTX: Safety Reboot | FTX Platform. https://en.ftx.apc.org/shelves/ftx-safety-reboot
[8]
Maria Gabrielsen Jumbert, Rocco Bellanova, and RM Gellert. 2018. Smart Phones for Refugees. Tools for Survival, or Surveillance?(2018).
[9]
GSMA. 2019. Bridging the mobile gender gap for refugees.
[10]
Kim Halskov and Peter Dalsgård. 2006. Inspiration card workshops. In Proceedings of the 6th conference on Designing Interactive systems. 2–11. https://doi.org/10.1145/1142405.1142409
[11]
Stephanie Hankey and Daniel Ó Clunaigh. 2013. Rethinking risk and security of human rights defenders in the digital age. Journal of Human Rights Practice 5, 3 (2013), 535–547. https://doi.org/10.1093/jhuman/hut023
[12]
Emily S Holman, Catherine K Harbour, Rosa Valéria Azevedo Said, and Maria Elena Figueroa. 2016. Regarding realities: Using photo-based projective techniques to elicit normative and alternative discourses on gender, relationships, and sexuality in Mozambique. Global public health 11, 5-6 (2016), 719–741. https://doi.org/10.1080/17441692.2016.1170870
[13]
Eva Hornecker. 2010. Creative idea exploration within the structure of a guiding framework: the card brainstorming game. In Proceedings of the fourth international conference on Tangible, embedded, and embodied interaction. 101–108. https://doi.org/10.1145/1709886.1709905
[14]
Nadia Kutscher and Lisa-Marie Kreß. 2016. “Internet is the same like food”–An empirical study on the use of digital media by unaccompanied minor refugees in Germany. Transnational Social Review 6, 1-2 (2016), 200–203. https://doi.org/10.1080/21931674.2016.1184819
[15]
Koen Leurs and Kevin Smets. 2018. Five questions for digital migration studies: Learning from digital connectivity and forced migration in (to) Europe. Social Media+ Society 4, 1 (2018), 2056305118764425. https://doi.org/10.1177/2056305118764425
[16]
Evgeny Morozov. 2013. To save everything, click here: The folly of technological solutionism. Public Affairs.
[17]
David Nemer, Shad Gross, and Nic True. 2013. Materializing digital inequalities: the digital artifacts of the marginalized in Brazil. In Proceedings of the Sixth International Conference on Information and Communications Technologies and Development: Notes-Volume 2. 108–111. https://doi.org/10.1145/2517899.2517915
[18]
Christopher Pich and Dianne Dean. 2015. Qualitative projective techniques in political brand image research from the perspective of young adults. Qualitative Market Research: An International Journal (2015). https://doi.org/10.1108/QMR-12-2012-0058
[19]
Coding Rights. 2017. Chupadados (the datasucker): The Hidden Faces of our Beloved Technologies. https://chupadados.codingrights.org/en
[20]
Coding Rights. 2020. The Oracle for Transfeminist Technologies. https://www.transfeministech.codingrights.org
[21]
EB-N Sanders. 2000. Generative tools for co-designing. In Collaborative design. Springer, 3–12. https://doi.org/10.1007/978-1-4471-0779-8_1
[22]
Jeffrey W Sherman and Leigh A Frost. 2000. On the encoding of stereotype-relevant information under cognitive load. Personality and Social Psychology Bulletin 26, 1 (2000), 26–34. https://doi.org/10.1177/0146167200261003
[23]
Lucy Simko, Ada Lerner, Samia Ibtasam, Franziska Roesner, and Tadayoshi Kohno. 2018. Computer security and privacy for refugees in the United States. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 409–423. https://doi.org/10.1109/SP.2018.00023
[24]
Tactical Tech. 2017. Data Detox Kit. https://datadetoxkit.org/en/home/
[25]
Tactical Tech. 2018. Gendersec digital security training curricula. https://genderit.org/resources/gendersec-curricula-training-curriculum-gender-and-technology-institute
[26]
TEDIC. 2018. Toolkit de Fanzines: Auto defensa para una manada cyborg organizada. https://cyborgfeminista.tedic.org/toolkit-de-fanzines-auto-defensa-para-una-manada-cyborg-organizada/
[27]
TEDIC. 2019. Nuevo toolkit de Seguridad Digital para acciones colectivas. https://www.tedic.org/toolkit-internews/
[28]
UNHCR. 2020. Connecting with confidence: Managing digital risks to refugee connectivity.
[29]
Anne Weibert, Konstantin Aal, Nora Oertel Ribeiro, and Volker Wulf. 2017. ” This is My Story...” Storytelling with Tangible Artifacts among Migrant Women in Germany. In Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems. 144–149. https://doi.org/10.1145/3064857.3079135
[30]
Anne Weibert and Kai Schubert. 2010. How the social structure of intercultural computer clubs fosters interactive storytelling. In Proceedings of the 9th International Conference on Interaction Design and Children. 368–371. https://doi.org/10.1145/1810543.1810616
[31]
Richmond Y Wong, Deirdre K Mulligan, Ellen Van Wyk, James Pierce, and John Chuang. 2017. Eliciting values reflections by engaging privacy futures using design workbooks. Proceedings of the ACM on Human-Computer Interaction 1, CSCW(2017), 1–26. https://doi.org/10.1145/3134746

Cited By

View all
  • (2024)Keyboard Fighters: The Use of ICTs by Activists in Times of Military Coup in MyanmarProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642279(1-19)Online publication date: 11-May-2024
  • (2023)Probing a Community-Based Conversational Storytelling Agent to Document Digital Stories of Housing InsecurityProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581109(1-18)Online publication date: 19-Apr-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
MuC '22: Proceedings of Mensch und Computer 2022
September 2022
624 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 September 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. digital security
  2. migrant
  3. refugee
  4. story cards
  5. women

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Funding Sources

Conference

MuC '22
MuC '22: Mensch und Computer 2022
September 4 - 7, 2022
Darmstadt, Germany

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)40
  • Downloads (Last 6 weeks)3
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Keyboard Fighters: The Use of ICTs by Activists in Times of Military Coup in MyanmarProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642279(1-19)Online publication date: 11-May-2024
  • (2023)Probing a Community-Based Conversational Storytelling Agent to Document Digital Stories of Housing InsecurityProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581109(1-18)Online publication date: 19-Apr-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media