Digital Security Story Cards for Women with a Refugee and Migrant Background.
María Belén Giménez CiciolliAhmet KocakerShikha ThakurCarolina HaroParmarth RaiSarah RüllerKonstantin AalVolker WulfPublished in: MuC (2022)
Keyphrases
- information technology
- public key infrastructure
- security policies
- security issues
- rfid tags
- access control
- intrusion detection
- information security
- network security
- security problems
- security requirements
- information assurance
- security mechanisms
- statistical databases
- computer security
- security threats
- foreground objects
- public key
- functional requirements
- security analysis
- security model
- computer networks
- video data
- story generation