{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:15:55Z","timestamp":1750220155313,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T00:00:00Z","timestamp":1662249600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["SFB-1187"],"award-info":[{"award-number":["SFB-1187"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,4]]},"DOI":"10.1145\/3543758.3549886","type":"proceedings-article","created":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T22:26:07Z","timestamp":1663280767000},"page":"409-419","source":"Crossref","is-referenced-by-count":4,"title":["Digital Security Story Cards for Women with a Refugee and Migrant Background"],"prefix":"10.1145","author":[{"given":"Mar\u00eda Bel\u00e9n","family":"Gim\u00e9nez Ciciolli","sequence":"first","affiliation":[{"name":"University of Siegen, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ahmet","family":"Kocaker","sequence":"additional","affiliation":[{"name":"University of Siegen, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shikha","family":"Thakur","sequence":"additional","affiliation":[{"name":"University of Siegen, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carolina","family":"Haro","sequence":"additional","affiliation":[{"name":"University of Siegen, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Parmarth","family":"Rai","sequence":"additional","affiliation":[{"name":"University of Siegen, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sarah","family":"R\u00fcller","sequence":"additional","affiliation":[{"name":"CRC 1187 - Media of Cooperation, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Konstantin","family":"Aal","sequence":"additional","affiliation":[{"name":"CRC 1187 - Media of Cooperation, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Volker","family":"Wulf","sequence":"additional","affiliation":[{"name":"University of Siegen, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Khorshed Alam and Sophia Imran. 2015. The digital divide and social inclusion among refugee migrants: A case in regional Australia. Information Technology & People(2015). https:\/\/doi.org\/10.1108\/ITP-04-2014-0083  Khorshed Alam and Sophia Imran. 2015. The digital divide and social inclusion among refugee migrants: A case in regional Australia. Information Technology & People(2015). https:\/\/doi.org\/10.1108\/ITP-04-2014-0083","DOI":"10.1108\/ITP-04-2014-0083"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376608"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/147078530504700304"},{"volume-title":"Blurring safety between online and offline worlds: archival, correlational, and experimental evidence of generalized threat in the digital age","author":"Bodford E","key":"e_1_3_2_1_4_1","unstructured":"Jessica\u00a0 E Bodford . 2017. Blurring safety between online and offline worlds: archival, correlational, and experimental evidence of generalized threat in the digital age . Arizona State University . Jessica\u00a0E Bodford. 2017. Blurring safety between online and offline worlds: archival, correlational, and experimental evidence of generalized threat in the digital age. Arizona State University."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18400-1_56"},{"key":"e_1_3_2_1_6_1","unstructured":"Cyberwomen. 2019. Holistic digital security training curriculum for women human rights defenders. https:\/\/cyber-women.com\/  Cyberwomen. 2019. Holistic digital security training curriculum for women human rights defenders. https:\/\/cyber-women.com\/"},{"key":"e_1_3_2_1_7_1","volume-title":"FTX: Safety Reboot | FTX Platform. https:\/\/en.ftx.apc.org\/shelves\/ftx-safety-reboot","author":"Association for Progressive Communications\u00a0(APC).","year":"2021","unstructured":"Association for Progressive Communications\u00a0(APC). 2021 . FTX: Safety Reboot | FTX Platform. https:\/\/en.ftx.apc.org\/shelves\/ftx-safety-reboot Association for Progressive Communications\u00a0(APC). 2021. FTX: Safety Reboot | FTX Platform. https:\/\/en.ftx.apc.org\/shelves\/ftx-safety-reboot"},{"key":"e_1_3_2_1_8_1","unstructured":"Maria Gabrielsen\u00a0Jumbert Rocco Bellanova and RM Gellert. 2018. Smart Phones for Refugees. Tools for Survival or Surveillance?(2018).  Maria Gabrielsen\u00a0Jumbert Rocco Bellanova and RM Gellert. 2018. Smart Phones for Refugees. Tools for Survival or Surveillance?(2018)."},{"key":"e_1_3_2_1_9_1","unstructured":"GSMA. 2019. Bridging the mobile gender gap for refugees.  GSMA. 2019. Bridging the mobile gender gap for refugees."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142405.1142409"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/jhuman\/hut023"},{"key":"e_1_3_2_1_12_1","volume-title":"Regarding realities: Using photo-based projective techniques to elicit normative and alternative discourses on gender, relationships, and sexuality in Mozambique. Global public health 11, 5-6","author":"Holman S","year":"2016","unstructured":"Emily\u00a0 S Holman , Catherine\u00a0 K Harbour , Rosa\u00a0Val\u00e9ria Azevedo\u00a0Said , and Maria\u00a0Elena Figueroa . 2016. Regarding realities: Using photo-based projective techniques to elicit normative and alternative discourses on gender, relationships, and sexuality in Mozambique. Global public health 11, 5-6 ( 2016 ), 719\u2013741. https:\/\/doi.org\/10.1080\/17441692.2016.1170870 Emily\u00a0S Holman, Catherine\u00a0K Harbour, Rosa\u00a0Val\u00e9ria Azevedo\u00a0Said, and Maria\u00a0Elena Figueroa. 2016. Regarding realities: Using photo-based projective techniques to elicit normative and alternative discourses on gender, relationships, and sexuality in Mozambique. Global public health 11, 5-6 (2016), 719\u2013741. https:\/\/doi.org\/10.1080\/17441692.2016.1170870"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1709886.1709905"},{"key":"e_1_3_2_1_14_1","first-page":"1","article-title":"Internet is the same like food","volume":"6","author":"Kutscher Nadia","year":"2016","unstructured":"Nadia Kutscher and Lisa-Marie Kre\u00df . 2016 . \u201c Internet is the same like food \u201d\u2013An empirical study on the use of digital media by unaccompanied minor refugees in Germany. Transnational Social Review 6 , 1 - 2 (2016), 200\u2013203. https:\/\/doi.org\/10.1080\/21931674.2016.1184819 Nadia Kutscher and Lisa-Marie Kre\u00df. 2016. \u201cInternet is the same like food\u201d\u2013An empirical study on the use of digital media by unaccompanied minor refugees in Germany. Transnational Social Review 6, 1-2 (2016), 200\u2013203. https:\/\/doi.org\/10.1080\/21931674.2016.1184819","journal-title":"Transnational Social Review"},{"key":"e_1_3_2_1_15_1","volume-title":"Five questions for digital migration studies: Learning from digital connectivity and forced migration in (to) Europe. Social Media+ Society 4, 1","author":"Leurs Koen","year":"2018","unstructured":"Koen Leurs and Kevin Smets . 2018. Five questions for digital migration studies: Learning from digital connectivity and forced migration in (to) Europe. Social Media+ Society 4, 1 ( 2018 ), 2056305118764425. https:\/\/doi.org\/10.1177\/2056305118764425 Koen Leurs and Kevin Smets. 2018. Five questions for digital migration studies: Learning from digital connectivity and forced migration in (to) Europe. Social Media+ Society 4, 1 (2018), 2056305118764425. https:\/\/doi.org\/10.1177\/2056305118764425"},{"key":"e_1_3_2_1_16_1","unstructured":"Evgeny Morozov. 2013. To save everything click here: The folly of technological solutionism. Public Affairs.  Evgeny Morozov. 2013. To save everything click here: The folly of technological solutionism. Public Affairs."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517899.2517915"},{"key":"e_1_3_2_1_18_1","volume-title":"Qualitative projective techniques in political brand image research from the perspective of young adults. Qualitative Market Research: An International Journal","author":"Pich Christopher","year":"2015","unstructured":"Christopher Pich and Dianne Dean . 2015. Qualitative projective techniques in political brand image research from the perspective of young adults. Qualitative Market Research: An International Journal ( 2015 ). https:\/\/doi.org\/10.1108\/QMR-12-2012-0058 Christopher Pich and Dianne Dean. 2015. Qualitative projective techniques in political brand image research from the perspective of young adults. Qualitative Market Research: An International Journal (2015). https:\/\/doi.org\/10.1108\/QMR-12-2012-0058"},{"key":"e_1_3_2_1_19_1","unstructured":"Coding Rights. 2017. Chupadados (the datasucker): The Hidden Faces of our Beloved Technologies. https:\/\/chupadados.codingrights.org\/en  Coding Rights. 2017. Chupadados (the datasucker): The Hidden Faces of our Beloved Technologies. https:\/\/chupadados.codingrights.org\/en"},{"key":"e_1_3_2_1_20_1","unstructured":"Coding Rights. 2020. The Oracle for Transfeminist Technologies. https:\/\/www.transfeministech.codingrights.org  Coding Rights. 2020. The Oracle for Transfeminist Technologies. https:\/\/www.transfeministech.codingrights.org"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0779-8_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167200261003"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00023"},{"key":"e_1_3_2_1_24_1","unstructured":"Tactical Tech. 2017. Data Detox Kit. https:\/\/datadetoxkit.org\/en\/home\/  Tactical Tech. 2017. Data Detox Kit. https:\/\/datadetoxkit.org\/en\/home\/"},{"key":"e_1_3_2_1_25_1","unstructured":"Tactical Tech. 2018. Gendersec digital security training curricula. https:\/\/genderit.org\/resources\/gendersec-curricula-training-curriculum-gender-and-technology-institute  Tactical Tech. 2018. Gendersec digital security training curricula. https:\/\/genderit.org\/resources\/gendersec-curricula-training-curriculum-gender-and-technology-institute"},{"key":"e_1_3_2_1_26_1","unstructured":"TEDIC. 2018. Toolkit de Fanzines: Auto defensa para una manada cyborg organizada. https:\/\/cyborgfeminista.tedic.org\/toolkit-de-fanzines-auto-defensa-para-una-manada-cyborg-organizada\/  TEDIC. 2018. Toolkit de Fanzines: Auto defensa para una manada cyborg organizada. https:\/\/cyborgfeminista.tedic.org\/toolkit-de-fanzines-auto-defensa-para-una-manada-cyborg-organizada\/"},{"key":"e_1_3_2_1_27_1","unstructured":"TEDIC. 2019. Nuevo toolkit de Seguridad Digital para acciones colectivas. https:\/\/www.tedic.org\/toolkit-internews\/  TEDIC. 2019. Nuevo toolkit de Seguridad Digital para acciones colectivas. https:\/\/www.tedic.org\/toolkit-internews\/"},{"key":"e_1_3_2_1_28_1","unstructured":"UNHCR. 2020. Connecting with confidence: Managing digital risks to refugee connectivity.  UNHCR. 2020. Connecting with confidence: Managing digital risks to refugee connectivity."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064857.3079135"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810543.1810616"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134746"}],"event":{"name":"MuC '22: Mensch und Computer 2022","acronym":"MuC '22","location":"Darmstadt Germany"},"container-title":["Mensch und Computer 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543758.3549886","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543758.3549886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:15Z","timestamp":1750186815000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543758.3549886"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,4]]},"references-count":31,"alternative-id":["10.1145\/3543758.3549886","10.1145\/3543758"],"URL":"https:\/\/doi.org\/10.1145\/3543758.3549886","relation":{},"subject":[],"published":{"date-parts":[[2022,9,4]]}}}