Abstract
Applying the unique experiences of designing technologies for vulnerable communities.
- Benach, et al. Migration and 'low-skilled' workers in destination countries. PLOS Med. 8, (June 2011), e1001043; doi: https://bit.ly/2VNaf1BGoogle Scholar
- IOM. World Migration Report 2020. International Organization for Migration, Geneva (Nov. 2019); https://bit.ly/3ySx4PXGoogle Scholar
- Stalla-Bourdillon, S. et al. Data protection by design: Building the foundations of trustworthy data sharing. Data Policy 2 (2020); doi: https://bit.ly/3slQV7HGoogle Scholar
- Thinyane, H. and Bhat, K. Supporting the critical-agency of victims of human trafficking in Thailand. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems, Glasgow, Scotland, May 2019.Google Scholar
- Thinyane, H. et al. Use of New Technologies for Consistent and Proactive Screening of Vulnerable Populations. United Nations University, Institute in Macau, Macau, Jul. 2020; https://bit.ly/3lSGCXpGoogle Scholar
- West Principles. White Paper: Realizing the Benefits of Worker Reporting Digital Tools. (Mar. 2019); https://bit.ly/2VJLK5dGoogle Scholar
- White, S.C. Depoliticising development: The uses and abuses of participation. Dev. Pract. 6, 1 (Feb. 1996), 6--15 Google ScholarCross Ref
Index Terms
- Remaining connected throughout design
Recommendations
Towards defending connected vehicles against attacks
ECBS '17: Proceedings of the Fifth European Conference on the Engineering of Computer-Based SystemsConnected vehicles utilize various communication types that take place between different entities such as vehicle, infrastructure, cloud, and mobile. Connected vehicles have sensors and Electronic Control Units (ECUs) that perform in-vehicle ...
Design Fiction for Real-World Connected Wearables
WearSys '19: The 5th ACM Workshop on Wearable Systems and ApplicationsWearable IoT technology has too much potential to be limited to a wristband. How can we design wearables with more variety while still providing value to the user? We describe a work in progress to develop a novel method of Participatory Design Fiction ...
Analyzing security breaches of countermeasures throughout the refinement process in hardware design flow
DATE '17: Proceedings of the Conference on Design, Automation & Test in EuropeSide-channel and fault injection attacks are two threats on devices carrying sensitive information. Protections are thus implemented at design time. However, CAD (Computer Aided Design) tools can compromise them, in ways we detail pedagogically in this ...
Comments