Security protocols and requirements
Ethical concerns & protections (including privacy)
Device/software user design
Equitable access to underserved populations (demographic, socioeconomic, digital divide)
Technical, Security, and User Considerations and Validation