Search for tag: "abuse"

CITP_Distinguished_Lecture_with_Thomas_Ristenpart - Mitigating Technology Abuse in Intimate Partner Violence and Encrypted Messaging

Computer security is traditionally about the protection of technology, whereas trust and safety efforts focus on preventing technology abuse from harming people. In this talk, we’ll explore the…

+19 More
From  CI Center for Information Technology Policy 0 likes 2 plays

Diversity in Innovation: Perspectives from the Pan-African Scientific Research Council

This session was part of Engage 2020, Princeton University's innovation and entrepreneurship conference. As universities grapple with inequity and the lack of underrepresented researchers in…

+19 More
From  Innovation Innovation Communication 0 likes 21 plays

IV. How Do I Report Online Abuse?

Module 4 of 4 in a series addressing online abuse and harassment. Visit our website to learn more about addressing electronic and online attacks. Download our Addressing Online Abuse Tip Sheet.

+10 More
From  Princeton Inclusive 0 likes 61 plays

III. How Do I Respond to Online Abuse?

Module 3 of 4 in a series addressing online abuse and harassment.Visit our website to learn more about addressing electronic and online attacks. Download our Addressing Online Abuse Tip Sheet.

+10 More
From  Princeton Inclusive 0 likes 75 plays

II. How Do I Proactively Address Incidents of Online Abuse?

Module 2 of 4 in a series addressing online abuse and harassment.Visit our website to learn more about addressing electronic and online attacks. Download our Addressing Online Abuse Tip Sheet.

+13 More
From  Princeton Inclusive 0 likes 82 plays

I. What is Online Abuse?

Module 1 of 4 in a series addressing online abuse and harassment. Visit our website to learn more about addressing electronic and online attacks. Download our Addressing Online Abuse Tip Sheet.

+10 More
From  Princeton Inclusive 0 likes 135 plays