Search for tag: "abuse"

CITP_Distinguished_Lecture_with_Thomas_Ristenpart - Mitigating Technology Abuse in Intimate Partner Violence and Encrypted Messaging

Computer security is traditionally about the protection of technology, whereas trust and safety efforts focus on preventing technology abuse from harming people. In this talk, we’ll explore the…

From  CI Center for Information Technology Policy 0 likes 2 plays

Diversity in Innovation: Perspectives from the Pan-African Scientific Research Council

This session was part of Engage 2020, Princeton University's innovation and entrepreneurship conference. As universities grapple with inequity and the lack of underrepresented researchers in…

From  Innovation Innovation Communication 0 likes 19 plays

IV. How Do I Report Online Abuse?

Module 4 of 4 in a series addressing online abuse and harassment. Visit our website to learn more about addressing electronic and online attacks. Download our Addressing Online Abuse Tip Sheet.

From  Princeton Inclusive 0 likes 58 plays

III. How Do I Respond to Online Abuse?

Module 3 of 4 in a series addressing online abuse and harassment.Visit our website to learn more about addressing electronic and online attacks. Download our Addressing Online Abuse Tip Sheet.

From  Princeton Inclusive 0 likes 74 plays

II. How Do I Proactively Address Incidents of Online Abuse?

Module 2 of 4 in a series addressing online abuse and harassment.Visit our website to learn more about addressing electronic and online attacks. Download our Addressing Online Abuse Tip Sheet.

From  Princeton Inclusive 0 likes 82 plays

I. What is Online Abuse?

Module 1 of 4 in a series addressing online abuse and harassment. Visit our website to learn more about addressing electronic and online attacks. Download our Addressing Online Abuse Tip Sheet.

From  Princeton Inclusive 0 likes 132 plays