Search for tag: "abuse"
CITP_Distinguished_Lecture_with_Thomas_Ristenpart - Mitigating Technology Abuse in Intimate Partner Violence and Encrypted MessagingComputer security is traditionally about the protection of technology, whereas trust and safety efforts focus on preventing technology abuse from harming people. In this talk, we’ll explore the…
From CI Center for Information Technology Policy
0 likes
2 plays
|
|
Diversity in Innovation: Perspectives from the Pan-African Scientific Research CouncilThis session was part of Engage 2020, Princeton University's innovation and entrepreneurship conference. As universities grapple with inequity and the lack of underrepresented researchers in…
From Innovation Innovation Communication
0 likes
21 plays
|
|
IV. How Do I Report Online Abuse?Module 4 of 4 in a series addressing online abuse and harassment. Visit our website to learn more about addressing electronic and online attacks. Download our Addressing Online Abuse Tip Sheet.
From Princeton Inclusive
0 likes
61 plays
|
|
III. How Do I Respond to Online Abuse?Module 3 of 4 in a series addressing online abuse and harassment.Visit our website to learn more about addressing electronic and online attacks. Download our Addressing Online Abuse Tip Sheet.
From Princeton Inclusive
0 likes
75 plays
|
|
II. How Do I Proactively Address Incidents of Online Abuse?Module 2 of 4 in a series addressing online abuse and harassment.Visit our website to learn more about addressing electronic and online attacks. Download our Addressing Online Abuse Tip Sheet.
From Princeton Inclusive
0 likes
82 plays
|
|
I. What is Online Abuse?Module 1 of 4 in a series addressing online abuse and harassment. Visit our website to learn more about addressing electronic and online attacks. Download our Addressing Online Abuse Tip Sheet.
From Princeton Inclusive
0 likes
135 plays
|