Pages with the most categories

Jump to: navigation, search

Showing below up to 100 results in range #101 to #200.

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)

  1. Encrypting A/V: How you can secure your equipment and encrypt your footage‏‎ (5 categories)
  2. Turkey and Azerbaijan: One Nation, One Crackdown‏‎ (5 categories)
  3. Usability in secure multi-party chat systems‏‎ (5 categories)
  4. Vietnam's Challenges and Opportunities: An AMA with Vietnamese activists‏‎ (5 categories)
  5. What Should I Be Worried About?: Explaining information privacy and security concerns to students, researchers, and university faculty‏‎ (5 categories)
  6. How activists, western media, and USBs and SD cards are revolutionizing North Korean society.‏‎ (5 categories)
  7. Workshopping the KeepitOn Advocacy Toolkit: enhancing ways for stakeholders to fight shutdowns around the world‏‎ (5 categories)
  8. IWMF & CPJ Roundtable on the Digital Harassment of Female Journalists‏‎ (5 categories)
  9. LGBTQI Centered Workshops: Lessons from Participants and Trainers‏‎ (5 categories)
  10. Mass Surveillance in India‏‎ (5 categories)
  11. Online platforms as key players in political debate: power without responsibility?‏‎ (5 categories)
  12. Outcome Mapping Organisational Security‏‎ (5 categories)
  13. Post-Truth Censorship: New Techniques for Realtime Shutdown Detection‏‎ (5 categories)
  14. Building Community Resources for Censorship Measurement Research‏‎ (5 categories)
  15. Bursting the EU bubble: What you can do to save the link!‏‎ (5 categories)
  16. Chatbots for journalists and news media‏‎ (5 categories)
  17. Secure communication and information management in rural areas‏‎ (5 categories)
  18. Consent experience design workshop‏‎ (5 categories)
  19. Setting up Whistleblowing Activism Initiatives with GlobaLeaks‏‎ (5 categories)
  20. Creating Apps for Political Expression‏‎ (5 categories)
  21. Data Exploration Hackathon: Visualizing the Relationship between Rule of Law and Digital Rights in MENA and Beyond‏‎ (5 categories)
  22. Taking Matters into Our Hands: Addressing Online Harassment‏‎ (5 categories)
  23. Documentation Workflows for Digital Security Education and Rapid Response‏‎ (5 categories)
  24. Entre la espada y la balanza: el incumplimiento de estándares internacionales sobre el derecho a la privacidad en América Latina‏‎ (5 categories)
  25. Facebook Tunnel: a tale of restricted Internet access‏‎ (5 categories)
  26. Usable and Accessible Security -- lessons learned by engaging with users‏‎ (5 categories)
  27. From Ad Hoc to Prepared - Developing an Anti Online Harassment Infrastructure‏‎ (5 categories)
  28. Hakuna Metadata‏‎ (5 categories)
  29. How design choices reflect Internet policy strategies?‏‎ (5 categories)
  30. Online risk & security for LGBTI activists in Russia‏‎ (5 categories)
  31. Architectures of Internet Freedom movements in Southeast Asia‏‎ (5 categories)
  32. Bodies and algorithms: a global feminist approach to period trackers‏‎ (5 categories)
  33. Promoting the African Declaration on Internet Rights and Freedoms‏‎ (5 categories)
  34. Research on security digital perspective of journalist in Indonesia and Philippines‏‎ (5 categories)
  35. Ciberfeminismo y autodefensa digital en tiempos de vigilancia, aprendizajes desde América Latina‏‎ (5 categories)
  36. Communications campaigns and storytelling for freedom of speech and digital rights advocacy‏‎ (5 categories)
  37. Creating a pedagogy of empowerment‏‎ (5 categories)
  38. Data Protection law and is different manifestations‏‎ (5 categories)
  39. Super! Quick! User Research Skillz! for! Digital! Security! Trainers!‏‎ (5 categories)
  40. Developing a censorship-resistant app store‏‎ (5 categories)
  41. Digital Security Workshop for Journalists (Spanish)‏‎ (5 categories)
  42. The Case for Digital Rights: Strategies for increasing Private Sector accountability and transparency‏‎ (5 categories)
  43. Essentials of building internet tools for inclusion‏‎ (5 categories)
  44. Exploring secure and anonymous video capture and distribution‏‎ (5 categories)
  45. Grassroots gender activism in underprivileged areas: building education and awareness and fostering actions‏‎ (5 categories)
  46. When Practice Informs Technology‏‎ (5 categories)
  47. How do we measure the health of the Internet?‏‎ (5 categories)
  48. Improving Circumvention Tool Usability Through Outreach‏‎ (5 categories)
  49. Internet as a gateaway for censorship: a glimpse of Venezuela´s situation‏‎ (5 categories)
  50. It’s not just Activism: Art and Humour in Creative Strategies for Hard Times: (a Hands-On Workshop)‏‎ (5 categories)
  51. MENAleaks, bringing anonymous whistleblowing to the MENA region‏‎ (5 categories)
  52. Online safety training for local journalists‏‎ (5 categories)
  53. Autocrypt: Email Encryption for Everyone‏‎ (5 categories)
  54. Practical and Actionable Threat Intelligence Collection‏‎ (5 categories)
  55. Bookkeeping for activist projects‏‎ (5 categories)
  56. Protecting Dissent: A conversation on tactics, best practices and challenges for online and offline safety during protests‏‎ (5 categories)
  57. Campaigning for privacy: sharing experiences, failures and victories‏‎ (5 categories)
  58. Researching and resisting information controls from a distance: challenges and opportunities‏‎ (5 categories)
  59. SAFE Network by Maidsafe: the new crowd-sourced internet putting you in control of your data.‏‎ (5 categories)
  60. Community-led Organizational Security Assessment Process‏‎ (5 categories)
  61. Consumer rights for Internet freedom! Mapping and checking the world's telcos and internet providers‏‎ (5 categories)
  62. SpeakUp: Digital activism against corruption in the Arab World‏‎ (5 categories)
  63. Surveillance from the Margins: Different Experiences of Surveillance‏‎ (5 categories)
  64. Teaching Machines to Learn Better: Mitigating Discrimination, Fostering Principled Governance and Communicating Expectations of Emerging AI‏‎ (5 categories)
  65. Expressing yourself online: legal threats, and ways to defend against them‏‎ (5 categories)
  66. Fighting the Chilling Effects of Surveillance in Protests: Strategies and Tactics for uncovering IMSI catchers, and how to stop them.‏‎ (5 categories)
  67. Malware Against Political Dissidence in Latam‏‎ (4 categories)
  68. TRanslating Tails to spanish‏‎ (4 categories)
  69. Gender gap in on-line projects, the problem in Wikimedia‏‎ (4 categories)
  70. Malware Analysis, Censorship Measurment in Iran, Big Data Visualization‏‎ (4 categories)
  71. Smart cities: networks of people, networks of vigilance?‏‎ (4 categories)
  72. Gender Issues and Connecting the next billion‏‎ (3 categories)
  73. Internet policymaking for civil society in ICANN‏‎ (3 categories)
  74. OSScientific Method: How to use open source tech to build open research practice‏‎ (3 categories)
  75. A Fireside Chat about Internet Measurement, facilitated by M-Lab‏‎ (3 categories)
  76. Bridging the Divide: talking to users, trainers, developers, and more!‏‎ (3 categories)
  77. Content design - How to write words that people will read, understand and won't scare them‏‎ (3 categories)
  78. Dealing with Trauma and the Psycho Social Effects of Human Rights work‏‎ (3 categories)
  79. Building an inclusive community: Code of Conduct principles and best practices‏‎ (3 categories)
  80. Regional networks for tackling gender-based online violence: Good practices, strategies and autonomous infrastructure for counseling and support‏‎ (3 categories)
  81. Revolutionary transparency in Ukrainian public procurement - how civil activist managed to create best e-procurement system in the world‏‎ (3 categories)
  82. Digital independence in the age of the Big Five (How to cook up independent, secure servers for small groups and organizations)‏‎ (3 categories)
  83. Training to privacy advocacy and digital security from a gender perspective‏‎ (3 categories)
  84. Holistic Security: subversive well-being for trainers‏‎ (3 categories)
  85. Conversations on Research Needs for Digital Rights Advocacy and Impact‏‎ (3 categories)
  86. How to organize a privacy advocacy event: Real cases histories, do's and don't‏‎ (3 categories)
  87. Disruptive Media Activism for the IF Community‏‎ (3 categories)
  88. Freedom of expression in Venezuela: Challenges of the new National Assembly‏‎ (3 categories)
  89. Internet Governance networking efforts: a gathering of groups starting from the deep country of Brazil‏‎ (3 categories)
  90. Blockchain ISOC SIG meetup‏‎ (3 categories)
  91. Producing guides and self-learning resources for tackling gender-tech based violence: What is there and what is needed?‏‎ (3 categories)
  92. Risk Analysis from a Holistic Perspective‏‎ (3 categories)
  93. Social engineering for the good of your users a.k.a. an introduction to user research.‏‎ (3 categories)
  94. Risk Analysis from a Holistic Perspective (1hr Session)‏‎ (3 categories)
  95. Secure the News: A Dialogue on How News Organizations, Tech Companies and Technologists Can Protect the Future of Journalism‏‎ (3 categories)
  96. Your "Enemy" Should Have a Place in Your Internet Space‏‎ (3 categories)
  97. A Dark Tale of Internet: Turkey's shutdowns, government backed online harassment, blockings‏‎ (3 categories)
  98. Sharing tactics, tools and practices for system administrators + security for web developers (Florencia Herra vega)‏‎ (3 categories)
  99. Ever wanted to chat with the NSA?‏‎ (3 categories)
  100. WOC debate: fighting online harassment‏‎ (2 categories)

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)