Pages with the most categories

Jump to: navigation, search

Showing below up to 100 results in range #51 to #150.

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)

  1. Rights and access at risk in Azerbaijan‏‎ (5 categories)
  2. Coming Back to Tech‏‎ (5 categories)
  3. Secure Storage and File-Sharing for Freedom Fighters‏‎ (5 categories)
  4. Conflicting signals. What direction Ukraine, Russia and Belarus will choose dealing with Internet Freedom?‏‎ (5 categories)
  5. Creating Approaches to Rapid Response - Where are we now?‏‎ (5 categories)
  6. Social Media & At-Risk Groups‏‎ (5 categories)
  7. DDoS self-defense - community resilience to a growing censorship threat‏‎ (5 categories)
  8. Taking MENA Holistic Privacy Practice and Digital Security Research to Next Level‏‎ (5 categories)
  9. Documentation Workflows for Digital Security Education and Rapid Response‏‎ (5 categories)
  10. Entre la espada y la balanza: el incumplimiento de estándares internacionales sobre el derecho a la privacidad en América Latina‏‎ (5 categories)
  11. Facebook Tunnel: a tale of restricted Internet access‏‎ (5 categories)
  12. Usable and Accessible Security -- lessons learned by engaging with users‏‎ (5 categories)
  13. From Ad Hoc to Prepared - Developing an Anti Online Harassment Infrastructure‏‎ (5 categories)
  14. Vietnam's Challenges and Opportunities: An AMA with Vietnamese activists‏‎ (5 categories)
  15. What Should I Be Worried About?: Explaining information privacy and security concerns to students, researchers, and university faculty‏‎ (5 categories)
  16. How activists, western media, and USBs and SD cards are revolutionizing North Korean society.‏‎ (5 categories)
  17. Workshopping the KeepitOn Advocacy Toolkit: enhancing ways for stakeholders to fight shutdowns around the world‏‎ (5 categories)
  18. IWMF & CPJ Roundtable on the Digital Harassment of Female Journalists‏‎ (5 categories)
  19. LGBTQI Centered Workshops: Lessons from Participants and Trainers‏‎ (5 categories)
  20. Mass Surveillance in India‏‎ (5 categories)
  21. Online platforms as key players in political debate: power without responsibility?‏‎ (5 categories)
  22. Outcome Mapping Organisational Security‏‎ (5 categories)
  23. Post-Truth Censorship: New Techniques for Realtime Shutdown Detection‏‎ (5 categories)
  24. Building Community Resources for Censorship Measurement Research‏‎ (5 categories)
  25. Bursting the EU bubble: What you can do to save the link!‏‎ (5 categories)
  26. Chatbots for journalists and news media‏‎ (5 categories)
  27. Secure communication and information management in rural areas‏‎ (5 categories)
  28. Consent experience design workshop‏‎ (5 categories)
  29. Setting up Whistleblowing Activism Initiatives with GlobaLeaks‏‎ (5 categories)
  30. Creating Apps for Political Expression‏‎ (5 categories)
  31. Data Exploration Hackathon: Visualizing the Relationship between Rule of Law and Digital Rights in MENA and Beyond‏‎ (5 categories)
  32. Taking Matters into Our Hands: Addressing Online Harassment‏‎ (5 categories)
  33. The Case for Digital Rights: Strategies for increasing Private Sector accountability and transparency‏‎ (5 categories)
  34. Essentials of building internet tools for inclusion‏‎ (5 categories)
  35. Exploring secure and anonymous video capture and distribution‏‎ (5 categories)
  36. Hakuna Metadata‏‎ (5 categories)
  37. How design choices reflect Internet policy strategies?‏‎ (5 categories)
  38. Online risk & security for LGBTI activists in Russia‏‎ (5 categories)
  39. Architectures of Internet Freedom movements in Southeast Asia‏‎ (5 categories)
  40. Bodies and algorithms: a global feminist approach to period trackers‏‎ (5 categories)
  41. Promoting the African Declaration on Internet Rights and Freedoms‏‎ (5 categories)
  42. Research on security digital perspective of journalist in Indonesia and Philippines‏‎ (5 categories)
  43. Ciberfeminismo y autodefensa digital en tiempos de vigilancia, aprendizajes desde América Latina‏‎ (5 categories)
  44. Communications campaigns and storytelling for freedom of speech and digital rights advocacy‏‎ (5 categories)
  45. Creating a pedagogy of empowerment‏‎ (5 categories)
  46. Data Protection law and is different manifestations‏‎ (5 categories)
  47. Super! Quick! User Research Skillz! for! Digital! Security! Trainers!‏‎ (5 categories)
  48. Developing a censorship-resistant app store‏‎ (5 categories)
  49. Digital Security Workshop for Journalists (Spanish)‏‎ (5 categories)
  50. Expressing yourself online: legal threats, and ways to defend against them‏‎ (5 categories)
  51. Fighting the Chilling Effects of Surveillance in Protests: Strategies and Tactics for uncovering IMSI catchers, and how to stop them.‏‎ (5 categories)
  52. Grassroots gender activism in underprivileged areas: building education and awareness and fostering actions‏‎ (5 categories)
  53. When Practice Informs Technology‏‎ (5 categories)
  54. How do we measure the health of the Internet?‏‎ (5 categories)
  55. Improving Circumvention Tool Usability Through Outreach‏‎ (5 categories)
  56. Internet as a gateaway for censorship: a glimpse of Venezuela´s situation‏‎ (5 categories)
  57. It’s not just Activism: Art and Humour in Creative Strategies for Hard Times: (a Hands-On Workshop)‏‎ (5 categories)
  58. MENAleaks, bringing anonymous whistleblowing to the MENA region‏‎ (5 categories)
  59. Online safety training for local journalists‏‎ (5 categories)
  60. Autocrypt: Email Encryption for Everyone‏‎ (5 categories)
  61. Practical and Actionable Threat Intelligence Collection‏‎ (5 categories)
  62. Bookkeeping for activist projects‏‎ (5 categories)
  63. Protecting Dissent: A conversation on tactics, best practices and challenges for online and offline safety during protests‏‎ (5 categories)
  64. Campaigning for privacy: sharing experiences, failures and victories‏‎ (5 categories)
  65. Researching and resisting information controls from a distance: challenges and opportunities‏‎ (5 categories)
  66. SAFE Network by Maidsafe: the new crowd-sourced internet putting you in control of your data.‏‎ (5 categories)
  67. Community-led Organizational Security Assessment Process‏‎ (5 categories)
  68. Consumer rights for Internet freedom! Mapping and checking the world's telcos and internet providers‏‎ (5 categories)
  69. SpeakUp: Digital activism against corruption in the Arab World‏‎ (5 categories)
  70. Surveillance from the Margins: Different Experiences of Surveillance‏‎ (5 categories)
  71. Teaching Machines to Learn Better: Mitigating Discrimination, Fostering Principled Governance and Communicating Expectations of Emerging AI‏‎ (5 categories)
  72. Everything you ever wanted to know about tooling!‏‎ (5 categories)
  73. Uniting The Front: Mapping The Collective Future Of Internet Freedom‏‎ (5 categories)
  74. Filterwatch: Internet Freedom in Iran‏‎ (5 categories)
  75. Whistler: Co-designing a toolkit for front line activists‏‎ (5 categories)
  76. How governments in Southeast Asia (unsuccessfully) restrict free speech on social media‏‎ (5 categories)
  77. How we are tracking politicians trying to hide information from online‏‎ (5 categories)
  78. Making Global Voices Safer: Security, Risk and Reputation in a Decentralized Newsroom‏‎ (5 categories)
  79. My data my choice my way‏‎ (5 categories)
  80. Practical implementations of human rights respecting cybersecurity policy‏‎ (5 categories)
  81. Safeguarding media in Afghanistan – The history of the Afghan Journalist Safety Committee‏‎ (5 categories)
  82. Developing for Good UX‏‎ (5 categories)
  83. Digital Security for women human rights defenders (WHRD) as part of holistic and feminist practice in Latin America and the Caribbean (LAC)‏‎ (5 categories)
  84. To Serve and Protect: Panel discussion on the role of technology in the fight against abuse by law enforcement‏‎ (5 categories)
  85. Everything you ever wanted to know about what international human rights law is and how it can help fight surveillance, but were afraid to ask‏‎ (5 categories)
  86. Using CameraV for systematic violation documentation in post-conflict contexts‏‎ (5 categories)
  87. Gender deanonymization through machine learning - risks and implications.‏‎ (5 categories)
  88. Walking the Talk: Holistic Security‏‎ (5 categories)
  89. Who are your users and how do you know what they need?‏‎ (5 categories)
  90. Improving metholodogy: verifying leaks from anonymous online whistleblowing platforms‏‎ (5 categories)
  91. Introducing the Emergency Response Team at the Committee to Protect Journalists‏‎ (5 categories)
  92. Journalism and the Right to be Forgotten‏‎ (5 categories)
  93. African women and the Internet: Re-defining 'African Sexuality' and freedom of expression in the African Internet‏‎ (5 categories)
  94. Aviary: Distributed, Tamper-Proof, Per-User Warrant Canaries‏‎ (5 categories)
  95. Pretty Good Graphics‏‎ (5 categories)
  96. Bridging the localization gap: digital security tools for everyone‏‎ (5 categories)
  97. Prototyping Qubes trainings: Explore an OS that will map to your digital life(s)‏‎ (5 categories)
  98. Refugees in Transit‏‎ (5 categories)
  99. Case study: Understanding internet censorship in Africa’s repressive environments through the deployment of OONI software probes and Citizen Lab mixed research methods.‏‎ (5 categories)
  100. Respuesta Rápida en América Latina - Y ahora ¿quien podrá ayudarme?‏‎ (5 categories)

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)