Search results

Jump to navigation Jump to search
  • ...ty is sort of broken right now. Law enforcement is both ignorant of online security issues while also being undermined by the thing they're ignorant of (no mor [[Category: MIT]] [[Category: Security]]
    3 KB (466 words) - 17:58, 18 May 2015
  • * how do we handle privacy/security in high-vulnerability times? ===Security===
    6 KB (864 words) - 16:48, 7 June 2016
  • ...these actions. Software has a lot to contribute to connection, information security, and sorting through indexes, but missing persons is a delicate space with ...s which have been vetted for capacity and integrity for follow-through and security. Here are the few most successfully used ones: American Red Cross’ [http:
    5 KB (827 words) - 18:26, 17 June 2016
  • * Security
    2 KB (222 words) - 17:39, 9 June 2016
  • ** Data is available when it's not a security/privacy issue. Security concerns with this idea though.
    9 KB (1,516 words) - 17:05, 9 June 2016
  • * let's talk about security and risk alongside building trust
    5 KB (852 words) - 16:55, 9 June 2016
  • * mitigating security concerns of social messaging collected data * can open source ethics crisis response be security and privacy conscious
    12 KB (1,806 words) - 01:38, 12 June 2016
  • ...onnect with and through government comms while maintaining the information security they require to be effective. The is benificial to both sides as we need t
    7 KB (1,204 words) - 18:18, 23 September 2015
  • ...tioners, media makers and storytellers, technology developers, information security practitioners, members of affected populations, researchers, and everyone i
    11 KB (1,668 words) - 22:28, 25 May 2016
  • Web widget framework supports ganular security labeling of data allowing data owners control who has access to what data.
    11 KB (1,725 words) - 16:04, 30 November 2015