IFF Schedule:Sessions

From IFF Wiki
Jump to: navigation, search

Beyond the web of trust: how organizations can help build strongly-authenticated ties without privacy compromises

Community infrastructure, free infrastructure

Internet Governance networking efforts: a gathering of groups starting from the deep country of Brazil

Gender gap in on-line projects, the problem in Wikimedia

#SaveTheInternet: Lessons learned from the fight for net neutrality

OPEN SOURCE BANKERS' JAILING

Building Security Culture Within Marginalized Communities

Technology Battlefronts - How to Fight for the User

Ebola: A Big Humanitarian Data Disaster

How we can end online harassment together

Dealing with Trauma and the Psycho Social Effects of Human Rights work

Evolving Terminology with Evolved Technology

Our Internet, And Theirs

Towards freedom of consensual representation online

What does re-usable & updatable content look like?

Iranian Cyber Army

Grassroots surveillance and censorship resistance at your local library: the Library Freedom Project

Your "Enemy" Should Have a Place in Your Internet Space

Building an inclusive community: Code of Conduct principles and best practices

What freedom lovers need to know about Internet governance

How to Fight an Internet Shutdown

Challenging Corporate Secret, Using the Internet for Accountability

Investigating human rights violations arising from electronic surveillance

How to organize a privacy advocacy event: Real cases histories, do's and don't

Using data to enhance digital rights advocacy in the Middle East

Significance of Big Data to Socio Economic Development in Municipalities in Africa

Smart cities: networks of people, networks of vigilance?

Open Source Fundraising

Resources for Internet Freedom

Toeing the line – ineffective and unjust national security strategies in MENA

Big Brother and its Corporate Twin

Ranking ICT companies on digital rights: A "how to" guide

Strengthening advocacy for Internet Freedoms in Africa

Holding Companies to Account: Advocating for Corporate Respect for Human Rights

Network disconnections: Affects on Civil and Trade Rights

Digital Media Repertoires in Public Policy Advocacy

Africa - Where net neutrality goes to die!

Government Surveillance and National Security

Accessible database of best practice law - digital rights & information freedom

21st Century Activists Need 21st Century Skill Sets

Improving New User Experience

UI and Usability Jam Sessions

User Research For All!

Hacking User Centred Design for Social Change Efforts

Build Usable Tools

Content design - How to write words that people will read, understand and won't scare them

Multilingual Design: Bringing Language Access to the Full Stack

Social engineering for the good of your users a.k.a. an introduction to user research.

Humane Interfaces: What OpenPGP Gets Wrong & How To Fix It

Bug Reporting 101: How to make the tools we use better even if we can't code

Lightweight prototyping tools for soliciting user feedback

Designing Participatory Algorithmic Decision-Making Processes

You and your data

If I Only Had a Frame(work): Crafting Experiences Across 3rd-Party Systems

Developing Understanding via a Needfinding Approach

Bridging the Divide: talking to users, trainers, developers, and more!

User experience of configuring Tor in Tails (and Tor Browser and Whonix)

Language use and Internet freedom

A Robotics Explanation of Cross-cultural Communication

Privacy Across Cultures?(To be updated)

We're Gonna Need a Bigger Tent: Expanding the Internet Freedom and Human Rights

Not Too Inaccessible for Broadband: Connecting Remote Communities

Recoding the the Rules - Designing with, not just for, the next billion Internet users.

Tackling Barriers to Access, Participation and Impact of the Internet in the developed world

Title to come. Combo of of Intersectional Digital Rights: Are we stuck in our lane and Going Global: A Moderated Discussion on How to Create a More Diverse

Freedom of expression in Venezuela: Challenges of the new National Assembly

Cuba: Update & Getting involved

Las culturas originarias y el Internet: alternativas contra la exclusión

Costa Rica sesion

The “South" Open Mic Party (part 1)

Latin America Meetup

Africa Meetup

Middle East Meetup

Southeast Asia Meetup

urban open tech: learnings from the inner-city"

The “South Open Mic Party (part 2)

Unstructured Play

Developing a Digital Advocacy Curriculum for the Global South

Behavior modification techniques to make new safe habits stick

DigSec Curricula Design: when your powers combine...

Best practices in strengthen organizational security

Community-building for Digital Security Trainers in Latin America

How do we know what they’re learning?!: An adventure in evaluating behavior change

Holistic Security: Practical Risk Assessment for Trainers

Sharing tactics, tools and practices for system administrators

How do we enable ad hock collaboration preventing 'vandalism'

How to run participatory trainings and events

Resources for baseline organizational policies and practices

Is Our Training Effective?

Insecurity demos or how I learned to stop worrying and start loving digital security trainings

How the Internet Sees You: A Collaborative Workship for Trainers and Digital Literacy Educators

The Secure Communications Framework: Combining Impact with Adversary Capability and Motivation

The 5 W's of journalistic self-protection

Tools vs threats model: making the conscious use of tools for trainees

Bringing it all together: Threat modeling, gender-based violence risk assessment and safety planning

Ranking tech companies part 2: software, devices and networking equipment

Tor on Mobile

Internet Protocols Demystified

Adversary resistant computing: Subgraph OS

Glocalization for Noobs: How to Design Tools for a Global Audience

TRanslating Tails to spanish

Don't Make Killer Apps: Responsible Development Beyond Code

Building better software

Deploy an emergency Libre-Mesh network with local services

Autonomus Community Networks: Argentina, Brazil, Nicaragua, Spain and beyond

F-Droid Discussion: your very own private, free, secure, and flexible Android app store

F-Droid Hands-On: your very own private, free, secure, and flexible Android app store

Developing with Integrity

What can circumvention data tell us about the dynamics of internet censorship and online behaviour?

Digital independence in the age of the Big Five (How to cook up independent, secure servers for small groups and organizations)

Overcoming the Next Great Cannon

Reproducible Builds

Is mass adoption of secure email possible?

Technology Battlefronts - How to Fight for the User

State of secure hosting

State of the VPN

Building a shared framework for organizational security assessments

Machine Learning to Understand and Evade Mass Surveillance Methods on the Internet

A Fireside Chat about Internet Measurement, facilitated by M-Lab

Advanced topics in GPG key security: smartcards and Yubikeys

Coming shortly to your screens: Secure Group Messaging

Online Information Controls and Circumvention for Civil Society Groups

What your apps say about you (and how to find out)

OSScientific Method: How to use open source tech to build open research practice