tag:tagteam.harvard.edu,2005:/hubs/1114/user/zararah/atomItems tagged by zararah in Digital Security capacity among civil society 2017-05-30T10:37:44-04:00TagTeam social RSS aggregratortag:tagteam.harvard.edu,2005:FeedItem/22298682017-05-30T10:37:44-04:002017-05-30T10:37:44-04:00Adopting an ecosystem view of business technology | McKinsey & Companytag:tagteam.harvard.edu,2005:FeedItem/22298672017-05-30T10:36:50-04:002017-05-30T10:36:50-04:00Business Model Archetypes | Smarter Startuptag:tagteam.harvard.edu,2005:FeedItem/22243922017-03-20T21:15:33-04:002017-03-20T21:15:33-04:00Executive Summary: Researching digital security training for human rights defenders | Security in Context<p>The two research papers summarised here represent an initial exploration of some if these issues with the intention that the findings will help inform and encourage future applied research projects, the design and testing of new training approaches, models, and curricula, as well as contributing to broader discussion within the digital security training community.</p>
tag:tagteam.harvard.edu,2005:FeedItem/22235022017-03-12T21:46:34-04:002017-03-12T21:46:34-04:00Internet Organisations - Google Sheetstag:tagteam.harvard.edu,2005:FeedItem/22213922017-03-10T12:08:17-05:002017-03-10T12:08:17-05:00International Women’s Day In The Age Of Cybersecuritytag:tagteam.harvard.edu,2005:FeedItem/22212912017-03-09T10:48:59-05:002017-03-09T10:48:59-05:00Building a Digital Security Exchange – Medium<p><span> </span><strong>If we want to truly secure civil society from digital attacks and empower communities in their to fight to protect their rights, we’ve got to recognize that digital security is largely a human problem, not a technical one. </strong><span>Taking cues from the experiences of the deeply knowledgeable global digital security training community, the Digital Security Exchange will seek to make it easier for trainers and experts to connect directly to the communities in the U.S. — sharing expertise, documentation, and best practices — in order to increase capacity and security across the board.</span></p>
tag:tagteam.harvard.edu,2005:FeedItem/22212902017-03-09T10:47:57-05:002017-03-09T10:47:57-05:00ONLINE HARASSMENT, DIGITAL ABUSE, AND CYBERSTALKING IN AMERICA<p>The internet and digital tools play an increasingly central role in how Americans engage with their communities: How they find and share information; how they connect with their friends, family, and professional networks; how they entertain themselves; how they seek answers to sensitive questions; how they learn about—and access— the world around them. The internet is built on the ideal of the free flow of information, but it is also built on the ideal of free-flowing discourse.</p>
tag:tagteam.harvard.edu,2005:FeedItem/22210132017-03-02T19:29:54-05:002017-03-02T19:29:54-05:00How to Keep Messages Secure | Teen Voguetag:tagteam.harvard.edu,2005:FeedItem/22208622017-03-01T08:47:23-05:002017-03-01T08:47:23-05:00Digital Security & Grantcraft Guide / Ford Foundation<p><span>This guide is to help grantmakers both assess and address digital security concerns. It explores the types of digital threats against civil society and the obstacles to addressing them. It explains how to conduct a digital security “triage” of grants to elevate the digital security of your whole grant portfolio; while playing special attention to the highest risk grantees. And it provides suggestions for pathways to think more systematically about digital security.</span></p>
tag:tagteam.harvard.edu,2005:FeedItem/22203752017-02-19T15:40:02-05:002017-02-19T15:40:02-05:00Signal for Beginners – Mediumtag:tagteam.harvard.edu,2005:FeedItem/22173722017-02-02T12:06:11-05:002017-02-02T12:06:11-05:00Step 1 - Gender and Tech Resourcestag:tagteam.harvard.edu,2005:FeedItem/22168132017-01-31T11:00:39-05:002017-01-31T11:00:39-05:00Do It Yourself Online Safety – Chayntag:tagteam.harvard.edu,2005:FeedItem/22167922017-01-31T10:17:43-05:002017-01-31T10:17:43-05:00DIY Feminist Cybersecuritytag:tagteam.harvard.edu,2005:FeedItem/22151782017-01-26T10:55:37-05:002017-01-26T10:55:37-05:00Digital Security in Context: Learning how human rights defenders adopt digital security practices | Security in Context<p><span>This study looks at the direct experiences of human rights defenders both in the training room and afterwards. It was initially conceived as an opportunity to examine what key factors influence or improve the uptake of digital security practices by human rights defenders in order to increase the long-term effectiveness of trainings. This emerged from a broad awareness within the training community that time and again tool usage and digital security practices by participants either dropped off some months after a training or were not successfully integrated into their working practices to begin with. Although many theories around the reasons for this existed, closer examination of why was required.</span></p>