SlideShare a Scribd company logo
 
[object Object],[object Object],[object Object],Women with Disabilities  and Online Privacy
[object Object],[object Object],[object Object],[object Object],Moderating Online Space
[object Object],[object Object],[object Object],Food For Thought

More Related Content

Viewers also liked

TAcTis
TAcTisTAcTis
GimpGirl Community Virtual Praxis II Event Slides
GimpGirl Community Virtual Praxis II Event SlidesGimpGirl Community Virtual Praxis II Event Slides
GimpGirl Community Virtual Praxis II Event Slides
Jennifer Cole
 
GimpGirl Community at CSUN 2010 Tweet Up
GimpGirl Community at CSUN 2010 Tweet UpGimpGirl Community at CSUN 2010 Tweet Up
GimpGirl Community at CSUN 2010 Tweet Up
Jennifer Cole
 
GGC SLCC 2010 Presentation
GGC SLCC 2010 PresentationGGC SLCC 2010 Presentation
GGC SLCC 2010 Presentation
Jennifer Cole
 
GimpGirl Community PHP Presentation
GimpGirl Community PHP PresentationGimpGirl Community PHP Presentation
GimpGirl Community PHP Presentation
Jennifer Cole
 
GimpGirl Community Sex Tech 2009 Presentation Slides
GimpGirl Community Sex Tech 2009 Presentation SlidesGimpGirl Community Sex Tech 2009 Presentation Slides
GimpGirl Community Sex Tech 2009 Presentation Slides
Jennifer Cole
 

Viewers also liked (6)

TAcTis
TAcTisTAcTis
TAcTis
 
GimpGirl Community Virtual Praxis II Event Slides
GimpGirl Community Virtual Praxis II Event SlidesGimpGirl Community Virtual Praxis II Event Slides
GimpGirl Community Virtual Praxis II Event Slides
 
GimpGirl Community at CSUN 2010 Tweet Up
GimpGirl Community at CSUN 2010 Tweet UpGimpGirl Community at CSUN 2010 Tweet Up
GimpGirl Community at CSUN 2010 Tweet Up
 
GGC SLCC 2010 Presentation
GGC SLCC 2010 PresentationGGC SLCC 2010 Presentation
GGC SLCC 2010 Presentation
 
GimpGirl Community PHP Presentation
GimpGirl Community PHP PresentationGimpGirl Community PHP Presentation
GimpGirl Community PHP Presentation
 
GimpGirl Community Sex Tech 2009 Presentation Slides
GimpGirl Community Sex Tech 2009 Presentation SlidesGimpGirl Community Sex Tech 2009 Presentation Slides
GimpGirl Community Sex Tech 2009 Presentation Slides
 

Similar to PrivacyCampTO Second Life Event

Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptx
SIMNchannel
 
What You Need To Know About Social Networking
What You Need To Know About Social NetworkingWhat You Need To Know About Social Networking
What You Need To Know About Social Networking
Holly Swenson
 
Social Networking
Social NetworkingSocial Networking
Social Networking
Marthamcameron
 
Refugee Forum.pdf
Refugee Forum.pdfRefugee Forum.pdf
Refugee Forum.pdf
Puskar kumar Rouniyar
 
Perspectives On Social Networking
Perspectives On Social NetworkingPerspectives On Social Networking
Perspectives On Social Networking
NWMCIL
 
Privacy and social media for Australian governments
Privacy and social media for Australian governmentsPrivacy and social media for Australian governments
Privacy and social media for Australian governments
Craig Thomler
 
Why is social media important in engaging staff & empowering vulnerable people?
Why is social media important in engaging staff & empowering vulnerable people?Why is social media important in engaging staff & empowering vulnerable people?
Why is social media important in engaging staff & empowering vulnerable people?
Support Solutions & Invest In Prevention
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
NathanielCarlson2
 
Dalio
DalioDalio
Digital Accessibility
Digital AccessibilityDigital Accessibility
Digital Accessibility
ADA Site Compliance
 
Darim Presents Facebook&Twitter For JCPSC
Darim Presents Facebook&Twitter For JCPSCDarim Presents Facebook&Twitter For JCPSC
Darim Presents Facebook&Twitter For JCPSC
Lisa Colton
 
Ethics in Technology Handout
Ethics in Technology HandoutEthics in Technology Handout
Ethics in Technology Handout
Nebraska Library Commission
 
the fence
the fencethe fence
the fence
minneapplealex
 
What people want from you
What people want from youWhat people want from you
What people want from you
Louis Richardson
 
Social Media and the Legal Profe
Social Media and the Legal ProfeSocial Media and the Legal Profe
Social Media and the Legal Profe
Stephanie Kimbro Dolin
 
Setting the Foundation for Digital Communities
Setting the Foundation for Digital CommunitiesSetting the Foundation for Digital Communities
Setting the Foundation for Digital Communities
Hadar Bismut
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentation
bbednar
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
MindMake - Parenting & Education
 
IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
StuartJDavidson.com
 
Digital and Social Media Ethics for Psychotherapists (IEPsy)
Digital and Social Media Ethics for Psychotherapists (IEPsy)Digital and Social Media Ethics for Psychotherapists (IEPsy)
Digital and Social Media Ethics for Psychotherapists (IEPsy)
Haiku Centre
 

Similar to PrivacyCampTO Second Life Event (20)

Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptx
 
What You Need To Know About Social Networking
What You Need To Know About Social NetworkingWhat You Need To Know About Social Networking
What You Need To Know About Social Networking
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Refugee Forum.pdf
Refugee Forum.pdfRefugee Forum.pdf
Refugee Forum.pdf
 
Perspectives On Social Networking
Perspectives On Social NetworkingPerspectives On Social Networking
Perspectives On Social Networking
 
Privacy and social media for Australian governments
Privacy and social media for Australian governmentsPrivacy and social media for Australian governments
Privacy and social media for Australian governments
 
Why is social media important in engaging staff & empowering vulnerable people?
Why is social media important in engaging staff & empowering vulnerable people?Why is social media important in engaging staff & empowering vulnerable people?
Why is social media important in engaging staff & empowering vulnerable people?
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Dalio
DalioDalio
Dalio
 
Digital Accessibility
Digital AccessibilityDigital Accessibility
Digital Accessibility
 
Darim Presents Facebook&Twitter For JCPSC
Darim Presents Facebook&Twitter For JCPSCDarim Presents Facebook&Twitter For JCPSC
Darim Presents Facebook&Twitter For JCPSC
 
Ethics in Technology Handout
Ethics in Technology HandoutEthics in Technology Handout
Ethics in Technology Handout
 
the fence
the fencethe fence
the fence
 
What people want from you
What people want from youWhat people want from you
What people want from you
 
Social Media and the Legal Profe
Social Media and the Legal ProfeSocial Media and the Legal Profe
Social Media and the Legal Profe
 
Setting the Foundation for Digital Communities
Setting the Foundation for Digital CommunitiesSetting the Foundation for Digital Communities
Setting the Foundation for Digital Communities
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentation
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
 
IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
 
Digital and Social Media Ethics for Psychotherapists (IEPsy)
Digital and Social Media Ethics for Psychotherapists (IEPsy)Digital and Social Media Ethics for Psychotherapists (IEPsy)
Digital and Social Media Ethics for Psychotherapists (IEPsy)
 

Recently uploaded

Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 

Recently uploaded (20)

Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 

PrivacyCampTO Second Life Event

  • 1.  
  • 2.
  • 3.
  • 4.