{"69294":{"#nid":"69294","#data":{"type":"event","title":"ICTD 2012 - Fifth International Conference on Information and Communication Technologies and Development","body":[{"value":"\u003Cp\u003EICTD is the world\u0027s premier conference examining the role of computer and communications in social, economic and political development.\u0026nbsp; The conference will attract over 500 leading scholars and practitioners working at the intersections of information technologies and global development. ICTD 2012 will consist of two days of single-track peer-reviewed papers, two open sessions (interactive workshops, panels, and more), and a series of keynote speakers, demonstrations, and beyond.\u003Cbr \/\u003E\u003Cbr \/\u003EFifth International Conference on Information and Communication Technologies\u003Cbr \/\u003Eand Development (ICTD2012) Georgia Institute of Technology, Atlanta USA\u003Cbr \/\u003EMarch 12-15, 2012 In cooperation with ACM SIGCHI and ACM SIGCAS.\u003Cbr \/\u003E\u003Cstrong\u003E\u003Cbr \/\u003EIf you have not already, it is time to register for ICTD2012. \u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EWith less than two months to go before opening day, we have an exciting and dynamic program slated for the 4-day conference. \u0026nbsp;On Monday, March 12th, and Thursday, March\u003Cbr \/\u003E15th, attendees will be able to choose from nearly 40 Open Sessions (panels, workshops, and more) and 29 demos presented by practitioners and academic institutions from across the globe. \u0026nbsp;In addition, joint with the co-located ACM DEV conference, David Kobia, Co-Founder and Director of Technology Development for Ushahidi, will give a keynote speech on Monday. On Tuesday, March 13th, and Wednesday, March 14th, ICTD 2012 will offer a slate of 38\u003Cbr \/\u003Epeer-reviewed papers in plenary and poster presentation. We are also pleased to welcome the Honorable Omobola Johnson, Minister of Communication and Technology, Federal Republic of Nigeria as keynote speaker on Tuesday.\u003Cbr \/\u003E\u003Cem\u003E\u003Cstrong\u003ERegistration Required:\u003C\/strong\u003E\u003C\/em\u003E\u003Cbr \/\u003EMore information can be found on the website at \u003Ca href=\u0022http:\/\/www.ictd2012.org\/\u0022 target=\u0022_blank\u0022\u003Ewww.ictd2012.org\u003C\/a\u003E, including\u003Cbr \/\u003Eregistration instructions and links to hotel accommodations. \u0026nbsp;\u003C\/p\u003E\u003Cp\u003EFor further questions, please contact us at \u003Ca href=\u0022mailto:info@ictd2012.org\u0022\u003Einfo@ictd2012.org\u003C\/a\u003E.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EICTD is the world\u0027s premier conference examining the role of computer and communications in social, economic and political development.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"The ICTD 2012 Conference is hosted at the Georgia Institute of Technology"}],"uid":"27385","created_gmt":"2011-08-12 17:15:34","changed_gmt":"2016-10-08 01:49:28","author":"Carol Silvers","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2012-03-12T01:00:00-04:00","event_time_end":"2012-03-15T01:00:00-04:00","event_time_end_last":"2012-03-15T01:00:00-04:00","gmt_time_start":"2012-03-12 05:00:00","gmt_time_end":"2012-03-15 05:00:00","gmt_time_end_last":"2012-03-15 05:00:00","rrule":"RRULE:FREQ=DAILY;INTERVAL=1;UNTIL=20120316T035959Z;WKST=SU","timezone":"America\/New_York"},"extras":[],"related_links":[{"url":"http:\/\/ictd2012.org\/","title":"ICTD 2012 Conference Website"}],"groups":[{"id":"1281","name":"Ivan Allen College of Liberal Arts"},{"id":"1285","name":"Sam Nunn School of International Affairs"},{"id":"1286","name":"Center for International Strategy, Technology, and Policy (CISTP)"},{"id":"1289","name":"School of Public Policy"}],"categories":[],"keywords":[{"id":"2183","name":"communications"},{"id":"4769","name":"Computers"},{"id":"13990","name":"ICTD"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1789","name":"Conference\/Symposium"}],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EDr. Michael Best\u003C\/p\u003E\u003Cp\u003ESam Nunn School of International Affairs\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"672483":{"#nid":"672483","#data":{"type":"event","title":"College of Computing Faculty Candidate Seminar - Rosanna Bellini ","body":[{"value":"\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cp\u003E\u003Cstrong lang=\u0022EN-US\u0022\u003E\u003Cspan\u003ETalk Title:\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan lang=\u0022EN-US\u0022\u003E\u003Cspan\u003E \u003C\/span\u003E\u003C\/span\u003E\u003Cspan lang=\u0022EN-US\u0022\u003E\u003Cspan\u003EDecoding Abusive Adversaries for Safer Digital Systems\u003C\/span\u003E\u003C\/span\u003E\u003Cspan\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/p\u003E\r\n\u003C\/div\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cp\u003E\u003Cstrong lang=\u0022EN-US\u0022\u003E\u003Cspan\u003EAbstract:\u003C\/span\u003E\u003Cspan\u003E \u003C\/span\u003E\u003C\/strong\u003E\u003Cspan lang=\u0022EN-US\u0022\u003E\u003Cspan\u003EP\u003C\/span\u003E\u003C\/span\u003E\u003Cspan lang=\u0022EN-US\u0022\u003E\u003Cspan\u003Eeople today face threats to their digital safety that most computing systems were never designed to protect them from: those closest to them. Abusive adversaries take ample advantage of standard user interfaces and ineffective anti-abuse mechanisms, \u003C\/span\u003E\u003Cspan\u003Eleveraging\u003C\/span\u003E\u003Cspan\u003E their close social and physical proximity to their target to stalk, harass, and control. In this talk, I describe my research focused on intimate partner violence where I: (1) pioneer approaches to engaging with abusive adversaries \u003C\/span\u003E\u003Cspan\u003Efirst hand\u003C\/span\u003E\u003Cspan\u003E across online and in-person contexts, (2) design and deploy bespoke systems to challenge abusive behaviors via community-based interventions; and (3) develop new frameworks for building abuse-resilient technologies. I outline my research vision to achieve digital safety for all people across critical domains, including finance, healthcare, and research.\u003C\/span\u003E\u003C\/span\u003E\u003Cspan\u003E\u0026nbsp; \u003C\/span\u003E\u003C\/p\u003E\r\n\u003C\/div\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cp\u003E\u003Cstrong lang=\u0022EN-US\u0022\u003E\u003Cspan\u003EBio:\u003C\/span\u003E\u003Cspan\u003E \u003C\/span\u003E\u003C\/strong\u003E\u003Cspan lang=\u0022EN-US\u0022\u003E\u003Cspan\u003ERosanna Bellini is a Postdoctoral Associate at Cornell Tech in New York City. Her research develops data-driven and engaged research methods to tackle complex societal challenges, such as technology-enabled harms. Her work has been published in top-tier HCI and Security venues including USENIX Security, IEEE S\u0026amp;P, CHI, and CSCW, and featured in The Guardian, and BBC News. Her work is also recognized by multiple CHI and CSCW Best Paper awards, USENIX Security Distinguished Paper awards, and has led to changes in legislation for consumers and to consumer-facing financial applications for tens of millions of customers. She also helps to lead the Clinic to End Tech Abuse, a frontline service for survivors of technology-facilitated \u003C\/span\u003E\u003Cspan\u003Eabuse, and\u003C\/span\u003E\u003Cspan\u003E has personally helped over 150 survivors reclaim their privacy, security, and financial freedom.\u003C\/span\u003E\u003C\/span\u003E\u003Cspan\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/p\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003EPresentation Title:\u003C\/span\u003E\u003C\/strong\u003E\u0026nbsp; \u003Cspan lang=\u0022EN\u0022\u003E\u003Cspan\u003EDecoding Abusive Adversaries for Safer Digital Systems\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003EPresentation Date:\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan\u003E\u0026nbsp;Thursday, February 01, 2024 @ 11 am\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003ELocation:\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan\u003E\u0026nbsp;CODA 9th\u0026nbsp;floor Atrium 0920\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003ELunch will be provided!\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"The College of Computing invites you to attend a talk by Rosanna Bellini, Postdoctoral Associate at Cornell University."}],"uid":"36253","created_gmt":"2024-01-26 17:27:55","changed_gmt":"2024-01-29 14:40:45","author":"jpopham3","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2024-02-01T11:00:00-05:00","event_time_end":"2024-02-01T12:00:00-05:00","event_time_end_last":"2024-02-01T12:00:00-05:00","gmt_time_start":"2024-02-01 16:00:00","gmt_time_end":"2024-02-01 17:00:00","gmt_time_end_last":"2024-02-01 17:00:00","rrule":null,"timezone":"America\/New_York"},"location":"Coda","extras":["free_food"],"hg_media":{"672882":{"id":"672882","type":"image","title":"Bellini.jpg","body":null,"created":"1706290094","gmt_created":"2024-01-26 17:28:14","changed":"1706290094","gmt_changed":"2024-01-26 17:28:14","alt":"Woman with long brown hair","file":{"fid":"256209","name":"Bellini copy.jpg","image_path":"\/sites\/default\/files\/2024\/01\/26\/Bellini%20copy.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/2024\/01\/26\/Bellini%20copy.jpg","mime":"image\/jpeg","size":514439,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2024\/01\/26\/Bellini%20copy.jpg?itok=hOM1msOt"}}},"media_ids":["672882"],"related_links":[{"url":"https:\/\/gatech.zoom.us\/webinar\/register\/WN_zRboMxYQQDmFU4ndtrS05Q","title":"Virtual Attendance Available Through Zoom"}],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"177814","name":"Postdoc"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"672484":{"#nid":"672484","#data":{"type":"event","title":"College of Computing Faculty Candidate Seminar - Emily Tseng","body":[{"value":"\u003Cp\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003EPresentation Title:\u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003Cspan\u003E\u003Cspan\u003E\u0026nbsp; \u003Cspan\u003EDigital Safety and Security for Survivors of Technology-Mediated Harms\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003Cspan\u003E\u003Cspan\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003EAbstract: \u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003Cspan\u003E\u003Cspan\u003EPlatforms\u003Cspan\u003E, devices, and algorithms are increasingly weaponized to control and harass the most vulnerable among us. Some of these harms occur at the individual and interpersonal level: for example, abusers in intimate partner violence (IPV) use smartphones and social media to surveil and stalk their victims. Others are more subtle, at the level of social structure: for example, in organizations, workplace technologies can inadvertently scaffold exploitative labor practices. This talk will discuss my research (1) investigating these harms via online measurement studies, (2) building interventions to directly assist survivors with their security and privacy; and (3) instrumenting these interventions, to enable scientific research into new types of harms as attackers and technologies evolve. I will close by sharing my vision for centering inclusion and equity in digital safety, security and privacy, towards brighter technological futures for us all.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003Cspan\u003E\u003Cspan\u003E \u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003EBio: \u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003Cspan\u003E\u003Cspan\u003EEmily Tseng is a PhD candidate in Information Science at Cornell University. Her research explores the systems, interventions, and design principles we need to make digital technology safe and affirming for everyone. Emily\u2019s work has been published at top-tier venues in human-computer interaction (ACM CHI, CSCW) and computer security and privacy (USENIX Security, IEEE Oakland). For 6 years, she has served as a researcher-practitioner with the Clinic to End Tech Abuse, where her work has enabled specialized security services for over 600 survivors of intimate partner violence (IPV). Emily is the recipient of a Microsoft Research PhD Fellowship, Rising Stars in EECS, Best Paper Awards at CHI, CSCW, and USENIX Security, and third place in the Internet Defense Prize. She has additionally completed internships at Google and with the Social Media Collective at Microsoft Research. She holds a B.A. from Princeton University.\u003C\/span\u003E\u003C\/span\u003E\u003Cspan\u003E\u003Cspan\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003EPresentation Date:\u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u0026nbsp;\u003C\/span\u003ETuesday, January 30, 2024 @ 11 am\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003ELocation:\u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u0026nbsp;\u003C\/span\u003ECODA 9th\u003Cspan\u003E\u0026nbsp;\u003C\/span\u003Efloor Atrium 0920\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003EPresentation Title:\u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003Cspan\u003E\u003Cspan\u003E\u0026nbsp; \u003Cspan\u003EDigital Safety and Security for Survivors of Technology-Mediated Harms\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003Cspan\u003E\u003Cspan\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ELunch Provided!\u003C\/strong\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"The College of Computing invites you to attend a talk by Emily Tseng, Ph.D. candidate at Cornell University."}],"uid":"36253","created_gmt":"2024-01-26 17:43:48","changed_gmt":"2024-01-29 14:39:23","author":"jpopham3","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2024-01-30T11:00:00-05:00","event_time_end":"2024-01-30T12:00:00-05:00","event_time_end_last":"2024-01-30T12:00:00-05:00","gmt_time_start":"2024-01-30 16:00:00","gmt_time_end":"2024-01-30 17:00:00","gmt_time_end_last":"2024-01-30 17:00:00","rrule":null,"timezone":"America\/New_York"},"location":"Coda Building","extras":["free_food"],"hg_media":{"672883":{"id":"672883","type":"image","title":"Tseng.png","body":null,"created":"1706291034","gmt_created":"2024-01-26 17:43:54","changed":"1706291034","gmt_changed":"2024-01-26 17:43:54","alt":"Woman with long dark hair","file":{"fid":"256210","name":"Tseng.png","image_path":"\/sites\/default\/files\/2024\/01\/26\/Tseng.png","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/2024\/01\/26\/Tseng.png","mime":"image\/png","size":161982,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2024\/01\/26\/Tseng.png?itok=mBsahUCN"}}},"media_ids":["672883"],"related_links":[{"url":"https:\/\/gatech.zoom.us\/webinar\/register\/WN_-YoT-C2hSOaXgjePlAFo5g","title":"Virtual Attendance Available Through Zoom"}],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"177814","name":"Postdoc"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}