BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:Europe/Dublin
BEGIN:DAYLIGHT
DTSTART:20240331T020000
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:IST
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20241027T010000
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:GMT
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20240611T205009Z
UID:281AAD7D-ED7B-4C82-8A4E-2E8769C203DF
DTSTART;TZID=Europe/Dublin:20240611T180000
DTEND;TZID=Europe/Dublin:20240611T190000
DESCRIPTION:Henry Nash (P2987 Standard Working Group) will present “Desig
 ning a Standard to Minimise Misuse of Technology for Coercive-Control (P29
 87)” at 6pm (UTC+1) / 1pm EDT on 11 June ’24. Click [here to convert t
 o your local time](https://www.timeanddate.com/worldclock/fixedtime.html?m
 sg=IEEE+SSIT+Lecture%3A+Designing+a+Standard+to+Minimise+Misuse+of+Technol
 ogy+for+Coercive-Control+%28P2987&amp;iso=20240611T18&amp;p1=78&amp;ah=1).\n\n[IEEE UK
  and Ireland SSIT Chapter](https://www.ieee-ukandireland.org/chapters/soci
 ety-on-social-implications-of-technology/) and SSIT IST-Africa SIGHT are c
 ooperating with a number of IEEE OUs including: North Jersey Section SSIT 
 Chapter\; Vancouver Section Jt. Chapter\,TEM14/PC26/E25/SIT30\; New Jersey
  Coast Section SIGHT\; New Jersey Coast Section Jt. IM/Computer Society Ch
 apter\, Southeastern Michigan Section Computer Chapter and Phoenix Section
  Computer Chapter to organise this SSIT Lecture as a joint Webinar on 11 J
 une ‘24.\n\nRegistration\nIEEE and SSIT Members as well as non-IEEE Memb
 ers are invited to [Register](https://events.vtools.ieee.org/m/420067) and
  participate.\n\nIEEE Members should include their IEEE Membership Number 
 when registering.\n\nAccess to online Meeting\nRegistered participants wil
 l be provided with the link prior to the event.\n\nGuest Lecture Focus\nIt
  is an uncomfortable truth for designers and operators of technology that 
 it is increasingly being used by perpetrators of interpersonal coercive-co
 ntrol\, for example in cases such as domestic abuse. Moreover\, this use o
 f technology does not typically involve hacking in the traditional sense\,
  rather the misuse of often well-intentioned standard features - the desig
 n of which usually did not include threat analysis of\, for instance\, an 
 abusive domestic partner who has access to passwords or manages the device
 /application in question. Examples include tracking of partners and their 
 children\, manipulation of social media while gaslighting to cover what is
  happening\, and utilising smart-home devices to secretly monitor movement
 . In this session we will update you on our progress towards a recommended
  practice in the Principles of Design and Operation of such technology to 
 minimise this kind of misuse.\n\nSpeaker(s): Henry Nash\, \n\nAgenda: \n18
 :00 (UTC+1) / 13:00 (EDT) Welcome and Introduction to Guest Speaker\n18:05
  Lecture\n18:45 Questions and Discussions\n\nVirtual: https://events.vtool
 s.ieee.org/m/420067
LOCATION:Virtual: https://events.vtools.ieee.org/m/420067
ORGANIZER:miriam@iimg.com
SEQUENCE:30
SUMMARY:Designing a Standard to Minimise Misuse of Technology for Coercive-
 Control (P2987)
URL;VALUE=URI:https://events.vtools.ieee.org/m/420067
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&lt;strong&gt;Henry Nash&lt;/strong&gt; (P2987 Standar
 d Working Group) will present &amp;ldquo\;&lt;strong&gt;Designing a Standard to Mini
 mise Misuse of Technology for Coercive-Control (P2987)&lt;/strong&gt;&amp;rdquo\; at
 &lt;strong&gt; 6pm (UTC+1) / 1pm EDT&lt;/strong&gt; on &lt;strong&gt;11 June &amp;rsquo\;24&lt;/str
 ong&gt;. Click &lt;a href=&quot;https://www.timeanddate.com/worldclock/fixedtime.html
 ?msg=IEEE+SSIT+Lecture%3A+Designing+a+Standard+to+Minimise+Misuse+of+Techn
 ology+for+Coercive-Control+%28P2987&amp;amp\;iso=20240611T18&amp;amp\;p1=78&amp;amp\;a
 h=1&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;here to convert to your local time&lt;/a&gt;
 .&lt;/p&gt;\n&lt;p&gt;&lt;a href=&quot;https://www.ieee-ukandireland.org/chapters/society-on-s
 ocial-implications-of-technology/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;IEEE UK 
 and Ireland SSIT Chapter&lt;/a&gt; and SSIT IST-Africa SIGHT are cooperating wit
 h a number of IEEE OUs including: North Jersey Section SSIT Chapter\; Vanc
 ouver Section Jt. Chapter\,TEM14/PC26/E25/SIT30\; New Jersey Coast Section
  SIGHT\; New Jersey Coast Section Jt. IM/Computer Society Chapter\, Southe
 astern Michigan Section Computer Chapter and Phoenix Section Computer Chap
 ter to organise this SSIT Lecture as a joint Webinar on 11 June &amp;lsquo\;24
 .&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;br&gt;IEEE and SSIT Members as well a
 s non-IEEE Members are invited to &lt;a href=&quot;https://events.vtools.ieee.org/
 m/420067&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Register&lt;/a&gt; and participate.&lt;/p&gt;
 \n&lt;p&gt;IEEE Members should include their IEEE Membership Number when registe
 ring.&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;Access to online Meeting&lt;br&gt;&lt;/strong&gt;Registered part
 icipants will be provided with the link prior to the event.&lt;/p&gt;\n&lt;p&gt;&lt;stron
 g&gt;Guest Lecture Focus&lt;/strong&gt;&lt;br&gt;It is an uncomfortable truth for designe
 rs and operators of technology that it is increasingly being used by perpe
 trators of interpersonal coercive-control\, for example in cases such as d
 omestic abuse. Moreover\, this use of technology does not typically involv
 e hacking in the traditional sense\, rather the misuse of often well-inten
 tioned standard features - the design of which usually did not include thr
 eat analysis of\, for instance\, an abusive domestic partner who has acces
 s to passwords or manages the device/application in question. Examples inc
 lude tracking of partners and their children\, manipulation of social medi
 a while gaslighting to cover what is happening\, and utilising smart-home 
 devices to secretly monitor movement. In this session we will update you o
 n our progress towards a recommended practice in the Principles of Design 
 and Operation of such technology to minimise this kind of misuse.&lt;/p&gt;&lt;br /
 &gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;18:00 (UTC+1) / 13:00 (EDT) Welcome and Introducti
 on to Guest Speaker&lt;br&gt;18:05 Lecture&lt;br&gt;18:45 Questions and Discussions&lt;/p
 &gt;
END:VEVENT
END:VCALENDAR

