Special

Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Learning objectives" with value "Consejos sencillos para crear contraseñas seguras de manera análoga.". Since there have been only a few results, also nearby values are displayed.

Showing below up to 41 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

    • Gender Tech Collective stories  + (Constructing a group narrative around security and self care, to encourage participants to think about what collectives or organisations can do in the area of security.)
    • 10 trucos para mejorar tu posicionamiento sin vender tu alma a Google  + (Contribuir a la comprensión del funcionamiento de las motores de búsqueda comerciales, para optimizar el alcance de nuestros contenidos de defensa de los derechos humanos en Internet.)
    • Holistic security - Communications Security  + (Create understanding on how communications work and it's inherent insecurities in a non technical way. Provide a framework for approaching digital security and communications in general.)
    • Gender Tech Privilege in Tech  + (Demonstrating physically differences in privileges with regards to technology, and thinking through how these affect access to, and presence in, the tech community)
    • Cuidados, Descargar emociones  + (Descargar emociones acumuladas durante el día y adquirir herramientas para poder trabajar emociones (en particular ansiedad) tanto a nivel personal como colectivo)
    • Seguridad digital en campañas feministas  + (Dialogar la seguridad digital como parte d
      Dialogar la seguridad digital como parte de la defensa personal feminista. 1) Juego de presentación yo me nombro con un movimiento 2) Qué herramientas usamos para nuestras acciones (trabajo en grupos) 3) Vulnerabilidades de nuestras acciones usando tecnología (input de la facilitadora) 4) Cómo introducimos la seguridad digital dentro de la defensa personal feminista
      al dentro de la defensa personal feminista)
    • Self care, Emotions  + (Download emotions accumulated during the day and acquire tools to work emotions (in particular anxiety) both personally and collectively)
    • Holistic security - Self care  + (Exploring the price activists pay for their work in terms of individual health and happiness, and personal relationships.)
    • Training: Training design II  + (Getting accustomed to adjusting training schedules and workshop styles dependent upon the profile of participants.)
    • Cuidados, Concentración  + (Herramientas para concentrarme, manejar situaciones de crisis / ansiedad / estrés)
    • Mobile Communication  + (How does mobile communication work? Who ha
      How does mobile communication work? Who has access to your information along the way? And what you can do to take back some control over what information others have access to? Understand the basics of mobile technology: how a mobile phone and mobile communications infrastructure work, and what data traces you leave behind. Understand the trade-offs and basic security issues related to Android, iPhone, Windows and Feature phones respectively.
      , Windows and Feature phones respectively.)
    • Threat analysis - Vision and Actor Mapping  + (Identification of the communities and people participants work with and for: allies, who can also protect them. Identification of actors who are opposed participants, their resources, and their modus operandi in opposing them.)
    • Gender Tech Herstory Exhibition  + (Learning about key figures in history from other parts of the world, and sharing those you admire and look up to.)
    • Gender Tech Personal Experiences  + (Learning from the experiences of others in
      Learning from the experiences of others in the room with you, and having an opportunity to share your stories in a safe space with other people. For people present who perhaps haven't had so many experiences in this realm, it presents a good opportunity to listen from those who have had other experiences.
      from those who have had other experiences.)
    • Holistic security - What is Security?  + (Objective: Grounding the notion of security in the day-to-day life and experience of the participants. Participants defining what security means for them. Introducing the idea of holistic security.)
    • Ficción especulativa  + (Producir relatos, ficciones, narrativas e
      Producir relatos, ficciones, narrativas e imaginarios radicales que sirvan como modelos y alternativas a los modelos existentes. Estos nuevos imaginarios pueden orientarse a un tema en concreto (por ejemplo, el derecho a decidir y los imaginarios en torno al aborto); o pueden remitir a la creación de narrativas que permitan imaginar y soñar con posibles futuros relacionados al género y la tecnología desde perspectivas feministas. Como objetivos específicos y puntuales: - Comprender cómo operan y funcionan las narrativas patriarcales (en torno al aborto, a las tecnologías y al mundo en general) para poder deconstruirlas. - Adquirir herramientas para la producción de imaginarios radicales y contra-hegemónicos, comprender el poder del lenguaje como espacio creador de realidad.
      lenguaje como espacio creador de realidad.)
    • Holistic security - A day in your life  + (Recognising the need for security in all areas of our lives – both online and offline – and understanding the different ways in which we deal with security risks.)
    • Mobile Browsing  + (See what gets shared with others through y
      See what gets shared with others through your browser, and how. Then take concrete steps to make your web browsing more private and secure. See how and why your browser might not be as secure as you might think, and where insecurities lie. Understand what 'encryption' means, how the internet works (infrastructure), and how and why online tracking fuels advertising. Know what is meant by 'anonymity' online, and understand the basics of Tor. Be able to make informed decisions about which browsers to use Be able to limit data traces left through the browser Android: Learn how to install and customise Firefox, and install and use Orbot and Orfox iPhone: Learn how to customise Safari to limit tracking.
      how to customise Safari to limit tracking.)
    • Gender Tech Researching VAW  + (Sharing experiences with each other on the topic of documenting and researching violence against women, and having an area to discuss openly any problems participants may have come across in this area)
    • Training: Training design IV  + (Thinking through concrete examples of prioritisation in designing trainings.)
    • Privacy From data shadows to data brokers  + (Thinking through how the data traces we leave are used, and how they fit into business models of the companies who have access to them.)
    • Training: Training Skills I  + (Thinking through what components are needed within a successful training workshop, primarily from the side of the trainer.)
    • Feminist Data Politics: Quantifying Bodies  + (This session falls under the theme 'Femin
      This session falls under the theme 'Feminist Data Politics'. It aims to give participants a background and orientation to how 'big data' is not new, but emerges in the 19th century. In this session participants will explore the data collection by menstruation apps and think critically about what this means for a feminist politics of big data.
      means for a feminist politics of big data.)
    • Gender Tech Co-creating a safe space  + (To come up with a shared list of agreements to be following during the rest of the workshop, in order to create a safe space for all participants.)
    • Training: Training design III  + (To come up with various activities along the ADIDS/experiential learning cycle.)
    • Threat analysis - Digital Security Indicators  + (To define and explore security indicators in their current situation. To know best practices around sharing and analysis of security indicators.)
    • Threat analysis  + (To identify and prioritise what are the potential threats related to their work and their well-being in the context of their activities, and analyses its impact as elements of risk.)
    • DataDetox  + (To introduce participants to the idea of reducing their data traces by working through the Data Detox Kit. the DDK was developed as part of the My Shadow program for use and distribution in the Glass Room)
    • Threat analysis - Introducing context & risk analysis  + (To know existing strategies and tactics for security, protection and well-being. Profound context analysis as key to making informed decisions.)
    • Threat analysis - Security planning  + (To know the essential elements of a security strategy and plan as useful in organising and underpinning our security.)
    • Threat analysis - Situational analysis  + (To learn about current trends in the situa
      To learn about current trends in the situation in which HRD operate, to develop a critical analysis of sources of information and identify strengths & weaknesses of current approach. To analyse the political, economic, social, technological context from a security perspective.
      gical context from a security perspective.)
    • Gender Tech Personal Memories  + (To think about participants own personal relationships with technology, and when gender stereotypes started to play a role.)
    • Threat analysis - Information Mapping II  + (To understand how data travels electronica
      To understand how data travels electronically and the points at which it can be subjected to surveillance, adding important actors including internet service providers, online service providers etc. to the actor maps. To detect basic threats to sensitive information for responses.
      ts to sensitive information for responses.)
    • Threat analysis - Information Mapping I  + (To understand the importance of informatio
      To understand the importance of information as an asset which is valuable to ourselves, our allies and our adversaries and as a resource one can establish reasonable control over. To mapp sensitive information managed in the context of work and its characteristics.
      e context of work and its characteristics.)
    • Security: Password security  + (To understand the need for secure passwords, and to be aware of other people's experiences in this space.)
    • Hands On How the internet works  + (To understand what happens online when we send and receive an email, how many parties are involved, and how this changes with encrypted messages.)
    • Self Care, Concentration  + (Tools to concentrate, handle situations of crisis / anxiety / stress)
    • Hands On Understanding the group – Spectrogram  + (Understand and visualise the variety of opinions and perspectives that are in the room, ideally towards the beginning of the workshop.)
    • Hands On What does your internet look like?  + (Understanding basic fundamentals about how the internet works, and providing a space for participants to ask questions they may have about the 'building blocks' that feature in other hands on sessions.)
    • Threat analysis - Individual responses to threat  + (Understanding stress management as something which helps us better manage our security. Develop physiological responses to threat and tactics for maintaining calm.)