Search by property
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Ficción especulativa + (Producir relatos, ficciones, narrativas e … Producir relatos, ficciones, narrativas e imaginarios radicales que sirvan como modelos y alternativas a los modelos existentes. Estos nuevos imaginarios pueden orientarse a un tema en concreto (por ejemplo, el derecho a decidir y los imaginarios en torno al aborto); o pueden remitir a la creación de narrativas que permitan imaginar y soñar con posibles futuros relacionados al género y la tecnología desde perspectivas feministas. Como objetivos específicos y puntuales: - Comprender cómo operan y funcionan las narrativas patriarcales (en torno al aborto, a las tecnologías y al mundo en general) para poder deconstruirlas. - Adquirir herramientas para la producción de imaginarios radicales y contra-hegemónicos, comprender el poder del lenguaje como espacio creador de realidad.lenguaje como espacio creador de realidad.)
- Holistic security - A day in your life + (Recognising the need for security in all areas of our lives – both online and offline – and understanding the different ways in which we deal with security risks.)
- Mobile Browsing + (See what gets shared with others through y … See what gets shared with others through your browser, and how. Then take concrete steps to make your web browsing more private and secure. See how and why your browser might not be as secure as you might think, and where insecurities lie. Understand what 'encryption' means, how the internet works (infrastructure), and how and why online tracking fuels advertising. Know what is meant by 'anonymity' online, and understand the basics of Tor. Be able to make informed decisions about which browsers to use Be able to limit data traces left through the browser Android: Learn how to install and customise Firefox, and install and use Orbot and Orfox iPhone: Learn how to customise Safari to limit tracking.how to customise Safari to limit tracking.)
- Gender Tech Researching VAW + (Sharing experiences with each other on the topic of documenting and researching violence against women, and having an area to discuss openly any problems participants may have come across in this area)
- Training: Training design IV + (Thinking through concrete examples of prioritisation in designing trainings.)
- Privacy From data shadows to data brokers + (Thinking through how the data traces we leave are used, and how they fit into business models of the companies who have access to them.)
- Training: Training Skills I + (Thinking through what components are needed within a successful training workshop, primarily from the side of the trainer.)
- Feminist Data Politics: Quantifying Bodies + (This session falls under the theme 'Femin … This session falls under the theme 'Feminist Data Politics'. It aims to give participants a background and orientation to how 'big data' is not new, but emerges in the 19th century. In this session participants will explore the data collection by menstruation apps and think critically about what this means for a feminist politics of big data.means for a feminist politics of big data.)
- Gender Tech Co-creating a safe space + (To come up with a shared list of agreements to be following during the rest of the workshop, in order to create a safe space for all participants.)
- Training: Training design III + (To come up with various activities along the ADIDS/experiential learning cycle.)
- Threat analysis - Digital Security Indicators + (To define and explore security indicators in their current situation. To know best practices around sharing and analysis of security indicators.)
- Threat analysis + (To identify and prioritise what are the potential threats related to their work and their well-being in the context of their activities, and analyses its impact as elements of risk.)
- DataDetox + (To introduce participants to the idea of reducing their data traces by working through the Data Detox Kit. the DDK was developed as part of the My Shadow program for use and distribution in the Glass Room)
- Threat analysis - Introducing context & risk analysis + (To know existing strategies and tactics for security, protection and well-being. Profound context analysis as key to making informed decisions.)
- Threat analysis - Security planning + (To know the essential elements of a security strategy and plan as useful in organising and underpinning our security.)
- Threat analysis - Situational analysis + (To learn about current trends in the situa … To learn about current trends in the situation in which HRD operate, to develop a critical analysis of sources of information and identify strengths & weaknesses of current approach. To analyse the political, economic, social, technological context from a security perspective.gical context from a security perspective.)
- Gender Tech Personal Memories + (To think about participants own personal relationships with technology, and when gender stereotypes started to play a role.)
- Threat analysis - Information Mapping II + (To understand how data travels electronica … To understand how data travels electronically and the points at which it can be subjected to surveillance, adding important actors including internet service providers, online service providers etc. to the actor maps. To detect basic threats to sensitive information for responses.ts to sensitive information for responses.)
- Threat analysis - Information Mapping I + (To understand the importance of informatio … To understand the importance of information as an asset which is valuable to ourselves, our allies and our adversaries and as a resource one can establish reasonable control over. To mapp sensitive information managed in the context of work and its characteristics.e context of work and its characteristics.)
- Security: Password security + (To understand the need for secure passwords, and to be aware of other people's experiences in this space.)
- Hands On How the internet works + (To understand what happens online when we send and receive an email, how many parties are involved, and how this changes with encrypted messages.)
- Self Care, Concentration + (Tools to concentrate, handle situations of crisis / anxiety / stress)
- Hands On Understanding the group – Spectrogram + (Understand and visualise the variety of opinions and perspectives that are in the room, ideally towards the beginning of the workshop.)
- Hands On What does your internet look like? + (Understanding basic fundamentals about how the internet works, and providing a space for participants to ask questions they may have about the 'building blocks' that feature in other hands on sessions.)
- Threat analysis - Individual responses to threat + (Understanding stress management as something which helps us better manage our security. Develop physiological responses to threat and tactics for maintaining calm.)