Search by property
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Threat analysis - Information Mapping II + (To understand how data travels electronica … To understand how data travels electronically and the points at which it can be subjected to surveillance, adding important actors including internet service providers, online service providers etc. to the actor maps. To detect basic threats to sensitive information for responses.ts to sensitive information for responses.)
- Threat analysis - Information Mapping I + (To understand the importance of informatio … To understand the importance of information as an asset which is valuable to ourselves, our allies and our adversaries and as a resource one can establish reasonable control over. To mapp sensitive information managed in the context of work and its characteristics.e context of work and its characteristics.)
- Security: Password security + (To understand the need for secure passwords, and to be aware of other people's experiences in this space.)
- Hands On How the internet works + (To understand what happens online when we send and receive an email, how many parties are involved, and how this changes with encrypted messages.)
- Self Care, Concentration + (Tools to concentrate, handle situations of crisis / anxiety / stress)
- Hands On Understanding the group – Spectrogram + (Understand and visualise the variety of opinions and perspectives that are in the room, ideally towards the beginning of the workshop.)
- Hands On What does your internet look like? + (Understanding basic fundamentals about how the internet works, and providing a space for participants to ask questions they may have about the 'building blocks' that feature in other hands on sessions.)
- Threat analysis - Individual responses to threat + (Understanding stress management as something which helps us better manage our security. Develop physiological responses to threat and tactics for maintaining calm.)
- Security PGP 101 + (Understanding the basics of PGP and encryption)
- Training: Training design I + (Understanding the cultural and societal context that different participants are coming from, to help participants design the most appropriate and effective training workshop schedule.)
- Gender Tech Online/Offline Cyberfeminism + (Understanding what is the Relationship between Offline and Online from a cyberfeminist perspective; Understanding essential properties of Internet in relation to shaping identity online and displaying subjectivities.)
- Privacy Analogue data shadows + (Visualising offline what we mean by 'data shadows' and thinking through news ways that these could be created in our everyday lives.)