Search by property
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Violencias Conectadas, Nicaragua + (Violencias conectadas tuvo tres momentosː
… Violencias conectadas tuvo tres momentosː 1.- Recopilación de los testimonios Se realizó una convocatoria entre nuestras aliadas y mujeres que le dan seguimiento a nuestras redes; para que nos compartieran sus historias de ciberviolencia machista. Partimos del reconocimiento a la denuncia como una estrategia poderosa y sabemos que muchas veces el mismo sistema patriarcal nos impide denunciar, a riesgo de exponernos a más violencia. Quisimos servir como una plataforma para la denuncia anónima: porque nos parece importante visibilizar que estas expresiones SON violencia e identificar cuáles son sus características en el contexto nacional, protegiendo la integridad de quienes nos compartan sus testimonios. 2.- Exposición Violencias Conectadas Realizamos el montaje de una exposición física de los 16 testimonios de violencia digital por razones de género en un bar café de Managua. La exposición además hacía un llamado a las mujeres que la visitaban a dejar sus comentarios e historias de manera anónima en pequeños post-it. Adicionalmente se plasmaron los testimonios en manteles individuales; que fueron distribuidos en establecimientos aliados en Managua y Jinotepe. 3.- Campaña digital Violencia Conectadas Se publicaron los 16 testimonios durante los 16 Días de Activismo contra la Violencia hacia la Mujer.ivismo contra la Violencia hacia la Mujer.)
- Digital security workshop for environmental activists, Brasil + (We did an activity that was about mapping … We did an activity that was about mapping information and locating where those documents and files where being kept. Then experiencing the possibility of losing those devices and reflecting about the importance of designing a strategy to keep digital files secure.g a strategy to keep digital files secure.)
- Workshop, Architectures of online harassment, Berlin + (We gave each group a different use case- o … We gave each group a different use case- one group was to work on campaign harassment, meaning harassment from many sources. The other group dealt with more interpersonal, and one-on-one harassment. We did not give the groups explicit details of the cases they were to work on. We wanted to see how they developed the storyline and responded to prompts. This is a significant feature of a design thinking when it is used to learn about problems: to not be prescriptive or specific, but to allow for ambiguity in constructing what the problem is. Unlike campaigning and advocacy that script specific stories for the purpose of amplification, or a call to action, this approach attempts to leave received notions of an issue to one side. We imagined this exercise as a sort of projective technique, knowing that everyone in the room had a fair degree of familiarity with the topic. Working in small groups, participants were given choices of storylines to develop. One group was asked to develop a scenario of either two exes having a political disagreement online, or of a fight between two classmates that evolves into a bullying situation. The other group was asked to develop a story of an activist who faced harassment online, or of a journalist being attacked from readers for a story she had written. In response, the first group told the story of an anti-police brutality group that was attacked online for posting a report it had released. The second group constructed the story of two friends using Snapchat and where a personal interaction escalated into anger and bullying.raction escalated into anger and bullying.)
- Holistic Security, Train Of Trainers, Germany + (participative 'unconferencing' format. sub-facilitation.)
- F3mhack - Hacktona Feminista, Sao Paulo, Brasil + (presentation and talking role play to explain how internet works live demonstrations with Trackography graphic facilitation with drawing and discussion about women/ digital security and tech video registration of feminist's testimony)
- Editatona Mujeres Nicas + (̟Ejercicio - Presentación ¿Cuál fue tu pri … ̟Ejercicio - Presentación ¿Cuál fue tu primera experiencia en Wikipedia? ̟Video- Cinco pilares de Wikipedia ̟Presentación.- Básicos de Wikipedia Técnicas de investigación en Internet- Fuentes confiables - Wikimedia Ejemplo.- Biografía Dalila Rugama ̟Manos a la obra.- Accediendo a nuestros perfiles. Crear p̪áginas de perfil. Páginas de discusión. ̟¿Cómo se crea un nuevo conenido nuevo?. ̟¿Cómo se crea un nuevo conenido nuevo?)