Special

Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Motivations for organizing training" with value "Vivimos en un mundo en constante cambio, cada vez más acelerados, y las". Since there have been only a few results, also nearby values are displayed.

Showing below up to 8 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

  • Training about gender, privacy and security for WHRD, Nicaragua  + (This training was oriented at a variety of
    This training was oriented at a variety of woman human rights defenders and activists located in Managua. Before that event, the regional start up meeting was organised gathering 12 women representative of different organisations from LAC in order to prepare the Gender and Technology Institute to be held in Ecuador some months later. The regional start up meeting aims were to design the facilitation methodologies, curricula and sessions design, agenda and how to ensure the safety of participants through the process. The follow up training held in Managua enabled us to test some experimental sessions we have designed in the previous meeting and gather feed back from the women engaged in the training. It enable also a part of the facilitation team to meet and train together their training skills.
    and train together their training skills.)
  • Seguridad digial para defensores de derechos humanos en contextos mineros 3  + (This training was realized within the cont
    This training was realized within the context of a program which contained a training aimed at strengthening "digital communication and social networks". The organization that facilitated the participation was Cooperacción, an NGO that develops two progamms: the program for collective rights and extractive industries and the program for costal development.
    es and the program for costal development.)
  • Holistic Security, Train Of Trainers, Germany  + (This was the key event for the part of the
    This was the key event for the part of the holistic security project which is focuesd on fostering best practices and community-building among security trainers. The objectives of the TOAST were as follows: * Identify and build the cross-domain knowledge necessary to improve trainers' own security and well-being in the course of their work * Learn, co-create and practice new exercises, and approaches for trainers from each domain to integrate in their trainings * Identify avenues of collaboration with participants from different domains * In the context of Tactical Tech's ongoing work (with partner organisations) on holistic security resources for human rights defenders and trainers, to explore and ideally agree upon a common framework and language for security, protection and well-being of HRDs across domains. * Contribute to the fortification of a collaborative cross-domain network of trainers
    aborative cross-domain network of trainers)
  • Stockholm Internet Forum (SIF), Gender equality, Stockholm  + (This years SIF theme is access seen from a
    This years SIF theme is access seen from a multi-dimensional approach. The aspects of access will be covered through discussions of issues related to economy, technology, policy and human rights – with a special emphasis on gender equality. Access to the internet plays an important role in the economic, social, cultural and political development of societies and nations. There are still huge differences – both in terms of access and usage – between those who have, and those who do not have access to the internet, between countries and regions, between rich and poor, and between men and women. But access is often not what it seems, and simply having access to the internet does not necessarily achieve social justice and development outcomes. To help us understand access from a multi-dimensional perspective SIF15 will use gender as a lens that can enable us to see beneath the surface. What does access to the internet mean? Who has access to the internet? Who has the ability to assimilate the information available online? These are some areas which will be discussed during SIF15
    areas which will be discussed during SIF15)
  • Digital security meetup for women human rights defenders, Kenya  + (To create a collective of digital security in Kenya with a focus on women.)
  • One-to-one DigiSec trainings for activists, Argentina  + (To explain the motives for using opensourc
    To explain the motives for using opensource software To help understand local and international policy around surveillance To conduct a personal risk assessment To get people using some of the digital security and activist tools which are most ueful to them
    ctivist tools which are most ueful to them)
  • Femhack- Encryption and digital security workshop for cis, trans and queer women, Bangalore  + (To have a safe and closed space for women
    To have a safe and closed space for women to discuss and address insecurities around computers and technology, being able to share useful secure communication practices and tools to organize around LGBTQ issues and use these tools strategically. Also to recognize that engagement with technology is political feminist issue and to gauge interest and capacity for events like this.
    nterest and capacity for events like this.)
  • Editatona Mujeres Nicas  + (Una editatona es un espacio, para mujeres,
    Una editatona es un espacio, para mujeres, de edición y creación de artículos de Wikipedia sobre una temática relacionada a la vivencia de las mujeres en nuestros propios contextos. ¿Por qué Wikipedia? Porque es una fuente de conocimiento construida de manera voluntaria y colectiva, que sirve de referencia para millones de personas alrededor del mundo. En 2012 se conoció que de cada 10 editores de Wikipedia, sólo 1 era mujer: desde entonces se han creado diversas iniciativas para cerrar la brecha de género promoviendo el involucramiento de las mujeres, la creación de artículos sobre mujeres y la revisión de artículos ya existentes que puedan estar escritos desde una perspectiva machista. La Editatona Mujeres Nicas en Managua es parte de ese esfuerzo mundial; y tiene como objetivo incluir en Wikipedia las biografías de mujeres destacadas en la historia de Nicaragua: artistas, científicas, médicas, activistas, docentes, guerrilleras y todas las mujeres cuyas historias sólo se conocen en pequeños círculos académicos.
    e conocen en pequeños círculos académicos.)
 (Vivimos en un mundo en constante cambio, cada vez más acelerados, y las)
  • Screenings HackiNetIk, Mexico  + (Vivimos en un mundo en constante cambio, c
    Vivimos en un mundo en constante cambio, cada vez más acelerados, y las nuevas tecnologías de la comunicación y las redes digitales están planteando nuevos paradigmas, tanto de opresión como de liberación. ¿Cómo estamos reaccionando ante estas nuevas situaciones? ¿Qué peligros y oportunidades aparecen?
    s? ¿Qué peligros y oportunidades aparecen?)
  • FemH3ck - How the internet works for WHRD, Mexico  + (We believe that before telling this women
    We believe that before telling this women participating in the project, about how great is the Internet, we needed to share with them more information related to how it works. So we started the introductory session on digital security with the exercise how the internet works, we talked about the stages or places where our information travels when sharing it through the Internet. One of the things I have learned about basic digital security with WHRD, is that we don't always know where the risks are, but sometimes we hear somthing about a certain tool and we quickly download it but we don't always use the tool in the right way. So this session always helps to get a general picture and also it helps to solve a lot of questions from different tools and different risks. We have now a couple of materials for the session, we also have the flyer on how the internet works: https://www.dropbox.com/sh/q8o7041fi8ac6mz/AAAUn56sjbpWa3krLldVPRnea?dl=0 A serie of cards like ISP, router, platforms that help in the facilitation of the dinamic. Also we printed some materials to share with them on this same topic, this are also available in the dropbox link. The printed material had some other great resources to check.
    l had some other great resources to check.)
  • Panel, Strategizing around online gender-based violence documentation and accompaniment practice, IFF, Spain  + (We had a session of 2 hours with several p
    We had a session of 2 hours with several practitioners carrying out documentation and accompaniment for online gender based violence. We came together to discuss different challenges being faced when providing emotional and technical support, categorization and analysis of cases, assignation-projection of impact or harm, secure data practices, helpline possibilities and limitations, doing and sharing research and learnings. The session had around 35 attendees coming from a wide range of initiatives and countries. After presenting the different experiences developed by organisations involved in the organisation of the session we had an exchange with the different participants in the room.
    th the different participants in the room.)
  • Workshop, Imagine, Create, Be. Gender and Technologies, IFF, Spain  + (What are the side effects of funding? How
    What are the side effects of funding? How can we avoid divisions and foster collaboration? - Why are identity politics not enough? How can we include that which excludes us? - How might we maximize efforts, ressources and ideas from past and present experiences? - How can we acknowldege precariousness and overcome technology overload? - How can the analogue -digital integration be turned into a mandate and a provocation?
    e turned into a mandate and a provocation?)
  • Digital security for the Association of Media Women, Kenya  + (When the femh3ck flash training in Nairobi
    When the femh3ck flash training in Nairobi came to an end, one of the participants who was from AMWIK approached Mary Kiio of Roshani Consultancy Services and requested if the company would consider training their members as the issues highlighted were very pertinent to what women go through in the country. The potential of media being more informed on cyber threats especially women would hopefully translate to various media platforms being utilized to reach more women across the country A few days later an email from the secretariat of AMWIK inquiring on if we could share on the outcomes of the femh3ck training and a request on if we can engage in other similar activities and/or platforms, lead to the discussion of holding a three day training for its members over the month of August on Saturdays for three consecutive weekends. Though both companies did not have any funding for the training , there was an agreement that Roshani Consultancy Services would avail facilitators who would be willing to share information with no pay.AMWIK on the other hand committed to identify participants who are willing to attend training with the aim of being the future trainers. AMWIK also provided office space, Internet connection, workshop materials and snacks. It was the willing participants who shared their training needs via a pre training questionnaire that resonated with the theme of the training that provided the highest motivation of the training.
    ed the highest motivation of the training.)
  • Digital security training for women activists from the Balkans, Macedonia  + (Women Human Rights Defenders and LGTBQ act
    Women Human Rights Defenders and LGTBQ activists from the balkans (albania, armenia, bosnia, croatia, serbia, georgia, macedonia) with low levels of knowledge regarding privacy and digital security. Almost all of them used Windows, had a smartphone and used facebook for work and activism. Most of them managed sensitive data involving third parties information. The background of the participants was different, they were coming from different countries from the Balkans and the Caucasus region, dealing with different issues but what they all had in common, was that they are WHRD, they all used facebook, managed sensitive data and 17 of them were using Windows. One was only using MAC after switching from Linux. The group had already built wonderful dynamic in their work as before the DST they have spent some days on workshop about integrated security. They already knew each other, some even from before.
    dy knew each other, some even from before.)
  • Plataforma Ciberseguras, Mexico  + (¿Qué es Ciberseguras? Ciberseguras es un
    ¿Qué es Ciberseguras? Ciberseguras es un espacio que reúne muchos recursos y herramientas para que aprendamos más sobre Internet y seguridad digital. Buscamos compartir reflexiones sobre cómo la tecnología nos transforma, nos atraviesa y nos ofrece posibilidades y experiencias nuevas. Este espacio surge a partir de la idea de que el mundo digital y el mundo análogo no son esferas totalmente separadas, pues detrás de todo perfil, plataforma o red social existen personas concretas, en situaciones concretas. Queremos aportar información que ayuden a que todas podamos disfrutar libremente y de forma segura nuestras actividades, luchas y pasatiempos en línea, porque sabemos que somos nosotras quienes tenemos el control de la tecnología, quienes decidimos si nos sirve o si queremos cambiarla. Internet es un espacio que habitamos, compartimos y construimos juntas. ¡Bienvenidas a Ciberseguras!
    imos juntas. ¡Bienvenidas a Ciberseguras!)
  • Criptofiesta: ¡aprende a cifrar tus correos!  + (¿Sabías que nuestros correos electrónicos
    ¿Sabías que nuestros correos electrónicos están expuestos? “¿Por qué me vigilarían a mí?”, te preguntarás. Pues por muchas razones: porque nuestros datos son moneda de cambio y generan riqueza, porque los Estados están sedientos de controlar todo, porque las recolección, almacenamiento y procesamiento masivo de datos son la base del mundo que nos propone Sillicon Valley. Pero la buena noticia es tenemos derecho a que nuestras comunicaciones sean privadas y tenemos a mano las herramientas para garantizarlo. Así que una de las maneras de proteger nuestra privacidad y reducir nuestra sombra digital es cifrando nuestros correos. ¿Cifrando? ¡Tal vez te suena más la palabra encriptar! Pues eso, echar mano de las matemáticas para convertir nuestros mensajes en códigos ilegibles que sólo nosotras podamos leer. Queremos juntarnos, divertirnos y aprender a cifrar nuestros correos electrónicos de manera sencilla. ¿Te vienes a esta cryptofiesta?
    sencilla. ¿Te vienes a esta cryptofiesta?)