Special

Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Motivations for organizing training" with value "When the femh3ck flash training in Nairobi came to an end, one of the pa". Since there have been only a few results, also nearby values are displayed.

Showing below up to 3 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

  • Panel, Strategizing around online gender-based violence documentation and accompaniment practice, IFF, Spain  + (We had a session of 2 hours with several p
    We had a session of 2 hours with several practitioners carrying out documentation and accompaniment for online gender based violence. We came together to discuss different challenges being faced when providing emotional and technical support, categorization and analysis of cases, assignation-projection of impact or harm, secure data practices, helpline possibilities and limitations, doing and sharing research and learnings. The session had around 35 attendees coming from a wide range of initiatives and countries. After presenting the different experiences developed by organisations involved in the organisation of the session we had an exchange with the different participants in the room.
    th the different participants in the room.)
  • Workshop, Imagine, Create, Be. Gender and Technologies, IFF, Spain  + (What are the side effects of funding? How
    What are the side effects of funding? How can we avoid divisions and foster collaboration? - Why are identity politics not enough? How can we include that which excludes us? - How might we maximize efforts, ressources and ideas from past and present experiences? - How can we acknowldege precariousness and overcome technology overload? - How can the analogue -digital integration be turned into a mandate and a provocation?
    e turned into a mandate and a provocation?)
  • Digital security for the Association of Media Women, Kenya  + (When the femh3ck flash training in Nairobi
    When the femh3ck flash training in Nairobi came to an end, one of the participants who was from AMWIK approached Mary Kiio of Roshani Consultancy Services and requested if the company would consider training their members as the issues highlighted were very pertinent to what women go through in the country. The potential of media being more informed on cyber threats especially women would hopefully translate to various media platforms being utilized to reach more women across the country A few days later an email from the secretariat of AMWIK inquiring on if we could share on the outcomes of the femh3ck training and a request on if we can engage in other similar activities and/or platforms, lead to the discussion of holding a three day training for its members over the month of August on Saturdays for three consecutive weekends. Though both companies did not have any funding for the training , there was an agreement that Roshani Consultancy Services would avail facilitators who would be willing to share information with no pay.AMWIK on the other hand committed to identify participants who are willing to attend training with the aim of being the future trainers. AMWIK also provided office space, Internet connection, workshop materials and snacks. It was the willing participants who shared their training needs via a pre training questionnaire that resonated with the theme of the training that provided the highest motivation of the training.
    ed the highest motivation of the training.)
 (When the femh3ck flash training in Nairobi came to an end, one of the pa)
  • Digital security training for women activists from the Balkans, Macedonia  + (Women Human Rights Defenders and LGTBQ act
    Women Human Rights Defenders and LGTBQ activists from the balkans (albania, armenia, bosnia, croatia, serbia, georgia, macedonia) with low levels of knowledge regarding privacy and digital security. Almost all of them used Windows, had a smartphone and used facebook for work and activism. Most of them managed sensitive data involving third parties information. The background of the participants was different, they were coming from different countries from the Balkans and the Caucasus region, dealing with different issues but what they all had in common, was that they are WHRD, they all used facebook, managed sensitive data and 17 of them were using Windows. One was only using MAC after switching from Linux. The group had already built wonderful dynamic in their work as before the DST they have spent some days on workshop about integrated security. They already knew each other, some even from before.
    dy knew each other, some even from before.)
  • Plataforma Ciberseguras, Mexico  + (¿Qué es Ciberseguras? Ciberseguras es un
    ¿Qué es Ciberseguras? Ciberseguras es un espacio que reúne muchos recursos y herramientas para que aprendamos más sobre Internet y seguridad digital. Buscamos compartir reflexiones sobre cómo la tecnología nos transforma, nos atraviesa y nos ofrece posibilidades y experiencias nuevas. Este espacio surge a partir de la idea de que el mundo digital y el mundo análogo no son esferas totalmente separadas, pues detrás de todo perfil, plataforma o red social existen personas concretas, en situaciones concretas. Queremos aportar información que ayuden a que todas podamos disfrutar libremente y de forma segura nuestras actividades, luchas y pasatiempos en línea, porque sabemos que somos nosotras quienes tenemos el control de la tecnología, quienes decidimos si nos sirve o si queremos cambiarla. Internet es un espacio que habitamos, compartimos y construimos juntas. ¡Bienvenidas a Ciberseguras!
    imos juntas. ¡Bienvenidas a Ciberseguras!)
  • Criptofiesta: ¡aprende a cifrar tus correos!  + (¿Sabías que nuestros correos electrónicos
    ¿Sabías que nuestros correos electrónicos están expuestos? “¿Por qué me vigilarían a mí?”, te preguntarás. Pues por muchas razones: porque nuestros datos son moneda de cambio y generan riqueza, porque los Estados están sedientos de controlar todo, porque las recolección, almacenamiento y procesamiento masivo de datos son la base del mundo que nos propone Sillicon Valley. Pero la buena noticia es tenemos derecho a que nuestras comunicaciones sean privadas y tenemos a mano las herramientas para garantizarlo. Así que una de las maneras de proteger nuestra privacidad y reducir nuestra sombra digital es cifrando nuestros correos. ¿Cifrando? ¡Tal vez te suena más la palabra encriptar! Pues eso, echar mano de las matemáticas para convertir nuestros mensajes en códigos ilegibles que sólo nosotras podamos leer. Queremos juntarnos, divertirnos y aprender a cifrar nuestros correos electrónicos de manera sencilla. ¿Te vienes a esta cryptofiesta?
    sencilla. ¿Te vienes a esta cryptofiesta?)