Search by property
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Contraseñas seguras + (Ninguno)
- Seguridad digital en campañas feministas + (Ninguno)
- Install party software libre vs códigos de género + (No hay, el ejercicio se plantea como una forma de ampliar la comprensión del software libre. Esta actividad es buena para que el grupo se conozca más y mejor.)
- Install party free software vs gender codes + (No prerequisite, the exercise is structured as a way to increase understanding of free software. This activity is good for a new group to get to know each other.)
- Ficción especulativa + (No se necesita ningún conocimiento o experiencia previa y se recomienda a las participantes venir con ganas de experimentar.)
- Móvil 1: Funccionamiento + (No se necesita ningún conocimiento o experiencia previa y se recomienda a las personas participantes tener a la mano sus teléfonos móviles)
- Gender Tech Personal Memories + (None)
- Threat analysis - Situational analysis + (None)
- Gender Tech Co-creating a safe space + (None)
- Threat analysis - Individual responses to threat + (None)
- Holistic security - Collective Memory + (None)
- Hands On How the internet works + (Open space to move around. Facilitators should have a good understanding of how the internet works, and a reasonably high level of technical understanding.)
- Holistic security - A day in your life + (Paper and pens for all participants. Ideally, facilitators should have taken part in this exercise before, but it's not necessary.)
- Training: Training design IV + (Participants should have (recently) carried out Training Skills II: session design, and be with the same group of people that they also worked with for that session.)
- Training: Training design III + (Participants should have carried out Training Design sessions I and II prior to this session. Facilitators should be familiar with ADIDS/experiential learning cycles.)
- Gender Tech Privilege in Tech + (Space to walk up and down – ideally steps, but a room with a 'baseline' marked, and space to walk forwards and backwards, would also work. NB: not accessibility friendly, as participants need to walk forwards and backwards.)
- Privacy From data shadows to data brokers + (The group should already have carried out … The group should already have carried out 'Analogue data shadows' session, and facilitators should have a good understanding of how the 'data industry' works, and be able to advise the groups and answer questions they might have on how their data is used by different service providers. Facilitators should prepare beforehand 2 sets of small slips of paper: firstly, ones with different digital behaviours or actions on them, to distribute one per participant during the exercise. Samples of 'digital behaviours' could include: You just downloaded the Spotify playlist “girls just wanna have fun” You booked flights to Honolulu You Skyped with your best friend for 2 hours You downloaded Snapchat You lost your iPhone, and used the “Find my iPhone” app to find it You used wifi in an airport, and gave your email address and personal details in order to get access. Secondly: digital behaviours that people can do to others, such as: You just invited everyone in your group to Google plus You sent everyone your geocoordinates to meet up for a party later You just signed up for an app that needs access to all of your contacts Make sure there is at least one 'digital action', and one digital behaviour that people do to others, per participant.that people do to others, per participant.)
- Holistic Security - Demonstrating the interconnectedness + (The session plan constitutes a scene setter/grounding exercise at the beginning of a training (possibly followed by collecting expectations, making agreements etc.))
- Holistic security - Communications Security + (This session can be an introduction to several topics with some minor modifications on the content and focus, as for example mobile security or how the internet and mobiles work.)
- Threat analysis - Information Mapping I + (This session preceed session of Information Mapping II.)