Search by property
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Gender Tech Personal Experiences + (Personal experiences in technology)
 - Gender Tech Personal Memories + (Personal memories of technology)
 - Gender Tech Herstory Exhibition + (Photo Exhibition: Herstory)
 - Holistic security - Collective Memory + (Protecting memory, protecting ourselves: collective memory as a Gateway to understand holistic security)
 
- Feminist Data Politics: Quantifying Bodies + (Quantifying Bodies: From Sara Baartman to Menstruation Apps)
 
- Threat analysis - Digital Security Indicators + (Security Indicators: sharing and analysis)
 - Threat analysis - Security planning + (Security Planning essentials)
 - Móvil 1: Funccionamiento + (Seguridad Digital. Móvil 1: ¿Cómo funciona la telefonía móvil y cómo podemos configurar el teléfono móvil para incrementar nuestra protección?)
 - Móvil 2: Complementos + (Seguridad Digital. Móvil 2: Navegadores, Complementos y Mensajería Segura)
 - Seguridad digital en campañas feministas + (Seguridad digital para la defensa personal feminista)
 - Self Care, Concentration + (Self Care, Concentration)
 - Holistic security - Self care + (Self care and holistic security)
 - Self care, Body + (Self care, Body)
 - Self care, Emotions + (Self care, Emotions)
 - Threat analysis - Situational analysis + (Situational analysis)
 - DataDetox + (The Data Detox Challenge)
 - Gender Tech Privilege in Tech + (Thinking through privilege in tech)
 - Threat analysis + (Threat analysis)
 - Training: Training design I + (Training design I: Understanding participants)
 - Training: Training design II + (Training design II: planning sessions)
 - Training: Training design III + (Training design III: training structure)
 - Training: Training design IV + (Training design IV: priorities)
 - Training: Training Skills I + (Training skills I)
 - Hands On Understanding the group – Spectrogram + (Understanding the group – Spectrogram)
 - Threat analysis - Vision and Actor Mapping + (Vision and Actor Mapping)
 - Hands On What does your internet look like? + (What does your internet look like?)
 - Women's Safety Apps + (Women’s safety apps)