Special

Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of values that have the property "Learning objectives" assigned.

Showing below up to 50 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

  • - Aumentar la comprensión filosófica y pol
    - Aumentar la comprensión filosófica y política del software libre - Comprender y pensar en los paralelos posibles entre software libre y feminismo/políticas radicales de género - Aprender y compartir conceptos en torno al género - Conocerse dentro de un grupo - Crear un sistema P2P vivo
    o de un grupo - Crear un sistema P2P vivo  +
  • - Comprender la importancia de la navegaci
    - Comprender la importancia de la navegación segura desde el teléfono móvil - Aprender a navegar de forma segura desde el teléfono móvil - Conocer los complementos que sirven para asegurar la navegación desde el teléfono móvil - Identificar los criterios que se deben tomar en cuenta al momento de elegir un teléfono móvil y los servicios para asegurar la privacidad
    los servicios para asegurar la privacidad  +
  • - Increase the philosophical and political
    - Increase the philosophical and political understanding of free software - Understand and think about the possible parallels between free software and feminism / radical gender policies - Learning and sharing concepts around gender - Meet within a group - Create a live P2P system
    within a group - Create a live P2P system  +
  • - Invitar a las personas participantes a h
    - Invitar a las personas participantes a hablar y pensar en la tecnología móvil (también conocida como telefonía celular) como un conjunto de componentes familiares, con el objetivo de desmitificar la tecnología. - Comprender como funciona la infraestructura de telefonía móvil - Explicar las diferentes capas de privacidad y seguridad digital que tiene un teléfono móvil - Identificar las diferencias entre el sistema Android, iPhone, Windows (para teléfonos), y los teléfonos más sencillos (2G).
    onos), y los teléfonos más sencillos (2G).  +
  • - To be able to critically assess whether
    - To be able to critically assess whether applications meant to enhance women’s safety are useful, and identify shortcomings and challenges. - To learn to identify the different fields of information that are available about apps in the Play Store and on developers’ website, and to develop a sense of what those fields might indicate. - To be able to evaluate applications on their privacy policies, and develop a sense of what fields would will be empowering to a user
    fields would will be empowering to a user  +
  • - Understand the significance of collective memory and the steps that can be taken to secure it. - Provide means to think about security from a holistic perspective, both personally and within a movement.  +
  • Be able to identify various elements (digi
    Be able to identify various elements (digital, physical, psychosocial) and their interconnectedness in a practical scenario on security management. Active recognition of the subjectivity and emotional dimensions of security; awareness and inclination to act on security and taking it seriously.
    o act on security and taking it seriously.  +
  • Conectar con el cuerpo y destensar tensiones físicas acumuladas en estos días  +
  • Connect with the body and release accumulated physical stress  +
  • Consejos sencillos para crear contraseñas seguras de manera análoga.  +
  • Constructing a group narrative around security and self care, to encourage participants to think about what collectives or organisations can do in the area of security.  +
  • Contribuir a la comprensión del funcionamiento de las motores de búsqueda comerciales, para optimizar el alcance de nuestros contenidos de defensa de los derechos humanos en Internet.  +
  • Create understanding on how communications work and it's inherent insecurities in a non technical way. Provide a framework for approaching digital security and communications in general.  +
  • Demonstrating physically differences in privileges with regards to technology, and thinking through how these affect access to, and presence in, the tech community  +
  • Descargar emociones acumuladas durante el día y adquirir herramientas para poder trabajar emociones (en particular ansiedad) tanto a nivel personal como colectivo  +
  • Dialogar la seguridad digital como parte d
    Dialogar la seguridad digital como parte de la defensa personal feminista. 1) Juego de presentación yo me nombro con un movimiento 2) Qué herramientas usamos para nuestras acciones (trabajo en grupos) 3) Vulnerabilidades de nuestras acciones usando tecnología (input de la facilitadora) 4) Cómo introducimos la seguridad digital dentro de la defensa personal feminista
    al dentro de la defensa personal feminista  +
  • Download emotions accumulated during the day and acquire tools to work emotions (in particular anxiety) both personally and collectively  +
  • Exploring the price activists pay for their work in terms of individual health and happiness, and personal relationships.  +
  • Getting accustomed to adjusting training schedules and workshop styles dependent upon the profile of participants.  +
  • Herramientas para concentrarme, manejar situaciones de crisis / ansiedad / estrés  +
  • How does mobile communication work? Who ha
    How does mobile communication work? Who has access to your information along the way? And what you can do to take back some control over what information others have access to? Understand the basics of mobile technology: how a mobile phone and mobile communications infrastructure work, and what data traces you leave behind. Understand the trade-offs and basic security issues related to Android, iPhone, Windows and Feature phones respectively.
    , Windows and Feature phones respectively.  +
  • Identification of the communities and people participants work with and for: allies, who can also protect them. Identification of actors who are opposed participants, their resources, and their modus operandi in opposing them.  +
  • Learning about key figures in history from other parts of the world, and sharing those you admire and look up to.  +
  • Learning from the experiences of others in
    Learning from the experiences of others in the room with you, and having an opportunity to share your stories in a safe space with other people. For people present who perhaps haven't had so many experiences in this realm, it presents a good opportunity to listen from those who have had other experiences.
    from those who have had other experiences.  +
  • Objective: Grounding the notion of security in the day-to-day life and experience of the participants. Participants defining what security means for them. Introducing the idea of holistic security.  +
  • Producir relatos, ficciones, narrativas e
    Producir relatos, ficciones, narrativas e imaginarios radicales que sirvan como modelos y alternativas a los modelos existentes. Estos nuevos imaginarios pueden orientarse a un tema en concreto (por ejemplo, el derecho a decidir y los imaginarios en torno al aborto); o pueden remitir a la creación de narrativas que permitan imaginar y soñar con posibles futuros relacionados al género y la tecnología desde perspectivas feministas. Como objetivos específicos y puntuales: - Comprender cómo operan y funcionan las narrativas patriarcales (en torno al aborto, a las tecnologías y al mundo en general) para poder deconstruirlas. - Adquirir herramientas para la producción de imaginarios radicales y contra-hegemónicos, comprender el poder del lenguaje como espacio creador de realidad.
    lenguaje como espacio creador de realidad.  +
  • Recognising the need for security in all areas of our lives – both online and offline – and understanding the different ways in which we deal with security risks.  +
  • See what gets shared with others through y
    See what gets shared with others through your browser, and how. Then take concrete steps to make your web browsing more private and secure. See how and why your browser might not be as secure as you might think, and where insecurities lie. Understand what 'encryption' means, how the internet works (infrastructure), and how and why online tracking fuels advertising. Know what is meant by 'anonymity' online, and understand the basics of Tor. Be able to make informed decisions about which browsers to use Be able to limit data traces left through the browser Android: Learn how to install and customise Firefox, and install and use Orbot and Orfox iPhone: Learn how to customise Safari to limit tracking.
    how to customise Safari to limit tracking.  +
  • Sharing experiences with each other on the topic of documenting and researching violence against women, and having an area to discuss openly any problems participants may have come across in this area  +
  • Thinking through concrete examples of prioritisation in designing trainings.  +
  • Thinking through how the data traces we leave are used, and how they fit into business models of the companies who have access to them.  +
  • Thinking through what components are needed within a successful training workshop, primarily from the side of the trainer.  +
  • This session falls under the theme 'Femin
    This session falls under the theme 'Feminist Data Politics'. It aims to give participants a background and orientation to how 'big data' is not new, but emerges in the 19th century. In this session participants will explore the data collection by menstruation apps and think critically about what this means for a feminist politics of big data.
    means for a feminist politics of big data.  +
  • To come up with a shared list of agreements to be following during the rest of the workshop, in order to create a safe space for all participants.  +
  • To come up with various activities along the ADIDS/experiential learning cycle.  +
  • To define and explore security indicators in their current situation. To know best practices around sharing and analysis of security indicators.  +
  • To identify and prioritise what are the potential threats related to their work and their well-being in the context of their activities, and analyses its impact as elements of risk.  +
  • To introduce participants to the idea of reducing their data traces by working through the Data Detox Kit. the DDK was developed as part of the My Shadow program for use and distribution in the Glass Room  +
  • To know existing strategies and tactics for security, protection and well-being. Profound context analysis as key to making informed decisions.  +
  • To know the essential elements of a security strategy and plan as useful in organising and underpinning our security.  +
  • To learn about current trends in the situa
    To learn about current trends in the situation in which HRD operate, to develop a critical analysis of sources of information and identify strengths & weaknesses of current approach. To analyse the political, economic, social, technological context from a security perspective.
    gical context from a security perspective.  +
  • To think about participants own personal relationships with technology, and when gender stereotypes started to play a role.  +
  • To understand how data travels electronica
    To understand how data travels electronically and the points at which it can be subjected to surveillance, adding important actors including internet service providers, online service providers etc. to the actor maps. To detect basic threats to sensitive information for responses.
    ts to sensitive information for responses.  +
  • To understand the importance of informatio
    To understand the importance of information as an asset which is valuable to ourselves, our allies and our adversaries and as a resource one can establish reasonable control over. To mapp sensitive information managed in the context of work and its characteristics.
    e context of work and its characteristics.  +
  • To understand the need for secure passwords, and to be aware of other people's experiences in this space.  +
  • To understand what happens online when we send and receive an email, how many parties are involved, and how this changes with encrypted messages.  +
  • Tools to concentrate, handle situations of crisis / anxiety / stress  +
  • Understand and visualise the variety of opinions and perspectives that are in the room, ideally towards the beginning of the workshop.  +
  • Understanding basic fundamentals about how the internet works, and providing a space for participants to ask questions they may have about the 'building blocks' that feature in other hands on sessions.  +
  • Understanding stress management as something which helps us better manage our security. Develop physiological responses to threat and tactics for maintaining calm.  +