Special

Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of values that have the property "Prerequisites" assigned.

Showing below up to 41 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

  • - Presentation of history/background to wh
    - Presentation of history/background to what we mean by 'quantification' in the context of big data - Menstruation apps: Select from the list here: http://arrow.org.my/wp-content/uploads/2016/08/AFC22.1-2016.pdf pages 16-21 . We used Clue, Glow, and Kindara, - Develop a list of questions you want the group to explore (listed in the next section on methodology)
    listed in the next section on methodology)  +
  • - Smart phones running Android and an Inte
    - Smart phones running Android and an Internet connection. - Pre-printed pages of the applications from the Play Store. - The apps we most often use are VithU, Himmat, Nirbhaya: Be Fearless, Raksha, Eyewatch Women, My Safetipin, Damini and Pari - selected for the range of actors involved in their creation, and for the range of issues that emerge. You can find more apps used in India in this database, developed for our research. - Pre-printed set of guiding questions on (i) Features (ii) Data policies - Pen, paper
    Features (ii) Data policies - Pen, paper  +
  • A comfortable space for participants. 1/2 sheet of flipchart and markers for each participant Flipchart and markers for facilitator  +
  • A line on the floor marking 'the middle' of the room – so people know which side to stand to show their opinions. For the facilitator: none specifically  +
  • A majority of the group need to be either
    A majority of the group need to be either women/from marginalised communities within technology, for this activity to work best. Encourage others to spend time listening – passive participation is just as important as active. The exercise is ideally carried out when participants have already got to know each other a little, rather than as a first exercise.
    a little, rather than as a first exercise.  +
  • An analysis of the prioritised threats participants face while carrying out their work.  +
  • Ask participants to bring with them the na
    Ask participants to bring with them the name, or a printed out photo of a woman in technology who they feel was influential in their cultures or countries. This doesn't necessarily have to be anyone particularly well-renowned, or directly as a coder, but simply someone who they admire, for whatever role they may have played.
    e, for whatever role they may have played.  +
  • Better to do it after actor mapping session.  +
  • Big sheets of paper (at least 1 per participant) – coloured pens. Facilitators should have a good understanding of how the internet works, and a reasonably high level of technical understanding.  +
  • Conocimiento sobre creación de contenidos digitales.  +
  • Data Detox Kit projected/ downloaded / printed.  +
  • Facilitators should be able to install, us
    Facilitators should be able to install, use and explain password management software like LastPass or Keepass, and to be able to explain and answer questions about passwords. Facilitators also need to come up with a few key statements and questions for the 'secure password race', as described below.
    secure password race', as described below.  +
  • Facilitators should be experienced in desi
    Facilitators should be experienced in designing and carrying out trainings. Prepare beforehand a participant profile – ideally one that either the facilitators are familiar with – with lots of details about what the person likes, and their background, both professional and personal.
    ackground, both professional and personal.  +
  • Facilitators should be experienced researchers in the area of violence against women, and be able to share strategies and tips, in case other participants have not had as much experience.  +
  • Facilitators should have a good understanding of 'data traces' online and offline, and the impact that these could have on our lives.  +
  • Facilitators should have a good understanding of what PGP is, be able to answer questions on how it works, and be able to help people downloading and using software to encrypt their emails.  +
  • Facilitators should have a solid understanding of training techniques, and ideally have facilitated training workshops before.  +
  • Facilitators should have some experience of talking through psychological issues with others.  +
  • Have been able to read some selected extracts, or all the articles/books used for guiding the conversation.  +
  • Ideally some notions of political, economic, social, technological situation  +
  • Ideally, facilitators should be experienced trainers (in whatever field) – or have had significant experience working with/around trainers and in workshop settings.  +
  • Ideally, output from Situational Analysis
    Ideally, output from Situational Analysis exercise. A safe and trusting environment must be created wherein people are not blamed for things they are perceived to have not done correctly or not been aware of. If necessary, you can introduce tools for non-violent communication in order to facilitate sharing of security indicators.
    facilitate sharing of security indicators.  +
  • Ideally, the facilitator should have taken part in this exercise at least once, to have an idea of what is expected. Prepare a whole set of material : colored pencils, cardboards, etc.. to offer to each group if they need it.  +
  • It is best if this activity follows a thorough context analysis.  +
  • Las personas participantes deben tener a la mano sus teléfonos móviles para poner en práctica las actividades  +
  • N/A  +
  • Ninguno  +
  • No hay, el ejercicio se plantea como una forma de ampliar la comprensión del software libre. Esta actividad es buena para que el grupo se conozca más y mejor.  +
  • No prerequisite, the exercise is structured as a way to increase understanding of free software. This activity is good for a new group to get to know each other.  +
  • No se necesita ningún conocimiento o experiencia previa y se recomienda a las participantes venir con ganas de experimentar.  +
  • No se necesita ningún conocimiento o experiencia previa y se recomienda a las personas participantes tener a la mano sus teléfonos móviles  +
  • None  +
  • Open space to move around. Facilitators should have a good understanding of how the internet works, and a reasonably high level of technical understanding.  +
  • Paper and pens for all participants. Ideally, facilitators should have taken part in this exercise before, but it's not necessary.  +
  • Participants should have (recently) carried out Training Skills II: session design, and be with the same group of people that they also worked with for that session.  +
  • Participants should have carried out Training Design sessions I and II prior to this session. Facilitators should be familiar with ADIDS/experiential learning cycles.  +
  • Space to walk up and down – ideally steps, but a room with a 'baseline' marked, and space to walk forwards and backwards, would also work. NB: not accessibility friendly, as participants need to walk forwards and backwards.  +
  • The group should already have carried out
    The group should already have carried out 'Analogue data shadows' session, and facilitators should have a good understanding of how the 'data industry' works, and be able to advise the groups and answer questions they might have on how their data is used by different service providers. Facilitators should prepare beforehand 2 sets of small slips of paper: firstly, ones with different digital behaviours or actions on them, to distribute one per participant during the exercise. Samples of 'digital behaviours' could include: You just downloaded the Spotify playlist “girls just wanna have fun” You booked flights to Honolulu You Skyped with your best friend for 2 hours You downloaded Snapchat You lost your iPhone, and used the “Find my iPhone” app to find it You used wifi in an airport, and gave your email address and personal details in order to get access. Secondly: digital behaviours that people can do to others, such as: You just invited everyone in your group to Google plus You sent everyone your geocoordinates to meet up for a party later You just signed up for an app that needs access to all of your contacts Make sure there is at least one 'digital action', and one digital behaviour that people do to others, per participant.
    that people do to others, per participant.  +
  • The session plan constitutes a scene setter/grounding exercise at the beginning of a training (possibly followed by collecting expectations, making agreements etc.)  +
  • This session can be an introduction to several topics with some minor modifications on the content and focus, as for example mobile security or how the internet and mobiles work.  +
  • This session preceed session of Information Mapping II.  +