Property

Prerequisites

From Gender and Tech Resources

This is a property of type Text.

Pages using the property "Prerequisites"

Showing 21 pages using this property.

(previous 25) (next 25)

M

Móvil 2: Complementos +Las personas participantes deben tener a la mano sus teléfonos móviles para poner en práctica las actividades  +

P

Privacy Analogue data shadows +Facilitators should have a good understanding of 'data traces' online and offline, and the impact that these could have on our lives.  +
Privacy From data shadows to data brokers +The group should already have carried out 'Analogue data shadows' session, and facilitators should have a good understanding of how the 'data industry' works, and be able to advise the groups and answer questions they might have on how their data is used by different service providers. Facilitators should prepare beforehand 2 sets of small slips of paper: firstly, ones with different digital behaviours or actions on them, to distribute one per participant during the exercise. Samples of 'digital behaviours' could include: You just downloaded the Spotify playlist “girls just wanna have fun” You booked flights to Honolulu You Skyped with your best friend for 2 hours You downloaded Snapchat You lost your iPhone, and used the “Find my iPhone” app to find it You used wifi in an airport, and gave your email address and personal details in order to get access. Secondly: digital behaviours that people can do to others, such as: You just invited everyone in your group to Google plus You sent everyone your geocoordinates to meet up for a party later You just signed up for an app that needs access to all of your contacts Make sure there is at least one 'digital action', and one digital behaviour that people do to others, per participant.  +

S

Security PGP 101 +Facilitators should have a good understanding of what PGP is, be able to answer questions on how it works, and be able to help people downloading and using software to encrypt their emails.  +
Security: Password security +Facilitators should be able to install, use and explain password management software like LastPass or Keepass, and to be able to explain and answer questions about passwords. Facilitators also need to come up with a few key statements and questions for the 'secure password race', as described below.  +
Seguridad digital en campañas feministas +Ninguno  +

T

Threat analysis +It is best if this activity follows a thorough context analysis.  +
Threat analysis - Digital Security Indicators +Ideally, output from Situational Analysis exercise. A safe and trusting environment must be created wherein people are not blamed for things they are perceived to have not done correctly or not been aware of. If necessary, you can introduce tools for non-violent communication in order to facilitate sharing of security indicators.  +
Threat analysis - Individual responses to threat +None  +
Threat analysis - Information Mapping I +This session preceed session of Information Mapping II.  +
Threat analysis - Information Mapping II +Better to do it after actor mapping session.  +
Threat analysis - Introducing context & risk analysis +N/A  +
Threat analysis - Security planning +An analysis of the prioritised threats participants face while carrying out their work.  +
Threat analysis - Situational analysis +None  +
Threat analysis - Vision and Actor Mapping +Ideally some notions of political, economic, social, technological situation  +
Training: Training Skills I +Ideally, facilitators should be experienced trainers (in whatever field) – or have had significant experience working with/around trainers and in workshop settings.  +
Training: Training design I +Facilitators should have a solid understanding of training techniques, and ideally have facilitated training workshops before.  +
Training: Training design II +Facilitators should be experienced in designing and carrying out trainings. Prepare beforehand a participant profile – ideally one that either the facilitators are familiar with – with lots of details about what the person likes, and their background, both professional and personal.  +
Training: Training design III +Participants should have carried out Training Design sessions I and II prior to this session. Facilitators should be familiar with ADIDS/experiential learning cycles.  +
Training: Training design IV +Participants should have (recently) carried out Training Skills II: session design, and be with the same group of people that they also worked with for that session.  +

W

Women's Safety Apps +- Smart phones running Android and an Internet connection. - Pre-printed pages of the applications from the Play Store. - The apps we most often use are VithU, Himmat, Nirbhaya: Be Fearless, Raksha, Eyewatch Women, My Safetipin, Damini and Pari - selected for the range of actors involved in their creation, and for the range of issues that emerge. You can find more apps used in India in this database, developed for our research. - Pre-printed set of guiding questions on (i) Features (ii) Data policies - Pen, paper  +
(previous 25) (next 25)