Special

Orphaned pages

The following pages are not linked from or transcluded into other pages in Gender and Tech Resources.

Showing below up to 106 results in range #151 to #256.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. Online Harassment Support Initiatives
  2. Page:Storytelling
  3. Panel, Building feminist infrastructure, IFF, Spain
  4. Panel, Strategizing around online gender-based violence documentation and accompaniment practice, IFF, Spain
  5. Panel, Women Digital Trainers in LAC, IFF, Valencia
  6. Panel Gender and Surveillance, Circumvention Tech Festival, Spain
  7. Panel Including Gender - Re-publica conference, Berlin
  8. Pannel, L'internet critique, entre (des)illusions et spéculations. Marseille, France
  9. Performar en la red
  10. Permacultura digital
  11. Plataforma Ciberseguras, Mexico
  12. Plataformas de citas
  13. Primer Encuentro de Defensa Personal Feminista, Bogota, Colombia
  14. Privacy Analogue data shadows
  15. Privacy From data shadows to data brokers
  16. Privacy Presentation, Cali, Colombia
  17. Programa Luchadoras sobre GTI
  18. Radio, El desarmador, Bolivia
  19. Raperas Feministas LAC
  20. Rastrear IP de sesión (Facebook)
  21. Readings Surveying for collective learnings into ressources
  22. Red pill or blue pill?
  23. Reunión Introductoria a la Protección Integral y Digital para Defensoras del Territorio, Ecuador
  24. SEGUNDO CAMPAMENTO FEMINISTA PARA MUJERES JÓVENES, Oaxaca, Mexico
  25. SandBox
  26. SandBox/fr
  27. Security: Password security
  28. Security PGP 101
  29. Seguridad Digital Para Activistas Coyhaique, Chile
  30. Seguridad digial para defensores de derechos humanos en contextos mineros
  31. Seguridad digial para defensores de derechos humanos en contextos mineros 2
  32. Seguridad digial para defensores de derechos humanos en contextos mineros 3
  33. Seguridad digital en campañas feministas
  34. Seguridad digital para grupos por el derecho a decidir
  35. Seguridad digital para la defensa personal feminista
  36. Self Care, Concentration
  37. Self care, Body
  38. Self care, Emotions
  39. Servers: From autonomous servers to feminist servers
  40. Step 0
  41. Step 3
  42. Stockholm Internet Forum (SIF), Gender equality, Stockholm
  43. TAILS
  44. TTC
  45. Take back the tech
  46. Talk, Training to privacy advocacy and digital security from a gender perspective, IFF, Valencia, Spain
  47. Talk Magic trick: how to make the women disappear, Transmit Festival, Praha
  48. Talk Online Misoginy, Pakistan
  49. Taller, seguridad digital, Panama
  50. Taller, seguridad digital, Peru
  51. Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador
  52. Taller Culture Survival, Cuidados digitales feministas, Guatemala
  53. Taller Seguridad Digital, Feministas, Ecuador
  54. Taller Seguridad Digital, RED de Grupos de Mujeres Rurales, Uruguay
  55. Taller Seguridad Digital, Via Campesina, Durango, Euskal Herria
  56. Taller de Software libre, autodefensa digital y seguridad feminista, Medellín-Colombia
  57. Taller de Telegram y Signal, Colombia
  58. Taller de cartografía y seguridad digital dirigido a mujeres, Oaxaca, Mexico
  59. Taller de seguridad digital feminista, Bolivia
  60. Taller de seguridad para mujeres, Puebla, Mexico
  61. Taller inmersión de autodefensa digital feminista, Barcelona
  62. Taller sobre seguridad física, digital y demás chiches tecno-feministas, Paraguay
  63. Taller taller de redes sociales y seguridad, Colombia
  64. Test Manual
  65. The Atlas of Online Harassment
  66. Threat analysis
  67. Threat analysis - Digital Security Indicators
  68. Threat analysis - Individual responses to threat
  69. Threat analysis - Information Mapping I
  70. Threat analysis - Information Mapping II
  71. Threat analysis - Introducing context & risk analysis
  72. Threat analysis - Security planning
  73. Threat analysis - Situational analysis
  74. Threat analysis - Vision and Actor Mapping
  75. Threat modeling the quick and dirty way
  76. Threats and solutions
  77. Timeline of an anonymous journey
  78. Training: Training Skills I
  79. Training: Training design I
  80. Training: Training design II
  81. Training: Training design III
  82. Training: Training design IV
  83. Training about gender, privacy and security for WHRD, Nicaragua
  84. TransHackFeminist Convergence 2, Mexico
  85. Uncluttering
  86. Usos creativos feministas de las redes sociales
  87. Webinar
  88. Webinar, HerNetHerRights, online conference
  89. Webinar, Seguridad servidores y elección de plataformas alojamiento web
  90. Webinar, Sexualidad, Derechos Reproductivos y Violencia en línea, Brasil
  91. Webinario, Estudio Cuerpos de Mujeres, Mexico
  92. What you need to know before using this manual
  93. Womanity award, Oui Share Festival, Paris, France
  94. Women's Safety Apps
  95. Women activists from the Balkans, Macedonia
  96. Workshop, Architectures of online harassment, Berlin
  97. Workshop, Imagine, Create, Be. Gender and Technologies, IFF, Spain
  98. Workshop, Manuals with a gender perspective, IFF, Valencia
  99. Workshop, Other than women: Exploring harassment and difference online, Rightscon, Belgium
  100. Workshop, Regional networks for tackling gender-based online violence, IFF, Valencia
  101. Workshop: Health, sexuality, algorithms and data
  102. Workshop: Safer Nudes @Montreal, Canada
  103. Workshop Digital security, Tech sans Violence, RDC
  104. Workshop Feminists, Madrid, Spain
  105. ¿Cómo funciona la telefonía móvil y de que manera mitigar el rastreo de datos? (1ra parte)
  106. ¿Mascaras para nuestras identidades conectadas?

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)