Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Feedbacks" with value "We need to do more events like that.". Since there have been only a few results, also nearby values are displayed.

Showing below up to 11 results starting with #1.

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)


List of results

  • Gender and Technology Institute, Berlin  + (Read Impact study hereː https://gendersec.tacticaltech.org/wiki/images/d/da/GTI_ImpactStudy.pdf)
  • Digital security for Women, Bosnia  + (Review of participants evaluation showed that all participants felt this training had empowered them and enable them to better understand links between gender, feminism, tech related violence, privacy and digital security.)
  • FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, La Plata, Argentina  + (Specific feedback: - Need for ongoing tra
    Specific feedback: - Need for ongoing training good digital security tools when "on the run" (mobiles), need to create spaces to "slow down and learn" outside of urgent organisational moments. - Not just technological knowledge is needed, also strategies and tactics in relation to informational security, and managing networks which are distributed physically with a great variety in levels of understanding and access to technology. - Need for restructuring of approach to ITC in relation to media's violent culture towards women and girls. Mothers we work with worried about daughters uploading pictures to Facebook in case something happens to them. A whole new approach needed in relation to the way we think about networks, how women and girls use technology, spaces which allow us to have empowering new approaches to technology at all income levels. - Spaces where we learn without "experts" are great! So much unlearning to do. General feedback: - Where does the anxiety around technolgy come from? How do we overcome it?
    echnolgy come from? How do we overcome it?)
  • Taller de Software libre, autodefensa digital y seguridad feminista, Medellín-Colombia  + (Sólo evaluamos un día y el feedback fue muy bueno)
  • Capacitación en seguridad digital, La Paz, Bolivia  + (Tanto las reacciones como los comentarios
    Tanto las reacciones como los comentarios al finalizar la actividad fueron positivos. Las dudas principales se dieron en torno al uso del correo electrónico y a la seguridad en redes sociales. Los asistentes quedaron asombrados cuando se develaron las cuestiones digitales de la que se sirven corporación y gobernantes.
    a que se sirven corporación y gobernantes.)
  • Holistic digital security training for women journalists, Mexico  + (The generation of safe spaces where people can discuss their feelings allows for better learning the tools)
  • Workshop, Regional networks for tackling gender-based online violence, IFF, Valencia  + (This topic is worth investigating, participants felt inspired for addressing more indepth dimensions detailed in their case study in their own work)
  • AWID, Mediactivismo, nuevas narrativas feministas, Brasil  + (Tuvimos una buena devolución del taller, principalmente porque la población que participó no era sólo de ALC, por lo que muchas campañas y/o acciones que se mostraron no habían sido vistas anteriormente lo que permitió que se conocieran y difundieran.)
  • FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Argentina  + (Very specific feedback and needs for futur
    Very specific feedback and needs for future meetings: - Need for tools to perform secure erase of data. - Need to construct open access libraries outside of existing structures which have limited access for many communities, especially those outside traditional institutional spaces. - The need to use search engines which do not 'profile' users or perform censorship in order to reach wider info. Different experiences of information available when using TOR. -The interest on knowing how to create different identities online (the way on how to separate them and not giving up our real identity) -Interest on feminist libraries online with bibliography on the main subjects of interests. -Getting to know alternatives of Free Software of main applicatives used on the computer General feedback: - What happens in open spaces vs closed spaces? Do women and LGTBQIA folk need their own spaces and their own approaches to technology and learning?
    own approaches to technology and learning?)
  • Gender and Technology Institute, Panama  + (We found that the event enabled many parti
    We found that the event enabled many participants to finally meet face to face and to create new forms of trust and exchange that can only be achieved in offline meetings. Many of them also underlined that even if they knew the name of the other collectives and they followed their activities or campaigns on the internet, the institute became a space that provided them with the opportunity to better understand how they worked and navigate in their specific contexts in order to provide information, counsel and/or accompaniment to the women they are supporting. In other words the Institute was felt as a safe space for sharing about their security and mitigation strategies and many participants felt they could never share those in an online environment. All together they felt the training not only provided them with important new skills and knowledge regarding their presence online but also strengthen their knowledge, networks and future actions regarding pro-choice activism on the field. Finally, participants also felt that the Institute was different because it focused on the security as a multilayer of processes and practices taking place inside their networks of solidarity and support, rather than providing a top down approach that focuses primarily on privacy and digital security tools. In that sense, it was also felt important that facilitators underlined the existing links between the holistic and integrated security approach to the different methodologies and practices developed within feminists and gender social justice movements, showing the continuum existing between online and offline approaches to security. All together, it provided participants with a sense of enjoying a strong framework (theoretical and practical) that make easier to link all those dimensions together and include more privacy and digital security into their lives and work.
    igital security into their lives and work.)