Special

Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Feedbacks" with value "What were the impressions ?". Since there have been only a few results, also nearby values are displayed.

Showing below up to 24 results starting with #1.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)


    

List of results

    • Digital security for the Association of Media Women, Kenya  + (What were the impressions ? The participan
      What were the impressions ? The participants found the sessions useful not only in their professional lives but also in their personal and academic life. The sessions were structured to be as responsive to the developing needs of the participants and there was open interaction towards finding practical solutions even beyond the training days. One participant remarked- " It is like I attended a full course." At the end of the training participants committed to being part of the driving force at the association on matters tech, gender, security and advocacy.
      tters tech, gender, security and advocacy.)
    • FemH3ck - How the internet works for WHRD, Mexico  + (What were the impressions? Time was a bit too short. It was good from what people said to me and in the evaluation, but I could tell that it was hard for some people, like 3 girls that we have in the group, to understand some concepts.)
    • Digital Trainers Summit - Circumvention Tech Festival, Spain  + (You can read in the storytelling section t
      You can read in the storytelling section three testimonials from women that participated to the DTS during the CTFː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Trainer_Summit_1-_Circumvention_Tech_Festival,_Spain https://gendersec.tacticaltech.org/wiki/index.php/Digital_Trainer_Summit_2-_Circumvention_Tech_Festival,_Spain https://gendersec.tacticaltech.org/wiki/index.php/Digital_Trainers_Summit_3_-_Circumvention_Tech_Festival,_Spain
      mit_3_-_Circumvention_Tech_Festival,_Spain)
    • Digital security workshop - Les Degommeuses  + (good)
    • Herramientas comunicacionales para la protección del territorio y naturaleza, Ecuador  + (metodologías usadas en el taller fueron cl
      metodologías usadas en el taller fueron claras y precisas. Nos sugirieron abordar con mayor detenimiento herramientas de autocuidado en el próximo módulo o en algún otro espacio y herramientas de comunicación relacionadas con la seguridad digital y en particular del acceso a telefonía celular segura y autónoma. Al abordar el tema de cómo funciona la telefonía celular e Internet se interesaron en saber más, en dar continuidad a este tipo de aprendizajes.
      r continuidad a este tipo de aprendizajes.)
    • Workshop: Safer Nudes @Montreal, Canada  + (super positive)
    • Seguridad digial para defensores de derechos humanos en contextos mineros  + (the participants commented that the workshop was useful and the methodology was adequate)
    • FemH3ck - Hacking our practices: Gender and Technology, Mexico  + (un 25% respondió que necesitó más información, mientras que para el 75% restante fue sufciente información)
    • Digital security training for political activists, Cuba  + (“la facilitación y organisacion del taller
      “la facilitación y organisacion del taller es muy buena ya que las profesoras era organizadas y daban una dinámica muy positiva” “Muy buena mi impresión, personas fabulosas, en paciencia para ensenar, buena preparación de los contenidos y muy seguros organizándolo” “Pensaba que solo seria sobre la seguridad de nuestros ordenadores y documentos ya que no he tenido mucha interacción en internet” “No creía que fuera mala para nada pero no me imaginaba tampoco que iba a ser tan bueno y provechoso” “nunca pensé que la impresión iba a hacer lo que me llevo. Porque pensé que eran temas de seguridad obsoletos”
      nsé que eran temas de seguridad obsoletos”)