Search by property
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Threat analysis - Digital Security Indicators + (Flipchart)
- Holistic security - What is Security? + (Flipchart and markers)
- Threat analysis - Security planning + (Flipchart or whiteboard)
- Threat analysis + (Flipchart, markers, sticky notes, handouts (optional))
- Threat analysis - Information Mapping I + (Flipchart, sticky notes, pens, markers, comic timing)
- Threat analysis - Individual responses to threat + (Flipchart, whiteboard, papers/drawings (lion, horse, turtle). Hand-outs on Individual Responses to Threat and the Stress Table)
- Holistic security - Communications Security + (Flipchart, whiteboard, postcards/paper, coloured paper, stickers, pens, markers)
- Threat analysis - Information Mapping II + (Flipchart/Whiteboard, markers, envelopes, postcards/small sheets of paper, pens, cipher OR two small boxes with keys)
- Threat analysis - Introducing context & risk analysis + (Flipchart/whiteboard and markers. If desired: coloured rectangles for writing steps)
- Threat analysis - Vision and Actor Mapping + (Hand-out/legend, flipchart paper for each participant OR a large sheet of butcher-block for the entire group, colored stickies or paper, markers.)
- Threat analysis - Situational analysis + (Large area of wall space, colored paper in small squares or ovals, butcher paper, pins or blu-tack or similar)
- Contraseñas seguras + (Ninguna)
- Gender Tech Personal Memories + (None)
- Gender Tech Personal Experiences + (None)
- Gender Tech Herstory Exhibition + (None)