Translations

Difference between revisions of "Complete manual/9/en"

From Gender and Tech Resources

(Created page with "La primera parte del manual analiza los rastros de información (a menudo invisibles) que se crean y se registran cuando usamos internet, servicios en línea, y otros disposit...")
 
(Importing a new version from external source)
 
Line 1: Line 1:
La primera parte del manual analiza los rastros de información (a menudo invisibles) que se crean y se registran cuando usamos internet, servicios en línea, y otros dispositivos digitales. Ofrece estrategias y herramientas libres diversas para recuperar el control de estos rastros digitales. Describe en que consisten esos rastros, cómo se crean, y que se puede "saber" gracias a ellos. Tomados en su conjunto, estos rastros digitales pueden formar contornos bastante nítidos de quienes somos, que hacemos, lo que nos gusta, y cómo actuamos.
+
The first part of the manual looks at the (often unseen) information traces that are created and recorded as we use the Internet, online services, and digital devices. It offers various strategies and tools available for reclaiming control of these digital traces. It describes what these traces are, how they are created, and who can 'see' them. All together, these individual digital traces  form clearer outlines of who we are, what we do, what we like, and how we act. We call these aggregations of digital traces 'digital shadows,' and we'll discuss why these matter and how you can minimise them. Minimization of our 'digital shadows' online involves powerful, creative, and fun tactics of managing different types of new online identities. We cover the various options and ways to manage online identities, as well as the risks and benefits of each, and discuss the definitions and utility of '''anonymity''', '''pseudonyms''', '''collective names''' and '''real names'''.
 
+
Llamamos a estas agregaciones de rastros digitales "sombras digitales," y vamos a discutir por qué importan y cómo podemos minimizarlas. La contención de nuestras “sombras digitales" implica tácticas poderosas, creativas y divertidas para la gestión de diferentes tipos de identidades en línea. Vamos a presentar distintas formas y opciones para gestionar estas identidades en línea, así como analizaremos que riesgos y beneficios puede presentar el uso de identidades 'anónimas' '' '' ', seudónimas' '' '' ', nombres colectivos '' 'y' '' nombres reales '' '.
+

Latest revision as of 11:02, 26 October 2018

Information about message (contribute)
This message has no documentation. If you know where or how this message is used, you can help other translators by adding documentation to this message.
Message definition (Complete manual)
The first part of the manual looks at the (often unseen) information traces that are created and recorded as we use the Internet, online services, and digital devices. It offers various strategies and tools available for reclaiming control of these digital traces. It describes what these traces are, how they are created, and who can 'see' them. All together, these individual digital traces  form clearer outlines of who we are, what we do, what we like, and how we act. We call these aggregations of digital traces 'digital shadows,' and we'll discuss why these matter and how you can minimise them. Minimization of our 'digital shadows' online involves powerful, creative, and fun tactics of managing different types of new online identities. We cover the various options and ways to manage online identities, as well as the risks and benefits of each, and discuss the definitions and utility of '''anonymity''', '''pseudonyms''', '''collective names''' and '''real names'''.
TranslationThe first part of the manual looks at the (often unseen) information traces that are created and recorded as we use the Internet, online services, and digital devices. It offers various strategies and tools available for reclaiming control of these digital traces. It describes what these traces are, how they are created, and who can 'see' them. All together, these individual digital traces  form clearer outlines of who we are, what we do, what we like, and how we act. We call these aggregations of digital traces 'digital shadows,' and we'll discuss why these matter and how you can minimise them. Minimization of our 'digital shadows' online involves powerful, creative, and fun tactics of managing different types of new online identities. We cover the various options and ways to manage online identities, as well as the risks and benefits of each, and discuss the definitions and utility of '''anonymity''', '''pseudonyms''', '''collective names''' and '''real names'''.

The first part of the manual looks at the (often unseen) information traces that are created and recorded as we use the Internet, online services, and digital devices. It offers various strategies and tools available for reclaiming control of these digital traces. It describes what these traces are, how they are created, and who can 'see' them. All together, these individual digital traces form clearer outlines of who we are, what we do, what we like, and how we act. We call these aggregations of digital traces 'digital shadows,' and we'll discuss why these matter and how you can minimise them. Minimization of our 'digital shadows' online involves powerful, creative, and fun tactics of managing different types of new online identities. We cover the various options and ways to manage online identities, as well as the risks and benefits of each, and discuss the definitions and utility of anonymity, pseudonyms, collective names and real names.