Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

198 total results found

How the internet works: The basics [Starter Activity]

Feminist Principles of the Internet

This starter activity is aimed towards getting the participants to understand the basic concept...

FTX Safety Reboot Convening 2018 Draft Agenda

Home Resources to prepare your training sess...

Overall design and activities Goals of the convening Bring together feminist practitioners an...

Case study - Threats & Mitigation

Risk Assessment Risk assessment basics [Foundational Ma...

Case study: Deya To illustrate this, let’s use the fictional but fairly common experience of Dey...

Introduction

Risk Assessment Risk assessment basics [Foundational Ma...

We assess our risk all the time. This is how we survive. It is a process that is not unique to di...

Layers of risk (3) & Conclusion

Risk Assessment Risk Assessment in Movement Organising ...

3. Data/information Data and information are being produced and generated all the time while org...

Layers of risk (1) & (2)

Risk Assessment Risk Assessment in Movement Organising ...

1. Relationships/protocols At the heart of strong movements are strong relationships which are b...

Overview

Risk Assessment Risk Assessment in Movement Organising ...

When thinking about risk assessment at the level of movement organising, it means expanding the s...

Visualising where we work in, who we work with and who we are as trainers

Home Resources to prepare your training sess...

Activity 1: Here, we ask the participants to draw one our two typical folks that they work with ...

Resources | Links | Further Reading

Online Gender-Based Violence

What is technology related VAW? Forms of Online GBV Good questions on technology-related vi...

Our feminist principles of participation

Home Resources to prepare your training sess...

This document has been developed by WRP APC as a guide for ourselves and partners hosting learnin...

Social movements: What’s in a tool? What’s in a space? [Deepening Activity]

Feminist Principles of the Internet

Note: This is from the Movement Building module that the APC WRP developed. Activity 1: What's...

Feminist Practices and Politics of Technology

Home Resources to prepare your training sess...

FPT embodies both a critical perspective and analysis of technology. It poses questions and defin...

Evaluate your training: Training Evaluation Tools

Home Resources to prepare your training sess...

Why evaluate? To do it better next time. To design follow-up support for participants around ...

Re-thinking Risk and the five layers of risk [Deepening Activity]

Risk Assessment

At the moment, what we have is a some ideas about how to re-think risk. This has not been conve...

Daily Pie Chart and Risk [Starter Activity]

Risk Assessment

The purpose of this activity is to get the participants to assess what their daily or weekly ta...

Assessing Communication Practices [Starter Activity]

Risk Assessment

This activity is designed to enable the participants to look at their communication practices (...

Introduction to risk assessment [Starter Activity]

Risk Assessment

  This activity is designed to introduce and exercise a framework for doing risk assessment. ...

Learning Objectives & Learning Activities

Risk Assessment

This page will guide you through the Module's correct use and understanding. Following the Learni...

FPI presentation + discussion [Deepening Activity]

Feminist Principles of the Internet

This section is under construction. Here is a FPIs presentation that you can use : FPIs and 5 ...

Reminders

Risk Assessment Risk assessment basics [Foundational Ma...

Remember... Risk assessments are time-bound. They happen within a specific time period – usually...