An actor map is a visual depiction of the key organizations and individuals that influence a topic, allowing insight into the players within a system. |
Actor Map | chapter 2 | An actor map is a visual depiction of the key organizations and individuals that influence a topic, allowing insight into the players within a system. | |
Communities are considered to be “at risk” if they face the risk of a variety of human rights abuses from warrantless surveillance, communications & internet shut-downs, targeting, and harassment to more extreme violations like genocide, war crimes, ethnic cleansing and crimes against humanity. |
at-risk communities | introduction | Communities are considered to be “at risk” if they face the risk of a variety of human rights abuses from warrantless surveillance, communications & internet shut-downs, targeting, and harassment to more extreme violations like genocide, war crimes, ethnic cleansing and crimes against humanity. | |
A blockchain is a type of Digital Ledger Technology (DLT) that consists of growing list of records, called blocks, that are securely linked together using cryptography. |
Blockchain | introduction | A blockchain is a type of Digital Ledger Technology (DLT) that consists of growing list of records, called blocks, that are securely linked together using cryptography. | |
Co-design is about challenging the imbalance of power held within groups of individuals, who make important decisions about
others lives, livelihoods and bodies. Often, with little to no involvement of the people who will be most impacted by those decisions. Co-design seeks
to change that through building new relationships, capability and capacity for boundless curiosity. It uses inclusive convening to share knowledge and power. |
Co-design | chapter 4 | Co-design is about challenging the imbalance of power held within groups of individuals, who make important decisions about
others lives, livelihoods and bodies. Often, with little to no involvement of the people who will be most impacted by those decisions. Co-design seeks
to change that through building new relationships, capability and capacity for boundless curiosity. It uses inclusive convening to share knowledge and power. | |
Community Partner | chapter 2 | A community partner is a group that works to advise and support your work by sharing their lived experience. | |
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic warfare. |
Cyber Warfare | introduction | Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic warfare. | |
The decentralized web is an abstract concept sought by several researchers. The idea proposes the reorganization of the Internet in order to remove centralized data hosting services, using instead a peer-to-peer infrastructure. Interest in the decentralized web arose due to the lack of trust in network maintenance organizations, due to scandals involving widespread espionage and content control. |
Decentralized Web | introduction | The decentralized web is an abstract concept sought by several researchers. The idea proposes the reorganization of the Internet in order to remove centralized data hosting services, using instead a peer-to-peer infrastructure. Interest in the decentralized web arose due to the lack of trust in network maintenance organizations, due to scandals involving widespread espionage and content control. | |
a video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information. |
deepfakes | introduction | a video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information. | |
It is the practice of creating and perpetuating inequities between already marginalized groups specifically through the use of digital technologies, digital content, and the internet |
Digital redlining | introduction | It is the practice of creating and perpetuating inequities between already marginalized groups specifically through the use of digital technologies, digital content, and the internet | |
Doxxing is the act of publicly revealing previously private personal information about an individual or organization, usually via the internet. |
Doxxing | chapter 1 | Doxxing is the act of publicly revealing previously private personal information about an individual or organization, usually via the internet. | |
The ecosystem map is a synthetic representation capturing all the key roles that have an influence on the user, organization, and service environment. The ecosystem map is built by first displaying all the entities, and then connecting them based on the type of value they exchange. |
Ecosystem Mapping | chapter 1 | The ecosystem map is a synthetic representation capturing all the key roles that have an influence on the user, organization, and service environment. The ecosystem map is built by first displaying all the entities, and then connecting them based on the type of value they exchange. | |
Understanding the environment your community is affected by and lives in |
Environmental Scan | chapter 1 | Understanding the environment your community is affected by and lives in | |
Ethnographic research is a qualitative method where researchers observe and/or interact with a study’s participants in their real-life environment. |
Ethnographic Research | chapter 2 | Ethnographic research is a qualitative method where researchers observe and/or interact with a study’s participants in their real-life environment. | |
The Global North encompasses the rich and powerful regions such as North America, Europe, and Australia. Developed by Emmanuel Wallerstein to describe a global capitalist system that separates countries into the core (the North), semiperiphery, and periphery (the South) based primarily on their economic participation. |
Global North | chapter 1 | The Global North encompasses the rich and powerful regions such as North America, Europe, and Australia. Developed by Emmanuel Wallerstein to describe a global capitalist system that separates countries into the core (the North), semiperiphery, and periphery (the South) based primarily on their economic participation. | |
The phrase “Global South” refers broadly to the regions of Latin America, Asia, Africa, and Oceania. It is one of a family of terms, including “Third World” and “Periphery,” that denote regions outside Europe and North America, mostly (though not all) low-income and often politically or culturally marginalized. |
Global South | introduction | The phrase “Global South” refers broadly to the regions of Latin America, Asia, Africa, and Oceania. It is one of a family of terms, including “Third World” and “Periphery,” that denote regions outside Europe and North America, mostly (though not all) low-income and often politically or culturally marginalized. | |
human rights centered design Human Rights Centered Design
insists on the same sovereignty and protection for the user of a product. In
essence, this means respecting a user’s privacy and data, thinking about the
digital rights of people across the world (instead of just in our own
backyards), and designing for all. |
human rights centered design | introduction | Human Rights Centered Design
insists on the same sovereignty and protection for the user of a product. In
essence, this means respecting a user’s privacy and data, thinking about the
digital rights of people across the world (instead of just in our own
backyards), and designing for all. | |
Intersectionality is an analytical framework for understanding how aspects of a person's social and political identities combine to create different modes of discrimination and privilege. Intersectional means related to the way in which different types of discrimination (= unfair treatment because of a person's sex, race, etc.) are connected to and affect each other. |
Intersectional | chapter 1 | Intersectionality is an analytical framework for understanding how aspects of a person's social and political identities combine to create different modes of discrimination and privilege. Intersectional means related to the way in which different types of discrimination (= unfair treatment because of a person's sex, race, etc.) are connected to and affect each other. | |
It is the adaptation of a product or service to meet the needs of a particular language, culture or desired population's "look-and-feel." A successfully localized service or product is one that appears to have been developed within the local culture. |
Localizing | chapter 2 | It is the adaptation of a product or service to meet the needs of a particular language, culture or desired population's "look-and-feel." A successfully localized service or product is one that appears to have been developed within the local culture. | |
Marginalized communities are those excluded from mainstream social, economic, educational, and/or cultural life. Examples of marginalized populations include, but are not limited to, groups excluded due to race, gender identity, sexual orientation, age, physical ability, language, and/or immigration status. |
Marginalized Communities | chapter 1 | Marginalized communities are those excluded from mainstream social, economic, educational, and/or cultural life. Examples of marginalized populations include, but are not limited to, groups excluded due to race, gender identity, sexual orientation, age, physical ability, language, and/or immigration status. | |
Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself |
Metadata | chapter 2 | Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself | |
A minimum viable product, or MVP, is a product with enough features to attract early-adopter customers and validate a product idea early in the product development cycle. In industries such as software, the MVP can help the product team receive user feedback as quickly as possible to iterate and improve the product. |
Minimum Viable Product | chapter 9 | A minimum viable product, or MVP, is a product with enough features to attract early-adopter customers and validate a product idea early in the product development cycle. In industries such as software, the MVP can help the product team receive user feedback as quickly as possible to iterate and improve the product. | |
Open source software is software with source code that anyone can inspect, modify, and enhance. |
Open Source | chapter 2 | Open source software is software with source code that anyone can inspect, modify, and enhance. | |
Participatory design (originally co-operative design, now often co-design) is an approach to design attempting to actively involve all stakeholders (e.g. employees, partners, customers, citizens, end users) in the design process to help ensure the result meets their needs and is usable. Participatory design is an approach which is focused on processes and procedures of design and is not a design style. |
Participatory Design | chapter 2 | Participatory design (originally co-operative design, now often co-design) is an approach to design attempting to actively involve all stakeholders (e.g. employees, partners, customers, citizens, end users) in the design process to help ensure the result meets their needs and is usable. Participatory design is an approach which is focused on processes and procedures of design and is not a design style. | |
Participatory Research (PR) is a research-to-action approach that emphasizes direct engagement of local
priorities and perspectives (Cornwall & Jewkes, 1995). PR can be defined
as an umbrella term for research designs, methods, and frameworks that use
systematic inquiry in direct collaboration |
participatory research | chapter 5 | Participatory Research (PR) is a research-to-action approach that emphasizes direct engagement of local
priorities and perspectives (Cornwall & Jewkes, 1995). PR can be defined
as an umbrella term for research designs, methods, and frameworks that use
systematic inquiry in direct collaboration | |
|
Persona | chapter 6 | "User personas are [anonymized] archetypical users whose goals and characteristics represent the needs of a larger group of users." User personas are modeled after a particular person, but also incorporate fictional aspects that you use to create ‘ideal personas’ to compare and contrast with the ‘actual personas’. You will present a persona in a one to two-page document that describes their behavior patterns, goals, skills, attitudes, and background information, as well as the environment in which they operate. | |
A release candidate is like a "sneak preview" of the final release with the added advantage that serious bugs may yet surface and be fixed before the general public uses it. |
Release candidate | chapter 8 | A release candidate is like a "sneak preview" of the final release with the added advantage that serious bugs may yet surface and be fixed before the general public uses it. | |
SEO stands for search engine optimization -- that much has stayed the same. It refers to techniques that help your website rank higher in search engine results pages (SERPs). |
SEO | chapter 7 | SEO stands for search engine optimization -- that much has stayed the same. It refers to techniques that help your website rank higher in search engine results pages (SERPs). | |
Individual or group that has an interest in any decision or activity of an organization. |
Stakeholders | chapter 1 | Individual or group that has an interest in any decision or activity of an organization. | |
Structural violence (harm) is a form of violence wherein some social structure or social institution may harm people by preventing them from meeting their basic needs. |
Structural Harm | chapter 6 | Structural violence (harm) is a form of violence wherein some social structure or social institution may harm people by preventing them from meeting their basic needs. | |
Threat modeling is a structured process with these objectives: identify security requirements, pinpoint security threats and potential vulnerabilities, quantify threat and vulnerability criticality, and prioritize remediation methods. |
Threat-Modelling | chapter 3 | Threat modeling is a structured process with these objectives: identify security requirements, pinpoint security threats and potential vulnerabilities, quantify threat and vulnerability criticality, and prioritize remediation methods. | |
Web3 (also known as Web 3.0) is an idea for a new iteration of the World Wide Web which incorporates concepts such as decentralization, blockchain technologies, and token-based economics. |
Web3 | introduction | Web3 (also known as Web 3.0) is an idea for a new iteration of the World Wide Web which incorporates concepts such as decentralization, blockchain technologies, and token-based economics. | |