Glossary

TermChapterDefinitionSource
deepfakes
introduction
a video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
deepfakes
introduction
a video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
Digital redlining
introduction
It is the practice of creating and perpetuating inequities between already marginalized groups specifically through the use of digital technologies, digital content, and the internet
Digital redlining
introduction
It is the practice of creating and perpetuating inequities between already marginalized groups specifically through the use of digital technologies, digital content, and the internet
human rights centered design
introduction
Human Rights Centered Design insists on the same sovereignty and protection for the user of a product. In essence, this means respecting a user’s privacy and data, thinking about the digital rights of people across the world (instead of just in our own backyards), and designing for all.
human rights centered design
introduction
Human Rights Centered Design insists on the same sovereignty and protection for the user of a product. In essence, this means respecting a user’s privacy and data, thinking about the digital rights of people across the world (instead of just in our own backyards), and designing for all.
Global South
introduction
The phrase “Global South” refers broadly to the regions of Latin America, Asia, Africa, and Oceania. It is one of a family of terms, including “Third World” and “Periphery,” that denote regions outside Europe and North America, mostly (though not all) low-income and often politically or culturally marginalized.
Global South
introduction
The phrase “Global South” refers broadly to the regions of Latin America, Asia, Africa, and Oceania. It is one of a family of terms, including “Third World” and “Periphery,” that denote regions outside Europe and North America, mostly (though not all) low-income and often politically or culturally marginalized.
at-risk communities
introduction
Communities are considered to be “at risk” if they face the risk of a variety of human rights abuses from warrantless surveillance, communications & internet shut-downs, targeting, and harassment to more extreme violations like genocide, war crimes, ethnic cleansing and crimes against humanity.
at-risk communities
introduction
Communities are considered to be “at risk” if they face the risk of a variety of human rights abuses from warrantless surveillance, communications & internet shut-downs, targeting, and harassment to more extreme violations like genocide, war crimes, ethnic cleansing and crimes against humanity.
Cyber Warfare
introduction
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic warfare.
Cyber Warfare
introduction
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic warfare.
Decentralized Web
introduction
The decentralized web is an abstract concept sought by several researchers. The idea proposes the reorganization of the Internet in order to remove centralized data hosting services, using instead a peer-to-peer infrastructure. Interest in the decentralized web arose due to the lack of trust in network maintenance organizations, due to scandals involving widespread espionage and content control.
Decentralized Web
introduction
The decentralized web is an abstract concept sought by several researchers. The idea proposes the reorganization of the Internet in order to remove centralized data hosting services, using instead a peer-to-peer infrastructure. Interest in the decentralized web arose due to the lack of trust in network maintenance organizations, due to scandals involving widespread espionage and content control.
Web3
introduction
Web3 (also known as Web 3.0) is an idea for a new iteration of the World Wide Web which incorporates concepts such as decentralization, blockchain technologies, and token-based economics.
Web3
introduction
Web3 (also known as Web 3.0) is an idea for a new iteration of the World Wide Web which incorporates concepts such as decentralization, blockchain technologies, and token-based economics.
Blockchain
introduction
A blockchain is a type of Digital Ledger Technology (DLT) that consists of growing list of records, called blocks, that are securely linked together using cryptography.
Blockchain
introduction
A blockchain is a type of Digital Ledger Technology (DLT) that consists of growing list of records, called blocks, that are securely linked together using cryptography.
Doxxing
chapter 1
Doxxing is the act of publicly revealing previously private personal information about an individual or organization, usually via the internet.
Doxxing
chapter 1
Doxxing is the act of publicly revealing previously private personal information about an individual or organization, usually via the internet.
Ecosystem Mapping
chapter 1
The ecosystem map is a synthetic representation capturing all the key roles that have an influence on the user, organization, and service environment. The ecosystem map is built by first displaying all the entities, and then connecting them based on the type of value they exchange.
Ecosystem Mapping
chapter 1
The ecosystem map is a synthetic representation capturing all the key roles that have an influence on the user, organization, and service environment. The ecosystem map is built by first displaying all the entities, and then connecting them based on the type of value they exchange.
Environmental Scan
chapter 1
Understanding the environment your community is affected by and lives in
Environmental Scan
chapter 1
Understanding the environment your community is affected by and lives in
Global North
chapter 1
The Global North encompasses the rich and powerful regions such as North America, Europe, and Australia. Developed by Emmanuel Wallerstein to describe a global capitalist system that separates countries into the core (the North), semiperiphery, and periphery (the South) based primarily on their economic participation.
Global North
chapter 1
The Global North encompasses the rich and powerful regions such as North America, Europe, and Australia. Developed by Emmanuel Wallerstein to describe a global capitalist system that separates countries into the core (the North), semiperiphery, and periphery (the South) based primarily on their economic participation.
Intersectional
chapter 1
Intersectionality is an analytical framework for understanding how aspects of a person's social and political identities combine to create different modes of discrimination and privilege. Intersectional means related to the way in which different types of discrimination (= unfair treatment because of a person's sex, race, etc.) are connected to and affect each other.
Intersectional
chapter 1
Intersectionality is an analytical framework for understanding how aspects of a person's social and political identities combine to create different modes of discrimination and privilege. Intersectional means related to the way in which different types of discrimination (= unfair treatment because of a person's sex, race, etc.) are connected to and affect each other.
Marginalized Communities
chapter 1
Marginalized communities are those excluded from mainstream social, economic, educational, and/or cultural life. Examples of marginalized populations include, but are not limited to, groups excluded due to race, gender identity, sexual orientation, age, physical ability, language, and/or immigration status.
Marginalized Communities
chapter 1
Marginalized communities are those excluded from mainstream social, economic, educational, and/or cultural life. Examples of marginalized populations include, but are not limited to, groups excluded due to race, gender identity, sexual orientation, age, physical ability, language, and/or immigration status.
Stakeholders
chapter 1
Individual or group that has an interest in any decision or activity of an organization.
Stakeholders
chapter 1
Individual or group that has an interest in any decision or activity of an organization.
Open Source
chapter 2
Open source software is software with source code that anyone can inspect, modify, and enhance.
Open Source
chapter 2
Open source software is software with source code that anyone can inspect, modify, and enhance.
Community Partner
chapter 2
A community partner is a group that works to advise and support your work by sharing their lived experience.
Community Partner
chapter 2
A community partner is a group that works to advise and support your work by sharing their lived experience.
Localizing
chapter 2
It is the adaptation of a product or service to meet the needs of a particular language, culture or desired population's "look-and-feel." A successfully localized service or product is one that appears to have been developed within the local culture.
Localizing
chapter 2
It is the adaptation of a product or service to meet the needs of a particular language, culture or desired population's "look-and-feel." A successfully localized service or product is one that appears to have been developed within the local culture.
Participatory Design
chapter 2
Participatory design (originally co-operative design, now often co-design) is an approach to design attempting to actively involve all stakeholders (e.g. employees, partners, customers, citizens, end users) in the design process to help ensure the result meets their needs and is usable. Participatory design is an approach which is focused on processes and procedures of design and is not a design style.
Participatory Design
chapter 2
Participatory design (originally co-operative design, now often co-design) is an approach to design attempting to actively involve all stakeholders (e.g. employees, partners, customers, citizens, end users) in the design process to help ensure the result meets their needs and is usable. Participatory design is an approach which is focused on processes and procedures of design and is not a design style.
Ethnographic Research
chapter 2
Ethnographic research is a qualitative method where researchers observe and/or interact with a study’s participants in their real-life environment.
Ethnographic Research
chapter 2
Ethnographic research is a qualitative method where researchers observe and/or interact with a study’s participants in their real-life environment.
Metadata
chapter 2
Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself
Metadata
chapter 2
Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself
Actor Map
chapter 2
An actor map is a visual depiction of the key organizations and individuals that influence a topic, allowing insight into the players within a system.
Actor Map
chapter 2
An actor map is a visual depiction of the key organizations and individuals that influence a topic, allowing insight into the players within a system.
Threat-Modelling
chapter 3
Threat modeling is a structured process with these objectives: identify security requirements, pinpoint security threats and potential vulnerabilities, quantify threat and vulnerability criticality, and prioritize remediation methods.
Threat-Modelling
chapter 3
Threat modeling is a structured process with these objectives: identify security requirements, pinpoint security threats and potential vulnerabilities, quantify threat and vulnerability criticality, and prioritize remediation methods.
Co-design
chapter 4
Co-design is about challenging the imbalance of power held within groups of individuals, who make important decisions about others lives, livelihoods and bodies. Often, with little to no involvement of the people who will be most impacted by those decisions. Co-design seeks to change that through building new relationships, capability and capacity for boundless curiosity. It uses inclusive convening to share knowledge and power.
Co-design
chapter 4
Co-design is about challenging the imbalance of power held within groups of individuals, who make important decisions about others lives, livelihoods and bodies. Often, with little to no involvement of the people who will be most impacted by those decisions. Co-design seeks to change that through building new relationships, capability and capacity for boundless curiosity. It uses inclusive convening to share knowledge and power.
participatory research
chapter 5
Participatory Research (PR) is a research-to-action approach that emphasizes direct engagement of local priorities and perspectives (Cornwall & Jewkes, 1995). PR can be defined as an umbrella term for research designs, methods, and frameworks that use systematic inquiry in direct collaboration
participatory research
chapter 5
Participatory Research (PR) is a research-to-action approach that emphasizes direct engagement of local priorities and perspectives (Cornwall & Jewkes, 1995). PR can be defined as an umbrella term for research designs, methods, and frameworks that use systematic inquiry in direct collaboration