{"id":1324,"date":"2022-02-24T05:03:32","date_gmt":"2022-02-24T05:03:32","guid":{"rendered":"https:\/\/veritas.situada.online\/about\/"},"modified":"2024-12-15T03:18:14","modified_gmt":"2024-12-15T02:18:14","slug":"proyecto","status":"publish","type":"page","link":"https:\/\/veritas.situada.online\/en\/proyecto\/","title":{"rendered":"About the Project"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-3ad17e27 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-8a1eebc0\"><h1 class=\"uagb-heading-text\">About the Project<\/h1><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-f8ec2bd3 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-4ac35e7e uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Background<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">VERITAS analiza c\u00f3mo las tecnolog\u00edas emergentes impactan desproporcionadamente a las mujeres en ALAC, con un enfoque en los deepfakes y la ciberviolencia de g\u00e9nero. A trav\u00e9s de un estudio cr\u00edtico, buscamos visibilizar riesgos, explorar iniciativas feministas de resistencia y proponer recomendaciones para fomentar entornos digitales m\u00e1s seguros, inclusivos y \u00e9ticos. Destacamos la importancia de la educaci\u00f3n digital, la segurida digital con perspectiva de g\u00e9nero y la regulaci\u00f3n tecnol\u00f3gica en la lucha contra las desigualdades digitales y la violencia basada en g\u00e9nero.<\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-e0d4fef0 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-c5fdb3a6\"><h2 class=\"uagb-heading-text\">General objective<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-83602f44\"><h2 class=\"uagb-heading-text\">Investigar las vulnerabilidades y desigualdades de g\u00e9nero asociadas a las tecnolog\u00edas emergentes en ALAC, visibilizando los riesgos y promoviendo estrategias inclusivas para mitigar la violencia digital y fortalecer entornos \u00e9ticos y seguros.<\/h2><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-685a4415\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:url(&quot;data:image\/svg+xml,%3Csvg width='16' height='16' viewBox='0 0 16 16' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath d='M6.29312 16.9999L17 6.29302M14.2931 16.9999L17 14.293M-0.707031 15.9999L16.0002 -0.707153M8.00017 -0.707153L-0.706882 7.9999' stroke='black'\/%3E%3C\/svg%3E&quot;)\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-15589d40 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-c86aa0c7 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Specific objectives<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">1. Analizar los desaf\u00edos y las dimensiones de la desinformaci\u00f3n y la ciberviolencia de g\u00e9nero, con \u00e9nfasis en el uso de deepfakes en ALAC.<br><br>2. Evaluar la accesibilidad y funcionalidad de aplicaciones de deepfakes en sistemas operativos populares como Android.<br><br>3. Documentar iniciativas feministas que enfrentan los riesgos de las tecnolog\u00edas emergentes, promoviendo entornos digitales inclusivos y seguros.<br><br>4. Generar recomendaciones pol\u00edticas y pr\u00e1cticas basadas en los hallazgos, para fortalecer la ciberseguridad con enfoque de g\u00e9nero.<\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-d6a43a32\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:url(&quot;data:image\/svg+xml,%3Csvg width='16' height='16' viewBox='0 0 16 16' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath d='M6.29312 16.9999L17 6.29302M14.2931 16.9999L17 14.293M-0.707031 15.9999L16.0002 -0.707153M8.00017 -0.707153L-0.706882 7.9999' stroke='black'\/%3E%3C\/svg%3E&quot;)\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-0293b1c7\"><h2 class=\"uagb-heading-text\"><strong>Description<\/strong><\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-939431e5 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-573a5cb5\">\n<div class=\"wp-block-uagb-info-box uagb-block-df9bbc36 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M0 256C0 114.6 114.6 0 256 0C397.4 0 512 114.6 512 256C512 397.4 397.4 512 256 512C114.6 512 0 397.4 0 256zM371.8 211.8C382.7 200.9 382.7 183.1 371.8 172.2C360.9 161.3 343.1 161.3 332.2 172.2L224 280.4L179.8 236.2C168.9 225.3 151.1 225.3 140.2 236.2C129.3 247.1 129.3 264.9 140.2 275.8L204.2 339.8C215.1 350.7 232.9 350.7 243.8 339.8L371.8 211.8z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Challenges and Dimensions of Disinformation in Latin America and the Caribbean<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">Las tecnolog\u00edas emergentes han introducido nuevas amenazas, exponiendo a mujeres a ataques espec\u00edficos como deepfakes y acoso en l\u00ednea. Estos actos comprometen su privacidad, reputaci\u00f3n y salud mental, subrayando la necesidad de una acci\u00f3n inmediata. En este art\u00edculo destacamos la importancia de educar digitalmente, implementar pol\u00edticas de seguridad digital con perspectiva de g\u00e9nero y regular tecnolog\u00edas emergentes para proteger los derechos humanos en los entornos digitales.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"https:\/\/veritas.situada.online\/en\/proyecto\/desafiosydimensionesdeladesinformacionenalac\/\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\" onclick=\"return true;\"><span class=\"uagb-inline-editing\">Read more<\/span><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M504.3 273.6l-112.1 104c-6.992 6.484-17.18 8.218-25.94 4.406c-8.758-3.812-14.42-12.45-14.42-21.1L351.9 288H32C14.33 288 .0002 273.7 .0002 255.1S14.33 224 32 224h319.9l0-72c0-9.547 5.66-18.19 14.42-22c8.754-3.809 18.95-2.075 25.94 4.41l112.1 104C514.6 247.9 514.6 264.1 504.3 273.6z\"><\/path><\/svg><\/a><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-b88229aa\">\n<div class=\"wp-block-uagb-info-box uagb-block-702124e6 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M0 256C0 114.6 114.6 0 256 0C397.4 0 512 114.6 512 256C512 397.4 397.4 512 256 512C114.6 512 0 397.4 0 256zM371.8 211.8C382.7 200.9 382.7 183.1 371.8 172.2C360.9 161.3 343.1 161.3 332.2 172.2L224 280.4L179.8 236.2C168.9 225.3 151.1 225.3 140.2 236.2C129.3 247.1 129.3 264.9 140.2 275.8L204.2 339.8C215.1 350.7 232.9 350.7 243.8 339.8L371.8 211.8z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong><strong><strong>Evaluaci\u00f3n de aplicaciones Deepfakes disponibles para Android<\/strong><\/strong><\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">VERITAS examina la accesibilidad y funcionalidad de aplicaciones de deepfakes en sistemas operativos Android, analizando c\u00f3mo estas herramientas se han popularizado y sus potenciales riesgos. Este an\u00e1lisis considera cu\u00e1n f\u00e1cilmente pueden ser utilizadas para prop\u00f3sitos maliciosos, desde manipulaciones de imagen hasta la creaci\u00f3n de contenido enga\u00f1oso. Identificar estas vulnerabilidades es esencial para fomentar un debate sobre regulaciones y educaci\u00f3n digital.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"https:\/\/veritas.situada.online\/en\/proyecto\/evaluaciondeaplicacionesdeepfakesdisponiblesparaandroid\/\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\" onclick=\"return true;\"><span class=\"uagb-inline-editing\">Read more<\/span><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M504.3 273.6l-112.1 104c-6.992 6.484-17.18 8.218-25.94 4.406c-8.758-3.812-14.42-12.45-14.42-21.1L351.9 288H32C14.33 288 .0002 273.7 .0002 255.1S14.33 224 32 224h319.9l0-72c0-9.547 5.66-18.19 14.42-22c8.754-3.809 18.95-2.075 25.94 4.41l112.1 104C514.6 247.9 514.6 264.1 504.3 273.6z\"><\/path><\/svg><\/a><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-bfce88bc\">\n<div class=\"wp-block-uagb-info-box uagb-block-2bcb8fe7 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M0 256C0 114.6 114.6 0 256 0C397.4 0 512 114.6 512 256C512 397.4 397.4 512 256 512C114.6 512 0 397.4 0 256zM371.8 211.8C382.7 200.9 382.7 183.1 371.8 172.2C360.9 161.3 343.1 161.3 332.2 172.2L224 280.4L179.8 236.2C168.9 225.3 151.1 225.3 140.2 236.2C129.3 247.1 129.3 264.9 140.2 275.8L204.2 339.8C215.1 350.7 232.9 350.7 243.8 339.8L371.8 211.8z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong><strong>Respuestas y Estrategias Feministas ante las Tecnolog\u00edas Emergentes<\/strong><\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">En ALAC, mujeres y organizaciones feministas est\u00e1n desarrollando estrategias para enfrentar los riesgos de las tecnolog\u00edas emergentes. Estas incluyen campa\u00f1as de concienciaci\u00f3n, herramientas de verificaci\u00f3n digital y programas educativos para promover entornos digitales seguros y equitativos. VERITAS recopila estas iniciativas, subrayando c\u00f3mo el trabajo colectivo y feminista contribuye a transformar las tecnolog\u00edas en herramientas para la inclusi\u00f3n y la justicia.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"https:\/\/veritas.situada.online\/en\/proyecto\/respuestasyestrategiasfeministasantelastecnologiaseemergentes\/\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\" onclick=\"return true;\"><span class=\"uagb-inline-editing\">Read more<\/span><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M504.3 273.6l-112.1 104c-6.992 6.484-17.18 8.218-25.94 4.406c-8.758-3.812-14.42-12.45-14.42-21.1L351.9 288H32C14.33 288 .0002 273.7 .0002 255.1S14.33 224 32 224h319.9l0-72c0-9.547 5.66-18.19 14.42-22c8.754-3.809 18.95-2.075 25.94 4.41l112.1 104C514.6 247.9 514.6 264.1 504.3 273.6z\"><\/path><\/svg><\/a><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-1f92071b\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:url(&quot;data:image\/svg+xml,%3Csvg width='16' height='16' viewBox='0 0 16 16' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath d='M6.29312 16.9999L17 6.29302M14.2931 16.9999L17 14.293M-0.707031 15.9999L16.0002 -0.707153M8.00017 -0.707153L-0.706882 7.9999' stroke='black'\/%3E%3C\/svg%3E&quot;)\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-040d76e4\"><h2 class=\"uagb-heading-text\"><strong><strong>Timetable<\/strong><\/strong><\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-7f6df4fb uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><strong>Challenges and Dimensions of Disinformation in Latin America and the Caribbean<br><\/strong><em>September 2023 - March 2024<br><\/em><br><strong>Evaluaci\u00f3n de aplicaciones Deepfakes disponibles para Android<\/strong><br><em>Abril 2024 &#8211; Diciembre 2024<br><\/em><br><strong>Respuestas y Estrategias Feministas ante las Tecnolog\u00edas Emergentes<\/strong><br><em>Enero 2025 &#8211; Marzo 2025<\/em><\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-575d5799\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Proyecto Objetivo General Investigar las vulnerabilidades y desigualdades de g\u00e9nero asociadas a las tecnolog\u00edas emergentes en ALAC, visibilizando los riesgos y promoviendo estrategias inclusivas para mitigar la violencia digital y fortalecer entornos \u00e9ticos y seguros. Descripci\u00f3n Cronograma<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"constanza.gonzalezveliz","author_link":"https:\/\/veritas.situada.online\/en\/author\/constanza-gonzalezveliz\/"},"uagb_comment_info":0,"uagb_excerpt":"Proyecto Objetivo General Investigar las vulnerabilidades y desigualdades de g\u00e9nero asociadas a las tecnolog\u00edas emergentes en ALAC, visibilizando los riesgos y promoviendo estrategias inclusivas para mitigar la violencia digital y fortalecer entornos \u00e9ticos y seguros. Descripci\u00f3n Cronograma","_links":{"self":[{"href":"https:\/\/veritas.situada.online\/en\/wp-json\/wp\/v2\/pages\/1324"}],"collection":[{"href":"https:\/\/veritas.situada.online\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/veritas.situada.online\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/veritas.situada.online\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/veritas.situada.online\/en\/wp-json\/wp\/v2\/comments?post=1324"}],"version-history":[{"count":82,"href":"https:\/\/veritas.situada.online\/en\/wp-json\/wp\/v2\/pages\/1324\/revisions"}],"predecessor-version":[{"id":2307,"href":"https:\/\/veritas.situada.online\/en\/wp-json\/wp\/v2\/pages\/1324\/revisions\/2307"}],"wp:attachment":[{"href":"https:\/\/veritas.situada.online\/en\/wp-json\/wp\/v2\/media?parent=1324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}