{"id":12597,"date":"2025-02-21T00:59:00","date_gmt":"2025-02-21T06:59:00","guid":{"rendered":"https:\/\/redporlaciberseguridad.org\/?p=12597"},"modified":"2025-03-08T01:57:36","modified_gmt":"2025-03-08T07:57:36","slug":"desvirtualizate-llega-al-museo-universum-y-advierte-sobre-los-peligros-digitales","status":"publish","type":"post","link":"https:\/\/redporlaciberseguridad.org\/en\/desvirtualizate-llega-al-museo-universum-y-advierte-sobre-los-peligros-digitales\/","title":{"rendered":"&#8220;Desvirtual\u00edzate&#8221; llega al Museo Universum y advierte sobre los peligros digitales"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"12597\" class=\"elementor elementor-12597\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-465002c e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"465002c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60194f8 elementor-widget elementor-widget-image\" data-id=\"60194f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"519\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/03\/imagen-2.png\" class=\"attachment-large size-large wp-image-12601\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/03\/imagen-2.png 1366w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/03\/imagen-2-300x152.png 300w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3da4ce2 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"3da4ce2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5654676 elementor-widget elementor-widget-heading\" data-id=\"5654676\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Ciudad de M\u00e9xico, 21 de febrero de 2025 \u2013 Con gran \u00e9xito se llev\u00f3 a cabo la presentaci\u00f3n de la obra de teatro \u201cDesvirtual\u00edzate\u201d en el Museo Universum, un montaje que busca generar conciencia sobre los retos peligrosos en internet, el impacto de las redes sociales y la importancia de la civilidad digital.<\/h6>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ab7adf e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"6ab7adf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4f86855 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"4f86855\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f4e9702 elementor-widget elementor-widget-text-editor\" data-id=\"f4e9702\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>El libreto de esta innovadora puesta en escena fue desarrollado por la\u00a0<strong>Comisi\u00f3n Tecnolog\u00edas de la Informaci\u00f3n y Contenidos Audiovisuales dirigidos a Ni\u00f1as, Ni\u00f1os y Adolescentes (<\/strong><strong data-start=\"560\" data-end=\"572\">CITICNNA<\/strong>\u00a0) y su realizaci\u00f3n fue posible gracias al esfuerzo de\u00a0<strong>Likeinteligente, el<\/strong>\u00a0<strong data-start=\"626\" data-end=\"693\">Comit\u00e9 de Ciberseguridad de la Asociaci\u00f3n de Internet MX (AIMX) y Red por la Ciberseguridad<\/strong>. La funci\u00f3n cont\u00f3 con la asistencia de estudiantes del\u00a0<strong data-start=\"749\" data-end=\"772\">Taller de Magnolias<\/strong>, quienes participaron activamente en esta experiencia de aprendizaje interactivo.<\/p><p>A trav\u00e9s de una historia envolvente,\u00a0<strong data-start=\"1035\" data-end=\"1056\">\u201cDesvirtual\u00edzate\u201d<\/strong>\u00a0sigue el viaje de\u00a0<strong data-start=\"1075\" data-end=\"1083\">Paco<\/strong>, un ni\u00f1o que sue\u00f1a con ser\u00a0<strong data-start=\"1111\" data-end=\"1136\">youtuber e influencer<\/strong>. En su camino, se enfrenta a los peligros del mal uso de la tecnolog\u00eda, representados por\u00a0<strong data-start=\"1227\" data-end=\"1240\">La Sombra<\/strong>. Con la ayuda de su mascota\u00a0<strong data-start=\"1269\" data-end=\"1283\">Colmillito<\/strong>, su hermana\u00a0<strong data-start=\"1296\" data-end=\"1307\">Juanita<\/strong>, su abuela\u00a0<strong data-start=\"1319\" data-end=\"1331\">Chuchita<\/strong>\u00a0y la cient\u00edfica\u00a0<strong data-start=\"1348\" data-end=\"1357\">Soyla<\/strong>, Paco aprende sobre\u00a0<strong data-start=\"1378\" data-end=\"1490\">el uso responsable de la tecnolog\u00eda, la prevenci\u00f3n del ciberacoso y la importancia de la privacidad en l\u00ednea<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0d4ebb e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"f0d4ebb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ae96080 elementor-widget elementor-widget-text-editor\" data-id=\"ae96080\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Adem\u00e1s de transmitir un mensaje poderoso, la obra tiene un ambicioso objetivo:\u00a0<strong data-start=\"1574\" data-end=\"1613\">recorrer toda la Rep\u00fablica Mexicana<\/strong>, llevando esta reflexi\u00f3n a m\u00e1s ni\u00f1as, ni\u00f1os y adolescentes en el pa\u00eds.<\/p><p>El evento forma parte de los esfuerzos continuos por fortalecer la educaci\u00f3n en ciberseguridad y ciudadan\u00eda digital, promoviendo espacios de aprendizaje que combinan arte, tecnolog\u00eda y reflexi\u00f3n.\u00a0<\/p><p><em data-start=\"1181\" data-end=\"1407\">\u201cEs fundamental que las nuevas generaciones comprendan los riesgos y responsabilidades del entorno digital. Iniciativas como\u00a0 nuestra obra de teatro de t\u00edteres \u2018Desvirtual\u00edzate\u2019 permiten abordar estos temas de manera accesible y cercana para el p\u00fablico joven\u201d<\/em>, destac\u00f3<strong>\u00a0#Likeinteligente.<\/strong><\/p><p><strong>\u00a0<\/strong><\/p><p>Con esta iniciativa,\u00a0<strong>Likeinteligente, el Comit\u00e9 de Ciberseguridad de la AIMX, y Red por la Cibersgeuridad<\/strong>\u00a0reafirma su compromiso con la educaci\u00f3n digital y la protecci\u00f3n de las infancias en el ecosistema digital.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-69ee6cc e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"69ee6cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-99ed859 elementor-widget elementor-widget-image\" data-id=\"99ed859\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"519\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/03\/imagen-5-1024x519.png\" class=\"attachment-large size-large wp-image-12600\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/03\/imagen-5-1024x519.png 1024w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/03\/imagen-5-300x152.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/03\/imagen-5-768x390.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/03\/imagen-5-18x9.png 18w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/03\/imagen-5-600x304.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/03\/imagen-5.png 1366w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b4d96db e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"b4d96db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d2e8b63 elementor-widget elementor-widget-heading\" data-id=\"d2e8b63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.likeinteligente.org\/\">Conoce m\u00e1s sobre la iniciativa de #Likeinteligente en www.likeinteligente.org<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8d3c25 elementor-widget elementor-widget-heading\" data-id=\"a8d3c25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\u00bfQuieres llevar la obra de teatro a tu instituci\u00f3n?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de9f1c1 elementor-widget elementor-widget-heading\" data-id=\"de9f1c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\"><a href=\"mailto:kim@t6i.872.myftpupload.com\">Cont\u00e1ctanos a trav\u00e9s del correo kim@t6i.872.myftpupload.com<\/a><\/h6>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Ciudad de M\u00e9xico, 21 de febrero de 2025 \u2013 Con gran \u00e9xito se llev\u00f3 a cabo la presentaci\u00f3n de la obra de teatro \u201cDesvirtual\u00edzate\u201d en el Museo Universum, un montaje que busca generar conciencia sobre los retos peligrosos en internet, el impacto de las redes sociales y la importancia de la civilidad digital. El libreto<\/p>","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[88],"tags":[],"class_list":["post-12597","post","type-post","status-publish","format-image","hentry","category-blog","post_format-post-format-image"],"_links":{"self":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/12597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/comments?post=12597"}],"version-history":[{"count":8,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/12597\/revisions"}],"predecessor-version":[{"id":12609,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/12597\/revisions\/12609"}],"wp:attachment":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/media?parent=12597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/categories?post=12597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/tags?post=12597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}