<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mary</id>
		<title>Gender and Tech Resources - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mary"/>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php/Special:Contributions/Mary"/>
		<updated>2026-04-08T14:43:27Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.26.2</generator>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5507</id>
		<title>Digital security for the Association of Media Women, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5507"/>
				<updated>2015-09-09T20:26:27Z</updated>
		
		<summary type="html">&lt;p&gt;Mary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security and Advocacy training for the Association of Media Women in Kenya&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2015/08/01&lt;br /&gt;
|End when ?=2015/08/15&lt;br /&gt;
|Where is located the activity ?=Africa , Kenya, Nairobi&lt;br /&gt;
|Geo-localization of the activity ?=-1.3240779921172874, 36.84814453125&lt;br /&gt;
|Who organize it=Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=Association of Media Women in Kenya (AMWIK) members&lt;br /&gt;
|How many people trained=9&lt;br /&gt;
|Motivations for organizing training=When the femh3ck flash training in Nairobi came to an end, one of the participants who was from AMWIK approached Mary Kiio of Roshani Consultancy Services and requested if the company would consider training their members as the issues highlighted were very pertinent to what women go through in the country. The potential of media being more informed on cyber threats especially women would hopefully translate to various media platforms being utilized to reach more women across the country&lt;br /&gt;
&lt;br /&gt;
A few days later an email from the secretariat of AMWIK inquiring on if we could share on the outcomes of the femh3ck training and a request on if we can engage in other similar activities and/or platforms, lead to the discussion of holding a three day training for its members over the month of August on Saturdays for three consecutive weekends.&lt;br /&gt;
&lt;br /&gt;
Though both companies did not have any funding for the training , there was an agreement that Roshani Consultancy Services would avail facilitators who would be willing to share information with no pay.AMWIK on the other hand committed to identify participants who are willing to attend training with the aim of being the future trainers. AMWIK also provided office space, Internet connection, workshop materials and snacks.&lt;br /&gt;
&lt;br /&gt;
It was the willing participants who shared their training needs via a pre training questionnaire that resonated with the theme of the training that provided the highest motivation of the training.&lt;br /&gt;
|Topics addressed=Training of Trainers, Digital security, Data mining and visualization , Privacy Advocacy&lt;br /&gt;
|Links about the activity=Articles, videos, photos on-line, ...&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Day 1&lt;br /&gt;
&lt;br /&gt;
1st August 2015&lt;br /&gt;
&lt;br /&gt;
Morning Session&lt;br /&gt;
&lt;br /&gt;
Introductions and Overview of the workshop&lt;br /&gt;
&lt;br /&gt;
Cyber Security : Importance of Internet, KICTANET report and Advocac, Government Censorship and Emerging trends -Naomi Kamau (sharing from personal experience and research)&lt;br /&gt;
&lt;br /&gt;
Afternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security :Tools (part 1)-Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Day 2&lt;br /&gt;
&lt;br /&gt;
8th August 2015&lt;br /&gt;
&lt;br /&gt;
Morning session and part of Afternoon session&lt;br /&gt;
&lt;br /&gt;
Data Mining, Data Visualization and Tips on Security Online: Steven Kinuthia&lt;br /&gt;
&lt;br /&gt;
Latter Afternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security: Information Security and data protection (Part 2)-Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
Day 3&lt;br /&gt;
&lt;br /&gt;
15th August 2015&lt;br /&gt;
&lt;br /&gt;
Whole day &lt;br /&gt;
&lt;br /&gt;
Privacy Advocacy: Women and Tech Violence in Kenya, National Laws in Kenya, Advocacy for AMWIK :Mary Kiio&lt;br /&gt;
&lt;br /&gt;
NB: Daily feedback was given at the end of the session capturing what worked well, what didn't , what could have been done better.&lt;br /&gt;
&lt;br /&gt;
The # for the training on Twitter was #Digitalk_womensafety&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Joyce Nyaruai, the Programmes Officer of AMWIK not only attended the training, took most of the pictures during sessions but also ensured the smooth running of operations at the office.&lt;br /&gt;
&lt;br /&gt;
Mary Kiio of Roshani Consultancy was available during the sessions to ensure smooth flow of presentations from one trainer to another while providing training tips at opportune moments&lt;br /&gt;
|Methodologies for training=Power point presentations, practical online sessions, group discussions, presentations, spectrogram exercises&lt;br /&gt;
|Existing toolkits and resources=The Kenya ICT Network (KICTANET)  2013 report on Women and Cyber Crime in Kenya, tactical tech online tool kits , Google tips, Maji Data, UN Data,World Bank Data, Kenya Open data, infogram, Google fusion tables,&lt;br /&gt;
|Gender and tech tutorials used=ono, Association for Progressive Communications and International Association of Women in Radio and Television- Kenya chapter training materials of workshops held in Kenya,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=How was it ? It was great. I woke up earlier than normal work days to ensure I was there with the participants as they were a committed, had lots of questions and reflections. They were also very resourceful in sharing examples of homegrown solutions to the challenges addressed during the sessions. The day would end too soon not only for the trainers but also the participants.&lt;br /&gt;
|Feedbacks=What were the impressions ? The participants found the sessions useful not only in their professional lives but also in their personal and academic life. The sessions were structured to be as responsive to the developing needs of the participants and there was open interaction towards finding practical solutions even beyond the training days. One participant remarked- &amp;quot; It is like I attended a full course.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
At the end of the training participants committed to being part of the driving force at the association on matters tech, gender, security and advocacy.&lt;br /&gt;
|START=What will you start doing ? Incorporating participants who have attended any trainings I have been involved in, when conducting future trainings on digital security and advocacy to provide a platform for them to enhance their skills&lt;br /&gt;
|STOP=What will you stop doing ? feeling limited when no funding for trainings are available.&lt;br /&gt;
|KEEP=What will you keep doing ? Seeking out for more creative ways of sharing knowledge, working with other like minded individuals and looking for forums to keep the information I have in tandem with emerging trends.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mary</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5506</id>
		<title>Digital security for the Association of Media Women, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5506"/>
				<updated>2015-09-09T20:23:35Z</updated>
		
		<summary type="html">&lt;p&gt;Mary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security and Advocacy training for the Association of Media Women in Kenya&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2015/08/01&lt;br /&gt;
|End when ?=2015/08/15&lt;br /&gt;
|Where is located the activity ?=Africa , Kenya, Nairobi&lt;br /&gt;
|Who organize it=Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=Association of Media Women in Kenya (AMWIK) members&lt;br /&gt;
|How many people trained=9&lt;br /&gt;
|Motivations for organizing training=When the femh3ck flash training in Nairobi came to an end, one of the participants who was from AMWIK approached Mary Kiio of Roshani Consultancy Services and requested if the company would consider training their members as the issues highlighted were very pertinent to what women go through in the country. The potential of media being more informed on cyber threats especially women would hopefully translate to various media platforms being utilized to a wider group of women across the country&lt;br /&gt;
&lt;br /&gt;
A few days later an email from the secretariat of AMWIK inquiring on if we could share on the outcomes of the femh3ck training and a request on if we can engage in other similar activities and/or platforms lead to the discussion of holding a three day training for its members over the month of August on Saturdays for three consecutive weekends.&lt;br /&gt;
&lt;br /&gt;
Though both companies did not have any funding for the training , there was an agreement that Roshani Consultancy Services would avail facilitators who would be willing to share information with no pay.AMWIK on the other hand committed to identify participants who are willing to attend training with the aim of being the future trainers. AMWIK also provided office space, Internet connection, workshop materials and snacks.&lt;br /&gt;
&lt;br /&gt;
It was the willing participants who shared their training needs via a pre training questionnaire that resonated with the theme of the training that provided the highest motivation of the training.&lt;br /&gt;
|Topics addressed=Training of Trainers, Digital security, Data mining and visualization , Privacy Advocacy&lt;br /&gt;
|Links about the activity=Articles, videos, photos on-line, ...&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Day 1&lt;br /&gt;
&lt;br /&gt;
1st August 2015&lt;br /&gt;
&lt;br /&gt;
Morning Session&lt;br /&gt;
&lt;br /&gt;
Introductions and Overview of the workshop&lt;br /&gt;
&lt;br /&gt;
Cyber Security : Importance of Internet, KICTANET report and Advocac, Government Censorship and Emerging trends -Naomi Kamau (sharing from personal experience and research)&lt;br /&gt;
&lt;br /&gt;
Afternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security :Tools (part 1)-Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Day 2&lt;br /&gt;
&lt;br /&gt;
8th August 2015&lt;br /&gt;
&lt;br /&gt;
Morning session and part of Afternoon session&lt;br /&gt;
&lt;br /&gt;
Data Mining, Data Visualization and Tips on Security Online: Steven Kinuthia&lt;br /&gt;
&lt;br /&gt;
Latter Afternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security: Information Security and data protection (Part 2)-Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
Day 3&lt;br /&gt;
&lt;br /&gt;
15th August 2015&lt;br /&gt;
&lt;br /&gt;
Whole day &lt;br /&gt;
&lt;br /&gt;
Privacy Advocacy: Women and Tech Violence in Kenya, National Laws in Kenya, Advocacy for AMWIK :Mary Kiio&lt;br /&gt;
&lt;br /&gt;
NB: Daily feedback was given at the end of the session capturing what worked well, what didn't , what could have been done better.&lt;br /&gt;
&lt;br /&gt;
The # for the training on Twitter was #Digitalk_womensafety&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Joyce Nyaruai, the Programmes Officer of AMWIK not only attended the training, took most of the pictures during sessions but also ensured the smooth running of operations at the office.&lt;br /&gt;
&lt;br /&gt;
Mary Kiio of Roshani Consultancy was available during the sessions to ensure smooth flow of presentations from one trainer to another while providing training tips at opportune moments&lt;br /&gt;
|Methodologies for training=Power point presentations, practical online sessions, group discussions, presentations, spectrogram exercises&lt;br /&gt;
|Existing toolkits and resources=The Kenya ICT Network (KICTANET)  2013 report on Women and Cyber Crime in Kenya, tactical tech online tool kits , Google tips, Maji Data, UN Data,World Bank Data, Kenya Open data, infogram, Google fusion tables,&lt;br /&gt;
|Gender and tech tutorials used=ono, Association for Progressive Communications and International Association of Women in Radio and Television- Kenya chapter training materials of workshops held in Kenya,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=How was it ? It was great. I woke up earlier than normal work days to ensure I was there with the participants as they were a committed, had lots of questions and reflections. They were also very resourceful in sharing examples of homegrown solutions to the challenges addressed during the sessions. The day would end too soon not only for the trainers but also the participants.&lt;br /&gt;
|Feedbacks=What were the impressions ? The participants found the sessions useful not only in their professional lives but also in their personal and academic life. The sessions were structured to be as responsive to the developing needs of the participants and there was open interaction towards finding practical solutions even beyond the training days. One participant remarked- &amp;quot; It is like I attended a full course.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
At the end of the training participants committed to being part of the driving force at the association on matters tech, gender, security and advocacy.&lt;br /&gt;
|START=What will you start doing ? Incorporating participants who have attended any trainings I have been involved in, when conducting future trainings on digital security and advocacy to provide a platform for them to enhance their skills&lt;br /&gt;
|STOP=What will you stop doing ? feeling limited when no funding for trainings are available.&lt;br /&gt;
|KEEP=What will you keep doing ? Seeking out for more creative ways of sharing knowledge, working with other like minded individuals and looking for forums to keep the information I have in tandem with emerging trends.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mary</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5504</id>
		<title>Digital security for the Association of Media Women, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5504"/>
				<updated>2015-09-09T10:24:11Z</updated>
		
		<summary type="html">&lt;p&gt;Mary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security and Advocacy training for the Association of Media Women in Kenya&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2015/08/01&lt;br /&gt;
|End when ?=2015/08/15&lt;br /&gt;
|Where is located the activity ?=Africa , Kenya, Nairobi&lt;br /&gt;
|Geo-localization of the activity ?=-1.2142416797759, 36.93603515625&lt;br /&gt;
|Who organize it=Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=Association of Media Women in Kenya (AMWIK) members&lt;br /&gt;
|How many people trained=9&lt;br /&gt;
|Motivations for organizing training=When the femh3ck flash training in Nairobi came to an end, one of the participants who was from AMWIK approached Mary Kiio of Roshani Consultancy Services and requested if the company would consider training their members as the issues highlighted were very pertinent to what women go through in the country.&lt;br /&gt;
&lt;br /&gt;
A few days later an email from the secretariat of AMWIK inquiring on if we could share on the outcomes of the femh3ck training and a request on if we can engage in other similar activities and/or platforms lead to the discussion of holding a three day training for its members over the month of August on Saturdays for three consecutive weekends.&lt;br /&gt;
&lt;br /&gt;
Though both companies did not have any funding for the training , there was an agreement that Roshani Consultancy Services would avail facilitators who would be willing to share information with no pay.AMWIK on the other hand committed to identify participants who are willing to attend training with the aim of being the future trainings. AMWIK also provided office space, Internet connection, workshop materials and snacks.&lt;br /&gt;
&lt;br /&gt;
It was the willing participants who shared their training needs via a pre training questionnaire who provided the highest motivation of the training.&lt;br /&gt;
|Topics addressed=Training of Trainers, Digital security, Data mining and visualization , Privacy Advocacy&lt;br /&gt;
|Links about the activity=Articles, videos, photos on-line, ...&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Day 1&lt;br /&gt;
&lt;br /&gt;
1st August 2015&lt;br /&gt;
&lt;br /&gt;
Morning Session&lt;br /&gt;
&lt;br /&gt;
Introductions and Overview of the workshop&lt;br /&gt;
&lt;br /&gt;
Cyber Security : Importance of Internet, KICTANET report and Advocac, Government Censorship and Emerging trends -Naomi Kamau (sharing from personal experience and research)&lt;br /&gt;
&lt;br /&gt;
Afternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security :Tools (part 1)-Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Day 2&lt;br /&gt;
&lt;br /&gt;
8th August 2015&lt;br /&gt;
&lt;br /&gt;
Morning session and part of Afternoon session&lt;br /&gt;
&lt;br /&gt;
Data Mining, Data Visualization and Tips on Security Online: Steven Kinuthia&lt;br /&gt;
&lt;br /&gt;
Latter AFternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security: Information Security and data protection (Part 2)-Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
Day 3&lt;br /&gt;
&lt;br /&gt;
15th August 2015&lt;br /&gt;
&lt;br /&gt;
Whole day &lt;br /&gt;
&lt;br /&gt;
Privacy Advocacy: Women and Tech Violence in Kenya, National Laws in Kenya, Advocacy for AMWIK :Mary Kiio&lt;br /&gt;
&lt;br /&gt;
NB: Daily feedback was given at the end of the session capturing what worked well, what didn't , what could have been done better.&lt;br /&gt;
&lt;br /&gt;
The # for the training on Twitter was #Digitalk_womensafety&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Joyce Nyaruai, the Programmes Officer of AMWIK not only attended the training, took most of the pictures during sessions but also ensured the smooth running of operations at the office.&lt;br /&gt;
&lt;br /&gt;
Mary Kiio of Roshani Consultancy was available during the sessions to ensure smooth flow of presentations from one trainer to another while providing training tips at opportune moments&lt;br /&gt;
|Methodologies for training=Power point presentations, practical online sessions, group discussions, presentations, spectrogram exercises&lt;br /&gt;
|Existing toolkits and resources=The Kenya ICT Network (KICTANET)  2013 report on Women and Cyber Crime in Kenya, tactical tech online tool kits , Google tips, Maji Data, UN Data,World Bank Data, Kenya Open data, infogram, Google fusion tables,&lt;br /&gt;
|Gender and tech tutorials used=ono, Association for Progressive Communications and International Association of Women in Radio and Television- Kenya chapter training materials of workshops held in Kenya,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=How was it ? It was great. I woke up earlier than normal work days to ensure I was there with the participants as they were a committed, had lots of questions and reflections. They were also very resourceful in sharing examples of homegrown solutions to the challenges addressed during the sessions. The day would end too soon not only for the trainers but also the participants.&lt;br /&gt;
|Feedbacks=What were the impressions ? The participants found the sessions useful not only in their professional lives but also in their personal and academic life. The sessions were structured to be as responsive to the developing needs of the participants and there was open interaction towards finding practical solutions even beyond the training days. One participant remarked- &amp;quot; It is like I attended a full course.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
At the end of the training participants committed to being part of the driving force at the association on matters tech, gender, security and advocacy.&lt;br /&gt;
|START=What will you start doing ? Incorporating participants who have attended any trainings I have been involved in, when conducting future trainings on digital security and advocacy to provide a platform for them to enhance their skills&lt;br /&gt;
|STOP=What will you stop doing ? feeling limited when no funding for trainings are available.&lt;br /&gt;
|KEEP=What will you keep doing ? Seeking out for more creative ways of sharing knowledge, working with other like minded individuals and looking for forums to keep the information I have in tandem with emerging trends.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mary</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5503</id>
		<title>Digital security for the Association of Media Women, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5503"/>
				<updated>2015-09-09T10:03:29Z</updated>
		
		<summary type="html">&lt;p&gt;Mary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security and Advocacy training for the Association of Media Women in Kenya&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2015/08/01&lt;br /&gt;
|End when ?=2015/08/15&lt;br /&gt;
|Where is located the activity ?=Africa , Kenya, Nairobi&lt;br /&gt;
|Geo-localization of the activity ?=-1.2142416797758704, 36.93603515625&lt;br /&gt;
|Who organize it=Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=Association of Media Women in Kenya (AMWIK) members&lt;br /&gt;
|How many people trained=9&lt;br /&gt;
|Motivations for organizing training=When the femh3ck flash training in Nairobi came to an end, one of the participants who was from AMWIK approached Mary Kiio of Roshani Consultancy Services and requested if the company would consider training their members as the issues highlighted were very pertinent to what women go through in the country.&lt;br /&gt;
&lt;br /&gt;
A few days later an email from the secretariat of AMWIK inquiring on if we could share on the outcomes of the femh3ck training and a request on if we can engage in other similar activities and/or platforms lead to the discussion of holding a three day training for its members over the month of August on Saturdays for three consecutive weekends.&lt;br /&gt;
&lt;br /&gt;
Though both companies did not have any funding for the training , there was an agreement that Roshani Consultancy Services would avail facilitators who would be willing to share information with no pay.AMWIK on the other hand committed to identify participants who are willing to attend training with the aim of being the future trainings. AMWIK also provided office space, Internet connection, workshop materials and snacks.&lt;br /&gt;
&lt;br /&gt;
It was the willing participants who shared their training needs via a pre training questionnaire who provided the highest motivation of the training.&lt;br /&gt;
|Topics addressed=Training of Trainers, Digital security, Data mining and visualization , Privacy Advocacy&lt;br /&gt;
|Links about the activity=Articles, videos, photos on-line, ...&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Day 1&lt;br /&gt;
&lt;br /&gt;
1st August 2015&lt;br /&gt;
&lt;br /&gt;
Morning Session&lt;br /&gt;
&lt;br /&gt;
Introductions and Overview of the workshop&lt;br /&gt;
&lt;br /&gt;
Cyber Security : Importance of Internet, KICTANET report and Advocac, Government Censorship and Emerging trends -Naomi Kamau (sharing from personal experience and research)&lt;br /&gt;
&lt;br /&gt;
Afternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security :Tools (part 1)-Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Day 2&lt;br /&gt;
&lt;br /&gt;
8th August 2015&lt;br /&gt;
&lt;br /&gt;
Morning session and part of Afternoon session&lt;br /&gt;
&lt;br /&gt;
Data Mining, Data Visualization and Tips on Security Online: Steven Kinuthia&lt;br /&gt;
&lt;br /&gt;
Latter AFternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security: Information Security and data protection (Part 2)-Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
Day 3&lt;br /&gt;
&lt;br /&gt;
15th August 2015&lt;br /&gt;
&lt;br /&gt;
Whole day &lt;br /&gt;
&lt;br /&gt;
Privacy Advocacy: Mary Kiio&lt;br /&gt;
&lt;br /&gt;
NB: Daily feedback was given at the end of the session capturing what worked well, what didn't , what could have been done better.&lt;br /&gt;
&lt;br /&gt;
The # for the training on Twitter was #Digitalk_womensafety&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Joyce Nyaruai, the Programmes Officer of AMWIK not only attended the training, took most of the pictures during sessions but also ensured the smooth running of operations at the office.&lt;br /&gt;
&lt;br /&gt;
Mary Kiio of Roshani Consultancy was available during the sessions to ensure smooth flow of presentations from one trainer to another while providing training tips at opportune moments&lt;br /&gt;
|Methodologies for training=Power point presentations, practical online sessions, group discussions, presentations, spectrogram exercises&lt;br /&gt;
|Existing toolkits and resources=The Kenya ICT Network (KICTANET)  2013 report on Women and Cyber Crime in Kenya, tactical tech online tool kits , Google tips, Maji Data, UN Data,World Bank Data, Kenya Open data, infogram, Google fusion tables,&lt;br /&gt;
|Gender and tech tutorials used=ono, Association for Progressive Communications and International Association of Women in Radio and Television- Kenya chapter training materials of workshops held in Kenya,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=How was it ? It was great. I woke up earlier than normal work days to ensure I was there with the participants as they were a committed, had lots of questions and reflections. They were also very resourceful in sharing examples of homegrown solutions to the challenges addressed during the sessions. The day would end too soon not only for the trainers but also the participants.&lt;br /&gt;
|Feedbacks=What were the impressions ? The participants found the sessions useful not only in their professional lives but also in their personal and academic life. The sessions were structured to be as responsive to the developing needs of the participants and there was open interaction towards finding practical solutions even beyond the training days. One participant remarked- &amp;quot; It is like I attended a full course.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
At the end of the training participants committed to being part of the driving force at the association on matters tech, gender, security and advocacy.&lt;br /&gt;
|START=What will you start doing ? Incorporating participants who have attended any trainings I have been involved in, when conducting future trainings on digital security and advocacy to provide a platform for them to enhance their skills&lt;br /&gt;
|STOP=What will you stop doing ? feeling limited when no funding for trainings are available.&lt;br /&gt;
|KEEP=What will you keep doing ? Seeking out for more creative ways of sharing knowledge, working with other like minded individuals and looking for forums to keep the information I have in tandem with emerging trends.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mary</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5502</id>
		<title>Digital security for the Association of Media Women, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5502"/>
				<updated>2015-09-09T09:58:57Z</updated>
		
		<summary type="html">&lt;p&gt;Mary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security and Advocacy training for the Association of Media Women in Kenya&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2015/08/01&lt;br /&gt;
|End when ?=2015/08/15&lt;br /&gt;
|Where is located the activity ?=Africa , Kenya, Nairobi&lt;br /&gt;
|Who organize it=Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=Association of Media Women in Kenya (AMWIK) members&lt;br /&gt;
|How many people trained=9&lt;br /&gt;
|Motivations for organizing training=When the femh3ck flash training in Nairobi came to an end, one of the participants who was from AMWIK approached Mary Kiio of Roshani COnsultancy Services and requested if the company would consider training their members as the issues highlighted were very pertinent to what women go through in the country.&lt;br /&gt;
&lt;br /&gt;
A few days later an email from the secretariat of AMWIK inquiring on if we could share on the outcomes of the femh3ck training and a request on if we can engage in other similar activities and/or platforms lead to the discussion of holding a three day training for its members over the month of August on Saturdays for three consecutive weekends.&lt;br /&gt;
&lt;br /&gt;
Though both companies did not have any funding for the training , there was an agreement that Roshani Consultancy Services would avail facilitators who would be willing to share information with no pay.AMWIK on the other hand committed to identify participants who are willing to attend training with the aim of being the future trainings. AMWIK also provided office space, Internet connection, workshop materials and snacks.&lt;br /&gt;
&lt;br /&gt;
It was the willing participants who shared their training needs via a pre training questionnaire who provided the highest motivation of the training.&lt;br /&gt;
|Topics addressed=Training of Trainers, Digital security, Data mining and visualization , Privacy Advocacy&lt;br /&gt;
|Links about the activity=Articles, videos, photos on-line, ...&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Day 1&lt;br /&gt;
&lt;br /&gt;
1st August 2015&lt;br /&gt;
&lt;br /&gt;
Morning Session&lt;br /&gt;
&lt;br /&gt;
Introductions and Overview of the workshop&lt;br /&gt;
&lt;br /&gt;
Cyber Security : Importance of Internet, KICTANET report and Advocac, Government Censorship and Emerging trends -Naomi Kamau (sharing from personal experience and research)&lt;br /&gt;
&lt;br /&gt;
Afternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security :Tools (part 1)-Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Day 2&lt;br /&gt;
&lt;br /&gt;
8th August 2015&lt;br /&gt;
&lt;br /&gt;
Morning session and part of Afternoon session&lt;br /&gt;
&lt;br /&gt;
Data Mining, Data Visualization and Tips on Security Online: Steven Kinuthia&lt;br /&gt;
&lt;br /&gt;
Latter AFternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security: Information Security and data protection (Part 2)-Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
Day 3&lt;br /&gt;
&lt;br /&gt;
15th August 2015&lt;br /&gt;
&lt;br /&gt;
Whole day &lt;br /&gt;
&lt;br /&gt;
Privacy Advocacy: Mary Kiio&lt;br /&gt;
&lt;br /&gt;
NB: Daily feedback was given at the end of the session capturing what worked well, what didn't , what could have been done better.&lt;br /&gt;
&lt;br /&gt;
The # for the training on Twitter was #Digitalk_womensafety&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Joyce Nyaruai, the Programmes Officer of AMWIK not only attended the training, took most of the pictures during sessions but also ensured the smooth running of operations at the office.&lt;br /&gt;
&lt;br /&gt;
Mary Kiio of Roshani Consultancy was available during the sessions to ensure smooth flow of presentations from one trainer to another while providing training tips at opportune moments&lt;br /&gt;
|Methodologies for training=Power point presentations, practical online sessions, group discussions, presentations, spectrogram exercises&lt;br /&gt;
|Existing toolkits and resources=The Kenya ICT Network (KICTANET)  2013 report on Women and Cyber Crime in Kenya, tactical tech online tool kits , Google tips, Maji Data, UN Data,World Bank Data, Kenya Open data, infogram, Google fusion tables,&lt;br /&gt;
|Gender and tech tutorials used=ono, Association for Progressive Communications and International Association of Women in Radio and Television- Kenya chapter training materials of workshops held in Kenya,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=How was it ? It was great. I woke up earlier than normal work days to ensure I was there with the participants as they were a committed, had lots of questions and reflections, they were also very resourceful in sharing examples of homegrown solutions to the challenges addressed during the sessions. The day would end too soon not only for the trainers but also the participants.&lt;br /&gt;
|Feedbacks=What were the impressions ? The participants found the sessions useful not only in their professional lives but also in their personal and academic life. The sessions were structured to be as responsive to the developing needs of the participants based and their was open interaction towards finding practical solutions even beyond the training days. One participant remarked- &amp;quot; It is like I attended a full course.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
At the end of the training participants committed to be part of the driving force at the association on matters tech, gender, security and advocacy.&lt;br /&gt;
|START=What will you start doing ? Incorporating participants who have attended any trainings I have been involved in, when conducting future trainings on digital security and advocacy to provide a platform for them to enhance their skills&lt;br /&gt;
|STOP=What will you stop doing ? feeling limited when no funding for trainings are available.&lt;br /&gt;
|KEEP=What will you keep doing ? Seeking out for more creative ways of sharing knowledge, working with other like minded individuals and looking for forums to keep the information I have in tandem with emerging trends.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mary</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5499</id>
		<title>Digital security for the Association of Media Women, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5499"/>
				<updated>2015-09-09T09:55:49Z</updated>
		
		<summary type="html">&lt;p&gt;Mary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security and Advocacy training for the Association of Media Women in Kenya&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2015/08/01&lt;br /&gt;
|End when ?=2015/08/15&lt;br /&gt;
|Where is located the activity ?=Africa , Kenya, Nairobi&lt;br /&gt;
|Who organize it=Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=Association of Media Women in Kenya (AMWIK) members&lt;br /&gt;
|How many people trained=9&lt;br /&gt;
|Motivations for organizing training=When the femh3ck flash training in Nairobi came to an end, one of the participants who was from AMWIK approached Mary Kiio of Roshani COnsultancy Services and requested if the company would consider training their members as the issues highlighted were very pertinent to what women go through in the country.&lt;br /&gt;
&lt;br /&gt;
A few days later an email from the secretariat of AMWIK inquiring on if we could share on the outcomes of the femh3ck training and a request on if we can engage in other similar activities and/or platforms lead to the discussion of holding a three day training for its members over the month of August on Saturdays for three consecutive weekends.&lt;br /&gt;
&lt;br /&gt;
Though both companies did not have any funding for the training , there was an agreement that Roshani Consultancy Services would avail facilitators who would be willing to share information with no pay.AMWIK on the other hand committed to identify participants who are willing to attend training with the aim of being the future trainings. AMWIK also provided office space, Internet connection, workshop materials and snacks.&lt;br /&gt;
&lt;br /&gt;
It was the willing participants who shared their training needs via a pre training questionnaire who provided the highest motivation of the training.&lt;br /&gt;
|Topics addressed=Training of Trainers, Digital security, Data mining and visualization , Privacy Advocacy&lt;br /&gt;
|Links about the activity=Articles, videos, photos on-line, ...&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Day 1&lt;br /&gt;
&lt;br /&gt;
1st August 2015&lt;br /&gt;
&lt;br /&gt;
Morning Session&lt;br /&gt;
&lt;br /&gt;
Introductions and Overview of the workshop&lt;br /&gt;
&lt;br /&gt;
Cyber Security : Importance of Internet, KICTANET report and Advocac, Government Censorship and Emerging trends -Naomi Kamau (sharing from personal experience and research)&lt;br /&gt;
&lt;br /&gt;
Afternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security :Tools (part 1)-Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Day 2&lt;br /&gt;
&lt;br /&gt;
8th August 2015&lt;br /&gt;
&lt;br /&gt;
Morning session and part of Afternoon session&lt;br /&gt;
&lt;br /&gt;
Data Mining, Data Visualization and Tips on Security Online: Steven Kinuthia&lt;br /&gt;
&lt;br /&gt;
Latter AFternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security: Information Security and data protection (Part 2)-Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
Day 3&lt;br /&gt;
&lt;br /&gt;
15th August 2015&lt;br /&gt;
&lt;br /&gt;
Whole day &lt;br /&gt;
&lt;br /&gt;
Privacy Advocacy: Mary Kiio&lt;br /&gt;
&lt;br /&gt;
NB: Daily feedback was given at the end of the session capturing what worked well, what didn't , what could have been done better.&lt;br /&gt;
&lt;br /&gt;
The # for the training on Twitter was #Digitalk_womensafety&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Joyce Nyaruai, the Programmes Officer of AMWIK not only attended the training, took most of the pictures during sessions but also ensured the smooth running of operations at the office.&lt;br /&gt;
&lt;br /&gt;
Mary Kiio of Roshani Consultancy was available during the sessions to ensure smooth flow of presentations from one trainer to another while providing training tips at opportune moments&lt;br /&gt;
|Methodologies for training=Power point presentations, practical online sessions, group discussions, presentations, spectrogram exercises&lt;br /&gt;
|Existing toolkits and resources=The Kenya ICT Network (KICTANET)  2013 report on Women and Cyber Crime in Kenya, tactical tech online tool kits , Google tips, Maji Data, UN Data,World Bank Data, Kenya Open data, infogram, Google fusion tables,&lt;br /&gt;
|Gender and tech tutorials used=ono, Association for Progressive Communications and International Association of Women in Radio and Television- Kenya chapter training materials of workshops held in Kenya,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=How was it ? It was great. I woke up earlier than normal work days to ensure I was there with the participants as they were a committed, had lots of questions and reflections, they were also very resourceful in sharing examples of homegrown solutions to the challenges addressed during the sessions. The day would end too soon not only for the trainers but also the participants.&lt;br /&gt;
|Feedbacks=What were the impressions ? The participants found the sessions useful not only in their professional lives but also in their personal and academic life. The sessions were structured to be as responsive to the developing needs of the participants based and their was open interaction towards finding practical solutions even beyond the training days. One participant remarked- &amp;quot; It is like I attended a full course.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
At the end of the training participants committed to be part of the driving force at the association on matters tech, gender, security and advocacy.&lt;br /&gt;
|START=What will you start doing ? Incorporating participants who have attended any trainings I have been involved in, when conducting future trainings on digital security and advocacy to provide a platform for them to enhance their skills&lt;br /&gt;
|STOP=What will you stop doing ?&lt;br /&gt;
|KEEP=What will you keep doing ?&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mary</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5498</id>
		<title>Digital security for the Association of Media Women, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5498"/>
				<updated>2015-09-09T09:41:13Z</updated>
		
		<summary type="html">&lt;p&gt;Mary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security and Advocacy training for the Association of Media Women in Kenya&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2015/08/01&lt;br /&gt;
|End when ?=2015/08/15&lt;br /&gt;
|Where is located the activity ?=Africa , Kenya, Nairobi&lt;br /&gt;
|Geo-localization of the activity ?=-1.222307940719, 36.8701171875&lt;br /&gt;
|Who organize it=Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=Association of Media Women in Kenya (AMWIK) members&lt;br /&gt;
|How many people trained=9&lt;br /&gt;
|Motivations for organizing training=When the femh3ck flash training in Nairobi came to an end, one of the participants who was from AMWIK approached Mary Kiio of Roshani COnsultancy Services and requested if the company would consider training their members as the issues highlighted were very pertinent to what women go through in the country.&lt;br /&gt;
&lt;br /&gt;
A few days later an email from the secretariat of AMWIK inquiring on if we could share on the outcomes of the femh3ck training and a request on if we can engage in other similar activities and/or platforms lead to the discussion of holding a three day training for its members over the month of August on Saturdays for three consecutive weekends.&lt;br /&gt;
&lt;br /&gt;
Though both companies did not have any funding for the training , there was an agreement that Roshani Consultancy Services would avail facilitators who would be willing to share information with no pay.AMWIK on the other hand committed to identify participants who are willing to attend training with the aim of being the future trainings. AMWIK also provided office space, Internet connection, workshop materials and snacks.&lt;br /&gt;
&lt;br /&gt;
It was the willing participants who shared their training needs via a pre training questionnaire who provided the highest motivation of the training.&lt;br /&gt;
|Topics addressed=Training of Trainers, Digital security, Data mining and visualization , Privacy Advocacy&lt;br /&gt;
|Links about the activity=Articles, videos, photos on-line, ...&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Day 1&lt;br /&gt;
&lt;br /&gt;
1st August 2015&lt;br /&gt;
&lt;br /&gt;
Morning Session&lt;br /&gt;
&lt;br /&gt;
Introductions and Overview of the workshop&lt;br /&gt;
&lt;br /&gt;
Cyber Security : Importance of Internet, KICTANET report and Advocac, Government Censorship and Emerging trends -Naomi Kamau (sharing from personal experience and research)&lt;br /&gt;
&lt;br /&gt;
Afternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security :Tools (part 1)-Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Day 2&lt;br /&gt;
&lt;br /&gt;
8th August 2015&lt;br /&gt;
&lt;br /&gt;
Morning session and part of Afternoon session&lt;br /&gt;
&lt;br /&gt;
Data Mining, Data Visualization and Tips on Security Online: Steven Kinuthia&lt;br /&gt;
&lt;br /&gt;
Latter AFternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security: Information Security and data protection (Part 2)-Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
Day 3&lt;br /&gt;
&lt;br /&gt;
15th August 2015&lt;br /&gt;
&lt;br /&gt;
Whole day &lt;br /&gt;
&lt;br /&gt;
Privacy Advocacy: Mary Kiio&lt;br /&gt;
&lt;br /&gt;
NB: Daily feedback was given at the end of the session capturing what worked well, what didn't , what could have been done better.&lt;br /&gt;
&lt;br /&gt;
The # for the training on Twitter was #Digitalk_womensafety&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Joyce Nyaruai, the Programmes Officer of AMWIK not only attended the training, took most of the pictures during sessions but also ensured the smooth running of operations at the office.&lt;br /&gt;
&lt;br /&gt;
Mary Kiio of Roshani Consultancy was available during the sessions to ensure smooth flow of presentations from one trainer to another while providing training tips at opportune moments&lt;br /&gt;
|Methodologies for training=Power point presentations, practical online sessions, group discussions, presentations, spectrogram exercises&lt;br /&gt;
|Existing toolkits and resources=The Kenya ICT Network (KICTANET)  2013 report on Women and Cyber Crime in Kenya, tactical tech online tool kits , Google tips, Maji Data, UN Data,World Bank Data, Kenya Open data, infogram, Google fusion tables,&lt;br /&gt;
|Gender and tech tutorials used=ono, Association for Progressive Communications and International Association of Women in Radio and Television- Kenya chapter training materials of workshops held in Kenya,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=How was it ?&lt;br /&gt;
|Feedbacks=What were the impressions ?&lt;br /&gt;
|START=What will you start doing ?&lt;br /&gt;
|STOP=What will you stop doing ?&lt;br /&gt;
|KEEP=What will you keep doing ?&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mary</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5497</id>
		<title>Digital security for the Association of Media Women, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5497"/>
				<updated>2015-09-09T09:23:22Z</updated>
		
		<summary type="html">&lt;p&gt;Mary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security and Advocacy training for the Association of Media Women in Kenya&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2015/08/01&lt;br /&gt;
|End when ?=2015/08/15&lt;br /&gt;
|Where is located the activity ?=Africa , Kenya, Nairobi&lt;br /&gt;
|Geo-localization of the activity ?=-1.222307940719, 36.8701171875&lt;br /&gt;
|Who organize it=Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=Association of Media Women in Kenya (AMWIK) members&lt;br /&gt;
|How many people trained=9&lt;br /&gt;
|Motivations for organizing training=When the femh3ck flash training in Nairobi came to an end, one of the participants who was from AMWIK approached Mary Kiio of Roshani COnsultancy Services and requested if the company would consider training their members as the issues highlighted were very pertinent to what women go through in the country.&lt;br /&gt;
&lt;br /&gt;
A few days later an email from the secretariat of AMWIK inquiring on if we could share on the outcomes of the femh3ck training and a request on if we can engage in other similar activities and/or platforms lead to the discussion of holding a three day training for its members over the month of August on Saturdays for three consecutive weekends.&lt;br /&gt;
&lt;br /&gt;
Though both companies did not have any funding for the training , there was an agreement that Roshani Consultancy Services would avail facilitators who would be willing to share information with no pay.AMWIK on the other hand committed to identify participants who are willing to attend training with the aim of being the future trainings. AMWIK also provided office space, Internet connection, workshop materials and snacks.&lt;br /&gt;
&lt;br /&gt;
It was the willing participants who shared their training needs via a pre training questionnaire who provided the highest motivation of the training.&lt;br /&gt;
|Topics addressed=Training of Trainers, Digital security, Data mining and visualization , Privacy Advocacy&lt;br /&gt;
|Links about the activity=Articles, videos, photos on-line, ...&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Day 1&lt;br /&gt;
&lt;br /&gt;
1st August 2015&lt;br /&gt;
&lt;br /&gt;
Morning Session&lt;br /&gt;
&lt;br /&gt;
Introductions and Overview of the workshop&lt;br /&gt;
&lt;br /&gt;
Cyber Security : Importance of Internet, KICTANET report and Advocac, Government Censorship and Emerging trends -Naomi Kamau (sharing from personal experience and research)&lt;br /&gt;
&lt;br /&gt;
Afternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security : Part 1- Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Day 2&lt;br /&gt;
&lt;br /&gt;
8th August 2015&lt;br /&gt;
&lt;br /&gt;
Morning session and part of Afternoon session&lt;br /&gt;
&lt;br /&gt;
Data Mining, Data Visualization and Tips on Security Online: Steven Kinuthia&lt;br /&gt;
&lt;br /&gt;
Latter AFternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security: Part 2- Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
Day 3&lt;br /&gt;
&lt;br /&gt;
15th August 2015&lt;br /&gt;
&lt;br /&gt;
Whole day &lt;br /&gt;
&lt;br /&gt;
Privacy Advocacy: Mary Kiio&lt;br /&gt;
&lt;br /&gt;
NB: Daily feedback was given at the end of the session capturing what worked well, what didn't , what could have been done better.&lt;br /&gt;
&lt;br /&gt;
The # for the training on Twitter was #Digitalk_womensafety&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Joyce Nyaruai, the Programmes Officer of AMWIK not only attended the training, took most of the pictures during sessions but also ensured the smooth running of operations at the office.&lt;br /&gt;
&lt;br /&gt;
Mary Kiio of Roshani Consultancy was available during the sessions to ensure smooth flow of presentations from one trainer to another while providing training tips at opportune moments&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=How was it ?&lt;br /&gt;
|Feedbacks=What were the impressions ?&lt;br /&gt;
|START=What will you start doing ?&lt;br /&gt;
|STOP=What will you stop doing ?&lt;br /&gt;
|KEEP=What will you keep doing ?&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mary</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5496</id>
		<title>Digital security for the Association of Media Women, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5496"/>
				<updated>2015-09-09T09:13:41Z</updated>
		
		<summary type="html">&lt;p&gt;Mary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security and Advocacy for the Association of Media Women in Kenya&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2015/08/01&lt;br /&gt;
|End when ?=2015/08/15&lt;br /&gt;
|Where is located the activity ?=Africa , Kenya, Nairobi&lt;br /&gt;
|Geo-localization of the activity ?=-1.222307940719, 36.8701171875&lt;br /&gt;
|Who organize it=Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=Association of Media Women in Kenya (AMWIK) members&lt;br /&gt;
|How many people trained=9&lt;br /&gt;
|Motivations for organizing training=When the femh3ck flash training in Nairobi came to an end, one of the participants who was from AMWIK approached Mary Kiio of Roshani COnsultancy Services and requested if the company would consider training their members as the issues highlighted were very pertinent to what women go through in the country.&lt;br /&gt;
&lt;br /&gt;
A few days later an email from the secretariat of AMWIK inquiring on if we could share on the outcomes of the femh3ck training and a request on if we can engage in other similar activities and/or platforms lead to the discussion of holding a three day training for its members over the month of August on Saturdays for three consecutive weekends.&lt;br /&gt;
&lt;br /&gt;
Though both companies did not have any funding for the training , there was an agreement that Roshani Consultancy Services would avail facilitators who would be willing to share information with no pay.AMWIK on the other hand committed to identify participants who are willing to attend training with the aim of being the future trainings. AMWIK also provided office space, Internet connection, workshop materials and snacks.&lt;br /&gt;
&lt;br /&gt;
It was the willing participants who shared their training needs via a pre training questionnaire who provided the highest motivation of the training.&lt;br /&gt;
|Topics addressed=Training of Trainers, Digital security, Data mining and visualization , Privacy Advocacy&lt;br /&gt;
|Links about the activity=Articles, videos, photos on-line, ...&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Day 1&lt;br /&gt;
&lt;br /&gt;
1st August 2015&lt;br /&gt;
&lt;br /&gt;
Morning Session&lt;br /&gt;
&lt;br /&gt;
Introductions and Overview of the workshop&lt;br /&gt;
&lt;br /&gt;
Cyber Security : Importance of Internet, KICTANET report and Advocac, Government Censorship and Emerging trends -Naomi Kamau (sharing from personal experience and research)&lt;br /&gt;
&lt;br /&gt;
Afternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security : Part 1- Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Day 2&lt;br /&gt;
&lt;br /&gt;
8th August 2015&lt;br /&gt;
&lt;br /&gt;
Morning session and part of Afternoon session&lt;br /&gt;
&lt;br /&gt;
Data Mining, Data Visualization and Tips on Security Online: Steven Kinuthia&lt;br /&gt;
&lt;br /&gt;
Latter AFternoon Session&lt;br /&gt;
&lt;br /&gt;
Digital Security: Part 2- Yvonne Oluoch&lt;br /&gt;
&lt;br /&gt;
Day 3&lt;br /&gt;
&lt;br /&gt;
15th August 2015&lt;br /&gt;
&lt;br /&gt;
Whole day &lt;br /&gt;
&lt;br /&gt;
Privacy Advocacy: Mary Kiio&lt;br /&gt;
&lt;br /&gt;
NB: Daily feedback was given at the end of the session capturing what worked well, what didn't , what could have been done better.&lt;br /&gt;
&lt;br /&gt;
Mary Kiio was the key facilitator during the sessions&lt;br /&gt;
&lt;br /&gt;
Joyce Nyaruai, the Programs&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=How was it ?&lt;br /&gt;
|Feedbacks=What were the impressions ?&lt;br /&gt;
|START=What will you start doing ?&lt;br /&gt;
|STOP=What will you stop doing ?&lt;br /&gt;
|KEEP=What will you keep doing ?&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mary</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5495</id>
		<title>Digital security for the Association of Media Women, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5495"/>
				<updated>2015-09-09T08:54:01Z</updated>
		
		<summary type="html">&lt;p&gt;Mary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security and Advocacy for the Association of Media Women in Kenya&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2015/08/01&lt;br /&gt;
|End when ?=2015/08/15&lt;br /&gt;
|Where is located the activity ?=Africa , Kenya, Nairobi&lt;br /&gt;
|Geo-localization of the activity ?=-1.222307940719, 36.8701171875&lt;br /&gt;
|Who organize it=Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=Association of Media Women in Kenya (AMWIK) members&lt;br /&gt;
|How many people trained=9&lt;br /&gt;
|Motivations for organizing training=When the femh3ck flash training in Nairobi came to an end, one of the participants who was from AMWIK approached Mary Kiio of Roshani COnsultancy Services and requested if the company would consider training their members as the issues highlighted were very pertinent to what women go through in the country.&lt;br /&gt;
&lt;br /&gt;
A few days later an email from the secretariat of AMWIK inquiring on if we could share on the outcomes of the femh3ck training and a request on if we can engage in other similar activities and/or platforms lead to the discussion of holding a three day training for its members over the month of August on Saturdays for three consecutive weekends.&lt;br /&gt;
&lt;br /&gt;
Though both companies did not have any funding for the training , there was an agreement that Roshani Consultancy Services would avail facilitators who would be willing to share information with no pay.AMWIK on the other hand committed to identify participants who are willing to attend training with the aim of being the future trainings. AMWIK also provided office space, Internet connection, workshop materials and snacks.&lt;br /&gt;
&lt;br /&gt;
It was the willing participants who shared their training needs via a pre training questionnaire who provided the highest motivation of the training.&lt;br /&gt;
|Links about the activity=Articles, videos, photos on-line, ...&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=How was it ?&lt;br /&gt;
|Feedbacks=What were the impressions ?&lt;br /&gt;
|START=What will you start doing ?&lt;br /&gt;
|STOP=What will you stop doing ?&lt;br /&gt;
|KEEP=What will you keep doing ?&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mary</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5494</id>
		<title>Digital security for the Association of Media Women, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_the_Association_of_Media_Women,_Kenya&amp;diff=5494"/>
				<updated>2015-09-09T08:39:00Z</updated>
		
		<summary type="html">&lt;p&gt;Mary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security and Advocacy for the Association of Media Women in Kenya&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2015/08/01&lt;br /&gt;
|End when ?=2015/08/15&lt;br /&gt;
|Where is located the activity ?=Africa , Kenya, Nairobi&lt;br /&gt;
|Geo-localization of the activity ?=-1.2223079407189943, 36.8701171875&lt;br /&gt;
|Who organize it=Roshani Consultancy Services: Mary Kiio&lt;br /&gt;
|For whom is it organized=Association of Media Women in Kenya members&lt;br /&gt;
|How many people trained=9&lt;br /&gt;
|Links about the activity=Articles, videos, photos on-line, ...&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=How was it ?&lt;br /&gt;
|Feedbacks=What were the impressions ?&lt;br /&gt;
|START=What will you start doing ?&lt;br /&gt;
|STOP=What will you stop doing ?&lt;br /&gt;
|KEEP=What will you keep doing ?&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mary</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=DST%CC%9EKenya%CC%A02&amp;diff=2945</id>
		<title>DST̞Kenya̠2</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=DST%CC%9EKenya%CC%A02&amp;diff=2945"/>
				<updated>2015-07-01T02:43:52Z</updated>
		
		<summary type="html">&lt;p&gt;Mary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Storytelling&lt;br /&gt;
|Context=The f3mhack training for mostly women journalists, bloggers and activists that took place in Nairobi  was timely because it occurred when many people are becoming increasingly aware of the need to be safe online.&lt;br /&gt;
&lt;br /&gt;
By targeting this unique set of participants who have the skills and forums to share the information with the public through articles in the newspapers, broadcast media, blogs and gender activists to learn privacy and security tools, was critical towards furthering the agenda of empowering them with the tools on how they can share more widely on what they learned.&lt;br /&gt;
&lt;br /&gt;
The participants also form a critical group that is often susceptible to cyber attacks due to the nature of their work and there was need for discussion on practical tips that an individual or group could take towards finding tips on how to advocate for private online spaces to be protected. The training was set up to help the participant understand threats from a personal point of view so that one can develop practical steps on privacy advocacy and security that can impact a larger group from a point of understanding.&lt;br /&gt;
&lt;br /&gt;
For the training of university students in Njoro, the training was important to reach out to this group as they are often referred to as the techno savvy generation. They are well versed with the latest sites where they can access free software that would most likely expose them to more dangers. As was evident in the discussions held, the large number of students at the university means that when a cyber crime occurs, the level of sharing that information is very high and the level of stigma also high because the students can easily identify and meet the person who has been offended online due to their close proximity at campus and their daily interactions.&lt;br /&gt;
&lt;br /&gt;
This group was also a critical one to target for the training because it would be considered as an early intervention for the students to start applying the knowledge learned that would be useful to them on campus and when they join the job market. Some of the students were in their last semester so it would be great to follow up with them after a year to see the impact the training had on their work lives.&lt;br /&gt;
&lt;br /&gt;
The other main critical reason why targeting the university was critical is because through organizing the training through the gender department, their was the hope that we would be strengthening the existing structures of privacy safety online but more so to introduce them to the need to set up modules on privacy advocacy and security that would be streamlined in the curriculum or if not existing forums to discuss on various issues.&lt;br /&gt;
&lt;br /&gt;
|Motivation=My motivation to be  a digital security and privacy advocacy trainer started two years ago when as a member of the International Association of Women in Radio and Television (IAWRT),both locally and internationally , went through a Trainers of Trainers training that was facilitated by the Association for Progressive Communications (APC) on how to stay safe online for women. Upon conclusion of the training I conducted trainings for media, civil society, government officials using the tools especially security in a box,among others. Thereafter,, I was a panelist during a roundtable discussion in Morocco during an IAWRT biennial conference, where I had the opportunity to share on digital security citing case studies in Kenya. &lt;br /&gt;
&lt;br /&gt;
Mid last year I was selected by the IAWRT-Kenya chapter to be the lead facilitator for round tables on how various counties in Kenya could spearhead initiatives on how digital security for women could be enhanced using mechanisms that were available to them. The stakeholders at the roundtable forums were drawn from the police-gender desk, county government officials mostly from the departments that deal with women, universities-especially those with gender departments, women civil society organizations and media. Each county I went to came up with its own unique action plan on how it could tackle security for women online.&lt;br /&gt;
&lt;br /&gt;
When I attended the Gender Technical Institute last year in Germany, I went with one mission - to identify new areas of privacy advocacy and digital security that I could adapt as I continue my work in training and facilitating roundtable discussions in the future, as I seek to reach out to different target groups of participants. &lt;br /&gt;
&lt;br /&gt;
Here the idea of flash trainings and being innovative with how we advocate for security skills was sharpened. I also learned new digital security tools that I could share that are in line with the changing times. These were the tools that I weaved into my trainings during the f3mhack conducted in Kenya&lt;br /&gt;
&lt;br /&gt;
I have met so many women who have gone through cyber bullying and seen the impacts that it has had on their lives. For me training on privacy advocacy and digital security is more than just training it is about sharing critical information that will change the lives of women in online spaces.&lt;br /&gt;
&lt;br /&gt;
|Outcomes=The Nairobi  f3mhack training was the first I ever had to try out a flash training rather than my usual 2-3 days training. Packaging critical training points, while still providing room for group discussions and feedback within an hour was not an easy task but it was fun. Now I know how to repackage trainings that can suite my clientele needs. This is especially crucial when introducing a new training to a group and when they provide me with a limited time in a day, to give them a glimpse of what digital and privacy advocacy training would be like while still leaving them with critical information they can apply privately or in a group.&lt;br /&gt;
&lt;br /&gt;
Through the f3mhack flash training in Nairobi I have been given the opportunity to provide a longer workshop for a journalists association for women at their offices. I am also looking into how I can work with some of the bloggers who turned up who expressed interest on how we can engage further and also attend other likeminded forums within the country and outside.At the university, I plan to go back and tap into their existing discussion forums so as to engage them further on online topics. This is a model I plan to replicate in other universities where I have worked with or interacted with in the past.&lt;br /&gt;
&lt;br /&gt;
For the training groups and roundtables that I had interacted with in the past, I hope to find resources that would enable me to go round and share the new knowledge I have received. At the same time I also hope to follow up on the impact the training has had especially on the initiatives they had developed in the forums (roundtables) that they were keen to keep following through on and see if I can provide any technical expertise that would further their cause.&lt;br /&gt;
&lt;br /&gt;
As for the trainings I will keep conducting (my main work is being a training) , I shall seek to adapt online sessions where applicable.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mary</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=DST%CC%9EKenya%CC%A02&amp;diff=2944</id>
		<title>DST̞Kenya̠2</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=DST%CC%9EKenya%CC%A02&amp;diff=2944"/>
				<updated>2015-07-01T02:33:08Z</updated>
		
		<summary type="html">&lt;p&gt;Mary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Storytelling&lt;br /&gt;
|Context=The f3mhack training for mostly women journalists, bloggers and activists that took place in Nairobi  was timely because it occurred when many people are becoming increasingly aware of the need to be safe online.&lt;br /&gt;
&lt;br /&gt;
By targeting this unique set of participants who have the skills and forums to share the information with the public through articles in the newspapers, broadcast media, blogs and gender activists to learn privacy and security tools, was critical towards furthering the agenda of empowering them with the tools on how they can share more widely on what they learned.&lt;br /&gt;
&lt;br /&gt;
The participants also form a critical group that is often susceptible to cyber attacks due to the nature of their work and there was need for discussion on practical tips that an individual or group could take towards finding tips on how to advocate for private online spaces to be protected. The training was set up to help the participant understand threats from a personal point of view so that one can develop practical steps on privacy advocacy and security that can impact a larger group from a point of understanding.&lt;br /&gt;
&lt;br /&gt;
For the training of university students in Njoro, the training was important to reach out to this group as they are often referred to as the techno savvy generation. They are well versed with the latest sites where they can access free software that would most likely them to more dangers. As was evident in the discussions held, the large number of students at the university means that when a cyber crime occurs, the level of sharing that information is very high and the level of stigma also high because the students can easily identify and meet the person who has been offended online due to the proximity of the campus and their daily interactions.&lt;br /&gt;
&lt;br /&gt;
This group was also a critical one to target for the training because it would be considered as an early intervention for the students to start applying the knowledge learned that would be useful to them on campus and when they join the job market. Some of the students were in their last semester so it would be great to follow up with them after a year to see the impact the training had on their work lives.&lt;br /&gt;
&lt;br /&gt;
The other main critical reason why targeting the university was critical is because through organizing the training through the gender department, their was the hope that we would be strengthening the existing structures of privacy safety online but more so to introduce them to the need to set up modules on privacy advocacy and security that would be streamlined in the curriculum or if not existing forums to discuss on various issues.&lt;br /&gt;
|Motivation=My motivation to be  a digital security and privacy advocacy trainer started two years ago when as a member of the International Association of Women in Radio and Television (IAWRT) both locally and internationally went through a Trainers of Trainers training that was facilitated by the Association for Progressive Communications (APC) on how to stay safe online for women Upon conclusion of the training I conducted trainings for media, civil society, government officials using the tools especially security in a box among others. thereafter, I was a panelist during a roundtable discussion in Morocco during an IAWRT biennial conference where I had the opportunity to share on digital security citing case studies in Kenya. &lt;br /&gt;
&lt;br /&gt;
Mid last year I was selected by the IAWRT-Kenya chapter to be the lead facilitator for round tables on how various counties in Kenya could spearhead initiatives on how digital security for women could be enhanced using mechanisms that were available to them. The stakeholders at the roundtable forums were drawn from the police-gender desk, county government officials mostly from the departments that deal with women, universities-especially those with gender departments, women civil society organizations and media. Each county I went to came up with its own unique action plan on how it could tackle gender online violence.&lt;br /&gt;
&lt;br /&gt;
When I attended the Gender Technical Institute last year In Germany, I went with one mission to identify new areas of privacy advocacy and digital security that I could adapt as I continue my work in training and facilitating roundtable discussions in the future as I seek to reach out to different target groups participants. &lt;br /&gt;
&lt;br /&gt;
Here the idea of flash trainings and being innovative with how we advocate for security skills was sharpened. I also learned new digital security tools that I could share that are in line with the changing times. These were the tools that I weaved into my trainings during the f3mhack conducted in Kenya&lt;br /&gt;
&lt;br /&gt;
I have met so many women who have gone through cyber bullying and seen the impacts that it has had on their lives. For me training on privacy advocacy and digital security is more than just training it is about sharing critical information that will change the lives of women in online spaces.&lt;br /&gt;
|Outcomes=The Nairobi  f3mhack training was the first I ever had to try out a flash training rather than my usual 2-3 days training. Packaging critical training points, while still providing room for group discussions and feedback within an hour was not an easy task but it was fun. Now I know how to repackage trainings that can suite my clientele needs. This is especially crucial when introducing a new training to a group and when they provide me with a limited time in a day, to give them a glimpse of what digital and privacy advocacy training would be like while still leaving them with critical information they can apply privately or in a group.&lt;br /&gt;
&lt;br /&gt;
Through the f3mhack flash training in Nairobi I have been given the opportunity to provide a longer workshop for a journalists association for women at their offices. I am also looking into how I can work with some of the bloggers who turned up who expressed interest on how we can engage further and also attend other likeminded forums within the country and outside.At the university, I plan to go back and tap into their existing discussion forums so as to engage them further on online topics. &lt;br /&gt;
&lt;br /&gt;
For the training groups and roundtables that I had interacted with in the past, I hope to find resources that would enable me to go round and share the new knowledge I have received. At the same time I also hope to follow up on the impact the training has had especially on the initiatives they had developed in the forums that they were keen to keep following through on and see if I can provide any technical expertise that would further their cause.&lt;br /&gt;
&lt;br /&gt;
As for the trainings I will keep conducting (my main work is being a training) , I shall seek to adapt online sessions where applicable.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mary</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=DST%CC%9EKenya%CC%A02&amp;diff=2943</id>
		<title>DST̞Kenya̠2</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=DST%CC%9EKenya%CC%A02&amp;diff=2943"/>
				<updated>2015-07-01T02:00:55Z</updated>
		
		<summary type="html">&lt;p&gt;Mary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Storytelling&lt;br /&gt;
|Context=The training for mostly women journalists, bloggers and activists that took place in Nairobi  was timely because it occurred when many people are becoming increasingly aware of the need to be safe online.&lt;br /&gt;
&lt;br /&gt;
By targeting this unique set of participants who have the skills and forums to share the information with the public through articles in the newspapers, broadcast media, blogs and gender activists to learn privacy and security tools, was critical towards furthering the agenda of empowering them with the tools on how they can share more widely on what they learned.&lt;br /&gt;
&lt;br /&gt;
The participants also form a critical group that is often susceptible to cyber attacks due to the nature of their work and there was need for discussion on practical tips that an individual or group could take towards finding tips on how to advocate for private online spaces to be protected. The training was set up to help the participant understand threats from a personal point of view so that one can develop practical steps on privacy advocacy and security that can impact a larger group from a point of understanding.&lt;br /&gt;
&lt;br /&gt;
For the training of university students in Njoro, the training was important to reach out to this group as they are often referred to as the techno savvy generation. They are well versed with the latest sites where they can access free software that would most likely them to more dangers. As was evident in the discussions held, the large number of students at the university means that when a cyber crime occurs, the level of sharing that information is very high and the level of stigma also high because the students can easily identify and meet the person who has been offended online due to the proximity of the campus and their daily interactions.&lt;br /&gt;
&lt;br /&gt;
This group was also a critical one to target for the training because it would be considered as an early intervention for the students to start applying the knowledge learned that would be useful to them on campus and when they join the job market. Some of the students were in their last semester so it would be great to follow up with them after a year to see the impact the training had on their work lives.&lt;br /&gt;
&lt;br /&gt;
The other main critical reason why targeting the university was critical is because through organizing the training through the gender department, their was the hope that we would be strengthening the existing structures of privacy safety online but more so to introduce them to the need to set up modules on privacy advocacy and security that would be streamlined in the curriculum or if not existing forums to discuss on various issues.&lt;br /&gt;
|Motivation=My motivation to be  a digital security and privacy advocacy trainer started two years ago when as a member of the International Association of Women in Radio and Television (IAWRT) both locally and internationally went through a Trainers of Trainers training that was facilitated by the Association for Progressive Communications (APC) on how to stay safe online for women Upon conclusion of the training I conducted trainings for media, civil society, government officials using the tools especially security in a box among others. thereafter, I was a panelist during a roundtable discussion in Morocco during an IAWRT biennial conference where I had the opportunity to share on digital security citing case studies in Kenya. &lt;br /&gt;
&lt;br /&gt;
Mid last year I was selected by the IAWRT-Kenya chapter to be the lead facilitator for round tables on how various counties in Kenya could spearhead initiatives on how digital security for women could be enhanced using mechanisms that were available to them. The stakeholders at the roundtable forums were drawn from the police-gender desk, county government officials mostly from the departments that deal with women, universities-especially those with gender departments, women civil society organizations and media. Each county I went to came up with its own unique action plan on how it could tackle gender online violence.&lt;br /&gt;
&lt;br /&gt;
When I attended the Gender Technical Institute last year In Germany, I went with one mission to identify new areas of privacy advocacy and digital security that I could adapt as I continue my work in training and facilitating roundtable discussions in the future as I seek to reach out to different target groups participants. &lt;br /&gt;
&lt;br /&gt;
Here the idea of flash trainings and being innovative with how we advocate for security skills was sharpened. I also learned new digital security tools that I could share that are in line with the changing times.&lt;br /&gt;
&lt;br /&gt;
I have met so many women who have gone through cyber bullying and seen the impacts that it has had on their lives. For me training on privacy advocacy and digital security is more than just training it is about sharing critical information that will change the lives of women in online spaces.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mary</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=DST%CC%9EKenya%CC%A02&amp;diff=2942</id>
		<title>DST̞Kenya̠2</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=DST%CC%9EKenya%CC%A02&amp;diff=2942"/>
				<updated>2015-07-01T01:22:30Z</updated>
		
		<summary type="html">&lt;p&gt;Mary: Created page with &amp;quot;{{Storytelling |Context=The training for mostly women journalists, bloggers and activists that took place in Nairobi  was timely because it occurred when many people are becom...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Storytelling&lt;br /&gt;
|Context=The training for mostly women journalists, bloggers and activists that took place in Nairobi  was timely because it occurred when many people are becoming increasingly aware of the need to be safe online.&lt;br /&gt;
&lt;br /&gt;
By targeting this unique set of participants who have the skills and forums to share the information with the public through articles in the newspapers, broadcast media, blogs and gender activists to learn privacy and security tools, was critical towards furthering the agenda of empowering them with the tools on how they can share more widely on what they learned.&lt;br /&gt;
&lt;br /&gt;
The participants also form a critical group that is often susceptible to cyber attacks due to the nature of their work and there was need for discussion on practical tips that an individual or group could take towards finding tips on how to advocate for private online spaces to be protected. The training was set up to help the participant understand threats from a personal point of view so that one can develop practical steps on privacy advocacy and security that can impact a larger group from a point of understanding.&lt;br /&gt;
&lt;br /&gt;
For the training of university students in Njoro, the training was important to reach out to this group as they are often referred to as the techno savvy generation. They are well versed with the latest sites where they can access free software that would most likely them to more dangers. As was evident in the discussions held, the large number of students at the university means that when a cyber crime occurs, the level of sharing that information is very high and the level of stigma also high because the students can easily identify and meet the person who has been offended online due to the proximity of the campus and their daily interactions.&lt;br /&gt;
&lt;br /&gt;
This group was also a critical one to target for the training because it would be considered as an early intervention for the students to start applying the knowledge learned that would be useful to them on campus and when they join the job market. Some of the students were in their last semester so it would be great to follow up with them after a year to see the impact the training had on their work lives.&lt;br /&gt;
&lt;br /&gt;
The other main critical reason why targeting the university was critical is because through organizing the training through the gender department, their was the hope that we would be strengthening the existing structures of privacy safety online but more so to introduce them to the need to set up modules on privacy advocacy and security that would be streamlined in the curriculum or if not existing forums to discuss on various issues.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Mary</name></author>	</entry>

	</feed>