<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Zara</id>
		<title>Gender and Tech Resources - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Zara"/>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php/Special:Contributions/Zara"/>
		<updated>2026-05-22T07:19:53Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.26.2</generator>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Training:_Training_design_IV&amp;diff=1681</id>
		<title>Training: Training design IV</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Training:_Training_design_IV&amp;diff=1681"/>
				<updated>2015-06-02T15:15:24Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=Training design IV: priorities |Duration (hours)=1.5 |Learning objectives=Thinking through concrete examples of prioritisation in designing t...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Training design IV: priorities&lt;br /&gt;
|Duration (hours)=1.5&lt;br /&gt;
|Learning objectives=Thinking through concrete examples of prioritisation in designing trainings.&lt;br /&gt;
|Prerequisites=Participants should have (recently) carried out Training Skills II: session design, and be with the same group of people that they also worked with for that session.&lt;br /&gt;
|Methodology=Ask participants to get into the same groups as for the Training Skills II session, with the same situational specifications (day length and participant profile).&lt;br /&gt;
&lt;br /&gt;
Explain that this is an exercise on prioritisation – given financial constraints, how would we decide to spend our funds? &lt;br /&gt;
&lt;br /&gt;
Give each group the same amount of (limited) funds for them to decide to spend on either:&lt;br /&gt;
&lt;br /&gt;
* another international trainer&lt;br /&gt;
* a translator&lt;br /&gt;
* boosted internet service&lt;br /&gt;
* one more day of training&lt;br /&gt;
* comfort material, like snacks&lt;br /&gt;
* comfortable accommodation &lt;br /&gt;
&lt;br /&gt;
Groups have 15 minutes to decide how they will use their money, then come back into plenary and ask one person from each group to explain their decision.&lt;br /&gt;
&lt;br /&gt;
Encourage the group to debate these decisions.&lt;br /&gt;
|Number of facilitators involved=1&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=None&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Training:_Training_design_III&amp;diff=1680</id>
		<title>Training: Training design III</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Training:_Training_design_III&amp;diff=1680"/>
				<updated>2015-06-02T15:11:42Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=Training design III: training structure |Kind of learning session=Train of trainers |Duration (hours)=2 |Learning objectives=To come up with...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Training design III: training structure&lt;br /&gt;
|Kind of learning session=Train of trainers&lt;br /&gt;
|Duration (hours)=2&lt;br /&gt;
|Learning objectives=To come up with various activities along the ADIDS/experiential learning cycle.&lt;br /&gt;
|Prerequisites=Participants should have carried out Training Design sessions I and II prior to this session. Facilitators should be familiar with ADIDS/experiential learning cycles.&lt;br /&gt;
|Methodology=Split participants into groups, and give each of the groups a topic to work on, such as 'password management', 'holistic security', file management, etc. &lt;br /&gt;
&lt;br /&gt;
Then, go through the following steps with them: &lt;br /&gt;
&lt;br /&gt;
* Activity&lt;br /&gt;
* Discussion&lt;br /&gt;
* Input&lt;br /&gt;
* Deepening&lt;br /&gt;
* Synthesis&lt;br /&gt;
&lt;br /&gt;
Explain where this structure comes from, and how it differs from traditional pedagogical approaches. &lt;br /&gt;
&lt;br /&gt;
Ask each small group to tackle the topic given to them using this approach – give them each a large piece of paper with the ADIDS cycle written on it, and ask them to come up with topic specific activities/sessions along each step of the cycle. &lt;br /&gt;
&lt;br /&gt;
Their aim should be thinking about how they would approach the topic in question in the ADIDS training structure. &lt;br /&gt;
&lt;br /&gt;
After 30 minutes in small groups, ask them to come back to plenary, and one person from each group should report back to the bigger group on what they came up with. &lt;br /&gt;
&lt;br /&gt;
If there are any new activities or ideas on how to tackle the topic in question, it might be useful for the facilitator to make note of them.&lt;br /&gt;
|Number of facilitators involved=1&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=EXAMPLES OF SESSION DESIGNS WITH ADIDS: Level-Up: https://level-up.cc &lt;br /&gt;
&lt;br /&gt;
Preparing sessions with ADIDS:  &lt;br /&gt;
https://www.level-up.cc/leading-trainings/preparing-ADIDS-sessionsBy C5 &lt;br /&gt;
&lt;br /&gt;
Creating a Safe Space: https://www.level-up.cc/resources-for-trainers/holistic/safe-spaces, by Sandra&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Security:_Password_security&amp;diff=1679</id>
		<title>Security: Password security</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Security:_Password_security&amp;diff=1679"/>
				<updated>2015-06-02T15:09:20Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=Password security |Kind of learning session=Train of trainers, 101 |Tutorial category=Energiser |Duration (hours)=0.5 |Learning objectives=To...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Password security&lt;br /&gt;
|Kind of learning session=Train of trainers, 101&lt;br /&gt;
|Tutorial category=Energiser&lt;br /&gt;
|Duration (hours)=0.5&lt;br /&gt;
|Learning objectives=To understand the need for secure passwords, and to be aware of other people's experiences in this space.&lt;br /&gt;
|Prerequisites=Facilitators should be able to install, use and explain password management software like LastPass or Keepass, and to be able to explain and answer questions about passwords. &lt;br /&gt;
&lt;br /&gt;
Facilitators also need to come up with a few key statements and questions for the 'secure password race', as described below.&lt;br /&gt;
|Methodology=This session has two parts: first, an activity to get people to understand different levels of password security, and secondly, a hand on part of learning about the password management tools. This tutorial will only cover the activity in detail – please refer to Security in a Box for more details on how to use and install the various tools. &lt;br /&gt;
&lt;br /&gt;
Get participants to line up at the back of the room – the aim of this activity is to reach the far wall the fastest, like a race. &lt;br /&gt;
&lt;br /&gt;
This, though, is a 'secure password race'. By asking questions about participants use of secure passwords, they will move forward or backwards, depending on the answer.&lt;br /&gt;
&lt;br /&gt;
For example: &lt;br /&gt;
&lt;br /&gt;
* if you have used the same password for two or more accounts, take 3 steps back &lt;br /&gt;
* if you already use Keepass or a secure password management tool, take 2 steps forward &lt;br /&gt;
* if someone else knows the password to your main email account, take 2 steps back &lt;br /&gt;
&lt;br /&gt;
Once at least one participant has reached the 'goal line', bring the participants back into a group, and have a discussion around the characteristics of good password management, based on the activity. One of the facilitators could make a list of these characteristics on a flip chart.&lt;br /&gt;
&lt;br /&gt;
For the next part of the session, do a hands on introduction to password management tools.&lt;br /&gt;
|Number of facilitators involved=1&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=Security in a box&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Training:_Training_design_II&amp;diff=1677</id>
		<title>Training: Training design II</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Training:_Training_design_II&amp;diff=1677"/>
				<updated>2015-06-02T15:07:04Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=Training design II: planning sessions |Kind of learning session=Train of trainers |Duration (hours)=2 |Learning objectives=Getting accustomed...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Training design II: planning sessions&lt;br /&gt;
|Kind of learning session=Train of trainers&lt;br /&gt;
|Duration (hours)=2&lt;br /&gt;
|Learning objectives=Getting accustomed to adjusting training schedules and workshop styles dependent upon the profile of participants.&lt;br /&gt;
|Prerequisites=Facilitators should be experienced in designing and carrying out trainings.&lt;br /&gt;
&lt;br /&gt;
Prepare beforehand a participant profile – ideally one that either the facilitators are familiar with – with lots of details about what the person likes, and their background, both professional and personal.&lt;br /&gt;
|Methodology=Put the participants into groups, and give each group a different time frame, ranging from 1 day to 5 days. &lt;br /&gt;
&lt;br /&gt;
Give the group the participant profile, and ask each group to design a security and privacy training for this person. &lt;br /&gt;
&lt;br /&gt;
In addition to the specific training schedule, ask each group to keep a note of any challenges that they come across. &lt;br /&gt;
&lt;br /&gt;
After 30-40 minutes in small groups, bring the participants back to plenary, and ask them to share any major challenges that they faced. &lt;br /&gt;
&lt;br /&gt;
Get one person from each small group to talk the rest of the group through the training schedule that they came up with – try and keep these report backs reasonably short.&lt;br /&gt;
|Number of facilitators involved=1-2&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=EXAMPLES OF SESSION DESIGNS WITH ADIDS: Level-Up: https://level-up.cc &lt;br /&gt;
&lt;br /&gt;
Preparing sessions with ADIDS:  &lt;br /&gt;
https://www.level-up.cc/leading-trainings/preparing-ADIDS-sessionsBy C5 &lt;br /&gt;
&lt;br /&gt;
Creating a Safe Space: https://www.level-up.cc/resources-for-trainers/holistic/safe-spaces, by Sandra&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Gender_Tech_Researching_VAW&amp;diff=1676</id>
		<title>Gender Tech Researching VAW</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Gender_Tech_Researching_VAW&amp;diff=1676"/>
				<updated>2015-06-02T15:05:22Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=Documenting and researching violence against women |Duration (hours)=1 |Learning objectives=Sharing experiences with each other on the topic...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Documenting and researching violence against women&lt;br /&gt;
|Duration (hours)=1&lt;br /&gt;
|Learning objectives=Sharing experiences with each other on the topic of documenting and researching violence against women, and having an area to discuss openly any problems participants may have come across in this area&lt;br /&gt;
|Prerequisites=Facilitators should be experienced researchers in the area of violence against women, and be able to share strategies and tips, in case other participants have not had as much experience.&lt;br /&gt;
|Methodology=Get the participants (presumably a reasonably small group) to sit in a circle. &lt;br /&gt;
&lt;br /&gt;
Go around the group and ask people to introduce themselves, and what drew them to the session. If relevant, ask them to mention whether they have had any past experience specific to this topic or another related one. &lt;br /&gt;
&lt;br /&gt;
Facilitators could write on a flipchart at the front of the room a list of questions that are raised about the topics – such as, &lt;br /&gt;
&lt;br /&gt;
* Research methods&lt;br /&gt;
* Connection between online and offline violence &lt;br /&gt;
* Definition of violence against women online &lt;br /&gt;
* Datasets available on violence against women &lt;br /&gt;
&lt;br /&gt;
The session is intended more as a discussion space than a workshop session – so, if the discussion moves in a different direction, let participants air their concerns and questions.&lt;br /&gt;
|Number of facilitators involved=1-2&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=[http://www.who.int/mediacentre/factsheets/fs239/en/ WHO study on violence against women] &lt;br /&gt;
[https://www.apc.org/en/projects/erotics-exploratory-research-project-sexuality-and-0 APC Women's Rights Project - Erotics study] &lt;br /&gt;
[https://content.bytesforall.pk/CaseStudies-TechnologyDrivenViolenceAgainstWomen Bytes for All Pakistan case studies]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Training:_Training_design_I&amp;diff=1675</id>
		<title>Training: Training design I</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Training:_Training_design_I&amp;diff=1675"/>
				<updated>2015-06-02T14:27:06Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Training design I: Understanding participants&lt;br /&gt;
|Kind of learning session=Train of trainers&lt;br /&gt;
|Tutorial category=Discussion&lt;br /&gt;
|Duration (hours)=1.5&lt;br /&gt;
|Learning objectives=Understanding the cultural and societal context that different participants are coming from, to help participants design the most appropriate and effective training workshop schedule.&lt;br /&gt;
|Prerequisites=Facilitators should have a solid understanding of training techniques, and ideally have facilitated training workshops before.&lt;br /&gt;
|Methodology=Distribute big sheets of paper to participants.&lt;br /&gt;
&lt;br /&gt;
Ask them to draw a typical participant who might attend one of their trainings – if it helps, encourage them to remember past, real participants, and base this upon them.&lt;br /&gt;
&lt;br /&gt;
Ask them to label the following areas of the body with the following topics: &lt;br /&gt;
&lt;br /&gt;
On the ground: (ie. Getting context) &lt;br /&gt;
* where are they coming from?  &lt;br /&gt;
* what are the problems weighing them down? &lt;br /&gt;
&lt;br /&gt;
* chest area: fears, values, what's important to them?  &lt;br /&gt;
* right hand: what skills are they bringing?  &lt;br /&gt;
* left hand: what skills do they need?  &lt;br /&gt;
* head: (left of head) what do they need to know? (inside the head) what do they want to know? (right of head) what do they know? &lt;br /&gt;
&lt;br /&gt;
Once participants have drawn their 'typical participant', get them together in smaller groups of 3-4 people, and talk through the differences in their typical participants and how this might affect the structure and style of their workshop. (note: try to avoid 'content' for now). &lt;br /&gt;
&lt;br /&gt;
After 15-20 minutes, bring the group back to plenary, and ask people to think through and discuss how they knew this information about participants, and how easy it is to get this understanding in time to help really design the workshop, when meeting a new group of workshop attendees. &lt;br /&gt;
&lt;br /&gt;
Try and come up with a list of points of how to get this information, and how different data points about the attendees would inform various workshop style and strategy decisions.&lt;br /&gt;
|Number of facilitators involved=2&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=None&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Training:_Training_design_I&amp;diff=1674</id>
		<title>Training: Training design I</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Training:_Training_design_I&amp;diff=1674"/>
				<updated>2015-06-02T14:26:20Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=Training design I: Understanding participants |Kind of learning session=Train of trainers |Tutorial category=Discussion |Duration (hours)=1.5...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Training design I: Understanding participants&lt;br /&gt;
|Kind of learning session=Train of trainers&lt;br /&gt;
|Tutorial category=Discussion&lt;br /&gt;
|Duration (hours)=1.5&lt;br /&gt;
|Learning objectives=Understanding the cultural and societal context that different participants are coming from, to help participants design the most appropriate and effective training workshop schedule.&lt;br /&gt;
|Prerequisites=Facilitators should have a solid understanding of training techniques, and ideally have facilitated training workshops before.&lt;br /&gt;
|Methodology=Distribute big sheets of paper to participants.&lt;br /&gt;
&lt;br /&gt;
Ask them to draw a typical participant who might attend one of their trainings – if it helps, encourage them to remember past, real participants, and base this upon them.&lt;br /&gt;
&lt;br /&gt;
Ask them to label the following areas of the body with the following topics: &lt;br /&gt;
&lt;br /&gt;
On the ground: (ie. Getting context)&lt;br /&gt;
    where are they coming from? &lt;br /&gt;
    what are the problems weighing them down? &lt;br /&gt;
&lt;br /&gt;
chest area: fears, values, what's important to them? &lt;br /&gt;
right hand: what skills are they bringing? &lt;br /&gt;
left hand: what skills do they need? &lt;br /&gt;
head: (left of head) what do they need to know? (inside the head) what do they want to know? (right of head) what do they know? &lt;br /&gt;
&lt;br /&gt;
Once participants have drawn their 'typical participant', get them together in smaller groups of 3-4 people, and talk through the differences in their typical participants and how this might affect the structure and style of their workshop. (note: try to avoid 'content' for now). &lt;br /&gt;
&lt;br /&gt;
After 15-20 minutes, bring the group back to plenary, and ask people to think through and discuss how they knew this information about participants, and how easy it is to get this understanding in time to help really design the workshop, when meeting a new group of workshop attendees. &lt;br /&gt;
&lt;br /&gt;
Try and come up with a list of points of how to get this information, and how different data points about the attendees would inform various workshop style and strategy decisions.&lt;br /&gt;
|Number of facilitators involved=2&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=None&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Training:_Training_Skills_I&amp;diff=1673</id>
		<title>Training: Training Skills I</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Training:_Training_Skills_I&amp;diff=1673"/>
				<updated>2015-06-02T14:15:50Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=Training skills I |Kind of learning session=Train of trainers |Tutorial category=Discussion |Duration (hours)=1 |Learning objectives=Thinking...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Training skills I&lt;br /&gt;
|Kind of learning session=Train of trainers&lt;br /&gt;
|Tutorial category=Discussion&lt;br /&gt;
|Duration (hours)=1&lt;br /&gt;
|Learning objectives=Thinking through what components are needed within a successful training workshop, primarily from the side of the trainer.&lt;br /&gt;
|Prerequisites=Ideally, facilitators should be experienced trainers (in whatever field) – or have had significant experience working with/around trainers and in workshop settings.&lt;br /&gt;
|Methodology=Ask participants to get into pairs, and brainstorm answers to the following questions: &lt;br /&gt;
&lt;br /&gt;
* Why do you want to be a trainer &lt;br /&gt;
* What are the qualities of a good trainer? &lt;br /&gt;
* Which of these qualities do you think you have? &lt;br /&gt;
&lt;br /&gt;
It might be helpful to give the participants post it notes to write their answers down on – especially the different qualities, and to cluster them at the end of the partner work.&lt;br /&gt;
&lt;br /&gt;
After 15-20 minutes in pairs, bring the group back to plenary, and ask them to report back on what they discussed, by going through the three questions again. &lt;br /&gt;
&lt;br /&gt;
Think about the following question in the big group, and bring these up for a group discussion:&lt;br /&gt;
&lt;br /&gt;
Does it take a certain type of personality to be a good trainer?&lt;br /&gt;
&lt;br /&gt;
As a wrap up, try to lead the participants to the understanding that with patience and self awareness, anyone can be a good trainer – people need to be committed to learning and improving their training styles throughout the process, though.&lt;br /&gt;
|Number of facilitators involved=1-2&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=None&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Privacy_From_data_shadows_to_data_brokers&amp;diff=1672</id>
		<title>Privacy From data shadows to data brokers</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Privacy_From_data_shadows_to_data_brokers&amp;diff=1672"/>
				<updated>2015-06-02T14:11:26Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=From data shadows to data brokers |Kind of learning session=Gender and Tech, Other … |Tutorial category=Privacy test |Duration (hours)=1 |L...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=From data shadows to data brokers&lt;br /&gt;
|Kind of learning session=Gender and Tech, Other …&lt;br /&gt;
|Tutorial category=Privacy test&lt;br /&gt;
|Duration (hours)=1&lt;br /&gt;
|Learning objectives=Thinking through how the data traces we leave are used, and how they fit into business models of the companies who have access to them.&lt;br /&gt;
|Prerequisites=The group should already have carried out 'Analogue data shadows' session, and facilitators should have a good understanding of how the 'data industry' works, and be able to advise the groups and answer questions they might have on how their data is used by different service providers. &lt;br /&gt;
&lt;br /&gt;
Facilitators should prepare beforehand 2 sets of small slips of paper: firstly, ones with different digital behaviours or actions on them, to distribute one per participant during the exercise. &lt;br /&gt;
&lt;br /&gt;
Samples of 'digital behaviours' could include: &lt;br /&gt;
&lt;br /&gt;
You just downloaded the Spotify playlist “girls just wanna have fun”&lt;br /&gt;
You booked flights to Honolulu&lt;br /&gt;
You Skyped with your best friend for 2 hours &lt;br /&gt;
You downloaded Snapchat &lt;br /&gt;
You lost your iPhone, and used the “Find my iPhone” app to find it &lt;br /&gt;
You used wifi in an airport, and gave your email address and personal details in order to get access.   &lt;br /&gt;
&lt;br /&gt;
Secondly: digital behaviours that people can do to others, such as:&lt;br /&gt;
&lt;br /&gt;
You just invited everyone in your group to Google plus&lt;br /&gt;
You sent everyone your geocoordinates to meet up for a party later &lt;br /&gt;
You just signed up for an app that needs access to all of your contacts&lt;br /&gt;
&lt;br /&gt;
Make sure there is at least one 'digital action', and one digital behaviour that people do to others, per participant.&lt;br /&gt;
|Methodology=Put participants in groups of 5, and ask them to put their 'data shadow' illustrations together on one big piece of paper. &lt;br /&gt;
&lt;br /&gt;
Give each participant an envelope, and ask them to stick it on their individual data shadow images – then, distribute the slips of paper so that each participant has at least one digital behaviour, and one digital action that they do to others. &lt;br /&gt;
&lt;br /&gt;
Ask them to put these slips of paper into their respective envelopes, so that every data shadow illustration will have a set of papers in their envelopes describing different online activities. &lt;br /&gt;
&lt;br /&gt;
Now, ask each group to leave their collective tables to go to another table, and look at another groups' collective data shadow.&lt;br /&gt;
&lt;br /&gt;
Each group now takes the role of 'data broker', and is asked to develop a profile of the group based on the contents of the envelope, and their digital behaviours.&lt;br /&gt;
&lt;br /&gt;
One of the facilitators should now take the role of an “angel investor”, who is looking to invest in a new initiative around the use of data, and participants, in their groups, are tasked with figuring out a way to sell that data to an “angel investor” – ie. one of the facilitators. &lt;br /&gt;
&lt;br /&gt;
Give groups 20 minutes to plan a “pitch” to the angel investor, then bring the group back to plenary.&lt;br /&gt;
&lt;br /&gt;
With the “angel investor” at the front, ask the groups to perform their pitches – remind the groups that they are trying to convince the angel investor to give them money to develop their project, and that the data they have is more valuable than other groups.&lt;br /&gt;
&lt;br /&gt;
To round the session off, get the angel investor/facilitator to pick the pitch that they liked best – they are the winner! &lt;br /&gt;
&lt;br /&gt;
The facilitator could give a quick round up to the group of how – though this exercise was obviously heavily fictionalised – many companies' business model relies heavily upon personal data of their users, and that they “create value” from it in this way.&lt;br /&gt;
|Number of facilitators involved=2&lt;br /&gt;
|Technical needs=None – paper and offline materials as above, ideally a Polaroid camera.&lt;br /&gt;
|Theoretical and on line resources=None&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Privacy_Analogue_data_shadows&amp;diff=1671</id>
		<title>Privacy Analogue data shadows</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Privacy_Analogue_data_shadows&amp;diff=1671"/>
				<updated>2015-06-02T13:57:53Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Analogue data shadows&lt;br /&gt;
|Kind of learning session=Gender and Tech&lt;br /&gt;
|Tutorial category=Discussion&lt;br /&gt;
|Duration (hours)=1&lt;br /&gt;
|Learning objectives=Visualising offline what we mean by 'data shadows' and thinking through news ways that these could be created in our everyday lives.&lt;br /&gt;
|Prerequisites=Facilitators should have a good understanding of 'data traces' online and offline, and the impact that these could have on our lives.&lt;br /&gt;
|Methodology=Ideally: take a polaroid picture of each participant, and write some 'metadata' on it – the place the photo was taken, the time, and the kind of camera used to take the photo. &lt;br /&gt;
&lt;br /&gt;
If facilitators can't get hold of a polaroid camera, then ask participants to bring in a photo of themselves to the session, that (ideally) they don't mind writing on and using for the session. &lt;br /&gt;
&lt;br /&gt;
Once metadata has been put on the photos of participants, give them back to the participants, along with a big sheet of paper and glue, and ask participants to draw the different data shadows and traces that they leave, associated with devices and online services that they use. &lt;br /&gt;
&lt;br /&gt;
If possible, provide people with a variety of art materials – glitter, coloured pens, stickers, etc, and encourage them to use anything they like to express and visualise their data shadows.&lt;br /&gt;
|Number of facilitators involved=2&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=None&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Privacy_Analogue_data_shadows&amp;diff=1670</id>
		<title>Privacy Analogue data shadows</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Privacy_Analogue_data_shadows&amp;diff=1670"/>
				<updated>2015-06-02T13:57:26Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=Analogue data shadows |Duration (hours)=1 |Learning objectives=Visualising offline what we mean by 'data shadows' and thinking through news w...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Analogue data shadows&lt;br /&gt;
|Duration (hours)=1&lt;br /&gt;
|Learning objectives=Visualising offline what we mean by 'data shadows' and thinking through news ways that these could be created in our everyday lives.&lt;br /&gt;
|Prerequisites=Facilitators should have a good understanding of 'data traces' online and offline, and the impact that these could have on our lives.&lt;br /&gt;
|Methodology=Ideally: take a polaroid picture of each participant, and write some 'metadata' on it – the place the photo was taken, the time, and the kind of camera used to take the photo. &lt;br /&gt;
&lt;br /&gt;
If facilitators can't get hold of a polaroid camera, then ask participants to bring in a photo of themselves to the session, that (ideally) they don't mind writing on and using for the session. &lt;br /&gt;
&lt;br /&gt;
Once metadata has been put on the photos of participants, give them back to the participants, along with a big sheet of paper and glue, and ask participants to draw the different data shadows and traces that they leave, associated with devices and online services that they use. &lt;br /&gt;
&lt;br /&gt;
If possible, provide people with a variety of art materials – glitter, coloured pens, stickers, etc, and encourage them to use anything they like to express and visualise their data shadows.&lt;br /&gt;
|Number of facilitators involved=2&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=None&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Gender_Tech_Collective_stories&amp;diff=1669</id>
		<title>Gender Tech Collective stories</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Gender_Tech_Collective_stories&amp;diff=1669"/>
				<updated>2015-06-02T13:54:29Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=Creating stories on collective responses |Kind of learning session=Gender and Tech, Skill sharing |Tutorial category=Discussion |Duration (ho...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Creating stories on collective responses&lt;br /&gt;
|Kind of learning session=Gender and Tech, Skill sharing&lt;br /&gt;
|Tutorial category=Discussion&lt;br /&gt;
|Duration (hours)=1&lt;br /&gt;
|Learning objectives=Constructing a group narrative around security and self care, to encourage participants to think about what collectives or organisations can do in the area of security.&lt;br /&gt;
|Prerequisites=Ideally, the facilitator should have taken part in this exercise at least once, to have an idea of what is expected&lt;br /&gt;
|Methodology=Divide the participants into small groups – 4 or 5 people, and ask them to create a real or fictitious story around security or self care. The format for presentation is a theatre piece, a 'fireside story', a drawing or comic strip – the most important part is that every member of the group is taking part in the storytelling.&lt;br /&gt;
&lt;br /&gt;
Facilitators should encourage participants to ensure agency – we all have our own power, we face risks, but we have responses – and encourage these themes to be used in the stories we tell. &lt;br /&gt;
Groups are given 45 minutes to come up with a short story to then perform back to the group as a whole.&lt;br /&gt;
|Number of facilitators involved=1&lt;br /&gt;
|Technical needs=None`&lt;br /&gt;
|Theoretical and on line resources=None&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Holistic_security_-_A_day_in_your_life&amp;diff=1667</id>
		<title>Holistic security - A day in your life</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Holistic_security_-_A_day_in_your_life&amp;diff=1667"/>
				<updated>2015-06-02T13:39:59Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=A day in your life |Kind of learning session=Holistic, Other … |Tutorial category=Discussion |Duration (hours)=1 |Learning objectives=Recog...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=A day in your life&lt;br /&gt;
|Kind of learning session=Holistic, Other …&lt;br /&gt;
|Tutorial category=Discussion&lt;br /&gt;
|Duration (hours)=1&lt;br /&gt;
|Learning objectives=Recognising the need for security in all areas of our lives – both online and offline – and understanding the different ways in which we deal with security risks.&lt;br /&gt;
|Prerequisites=Paper and pens for all participants. &lt;br /&gt;
&lt;br /&gt;
Ideally, facilitators should have taken part in this exercise before, but it's not necessary.&lt;br /&gt;
|Methodology=Distribute big sheets of paper to participants and ask them to draw a typical day in their lives – preferably a busy day, listing/illustrating all activities that they regularly do, such as commuting to work, working, eating, etc.&lt;br /&gt;
After their 'day schedule' is complete, ask them to add in who they interact with at different steps of the day.&lt;br /&gt;
Then, ask them to mark in a different colour, the steps of the day at which they feel insecure. &lt;br /&gt;
Encourage them to look at each other's papers and, if there is time, explain through a couple of the steps. &lt;br /&gt;
Is there anything that has come from this exercise that surprises them? &lt;br /&gt;
&lt;br /&gt;
The facilitator could then explain the idea of security – or the need to be secure – as a holistic concept, rather than one to be thought of just in terms of 'digital security'.&lt;br /&gt;
|Number of facilitators involved=1-2&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=None&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Holistic_security_-_Self_care&amp;diff=1666</id>
		<title>Holistic security - Self care</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Holistic_security_-_Self_care&amp;diff=1666"/>
				<updated>2015-06-02T13:38:20Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=Self care and holistic security |Kind of learning session=Holistic |Tutorial category=Discussion |Duration (hours)=2 |Learning objectives=Exp...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Self care and holistic security&lt;br /&gt;
|Kind of learning session=Holistic&lt;br /&gt;
|Tutorial category=Discussion&lt;br /&gt;
|Duration (hours)=2&lt;br /&gt;
|Learning objectives=Exploring the price activists pay for their work in terms of individual health and happiness, and personal relationships.&lt;br /&gt;
|Prerequisites=Facilitators should have some experience of talking through psychological issues with others.&lt;br /&gt;
|Methodology=Get the participants to sit in a circle.&lt;br /&gt;
The facilitator should explain what is meant by 'self care' and the concept of holistic security – not just thinking about security online, but in all aspects of our lives. They could also touch on issues like the 'martyr complex' – thinking that the needs of an individual are far smaller than the greater cause. &lt;br /&gt;
Ask the group if any of these problems sound familiar, and encourage the group to raise their hands and talk about their own experiences. &lt;br /&gt;
Once a few experiences have been shared, move the discussion to think about strategies to deal with these kinds of problems. &lt;br /&gt;
The facilitator could write down on a big flipchart some of the most popular strategies – such as looking after each other in groups, being aware of the pressure we put our colleagues under.&lt;br /&gt;
|Number of facilitators involved=1&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=None (unless the Holistic Security work is online?)&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Security_PGP_101&amp;diff=1665</id>
		<title>Security PGP 101</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Security_PGP_101&amp;diff=1665"/>
				<updated>2015-06-02T13:36:17Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=PGP 101 |Kind of learning session=101 |Tutorial category=Discussion |Duration (hours)=1.5 |Learning objectives=Understanding the basics of PG...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=PGP 101&lt;br /&gt;
|Kind of learning session=101&lt;br /&gt;
|Tutorial category=Discussion&lt;br /&gt;
|Duration (hours)=1.5&lt;br /&gt;
|Learning objectives=Understanding the basics of PGP and encryption&lt;br /&gt;
|Prerequisites=Facilitators should have a good understanding of what PGP is, be able to answer questions on how it works, and be able to help people downloading and using software to encrypt their emails.&lt;br /&gt;
|Methodology=This session is largely explanatory rather than interactive:&lt;br /&gt;
Explain the following concepts: &lt;br /&gt;
&lt;br /&gt;
* what PGP – Pretty Good Privacy – is&lt;br /&gt;
* Differences/similarities between PGP and GPG&lt;br /&gt;
* Why PGP is useful to us, and why might we want to understand it or use it? &lt;br /&gt;
* How it differs from SSL, TLS and HTTPS – and define these terms&lt;br /&gt;
|Number of facilitators involved=1-2&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=[http://securityinabox.org%20 Security in a box]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Hands_On_Understanding_the_group_%E2%80%93_Spectrogram&amp;diff=1664</id>
		<title>Hands On Understanding the group – Spectrogram</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Hands_On_Understanding_the_group_%E2%80%93_Spectrogram&amp;diff=1664"/>
				<updated>2015-06-02T13:33:38Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=Understanding the group – Spectrogram |Kind of learning session=Other … |Tutorial category=Icebreaking |Duration (hours)=0.5 |Learning ob...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Understanding the group – Spectrogram&lt;br /&gt;
|Kind of learning session=Other …&lt;br /&gt;
|Tutorial category=Icebreaking&lt;br /&gt;
|Duration (hours)=0.5&lt;br /&gt;
|Learning objectives=Understand and visualise the variety of opinions and perspectives that are in the room, ideally towards the beginning of the workshop.&lt;br /&gt;
|Prerequisites=A line on the floor marking 'the middle' of the room – so people know which side to stand to show their opinions. &lt;br /&gt;
&lt;br /&gt;
For the facilitator: none specifically&lt;br /&gt;
|Methodology=Mark a line on the floor towards the middle of the room, and signal that one side of the room is 'strongly agree', the other is 'strongly disagree', and if participants are 'neutral' towards a certain topic, they can stand in the middle of the room on the line. &lt;br /&gt;
&lt;br /&gt;
Participants are asked to move around the room depending upon their feelings towards statements that the facilitator will read out, and the facilitator will also ask for opinions and reasoning behind their positioning, from certain participants. &lt;br /&gt;
&lt;br /&gt;
Statements could include: &lt;br /&gt;
&lt;br /&gt;
&amp;quot;The internet is dangerous&amp;quot;: agree or disagree?”&lt;br /&gt;
&amp;quot;Only digital security experts can be digital security trainers.&amp;quot;&lt;br /&gt;
&amp;quot;Technology can be sexist&amp;quot; &lt;br /&gt;
&lt;br /&gt;
If there are any particularly polemic decisions, it might be a good idea for the facilitator to make a note of them for future discussions.&lt;br /&gt;
|Number of facilitators involved=1&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=[http://facilitation.aspirationtech.org/index.php?title=Facilitation:Spectrogram Aspiration Tech's run through of the Spectrogram]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Gender_Tech_Co-creating_a_safe_space&amp;diff=1662</id>
		<title>Gender Tech Co-creating a safe space</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Gender_Tech_Co-creating_a_safe_space&amp;diff=1662"/>
				<updated>2015-06-02T13:27:35Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=Co-creating a safe space |Kind of learning session=Holistic, Train of trainers |Tutorial category=Discussion |Duration (hours)=1.5 |Learning...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Co-creating a safe space&lt;br /&gt;
|Kind of learning session=Holistic, Train of trainers&lt;br /&gt;
|Tutorial category=Discussion&lt;br /&gt;
|Duration (hours)=1.5&lt;br /&gt;
|Learning objectives=To come up with a shared list of agreements to be following during the rest of the workshop, in order to create a safe space for all participants.&lt;br /&gt;
|Prerequisites=Whiteboard/flip chart, post it notes.&lt;br /&gt;
|Methodology=Give participants post it notes, and ask them to write down on three things that the group needs in order to create a safe space this week, with one issue on one post it note.&lt;br /&gt;
&lt;br /&gt;
Ask everyone to put the post it notes up on a wall, and cluster them according to themes.&lt;br /&gt;
&lt;br /&gt;
Once a few main themes have come out of the clustering exercise, write these up on the flip chart, and ask people to come up with concrete examples of when these themes or issues might come up – for example, 'respect at all times' could have the concrete example of 'showing up on time', 'putting mobile phones on 'silent''. &lt;br /&gt;
&lt;br /&gt;
Build out the themes to have a number of concrete examples or smaller parts to them that can then be displayed around the main room as a shared agreement. Ask people whether they agree with all parts, or whether there is anything they would add, before putting it up, and get a group agreement that all participants will abide by terms that everyone has come up with here.&lt;br /&gt;
|Number of facilitators involved=1 - 2&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Hands_On_What_does_your_internet_look_like%3F&amp;diff=379</id>
		<title>Hands On What does your internet look like?</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Hands_On_What_does_your_internet_look_like%3F&amp;diff=379"/>
				<updated>2015-05-12T15:54:00Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=What does your internet look like? |Kind of learning session=Other … |Tutorial category=Icebreaking |Duration (hours)=1 |Learning objective...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=What does your internet look like?&lt;br /&gt;
|Kind of learning session=Other …&lt;br /&gt;
|Tutorial category=Icebreaking&lt;br /&gt;
|Duration (hours)=1&lt;br /&gt;
|Learning objectives=Understanding basic fundamentals about how the internet works, and providing a space for participants to ask questions they may have about the 'building blocks' that feature in other hands on sessions.&lt;br /&gt;
|Prerequisites=Big sheets of paper (at least 1 per participant) – coloured pens. &lt;br /&gt;
&lt;br /&gt;
Facilitators should have a good understanding of how the internet works, and a reasonably high level of technical understanding.&lt;br /&gt;
|Methodology=Ask participants to spend 10 minutes drawing on a piece of paper what they think the internet looks like, using (if available) a variety of coloured pens- as abstract, literal or imaginative as they like. &lt;br /&gt;
&lt;br /&gt;
After everyone has finished their drawings, hang them on the wall in a gallery for others to look at, and ask the people who drew each one to explain a little their reasoning behind their interpretation of the internet.&lt;br /&gt;
|Number of facilitators involved=1&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=None&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Hands_On_How_the_internet_works&amp;diff=378</id>
		<title>Hands On How the internet works</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Hands_On_How_the_internet_works&amp;diff=378"/>
				<updated>2015-05-12T15:52:17Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=How does the internet work? |Kind of learning session=Hands-on Tools |Tutorial category=Icebreaking |Duration (hours)=1 |Learning objectives=...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=How does the internet work?&lt;br /&gt;
|Kind of learning session=Hands-on Tools&lt;br /&gt;
|Tutorial category=Icebreaking&lt;br /&gt;
|Duration (hours)=1&lt;br /&gt;
|Learning objectives=To understand what happens online when we send and receive an email, how many parties are involved, and how this changes with encrypted messages.&lt;br /&gt;
|Prerequisites=Open space to move around. &lt;br /&gt;
&lt;br /&gt;
Facilitators should have a good understanding of how the internet works, and a reasonably high level of technical understanding.&lt;br /&gt;
|Methodology=Give participants different characters, such as:&lt;br /&gt;
&lt;br /&gt;
* Users &lt;br /&gt;
* ISPs &lt;br /&gt;
* Google &lt;br /&gt;
* Facebook &lt;br /&gt;
* Yahoo etc / other companies &lt;br /&gt;
&lt;br /&gt;
 The aim of the exercise is to “send” and “receive” messages through the chain of participants. &lt;br /&gt;
&lt;br /&gt;
A simplified version of this chain is: &lt;br /&gt;
   1. The sender sending a message on gmail &lt;br /&gt;
   2. ISP &lt;br /&gt;
   3. Google &lt;br /&gt;
   4. ISP &lt;br /&gt;
   5. Yahoo &lt;br /&gt;
   6. ISP &lt;br /&gt;
   7. Receiver getting the message on Yahoo. &lt;br /&gt;
&lt;br /&gt;
Get participants to stand in this order, and pass an unencrypted 'message' between them – and make it clear to them that every single one of them is able to read the message that is sent by the user without any trouble at all. &lt;br /&gt;
    &lt;br /&gt;
 Next, get participants to send an encrypted message between them – this time, only the sender and the receiver are able to see the message. &lt;br /&gt;
  &lt;br /&gt;
Emphasise that the internet is a communication platform and nothing else. There are certain elements you cannot do without; and two basic components that could expose an identity are 'to' and 'from'. &lt;br /&gt;
 &lt;br /&gt;
Stuck with this model, there are two things that can be done – we can do it be aware of the model that we're using, and we can rely on tools. &lt;br /&gt;
&lt;br /&gt;
Also, think about the following aspects: &lt;br /&gt;
 &lt;br /&gt;
1)Identity (you can change this) &lt;br /&gt;
2)Location (there are tools that can be used) &lt;br /&gt;
3)Channel (cannot control this one, very difficult to control). Either they are owned by governments or can be controlled by governments. Which is the lesser evil of the channels that you can choose. Encryption is passing through a channel but it is wrapped in a protocol. &lt;br /&gt;
4)The message (metadata is important here, as it might put you at risk)/ Metadata is the information about information. A digital photo has metadata, for example, the date it was taken, the name, the camera that took the photo.&lt;br /&gt;
|Number of facilitators involved=1&lt;br /&gt;
|Technical needs=Facilitators need to have a reasonably high level of technical knowledge to run the session and be able to answer any questions that might come up.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Gender_Tech_Herstory_Exhibition&amp;diff=377</id>
		<title>Gender Tech Herstory Exhibition</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Gender_Tech_Herstory_Exhibition&amp;diff=377"/>
				<updated>2015-05-12T15:40:00Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=Photo Exhibition: herstory |Kind of learning session=Other … |Duration (hours)=1 |Learning objectives=Learning about key figures in history...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Photo Exhibition: herstory&lt;br /&gt;
|Kind of learning session=Other …&lt;br /&gt;
|Duration (hours)=1&lt;br /&gt;
|Learning objectives=Learning about key figures in history from other parts of the world, and sharing those you admire and look up to.&lt;br /&gt;
|Prerequisites=Ask participants to bring with them the name, or a printed out photo of a woman in technology who they feel was influential in their cultures or countries. This doesn't necessarily have to be anyone particularly well-renowned, or directly as a coder, but simply someone who they admire, for whatever role they may have played.&lt;br /&gt;
|Methodology=Assuming participants have already put some thought into their chosen suggestions for the 'herstory' exhibition – ask everyone to put their pictures up around the room, like in a gallery.&lt;br /&gt;
&lt;br /&gt;
If participants don't have big photos to put up, encourage them to draw their own interpretations and label them with the name of the woman and the country she comes from. &lt;br /&gt;
&lt;br /&gt;
Walk around the “gallery” with participants and encourage whoever put up different pictures to tell the group about them and the work they did.&lt;br /&gt;
&lt;br /&gt;
Afterwards, collect up these names and make them into a slidedeck for others to use in the future.&lt;br /&gt;
|Number of facilitators involved=1&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=[https://vimeo.com/107858829 Computer sciences: Her story] (video)&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Gender_Tech_Personal_Experiences&amp;diff=354</id>
		<title>Gender Tech Personal Experiences</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Gender_Tech_Personal_Experiences&amp;diff=354"/>
				<updated>2015-05-11T15:49:39Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=Personal experiences in technology |Kind of learning session=Gender and Tech |Tutorial category=Icebreaking |Duration (hours)=1 |Learning obj...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Personal experiences in technology&lt;br /&gt;
|Kind of learning session=Gender and Tech&lt;br /&gt;
|Tutorial category=Icebreaking&lt;br /&gt;
|Duration (hours)=1&lt;br /&gt;
|Learning objectives=Learning from the experiences of others in the room with you, and having an opportunity to share your stories in a safe space with other people. For people present who perhaps haven't had so many experiences in this realm, it presents a good opportunity to listen from those who have had other experiences.&lt;br /&gt;
|Prerequisites=A majority of the group need to be either women/from marginalised communities within technology, for this activity to work best. &lt;br /&gt;
Encourage others to spend time listening – passive participation is just as important as active. &lt;br /&gt;
The exercise is ideally carried out when participants have already got to know each other a little, rather than as a first exercise.&lt;br /&gt;
|Methodology=Ask people to get into small (3-4 person) groups, and think about experience they've had where they have felt marginalised in their communities. This might be anything from microaggressions at work, not feeling able to speak up, or blatant forms of discrimination. To the extent that they all feel comfortable, go around the group and ask people to share these experiences. If they don't feel comfortable sharing their own, talking about experiences they have heard about from others, is also a valuable contribution. &lt;br /&gt;
&lt;br /&gt;
The exercise is primarily one around listening and sharing in small groups- if the group is already close, then sharing back in the big group might also be appropriate, but this is not a necessary part of the exercise. &lt;br /&gt;
&lt;br /&gt;
Coming back to the big group, the facilitator could ask: &lt;br /&gt;
&lt;br /&gt;
* What have you learned, from hearing from others in your group?&lt;br /&gt;
* Does anyone feel comfortable sharing their experiences with the bigger group? &lt;br /&gt;
* (Especially for those for whom these experiences might be new) - has this changed your perspective at all?&lt;br /&gt;
|Number of facilitators involved=1&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Gender_Tech_Privilege_in_Tech&amp;diff=353</id>
		<title>Gender Tech Privilege in Tech</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Gender_Tech_Privilege_in_Tech&amp;diff=353"/>
				<updated>2015-05-11T15:17:00Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=Thinking through privilege in tech |Kind of learning session=Gender and Tech |Tutorial category=Icebreaking, Energiser |Duration (hours)=0.5...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Thinking through privilege in tech&lt;br /&gt;
|Kind of learning session=Gender and Tech&lt;br /&gt;
|Tutorial category=Icebreaking, Energiser&lt;br /&gt;
|Duration (hours)=0.5&lt;br /&gt;
|Learning objectives=Demonstrating physically differences in privileges with regards to technology, and thinking through how these affect access to, and presence in, the tech community&lt;br /&gt;
|Prerequisites=Space to walk up and down – ideally steps, but a room with a 'baseline' marked, and space to walk forwards and backwards, would also work. &lt;br /&gt;
NB: not accessibility friendly, as participants need to walk forwards and backwards.&lt;br /&gt;
|Methodology=Line up all participants on either a line in the middle of the room, or on the middle step. &lt;br /&gt;
Facilitator reads out various statements regarding access to/privilege in technology, and participants are asked to take one step forward if this is true for them, or one step back if not. &lt;br /&gt;
&lt;br /&gt;
Sample:&lt;br /&gt;
* I had a computer at home when I was growing up&lt;br /&gt;
* Where I live, I have good, consistent access to the internet&lt;br /&gt;
* I was under the age of 10 when I first accessed a computer &lt;br /&gt;
* I have my own laptop now &lt;br /&gt;
* I didn't have my own laptop until I was over 18. &lt;br /&gt;
* I can access the majority of what I want to read online, in my native language. &lt;br /&gt;
&lt;br /&gt;
By noticing who moves forwards and backwards, and how often people swap spaces, participants are encouraged to think about their own levels of privilege within the community. &lt;br /&gt;
&lt;br /&gt;
At the end of the exercise, ask the participants if there were any surprises in what they saw among the group. How do they think these privileges affect their current life and work?&lt;br /&gt;
|Number of facilitators involved=1&lt;br /&gt;
|Technical needs=None, apart from space&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Gender_Tech_Personal_Memories&amp;diff=352</id>
		<title>Gender Tech Personal Memories</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Gender_Tech_Personal_Memories&amp;diff=352"/>
				<updated>2015-05-11T15:11:10Z</updated>
		
		<summary type="html">&lt;p&gt;Zara: Created page with &amp;quot;{{Tutorial |Title of the tutorial=Personal memories of technology |Kind of learning session=Gender and Tech |Tutorial category=Icebreaking |Duration (hours)=1 |Learning object...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Personal memories of technology&lt;br /&gt;
|Kind of learning session=Gender and Tech&lt;br /&gt;
|Tutorial category=Icebreaking&lt;br /&gt;
|Duration (hours)=1&lt;br /&gt;
|Learning objectives=To think about participants own personal relationships with technology, and when gender stereotypes started to play a role.&lt;br /&gt;
|Prerequisites=None&lt;br /&gt;
|Methodology=* Get everyone to sit in a circle&lt;br /&gt;
* Distribute sticky notes and pens&lt;br /&gt;
* Ask everyone to write your earliest memory of using, seeing, or interacting with technology, with your rough age, and the device you used. &lt;br /&gt;
* Then go round the circle and (depending on how many people are present) – ask people to read out their answers.&lt;br /&gt;
* If there are too many people present, ask for volunteers to put their hands up, and read out their answers. &lt;br /&gt;
&lt;br /&gt;
If the exercise stimulates discussion around certain stereotypes, the facilitator can also make a list of these at the front of the group.&lt;br /&gt;
|Number of facilitators involved=1&lt;br /&gt;
|Technical needs=None&lt;br /&gt;
|Theoretical and on line resources=[http://jezebel.com/5966870/female-neuroscientists-parody-that-embarrassing-science-its-a-girl-thing-video Science: it's a girl thing] – video, aiming to get more women in STEM fields. A bad example of how to address this problem, as it's catering to the stereotypes we're trying to get rid of.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Zara</name></author>	</entry>

	</feed>