Difference between revisions of "Resources"
From Gender and Tech Resources
Line 9: | Line 9: | ||
Length: 8 pages | Length: 8 pages | ||
+ | |||
Who: Alexandra, Valentina | Who: Alexandra, Valentina | ||
Line 14: | Line 15: | ||
Aims: | Aims: | ||
+ | |||
* Show existing links between privacy and security from a gender and inter-sectional approach | * Show existing links between privacy and security from a gender and inter-sectional approach | ||
* Convince WHRD and LGTBI activists that privacy and security consists of different but interconnected elements (ie physical, digital and well-being) | * Convince WHRD and LGTBI activists that privacy and security consists of different but interconnected elements (ie physical, digital and well-being) | ||
* Support and empower WHRD and LGTBI to adopt better privacy and security behaviors by knowing methods, processes and liberating technologies | * Support and empower WHRD and LGTBI to adopt better privacy and security behaviors by knowing methods, processes and liberating technologies | ||
* Provide arguments, methodologies and examples to get the buy in from their organisations/communities to adopt integrated approaches which include gender into privacy and security | * Provide arguments, methodologies and examples to get the buy in from their organisations/communities to adopt integrated approaches which include gender into privacy and security | ||
+ | |||
+ | === Understanding gender gaps in tech: From exclusion to self inclusion === | ||
+ | |||
+ | Length: 4 pages | ||
+ | |||
+ | Who: Nuria | ||
+ | |||
+ | Aim: | ||
+ | |||
+ | * Understanding the different type of gaps into technology access, uptake, use and development | ||
+ | * Shifting paradigm from exclusion to self-inclusion | ||
== Step 0: Mapping your data and devices == | == Step 0: Mapping your data and devices == | ||
Length: 6 pages | Length: 6 pages | ||
+ | |||
Who: Alex, Marte | Who: Alex, Marte | ||
Line 29: | Line 43: | ||
* Assessing privacy and security risks requires first to understand what should be protected | * Assessing privacy and security risks requires first to understand what should be protected | ||
* Better management of data and devices from a physical and psycho-social well being perspective | * Better management of data and devices from a physical and psycho-social well being perspective | ||
+ | |||
+ | == Step 1: Understanding your digital shadow == | ||
+ | |||
+ | Length: 15 pages | ||
+ | |||
+ | Who: Floriana, Jillian, Faith | ||
+ | |||
+ | [[Step 1]] | ||
+ | |||
+ | Aims: | ||
+ | |||
+ | * Understanding digital shadow and metadata | ||
+ | * Awareness on risks and empowering potential of online identities (using real names, pseudonyms, collective names and anonymity) | ||
+ | * Creating new online identities | ||
+ | * Managing various online identities | ||
+ | |||
+ | == Step 2: Building safe spaces == | ||
+ | |||
+ | Length: 15 pages | ||
+ | |||
+ | Who: Sophie, Faith, Paula | ||
+ | |||
+ | [[Step 2]] |
Revision as of 15:11, 3 May 2015
Zen and the art of making your tech work for you
Including Gender into privacy and security
Welcome to this manual that will be edited in the next three weeks and turn into an awesome many hands, brains and hearts crafted one. This is a roadmap FROM FIRE TO DESIRE TO INSPIRE. Read more about how to add contents to this manual here
Contents
Introduction: What does it mean to include gender into privacy and security?
Length: 8 pages
Who: Alexandra, Valentina
Aims:
- Show existing links between privacy and security from a gender and inter-sectional approach
- Convince WHRD and LGTBI activists that privacy and security consists of different but interconnected elements (ie physical, digital and well-being)
- Support and empower WHRD and LGTBI to adopt better privacy and security behaviors by knowing methods, processes and liberating technologies
- Provide arguments, methodologies and examples to get the buy in from their organisations/communities to adopt integrated approaches which include gender into privacy and security
Understanding gender gaps in tech: From exclusion to self inclusion
Length: 4 pages
Who: Nuria
Aim:
- Understanding the different type of gaps into technology access, uptake, use and development
- Shifting paradigm from exclusion to self-inclusion
Step 0: Mapping your data and devices
Length: 6 pages
Who: Alex, Marte
Aims:
- Assessing privacy and security risks requires first to understand what should be protected
- Better management of data and devices from a physical and psycho-social well being perspective
Step 1: Understanding your digital shadow
Length: 15 pages
Who: Floriana, Jillian, Faith
Aims:
- Understanding digital shadow and metadata
- Awareness on risks and empowering potential of online identities (using real names, pseudonyms, collective names and anonymity)
- Creating new online identities
- Managing various online identities
Step 2: Building safe spaces
Length: 15 pages
Who: Sophie, Faith, Paula