Difference between revisions of "Resources"
From Gender and Tech Resources
Line 1: | Line 1: | ||
'''<big>Zen and the art of making your tech work for you</big>''' | '''<big>Zen and the art of making your tech work for you</big>''' | ||
− | ''' | + | '''<sup>Including Gender into privacy and security</sup>''' |
− | + | ||
− | + | ||
− | + | ||
+ | Welcome to this manual that will be edited in the next three weeks and turn into an awesome many hands, brains and hearts crafted. | ||
Read more about [[how to add contents to this manual here]] | Read more about [[how to add contents to this manual here]] | ||
Line 11: | Line 9: | ||
Length: 8 pages | Length: 8 pages | ||
− | + | Who: Alexandra, Valentina | |
− | Who: Alexandra, Valentina | + | |
[[Introduction]] | [[Introduction]] | ||
Aims: | Aims: | ||
− | |||
* Show existing links between privacy and security from a gender and inter-sectional approach | * Show existing links between privacy and security from a gender and inter-sectional approach | ||
* Convince WHRD and LGTBI activists that privacy and security consists of different but interconnected elements (ie physical, digital and well-being) | * Convince WHRD and LGTBI activists that privacy and security consists of different but interconnected elements (ie physical, digital and well-being) | ||
* Support and empower WHRD and LGTBI to adopt better privacy and security behaviors by knowing methods, processes and liberating technologies | * Support and empower WHRD and LGTBI to adopt better privacy and security behaviors by knowing methods, processes and liberating technologies | ||
* Provide arguments, methodologies and examples to get the buy in from their organisations/communities to adopt integrated approaches which include gender into privacy and security | * Provide arguments, methodologies and examples to get the buy in from their organisations/communities to adopt integrated approaches which include gender into privacy and security | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− |
Revision as of 16:10, 3 May 2015
Zen and the art of making your tech work for you
Including Gender into privacy and security
Welcome to this manual that will be edited in the next three weeks and turn into an awesome many hands, brains and hearts crafted. Read more about how to add contents to this manual here
Introduction: What does it mean to include gender into privacy and security?
Length: 8 pages Who: Alexandra, Valentina
Aims:
- Show existing links between privacy and security from a gender and inter-sectional approach
- Convince WHRD and LGTBI activists that privacy and security consists of different but interconnected elements (ie physical, digital and well-being)
- Support and empower WHRD and LGTBI to adopt better privacy and security behaviors by knowing methods, processes and liberating technologies
- Provide arguments, methodologies and examples to get the buy in from their organisations/communities to adopt integrated approaches which include gender into privacy and security