Difference between revisions of "Including gender in privacy and digital security"
From Gender and Tech Resources
Line 1: | Line 1: | ||
+ | === Including gender = Intersectionality and feminist approach to technologies + Integrated (holistic) approach to privacy and security === | ||
− | + | ==== Individual and collective approaches to privacy and security / Combining our individual and collective responsibilities through DIY and DIWO dynamics ==== | |
− | + | ==== Acknowledge and takes into account gender and cultural diversity gaps and/or gender based specific threats and VAW (online and offline) along the complete technological cycle ==== | |
− | + | ||
− | + | ||
* From production of technologies (eg. Maquiladoras and VAW in centers of production) / | * From production of technologies (eg. Maquiladoras and VAW in centers of production) / | ||
Line 12: | Line 11: | ||
* To end of life of technologies (e.g eWaste dump routes) | * To end of life of technologies (e.g eWaste dump routes) | ||
− | + | === Assessing risks and facing threats Vs Mapping resilience and strengths === | |
Online gender based violence Vs Offline VAW: Interactions and mirroring | Online gender based violence Vs Offline VAW: Interactions and mirroring | ||
+ | |||
Presenting for the 4 sub-chapters the main risks and threats and in which ways they specially affect women and LGTBQ persons and what will be presented as methodologies and liberating technologies to overcome those (e.g how this manual enables to mitigate, tackled or overcome threats such as doxing, blackmail, cyberstalking, harassment, hate speech, revenge porn, ruin life campaigns, surveillance, monitoring, censoring?) | Presenting for the 4 sub-chapters the main risks and threats and in which ways they specially affect women and LGTBQ persons and what will be presented as methodologies and liberating technologies to overcome those (e.g how this manual enables to mitigate, tackled or overcome threats such as doxing, blackmail, cyberstalking, harassment, hate speech, revenge porn, ruin life campaigns, surveillance, monitoring, censoring?) | ||
− | + | === About this manual === | |
Methodologies to develop it, who is behind the contents, how to use it, what is next? | Methodologies to develop it, who is behind the contents, how to use it, what is next? |
Revision as of 07:21, 4 May 2015
Contents
- 1 Including gender = Intersectionality and feminist approach to technologies + Integrated (holistic) approach to privacy and security
- 1.1 Individual and collective approaches to privacy and security / Combining our individual and collective responsibilities through DIY and DIWO dynamics
- 1.2 Acknowledge and takes into account gender and cultural diversity gaps and/or gender based specific threats and VAW (online and offline) along the complete technological cycle
- 2 Assessing risks and facing threats Vs Mapping resilience and strengths
- 3 About this manual
Including gender = Intersectionality and feminist approach to technologies + Integrated (holistic) approach to privacy and security
Individual and collective approaches to privacy and security / Combining our individual and collective responsibilities through DIY and DIWO dynamics
Acknowledge and takes into account gender and cultural diversity gaps and/or gender based specific threats and VAW (online and offline) along the complete technological cycle
- From production of technologies (eg. Maquiladoras and VAW in centers of production) /
- Access to technologies (eg. Gender time gap/ surveillance of devices /discrimination and criminalization factors playing against women)
- Uptake of technologies (eg. Gender type of uses of ICT and media, big data and privacy issues)
- Development of technologies (e.g How to get more women into STEM, CS, FLOSS and Hacking)
- To end of life of technologies (e.g eWaste dump routes)
Assessing risks and facing threats Vs Mapping resilience and strengths
Online gender based violence Vs Offline VAW: Interactions and mirroring
Presenting for the 4 sub-chapters the main risks and threats and in which ways they specially affect women and LGTBQ persons and what will be presented as methodologies and liberating technologies to overcome those (e.g how this manual enables to mitigate, tackled or overcome threats such as doxing, blackmail, cyberstalking, harassment, hate speech, revenge porn, ruin life campaigns, surveillance, monitoring, censoring?)
About this manual
Methodologies to develop it, who is behind the contents, how to use it, what is next?