Difference between revisions of "Manuals with a gender perspective"
From Gender and Tech Resources
Line 74: | Line 74: | ||
This short manual offer to those feminists or allies who dare to publish any troll-life-ruining content a few ways to protect themselves. | This short manual offer to those feminists or allies who dare to publish any troll-life-ruining content a few ways to protect themselves. | ||
− | * '''Crash Override network - ' | + | * '''Crash Override network - 'Various'''' |
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices | Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices | ||
Line 84: | Line 84: | ||
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. | This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. | ||
− | * '''Donestech.net - ' | + | Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here. |
+ | Link: http://www.crashoverridenetwork.com/preventingdoxing.html | ||
+ | |||
+ | Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. | ||
+ | Link: http://www.crashoverridenetwork.com/familyandpolice.html | ||
+ | |||
+ | So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. | ||
+ | Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html | ||
+ | |||
+ | * '''Donestech.net - 'Various'''' | ||
Linkː http://donestech.net/ | Linkː http://donestech.net/ | ||
Line 151: | Line 160: | ||
Linkː https://tech.safehubcollective.org/cybersecurity/ | Linkː https://tech.safehubcollective.org/cybersecurity/ | ||
+ | https://es.hackblossom.org/cybersecurity/ | ||
Licenseː Not specified | Licenseː Not specified | ||
− | Languageː English | + | Languageː English, Spanish |
This guide is intended to be a comprehensive and accessible introduction to some of the most valuable cybersecurity tools available. There’s a lot of information here, so it can get a bit overwhelming! Feel free to read each section at your own pace: there’s no obligation to read through the whole guide and install every piece of tech we recommend. | This guide is intended to be a comprehensive and accessible introduction to some of the most valuable cybersecurity tools available. There’s a lot of information here, so it can get a bit overwhelming! Feel free to read each section at your own pace: there’s no obligation to read through the whole guide and install every piece of tech we recommend. |
Revision as of 09:31, 4 October 2016
This HowTo is still largely Work In Progress.
So far it lists some questions, we should take into account when drafting manuals about privacy and digital security from a gender perspective. On the other hand it aims at becoming a comprehensible resource list of collectives and organisations working on the production of manuals around privacy and digital security with a gender perspective.
Before producing a manual
Before producing a new manual some questions we should askː
- Don't reinvent the wheelǃ Are you duplicating upstream work?
- If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?
- Who's the public and what are the objectives ? What are their security & technical levels? What are their comprehension about feminism?
- Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?
- Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?
- Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?
- Credits your reviewers and experts that have provided you with feed back!!
- How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you.
- How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.
- How will you achieve or not translation & translatability of your manual? Which type of platforms will you use for achieving the translation? Will you achieve also cultural translation for instance?
- Accessible for disable people
- Will you provide further support to the readers such as a contact mail or a hotline?
- How will you ensure that your contents are ethical, inclusive and trans-queer-feminist "approved"?
- How will we monitor the impact of our self learning resources/Impact Assessment methodologies?
- How the distribution will be done? What is the target public?
- Think about potential partnerships (researchers, academia, volunteer translators etc)
Manuals produced by collectives/organisations
- Association for Progressive Communications - 'Take back the tech'
Linkː https://www.takebackthetech.net/
Licenseː Copyleft
Languageː English, French, Spanish
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː
- The "know more section" which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː ICTs for Feminist Movement Building: Activist Toolkit
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity? How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?
- Chayn.org - 'Stay safe'
Linkː http://chayn.co/tools/
Licenseː Creative Commons Attribution 4.0 license
Languageː English
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women.
- How to build your own domestic violence case without a lawyer is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical. - In the next months they will release the manual 'How Someone Can Track You Online And Offline – And What You Can Do About It' that deals with issues faced by women that face stalking and invasion of privacy by abusers. The guide addresses how to avoid being tracked online and offline (http://chayn.co/staying-safe/).
- Coding Rights - Send nudes'
Linkː http://www.codingrights.org/send-nudes/
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)
Languageː Brasilian, English
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.
- CommunityRED - '9 Ways to Dodge Trolls: A Feminist’s Guide to Digital Security'
Linkː https://medium.com/thelist/9-ways-to-dodge-trolls-a-feminists-guide-to-digital-security-471f66b98c79
Licenseː Not specified
Languageː English
This short manual offer to those feminists or allies who dare to publish any troll-life-ruining content a few ways to protect themselves.
- Crash Override network - 'Various'
Licenseː Not specified
Languageː English
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here. Link: http://www.crashoverridenetwork.com/preventingdoxing.html
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. Link: http://www.crashoverridenetwork.com/familyandpolice.html
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html
- Donestech.net - 'Various'
Linkː http://donestech.net/
Licenseː Creative Commons Attribution - Share Alike - No Commercial
Languageː Spanish, Catalan, English
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (http://www.donestech.net/files/English_LELA_comic.pdf)
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (http://www.donestech.net/files/KIT_CAST_5.pdf)
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women.
- Feminist Frequency - Countering Online Harassment Safety and Support Guide'
Linkː https://onlinesafety.feministfrequency.com/
Licenseː ?
Languageː English, Spanish, Arabic
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups & cybermobs online.
- FemTechNet - 'Addressing anti-feminist violence online'
Linkː http://dmlcompetition.net/proposals/addressing-anti-feminist-violence-online/
Licenseː Not specified
Languageː English
This project is housed at the Arizona State University and is being currently developed by the network of feminist academics FemTechNet to support women that experiences harassment online to respond. The central focus of this proposal is the development of educational and informational resources that will enable educators and advocates to ensure that connected learning and engagement can proceed even in the face of hostility and harassment. Connected learning breaks down if feminists and women of all ages feel unsafe in digital spaces; we can’t end online harassment, but we can ensure that everyone has the tools necessary to maximize the safety of learners and their data.
FemTechNet has been a leader in online and distributed education with the highly successful Distributed Online Collaborative Course (DOCC). In addition to extensive presence within accredited institutions, the DOCC includes community courses and self-directed learners who access the resources, materials, tools, and communities online. With these experiences in virtual, blended, and face-to-face classrooms, FemTechNet is uniquely situated to be able to educate and serve online feminist learning communities. We have a well-developed content structure, including high-quality video dialogues, as well as a system for holding teach-ins and open online office hours. Our distributed model of online education also facilitates peer-to-peer connections, thereby strengthening and expanding the level of communal engagement possible with this project.
- Hacking with care'
Linkː http://hackingwithcare.in/ http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki http://hackingwithcare.in/by/ressources/
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported
Languageː English
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist, growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body & soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations, massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch….
- Hollaback - Social Media Safety Guides'
Linkː http://www.ihollaback.org/social-media-safety-guides/
Licenseː Copright
Languageː English
Introducing our new Social Media Safety Guides for Facebook, Twitter, Reddit, Tumblr, and Youtube! We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one nifty location! Each guide offers expanded information regarding privacy settings and reporting tools, and provides this information with transparent and accessible language from each of the social media platforms. The guides provide a more user focused perspective to navigating tools to keep you safe online. Online harassment includes a wide range of targeted behaviors including: threats, continued hateful messages, doxing, DDoS attacks, swatting, defamation, and more. Online harassment can target (or come from) a group or individual and often has the expressed purpose of having the individual or group leave the internet or take down their content.
While there is space for debate and discussion online (as well as conflicting ideas!), what separates online harassment from healthy discourse is the focus on harm: including publishing personal information, sending threats with the intention to scare or harm, and even directly promoting harm against a person or organization. We believe in a free internet where individuals feel safe to connect, and online harassment isn’t a part of that.
- Safe Hub Collective - 'DIY Guide to feminist Cybersecurity'
Linkː https://tech.safehubcollective.org/cybersecurity/ https://es.hackblossom.org/cybersecurity/
Licenseː Not specified
Languageː English, Spanish
This guide is intended to be a comprehensive and accessible introduction to some of the most valuable cybersecurity tools available. There’s a lot of information here, so it can get a bit overwhelming! Feel free to read each section at your own pace: there’s no obligation to read through the whole guide and install every piece of tech we recommend.
- Tactical technology collective - 'Zen and the art of making tech work for you'
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)
Languageː English (future translations are previewed)
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues: First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely?
The manual grew out of the 2014 Gender and Technology Institute, organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added. We hope to have it translated, edited and printed in 2016.
- Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa
Linkː https://securityinabox.org/en/lgbti-mena
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)
Languageː English
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.
- Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit
Linkː https://womensrights.informationactivism.org/
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)
Languageː English, Hindi, Arabic and Swahili.
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.
- Web we wantː Recipes for a Digital Revolution
Linkː http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution
Licenseː Copyright
Languageː English
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.
- Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders
Licenseː Creative Commons BY (Creative Commons Attribution 4.0 International Licence)
Languageː English
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.
Manuals produced by individuals
- How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'
Linkː https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf
Licenseː ?
Languageː English
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this.
- Smart Girl's Guide to Privacy by Violet Blue'
Linkː https://www.nostarch.com/smartgirlsguide
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)
Licenseː Copyright
Languageː English
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to: Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites.