Difference between revisions of "Digital security for the Association of Media Women, Kenya"
From Gender and Tech Resources
Line 32: | Line 32: | ||
Afternoon Session | Afternoon Session | ||
− | Digital Security : | + | Digital Security :Tools (part 1)-Yvonne Oluoch |
Line 45: | Line 45: | ||
Latter AFternoon Session | Latter AFternoon Session | ||
− | Digital Security: Part 2- Yvonne Oluoch | + | Digital Security: Information Security and data protection (Part 2)-Yvonne Oluoch |
Day 3 | Day 3 | ||
Line 63: | Line 63: | ||
Mary Kiio of Roshani Consultancy was available during the sessions to ensure smooth flow of presentations from one trainer to another while providing training tips at opportune moments | Mary Kiio of Roshani Consultancy was available during the sessions to ensure smooth flow of presentations from one trainer to another while providing training tips at opportune moments | ||
+ | |Methodologies for training=Power point presentations, practical online sessions, group discussions, presentations, spectrogram exercises | ||
+ | |Existing toolkits and resources=The Kenya ICT Network (KICTANET) 2013 report on Women and Cyber Crime in Kenya, tactical tech online tool kits , Google tips, Maji Data, UN Data,World Bank Data, Kenya Open data, infogram, Google fusion tables, | ||
+ | |Gender and tech tutorials used=ono, Association for Progressive Communications and International Association of Women in Radio and Television- Kenya chapter training materials of workshops held in Kenya, | ||
}} | }} | ||
{{Learning outcomes | {{Learning outcomes |
Revision as of 09:41, 9 September 2015
Title | Digital security and Advocacy training for the Association of Media Women in Kenya |
---|---|
Category | Privacy Advocacy Digital Security Gender and Tech |
Start | 2015/08/01 |
End | 2015/08/15 |
Hours | |
Scale | Africa , Kenya, Nairobi |
Geolocalization | -1° 13' 19", 36° 52' 11"
Loading map...
|
Organisation | Roshani Consultancy Services |
Website | |
Target audience | Association of Media Women in Kenya (AMWIK) members |
Number of participants | 9 |
Context and motivations | When the femh3ck flash training in Nairobi came to an end, one of the participants who was from AMWIK approached Mary Kiio of Roshani COnsultancy Services and requested if the company would consider training their members as the issues highlighted were very pertinent to what women go through in the country.
A few days later an email from the secretariat of AMWIK inquiring on if we could share on the outcomes of the femh3ck training and a request on if we can engage in other similar activities and/or platforms lead to the discussion of holding a three day training for its members over the month of August on Saturdays for three consecutive weekends. Though both companies did not have any funding for the training , there was an agreement that Roshani Consultancy Services would avail facilitators who would be willing to share information with no pay.AMWIK on the other hand committed to identify participants who are willing to attend training with the aim of being the future trainings. AMWIK also provided office space, Internet connection, workshop materials and snacks. It was the willing participants who shared their training needs via a pre training questionnaire who provided the highest motivation of the training. |
Topics | Training of Trainers, Digital security, Data mining and visualization , Privacy Advocacy |
Links | Articles, videos, photos on-line, ... |
Media | [[File:]] |
Agenda | Day 1
1st August 2015 Morning Session Introductions and Overview of the workshop Cyber Security : Importance of Internet, KICTANET report and Advocac, Government Censorship and Emerging trends -Naomi Kamau (sharing from personal experience and research) Afternoon Session Digital Security :Tools (part 1)-Yvonne Oluoch
8th August 2015 Morning session and part of Afternoon session Data Mining, Data Visualization and Tips on Security Online: Steven Kinuthia Latter AFternoon Session Digital Security: Information Security and data protection (Part 2)-Yvonne Oluoch Day 3 15th August 2015 Whole day Privacy Advocacy: Mary Kiio NB: Daily feedback was given at the end of the session capturing what worked well, what didn't , what could have been done better. The # for the training on Twitter was #Digitalk_womensafety
Mary Kiio of Roshani Consultancy was available during the sessions to ensure smooth flow of presentations from one trainer to another while providing training tips at opportune moments |
---|---|
Methodologies | Power point presentations, practical online sessions, group discussions, presentations, spectrogram exercises |
Resources | The Kenya ICT Network (KICTANET) 2013 report on Women and Cyber Crime in Kenya, tactical tech online tool kits , Google tips, Maji Data, UN Data,World Bank Data, Kenya Open data, infogram, Google fusion tables, |
Gendersec | ono, Association for Progressive Communications and International Association of Women in Radio and Television- Kenya chapter training materials of workshops held in Kenya |
Feelings | How was it ? |
---|---|
Feedbacks | What were the impressions ? |
Start | What will you start doing ? |
Stop | What will you stop doing ? |
Keep | What will you keep doing ? |