Frequently Asked Questions

From Gender and Tech Resources

Revision as of 09:23, 12 June 2017 by Alex (Talk | contribs) (How to fill a new activity?)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Here you will find some basic guidelines about the technical aspects of this wiki and how you can publish information in it.

What is a semantic wiki?

A semantic wiki is a wiki that has an underlying model of the knowledge described in its pages. Regular, or syntactic, wikis have structured text and untyped hyperlinks. Semantic wikis, on the other hand, provide the ability to capture or identify information about the data within pages, and the relationships between pages, in ways that can be queried or exported like a database through semantic queries. As of 2013, the best-known semantic wiki software, and the only one with significant usage on public websites, is Semantic MediaWiki. You can read more on semantic wikis here.

Who can add and edit new content?

Remember that only participants to the program “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion” have been granted user accounts with editor privileges enabling them to create new entries (such as tutorials, howtos, activities, storytelling) and/or to edit existing pages.

Can I edit all the available contents?

Note that some specific pages curated by Tactical Technology Collective cannot be edited by the community. For instance the manual “Zen and the art of making tech work for you” cannot be changed on the wiki. You can however contribute to the manual by filling out our feed back template and help us identify new possible content.

What is the license of the content published in this wiki?

All content published in the wiki are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License unless otherwise noted.

You may only publish content that you created yourself or have permission to share. Note that you are solely responsible for the content, including but not limited to photos, profiles information, messages, search results edits, and other content that you upload, publish or display (hereinafter, "save page") on or through the wiki, or transmit to or share with other users.

Can I upload media content?

The wiki enables to display audio and/or visual content (including videos, photographs, music, graphics, logos, etc.), which has been licensed for use and exhibition herein from third parties (“Media Content”). Such Media Content may be accessible via a player embedded on the Site, which links to and plays content hosted on other sites or services (“Media Player”).

The upload media manager will also enable you to upload pictures, short videos and audios and enable you to underline under which license they should be referred to. However, remember you may not submit content to the Service that you did not create or where you do not have permission to submit. If uploading materials such as pictures with copyright license you should clearly indicate the source and author and upload it only for “fair use” as illustration of concepts or elements you are detailing in the wiki.

What type of content can I add in the wiki?

You can create new entries under the following broad categories. Note that each section is based on a specific form for creating a new entry:

Activities under which fall the documentation of the workshop and trainings dealing with gender and tech, privacy and/or digital security organised on the ground. The form enables to provide contextual information, agendas, resources used and learning outcomes. Related formː

Tutorials that document methodologies, processes and exercises about how to teach others about topics related to gender and tech, privacy and holistic and digital security. Related formː

HowTos about how we can learn ourselves about specific topics dealing with gender and tech, privacy and digital security. Related formː

Storytelling for sharing personal stories and experience about becoming a privacy advocate and/or a Digital Security Trainer. Related formː

What should I take into account before adding a new activity?

Remember that documenting is about sharing. Before publishing anything online you should always ponder about how and what you will publish can affect ourselves and others. The most important is to not publish information that could put you or the participants at risk. Depending of your own context and situation, publish the information you can share online with the consent of participants or without harming anybody.

Before creating a new entry, pay attention to the previous information published under this category and how it has been classified. For instance new entries falling under “Activities” should have a title following the pattern: Type of activities (Cryptofest, Digital security, Talk, etc), specific name of the activity (Meet up for Woman Rights Defenders), Country.

How to fill a new activity?

Find below some useful tips regarding the different fields included in this template/section:

Section 1: Contextual information (when, where, who, why, for whom, etc)

Title of the activity: Generally our titles are shaped as follows: format of the activity (workshop, screen, screen, talk, holistic security), the exact title of the activity, the country where the activity took place. Sometimes the title begins with the name of a conference or encounter if many related activities took place over there, for instance AWID etc.

Category of the activity: Choose whether it is mainly an activity around Privacy Advocacy AND/OR Digital Security AND/OR Gender and Tech (if you do not see the check boxes appear, please refresh your page)

Start when: After clicking on calendar image on the right, a calendar will appear where you can choose day/month/year. You can also fill it by hand if respecting format Day/Month/Year.

End when: Choose in the calendar Day/Month/Year.

Number of hours if only one day: Write the number of hours used for delivering the activity.

Where is located the activity: You can geolocalize directly in the map, but if you do not want to provide a precise location you can just enter a country or city name.

Who organise it: If it was a public event organised by your organisation or a partnerships between different collectives you can refer to those there. If it was organised by you and you want to make public your work as privacy advocate and/or digital security trainer you can also report there (remember to choose carefully whether you want to use your real name, a pseudonymous or a collective name).

Organisation(s) website: You can list the websites of organisations, collectives or their public social media profiles.

For whom is it organizedː As usual, give concrete details about your audience without exposing them to any risk, be consistent with your previous level of allowed details. However this information is important to understand the characteristics of public and communities reached out through your work, so try to find ways to share information. For instance: “women leaving in rural areas with low access to ICT and high use of social media. No previous knowledge on privacy tools” etc etc.

How many people trained: This number is also important in order to demonstrate our impact in the field.

Motivations for organizing training: You should mention the context that pre-determined the activity. Why this audience and those topics, what where the questions and needs that you wanted to address throughout the activity? You can also refer to specific threats, strengths, cases studies and initiatives that have motivated your work.

Topics addressed : Please enter a list of key words or tags following this tag system: [country, language, public, topics]. For exemple: kenya, swahili, women, journalist, safe space, riseup. The more tags we use, the more detailed the search engine of the wiki will be.

Links about the activity: If you published a call for, a meet up, documentation, articles; any type of public mentioning of the activity please share there.

Upload file: you can add images of any other graphic material of the activity (flyer, poster, others). As usual, remember to not expose faces or publish content about participants without their agreement.

Section 2: Add planning and documentation.

In this section, you can copy/paste the agendas you developed for that activity and share any interesting slide or resource you created for that purpose. This is a very interesting option to begin to share material in local languages. Try to provide links towards material and formats that can be edited by others (.odt, .txt, .svg etc). If not possible share under .pdf or .html for instance. In general when filling this section, bare in mind that what might seem for you very common and banal can become a fantastic new idea for another participants of the GTI network. Besides, it enables to share material in your own languages and add more diversity to the wiki.

Detailed schedule and content: Copy paste here the agenda you have used for the activity.

Methodologies for training: Describe how you have developed the activity, using which type of methodologies, icrebreakers, exercices, discussion topics, etc.

Existing toolkits and resources used during the activity: If you have used specific resources and links for guiding your activity you can share some of them. For instance, Security in a box, Take back the tech, etc etc.

Gender and tech tutorials used: If you have used specific tutorials listed in the please type those.

Section 3: Learning outcomes

This section is about sharing the learning outcomes derived from the experience, to acknowledge our feelings and the impact of our work on the ground by sharing the feed back we gathered.

Feelings: If you want to share about how organising this activity made you feel before, meanwhile, or after, this is the section to do it. It can be useful to reflect on one's own practices and it can help others to better understand what to expect when replicating something similar.

Feedback: Consists in any evaluation you have made with your participants or any type of feedback that you could gather about the activity.

Start, stop and keep: Sum up briefly one element of the activity you will start, stop and keep doing, now that you are informed by your previous experience on the ground.

How to fill a new storytelling?

This section invites you to share real stories of women and transgender people who become privacy advocates and/or digital security trainers. These experiences will inspire other women, LGTBI, human rights defenders and activists to imagine what the work is like, by sharing positive, negative and/or unexpected effects of the work in this field.

The stories will remain anonymous and will be used as examples in the wiki website and forthcoming manuals “Including Gender: New approaches to privacy and security” produced by Tactical Technology Collective. To assure a safe delivery, all stories sent through an online form will be encrypted and only used by the production team based at Tactical Tech.

To keep things manageable, please keep to 4500 characters maximum (more or less one page of a traditional A4 sheet) and do include a brief explanation of:

Context:  Where is your story taking place? Who are the actors? Please do not share any personal name but you can refer to the country/context and to the type of work achieved by you or the organization and communities you are training.

Motivations: Why did you decide to become a privacy advocate or a digital security trainer? Specify the type of threat you or your communities or partners were facing or trying to mitigate, the barrier or problem you wanted to overcome.

Outcomes: Are they positive, negative, unexpected? How do you feel about the new skills acquired? In which ways are those practices helping you and your trainees reach your objectives? What can you do now that you are a privacy advocate / digital security trainer, that you could not do before? How did your work impact the work of your organisation and your partners? How confident are you that you will continue to do this in the future?