Holistic Security - Demonstrating the interconnectedness

From Gender and Tech Resources

Revision as of 10:26, 27 July 2015 by Eva (Talk | contribs)

Title of the tutorial Introduction to Holistic Security
Attributions
Kind of learning session
Tutorial category
Duration (hours) 1
Learning objectives Be able to identify various elements (digital, physical, psychosocial) and their interconnectedness in a practical scenario on security management.
Prerequisites The session plan constitutes a scene setter/grounding exercise at the beginning of a training (possibly followed by collecting expectations, making agreements etc.)
Methodology [[Methodology::== Activity & Discussion Demonstrating the interconnectedness (20 minutes) ==

Step 1. Participants are given the following scenario either on paper or projected via a screen. Olga Alekseevna [can change name] is a human rights defender travelling to attend a conference abroad. She is going to present a report on the situation of human rights in her country. She is travelling with some equipment including her telephone, computer and her USB flash drive, which contains some drafts of her report. She hopes to finish the draft once she arrives. She is travelling alone, and when she goes to the airport and arrives at customs, she is approached by officials who do not identify themselves. They ask her directly whether she has any "digital devices" with her. She is surprised and nervous and since she does not understand what "digital devices" means, she answers "no". They then ask her to put her bag through an X-ray scanner, and discover a USB flash drive in her bag. She is then asked to take the flash drive from her bag and hand it over to them. Olga thinks about challenging them and telling them they had no right to take her device, however she is not sure in this case what her rights are, and she is also afraid that if she argues with them, she may miss her flight and not have the chance to present her report. They ask her to wait where she is, and they disappear into an office for fifteen minutes with her flash drive. When the officials return, they hand back her the flash drive, and wish her a pleasant flight. She is nervous throughout the flight, worrying about what has happened to her flash drive and the data which was on it. When she arrives at her destination, she turns to her colleagues for advice.]]

Number of facilitators involved 1
Technical needs xx
Theoretical and on line resources Holistic Security Guide