Difference between revisions of "Including gender in privacy and digital security"

From Gender and Tech Resources

Line 1: Line 1:
 +
=== Including gender = Intersectionality and feminist approach to technologies + Integrated (holistic) approach to privacy and security ===
  
A) Including gender = Intersectionality and feminist approach to technologies + Integrated (holistic) approach to privacy and security  
+
==== Individual and collective approaches to privacy and security / Combining our individual and collective responsibilities through DIY and DIWO dynamics ====
  
B) Individual and collective approaches to privacy and security / Combining our individual and collective responsibilities through DIY and DIWO dynamics
+
==== Acknowledge and takes into account gender and cultural diversity gaps and/or gender based specific threats and VAW (online and offline) along the complete technological cycle ====
 
+
C) Acknowledge and takes into account gender and cultural diversity gaps and/or gender based specific threats and VAW (online and offline) along the complete technological cycle
+
  
 
* From production of technologies (eg. Maquiladoras and VAW in centers of production) /
 
* From production of technologies (eg. Maquiladoras and VAW in centers of production) /
Line 12: Line 11:
 
* To end of life of technologies (e.g eWaste dump routes)
 
* To end of life of technologies (e.g eWaste dump routes)
  
D) Assessing risks and facing threats Vs Mapping resilience and strengths  
+
=== Assessing risks and facing threats Vs Mapping resilience and strengths ===
  
 
Online gender based violence Vs Offline VAW: Interactions and mirroring
 
Online gender based violence Vs Offline VAW: Interactions and mirroring
 +
 
Presenting for the 4 sub-chapters the main risks and threats and in which ways they specially affect women and LGTBQ persons and what will be presented as methodologies and liberating technologies to overcome those (e.g how this manual enables to mitigate, tackled or overcome threats such as doxing, blackmail, cyberstalking, harassment, hate speech, revenge porn, ruin life campaigns, surveillance, monitoring, censoring?)
 
Presenting for the 4 sub-chapters the main risks and threats and in which ways they specially affect women and LGTBQ persons and what will be presented as methodologies and liberating technologies to overcome those (e.g how this manual enables to mitigate, tackled or overcome threats such as doxing, blackmail, cyberstalking, harassment, hate speech, revenge porn, ruin life campaigns, surveillance, monitoring, censoring?)
  
E) About this manual
+
=== About this manual ===
 
   
 
   
 
Methodologies to develop it, who is behind the contents, how to use it, what is next?
 
Methodologies to develop it, who is behind the contents, how to use it, what is next?

Revision as of 07:21, 4 May 2015

Including gender = Intersectionality and feminist approach to technologies + Integrated (holistic) approach to privacy and security

Individual and collective approaches to privacy and security / Combining our individual and collective responsibilities through DIY and DIWO dynamics

Acknowledge and takes into account gender and cultural diversity gaps and/or gender based specific threats and VAW (online and offline) along the complete technological cycle

  • From production of technologies (eg. Maquiladoras and VAW in centers of production) /
  • Access to technologies (eg. Gender time gap/ surveillance of devices /discrimination and criminalization factors playing against women)
  • Uptake of technologies (eg. Gender type of uses of ICT and media, big data and privacy issues)
  • Development of technologies (e.g How to get more women into STEM, CS, FLOSS and Hacking)
  • To end of life of technologies (e.g eWaste dump routes)

Assessing risks and facing threats Vs Mapping resilience and strengths

Online gender based violence Vs Offline VAW: Interactions and mirroring

Presenting for the 4 sub-chapters the main risks and threats and in which ways they specially affect women and LGTBQ persons and what will be presented as methodologies and liberating technologies to overcome those (e.g how this manual enables to mitigate, tackled or overcome threats such as doxing, blackmail, cyberstalking, harassment, hate speech, revenge porn, ruin life campaigns, surveillance, monitoring, censoring?)

About this manual

Methodologies to develop it, who is behind the contents, how to use it, what is next?