Including gender in privacy and digital security

From Gender and Tech Resources

Revision as of 15:00, 3 May 2015 by Alex (Talk | contribs) (Created page with "Steps: A) Including gender = Intersectionality and feminist approach to technologies + Integrated (holistic) approach to privacy and security B) Individual and collective a...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Steps:

A) Including gender = Intersectionality and feminist approach to technologies + Integrated (holistic) approach to privacy and security

B) Individual and collective approaches to privacy and security / Combining our individual and collective responsibilities through DIY and DIWO dynamics

C) Acknowledge and takes into account gender and cultural diversity gaps and/or gender based specific threats and VAW (online and offline) along the complete technological cycle ---> … From production of technologies (eg. Maquiladoras and VAW in centers of production) / … Access to technologies (eg. Gender time gap/ surveillance of devices /discrimination and criminalization factors playing against women) … Uptake of technologies (eg. Gender type of uses of ICT and media, big data and privacy issues) … Development of technologies (e.g How to get more women into STEM, CS, FLOSS and Hacking) … To end of life of technologies (e.g eWaste dump routes)

D) Assessing risks and facing threats Vs Mapping resilience and strengths ---> Online gender based violence Vs Offline VAW: Interactions and mirroring Presenting for the 4 sub-chapters the main risks and threats and in which ways they specially affect women and LGTBQ persons and what will be presented as methodologies and liberating technologies to overcome those (e.g how this manual enables to mitigate, tackled or overcome threats such as doxing, blackmail, cyberstalking, harassment, hate speech, revenge porn, ruin life campaigns, surveillance, monitoring, censoring?)

E) About this manual ---- > Methodologies to develop it, who is behind the contents, how to use it, what is next?