Difference between revisions of "Manual introduction"

From Gender and Tech Resources

(Aims of the manual)
Line 2: Line 2:
 
== Aims of the manual ==
 
== Aims of the manual ==
  
This manual is the result of a conversation among many different actors (be it GTI participants and facilitators, the multiple authors and reviewers of this manual, from the global south and global north among which are women, queer, tran* and men) about what does it mean to include a gender perspective into privacy and digital security.  It addresses how to better manage our online identity and how to build and promote safe spaces on the internet and in the physical worldBecause we understand that including those fast evolving privacy and digital security practices into our already very busy lives as human rights defenders and activists is not an easy task, we believe in the importance of crafting collective mechanisms of support to keep advancing together, empower each other while keeping it zen in order to have our tech working for us.
+
This manual is the result of conversations among many different actors (be it GTI participants and facilitators, the multiple authors and reviewers of this manual, from the global south and global north among which are women, queer, tran* and men) about what it means to include a gender perspective into privacy and digital security.  It is informed by the numerous stories and creative practices of grassroots activists who have been developing appropriated and liberating technologies while ensuring gender justice, privacy and securityThe strengh of this manual comes from the diversity and heterogeneity of our experiences which derive from our daily practices with technologies (be those digital or social ones). From dreaming about technologies to developing them, from using them to contributing to their governance. Imagining liberating technologies where everybody is truly welcomed and respected is not a women and trans persons only task, it is a duty for anybody involved in creating an inclusive, accessible, decentralised and neutral internet.  
  
Storytelling and documentation of practices and experiences are key for achieving social transformation. In this sense, grassroots inventivity, creativity and knowledge in developing appropriated and liberating technologies while ensuring gender justice, privacy and security should be documented, highlighted, honored and shared. Then, the diversity and heterogeneity of our experiences deriving from our daily practices with technologies (be those digital or social ones) need to be included at every step of the technological cycle. From dreaming about technologies to developing them, from using them to contributing to their governance. Imagining liberating technologies that embrace a feminist Internet where everybody is truly welcomed and respected is not a women and trans persons only task, it is a duty for anybody involved in creating an inclusive, accessible, decentralised and neutral internet.  
+
This manual aims at addressing how to better manage our online identity and how to build and promote safe spaces on the internet and in the physical world. Since we understand that including those fast evolving privacy and digital security practices into our already very busy lives as human rights defenders and activists is not an easy task, we believe in the importance of crafting collective mechanisms of support to keep advancing together, empower each other while keeping it zen in order to have our tech working for us.
  
In a nutshell, including gender into privacy and security requires to engage with the diversity of cultures, social status, gender identification, sexual orientations, race, ethnicities and other power structures that create various forms and levels of inequality for individuals and communities into their access to security tools and practices. Enabling enthusiasm for privacy and digital security practices encompass an integrated approach linking those to our well being and physical security as human right defenders and our feminists and queer activism. By exposing the many invisible contributions that sustain digital security communities, avoiding frustrated expectations, gaining self confidence and losing fear through Do It With Others processes, gender and cultural diversity on those fields can be included. Accordingly, adapted, updated and targeted resources and training methodologies focusing on specific threats and strengths is required in order to activate curiosity and better understanding through contextual references.  
+
When attempting to include privacy and digital security practices in our lives it is fundamental to look at its relationship to gender. But first, what are gender roles? Gender roles are a set of societal norms dictating what types of behaviors are generally considered acceptable for a person in relation to their actual or perceived biological sex. These are usually centered around binary conceptions of femininity and masculinity, although there are myriad variations and gray scales in between. The first step for including gender consists in acknowledging the gender roles that society attribute to us at birth and during the rest of our lives and that generate stereotypes that can become prejudices. The latter can result into specific threats and violence against women, queer or non binary persons along the technological cycle i.e. from the moment a technology is assembled to the disposal of a technology (such as e-waste).  Gender gaps, discrimination and specific Violence Against Women are happening along the process in a structural way that influence our experience of/with ICT.
  
Gender roles are sets of societal norms dictating what types of behaviors are generally considered acceptable for a person in relation to their actual or perceived biological sex. These are usually centered around binary conceptions of femininity and masculinity, although there are myriad variations and gray scales in between. The first step for including gender consists in acknowledging the gender roles that society attribute to us at birth and during the rest of our lives and that generate stereotypes that can become prejudices. Latter can result into specific threats and violences against women, queer or non binary persons along the technological cycle. Gender gaps, discrimination and specific Violence Against Women are happening along the process in a structural way that influence our experience of/with ICT.
+
Including gender into privacy and security also requires an intersectional approach that is to engage with the diversity of cultures, social status, gender identification, sexual orientations, race, ethnicities and other power structures that create various forms and levels of inequality for individuals and communities into their access to security tools and practices. When we speak about including gender along the realms of privacy and digital security:
 +
 
 +
- we need to take into account the technological cycles from prodcution to assemblage to disposal, as within this cycle, a set of structural violences against women is embedded.
 +
 
 +
- we need to understand how different women in different conditions find ways of accessing technologies, even if they are not supposed to or supported in doing so, and how they can protect themselves and others in the process.
 +
 
 +
- we need to tackle specific gender-based online violence and build capacity on the ground so that women and trans* can protect and strengthen their freedom of opinion and expression.
 +
 
 +
- we ought to remember that it consists in researching the herstory and making women, trans* and queer experiences in the management and development of technologies visible, be those digital ones, or appropriated technologies such as permaculture or health and self-care technologies for instance.
 +
 
 +
- We need to understand that it means enabling a greater participation of women, trans* and queer into institutions contributing to the governance of Internet inasmuch as inside companies/organisations delivering services for supporting our networking and online identity.  
 +
 
 +
-We need to acknowledge that gender gaps, discrimination and VAW are happening along the process in a structural way and that they influence the conditions of women, trans* persons and at risk minorities in relation to their experience of/with ICT
 +
 
 +
To foster enthusiasm for privacy and digital security along a gender and intersectional frame requires an integrated approach linking those to our well being (self-care) and physical security as human right defenders and our feminists and queer activism. This includes exposing the many invisible contributions that sustain digital security communities, avoid frustrated expectations, gain self confidence and losing fear through Do It With Others (DIWO) processes, among others. Accordingly, adapted, updated and targeted resources and training methodologies focusing on specific threats and strengths is necessary in order to activate curiosity and a better understanding through contextual references.  
  
 
Because of all this, including gender is also about asking ourselves when we choose to use a specific technology if those are liberating or alienating ones for other groups and individuals. Liberating technologies could be defined as appropriated technologies that do not harm and are fairly produced and distributed, are rooted in the free software and free culture principles and are designed by default against gender based violence, surveillance, opacity and programmed obsolescence.  
 
Because of all this, including gender is also about asking ourselves when we choose to use a specific technology if those are liberating or alienating ones for other groups and individuals. Liberating technologies could be defined as appropriated technologies that do not harm and are fairly produced and distributed, are rooted in the free software and free culture principles and are designed by default against gender based violence, surveillance, opacity and programmed obsolescence.  
  
Nowadays, what is closer to feminist and liberating practices on the Internet are the Feminist Principles on the Internet developed by the Association for Progressive Communications (APC) in 2014 when they gathered a group of Woman Human Rights Defenders and feminist activists to a Global Meeting on Gender, Sexuality and the Internet with the mandate to come up with a first list of principles. Those are about the ways in which the Internet can be a transformative public and political space for women, trans-persons, queer, feminists. It situates tech-related violence on the continuum of gender-based violence making clear the structural aspect of violence linking, expanding and/or mirroring online attitudes with offline prejudices. The principles also highlight surveillance and lack of privacy as patriarchal tools, whether they are used by the state, private individuals or corporation, to control women and trans-persons bodies and thoughts.
+
Nowadays, what is closer to feminist and liberating practices on the Internet are the Feminist Principles on the Internet developed by the Association for Progressive Communications (APC) in 2014 when they gathered a group of Woman Human Rights Defenders and feminist activists to a Global Meeting on Gender, Sexuality and the Internet with the mandate to come up with a first list of principles. Those are about the ways in which the Internet can be a transformative public and political space for women, trans-persons, queer and feminists. It situates tech-related violence on the continuum of gender-based violence making clear the structural aspect of violence linking, expanding and/or mirroring online attitudes with offline prejudices. The principles also highlight surveillance and lack of privacy as patriarchal tools, whether they are used by the state, private individuals or corporations, to control women and trans-persons bodies and thoughts.
  
 
== What is this manual about? ==
 
== What is this manual about? ==

Revision as of 08:41, 27 May 2015

_TOC_

Aims of the manual

This manual is the result of conversations among many different actors (be it GTI participants and facilitators, the multiple authors and reviewers of this manual, from the global south and global north among which are women, queer, tran* and men) about what it means to include a gender perspective into privacy and digital security. It is informed by the numerous stories and creative practices of grassroots activists who have been developing appropriated and liberating technologies while ensuring gender justice, privacy and security. The strengh of this manual comes from the diversity and heterogeneity of our experiences which derive from our daily practices with technologies (be those digital or social ones). From dreaming about technologies to developing them, from using them to contributing to their governance. Imagining liberating technologies where everybody is truly welcomed and respected is not a women and trans persons only task, it is a duty for anybody involved in creating an inclusive, accessible, decentralised and neutral internet.

This manual aims at addressing how to better manage our online identity and how to build and promote safe spaces on the internet and in the physical world. Since we understand that including those fast evolving privacy and digital security practices into our already very busy lives as human rights defenders and activists is not an easy task, we believe in the importance of crafting collective mechanisms of support to keep advancing together, empower each other while keeping it zen in order to have our tech working for us.

When attempting to include privacy and digital security practices in our lives it is fundamental to look at its relationship to gender. But first, what are gender roles? Gender roles are a set of societal norms dictating what types of behaviors are generally considered acceptable for a person in relation to their actual or perceived biological sex. These are usually centered around binary conceptions of femininity and masculinity, although there are myriad variations and gray scales in between. The first step for including gender consists in acknowledging the gender roles that society attribute to us at birth and during the rest of our lives and that generate stereotypes that can become prejudices. The latter can result into specific threats and violence against women, queer or non binary persons along the technological cycle i.e. from the moment a technology is assembled to the disposal of a technology (such as e-waste). Gender gaps, discrimination and specific Violence Against Women are happening along the process in a structural way that influence our experience of/with ICT.

Including gender into privacy and security also requires an intersectional approach that is to engage with the diversity of cultures, social status, gender identification, sexual orientations, race, ethnicities and other power structures that create various forms and levels of inequality for individuals and communities into their access to security tools and practices. When we speak about including gender along the realms of privacy and digital security:

- we need to take into account the technological cycles from prodcution to assemblage to disposal, as within this cycle, a set of structural violences against women is embedded.

- we need to understand how different women in different conditions find ways of accessing technologies, even if they are not supposed to or supported in doing so, and how they can protect themselves and others in the process.

- we need to tackle specific gender-based online violence and build capacity on the ground so that women and trans* can protect and strengthen their freedom of opinion and expression.

- we ought to remember that it consists in researching the herstory and making women, trans* and queer experiences in the management and development of technologies visible, be those digital ones, or appropriated technologies such as permaculture or health and self-care technologies for instance.

- We need to understand that it means enabling a greater participation of women, trans* and queer into institutions contributing to the governance of Internet inasmuch as inside companies/organisations delivering services for supporting our networking and online identity.

-We need to acknowledge that gender gaps, discrimination and VAW are happening along the process in a structural way and that they influence the conditions of women, trans* persons and at risk minorities in relation to their experience of/with ICT.

To foster enthusiasm for privacy and digital security along a gender and intersectional frame requires an integrated approach linking those to our well being (self-care) and physical security as human right defenders and our feminists and queer activism. This includes exposing the many invisible contributions that sustain digital security communities, avoid frustrated expectations, gain self confidence and losing fear through Do It With Others (DIWO) processes, among others. Accordingly, adapted, updated and targeted resources and training methodologies focusing on specific threats and strengths is necessary in order to activate curiosity and a better understanding through contextual references.

Because of all this, including gender is also about asking ourselves when we choose to use a specific technology if those are liberating or alienating ones for other groups and individuals. Liberating technologies could be defined as appropriated technologies that do not harm and are fairly produced and distributed, are rooted in the free software and free culture principles and are designed by default against gender based violence, surveillance, opacity and programmed obsolescence.

Nowadays, what is closer to feminist and liberating practices on the Internet are the Feminist Principles on the Internet developed by the Association for Progressive Communications (APC) in 2014 when they gathered a group of Woman Human Rights Defenders and feminist activists to a Global Meeting on Gender, Sexuality and the Internet with the mandate to come up with a first list of principles. Those are about the ways in which the Internet can be a transformative public and political space for women, trans-persons, queer and feminists. It situates tech-related violence on the continuum of gender-based violence making clear the structural aspect of violence linking, expanding and/or mirroring online attitudes with offline prejudices. The principles also highlight surveillance and lack of privacy as patriarchal tools, whether they are used by the state, private individuals or corporations, to control women and trans-persons bodies and thoughts.

What is this manual about?

The internet is an amazing space to explore, learn, speak up, listen and communicate with people across the world. Unfortunately, it has also become a contentious space. There is a pushback against people who speak against, question or challenge dominant discourses, moreover if those deal with gender and sexual orientations. When planning to be active on the internet as a vocal women, a woman human rights defender, a trans-persons and/or a feminist it’s a good idea to start from an assessment of the traces we leave behind us on the Internet, our digital shadow and the social domains that are spread across our online and physical activities. These two aspects can tell very accurate stories about us; who we are, were we live and hang out, what we are interested in and who our friends are. Because those traces and on-line identity can expose us to several threats, this manual is about presenting you different strategies you can adopt and tools you can use in order to shape or control your digital shadow and social domains in order to obtain a greater privacy and security on-line. The first part of this manual will enable you to understand the traces you leave behind on the Internet, your digital shadow and metadata, which are the risks and empowering potential of different on-line identities (real names, pseudonyms, collective names and anonymity), how you can create new on-line identities and manage alone or with others various on-line identities.

Once, you have learn about the possible impact your online identities can have on your life, work and activism, and how you can develop strategies and use tools to mitigate possible risks and enhance possible strengths, the manual will introduce you to how build safe spaces for you and your organisation, but also how to develop safe spaces and spaces of resistance in mixed environments. Finally it will present how to create safe spaces in the physical world where women and trans persons can learn about privacy, digital security and technologies in general in order to get empowered and further contribute to those fields. Safe spaces have been used by marginalized groups and communities for many decades now. They have been a way to care for one-self and for a collective, to design and craft strategies and tactics of resistance and to create an oasis of peace in what sometimes can be a tiring struggle for resistance. Safe spaces have taken different meanings and bear different names depending on a variety of factors be it geographical, temporal, spatial, cultural and social, among others. This chapter will enable you to become a moderator well aware of fundamentals of net-etiquette and how to contribute to the creation and enforcement of social rules within online communities. You will learn the fundamentals about how to build Safe spaces online and offline, gain knowledge on process and methodologies to reclaim and resist into mixed environments spaced and become aware of current initiatives and processes that can be replicated in your community, organization, collective in order to become a safer space.

How to use this manual?