Property

Detailed schedule and contents

From Gender and Tech Resources

This is a property of type Text. It links to pages that use the form Activities.

Pages using the property "Detailed schedule and contents"

Showing 25 pages using this property.

(previous 25) (next 25)

D

Digital security workshop - Les Degommeuses +Program : * Issues about Security, Privacy, Anonymity * Mapping activities and risks * Draw your tech day * Ask yourself good questions * Secure your devices and data * What is Internet ? * How the data are circulating in the network * Reduce your digital shadow * Use emails in a safer way * Preserve your anonymity, circumvent censorship * Social network, safe space, online identities * Téléphone mobile / intelligent * Specific questions * Good practices, a synthesis * Identifying good resources  +

E

Editatona Mujeres Nicas +La jornada de la Editatona Mujeres Nicas tiene dos momentos. Comenzamos desde cero, con el taller ¿Cómo editar Wikipedia?, donde estaremos creando nuestros perfiles de usuaria y comprendiendo mejor la dinámica de la plataforma, sus principios y cómo se debe estructurar el contenido. Luego pasamos a una sesión de creación y edición de biografías sobre mujeres nicaragüenses, 5 horas de Manos a la Obra para trabajar colectivamente y aprender las unas de las otras.  +
EnGENDERing digital security workshop - Circumvention Tech Festival, Spain +1. Facilitator intros, quick intros if small enough group (20-30 people?) 2. Defining terms: (20 minutes) 3. What is gender-based violence? (15 minutes) 4. Threat modeling questions: (10 minutes) 5. Full group activity: (15 minutes) 6. Individual reflection activity: (15 minutes) 7. Facilitator questions to the group: (10-15 minutes) 8. Small group activity: Develop a case study (30 minutes) 9. Report cases out in plenary (~30 minutes total) 10. Sum up 11. Closing exercise.  +
Encryption trainings for journalists, Mexico +It was a 4 hours workshop oriented at journalists working for a news portal. Their primary means of communication to deliver news is the email but they were suspicious that their emails were being infiltrated by the competition and government agencies because some of their secrete communication appeared first in other journals and because there have been many intrusions attempts into their servers. The purpose of the this workshop was simply to learn to encrypt their mail. It was oriented at people that has a hiugh level of access and use of ICT. The workshop was held Friday during extra hours time once the portal edition of 6PM was over. This workshop was harder because although journalists were somehow aware of the risks, there was not such a clear idea and interest for combating threats. There was a highly pragmatic perspective that if the implementation of those DST were too time consuming in daily base they would be impossible to use for their journalistic duties. In this case I felt I needed documentation to give to them about the risks journalists are subjected because of not securing their digital security tools. It also felt super important to offer to journalists targeted trainings that can fit thoir agenda and be highly personalized in order to accompany them in that process. These experiences have prompted me to finally open the ADA community space (www.ada.org.mx) for one day a week in order to advise / join / share digital security elements in a playful way beginning by the meetings “Saturday and hacking craft beer”. Those have been held during the last three weeks and have been very positive. Soon more plans coming on the agenda that we will be sharing with you Take care  +
Epu Txawün Pichikeche por una Infancia Libre y sin Represión, Wallmapu +En el pdf adjunto pueden leer acerca de todas las actividades realizadas en el encuentra. Destacamos el taller de seguridad digital realizado para los adultos del txawun pichikeche, específicamente los líderes de los territorios presentes. Se plantearon los temas de seguridad en cada uno de sus focos físicos, organización y digital y de como esta ha afectado en sus proceso de lucha y de como también el día de hoy se utilizan los métodos utilizados por los antiguos para poder levantar los procesos de lucha. Se plantea la importancia de conocer más sobre la tecnología y sus eventuales utilizarla sin riesgos de cuidados, planteando así realizar el taller de forma más cerrada en cada territorio y con quienes requieren adquirir el aprendizaje y de esta forma ellos hacer entrega de los aprendizajes a cada territorio al que pertenecen.  +
Europarlament, Digitale Revolution Feminist, Brussels +Sichtbarkeit von Frauen* Unumstritten ist, dass die digitale Revolution neue Möglichkeiten geschaffen hat am gesellschaftlichen Diskurs teilzunehmen – und das gerade für diejenigen, die nicht in den Mainstream Medien vertreten sind. IMG_0879 Gleichzeitig muss der Zugang für Frauen*, das Internet mit gestalten zu können, erleichtert werden. Deshalb braucht es finanzielle Förderungen von Frauen, die im digitalen Sektor tätig sind oder tätig sein wollen, und die deutliche Erhöhung des Frauen*anteils im bisher männlich dominierten ICT Sektor. Um die Sichtbarkeit von Frauen* zu fördern, fordern wir, dass sich in ganz alltäglichen Praktiken strikte Regeln etablieren, ein Beispiel wäre: kein(e) Frau(en)* im Panel, kein Panel. Feministische Netzwerke stärken Für alle Teilnehmer*innen stand fest: Es braucht gemeinsame Plattformen und Netzwerke. Um sich zu vernetzen und zu unterstützen, um Erfahrungen auszutauschen, neuen Input zu bekommen und gemeinsame Ideen weiterzuentwickeln. IMG_0831 Misogynie wird im Internet in erschreckenden Dimensionen praktiziert. Dem dürfen wir keinen Raum geben. Put the shame where it belongs! Cyber Harassment, Revenge Porn und viele andere Tools von Anti-Feminists müssen enttarnt werden: Als abscheuliche Formen von Gewalt gegen Frauen*. Darauf müssen wir politische Antworten entwickeln. Sexistische Kommentare und Kampagnen haben in einer emanzipierten Gesellschaft keinen Platz. Aber wir müssen auch strukturelle Diskriminierungen in der Gesellschaft bekämpfen und für die Rechte von Frauen einstehen. Ein freies, inklusives und gleichberechtigtes Internet braucht eine freie, inklusive und gleichberechtigte Gesellschaft. Den Initiativbericht von Terry, den sie für den FEMM Ausschuss verfasst hat, könnt ihr hier lesen.  +

F

F3mhack - Hacktona Feminista, Sao Paulo, Brasil +Hackatona Feminista - 23/05/2015 13h - 16h OFICINA 1. Apresentação basica de segurança e de todas as ferramentas - 13h - 14h 2. Divisão em grupos por ferramentas específicas - 14h - 16h 1. Navegação segura - complementos para browser 1. criptografia de email 1. criptografia de arquivos 1. chat seguro 1. o que fazer com o celular 16h - 20h HACKDAY 1. Fala de abertura Privacidade: por que ela é importante? Explicar e expor a importância a segurança da informação, por que ela é uma aliada. Desvincular a ideia de que as ferramentas são chatas, difíceis e inacessíveis e enquadrá-las como importantes e legais. Mostrar como essas ferramentas contribuem para o cotidiano do nosso ativismo e nossa vida prática. 2. Espaço de criação de comunicação Objetivo: Desenvolver novas linguagens para aproximas mulheres e LGBTs de segurança da informação e privacidade. Despertar reflexões sobre narrativas eficazes para tratar do assunto. “Como você chamaria uma amiga para se envolver com SI?” Estrura da discussão: 3 eixos - Por que SI é importante para você como indivíduo (privacidade, proteção dos dados pessoais)? - Por que SI é importante para você como mulher? - Porque SI é importante para seu grupo/coletivo?  +
FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Argentina +'''23rd of May, 10-18hs Tierra Violeta Cultural Centre ''' 10-11.30pm Discussion of specific tech needs & experiences of feminist & LGTBQIA community members present. 11.30-13hs presentation of privacy & surveillance issues, and how internet works/ how email works & GPG. 13-14hs vegan & vegetarian lunch and drinks. 14-17.30hs Feminist Hackerspace - migration to riseup/openmailbox, - installation of Thunderbird with Enigmail - generation of key pairs - testing and verification. 17.30hs + - Closing circle & feedback.  +
FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Indonesia +Feminist Hack Days To End Violence Against Women & LGBT AGENDA Day 1: Feminist Hackathon #femhack 23 May 2015 Time Session 09:30 – 09:55 Registration 09:55 – 10:15 Opening and Introduction 10:15 – 11:45 Digital Privacy – Presentation and Discussion 11:45 – 13:00 Online Violence Against Women & LGBT - Presentation 13:00 – 14:00 Lunch 14:00 – 14:30 Online Violence Against Women & LGBT – Sharing Experience 14:30 – 15:30 Discussion 15:30 – 16:00 Break 16:00 – 17:00 Social Media Survey 17:00 – 17:30 Conclusion & Review Day 2: Digital Security Training 24 May 2015 Time Session 10:00 – 10:30 Women in Tech - Presentation 10:30 – 11:00 How the Internet Works & Digital Communication Model 11:00 – 12:00 Strong Password - Keepass 12:00 – 13:00 Circumvention Tools 13:00 – 14:00 Lunch 14:00 – 14:30 Circumvention Tools 14:30 – 15:30 Privacy & Anonymity 15:30 – 16:00 Break 16:00 – 17:00 Be safe online – Share your strategy! 17:00 – 17:30 Review Day 3: Digital Security Training 25 May 2015 Waktu Session 09:30 – 13:00 Secure Mail & PGP 13:00 – 14:00 Lunch 13:30 – 15:00 Secure Mail & PGP, Key signing party 15:00 – 16:00 OTR (Off-The-Record) Messaging 16:00 – 16:15 Break 16:15 – 18:00 Mobile Security 18:00 – 18:30 Review  +
FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, La Plata, Argentina +'''30th of May, 10-18hs Awkache Cultural Centre ''' 10-12.30pm Discussion of specific tech needs & experiences of feminist & LGTBQIA community members present, with two exercises using specific risk analysis mapping (personal and in groups). 12.30-14hs Presentation about ICT as a "new space for gender based violence", risks and strategies. 14-14.30hs vegan & vegetarian lunch and drinks. 14.30-17.30hs Feminist Hackerspace - Working with installing TextSecure / Surespot for secure on the run organising. - Secure passwords and Keypass to keep phones & computers safe. - How do we find the information and guides we need (Tor, StartPage, Reddit) while avoiding triggers and sexism. 17.30hs + - Closing circle & feedback.  +
FemH3ck - Feminist Caravan 1200 km, Mexico +23 mayo guadalajara Actividades con el laboratorio de interconectividades en su taller de SD Charla en el Centro Social la Madriguera 24 de mayo Actividad con la UPVA 28 de Octubre, charla sobre redes sociales y anonimato, entrevista a Rita, lider de la organzación. 30 de mayo Charla de Seguridad digital en el Auditorio Che Guevara 31 de mayo Taller con el grupo de Autodefensa de mujeres de Oaxaca¿  +
FemH3ck - How the internet works for WHRD, Mexico +Voces de Mujeres (Women's Voices) was a 3 days training on multimedia production with WHRD in Amecameca, Estado de Mexico. During this 3 days we covered: Narrative - How to tell a story How to conduct an ethic and secure interview Video, photo, text and audio production Digital security: How the Internet works? - What do we use Internet for? - What type of information do we exchange through Internet? - Exercise with the cards: giving each person a card (router, computer, ISP, Google..) - Looking at the risks - What could go wrong on each stage? - What can we do or which tools can we use to solve this? - Questions  +
FemH3ck - Round table Privacy and security in the Open IT Space, Serbia +The organization of the Round Table with the workshop took place in several phases: -The First phase was the conclusion of a contract with the Media Centre Nis in order to provide space for holding events, and technical support. -The Second phase included the agreements with educational institutions dealing with education in the field of Information Technology 'IT Centre' and the Technical High School in Nis, in order to provide expert trainers on training and agree on topics that will be covered in the educational process, as well as ways their presentations to the participants and wider audiences. - The third phase involved the selection, calling and informing participants of the round table and workshops. -The Fourth phase has been informing and inviting the media to be actively involved in the work of the round table and workshops. - The fifth phase was the maintenance of the event with all the planned activities. Meanwhile, in the performance of all of the above mentioned phases in the process of organizing the event is done visually designing, preparing for and printing of supporting educational and promotional materials, as well as procurement of workshop materials. Agenda of the event: ROUNDTABLE WITH WORKSHOP TO RAISING AWARENESS, UNDERSTANDING AND DEVELOPMENT OF PRIVACY AND DIGITAL SECURITY FOR WOMEN activists and representatives of civil society organizations to fight for human rights Media & Reform CENTER NIS, Obrenovićeva 38 Monday, May 25th, 2015. – Introductory presentation on the concept of IT security and the press - Valentina Aleksandrovic, Chairwoman of the Association of Women's Development Center and participant of GPS Camp -Impact of the Internet and IT technology on privacy and security in communication- Valentina Aleandrovic, Chairwoman of the Association of Women's Development Center and participant of GPS Camp Topics: Risk assessment What are the 'digital shadow' What is' Metadata '' Tracking Endangering other Discussion Coffee brake – Mechanisms and tools to achieve a greater level of security on the Internet –IT Education Center Nis –Miloš Perić, dipl. inž. elektronike – sistem inženjer u IT centru;Aleksandar Petrović – student Visoke tehničke škole u Nišu Topics: -Protection from malware and hackers -Data protection from physical threats -Creating safe access codes (paswords) -How to protect privacy in online communication - How to safely use smartphones - Discussion - Lunch  +
FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya +- Welcome to the training and Introductions: The facilitators gave a brief background of why the training was taking place. This included the thinking behind f3mhackathon and also sought to explain a little about Sabeen Mahmud and why we were dedicating this special day to her memory. This session also gave the participants an opportunity to get to know each other and the facilitators and to share their expectations of the training. Staying Safe Online ( a peek into Kenya’s women background on cybercrime and/or harassment: IAWRT Kenya) –This session sought to give a background on the situation of cyber crime in Kenya against women with a special focus on the qualitative research conducted by the International Association of Women in Radio and Television, (IAWRT-Kenya):Ending Violence: Women’s Rights and Safety Online. From the research the facilitator of this session shared a story of one of the case studies of the research where a certain lady had openly shared her passwords to various online accounts with her partner and father of her children but he had in turn used her passwords and posed as her when interacting with her friends , relatives and family including abusing them online. This was coupled with physical beatings. The sharing of this story was aimed at providing the context of why it is important for us to spend some time learning more on how to enhance our digital security online and start privacy advocacy campaign. Digital Security (Yvonne explain further on this session) Privacy Advocacy –For one to understand why privacy advocacy is crucial, the facilitator took the participants through a personal exercise of mapping one’s shadow on the internet. These shadows were captured through drawing and were posted on a white board by each participant. This exercise led to discussions on the traces we leave online and the possible challenges we are exposing to ourselves everytime we are online. The participants were then divided into various groups where they were expected to take up collaborative roles such as : You are a company that would like to sell crucial data on various people or organizations to the government. Using the data shadows on the white board identify which persons/organizations you think the government would be interested in and why they would be interested in them basing it on the data shared on the data shadows. Or You have just opened a new restaurant in town. Identify which people (from the data shadows) you would like to target and how they would be important to your restaurant. The participants were then expected to make a presentation to the plenary of their findings. These presentations led to further discussions on issues such as the use of free online platforms actually means that the individual is the product. That it is very easy for anyone with a specific motive or focus to collect data about you without your knowledge and hence that is why it is important to make use of the various digital security tools to protect your data where possible and to ensure that one does not leave their traces online. The members of the same group were further given a task to think about what they can do based on their various professions on what they can do towards informing others on how to protect their digital privacy and any initiatives they may think of that would be helpful towards championing for privacy advocacy. The participants also got to share their ideas in plenary. The facilitator further added some key points on other initiatives they can undertake towards achieving privacy advocacy.  +
FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya +Agenda of the event: Day one: Enhancing capacity of women in digital security and privacy advocacy – Welcome presentation by Mary Kiio and Yvonne Oluoch Honor of Sabeen Mahmud, a moment of silence for her death -Staying safe online presentation by Mary Kiio Discussion of various scenarios from the audience Digital Security Tools and tactics presentation by Yvonne Oluoch Privacy Advocacy presentation by Mary Kiio Group work and discussion Lunch break Afternoon session Group work and group presentations Tea break NB:The above sessions were in line with the training that was conducted in Nairobi, however as their was more time , there were more in depth discussions on the issues identified during the training. The training on digital security tools was also elaborate as the facilitator went online and took the participants through various ways of utilizing the various digital security tools. One spectrogram exercises was utilized during the training session that provided a healthy debate among the participants towards their understanding on tech related violence. Day two Round table discussions on policy advocacy and implementation The discussions were aimed at guiding the participants to think of channels they can use towards developing policy within the university. The participants spent time thinking through the various channels a new policy has to go through before it is adapted i.e the bottoms up approach where the students would first bring up the issue on the need for tech related violence and go through the various university processes until it is adapted as an official policy. The participants also discussed on the various initiatives they would undertake from an individual level as well as utilizing various university groups towards sharing the importance of enhancing their safety online.  +
FemHack Bogotá 2016 +El plan es dedicarnos a trabajar en la visibilización de colombianas a través de la creación y/o mejora de artículos biográficos en Wikipedia, la caza de redacciones machistas, sexistas o misóginas en Wikipedia (ej. estado civil, número de hijos) para hacer capturas de #AlertaMachitroll y editarlas. También tendremos tiempo para reunirnos entorno a la radio y la música con la mesa de radio en vivo con perspectiva de género y PlayList femenina. Para finalizar revisaremos la caja de herramientas antirepresiva y el Juego Compa del colectivo A Las Calles Sin Miedo.  +
FemHack Managua 2016 +:== Autodefensa digital feminista === Tiene por objetivo mitigar expresiones de violencia digital a través de información y herramientas para proteger su privacidad e integridad en la red con un enfoque feminista. A través de ejercicios vivenciales analizaremos nuestras prácticas tecnológicas; para entender mejor cómo funciona el flujo de información en la red; para luego pasar a un análisis colectivo de casos reales, de las región, de violencia digital por razones de género y poder identificar las estrategias utilizadas. En la segunda parte conoceremos algunas herramientas básicas para navegar y comunicarnos de manera segura. === Oh oh, sexualidades digitales === Está pensado como un espacio de intercambio reflexivo alrededor del uso de las tecnologías como medios que aportan al empoderamiento y la autonomía en la vivencia de la sexualidad de las mujeres. Habrá un momento dedicado a reconstruir experiencias y prácticas de las participantes en relación a la utilización de tecnologías como herramientas para encontrar placer, en diálogo con elementos como la libertad, la intimidad y la privacidad en estos contextos. Además se desarrollará una conversación en relación al porno feminista como propuesta política, tecnológica y subversiva en la cultura digital contemporánea. === Fanzine ciberfeminista === Un fanzine es una publicación no comercial, creada artesanalmente en colectivo, de manera libre y autónoma: que combina contenido en diversos formatos (texto, fotografía, collage, poesía, ilustraciones) sobre un tema específico. En este taller haremos un recuento personal sobre nuestra relación con la tecnología; para luego pasar a crear colectivamente el o los fanzines. === Voces, Narrativas y Tecnología === Cada corporalidad tiene anclada una serie de historias, las cuales necesitan de voces para contarlas. En el transcurso de la vida nos vamos dando cuenta cuán difícil puede ser contar nuestras propias historias, porque para hacerlo debemos viajar a lo profundo de nuestras memorias, ahí donde duermen muchas vivencias que necesitan salir a la luz. Este espacio busca en primera instancia provocar que esas historias salgan, y poder registrarlas. Reconociendo que las historias de las mujeres son bastante relevadas de las historias oficiales, nos reapropiamos de nuestras voces y memorias y las diseminamos en el espacio analógico/ virtual. Sobre todo porque sabemos que el eco y humo de nuestras historias le comunican y provocan cosas a otras que las perciben de lejos. === ¡Ideay! La tecnología es cosa de mujeres === El objetivo principal es propiciar la (auto) reflexión acerca de cómo las mujeres nos relacionamos con la tecnología, nuestras fortalezas y debilidades. Los objetivos específicos son: 1. Reflexionar sobre la relación personal que las mujeres tenemos con la tecnología, y específicamente con las tecnologías de la información y comunicación (TIC). 2. Reconocer a diferentes mujeres de la historia que han realizado aportes en el ámbito tecnológico y científico. 3. Redefinir a las mujeres como usuarias de tecnología y productoras de contenido relacionado con las TIC.  +
Feminist Internet Meeting, Malaysia +We began with stories. Personal and collective stories of our struggles that form as bookmarks and knots to the long thread of feminist organising and movement building in issues as diverse as queer rights in Aceh, to sex work in Uganda, funding women's rights organisations in Georgia, and building autonomous feminist internet radio networks in Brazil. We brought artefacts from our movements – photographs, posters, publications, stickers, protest banners, anti-surveillance toolkits, bottles of healing elixirs and more – and threaded our stories through them. How we became involved, why this mattered, how we lost people whom we were loving inspired by and through that, building relationships of care and solidarity, and how our presence and action ruptured the normality of discrimination. This was important not just to locate ourselves in our collective history of movement building, but to also to recognise that we've got this. That as a movement, or as movements, we have encountered innumerable challenges and worked together in different ways to figure things out and respond with shared political commitment. To also know that we have much to build from, and that this is a moment in a long trajectory of feminist organising in creative and resilient ways all over the world. And that memory is resistance, especially when our histories and contribution have been and are actively being rendered invisible. The act of recalling, of naming, is to also make visible our claim in shaping the world we are in. The act of recalling, of naming, is to also make visible our claim in shaping the world we are in. Discourse as a site of activism Digitally networked technologies have seeded and enabled the proliferation of feminist expression in multiple spaces, from online journals to podcasts, digital archives, the humble comments section, digital storytelling projects, social media engagement and more. This has contributed to the most stubborn and invisible quadrant of change in the classic framework of how change happens: that of culture and norms, and in behaviour, thoughts and attitudes. There were many activists at the MFI who were engaged in content and discourse related initiatives, such as the Kohl Journal that surfaces critical analysis on gender and sexuality in the MENA region, Skin Stories that provides deep reflection on the many dimensions of disabilities and sexuality in India, and Bnt Al Masarwa, an independent feminist band that transformed conversations with women across three villages in Egypt into lyrics that provoke further conversation. This does not yet include the many people present who engage on social media as a political site of their everyday activism in pushing back against patriarchal discourse and norms, and face serious and critical backlash in response. This has contributed to the most stubborn and invisible quadrant of change in the classic framework of how change happens: that of culture and norms, and in behaviour, thoughts and attitudes. Yet, women's movements tend to instrumentalise our engagement with digitally networked technologies. There is an approach of “using social media to reach out to more people,” instead of seeing it as a space of activism in and of itself. Perhaps this is understandable due to the milestones achieved in engagement with policy and legal reform in recent decades, but in an age of unprecedented circulation of information, discourse, visuals and knowledge – there is a need to reimagine and understand better discourse as a site of activism, in and of itself, and its potential for deep transformative change. Constellation of actors, leadership & accountability In particular, discourse as a site for activism is important to also see new and emerging actors who are part of feminist organising, but remain outside of the more familiar format of organisations. Some of them are content creators, some are social media activists, some are part of interest-driven collectives, some are feminist techies, and some are what I like to call “free radicals” - nodes that connect between formal organising and informal networks who act as key bridge builders and interlocutors of different actors and different spaces. The internet and its capacity for anonymity and distance has also enabled actors who are diffident of visibility for various reasons (e.g. risk, introverts etc) to participate actively and expressively in organising for change. Some of them are content creators, some are social media activists, some are part of interest-driven collectives, some are feminist techies, and some are what I like to call “free radicals” - nodes that connect between formal organising and informal networks who act as key bridge builders and interlocutors of different actors and different spaces. This is significant for several reasons. First, to appreciate the actual breadth and diversity of the movement. Even as there are valid concerns about the sustainability of organisations in terms of new leadership, it is both pivotal and reassuring the recognise that the movement is in fact, much more diverse and broader than imagined. This brings with it some key questions compel attention as we think through how to contribute to building stronger movements. For example, the backlash and attacks that are being faced by those who agitate patriarchy with feminist narratives in the public-private domain online. Without a recognition and an effort to forge connections, we are coming up short in our efforts at solidarity and resilience. Another question is on leadership and accountability, where we have placed our investment on this, and the challenges that arise from it. One instance is on addressing sexual harassment in the movement – a conversation that is currently alive and having the potency of upturning the quiet toxic culture of sexualised power in our everyday engagement. We have thought through and provided for this through the model of institutions. But where we have different and informal lines of accountability to each other through shared political commitment, there is a discernible lacuna. Much of this is being taken up online, by individuals and collectives, that brings with it both possibilities and challenges. One instance is on addressing sexual harassment in the movement – a conversation that is currently alive and having the potency of upturning the quiet toxic culture of sexualised power in our everyday engagement. How do we think through accountability in a movement where there is a diversity in terms of constellation of actors and how we relate to each other? Who do we see as leaders and custodians of the principles that matter to us in our work for change? And is it possible to reframe the question of intergenerational leadership to one that is perhaps more about intersection of actors, spaces and ways of organising? Documentation of MFI meeting 2017, Malaysia. Museum of Movements, photograph by Fungai Machirori Pace, sustainability and ways of organising Another cluster of issues discussed at the convening was on the pace and sustainability of our organising. This is relevant not just in terms of resource mobilisation – although facets for consideration of that are many, ranging from supporting actors who are involved in informal ways of organising, to greater restrictions placed by the state to funds that can be received by NGOs – but also in terms of the rhythms of our movement. There appears to be campaigns, protests and threats in rapid succession, creating a hectic cadence that result in several things. One is burn out and an increasing sense of fatigue that requires serious consideration as we reflect on what it means to practice the politics of self and collective care. Another is rendering moments of abeyances invisible. The everyday labour of organising that happens in the in-between times. What do we see, and not, in our activism? In an age where internet technologies run on the logic capital of visibility and eyeballs, how are we resisting this by reclaiming our pace, and privileging the everyday work, and the people who do them? How does the everyday work look like in the evolving and nebulous ecosystem of our movements in a digital age? One is burn out and an increasing sense of fatigue that requires serious consideration as we reflect on what it means to practice the politics of self and collective care. It was also recognised that the steps in which we understood movement building to happen is no longer as clear and linear (perception of injustice > leadership > critical analysis > building shared political agenda > organising & building constituency > identify actions, strategies & priorities > act for change > visibility/backlash > gains > analysis > expansion of membership base). While this may have always been true to an extent, the distribution of leadership, actors and ways of organising enabled through digitally networked relationships and sites of organising have troubled this in significant ways. In particular, the building of a shared political agenda and the development of strategies and actions. This is happening at multiple sites, through the leadership of multiple nodes, that may or may not be in relationship with each other. A visible conversation online could be the start, rather than an outcome, of taking action for change and the building of a constituency. Perhaps what is more important than consideration of which steps come first, is the shifting terrain of each component. One is the notion of constituency in a digital age. This was discussed in terms of the more familiar question of who is representing whom, particularly in unstructured formats that lie outside of institutional structures, as well as the critical question of access to the internet. Access to what kind of internet was a key issue at the MFI. Recognising that access is not just about connectivity and devices, but also skills, online communications culture and dominant languages played a role in terms of who can be seen, heard and included in particular moments in the movement. This conversation had many complex layers – from thinking about current disparity in internet access between and within geographical locations and people; to the commodification of our narratives and political actions as we rely on privatised online spaces for our organising; to the need to think about feminist digital infrastructures not just as technical responses, but a response that subverts the current logic capital of technology and access; to the ability of multiple connections and the forging of global political solidarities; as well as enabling muted voices within feminist movements as well as in the larger public to find kin and amplify their realities. We discussed in terms of the more familiar question of who is representing whom, particularly in unstructured formats that lie outside of institutional structures, as well as the critical question of access to the internet. What became evident to me throughout the four days, is also the need for an exchange of movement building skills, capacities and strategies that can integrate lessons and questions from onground and online organising. On how we understand leadership, accountability, constituency building, representation, issues, ways of organising, sites of activism, pace, change and impact. Breaking the binary: Feminist Principles of the Internet Perhaps the most important point of conversation at the MFI was the urgent need to break the binary between what is perceived as online and onground. Rather than see them as distinct, to understand the flow and impact between one and the other, and where embodiment lies as a site of this intersection. This is not just in terms of the ways in which we recognise and understand the shape and form of our movements, but also the intersection of issues that we need to take into account as we continue in our work to critically analyse power structures towards imagining transformative futures. The collectively developed Feminist Principle of the Internet can act as a seed and a framework for the conversation. To recognise that first, feminists and women's movements have always been part of the history of the internet for social justice and change, and have played a pivotal role in its development. And that we need to apply a feminist lens of deconstructing power in understanding and engaging with an increasingly digitally networked world. From issues of access, to expression, the economy, governance, embodiment and public participation. And when we begin the conversation with our political framework, and grounded through the diverse realities of our contexts, then we locate ourselves as critical stakeholders, articulators, shapers, dreamers and political actors of our unfolding past, present and future. When we begin the conversation with our political framework of feminism, and grounded through the diverse realities of our contexts, then we locate ourselves as critical stakeholders, articulators, shapers, dreamers and political actors of our unfolding past, present and future.  +
Formacion Ciberactivismo, Cuenca, Ecuador +1- ¿Qué es el internet? y ¿Cómo funciona? 2.- ¿Que son las redes sociales? 3.- ¿Que hacen los ciberactivistas? 4.- Privacidad: Nada es gratuito en internet. (Buscadores, navegadores, y cookies.) 5.- Contraseñas seguras y correo seguro. 6.- Lenguaje seguro y buenas practicas cotidianas con nuestra información personal. 7.- Funcionamiento de: Facebook, Twitter, Instagram, Telegram, Whatsapp, Signal. 8.- Herramientas para usar concientemente las redes sociales. 9.- Pensando un internet feminista 10.- Incidencia a través de la internet en la sociedad y el Estado con respecto a temas de derechos sexuales y reproductivos y GLBTI. (mensajes claves, twitazos, creación de memes, gifs, y plataformas de indicencia).  +
Formacion Ciberactivismo, Santa Elena, Ecuador +1- ¿Qué es el internet? y ¿Cómo funciona? 2.- ¿Que son las redes sociales? 3.- ¿Que hacen los ciberactivistas? 4.- Privacidad: Nada es gratuito en internet. (Buscadores, navegadores, y cookies.) 5.- Contraseñas seguras y correo seguro. 6.- Lenguaje seguro y buenas practicas cotidianas con nuestra información personal. 7.- Funcionamiento de: Facebook, Twitter, Instagram, Telegram, Whatsapp, Signal. 8.- Herramientas para usar concientemente las redes sociales. 9.- Pensando un internet feminista 10.- Incidencia a través de la internet en la sociedad y el Estado con respecto a temas de derechos sexuales y reproductivos y GLBTI. (mensajes claves, twitazos, creación de memes, gifs, y plataformas de indicencia).  +
Formacion Seguridad Digital, El Salvador +PRIMER DIA 8:00-8:15 Saludo y bienvenida 8:15-9:00 Dinámica de presentación 9:00-9:30 Lluvia de ideas 9:30-10:30 Buen uso de datos móviles, riesgos virtuales 10:30-11:30 Uso de redes sociales (Facebook, wasap) 11:30-12:00 Instagram, twiter 12:00-1:00 almuerzo 1:00-1:30 Uso de TAILS 1:30-2:00 Uso de TOR 2:00-2:30 Dinámica de ambientación 2:30-3:30 Trabajo grupal 3:30-4:00 plenaria SEGUNDO DIA 8:00-8:15 Saludo y bienvenida 8:15-9:00 Dinámica de ambientación 9:00-9:30 retroalimentacion 9:30-10:30 Imágenes que sostienen las formas de violencia y estereotipos patriarcales 10:30-11:30 Trabajo individual 11:30-12:00 Uso seguro de telefonía celular y aplicaciones: conceptos básicos, desmitificación de dicha tecnología, a asegurar sus dispositivos móviles y configurar sus opciones para aumentar la protección de sus datos, navegar la red de manera segura desde sus móviles. 12:00-1:00 almuerzo 1:00-1:30 Presentación” Herramientas, procesos y metodologías analógicas y digitales para almacenar o editar información por parte de diferentes personas partes de una misma colectiva/organizacion/comunidad.” 1:30-2:00 Dinámica de ambientación 2:00-2:45 Panel de experiencias personales 2:45-3:30 Trabajo grupal “ Emociones y adiciones cuando accedemos a plataformas y medios sociales (discutir contextos, imaginarios y realidades de las mujeres en el uso y diseño de campañas en redes sociales, Quien la crea, quien las patenta,” 3:30-4:00 plenaria TERCER DIA 8:00-8:15 Saludo y bienvenida 8:15-9:9.45 Ritual de inicio dinámica de los desapegos 9:45-10:15 Lluvia de ideas 10:15-11:15 Exposición “imágenes y contenidos de los imaginarios que tenemos las mujeres, amor romántico, estereotipos patriarcales, trabajo del cuidado” 11:15-12:00 exposición “impactos tiene el uso de plataformas sociales en el cuerpo de las mujeres jóvenes, emociones, cuerpo cansados, roles impuestos, trabajo del cuidado reforzado en las plataformas sociales.” 12:00-1:00 almuerzo 1:00-1:30 Trabajo grupal 1:30-2:00 plenaria 2:00-2:45 Construcción de estrategias colectivas 2:30-4:00 Dinámica de concentración, armonización Consideramos que esta información puede ser como referencia no solo para este tipo de actividades si no para otras como es la seguridad holística, y violencia así como uso y meno de mecanismo de seguridad para las mujeres cuando las mismas acceden a plataformas virtuales.  +

G

Gender and Technology Institute + Privacy Camp, LAC, Start Up Meeting, Barcelona +DIA 1 12:00- 13:00 Introducción de las participantes, Presentación de Objetivos encuentro y Agenda + Espacio y logística administrativa + Construcción del Skill Sharing Set y Pads de recursos 13:00 - 14:30: Comida 14:30 - 16:30 Presentación trabajo y proyectos de las organizaciones y participantes 4 grupos responderán a preguntas sobre sus áreas de trabajo, su experiencia de base, sus luchas (20 mins grupo + Q&A) Grupo 1: TTC , Grupo 2: Facilitadoras - Grupo 3 Aplicadoras -Grupo 4: Governanza y Legislación Discusión 16:30 – 16:45: Break 16:45 – 17:45: Comprensión de los fenómeno de ataques y violencia contra activistas por el derecho a decidir, ciberacoso y uso de las TIC para llevar a cabo esos ataques Presentación Investigación “Cuerpos de Mujeres en campos de batallas digitales” Experiencias en dar formación a activistas derecho a decidir Trabajo en grupos para mapear riesgos/ataques en la región centro america así como contra activistas y defensoras derechos sexuales y reproductivos Diseño de un árbol de contexto 17:45 - 18:30 Discusión guiada sobre riesgos/ataques y estrategias de mitigación relacionados, como exponer o difundir de manera adecuada estrategias de mitigación? 18:30 – 18:45 Clausura, agenda día 2 DIA 2 09:30 - 10:00 Recap de la sesiones y lo que hemos aprendido el día anterior Presentación 10:00 - 11:00 Reflexión sobre los perfiles de las participantes y métodos para llegar a ellas e invitarlas a aplicar el PCGTI, criterios de selección de las participantes por invitar 11:00- 11:15 Coffee Break 11:15 - 12:30 Presentación Leil PPDS (Political Participation in a Data Society) 13:00 – 14:30 Comida 14:30 - 16:30 Presentación al Currículo existente (PoD, PPDS, GTI) y lluvia de ideas para identificar otro currículo necesario (sesiones y metodologías de facilitación) 16:30 – 16:45 Coffee Break 16: 45 - 17:30 Trabajo en grupos diseñando 1 sesión para currículo 17: 30 – 18:30 Puesta en común, discusión 18:30 – 18: 45 Clausura, agenda día 3 DIA 3 Viernes 3 de Marzo, 2017 9:30 - 10: 00 Recap de la sesiones y lo que hemos aprendido el día anterior 10:00 – 11:30 Grupos eligen dos temas cada uno para diseñar currículo y dinámicas de trabajo. 11:30 – 11:45 Coffee break 11:45 – 13:00 Grupos siguen con diseño currículo 13:00 – 14:30 Comida 14: 30 – 15:30 Puesta en común de las sesiones diseñadas previamente 15: 30 – 16:15 Presentar recursos My shadow para evaluar que se tiene que traducir al castellano 16:15 – 16:30 Coffee break 16: 30 – 17:00 Mapear recursos didácticos para llevar a cabo sesiones 17:00 – 17:15 Clausura, agenda día 3 DIA 4 11:00- 13:00 Check list (logística antes, mientras, después) + Elegir lugar y fechas para el encuentro 13:00 - 13:45 Focus en seguimiento (follow up, evaluación, mentoring) 13:45 - 15:00: Comida 15:00 - 16:15: Próximos pasos, planes sinergia, difusión, herramientas comunicación y difusión 16:15- 16:30 Cierre (ronda evaluación jornadas) y agradecimientos.  +
Gender and Technology Institute Asia +The four day training included multiple sessions based on three themes: Holistic Security, Politics of Data and Gender and Tech. Sessions included: Feminist Principles of the Internet, How the internet works, risk assessment and Online Gender Based violence to name a few.  +
Gender and Technology Institute Asia, Start up Meeting, Colombo, Skri Lanka +The meeting took place over three days. During those days we worked with the participants on mapping out the key risks and threats in their respective countries, their needs as activists, WHRDs, journalists and lawyers. Beyond that we focused on what type of content, sessions and participants that should be a part of the Asian GTI.  +
Gender and Technology Institute LAC, Start Up Meeting, Managua, Nicaragua +DIA 1 Miércoles 20 de Abril, 2016 7: 00 - 9:00 Desayuno 9:30 - 10:00 Presentación del Taller, Participantes 10:00 - 10:45 Presentación de Objetivos encuentro y Agenda + Espacio y logística administrativa - Presentación GTI 10:45 - 11:00: Coffee Break 11:00 - 12:30 Presentación trabajo y proyectos de las organizaciones y participantes (MDH + Mujeres activistas + Genero y tecnología) 4 grupos responderán a preguntas sobre sus áreas de trabajo, su experiencia de base, sus luchas (20 mins grupo + Q&A) Grupo 1: Funders (FAO + GIZ) - Grupo 2: Aplicadoras (JASS + Red Oaxaca) - Grupo 3: Legislación (Article 19 + Karisma) - Grupo 4: Facilitadoras (Florencia, Mayelin, Lucy) 12:30 - 13:00 Construcción del Skill Sharing Set, Jargon Wall y Pads de recursos 13:00 - 15:00 Comida 15:00 - 16:30 Comprensión de los fenómeno de ataques y violencia contra mujeres + ciberacoso y uso de las TIC para llevar a cabo esos ataques 16:30 -16:45 Coffee Break 16:30 - 18:00 Discusión guiada sobre riesgos y estrategias de mitigación relacionados con el árbol de contexto 18:00 - 18:30 Skill Share - Net etiqueta - Meet Jitsi, Cryprotcat - Thunderbird - Respaldos, Orden Digital - Cryptografía Online 19:00 Cena DIA 2 Jueves 21 de Abril, 2016 7: 00 - 9:00 Desayuno 9:30 - 10: 00 Recap de la sesiones y lo que hemos aprendido el día anterior 10:00 - 11:00 Reflexión sobre los perfiles de las participantes. 11:00- 11:15 Coffee Break 11:15 - 13:00 Lluvia de ideas para identificar curricula necesario (sesiones y metodologías de facilitación) 13:00 - 15:00 Comida 15:00 - 16:15 5 Grupos eligen dos temas cada uno para diseñar currículum y dinámicas de trabajo. 16:15- 16:30 Coffee Break 16: 30 - 17:30 Diseño de Sesiones - Parte 2 17: 30 - 18:00 Mercado de ideas 18:00 - 18:30 Skill Share 19:30 Cena y Karaoke DIA 3 Viernes 22 de Abril, 2016 7: 00 - 9:00 Desayuno 9:30 - 10: 00 Mercado de ideas 10:00 - 11:00: Check list (logistica antes, mientras, después) + seguimiento (follow up evaluación, mentoring) 11:00- 11:15 Coffee Break 11:15 - 13:00 Revisión de riesgos y estrategias de mitigación relacionados con el árbol de contexto 13:00 - 15:00 Comida 15:00 - 16:15: Próximos pasos, planes sinergia, difusión, herramientas comunicación y difusión Cierre (ronda evaluación jornadas) y agradecimientos. 16:15- 16:30 Coffee Break 16:30 - 18:30 Grupo facilitadoras trabajan en agenda para formación de dos días (23 y 24 abril)  +
(previous 25) (next 25)