Difference between revisions of "Resources"

From Gender and Tech Resources

Line 3: Line 3:
 
'''<big><sup>Including Gender into privacy and security</sup></big>'''
 
'''<big><sup>Including Gender into privacy and security</sup></big>'''
  
Welcome to this manual that will be edited in the next three weeks and turn into an awesome many hands, brains and hearts crafted one.
+
Welcome to this wiki that will be edited in the next three weeks and turn into an awesome many hands, brains and hearts crafted manual.
This is a roadmap FROM FIRE TO DESIRE TO INSPIRE. Read more about [[how to add contents to this manual here]]
+
This is a roadmap FROM FIRE TO DESIRE TO INSPIRE.  
 +
 
 +
Read more about [[how to add contents to this manual here]]
  
 
== Introduction: What does it mean to include gender into privacy and security? ==
 
== Introduction: What does it mean to include gender into privacy and security? ==
Line 66: Line 68:
  
 
[[Step 2]]
 
[[Step 2]]
 +
 +
Aims:
 +
 +
* Becoming a moderator well aware of fundamentals of net-etiquette and how to contribute to the creation and enforcement of social rules within online communities
 +
* Understanding how to build Safe spaces online and offline
 +
* Gaining knowledge on process and methodologies to “reclaim” and maintain yourself and your collective into “hostile” spaces
 +
* Become aware of current initiatives and processes that can be replicated in your community, organization, collective in order to become a safer space

Revision as of 15:14, 3 May 2015

Zen and the art of making your tech work for you

Including Gender into privacy and security

Welcome to this wiki that will be edited in the next three weeks and turn into an awesome many hands, brains and hearts crafted manual. This is a roadmap FROM FIRE TO DESIRE TO INSPIRE.

Read more about how to add contents to this manual here

Introduction: What does it mean to include gender into privacy and security?

Length: 8 pages

Who: Alexandra, Valentina

Introduction

Aims:

  • Show existing links between privacy and security from a gender and inter-sectional approach
  • Convince WHRD and LGTBI activists that privacy and security consists of different but interconnected elements (ie physical, digital and well-being)
  • Support and empower WHRD and LGTBI to adopt better privacy and security behaviors by knowing methods, processes and liberating technologies
  • Provide arguments, methodologies and examples to get the buy in from their organisations/communities to adopt integrated approaches which include gender into privacy and security

Understanding gender gaps in tech: From exclusion to self inclusion

Length: 4 pages

Who: Nuria

Aim:

  • Understanding the different type of gaps into technology access, uptake, use and development
  • Shifting paradigm from exclusion to self-inclusion

Step 0: Mapping your data and devices

Length: 6 pages

Who: Alex, Marte

Step 0

Aims:

  • Assessing privacy and security risks requires first to understand what should be protected
  • Better management of data and devices from a physical and psycho-social well being perspective

Step 1: Understanding your digital shadow

Length: 15 pages

Who: Floriana, Jillian, Faith

Step 1

Aims:

  • Understanding digital shadow and metadata
  • Awareness on risks and empowering potential of online identities (using real names, pseudonyms, collective names and anonymity)
  • Creating new online identities
  • Managing various online identities

Step 2: Building safe spaces

Length: 15 pages

Who: Sophie, Faith, Paula

Step 2

Aims:

  • Becoming a moderator well aware of fundamentals of net-etiquette and how to contribute to the creation and enforcement of social rules within online communities
  • Understanding how to build Safe spaces online and offline
  • Gaining knowledge on process and methodologies to “reclaim” and maintain yourself and your collective into “hostile” spaces
  • Become aware of current initiatives and processes that can be replicated in your community, organization, collective in order to become a safer space