Special

Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Detailed schedule and contents" with value "- Welcome to the training and Introductions: The facilitators gave a brief background of why the training was taking place. This included the thinking behind f3mhackathon and also sought to explain a little about Sabeen Mahmud and why we were dedicating this special day to her memory. This session also gave the participants an opportunity to get to know each other and the facilitators and to share their expectations of the training. Staying Safe Online ( a peek into Kenya’s women background on cybercrime and/or harassment: IAWRT Kenya) –This session sought to give a background on the situation of cyber crime in Kenya against women with a special focus on the qualitative research conducted by the International Association of Women in Radio and Television, (IAWRT-Kenya):Ending Violence: Women’s Rights and Safety Online. From the research the facilitator of this session shared a story of one of the case studies of the research where a certain lady had openly shared her passwords to various online accounts with her partner and father of her children but he had in turn used her passwords and posed as her when interacting with her friends , relatives and family including abusing them online. This was coupled with physical beatings. The sharing of this story was aimed at providing the context of why it is important for us to spend some time learning more on how to enhance our digital security online and start privacy advocacy campaign. Digital Security (Yvonne explain further on this session) Privacy Advocacy –For one to understand why privacy advocacy is crucial, the facilitator took the participants through a personal exercise of mapping one’s shadow on the internet. These shadows were captured through drawing and were posted on a white board by each participant. This exercise led to discussions on the traces we leave online and the possible challenges we are exposing to ourselves everytime we are online. The participants were then spanided into various groups where they were expected to take up collaborative roles such as : You are a company that would like to sell crucial data on various people or organizations to the government. Using the data shadows on the white board identify which persons/organizations you think the government would be interested in and why they would be interested in them basing it on the data shared on the data shadows. Or You have just opened a new restaurant in town. Identify which people (from the data shadows) you would like to target and how they would be important to your restaurant. The participants were then expected to make a presentation to the plenary of their findings. These presentations led to further discussions on issues such as the use of free online platforms actually means that the inspanidual is the product. That it is very easy for anyone with a specific motive or focus to collect data about you without your knowledge and hence that is why it is important to make use of the various digital security tools to protect your data where possible and to ensure that one does not leave their traces online. The members of the same group were further given a task to think about what they can do based on their various professions on what they can do towards informing others on how to protect their digital privacy and any initiatives they may think of that would be helpful towards championing for privacy advocacy. The participants also got to share their ideas in plenary. The facilitator further added some key points on other initiatives they can undertake towards achieving privacy advocacy.". Since there have been only a few results, also nearby values are displayed.

Showing below up to 2 results starting with #1.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)


    

List of results

    • FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya  + (- Welcome to the training and Introduction
      - Welcome to the training and Introductions: The facilitators gave a brief background of why the training was taking place. This included the thinking behind f3mhackathon and also sought to explain a little about Sabeen Mahmud and why we were dedicating this special day to her memory. This session also gave the participants an opportunity to get to know each other and the facilitators and to share their expectations of the training. Staying Safe Online ( a peek into Kenya’s women background on cybercrime and/or harassment: IAWRT Kenya) –This session sought to give a background on the situation of cyber crime in Kenya against women with a special focus on the qualitative research conducted by the International Association of Women in Radio and Television, (IAWRT-Kenya):Ending Violence: Women’s Rights and Safety Online. From the research the facilitator of this session shared a story of one of the case studies of the research where a certain lady had openly shared her passwords to various online accounts with her partner and father of her children but he had in turn used her passwords and posed as her when interacting with her friends , relatives and family including abusing them online. This was coupled with physical beatings. The sharing of this story was aimed at providing the context of why it is important for us to spend some time learning more on how to enhance our digital security online and start privacy advocacy campaign. Digital Security (Yvonne explain further on this session) Privacy Advocacy –For one to understand why privacy advocacy is crucial, the facilitator took the participants through a personal exercise of mapping one’s shadow on the internet. These shadows were captured through drawing and were posted on a white board by each participant. This exercise led to discussions on the traces we leave online and the possible challenges we are exposing to ourselves everytime we are online. The participants were then divided into various groups where they were expected to take up collaborative roles such as : You are a company that would like to sell crucial data on various people or organizations to the government. Using the data shadows on the white board identify which persons/organizations you think the government would be interested in and why they would be interested in them basing it on the data shared on the data shadows. Or You have just opened a new restaurant in town. Identify which people (from the data shadows) you would like to target and how they would be important to your restaurant. The participants were then expected to make a presentation to the plenary of their findings. These presentations led to further discussions on issues such as the use of free online platforms actually means that the individual is the product. That it is very easy for anyone with a specific motive or focus to collect data about you without your knowledge and hence that is why it is important to make use of the various digital security tools to protect your data where possible and to ensure that one does not leave their traces online. The members of the same group were further given a task to think about what they can do based on their various professions on what they can do towards informing others on how to protect their digital privacy and any initiatives they may think of that would be helpful towards championing for privacy advocacy. The participants also got to share their ideas in plenary. The facilitator further added some key points on other initiatives they can undertake towards achieving privacy advocacy.
      ertake towards achieving privacy advocacy.)