Feminist Cyborgs: Activism, Fundraising and Security Online Jan Moolman, Association for Progressive Communications, Women’s Rights Programme: 3 December.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 6: Meeting People Online.
Advertisements

[Embed the Take Back The Tech! Campaign video as the first slide, to introduce the campaign and issue
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Developed by Technology Services 1:1 Laptop Initiative
Cyber Safety Assessment Review
Be safe, Be Secure, Be Smart.... Be in Control!
Haygrove School – E Safety Induction E Safety Update #protecting your professional identity.
OC RIMS Cyber Safety & Security Incident Response.
In 1989, governments worldwide promised all children the same rights by adopting the UN Convention on the Rights of the Child (CRC).
Coxheath Primary School E-safety- Term Purpose To outline the use of the internet in school The use of the internet outside school What are the.
ICT iGCSE.  You should be able to describe the use of Internet developments such as:  Web 2.0  blogs  wikis  digital media uploading websites  social.
Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules.
Cyber and Internet Safety El Rodeo School September 11, 2013.
Air Products Internal Use Only.  If you’re not sure what Cyber Safety refers to, this quick video might help. If you’re not sure what Cyber Safety refers.
Working group discussion 1 Cyber Risk Security, Privacy ?
By Gabrielle Kelly and Whitney Hampton. "House pledges" or "acceptable-use policies" can help provide clear guidelines for safer Internet use. NetSmartz.
Cyber Safety and Digital Citizenship.
Are you being a safe and successful digital citizen?
 FOOD, WATER, SLEEP, AIR  SAFETY FROM THREATS AND VIOLENCE  LOVE OF FRIENDS AND FAMILY  RESPECT.
Company LOGO Internet Safety A Community Approach.
Feminist Cyborgs: Online Fundraising © Spectra Speaks.
ICT E-SAFETY ARCHIBALD FIRST SCHOOL. ICT Mark Only the 2 nd school in Newcastle LA to achieve the award: October 2009 Only the 2 nd school in Newcastle.
Awareness raising session for Parents and Carers.
Social Networking Positives of Social Networking
Internet Safety, Cyber Bulling, Sexting and Predators- Mr. Hamilton Health.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
ANYTHING THAT GETS INVENTED AFTER YOU’RE THIRTY IS AGAINST THE NATURAL ORDER OF THINGS AND THE BEGINNING OF THE END OF CIVILISATION AS WE KNOW IT …UNTIL.
Parenting in the Internet Age Tips for Keeping Kids Safe and you Connected to your Teen.
Rape101.com: Resources and education for stopping rape1 Internet Safety.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
By: Zach Oltmanns.
 FOOD, WATER, SLEEP, AIR  SAFETY FROM THREATS AND VIOLENCE  LOVE OF FRIENDS AND FAMILY  RESPECT.
Internet Safety Plan Sophomore Year. Essential Questions How will I know what risks I am exposing myself to when I make decisions online? How will I be.
Digital Citizenship Terms & Behavior about Technology created by Samira Ali.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
KYLE GEORGE JULY 3 RD 2014 EDU-384. DO NOT SHARE ANY PERSONAL INFORMATION ONLINE: NAME, ADDRESS, CITY, STATE OR PHONE NUMBER SOCIAL SECURTIY NUMBER ANY.
Is when… someone hurts, threatens or frightens you regularly by sending messages or images using the Internet, mobile phones or other forms of digital.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
Grades 4-6 Be SAFE Online! Ceres Unified School District.
Tips To Stay Safe Online By Aayush Hanson Pharaoh.
Internet Safety Presentation by Diahn Hess. Overview Internet Safety Private and personal information Meeting people online Safe interactions Cyberbullying.
The risks behind Location-Based Service Julie Wang.
Staying Safe Online. Who are we ? What do we do ? Why are we here ?
THINK CYBER SMART, BE CYBER SMART! CYBER SAFETY AND DIGITAL CITIZENSHIP IN A CLASSROOM.
Internet Dangers Technology Communication Tools E-Literate.
Dangers of Online Media and Social Networking By: Micah Cochrane Maurice Gamble Shenne Howell Elvyn Morales.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
Company LOGO Internet Safety and Cyber-Bullying Helping you to keep us safe in our digital world.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
E-Safety for parents and carers Highfield Community Primary School.
Digital Citizenship Our programme at Cashmere High School South Island Youth Librarians’ Conference Presentation by Saskia Hill is licensed under a Creative.
Cyber Safety with Cell Phones By: Tanner Putnam. Cell phones  Cell phones are used to talk and now are used as mini computers.  You can download APPS.
Cyber Safety and Digital Citizenship Anyone can be a digital citizen. It’s your CHOICE to be a responsible citizen! Let’s make the online world a better.
Netiquette internet manners, online etiquette, and digital etiquette The social code of network communication The social and moral code of the internet.
Women’s Rights, Gender and Internet governance
Say Hi is a free messenger app that allows individuals to find and chat to other people. Say Hi states “Say Hi can help you find new people nearby! It.
Creating your online identity
Me and my mobile: sure and secure Agenda
Online Safety.
How many of these apps do you really know?
Digital Footprints.
E SAFETY ASSEMBLY.
Internet Social Media. Internet Social Media Benefits: Internet is a useful tool if utilized appropriately. Uses Benefits: Internet is a useful tool.
Freedom Independence Transition
cyber safety class :- Xi Chapter no. :- 17
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Feminist Cyborgs: Activism, Fundraising and Security Online Jan Moolman, Association for Progressive Communications, Women’s Rights Programme: 3 December 2012

What is the issue?  the internet and ICTs provide critical spaces and opportunities to exercise freedoms, claim rights, perform identities, take action, connect, show solidarity  while more women’s rights organisations and individual women are using the internet and other ICTs there are growing incidences of technology-related violence against women (VAW), and general threats to safety and security

What are the common threats?  cyber stalking  sexual harassment  privacy violations  manipulation of personal information including images and videos... affects how we work, play, love

Stories She’s begging to be raped: twitterverse-feminists-pakistan Digital Security: Drop-in centre of Ugandan sex worker organisation raided: ugandan-sex-worker-or Danger and opportunity: ICTs and women human rights defenders Take Back the Tech! But know the risks first (interview with African activists on secure online communications)

Know your rights Take control Know your tools Know your risk Recognise that context matters – threats and violators How can we respond?

Basic security HTTPS everywhere – online searches TOR – pops your request through different servers – use encryption Mobile phones – password protection Password tips – most critical Facebook – don’t tag or upload pictures without permission; use privacy settings

Useful resources Take Back The Tech Tactical Tech’s Me and My Shadow Ono - Connect Your Rights - rights.apc.org