Editing LFI Course Materials/Week two

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 3: Line 3:
  
 
==== Overview ====
 
==== Overview ====
This week we'll cover some of the building blocks of privacy advocacy: threat modeling, and learning basic privacy strategies and tools. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs. Alison will teach us how to threat model, and then we'll talk about some of the 101 level ways that anyone can protect their privacy. We'll close out the lecture with some resources for learning how to do basic privacy education.
+
something this week about scheduling time with alison on small group tasks
  
 
==== Learning objectives ====
 
==== Learning objectives ====
* Learn starting points for teaching privacy
+
* Meet other cohort members
* Learn about top privacy resources
+
* Learn about what other cohort members want to achieve in this course and share our own thoughts
* Learn about the importance of threat modeling and how to create a threat model
+
* Review themes and outcomes
 +
* Set personal goals
 +
* Understand small group work strategy
  
 
==== Readings ====
 
==== Readings ====
* Read EFF's threat modeling one-pager: https://www.eff.org/files/2015/11/24/3mod_threat-modeling-ssd_9-3-15.pdf
+
[https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Reading_List#General_articles_about_privacy_and_surveillance_or_foundational_pieces The Surveillant Assemblage, Kevin D. Haggerty and Richard V. Ericson]
* Browse through Tactical Technology Collective's Data Detox Kit: https://datadetox.myshadow.org/en/home
 
* Browse through EFF's Surveillance Self-Defense: ssd.eff.org
 
* Browse through EFF's Security Education Companion: sec.eff.org
 
  
 
==== Guest lecturer ====
 
==== Guest lecturer ====
Line 20: Line 19:
  
 
==== Discussion ====
 
==== Discussion ====
* How can we use threat modeling in our everyday work?
+
What are your personal goals for this course?
* How could you get started teaching privacy in your library? If you're already teaching privacy, talk about the ways you're doing so.
 
  
 
==== Tasks ====  
 
==== Tasks ====  
* Lecture, readings, discussion forum, and small group work
+
* Readings and discussion forum
* Complete one day of the Data Detox Kit
+
* Connect with your small groups and start thinking about who will work on what (small group work sharing plans due the week of June 3rd)
* Schedule time with Alison to talk about questions and ideas for your small group projects
+
* Create discourse and wiki accounts
 +
* Read through materials on libraryfreedom.wiki

Please note that all contributions to Library Freedom Wiki Page may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Library Freedom Wiki Page:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)