Editing LFI Course Materials 2020/Week two
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
− | === Week 2: | + | History of the internet, early govt surveillance, ideology, corp model -- declaration of ind of cyberspace, californian ideology, donna haraway, humdog, other basic stuff, donna haraway |
− | * Real time lecture: | + | |
+ | |||
+ | |||
+ | |||
+ | === Week 2: Threat modeling and basics of teaching privacy=== | ||
+ | * Real time lecture: May 31st 10 am Pacific/1 pm Eastern | ||
==== Overview ==== | ==== Overview ==== | ||
− | + | This week we'll cover some of the building blocks of privacy advocacy: threat modeling, and learning basic privacy strategies and tools. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs. Alison will teach us how to threat model, and then we'll talk about some of the 101 level ways that anyone can protect their privacy. We'll close out the lecture with some resources for learning how to do basic privacy education. | |
+ | |||
+ | ==== Learning objectives ==== | ||
+ | * Learn starting points for teaching privacy | ||
+ | * Learn about top privacy resources | ||
+ | * Learn about the importance of threat modeling and how to create a threat model | ||
==== Readings ==== | ==== Readings ==== | ||
− | + | * Read EFF's threat modeling one-pager: https://www.eff.org/files/2015/11/24/3mod_threat-modeling-ssd_9-3-15.pdf | |
+ | * Browse through Tactical Technology Collective's Data Detox Kit: https://datadetox.myshadow.org/en/home | ||
+ | * Browse through EFF's Surveillance Self-Defense: ssd.eff.org | ||
+ | * Browse through EFF's Security Education Companion: sec.eff.org | ||
==== Guest lecturer ==== | ==== Guest lecturer ==== | ||
Line 12: | Line 25: | ||
==== Discussion ==== | ==== Discussion ==== | ||
− | * How | + | * How can we use threat modeling in our everyday work? |
− | * | + | * How could you get started teaching privacy in your library? If you're already teaching privacy, talk about the ways you're doing so. |
==== Tasks ==== | ==== Tasks ==== | ||
− | * Lecture, readings | + | * Lecture, readings, discussion forum, and small group work |
− | * Complete one day of the Data Detox Kit | + | * Complete one day of the Data Detox Kit |
+ | * Schedule time with Alison to talk about questions and ideas for your small group projects |