Difference between revisions of "Main Page/Crash Courses/Systems and Policies/Week two"

From Library Freedom Wiki Page
Jump to navigation Jump to search
Line 3: Line 3:
  
 
==== Overview ====
 
==== Overview ====
This week we'll cover one of the building blocks of privacy advocacy and a major theme for this course: threat modeling. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs, their material conditions, and their community network. Alison will teach us how to threat model, and how we can use this methodology in thinking about privacy in the current moment and beyond. We'll discuss some example threat models, and the ways that different threat models should impact our decision-making when it comes to library privacy.  
+
This week we'll cover one of the building blocks of privacy advocacy and a major theme for this course: threat modeling. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs, their material conditions, and their community network. Alison will teach us how to threat model, and how we can use this methodology in thinking about privacy in the current moment and beyond. We'll discuss some example threat models, and the ways that different threat models should impact our decision-making when it comes to library privacy. We'll also be getting into some basic privacy strategies, terminology, and practices.  
  
 
==== Readings ====
 
==== Readings ====

Revision as of 20:00, 6 May 2021

Week 2: Threat modeling and privacy basics

Overview

This week we'll cover one of the building blocks of privacy advocacy and a major theme for this course: threat modeling. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs, their material conditions, and their community network. Alison will teach us how to threat model, and how we can use this methodology in thinking about privacy in the current moment and beyond. We'll discuss some example threat models, and the ways that different threat models should impact our decision-making when it comes to library privacy. We'll also be getting into some basic privacy strategies, terminology, and practices.

Readings

Discussion board

  • TBD

Tasks

  • Readings
  • Post to discussion forum