Hi all,
Once again, if you could somehow incorporate this into your news cycles. And check out the last few days actions - yesterday's was creating a Twitter paper on online VAW, so there may be some interesting results for your country/ region.
Sonia
There are increasing reports of women and girls who are subjected to harassment and cyberstalking through the use of technology. Harassment and cyberstalking can take many forms. For example, receiving repeated harassing and threatening messages online and through SMS. Or the harasser pretending to be the victim, and posting sexualised messages on websites, forums or to her contact list. Sometimes this is accompanied by her real name, phone number and sometimes even home address, moving the harassment from online to the material world.
<span></span>
Cyberstalkers usually aims to gather as much information about a person as possible, to track and monitor her movements and activity and to instil fear in her or to cause her harm. Like many forms of violence against women, the harasser or abuser is often someone that is known to the survivor. The UN estimates that 95% of aggressive behaviour, harassment, abusive language and denigrating images in online spaces are aimed at women, and come from partners or former partners [http://www.un.org/womenwatch/daw/vaw/SGstudyvaw.htm].
This is probably because people they are the people who knows most about the survivor. They can easily access into email accounts and other online spaces by guessing passwords or by having the opportunity to install spyware and other kinds of tracking software into the person's computer or mobile phone. In unequal relationships, one partner can aim to exert control over the other by controlling her communication channels - who she speaks to, when, about what etc. Even when harassers are not people who are close to us, we sometimes unwittingly post a lot of personal information about ourselves online and don't pay enough attention to how we can better protect our privacy.
How can we make our online experience a safer one? What are some good communication and online practices that we can undertake to make our digital and communication spaces more secure? Share what you know!
1. What's your strategy?
* Share or think of 10, 5, 3 or thing that we can do to be safer online and in our use of communication tools. They can be simple actions, concrete tips or suggestions of tools and applications.
* Think of strategies that can be applied generally, or to specific communication channels and tools, such as mobile phones, social networking spaces, emails etc.
* Here are 10 tips to start with:
** Choose good passwords. Don't use birthdays or names of pets and family members.
** Get to know the privacy options on social networking sites and photo-sharing applications.
** Never post your personal phone number or home address online
** Switch off your bluetooth unless you're actively using it
** Regularly download and delete private photos on your mobile phone
** If you're harassed, keep everything! Don't delete messages, chat logs etc.
** When you breakup, make your last act together as deleting private videos and photos.
** Do a search on yourself and your home address and number.
** Log-out from applications when you leave your desk or computer.
** If you're harassed, talk to a trusted friend.
2. Share it & grow the list!
* Share your strategy with the people you have contact with today.
* Post a strategy every hour. Post it as your status message on social networking sites like Facebook, or on your instant messenger like Yahoo! or Skype. Or if you're on Twitter, tweet or retweet a strategy every hour, with the hashtag #takebackthetech. Start a conversation!
* At the end of the day, copy and paste your list and add them as a comment to this page, and share your action with other campaigners and readers of this site.
* Or start a chain-mail and grow the list! Copy and paste this daily action and send it to 10 friends as an email. Add your own strategy to the 10 above, and ask them to do the same. Copy your email to ideas@takebackthetech.net and we'll post your list on this page.
Take back the tech! Protect our right to communicate freely and safely, without violence or harassment. Share a strategy!
[Non-text portions of this message have been removed]
--
This e-mail service is edited, managed and moderated by
George Lessard
http://mediamentor.ca Messages posted here are now automatically posted on Twitter at:
https://twitter.com/creative_radio Make a donation via PayPal:
http://members.tripod.com/media002/make-a-donation-via-paypal.html Creative-Radio is an independent forum for people active in or interested in the use of radio in development, in particular promoting public health, improved education, protection of the environment, improved livelihoods, good governance and conflict mitigation. Since it started in 1996, Creative-Radio has been in the forefront of radio's resurgence as a tool for social change and peace-building, and it helps promote best practice in these areas.
Creative-Radio Moderator
mediamentor@_NO_SPAM_gmail.com
Remove _NO_SPAM_ for use
RSS feed:
http://rss.groups.yahoo.com/group/creative-radio/rss Change your subscription
- to daily digest mode by sending a blank message to:
creative-radio-digest@yahoogroups.com
- to individual e-mails by sending a blank message to:
creative-radio-normal@yahoogroups.com
- delivery on hold by sending a blank message to
creative-radio-nomail@yahoogroups.com
Caveat Lector- Disclaimers, NOTES TO EDITORS
& (c) information may be found @
http://members.tripod.com/~media002/disclaimer.htm This work is licensed under a
Creative Commons Developing Nations license.
http://creativecommons.org/licenses/devnations/2.0/ = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =
Because of the nature of email & the WWW,
please check ALL sources & subjects.
Members who post to this list retain their copyright but grant a non-exclusive license to others to forward any message posted here. They also grant the list owner permission to maintain an archive or approve the archiving of list messages.
Other use of e-mail to this list requires the permission of individual writers