Blog Post

Resilience Network Design Workshop Exercise

Resilience Network Design Workshop Exercise

In preparation for our DML V Trust Challenge Workshop held at DML 2015 Conference, we asked grantees to answer three questions that we planned to workshop as part of a larger design exercise. The following represent the questions and answers provided by Resilience Network. 

1. How does your project change or contribute to the narrative around trust in the larger conversation?

Our project builds upon the fact that “trust” itself is complicated, because it depends on the specific community or performance of identity being engaged. This project aims to educate feminists in the public sphere about issues concerning digital life. We want to enable girls and women to preemptively take steps to ensure their control of their online identities and metadata. Part of understanding data management is understanding how algorithms, social sharing, and information retrieval works. Our publication will provide vetted tools for helping others both understand and teach others why proactive personal data management is a necessary part of digital life.

This project will highlight the efforts of organizations like Hollaback
(, which is currently developing a peer system for documenting threats without requiring the involvement of the person experiencing the threat. We will point to DoubleUnion, a San Francisco-based “feminist hackerspace” whose members recently created the OpenDiversityData project ( that calls upon employers to make their employee demographics data more visible.  We will also be highlighting artivist  projects like Zero Trollerance (,
Deep Lab (, and Ms. Baltazar’s Laboratory ( as ways of pointing to humorous and playful responses to threats online.

We will provide access to resources that train girls and women to manage their own data.  By utilizing Scalar -- which supports branching pathways -- and the FemTechNet technical framework we will ensure that our digital publication and the component pieces will be preserved and accessible well beyond the scope of this grant. At our initial summit, we will also develop a data plan for our digital events to ensure that we foster safe conditions for those who want to combat anti-feminist violence. We have already begun to explore the possibilities for pseudonymous participation for those who have expressed fear about open, public participation.  FemTechNet has been part of the Connected Courses inititative ( and has a history of success with distributing labor and capitalizing on networks.

2. What challenges do you foresee as you implement your project, and what might others in the DML community be able to offer in the way of support or solutions?

  • Making sure that we reach intended audiences in the manner that protects their safety and effectively communicates message/ideas.
  • Coordinating work across a distributed network
  • Creating a compelling “skin” for the Scalar interface to help ensure the site is accessible, aesthetically appealing to many ages and demographics of users, and useful
  • Adjusting to the shifting landscape of safety/security-- new sites of struggle popping up; new issues arise everyday, such as ephemeral/persistent apps like Snapchat or Yik Yak popular with high school students. (Identifying experts that can provide this information)
  • Supporting our constituents diverse needs, which we hope to get from the Summit this summer.
  • Balancing our commitment to local solutions and networks with the need to have national-level resources
  • Ensuring high-quality materials for a number of different constituencies with a limited budget and time frame (k-12, adult, different subcommunities under the “feminist/women” label, including those who might not want to be under the label!)

3. What do you foresee the impact of your project will be once it is implemented (particularly in terms of the conversation around trust)?

  • Clear lines of communication and support among women and feminists who engage in online writing and activism.
    • A strong archive of digital resources for community members, including a set of best practices, 
    • key terms glossary for violence online,
    • four video dialogues,
    • existing resources links, and
    • short how-to videos on online security and privacy.
  • Vetted tools for helping others both understand and teach others why proactive personal data management is a necessary part of digital life.
  • Support for users through our “open online office hours” and virtual teach-ins during our initial year of roll-out

While we will spend a good deal of time teaching people how to manage their own data, by utilizing existing Scalar and FemTechNet frameworks we can ensure that our digital “product” is in fact a living, constantly developing, responsive resource that will be accessible well beyond the scope of this grant


No comments