up by men and few women hold management or entrepreneurialpositions. Only 6% of 65 science andtechnology parks in Iran are headed by women. However,because of self-motivation and a hard-workingattitude amongst women, the number of them as seniorexperts and coordinators at middle-managementlevels is increasing.Men in urban societies enjoy better educationalopportunities and resources than women. But womenin rural and tribal societies are the most oppressed,with the least availability of educational resources.Given the economic difficulties and high unemploymentrate among rural women, the need toprovide them with ICT facilities is not a matter ofdoubt. But poor infrastructure and a low educationalbase should be taken into consideration when implementingan international model adapted to thecontext of rural society in Iran.In recent years, some governmental organisationslaunched teleworking plans. This brought hopeto female employees who thought they would beable to continue their job responsibilities at homeusing ICTs, while being mothers. Pregnant womenespecially counted on this scheme as a method ofempowerment that would mean a quicker re-entryinto their careers. Unfortunately, mismanagementand the administration mentality caused these plansto fail by forcing a majority of women to turn theirwork schedules into part-time employment, with adrastic income reduction.Electronic violence against women andjudicial/security measuresVirtual violence against women is a malfunction ofthe internet. Filming women’s private relations withouttheir permission and uploading them on the web,posting personal pictures of them on social networkpages, publishing nude pictures after retouching anormal photo, etc., are evident violations of personalrights which have victimised a lot of women in recentyears.According to statistics, “desecration” is the secondmost common internet crime. 6 Humiliation anddisrespect, often through mobile phone text messages,threatening women with publishing their privatephotos on the net, and blackmailing them or theirfamilies are some prevalent methods. Although mostof the statistical reports do not include gender indicators,the number of cases of desecration openedin the judicial system indicates this is an expandingproblem.Security organisations such as the Iranian CyberPolice, known as the FTA, have started to confront6 www.hamshahrionline.ir/details/193606cyber crimes. A list of internet crimes was published, 7but the approach to cyber security has resulted inmore censorship for women.Moreover, the composition of the members ofinstitutions and organisations such as the FTA, theSupreme Council of Virtual Spaces and the Council ofLitigation on Cybercrimes reflects a male dominancewhich insists on male structures.ICTs and threats to cultural identityDiscussion about women’s identity and Iranian culturewhen it comes to ICTs is diverse: it ranges fromthe effects of ICTs on secularisation, to the topic of“soft war”, which has been recently introduced intopolitical literature, with an emphasis on stabilisingIslamic norms. The different points of view havesparked considerable debate. The main discussionusually involves women, public morals and chastity.One of the latest controversial topics amongreligious leaders and state groups is that of 3Gtechnology and its influences. Some of the leadersconfronted the question by prohibiting 3G, arguingthat it endangered public and family chastity becauseof its visual capabilities. 8 Some governmentalexperts, magnifying its effects, even compared thistechnology to nuclear bombs. Its more positive effectsare often ignored: it can at least provide parentsand especially mothers with psychological comfort atwork by allowing them to “telewatch” their children.Such confrontations are not new: technologies areoften challenged by hardliners and then accepted,under pressure from the public and businesses. Inthis context, cultural activities are necessary to preventa new trend of violence against women.Action stepsRegarding the potential of ICTs, as well as solid indicatorson the information society, the following stepsare necessary to protect the role of women:• Technical and infrastructural issues and howwomen can access infrastructure need to be addressed.• Problems created by legal limitations on women,based upon cultural matters, need to be solved.• Targeted projects to empower women throughICTs are necessary. Further research is also neededin this regard, and ICT-related occupations andvirtual violence might be considered as the mainpriorities of study. ■7 www.itna.ir/vdcexv8w.jh8nfi9bbj.html8 www.itna.ir/vdcci0qi.2bqpx8laa2.html138 / Global Information Society Watch
iraqICTs and the fight against female genital mutilation in IraqRichmond University in LondonJohn Chuawww.stopfgmkurdistan.orgIntroductionA decade after coalition forces invaded Iraq and toppledSaddam Hussein’s rule, the country is still inturmoil. Although much of the international media’sattention has shifted to conflict zones elsewhere,Iraq remains a place of extreme violence, with dailybombings, shootings and kidnappings. Over 700people were killed in April 2013 alone, according toUnited Nations data, the highest monthly figure inalmost five years. 1 Over the last six years, significantlymore civilians died from the conflict in Iraqthan in Afghanistan. 2With this as a backdrop, the issue of women’srights as they relate to information and communicationstechnologies (ICTs) in Iraq is complicated byseveral other factors. Iraq as a whole suffers froma poor record of women’s rights, despite ostensibleimprovements in recent years. Honour killings andforced marriages are not uncommon. 3 Female genitalmutilation or cutting (FGM) is also a significantproblem. For the last several years, Iraq (along withseveral other notable countries) did not even appearon the World Economic Forum’s Global GenderGap Report annual country ranking. 4 Internet usagejumped dramatically between 2010 and 2012,from 1.1% of the population to an estimated 7.1%. 5But globally speaking this is still a low percentage,with much of this increase likely from the growth ofsmartphones. In fact, only 3% of households in 2012have regular internet access. 6 The daily electricalblackouts, even in the prosperous and more peacefulKurdish north, make online access frustrating.Iraq has two administrative zones, the semiautonomousKurdish north with its own regional1 www.aljazeera.com/news/middleeast/2013/05/201351951234492490.html2 musingsoniraq.blogspot.co.uk/2013/02/iraq-still-far-deadlierplace-than.html3 travel.state.gov/travel/tips/safety/safety_5485.html4 www3.weforum.org/docs/WEF_GenderGap_Report_2012.pdf5 www.internetworldstats.com/me/iq.htm6 www.nytimes.com/2012/04/16/technology/iraq-emerges-fromisolation-as-telecommunications-hub.html?pagewanted=all&_r=0government, and the rest of the country ruled fromBaghdad. Kurdistan was one of the results of thefirst Gulf War, when the UN declared a no-fly zoneacross the north, protecting the Kurds from Saddam.Since then, Kurdistan has developed separatelyfrom the rest of Iraq, establishing its own armedforces as well as judicial and political systems. Today,Kurdistan is using its energy wealth to developeconomically.Founded by Germans and staffed by Iraqis, theNGO Wadi has been working in Kurdistan since1992, helping to build schools, provide accessto electricity and clean water, as well as improvewomen’s health. Wadi also has a radio station withprogrammes for and created by women and youth.Initially Wadi was not involved with the issue of FGM,but during a meeting in 2004 with female villagers,several of them mentioned medical problems associatedwith FGM. Wadi followed this up with a pilotstudy revealing that 907 out of 1,544 women acrossvillages were victims of FGM. 7 Since 2004, Wadi hastaken a leading role in the fight against FGM, focusinginitially on Iraqi Kurdistan and subsequentlyacross many countries in the Middle East. This reportlooks at how an NGO incorporated the use ofICTs to put a global spotlight on a problem, which inturn led to new local laws and attitudes.Using ICTs to expose female genitalmutilationThe origins of FGM and its introduction into theregion are lost in the annals of time. The UN considersFGM a human rights violation. FGM pre-datesIslam and is not mentioned in the Koran, althoughIraqis who practise it claim it is an obligation forMuslim women. FGM, as performed in Iraq, is thecutting and removal of the clitoris, in the belief thatit preserves the “honour” of females. Women whoare uncut are considered unclean and cannot servefood or drinks. This surgery is done in a non-clinicalsetting with only a knife and a handful of ash toseal the wound. The procedure is so dangerous thatsome victims die from the pain or from infections.Those who survive suffer from psychological, physicaland sexual traumas.7 stopfgmmiddleeast.wordpress.com/background/how-it-all-started139 / Global Information Society Watch
- Page 5 and 6:
Costa Rica . . . . . . . . . . . .
- Page 7:
IntroductionJoanne SandlerGender at
- Page 10 and 11:
excluded. 9 And while recent data n
- Page 12 and 13:
ox 1In February 2009, intimate pict
- Page 14 and 15:
egime, increasing surveillance of t
- Page 16 and 17:
Accessing infrastructureMariama Dee
- Page 18 and 19:
figure 2.Share of individuals with
- Page 20 and 21:
figure 4.Share of where internet wa
- Page 22 and 23:
figure 7.Main reasons why individua
- Page 24 and 25:
A digital postcard urging people to
- Page 26 and 27:
and set the scene for a new point o
- Page 28 and 29:
activity, exhorting citizens to exe
- Page 30 and 31:
to citizens. 30 The situated experi
- Page 32 and 33:
Sexuality and the internetBruno Zil
- Page 34 and 35:
ally exclusive. Commercial sex is a
- Page 36 and 37:
Sometimes, strangers they meet onli
- Page 38 and 39:
Violence against women onlineJan Mo
- Page 40 and 41:
elated forms of VAW have become par
- Page 42 and 43:
Men often feel that they own their
- Page 45 and 46:
ConclusionAs Daroczi, Shevchenko, R
- Page 47 and 48:
Online disobedienceNadine MoawadAss
- Page 49 and 50:
mapping platform for sexual harassm
- Page 51 and 52:
1800 1850 1900Maria Gaetana Agnesi(
- Page 53 and 54:
TodaySusan KareCreated the icons an
- Page 55 and 56:
Whose internet is it anyway?Shaping
- Page 57 and 58:
academic groundwork is needed, both
- Page 59 and 60:
empowered and disempowered by them.
- Page 61 and 62:
Whose internet is it anyway?Shaping
- Page 63 and 64:
Country reports
- Page 65 and 66:
P is for PIN: “The website works
- Page 67 and 68:
Crime of Trafficking, 9 which recei
- Page 69 and 70:
Role of ICTs in the trafficking of
- Page 71 and 72:
(1) If any person deliberately publ
- Page 73 and 74:
BOLIVIAPreventing digital violence
- Page 75 and 76:
Due to the popularity and widesprea
- Page 77 and 78:
a position of privilege.” 7 It be
- Page 79 and 80:
the councils that the spaces alone
- Page 81 and 82:
gradually become the primary field
- Page 83 and 84:
Sexuality in Communist Bulgaria”,
- Page 85 and 86:
• Of the five MPCTs selected, two
- Page 87 and 88: • MPCT managers should regularly
- Page 89 and 90: protest movement that has gained si
- Page 91 and 92: to arise as to the evolving nature
- Page 93 and 94: CHINAMicroblogs: An alternative, if
- Page 95 and 96: domestic violence, and the exacting
- Page 97 and 98: colombiaWomen’s rights, gender an
- Page 99 and 100: • Women activists and human right
- Page 101 and 102: CONGO, democratic republic ofOnline
- Page 103 and 104: CONGO, REPUBLIC OFWomen’s rights
- Page 105 and 106: The different uses of ICTs for wome
- Page 107 and 108: cook islandsBalancing leadership: A
- Page 109 and 110: and the Netherlands (38.7%). Of the
- Page 111 and 112: costa ricaThe ICT sector requires t
- Page 113 and 114: côte d’ivoireYasmina Ouégnin: A
- Page 115 and 116: family expenses according to their
- Page 117 and 118: was any kind of consultation before
- Page 119 and 120: violence and violence against women
- Page 121 and 122: Write Me In is a series of digital
- Page 123 and 124: Online protests over “virginity t
- Page 125 and 126: ethiopiaEmpowering women through IC
- Page 127 and 128: the exchange take as much as 80% of
- Page 129 and 130: indiaThe internet as a pathway for
- Page 131 and 132: Using ICTs in support of women’s
- Page 133 and 134: • Develop gender-sensitive techni
- Page 135 and 136: The skill of using modern technolog
- Page 137: However, non-official surveys indic
- Page 141 and 142: multimedia presentations in their v
- Page 143 and 144: Both these groups emerged from the
- Page 145 and 146: Action stepsPaestum 2013Just before
- Page 147 and 148: in 2009. The Dunn et al. study foun
- Page 149 and 150: end of the ICT spectrum, reflecting
- Page 151 and 152: japanDealing with the backlash: Pro
- Page 153 and 154: Akiko and teacher Nomaki Masako (wh
- Page 155 and 156: Access to ICTs helps in the fulfilm
- Page 157 and 158: ut the case was ultimately dismisse
- Page 159 and 160: kenyaWomen and cyber crime in Kenya
- Page 161 and 162: huge online following. Known as an
- Page 163 and 164: Action steps• Lobby to have onlin
- Page 165 and 166: For example, although the abovement
- Page 167 and 168: In addition to the cases mentioned
- Page 169 and 170: Two years later, when facing a simi
- Page 171 and 172: NEPALPerspectives of Nepali women i
- Page 173 and 174: Table 2.Women in technical position
- Page 175 and 176: NetherlandsInternet, information an
- Page 177 and 178: procure a safe medical abortion. Th
- Page 179 and 180: NEW ZEALANDProposed new laws and th
- Page 181 and 182: world. The gender inequalities play
- Page 183 and 184: NIGERIAThe use of ICTs to express p
- Page 185 and 186: the issue in the public eye until p
- Page 187 and 188: PAKISTANShaping ICTs in Pakistan us
- Page 189 and 190:
with Pakistan’s internet ranking
- Page 191 and 192:
PERUWomen against violence: Using t
- Page 193:
een delays in the judicial response
- Page 197 and 198:
infrastructure, clear processes and
- Page 199 and 200:
employment. While science courses a
- Page 201 and 202:
One of the protesting organisations
- Page 203 and 204:
county libraries have been trained
- Page 205 and 206:
trained to be accustomed to gatheri
- Page 207 and 208:
ConclusionThe government of Rwanda
- Page 209 and 210:
a threat to the South African publi
- Page 211 and 212:
spainShaping the internet: Women’
- Page 213 and 214:
and up to 23% to 25% in industrial
- Page 215 and 216:
Economic activityAt the end of the
- Page 217 and 218:
Action stepsSwitzerland has ratifie
- Page 219 and 220:
• Conducting social campaigns and
- Page 221 and 222:
gender equality in the new constitu
- Page 223 and 224:
inheritance rights. However, in man
- Page 225 and 226:
thailandThai cyber sexuality: Liber
- Page 227 and 228:
Table 1.Selected examples of online
- Page 229 and 230:
ugandaUsing ICTs to create awarenes
- Page 231 and 232:
united statesThe flame war on women
- Page 233 and 234:
Council that addresses online haras
- Page 235 and 236:
Because of this the DWU became cons
- Page 237 and 238:
venezuelaICT and gender violence in
- Page 239 and 240:
company PDVSA 41 (2), the National
- Page 241:
This image from Pakistan captures t