has to fit into categories of good and bad, and whatis not good must be bad.” Allowed speech becomesfenced in to that which is “politically correct”.The recently vetoed cyber bullying proposal fromthe State of Nuevo Leon is an excellent example ofsuch emerging legislation regarding the internet, asits vague wording not only advocated censorship, butalso criminalised speech and made internet serviceproviders responsible parties, as well as suggestingjail sentences for those participating in “offensive”activities via electronic media – activities which thebill never clearly defined, making interpretation andapplication of the law entirely subjective. “It meanthaving less speech in order to guarantee a vague andsubjective understanding of what might offend an individual,”Velázquez points out. He has raised similarconcerns regarding the Supreme Court decision tooutlaw words like “maricón” and “puñal” (both ofwhich are derogatory terms in Mexico for homosexualmen) as hate speech. 11In fact, Luzma is a journalist in one of the mostdangerous countries in the world to practice her profession:more than 75 journalists have been killed inMexico from 2000 to August 2013. 12 CIMAC, the Women’sCommunication and Information Agency, hasdocumented 115 cases of specific aggressions againstwomen journalists, noting an alarming increase in thelast three years, and analysing the different forms ofviolence that women journalists face – beginning withdefamation and sexualised violence and including 13cases of femicide. Similar tactics are used againstwomen human rights defenders, as Luzma and Louisawell know. The Special Rapporteur on human rightsdefenders noted in her 2011 report that human rightsdefenders and activists dedicated to women’s rightsor gender issues in the Americas are those that appearto be the most exposed to murder and attemptedmurder, particularly in Colombia, Mexico, Guatemalaand Honduras. 13 Despite international recommendations,Mexico still does not have an official databasedisaggregated by sex, nor one that takes into accountthese specific threats faced by women human rightsdefenders and women journalists. 14In a general climate of increasing violence inMexico and the urgency of addressing organisedcrime, there is pressure to dismiss and further nor-11 www.animalpolitico.com/blogueros-altoparlante/2013/04/24/lospunales-de-la-suprema-corte/#axzz2Y6nLSCXU12 Article 19 map of journalists murdered in Mexico: secure.flickr.com/photos/77679119@N02/9352532083/sizes/k/in/photostream13 consorciooaxaca.org.mx/wp-content/uploads/2013/03/PronunciamientoDefensorasMesoCSW-FINAL-2.pdf14 132.247.1.49/PAPIME306511/pdfs/Anex2_ObservcsfinalesCocedaw.pdfmalise violence against women – even more so incases of tech-related violence. Similarly, limitationson citizens’ mobility, privacy and freedom of expressionare put in a counterbalance with militarisationand surveillance to ensure public safety. The necessaryexercise of putting legislation to the test and dueprocess are at risk of being forgotten.Interestingly, although Luzma’s and Louisa’s experiencewas a bit of a trial by fire, important practiceemerges from it:• They documented and made back-up copies ofthreats, at least the email ones.• They reported the problem to authorities – to police,to human rights entities and also to the serviceproviders that the threats were posted on, appealingfor action based on the providers’ termsof service.• When one authority did not respond, they wentto another authority. They insisted on making thesystem work, despite its weaknesses.• When no authority responded, in the secondcase, they went on public record in the media withthe problem, and on the internet.• They also followed one of the basic tenets of freedomof expression: fight offensive words not withcensorship but with more words – and in at leastone case, they convinced religious conservativesto change their views about lesbianism.Finally, they try to learn as much as they can aboutonline safety, and share what they learn. We met ina workshop about tech-related violence, which iswhere they discovered their situation was not an isolatedcase.“We learned a lot from that first experience. Ibecame more aware about online safety andI began to look at online ‘advertising’ differently.But especially I learned you should neverstop knocking on doors. If one authority won’tdo anything, then you have to make a move.We wouldn’t have been able to do this withoutour feminist background. That’s one of thethings that feminism has taught me: that youcan change the world – it’s not just the terrain ofmen or extraordinary people. And I can changethe internet. What is on the internet? A bunch ofbull, so we put in our own ‘bull’ – I try to get myideas out everywhere, in online magazines, Facebook,blogs. I try to write as much as I can onall sorts of issues – lesbianism, diversity – tryingto get out a different vision of the world on theinternet.” ■170 / Global Information Society Watch
NEPALPerspectives of Nepali women in ICTsDevelopment Knowledge Management and InnovationServices Private LimitedKishor Pradhanwww.dekmis.comOn 15 April 2013, International Girls in Informationand Communications Technology (ICT) Day wascelebrated for the first time in Nepal. 1 It was a jointeffort by the Ministry of Information and Communication,the Nepal Telecom Authority (NTA) and EqualAccess International Nepal, with support from theInternational Telecommunication Union (ITU).Though the International Girls in ICT Day wascelebrated for the first time, it was not the firstevent mainstreaming ICT for development (ICT4D)for women in Nepal, or for women in ICTs. Therewere several efforts in the past to make use of ICTsfor women and development, some of them concernedwith building women’s capacity in ICTs byproviding training and creating networks.More than a decade ago, led by three women’sorganisations, Sancharika Samuha (SAS), Saathi andthe Centre for Legal Research and Services (CLRS),an electronic network called MahilaWeb was startedwith a nine-month start-up grant from the InternationalCentre for Integrated Mountain Development(ICIMOD). The initial goal of MahilaWeb was to produceand share information about women and genderin Nepal, locally and globally. MahilaWeb developedan electronic repository of information collectedfrom government, non-governmental organisations,media and the private sector based on the 12 criticalareas of concern from the Beijing Platform for Action,as well as other gender issues confronting Nepal. 2The MahilaWeb website was launched in July 2000,but the website is no longer available at the URLwww.mahilaweb.org.Women and ICT policiesUntil the late 1990s, Nepal did not have policiesrelated to new ICTs such as the internet. The NepalInformation Technology (IT) Policy was formulatedin 2000 and paved the way for applying ICTsin various sectors in Nepal, such as the economy,1 girlsinict.org/girls-in-ict-day-events/girls-ict-day-nepal2 unpan1.un.org/intradoc/groups/public/documents/apcity/unpan007116.pdfeducation, governance and the overall developmentof the country. It also enabled the formation of governmentalinstitutions to promote ICTs in Nepal, likethe Nepal Information Technology Centre.After the Nepal IT Policy 2000 3 was implemented,which included varied application of ICTs indifferent sectors and the need to regulate the use(and abuse) of ICTs, there was a need for new regulationsto reinforce it, and so the Nepal ElectronicTransactions Act was enacted in 2008. 4However, neither the ICT policy nor the actdistinctly addresses issues related to gender, especiallyfor women. The IT Policy 2000 has provisionsfor developing human resources in the ICT sector ingeneral by developing ICT educational institutions,encouraging both private and public investments inthe development of ICT industries and businesses,and providing training and scholarships. But giventhat women make up more than half of Nepal’s population,the policy remains silent about what wouldbe the role of women in ICTs and development inNepal – or what specific provision there would beto develop the capacity of Nepali women in ICTs. Inbrief: the policy does not safeguard women’s rightsin line with the provisions made in the current interimconstitution of Nepal.Although it does not directly address genderrelatedissues, the Electronic Transactions Act2008 takes a step towards being gender-sensitiveas it makes provisions for liability, not exceedingabout USD 1,000, or imprisonment, not exceedingfive years, or both, in case of the publication of illegalmaterials in electronic form. The ban on suchpublications includes damage to a person’s privacyand character assassination, which to some extentindirectly prevents online violence against womensuch as online harassment and cyber stalking. Earlierthis year, a woman politician in Nepal sufferedcharacter assassination on Facebook; the victimwas able to file a case and the perpetrators werebrought to justice. 53 nta.gov.np/en/.../Policies/IT%20Policy%202057%202000.pdf/download4 www.tepc.gov.np/uploads/files/12the-electronic-transactionact55.pdf5 www.myrepublica.com/portal/index.php?action=news_details&news_id=56973171 / Global Information Society Watch
- Page 5 and 6:
Costa Rica . . . . . . . . . . . .
- Page 7:
IntroductionJoanne SandlerGender at
- Page 10 and 11:
excluded. 9 And while recent data n
- Page 12 and 13:
ox 1In February 2009, intimate pict
- Page 14 and 15:
egime, increasing surveillance of t
- Page 16 and 17:
Accessing infrastructureMariama Dee
- Page 18 and 19:
figure 2.Share of individuals with
- Page 20 and 21:
figure 4.Share of where internet wa
- Page 22 and 23:
figure 7.Main reasons why individua
- Page 24 and 25:
A digital postcard urging people to
- Page 26 and 27:
and set the scene for a new point o
- Page 28 and 29:
activity, exhorting citizens to exe
- Page 30 and 31:
to citizens. 30 The situated experi
- Page 32 and 33:
Sexuality and the internetBruno Zil
- Page 34 and 35:
ally exclusive. Commercial sex is a
- Page 36 and 37:
Sometimes, strangers they meet onli
- Page 38 and 39:
Violence against women onlineJan Mo
- Page 40 and 41:
elated forms of VAW have become par
- Page 42 and 43:
Men often feel that they own their
- Page 45 and 46:
ConclusionAs Daroczi, Shevchenko, R
- Page 47 and 48:
Online disobedienceNadine MoawadAss
- Page 49 and 50:
mapping platform for sexual harassm
- Page 51 and 52:
1800 1850 1900Maria Gaetana Agnesi(
- Page 53 and 54:
TodaySusan KareCreated the icons an
- Page 55 and 56:
Whose internet is it anyway?Shaping
- Page 57 and 58:
academic groundwork is needed, both
- Page 59 and 60:
empowered and disempowered by them.
- Page 61 and 62:
Whose internet is it anyway?Shaping
- Page 63 and 64:
Country reports
- Page 65 and 66:
P is for PIN: “The website works
- Page 67 and 68:
Crime of Trafficking, 9 which recei
- Page 69 and 70:
Role of ICTs in the trafficking of
- Page 71 and 72:
(1) If any person deliberately publ
- Page 73 and 74:
BOLIVIAPreventing digital violence
- Page 75 and 76:
Due to the popularity and widesprea
- Page 77 and 78:
a position of privilege.” 7 It be
- Page 79 and 80:
the councils that the spaces alone
- Page 81 and 82:
gradually become the primary field
- Page 83 and 84:
Sexuality in Communist Bulgaria”,
- Page 85 and 86:
• Of the five MPCTs selected, two
- Page 87 and 88:
• MPCT managers should regularly
- Page 89 and 90:
protest movement that has gained si
- Page 91 and 92:
to arise as to the evolving nature
- Page 93 and 94:
CHINAMicroblogs: An alternative, if
- Page 95 and 96:
domestic violence, and the exacting
- Page 97 and 98:
colombiaWomen’s rights, gender an
- Page 99 and 100:
• Women activists and human right
- Page 101 and 102:
CONGO, democratic republic ofOnline
- Page 103 and 104:
CONGO, REPUBLIC OFWomen’s rights
- Page 105 and 106:
The different uses of ICTs for wome
- Page 107 and 108:
cook islandsBalancing leadership: A
- Page 109 and 110:
and the Netherlands (38.7%). Of the
- Page 111 and 112:
costa ricaThe ICT sector requires t
- Page 113 and 114:
côte d’ivoireYasmina Ouégnin: A
- Page 115 and 116:
family expenses according to their
- Page 117 and 118:
was any kind of consultation before
- Page 119 and 120: violence and violence against women
- Page 121 and 122: Write Me In is a series of digital
- Page 123 and 124: Online protests over “virginity t
- Page 125 and 126: ethiopiaEmpowering women through IC
- Page 127 and 128: the exchange take as much as 80% of
- Page 129 and 130: indiaThe internet as a pathway for
- Page 131 and 132: Using ICTs in support of women’s
- Page 133 and 134: • Develop gender-sensitive techni
- Page 135 and 136: The skill of using modern technolog
- Page 137 and 138: However, non-official surveys indic
- Page 139 and 140: iraqICTs and the fight against fema
- Page 141 and 142: multimedia presentations in their v
- Page 143 and 144: Both these groups emerged from the
- Page 145 and 146: Action stepsPaestum 2013Just before
- Page 147 and 148: in 2009. The Dunn et al. study foun
- Page 149 and 150: end of the ICT spectrum, reflecting
- Page 151 and 152: japanDealing with the backlash: Pro
- Page 153 and 154: Akiko and teacher Nomaki Masako (wh
- Page 155 and 156: Access to ICTs helps in the fulfilm
- Page 157 and 158: ut the case was ultimately dismisse
- Page 159 and 160: kenyaWomen and cyber crime in Kenya
- Page 161 and 162: huge online following. Known as an
- Page 163 and 164: Action steps• Lobby to have onlin
- Page 165 and 166: For example, although the abovement
- Page 167 and 168: In addition to the cases mentioned
- Page 169: Two years later, when facing a simi
- Page 173 and 174: Table 2.Women in technical position
- Page 175 and 176: NetherlandsInternet, information an
- Page 177 and 178: procure a safe medical abortion. Th
- Page 179 and 180: NEW ZEALANDProposed new laws and th
- Page 181 and 182: world. The gender inequalities play
- Page 183 and 184: NIGERIAThe use of ICTs to express p
- Page 185 and 186: the issue in the public eye until p
- Page 187 and 188: PAKISTANShaping ICTs in Pakistan us
- Page 189 and 190: with Pakistan’s internet ranking
- Page 191 and 192: PERUWomen against violence: Using t
- Page 193: een delays in the judicial response
- Page 197 and 198: infrastructure, clear processes and
- Page 199 and 200: employment. While science courses a
- Page 201 and 202: One of the protesting organisations
- Page 203 and 204: county libraries have been trained
- Page 205 and 206: trained to be accustomed to gatheri
- Page 207 and 208: ConclusionThe government of Rwanda
- Page 209 and 210: a threat to the South African publi
- Page 211 and 212: spainShaping the internet: Women’
- Page 213 and 214: and up to 23% to 25% in industrial
- Page 215 and 216: Economic activityAt the end of the
- Page 217 and 218: Action stepsSwitzerland has ratifie
- Page 219 and 220: • Conducting social campaigns and
- Page 221 and 222:
gender equality in the new constitu
- Page 223 and 224:
inheritance rights. However, in man
- Page 225 and 226:
thailandThai cyber sexuality: Liber
- Page 227 and 228:
Table 1.Selected examples of online
- Page 229 and 230:
ugandaUsing ICTs to create awarenes
- Page 231 and 232:
united statesThe flame war on women
- Page 233 and 234:
Council that addresses online haras
- Page 235 and 236:
Because of this the DWU became cons
- Page 237 and 238:
venezuelaICT and gender violence in
- Page 239 and 240:
company PDVSA 41 (2), the National
- Page 241:
This image from Pakistan captures t