caller kept on calling from different numbers, causingher emotional upset.Aruny trusted her boyfriend enough to speakfreely with him about romance, love and sex. As aresult, Aruny paid a high price for her frankness. Herboyfriend recorded their intimate conversations onhis phone and passed them on to her family througha friend when she refused to marry him.Salma met Shafik while visiting a festival. Theyexchanged phone numbers and developed a relationshipby mobile phone, which later turned intotheir marriage. Shafik took Salma to the house ofhis friend in a ploy to traffic her out of the country.She, however, managed to go to the police stationwith the help of the locals. Following the incident,Salma’s family and society rejected her. She hastaken shelter at the Center for Women and ChildrenStudies at Dhaka University.ConclusionsCivil society organisations need to organise advocacyand campaigns around two issues. One of theseis the right to privacy, which needs to be bolsteredwith the formation of an independent commissionon privacy rights, an amendment of the 2006 ICTAct, and awareness building on the right to information(RTI) and freedom of expression legislationin Bangladesh. On the other hand, we need to bevigilant so that government institutions cannot infringeon the rights to privacy or security of ordinarycitizens and do not use legislative tools to silencedissident voices. This is a delicate balancing act,but civil society needs to be always alert.Recently, the government of Bangladeshamended the 2006 ICT Act by broadening the definitionof cyber crime, as well as establishing tougherpunitive measures for cyber crime offences, allowingpolice to arrest suspects without a warrant,and making cyber crime a non-bailable offence.In a country like Bangladesh, where corruption isrampant, this can very easily become a tool for extortionby different authorities.Some have pointed out that many cyber crimesor digital crimes do not fall under the purview of thislaw. For instance, it does not address any crimescommitted through mobile phones, although manysocial scientists and rights activists have long beenarguing that mobile phones are frequently used forpreliminary introduction, to communicate threats,to take obscene pictures for blackmailing, and toprovide false information for the purposes of fraud,among other offences. Moreover, this law considersemails as evidence, conflicting with the country’sEvidence Act, which does not. As Mustafa Jabbar,president of Bangladesh Computer Samity, hasstressed, “Even the amendments did not addressthese issues.” The ICT capacity of the law enforcementagencies is also in question, as the countrystill lacks a well-equipped IT forensic lab.Actions stepsIn order to facilitate this research project, BytesforallBangladesh together with CNews Magazine, 10Bangladesh Computer Samity 11 and the BangladeshOpen Source Network (BDOSN) 12 organised a roundtableon 12 June 2013 in Dhaka to collect feedbackfrom online or gender rights activists, ICT professionals,social science researchers and journalists.That roundtable provided us with insight and a listof real-life experiences and action items.Everyone agreed that there has been an increasein cyber crimes targeted towards women,but no centralised and organised database is availableto estimate the trend or impact of these crimes.In an interview with the media, Salma Ali, executivedirector of the National Women Lawyers Association,recognised the lack of exact data on peoplewho commit suicide after falling victim to cybercrimes. 13 Therefore there was a suggestion that anopen, online database be created where such informationcould be entered on an ongoing basis, eitherby the victims directly (maintaining anonymity ifnecessary) or by the relevant stakeholders.Many of these incidents of harassment occur ateducational institutions, but female students are oftenunaware of their rights and the actions they cantake. There was a suggestion that educational institutionsprovide such information on a mandatorybasis through their websites and update it regularly.There was also a recommendation that the 2006ICT Act should be updated or separate legislationshould be created from a gender perspective, takinginto account issues such as privacy infringement,online harassment and security issues involvingwomen, as they are the main victims or most vulnerableto such crimes and often they cannot comeout publicly due to social stigma and other forms ofsocial exclusion.It is also important to develop the capacity oflaw enforcement agencies to ensure that they areaware of the necessary legal provisions to deal withsuch issues. There is a cyber crime desk in each policestation of Dhaka city, but hardly any cases arefiled as per the cyber crimes laws in Bangladesh. ■10 www.cnewsvoice.com/pdfnews.php11 www.bcs.org.bd12 bdosn.org13 thenewnationbd.com/newsdetails.aspx?newsid=4026272 / Global Information Society Watch
BOLIVIAPreventing digital violence in schoolsREDES FoundationJosé Eduardo Rojaswww.fundacionredes.orgIntroductionBetween 20 September and 15 November 2012,a total of 1,121 students from nine schools weretrained in 40 workshops on the prevention of digitalviolence. The workshops were held in the municipalitiesof Cercado, Tiquipaya and Colcapirhua inthe department of Cochabamba. The content wasdeveloped by experts in internet governance fromthe REDES Foundation, who were inspired by theimportance of educating new generations in theoverall uses of the internet, in order for them toexercise their human rights as well as reduce riskbehaviours online.In order to carry out the workshops, it was importantto develop an introductory methodologyfor schools that do not have experience, policiesor activities to prevent or deal with crimes on thenet. Diagnostic visits showed that schools lack adequatetechnology, infrastructure and connectivity,which greatly hampers learning processes usingthe internet. Overall, teachers under the age of 30show greater interest towards this subject; on theother hand, parents have shown a great disregardand ignorance about the risks and vulnerability oftheir children online. We used online educationalvideo games with free software, 1 using a mobileconnection from the REDES Foundation.Cyber crime and digital violence common inBoliviaThe REDES Foundation is now opening up a new fieldfor work and research, which we are certain is of interestto Bolivia and Latin America. There is a fine linebetween computer crimes related to legal conceptswhich are formally criminalised in domestic law, and“digital violence” which is not recognised or penalised,but is affecting many people.Bolivia does not have a specific legal frameworkto criminalise and punish cyber crimes. Moreover,1 www.cuidatuimagenonline.comthere is no institutional capacity to deal with them,because in late 2008 the Special Force AgainstCrime shut down the Computer Crimes Division.There is a lack of specialised judges and trainedpersonnel in the judicial system. Moreover, in thepublic sector, there is also a lack of trained personnelin the Office of the Ombudsman for Children andAdolescents, the Family Protection Brigades andthe Municipal Comprehensive Services. Overall,there is a complete lack of knowledge among Bolivianschools, teachers, parents and students on howto deal with different forms of digital violence.The core of the problem is that, whether we seeit as a crime (in legal terms) or as digital violence(in social terms), we are dealing with the violationof human rights of various groups of the Bolivianpopulation, particularly women, girls, boys, teenagers,young and sexually diverse populations.Since 2010 the REDES Foundation has raised theawareness of the Bolivian public, denouncing theoffences being committed against students over theinternet and other internet-related problems, suchas phishing, hacking, pornography, child pornography,lolicon 2 and shotacon, 3 sexting, grooming, thetrafficking of personal images, internet addictionand plagiarism, among others. 4During the 2012 workshops, we noted that theonline rights violations occurred because peopleengaged in the following “digital risk behaviours”:a) placing a positive value on having large numbersof contacts on social networks, even if they arestrangers; b) considering the mobile phone as aneffective device to control people (family members,partners, employees), to the point that it is beingused for harassment and dependency through SMSand calling; c) considering the searching of personalaccount information, emails and social networkactivity as a common practice; d) having a selfperceptionof utter vulnerability to harassment andanonymous messaging (“can’t do anything aboutit”); e) exposure to violent video games and interactivedigital content; f) tagging and indiscriminateuse of the images on other peoples’ social networks2 en.wikipedia.org/wiki/Lolicon3 en.wikipedia.org/wiki/Shotacon4 www.enredomino.fundacionredes.org73 / Global Information Society Watch
- Page 5 and 6:
Costa Rica . . . . . . . . . . . .
- Page 7:
IntroductionJoanne SandlerGender at
- Page 10 and 11:
excluded. 9 And while recent data n
- Page 12 and 13:
ox 1In February 2009, intimate pict
- Page 14 and 15:
egime, increasing surveillance of t
- Page 16 and 17:
Accessing infrastructureMariama Dee
- Page 18 and 19:
figure 2.Share of individuals with
- Page 20 and 21:
figure 4.Share of where internet wa
- Page 22 and 23: figure 7.Main reasons why individua
- Page 24 and 25: A digital postcard urging people to
- Page 26 and 27: and set the scene for a new point o
- Page 28 and 29: activity, exhorting citizens to exe
- Page 30 and 31: to citizens. 30 The situated experi
- Page 32 and 33: Sexuality and the internetBruno Zil
- Page 34 and 35: ally exclusive. Commercial sex is a
- Page 36 and 37: Sometimes, strangers they meet onli
- Page 38 and 39: Violence against women onlineJan Mo
- Page 40 and 41: elated forms of VAW have become par
- Page 42 and 43: Men often feel that they own their
- Page 45 and 46: ConclusionAs Daroczi, Shevchenko, R
- Page 47 and 48: Online disobedienceNadine MoawadAss
- Page 49 and 50: mapping platform for sexual harassm
- Page 51 and 52: 1800 1850 1900Maria Gaetana Agnesi(
- Page 53 and 54: TodaySusan KareCreated the icons an
- Page 55 and 56: Whose internet is it anyway?Shaping
- Page 57 and 58: academic groundwork is needed, both
- Page 59 and 60: empowered and disempowered by them.
- Page 61 and 62: Whose internet is it anyway?Shaping
- Page 63 and 64: Country reports
- Page 65 and 66: P is for PIN: “The website works
- Page 67 and 68: Crime of Trafficking, 9 which recei
- Page 69 and 70: Role of ICTs in the trafficking of
- Page 71: (1) If any person deliberately publ
- Page 75 and 76: Due to the popularity and widesprea
- Page 77 and 78: a position of privilege.” 7 It be
- Page 79 and 80: the councils that the spaces alone
- Page 81 and 82: gradually become the primary field
- Page 83 and 84: Sexuality in Communist Bulgaria”,
- Page 85 and 86: • Of the five MPCTs selected, two
- Page 87 and 88: • MPCT managers should regularly
- Page 89 and 90: protest movement that has gained si
- Page 91 and 92: to arise as to the evolving nature
- Page 93 and 94: CHINAMicroblogs: An alternative, if
- Page 95 and 96: domestic violence, and the exacting
- Page 97 and 98: colombiaWomen’s rights, gender an
- Page 99 and 100: • Women activists and human right
- Page 101 and 102: CONGO, democratic republic ofOnline
- Page 103 and 104: CONGO, REPUBLIC OFWomen’s rights
- Page 105 and 106: The different uses of ICTs for wome
- Page 107 and 108: cook islandsBalancing leadership: A
- Page 109 and 110: and the Netherlands (38.7%). Of the
- Page 111 and 112: costa ricaThe ICT sector requires t
- Page 113 and 114: côte d’ivoireYasmina Ouégnin: A
- Page 115 and 116: family expenses according to their
- Page 117 and 118: was any kind of consultation before
- Page 119 and 120: violence and violence against women
- Page 121 and 122: Write Me In is a series of digital
- Page 123 and 124:
Online protests over “virginity t
- Page 125 and 126:
ethiopiaEmpowering women through IC
- Page 127 and 128:
the exchange take as much as 80% of
- Page 129 and 130:
indiaThe internet as a pathway for
- Page 131 and 132:
Using ICTs in support of women’s
- Page 133 and 134:
• Develop gender-sensitive techni
- Page 135 and 136:
The skill of using modern technolog
- Page 137 and 138:
However, non-official surveys indic
- Page 139 and 140:
iraqICTs and the fight against fema
- Page 141 and 142:
multimedia presentations in their v
- Page 143 and 144:
Both these groups emerged from the
- Page 145 and 146:
Action stepsPaestum 2013Just before
- Page 147 and 148:
in 2009. The Dunn et al. study foun
- Page 149 and 150:
end of the ICT spectrum, reflecting
- Page 151 and 152:
japanDealing with the backlash: Pro
- Page 153 and 154:
Akiko and teacher Nomaki Masako (wh
- Page 155 and 156:
Access to ICTs helps in the fulfilm
- Page 157 and 158:
ut the case was ultimately dismisse
- Page 159 and 160:
kenyaWomen and cyber crime in Kenya
- Page 161 and 162:
huge online following. Known as an
- Page 163 and 164:
Action steps• Lobby to have onlin
- Page 165 and 166:
For example, although the abovement
- Page 167 and 168:
In addition to the cases mentioned
- Page 169 and 170:
Two years later, when facing a simi
- Page 171 and 172:
NEPALPerspectives of Nepali women i
- Page 173 and 174:
Table 2.Women in technical position
- Page 175 and 176:
NetherlandsInternet, information an
- Page 177 and 178:
procure a safe medical abortion. Th
- Page 179 and 180:
NEW ZEALANDProposed new laws and th
- Page 181 and 182:
world. The gender inequalities play
- Page 183 and 184:
NIGERIAThe use of ICTs to express p
- Page 185 and 186:
the issue in the public eye until p
- Page 187 and 188:
PAKISTANShaping ICTs in Pakistan us
- Page 189 and 190:
with Pakistan’s internet ranking
- Page 191 and 192:
PERUWomen against violence: Using t
- Page 193:
een delays in the judicial response
- Page 197 and 198:
infrastructure, clear processes and
- Page 199 and 200:
employment. While science courses a
- Page 201 and 202:
One of the protesting organisations
- Page 203 and 204:
county libraries have been trained
- Page 205 and 206:
trained to be accustomed to gatheri
- Page 207 and 208:
ConclusionThe government of Rwanda
- Page 209 and 210:
a threat to the South African publi
- Page 211 and 212:
spainShaping the internet: Women’
- Page 213 and 214:
and up to 23% to 25% in industrial
- Page 215 and 216:
Economic activityAt the end of the
- Page 217 and 218:
Action stepsSwitzerland has ratifie
- Page 219 and 220:
• Conducting social campaigns and
- Page 221 and 222:
gender equality in the new constitu
- Page 223 and 224:
inheritance rights. However, in man
- Page 225 and 226:
thailandThai cyber sexuality: Liber
- Page 227 and 228:
Table 1.Selected examples of online
- Page 229 and 230:
ugandaUsing ICTs to create awarenes
- Page 231 and 232:
united statesThe flame war on women
- Page 233 and 234:
Council that addresses online haras
- Page 235 and 236:
Because of this the DWU became cons
- Page 237 and 238:
venezuelaICT and gender violence in
- Page 239 and 240:
company PDVSA 41 (2), the National
- Page 241:
This image from Pakistan captures t