Women and cybercrime in Kenya: the dark side of ICTS (Working document)
This study was commissioned by KICTANET as part of the GRACE Project, and supported by the International Development and Research Center (IDRC). It documents cybercrime against women in Kenya and by extrapolation the East African Community Member states.The objective of the study is to provide evidence for development of cyber security/crime policy and regulatory framework that acknowledges and considers cyberspace violence against women and create awareness on cybercrime against women amongst various stakeholders. Therefore it targets primarily to the government/governmental agencies, international organisations, women organisations and media.
The general objective of this study is to contribute to development of cyber security legislation and regulatory framework in Kenya in order to provide a secure safe space, for women to exercise their right to communicate without fear of abuse, harassment, and violence. In order to achieve this larger goal the specific objectives are to:
1. Investigate the prevalence of cyber crime against women
2. Explore how cyber crime affects women differently.
3. Examine measures to address cyber crimes toward women (what are the measures in place or being developed by authorities, regulators, globally etc).
4. Determine mechanisms of engaging stakeholders to begin to address cyber crime against women.
The study seek information to address the following questions:
1. What is the prevalence of cybercrime against women in terms of degree, level, quantity, and distribution?
2. How does cyber crime affect women differently? (Demonstrate spiral effect and determine if women are already intimidated by cyber space e.g. mailing lists, how active do women participate in debates? Is the design of the cyber already woman unfriendly?)
3. What are the current measures and gaps (technological, legal, social, and psychological) to address cyber crime against women (local, regional, and global)? Map the efforts (lessons of best practice).
4. What mechanisms are appropriate for addressing cyber crime against women?