In depth
Coordinates for change: putting violence against women on the map
By Flavia Fascendini
“Map it. End it. Demand change” was the core of the Take Back the Tech! campaign for 2011. Flavia Fascendini writes about several mapping initiatives around the world that aim to document forms of violence against women so as to “put them on the map” in the sense that they are named, pointed out, shown as related, and denounced - and in that way the mapped territory is changed into one that…
Mapping and privacy: Interview with Privacy International's Gus Hosein (audio, 18 mins)
By Sonia Randhawa
GenderIT.org's writer, Sonia Randhawa, spoke with senior fellow at Privacy International Gus Hosein about how mobile devices and their ability to map our movements are intruding on women's personal privacy and individual autonomy.
In depth
Mapping and privacy: Interview with Privacy International's Gus Hosein
By Sonia Randhawa
Sonia Randhawa spoke with senior fellow at Privacy International Gus Hosein about how mobile devices and their ability to map our movements are intruding on personal privacy and individual autonomy.
In depth
Take Back the Tech! But know the risks first
By erika
Like any tool, ICTs can be tremendously useful, but dangerous if you don't know what you're doing. This is doubly true for activists and women's rights defenders. Jennifer Radloff and Erika Smith speak to participants from one of our secure online communications for women human rights defenders workshops who share their own experiences with ICTs and what they've learned from the training.
In depth
Stripping the IGF bare: where are women´s rights?
By Flavia Fascendini
GenderIT.org's editors, Flavia Fascendini and Katerina Fialova, speak with the APC WNSP members who took part at the Sixth Internet Governance Forum that took place in Nairobi, Kenya from 27-30 September 2011. In the interview, Chat García Ramilo, Dafne Sabanes Plou, Jac sm Kee, Jan Moolman, and Jennifer Radloff from the APC Women´s Programme offer their insights regarding gender balance and…
In depth
Women activists and internet governance: let's open the debate
By Dafne Sabanes Plou
Dafne Plou reports on the workshop of about 20 women's rights advocates from different countries and backgrounds who met late September 2011, in Nairobi, Kenya, just before the 6th Internet Governance Forum to share their experiences in policy advocacy and to discuss internet governance and its linkage to women’s rights agendas. The workshop was organised by the APC Women's Networking Support…
In depth
Who's gonna track me?
By Flavia Fascendini
Flavia Fascendini looks at the report of the Special Rapporteur on the situation of human rights defenders -- which, for the first time in history, focuses on the situation of women's human rights defenders. Drawing on the report's findings, she talks to South-East Asian women's activists about the unique security risks they face online.
In depth
Connectedness or alienation?
By ItsAllMaya
Women's human rights activist Edna Aquino remarks on how ICTs have impacted her work, presenting both new opportunities and new risks. In her interview with new GenderIT.org writer, Maya Ganesh, Edna argues that activists using ICTs must be mindful of alienating women with the use of excessive jargon, and must always be keenly aware that there are inherent risks in online communications. However…
In depth
ICT skills gap = online security risks
By Mavic Cabrera-Balleza
GenderIT.org contributor Mavic Cabrera-Balleza interviews Mary Jane Real, outgoing coordinator of the Women Human Rights Defenders International Coalition about the use of internet and information and communication technologies by women human rights defenders, the opportunities they present as well as the digital security risks women human rights defenders confront. Real goes on to share her…
In depth
“Defending yourself means defending your community”
By Jennifer Radloff
In the second part of the interview with c5 and anonymous, the trainers from the secure online communications workshop provide strategies for mitigating some of the dangers for women's human rights defenders. While examining the practices of policy-makers, internet intermediaries and every day users, they conclude that security means more than just awareness -- it requires behavioural change.