Resources

This paper introduces shares some experiences and lessons learned applying the Information and Communication Technology (ICT) Audit Framework, an evaluation tool to learn more about the role and impact of ICTs on development projects.
The paper examines the nature and types of gender harassment occurring on the net, and whether online gender harassment rises to the level of an actionable claim.
The page contains examples of policies that may be adopted by websites and website administrators. Samples range in level of restraint and severity.
The page consists of links to current and pending cyberstalking-related United States federal and state laws, as well as those states that do not have laws yet and related laws from other countries.
The research report describes how and why two Midwestern domestic violence organizations in the US use Internet and wireless communication technologies. Major findings of the study reveal a need for more awareness and technical assistance regarding safe and ethical Internet and wireless communication service delivery.
This research differentiates itself because it focuses on women and policy rather than ICTs. Thus this research is about women's needs and concerns in the real (offline) world and how public information and ICTs can contribute to solutions rather than issues such as women having internet access, or studies regarding their activities on the web.
The national survey reveals that large numbers of young people are encountering sexual solicitations they did not want, sexual material they did not seek, and people who threatened and harassed them in a variety of ways. It also shows how families and young people are addressing matters of danger and protection on the Internet, and puts forward several recommendations on how to address this problem on a larger context.
The paper highlights four key areas that affect women and girls where priorities have changed, funding has been cut, research findings distorted, important social differences masked, and critical committees and programs dismantled. <br />
The paper outlines the risk and liability issues related to use of the Internet and suggests risk-management guidelines to protect organizations from liability.