Resources

The paper assesses the effectiveness of popular filtering programs: CYBERsitter, CyberPatrol, NetNanny, and SurfWatch. The findings of the study suggest that current support for filtering software should be reconsidered. <br />
This paper presents a range of perspectives on gender and information and communication technology (ICT) drawn from a review of the literature
The module explores the power of the Internet as an organizing tool to combat violence against women.
The lecture presents some potentials that the Internet offers for democracy, development and women’s empowerment; followed by barriers and limitations.
The module explores the symbiotic relationship between the Internet and the international sex industry, the laws and regulations relating to it, and the ways how groups and communities have been using technology to combat trafficking and explore options for and objections to regulating the Web's content.
The module examines the creation, consumption, and content of Internet pornography in order to understand the Internet's role in the perpetuation of violence against women.
This paper introduces shares some experiences and lessons learned applying the Information and Communication Technology (ICT) Audit Framework, an evaluation tool to learn more about the role and impact of ICTs on development projects.
The paper examines the nature and types of gender harassment occurring on the net, and whether online gender harassment rises to the level of an actionable claim.
The page contains examples of policies that may be adopted by websites and website administrators. Samples range in level of restraint and severity.