The module explores the power of the Internet as an organizing tool to combat violence against women.
The module explores the symbiotic relationship between the Internet and the international sex industry, the laws and regulations relating to it, and the ways how groups and communities have been using technology to combat trafficking and explore options for and objections to regulating the Web's content.
This paper introduces shares some experiences and lessons learned applying the Information and Communication Technology (ICT) Audit Framework, an evaluation tool to learn more about the role and impact of ICTs on development projects.
The module examines the creation, consumption, and content of Internet pornography in order to understand the Internet's role in the perpetuation of violence against women.
The paper examines the nature and types of gender harassment occurring on the net, and whether online gender harassment rises to the level of an actionable claim.
The page contains examples of policies that may be adopted by websites and website administrators. Samples range in level of restraint and severity.
The page consists of links to current and pending cyberstalking-related United States federal and state laws, as well as those states that do not have laws yet and related laws from other countries.
The research report describes how and why two Midwestern domestic violence organizations in the US use Internet and wireless communication technologies. Major findings of the study reveal a need for more awareness and technical assistance regarding safe and ethical Internet and wireless communication service delivery.
This research differentiates itself because it focuses on women and policy rather than ICTs. Thus this research is about women's needs and concerns in the real (offline) world and how public information and ICTs can contribute to solutions rather than issues such as women having internet access, or studies regarding their activities on the web.