In considering ICT solutions, below are the recommended actions from assessment to implementation. These recommendations are supplementary actions to accommodate women and girls’ unique risks and barriered access. These should be implemented in addition to basic ICT design principles. For adequate utilization, service providers should include safety planning around real and perceived risks of gender-based violence induced by technology adoption.
Given the safety concerns, service providers may opt to avoid mobile technology or only focus on coded or hidden language for activities. However, ICT is also a powerful means to advance gender equality and empowerment. Women and girls continue to bear the effect of global poverty, with lower education levels, less access to healthcare and other services, reduced asset ownership, gendered pay reductions, and mobility restrictions. Lessening the digital divide is one contribution toward changing these outcomes. It is essential for service providers to ensure women and girls have safe access to ICTs rather than avoid mobile technology altogether. ICTs can be used in a safe way focusing on women and girls’ needs and ICT access rather than perpetrating violence against them by denying them access or deciding on their behalf to adopt coded or hidden language. ICT increases access of women and girls to critical information (whether medical or social and, here especially, safety).
Without access to ICTs, women and girls lose the opportunity of having their voices heard especially on online platforms, as ICT promotes personal development and makes women feel safer and empowered. We should listen to women and girls and to what they have to say about what they think is safe access to ICT and design ICT-facilitated programs based on their feedback rather than designing ICT tools and sharing them with communities without first considering safe access measures.
Assessing for risk
Consider trends in gender-based violence
Globally, the estimate is that one in three women has experienced physical or sexual violence (World Health Organization 2013). In conflict settings, threats to women’s safety are more acute as crisis and forced displacement further dilute protections women can access, and gender-based violence intensifies (International Rescue Committee 2013).
In many humanitarian settings, women report intimate partner violence and other forms of gender-based violence, overcrowded living conditions with lack of privacy, compromised safety, and a reluctance to report violence and receive services (Anani 2013). Stigma, shame, and fear of retribution reduce help-seeking behaviors. This is exacerbated by information precarity, “a condition of information instability and insecurity that may result in heightened exposure to violence” (Wall et al. 2015).
Given that violence escalates in humanitarian settings, it is crucial for recommended ICT implementations to consider women and girls’ real and perceived risks, and apply the necessary safety planning before introducing technology that could increase risks of harm. An initial assessment of available data on reported trends will aid in understanding the context of gender-based violence in the setting.
Conduct participatory assessments
Consultations and focus group discussions with different groups of women and girls are a requirement prior to the introduction of any ICT solution to avoid causing unintentional harm. Prior to participatory assessments, it is crucial for service providers to prioritize the safety of women and girls while conducting these assessments. This requires building trust with affected communities in general and women and girls specifically. This can be done through ongoing introductory visits to the community and non-focused PSS needs assessments to make sure the trust process is progressing. In addition, service providers should ask women and girls to identify a space where they feel safe to participate in the assessment, appropriate timing, safe setting, and any needed mitigation strategies if freedom of movement is restricted. This should be conducted prior to the ICT assessment.
After considering safety concerns and trust-building, participatory assessments should include community mapping for safety concerns. These safety concerns can provide information about power dynamics that could affect safe mobile use. For example, information about high rates of intimate partner violence combined with trends in device sharing should trigger a consideration of harm reduction techniques.
Service providers could also conduct a digital safety mapping. In this, women and girls would develop a visual representation of how they currently use mobile phones/the Internet, how they would like to use it, and their safety concerns. These activities will allow service providers to understand risks and ways to mitigate them.
Focus group discussions can also be used to propose solutions and gather feedback from women and girls. For example, with an information awareness campaign that shared news about service availabilities, service providers could gather feedback about the specific information desired; the timing of the message, if the message should be disguised with other information; the preferred channel (e.g., WhatsApp); and any safety concerns.
These assessments can include a series of questions about general population mobile technology usage, personal usage and access, real and perceived safety risks, and desired uses. To get more in-depth information, this could include vignettes that provide participants with a clear case study to formulate an opinion.
Plan for safe use
Based on survey responses, there are several important trends to consider for the deployment of mobile/Internet-based interventions or communication methods with displaced women and girls. Most often shared or borrowed phones are owned by parents or intimate partners. If service providers are considering ICT channels for engagement with female beneficiaries, this has a significant impact on the types of services that can be safely offered and safe communication methods via mobile or the Internet. For example, in considering phone-based services, service providers can and should ask women and girls about the way that they would like to receive the service. The service provider should ask the women and/or girls about the time that she would like to have a call, e.g., if she prefers to call rather than receiving a call or if she would prefer to send a missed call to the service provider when she feels safe. Further, applications that facilitate a user accessing online GBV counseling need to be weighed against the likelihood of an intimate partner accessing this information, which could result in an increased risk of harm.
In addition to the lack of phone ownership, phone use should be considered monitored and subject to approval. One third of respondents in the survey had their phone use monitored. This, too, has an impact on the ability for safe service provision and communication for potential survivors of family or in-home violence. Phone monitoring takes the form of looking at the screen during use or reviewing chat and phone logs. This means any ICT solutions would benefit from understanding who is viewing the content (the language of the message, the timing of the message, and the sender name). Expectations can be made from this survey that users in settings like those in the humanitarian sites in Lebanon have reasonable, near-daily access, but that what they do could be monitored. Engagement channels should not bring additional harm to users.
Safety precautions should be built into all ICT solutions with women and girls. This means consulting women and girls in advance of deploying an ICT intervention to assess unique safety risks and feasibility. This client-responsive design style is highly recommended to ensure additional harm is not introduced and that ICT tools or platforms are utilized in the manner intended. Assuming mobile devices are shared or borrowed should force implementers to consider wrapping, associating, or including sensitive content (e.g., gender-based violence response services) with other general information, for example having a website or Facebook page that highlights women’s health services and, as can be also discussed in a masked manner, intimate partner violence. Implementers could also consider ICT tools that can accommodate a “quick escape” button so the user can quickly leave the site if someone starts to monitor their use. Planning could also include safety tips on technical literacy and how to be safe on the Internet.
A good example of planned safety measures in ICTs is the myPlan application. This application has users create a log-in to access safety planning. Immediately after log-in, users are directed to create a PIN and informed that if someone is with them and reviewing what they do, they can enter a PIN of 0000 to immediately view non-threatening content and not expose their responses. Products that program around this assumption of multiple users “could help female borrowers move more quickly up the digital ladder and reap the benefits of more active mobile usage” (Santosham 2015).
Community sensitization could be a crucial activity to raise community member awareness about the purpose and content of any new ICT tool. This can help to prevent rumors or rejection of the tool’s implementation and help to build confidence in the tool’s purpose. It is recommended that service providers reach the whole community, including women, men, girls, and boys by tailoring key messages about the new ICT tool. It is also important to validate the key messages by women and girls from the same community to make sure that key messages are relevant to the context and respect the accepted norms of the community.
It is crucial for service providers to engage with men and boys and to build trust with them in order to start the shift in thinking and to gain them as allies in the process. This can include disseminating key messages on ICTs with men through information sessions or through reflective discussions to start the process of changing perceptions of ICT use. In parallel, the same types of activities also need to be conducted with women and girls as they are influenced by the gender norms and community acceptance to ICT access and use. Ask women and girls what they think is appropriate to be shared with the male social network (whether father, husband, uncle, father in law, etc.) and to design the key messages with them and to take their consent before reaching out to men and sharing these key messages with them.
Raise awareness about technology abuse
Prior to implementing ICT tools as part of or to promote an intervention, staff and potential users need to be aware of technology abuse, electronic sexual coercion, and safe use. As community sensitization focuses on preventing misunderstandings about the purpose of the ICT tools, guidance to users on technology abuse can prevent victimization.
Technology abuse is the misuse of technology by perpetrators, which could include stalking, tracking, harassing, and monitoring. Assessing for technology abuse should be built into assessments of safety in discussions with survivors and embedded as part of the safety planning process. Casework staff can ask about safety concerns as it relates to technology, identify the types of technology (applications, websites, social media, or other communication channels) used by the perpetrator, and assess what the survivor understands about the abuse. The National Network to End Domestic Violence suggests asking questions about tracking of the survivor by the perpetrator, perpetrator’s access to the survivors’ communication with other people, information posted in online settings, and maintaining safety and privacy while using technology (Technology Safety 2014a).
Electronic sexual coercion (ESC) is coercive sexting. This includes sending unwanted sexual photos, pressuring to send sexual photos, sharing sexual photos without permission, and pressuring to meet in person with the intent of sexual activity. This is also called gender-based cyber violence. Staff should help inform women and girls about the signs of ESC, steps to avoid, and safety planning. In some settings, documenting ESC can be helpful to survivors. Documentation may aid in building an evidence base for legal action, if these laws are applicable in the setting. Documentation may also help identify patterns in technology abuse and points of escalation.
Safety planning can be used for technology as well. The first step in technology safety planning is to identify the misused technology by the perpetrator. This will aid in creating a customized safety plan for the survivor. There are a range of activities women and girls can take to better protect their device, data, and privacy in digital settings. This can include using a different, safe device; changing passwords; turning off location-tracking settings on mobile devices; obtaining new devices; limiting public information shared on social media sites; and documenting any incident of technology abuse or electronic sexual coercion.
There are likely to be challenges in training women and girls on these protective measures. Low literacy levels and lack of device ownership constitute some of the main challenges as women and girls on do not have regular access. This impacts their ability to retain information and increases the risk of forgetting the information due to lack of practice. To overcome this barrier, service providers should focus on spaced learning (meaning learning over time in small amounts) and retrieval practice so the action is memorized over time instead of having to rely on a resource or person for instruction. Most importantly, ongoing follow-up should be a structured part of any ICT tool to ensure protective measures are updated and adjusted as needed.
Design
Design principles should be contextualized according to gender. This includes mainstreaming considerations for violence risks, access, barriers to use, and technical literacy. Primarily, this means managing risk. From the perspective of the end user, consider safety concerns, device ownership and access, and the level of risk involved. ICTs should follow the principle of do no harm. This should also include data protection considerations. Adhere to international and national standards for data protection. If data is collected from the user, consider the risks if this information was exposed. If personal information is collected from the end user or about displaced populations, informed consent must be provided in advance of data collection, citing the purpose for data gathering.
Adapt for the context
Similar to any project design, it is essential to understand the setting and adapt products developed to match the context and particular access issues, including language, levels of literacy, education, discrimination, freedom of movement and isolation, and other sociocultural norms. For settings with low literacy, service providers can introduce technology literacy sessions or introduce audio-based or visual applications to accommodate users. This can include trainings and capacity building in safe spaces (static or mobile) after first consulting women and girls for their interest and consent for this type of activity.
In addition to a full assessment of risks, it is crucial to also allow enough time for women and girls to absorb new technology. This includes a thorough user acceptance testing process and discussions about security of data and security of device use.
When introducing ICT tools, in all contexts, obstacles, barriers, and interest of women and girls in accessing and using technology should be prioritized and should guide any intervention approach. Barriers can be common; however, their severity can vary from one context to another. For example, in some contexts, device costs are prohibitive and the primary barrier to use. In other contexts, devices may be obtained, but low literacy levels prevent their safe and effective use. The crucial component is to put women and girls at the center of the intervention; listening to women and girls, their needs, opinions, preferences, interest, and obstacles is essential for every tailored intervention with women and girls rather than assuming that humanitarian actors know their needs.
Integrating ICTs within GBV programming can inform programming and facilitate the access of the most vulnerable women and girls to information and resources. ICTs can be integrated into the needs assessments that usually identify focused and non-focused psychosocial needs. If women and girls do not identify technology literacy, the service provider can share that this is an option to be included in the safe space activities and open the space for women and girls to decide whether they would like to have these sessions or not. After several weeks of non-focused psychosocial sessions (to build trust), service providers can call for an advanced ICT assessment where they assess the actual access of women and girls to technology, pace, needs, interests, safe ways of using technology, associated risks of violence using technology, previous good experiences using technology, and new ICT tools to explore. As a regular practice, service providers can also integrate questions on ICT risks and cyber violence in GBV risk assessments.
Know the wireless broadband network coverage and quality
Technical requirements must meet network coverage and device model ownership, or service providers must resolve these barriers through the introduction of remote Wi-Fi hotspots or device and credit distribution. For example, in Lebanon, 3G Internet is unreliable in border areas, so disseminating information over Internet-based platforms would not be inclusive of these population groups as compared to those in more urban areas such as Beirut. In the former settings, gaps in wireless networks would have to be assessed and the challenge addressed.
When considering offering devices or credit, the same risk mitigation strategies should be considered as with material or cash assistance, which can potentially heighten women and girls’ vulnerability to violence as a result of benefiting from the acquisition. Distribution should be explored on a case-by-case basis. Or alternatively, offering access to Wi-Fi in safe spaces when available and ensuring women and girls have the basic skills to use phones and access the Internet should be considered. In advance of this type of implementation, it is crucial to conduct participatory assessments with women and girls and monitor usage for increased risks.
Available and preferred platforms and usage
Targeting the introduction of ICTs toward channels that the target population is already familiar with will aid in uptake. High familiarity and preference for texting-based apps such as WhatsApp or Skype are examples of highly preferred platforms. For this, it is crucial to have discussions and consultations with women and girls about their access to phones and preferred content or communication channels.
ICT solutions for the GBV sector, GBV survivors, and safe spaces
ICT opportunities for service providers in the gender-based violence sector
In sites where engagement with female beneficiaries is deemed too risky, organizations can still use ICTs with their staff. Even with the most conservative outlook on safety in ICT deployment, mobile technology can still be utilized for casework staff engagement, continued skill building, and assessment. This can take the form of access to content through mobile applications such as a pocket guide to psychological first aid or guidelines on mainstreaming or communication or attitude skills. This can be a useful resource, consumable offline, and convenient to access when needed. There may be increased likelihood of guidance uptake if it is easy to access and written and formatted in an easy-to-find fashion.
Mobile data collection in case management
Safely and ethically managing case and incident records is a core part of work in the field of protection or gender-based violence response programming. Adequate and appropriate data storage ensures due diligence in the responsibility to the survivor to protect their confidentiality. Because of security concerns, lack of adequate storage options, or a desire to be more environmentally conscious, many programs may be considering a shift to paperless programming. This requires the proper allocation of resources, commitment for the continual use of mobile data collection, sustainable resources, and continuous assessment of adequate data collection and data storage.
The desire to reduce paper in the case management process has many benefits. For instance, it lessens the need for storage and physical protection of file cabinets freeing up office space and makes case files more readily reviewable by supervisors, especially in a remote management or mobile service delivery settings. Paper-light or paperless offices can also improve problems with loss or misplacement of physical paper records, reduce time spent handling paper records, facilitate the sharing of data, improve data quality through facilitated review, and ease retrieval of needed information.
However, these benefits need to be weighed against perceptions of confidentiality and the survivor-centered approach to care. Respondents had mixed levels of comfort about speaking to a caseworker who is using a tablet during a case management meeting for data collection. Less than half would approve of this outright, nearly half would approve if the caseworker explained the use of the device, and 19% would disapprove even if explained. For the latter, respondents provided feedback that their experience of comfort in speaking with the caseworker would lessen with the device being a barrier to the dynamics of their relationship. Additionally, a lack of understanding and confidence of what is being documented (even if explained) affected their level of comfort with mobile devices being present. Most respondents who answered positively to this question added that they would approve because they know the caseworker and trust them. This highlights the need for strong and solid trust with communities before considering the use of mobile technology for data collection with survivors of gender-based violence.
For other forms of service provision unrelated to case management or reports of gender-based violence, there is likely a higher acceptance rate for the presence of mobile technology for data collection. However, given the setting of the survey, in the women’s center, the understanding of case management was likely associated with reporting gender-based violence, a highly sensitive topic with higher standards for privacy, confidentiality, and higher risks for data loss or unauthorized access.
ICT opportunities and resources for survivors of gender-based violence
Phones and other mobile devices represent an opportunity for service providers to connect with beneficiaries to increase their access to information and offer resources and assistance. However, device usage and the information stored on devices come with risks to safety and privacy. This needs to be the central element of consideration before developing or implementing any ICT tool with women and girls. In addition, the name of the organization and the information should be accurate and informative. Often, women and girls can receive wrong information from fake accounts.
ICT tools can be used in programming with women and girls for a variety of purposes. If an application or website is targeting female survivors of gender-based violence, they can offer information or awareness raising, screening tools, or safety aids. Before implementation, it is important to consider, through consultation with women and girls in the setting, if potential or actual perpetrators have access to the device (which can be assumed), if they are monitoring activity, if the name or icon or external information about the application or website displays any information that could be harmful (e.g., GBV survivor app would be harmful), if the application asks for identifying information or location sharing, or if the communication methods offered are safe (Technology Safety 2014b). Because screening applications likely ask about details of the violence, it is important that this information is non-identifying, protected, not externally or easily known content, and easily removable. After screening, follow-up with women and girls is essential to make sure they have ongoing safe access to smart phones and Internet, as the perpetrator can start accessing devices halfway through the use, for instance.
Applications or other ICT tools can also be used for safety purposes. This could include safety decision aids or emergency communication. With these aids, it is crucial to consider perpetrator monitoring, thorough testing of the product or tool, and to continue to promote in-person assistance. Applications and ICT tools can assist with the process but should not be used in place of counseling assistance available in-person or remotely as they cannot compensate for the human factor in face-to-face counseling. I-Decide is one example of a safety aid tool that has a quick escape “exit” button that takes the person to a weather page, if they think someone is monitoring their use. However, considering Internet speed and challenges, it is more challenging to have this kind of app and adaptation function appropriately in humanitarian settings. Testing is, therefore, essential.
Wi-Fi access, library phones, or information stewards
To promote usage and access to phones and the Internet, one option to overcome the barrier or prohibitive cost for device or credit is by providing temporary or limited access to phones and the Internet. This can be done through two models that each warrants further investigation. One option is to provide a Wi-Fi-enabled safe setting. In this model, an organization provides free Wi-Fi access for beneficiaries who bring their own device. This would likely be a draw for beneficiaries and would need to be balanced against community assumptions about activity that could introduce additional harm to women and girls.
A second option is a library or “checking out” model or through information stewards that provide devices with connectivity for a limited time period or while in the provider office. Alternatively, community mobilizers or focal points could be deployed to safe spaces or safe community gathering locations to distribute reliable information and safe spaces or service options (di Giovanni 2013).
In addition, and to promote usage and access to phones and the Internet, technology literacy sessions can be conducted in the safe spaces where women and girls are equipped with skills to use phones in a comfortable way. It is of importance to ask women and girls if this is something they are interested in, they would like to do, and that they feel safe doing.
Assumptions about how phones or the Internet will be accessed that could create additional harm. For instance, community members who perceive that access to Wi-Fi or library phones is checked out to facilitate conversations between women and girls and male community members for romantic purposes could put beneficiaries or staff in additional harm. An assessment before implementing this service would need to be conducted as well as consistent messaging to the community on the purpose and scope of Wi-Fi access and the use of library phones or information stewards throughout implementation. For this model to function and avoid increasing the potential for harm, focus group and community discussions with women and girls should inform the decision to implement and the approach for implementation, utilizing the assessment to determine interest, readiness, and risk factors.