12.03.2016 Views

CYBER VIOLENCE AGAINST WOMEN AND GIRLS

cyber_violence_gender%20report

cyber_violence_gender%20report

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6<br />

CONCLUSIONS<br />

<strong>AND</strong> PRINCIPLES<br />

FOR FURTHER ACTION<br />

We are faced with two priorities that require immediate<br />

attention: eliminating cyber abuse and violence against<br />

women and reproduction online of offline harmful gender<br />

based practices; and the use of technology to combat<br />

multiple forms of violence against women and as vehicles<br />

for systemic change. As this framework suggests, the<br />

solutions are multi-dimensional in nature. In sum, the<br />

following considerations underpin and guide further<br />

action:<br />

• Solutions can be found in innovative ICT<br />

technologies, the media and gaming industry,<br />

content creators and disseminators, users of the<br />

Internet, policy makers, and the regulators in the<br />

absence of ‘the industry’ able and/or willing to<br />

self-regulate. Efforts to ensure that governance<br />

structures, strategies, investments, the tech sector<br />

(public and private), access, and skill development<br />

are inclusive and gender responsive are requisites.<br />

• Solutions can also be found through a mix of<br />

programs, projects and laws that bring about<br />

increased sensitivity toward the need to change<br />

social norms and behaviours. Included in<br />

this mix are ‘hard’ safeguards as defined and<br />

implemented by stakeholders to brace/support/<br />

facilitate an Internet that is VAWG-safe. Should<br />

this mix still not bring about the needed change,<br />

sanctions and enforced compliance with newly<br />

crafted regulations, laws and conventions will be<br />

necessary.<br />

Online diligence, monitoring and reporting against violence<br />

and related crimes is everyone’s business but responsible<br />

leadership roles must be played by:<br />

• Telecoms and search engines, the indispensable<br />

backbone bringing the content to users, have a<br />

particular role and responsibility to protect the<br />

47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!