This is an excerpt from a blog post that originally appeared on New Security Beat.
The past three years – and more pointedly the past 12 months – have laid witness to monumental, if not heartbreaking, incidents of gender-based violence. The gang rape of a 23-year-old woman in New Delhi last December; the gang rape of a 16-year-old girl left for dead in a pit latrine in Western Kenya last June; the mass sexual assault of women in Tahrir Square during the 2011 revolution in Egypt and since; all were high profile atrocities that ignited outrage around the world.
Photo credit: Adek Berry / AFP
In the aftermath of each of these, mobile technology solutions and internet-based advocacy campaigns surged. It’s almost like clockwork: violence happens, a technology response follows. And 2013 has seen an explosion of new efforts.
This isn’t by coincidence. These web- and mobile-based technological retorts, from applications that make it easy to report and view information about attacks to “panic buttons,” are made possible by the mobile revolution and increased internet adoption, which bring stories of gender-based violence to more people than ever before and give us the ability to fulfill our visceral need to react, to do something, to drive change.
Much has been written about the power mobile phones wield for interacting with people from every corner of the world, at a magnitude never before experienced and perhaps even imagined. Mobile handsets are on pace to surpass the global population sometime in the next few months. Quite simply, the mobile phone is the single most common denominator for sharing information and for connecting individuals at scale.
When it comes to gender-based violence, this mobile explosion has particularly great potential. Mobile phones offer a level of autonomy and emancipation never before enjoyed by many women, leading to greater empowerment for those who possess them. And they give voice to victims, survivors, and bystanders, permitting healthy dialogue around what is sometimes an extremely taboo subject.
From Mapping Attacks to Safety Circles
One of the most immediate ways that NGOs and other organizations are helping women avoid danger is through new mobile applications. Most follow a similar format; they offer users multiple options for alerting family and friends in times of danger via SMS (“short message service,” or texting), automated phone calls, e-mail, and/or social media platforms, like Facebook. They use online forms for submitting reports, pinpointing locations of attacks, and uploading photographic evidence where feasible and appropriate. They enable GPS functionality to aggregate and map real-time locations of violence. And many of them employ the free and open source visualization and information collection platform, Ushahidi.
SafeCity India is a leading example. Its 1,600 reports, collected in under a year, have helped identify hotspots and “no go” zones around Mumbai and Delhi. “Panic button” and self-populated smartphone apps Circle of 6 and FightBack have also seen mass appeal in the country. India is clearly a front-runner in the adoption of these applications, speaking both to its tech savviness and unfortunate widespread need for such tools.
HarassMap also rises to the top, designed as a means of reversing the tide of pervasive sexual harassment of women in Egypt. Through SMS, online and e-mail reporting, its efforts center around the visualization of crowd-sourced maps showing areas for women to avoid and, in theory, for authorities to increase security measures. HarassMap has since expanded to 8 other countries, with another 11 in the works. Similar crowd-mapping has also been employed by the Open Institute in Cambodia and by Women Under Siege in Syria.
The magnitude of incidents over the past year has also sparked an uptick in sponsored, domestic violence-themed competitions and “hackathons,” in Nepal, Central America, and the United States. The winning entrants each possessed many of the same features discussed above, though they are tailored to local geographies, demographics, and conditions.
These mobile- and internet-based tools are but a mere sampling. Yet they beg the question, have we hit a critical mass? Yes and no.
To continue, please see the full blog post at New Security Beat.
Christopher Burns is the senior advisor and team lead for mobile access in the Office of Innovation and Development Alliances/Mobile Solutions at the U.S. Agency for International Development.