SlideShare una empresa de Scribd logo
1 de 27
Descargar para leer sin conexión
Talking About Violence	
• Violence against women is increasing	
•  Rape and attempt to rape in the fiscal year B.S. 2069/70
reached 922	
•  WOREC reported 198 cases of Violence Against Women
in Shrawan, 2070. Domestic violence was the highest
reported case	
• Recent cases	
•  Sita Rai	
•  Rape of minors, by family members
Talking About Violence    	
According	
  to	
  the	
  Demographic	
  Health	
  Survey	
  of	
  2011:	
  
• Sexual Violence:	
  
•  85% of women aged between 15-49 years, who have
experienced sexual violence have never told anyone	
•  8% have told someone	
•  7% have sought help	
	
• Physical Violence: 	
•  66% of women aged between 15-49 years have never
told anyone	
•  12% have told someone	
•  22% have sought help
Responding to Violence
Against Women	
• More than 2300 organizations working to end Violence
Against Women	
• Limited coordination and communication	
• Consequences	
•  Victim has to repeat their traumatic experience
several times	
•  Holistic support is not easily available as
organizations focus on a particular area	
•  Information asymmetry: organizations that could
support a case sometimes may not know the latest
updates about a case
Understanding Violence
Against Women	
• Paucity of data and information on violence against women	
• Strong evidence on the extent of the problem, the causes and
the consequences is difficult to obtain	
• News on VAW compiled by a few organizations	
• Many sad stories on VAW, but few on the survivors succeed to
reclaim their lives
Technology and Violence
Against Women	
• What	
  role	
  can	
  informa=on	
  communica=ons	
  
technology	
  (ICT)	
  play	
  in	
  addressing	
  some	
  of	
  
challenges	
  faced	
  by	
  vic=ms	
  and	
  others	
  who	
  
work	
  to	
  end	
  VAW?	
  
• Why	
  ICT?	
  
– As	
  of	
  June	
  2013,	
  mobile	
  penetra=on	
  has	
  reached	
  
70%	
  and	
  25%	
  of	
  Nepal’s	
  popula=on	
  have	
  access	
  to	
  
the	
  Internet.
– These	
  numbers	
  will	
  only	
  grow	
  
df}gtf tf]8f}F
Fight VAW	
An initiative to use accessible 	
Information and Communication Technologies 	
in fighting	
Violence against Women in Nepal	
www.fightvaw.org
Components of FightVAW	
Registering of Complaints / Problems	
through telephone
Components of FightVAW	
Registering of 	
Complaints / Problems	
through mobile sms
•  Informed your closed ones for 	
	
immediate support through 	
	
smart phone application	
•  Report problems/through the 	
	
application rather than SMS 	
	
or voice call	
Android based
Smart Phone Application
Components of FightVAW
What after complaints / 	
Problems are registered ?	
•  Complaints accessed and transcribed by dedicated
CSO representatives working in the field of VAW
•  Individual cases followed-up for the benefit of the victim
•  Tracking of cases and follow-ups carried out for each
individual cases
Some more components of 	
Fight VAW
Some more components of 	
Fight VAW
Some more components of 	
Fight VAW	
Organizations in Action
What do we aim to achieve ?	
Fight	
  VAW	
  as	
  An	
  Integrated	
  plaSorm	
  to:
•  Provide	
  an	
  alterna've  means	
  to	
  report	
  experiences	
  of	
  violence	
  through	
  	
  
	
  a	
  24-­‐hour	
  help	
  line	
  and	
  SMS
•  Increase	
  the	
  speed  at  which  a  vic'ms  gets  support	
  from	
  CSOs
•  Enhance	
  coordina'on  and  collabora'on	
  among	
  different	
  CSOs	
  working	
  	
  
	
  to	
  support	
  the	
  vic=m
•  Compile	
  informa'on  on  CSOs	
  working	
  all	
  across	
  Nepal	
  on	
  VAW	
  and	
  	
  
	
  make	
  it	
  available	
  in	
  one	
  plaSorm
•  Monitor	
  the	
  media	
  for  latest  news  and  updates	
  on	
  VAW	
  and	
  make	
  it	
  	
  
	
  available	
  in	
  one	
  plaSorm	
  and	
  build	
  the	
  ini=al	
  infrastructure	
  necessary	
  	
  
	
  to	
  compile	
  data	
  on	
  VAW	
  in	
  one	
  central	
  loca=on
The Actors
How Did it Come About?	
• Hackathon	
• World Bank’ commitment to support the ideas generated by
the youth from the IT sector and the civil society
VAW Hackathon – June 16, 2013
VAW Hackathon Snapshot	
100 + Participants	
18 Teams
3 Winners
Self Help - 3rd Winner	
•  Mobile Application that can send SMS to police, pre-
selected trusted network about the location of victims in
case of the incident of violence. 	
•  Anyone can report about VAW to selected organizations
using the app	
Team Members
Kabindra Shakya
Nhasala Joshi
Kipendra Kushi
Anish Parajuli,
Binisha Shrestha
Mero Katha (My Story) – 	
2nd Winner 	
Collect, share and discuss stories that inspire people to
report cases of VAW using both online platform and
offline community.	
Team Members	
Yukti Lal Marik	
Wolf Price	
Jayanti Mala Chapagain 	
Olin Thakur	
Inge Patsch
Your Voice Our Support – 	
1st Winner	
•  Voice Recording of complaints through the use of mobile
phones and landline phones
•  CSO network to access them and take necessary action
Team Members	
	
Susan Joshi 	
	
Namita Pradhan, 	
	
Sundar Man Vaidya
What does FightVAW means to 	
us at the moment ?	
A pilot design to use innovative use of home grown ICTs to 	
address the use of Violence Against Women	
	
An opportunity explore collaboration and coordination among 	
different stakeholders
What are we doing next ?	
• Implement the pilot program till June, 2014 together with our
collaborators and partners on selected locations	
• Monitor and document early impact stories	
	
• Fine-tuning of the system based on feedback received during
the pilot implemntation
Our vision for the long run	
•  Create ownership of the system among different stakeholders	
•  Figure out a mechanism to sustain the system with active 	
	
Government engagement and ownership	
•  Make a case for Nepal in fighting the issues of VAW using 	
	
ICTs at a global level
df}gtf tf]8f}F
Thank You !	
	
www.fightvaw.org

Más contenido relacionado

Destacado

Software quality and mobile apps
Software quality and mobile appsSoftware quality and mobile apps
Software quality and mobile appsPrawesh Shrestha
 
Business plan and presentation iii - financials and risk
Business plan and presentation   iii - financials and riskBusiness plan and presentation   iii - financials and risk
Business plan and presentation iii - financials and riskPrawesh Shrestha
 
Leveraging Corporate Community Partnerships For Women’S Programs
Leveraging Corporate Community Partnerships For Women’S ProgramsLeveraging Corporate Community Partnerships For Women’S Programs
Leveraging Corporate Community Partnerships For Women’S Programsdennispbutler
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)eSAT Journals
 
4xN Winning Entry Avon Global App Challenge
4xN Winning Entry Avon Global App Challenge 4xN Winning Entry Avon Global App Challenge
4xN Winning Entry Avon Global App Challenge eekatpants
 
Creating Change in a Digital World
Creating Change in a Digital WorldCreating Change in a Digital World
Creating Change in a Digital WorldMarnie Webb
 
FixIt: A Public Utility App
FixIt: A Public Utility AppFixIt: A Public Utility App
FixIt: A Public Utility AppJinwai Goh
 
Revoda: Mobile Election App for Nigeria 2011 Elections
Revoda: Mobile Election App for Nigeria 2011 ElectionsRevoda: Mobile Election App for Nigeria 2011 Elections
Revoda: Mobile Election App for Nigeria 2011 ElectionsEmeka Okoye
 
Domestic violence: Through the Eyes of a Survivor
Domestic violence: Through the Eyes of a SurvivorDomestic violence: Through the Eyes of a Survivor
Domestic violence: Through the Eyes of a SurvivorCassie Walker
 
2013 Umeng Insight Report
2013 Umeng Insight Report2013 Umeng Insight Report
2013 Umeng Insight ReportUmeng
 
Partners in Technology (PiT) - Department of Communities, Child Safety and Di...
Partners in Technology (PiT) - Department of Communities, Child Safety and Di...Partners in Technology (PiT) - Department of Communities, Child Safety and Di...
Partners in Technology (PiT) - Department of Communities, Child Safety and Di...Digital Queensland
 

Destacado (15)

Software quality and mobile apps
Software quality and mobile appsSoftware quality and mobile apps
Software quality and mobile apps
 
M billionth 2012 concept
M billionth 2012 conceptM billionth 2012 concept
M billionth 2012 concept
 
Business plan and presentation iii - financials and risk
Business plan and presentation   iii - financials and riskBusiness plan and presentation   iii - financials and risk
Business plan and presentation iii - financials and risk
 
Leveraging Corporate Community Partnerships For Women’S Programs
Leveraging Corporate Community Partnerships For Women’S ProgramsLeveraging Corporate Community Partnerships For Women’S Programs
Leveraging Corporate Community Partnerships For Women’S Programs
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
 
4xN Winning Entry Avon Global App Challenge
4xN Winning Entry Avon Global App Challenge 4xN Winning Entry Avon Global App Challenge
4xN Winning Entry Avon Global App Challenge
 
Creating Change in a Digital World
Creating Change in a Digital WorldCreating Change in a Digital World
Creating Change in a Digital World
 
SafeNight | Developing a Mobile App from Idea to Launch
SafeNight | Developing a Mobile App from Idea to LaunchSafeNight | Developing a Mobile App from Idea to Launch
SafeNight | Developing a Mobile App from Idea to Launch
 
Raasta
RaastaRaasta
Raasta
 
FixIt: A Public Utility App
FixIt: A Public Utility AppFixIt: A Public Utility App
FixIt: A Public Utility App
 
Revoda: Mobile Election App for Nigeria 2011 Elections
Revoda: Mobile Election App for Nigeria 2011 ElectionsRevoda: Mobile Election App for Nigeria 2011 Elections
Revoda: Mobile Election App for Nigeria 2011 Elections
 
Safe Night Overview
Safe Night OverviewSafe Night Overview
Safe Night Overview
 
Domestic violence: Through the Eyes of a Survivor
Domestic violence: Through the Eyes of a SurvivorDomestic violence: Through the Eyes of a Survivor
Domestic violence: Through the Eyes of a Survivor
 
2013 Umeng Insight Report
2013 Umeng Insight Report2013 Umeng Insight Report
2013 Umeng Insight Report
 
Partners in Technology (PiT) - Department of Communities, Child Safety and Di...
Partners in Technology (PiT) - Department of Communities, Child Safety and Di...Partners in Technology (PiT) - Department of Communities, Child Safety and Di...
Partners in Technology (PiT) - Department of Communities, Child Safety and Di...
 

Similar a Presentation: Follow up on hackathon - FightVAW

VSO webinar: Addressing social exclusion and gender inequality in Zimbabwe
VSO webinar: Addressing social exclusion and gender inequality in ZimbabweVSO webinar: Addressing social exclusion and gender inequality in Zimbabwe
VSO webinar: Addressing social exclusion and gender inequality in ZimbabweJane Dustan
 
Lambeth violence against women and girls customer insight project
Lambeth violence against women and girls customer insight projectLambeth violence against women and girls customer insight project
Lambeth violence against women and girls customer insight projectlocalinsight
 
presentation_shailja_a_preventive_approch_towards_crime_against_women_1481180...
presentation_shailja_a_preventive_approch_towards_crime_against_women_1481180...presentation_shailja_a_preventive_approch_towards_crime_against_women_1481180...
presentation_shailja_a_preventive_approch_towards_crime_against_women_1481180...SudeshnaThandar
 
16 days presentation ppt about violence campaign
16 days presentation ppt about violence campaign16 days presentation ppt about violence campaign
16 days presentation ppt about violence campaignDrmariaDana
 
Addressing gender violence in traditional rural communities
Addressing gender violence in traditional rural communitiesAddressing gender violence in traditional rural communities
Addressing gender violence in traditional rural communitieslizc38
 
Use of mobile phones for advocacy campaigns
Use of mobile  phones for advocacy campaignsUse of mobile  phones for advocacy campaigns
Use of mobile phones for advocacy campaignsChristiana Charles-Iyoha
 
Violence Against Women Presentation.pdf
Violence Against Women Presentation.pdfViolence Against Women Presentation.pdf
Violence Against Women Presentation.pdfSudeshnaThandar
 
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraeParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraVictor van R
 
Mobile vaani media consumer profile
Mobile vaani media consumer profileMobile vaani media consumer profile
Mobile vaani media consumer profileAshish Tandon
 
Mobile Messaging for Organizing
Mobile Messaging for OrganizingMobile Messaging for Organizing
Mobile Messaging for OrganizingNAACP
 
The LifeLine GBV Program in rural areas of Kwazulunatal South Africa, Sinikiw...
The LifeLine GBV Program in rural areas of Kwazulunatal South Africa, Sinikiw...The LifeLine GBV Program in rural areas of Kwazulunatal South Africa, Sinikiw...
The LifeLine GBV Program in rural areas of Kwazulunatal South Africa, Sinikiw...terre des hommes schweiz
 
Shining Stars De-Vio Pitch Presentation Zimbabwe
Shining Stars De-Vio Pitch Presentation Zimbabwe Shining Stars De-Vio Pitch Presentation Zimbabwe
Shining Stars De-Vio Pitch Presentation Zimbabwe Sandiswe Oka-Bhule
 

Similar a Presentation: Follow up on hackathon - FightVAW (20)

Seagulls
SeagullsSeagulls
Seagulls
 
VSO webinar: Addressing social exclusion and gender inequality in Zimbabwe
VSO webinar: Addressing social exclusion and gender inequality in ZimbabweVSO webinar: Addressing social exclusion and gender inequality in Zimbabwe
VSO webinar: Addressing social exclusion and gender inequality in Zimbabwe
 
Utkrasht
UtkrashtUtkrasht
Utkrasht
 
B3 jade holvey
B3   jade holveyB3   jade holvey
B3 jade holvey
 
Lambeth violence against women and girls customer insight project
Lambeth violence against women and girls customer insight projectLambeth violence against women and girls customer insight project
Lambeth violence against women and girls customer insight project
 
presentation_shailja_a_preventive_approch_towards_crime_against_women_1481180...
presentation_shailja_a_preventive_approch_towards_crime_against_women_1481180...presentation_shailja_a_preventive_approch_towards_crime_against_women_1481180...
presentation_shailja_a_preventive_approch_towards_crime_against_women_1481180...
 
WomEmpow
WomEmpowWomEmpow
WomEmpow
 
Women right-nooria-ahmadi-af sig-2017-nitpaa
Women right-nooria-ahmadi-af sig-2017-nitpaaWomen right-nooria-ahmadi-af sig-2017-nitpaa
Women right-nooria-ahmadi-af sig-2017-nitpaa
 
16 days presentation ppt about violence campaign
16 days presentation ppt about violence campaign16 days presentation ppt about violence campaign
16 days presentation ppt about violence campaign
 
Addressing gender violence in traditional rural communities
Addressing gender violence in traditional rural communitiesAddressing gender violence in traditional rural communities
Addressing gender violence in traditional rural communities
 
Accord
AccordAccord
Accord
 
Use of mobile phones for advocacy campaigns
Use of mobile  phones for advocacy campaignsUse of mobile  phones for advocacy campaigns
Use of mobile phones for advocacy campaigns
 
05
0505
05
 
Violence Against Women Presentation.pdf
Violence Against Women Presentation.pdfViolence Against Women Presentation.pdf
Violence Against Women Presentation.pdf
 
Newsletter enr.1_ENG
Newsletter enr.1_ENGNewsletter enr.1_ENG
Newsletter enr.1_ENG
 
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraeParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
 
Mobile vaani media consumer profile
Mobile vaani media consumer profileMobile vaani media consumer profile
Mobile vaani media consumer profile
 
Mobile Messaging for Organizing
Mobile Messaging for OrganizingMobile Messaging for Organizing
Mobile Messaging for Organizing
 
The LifeLine GBV Program in rural areas of Kwazulunatal South Africa, Sinikiw...
The LifeLine GBV Program in rural areas of Kwazulunatal South Africa, Sinikiw...The LifeLine GBV Program in rural areas of Kwazulunatal South Africa, Sinikiw...
The LifeLine GBV Program in rural areas of Kwazulunatal South Africa, Sinikiw...
 
Shining Stars De-Vio Pitch Presentation Zimbabwe
Shining Stars De-Vio Pitch Presentation Zimbabwe Shining Stars De-Vio Pitch Presentation Zimbabwe
Shining Stars De-Vio Pitch Presentation Zimbabwe
 

Más de Prawesh Shrestha

Business plan and presentation ii - marketing and operations
Business plan and presentation   ii - marketing and operationsBusiness plan and presentation   ii - marketing and operations
Business plan and presentation ii - marketing and operationsPrawesh Shrestha
 
Business plan and presentation i - concept-growth-risk
Business plan and presentation   i - concept-growth-riskBusiness plan and presentation   i - concept-growth-risk
Business plan and presentation i - concept-growth-riskPrawesh Shrestha
 
Technology Entrepreneurship - Making Business Sense
Technology Entrepreneurship - Making Business SenseTechnology Entrepreneurship - Making Business Sense
Technology Entrepreneurship - Making Business SensePrawesh Shrestha
 
Pivot Nepal - Presentation
Pivot Nepal - PresentationPivot Nepal - Presentation
Pivot Nepal - PresentationPrawesh Shrestha
 
Swktm gdg presentation v1.0
Swktm gdg presentation v1.0Swktm gdg presentation v1.0
Swktm gdg presentation v1.0Prawesh Shrestha
 
I os 101:basic training rajan
I os 101:basic training   rajanI os 101:basic training   rajan
I os 101:basic training rajanPrawesh Shrestha
 
GSMA mWomen design challenge 2012
GSMA mWomen design challenge 2012GSMA mWomen design challenge 2012
GSMA mWomen design challenge 2012Prawesh Shrestha
 
Introduction to fragments in android
Introduction to fragments in androidIntroduction to fragments in android
Introduction to fragments in androidPrawesh Shrestha
 
N locate - market perspective
N locate - market perspectiveN locate - market perspective
N locate - market perspectivePrawesh Shrestha
 
Android trainingforbeginners
Android trainingforbeginnersAndroid trainingforbeginners
Android trainingforbeginnersPrawesh Shrestha
 
Scooba talk about your apps - vol 2
Scooba   talk about your apps - vol 2Scooba   talk about your apps - vol 2
Scooba talk about your apps - vol 2Prawesh Shrestha
 
Cross platform mobile development titanium appcelerator
Cross platform mobile development   titanium appceleratorCross platform mobile development   titanium appcelerator
Cross platform mobile development titanium appceleratorPrawesh Shrestha
 
SMS Based Applications: Behind the scene
SMS Based Applications: Behind the sceneSMS Based Applications: Behind the scene
SMS Based Applications: Behind the scenePrawesh Shrestha
 

Más de Prawesh Shrestha (19)

Business plan and presentation ii - marketing and operations
Business plan and presentation   ii - marketing and operationsBusiness plan and presentation   ii - marketing and operations
Business plan and presentation ii - marketing and operations
 
Business plan and presentation i - concept-growth-risk
Business plan and presentation   i - concept-growth-riskBusiness plan and presentation   i - concept-growth-risk
Business plan and presentation i - concept-growth-risk
 
Technology Entrepreneurship - Making Business Sense
Technology Entrepreneurship - Making Business SenseTechnology Entrepreneurship - Making Business Sense
Technology Entrepreneurship - Making Business Sense
 
Pivot Nepal - Presentation
Pivot Nepal - PresentationPivot Nepal - Presentation
Pivot Nepal - Presentation
 
Swktm gdg presentation v1.0
Swktm gdg presentation v1.0Swktm gdg presentation v1.0
Swktm gdg presentation v1.0
 
I os 101:basic training rajan
I os 101:basic training   rajanI os 101:basic training   rajan
I os 101:basic training rajan
 
GSMA mWomen design challenge 2012
GSMA mWomen design challenge 2012GSMA mWomen design challenge 2012
GSMA mWomen design challenge 2012
 
Introduction to fragments in android
Introduction to fragments in androidIntroduction to fragments in android
Introduction to fragments in android
 
Design patterns
Design patternsDesign patterns
Design patterns
 
N locate - market perspective
N locate - market perspectiveN locate - market perspective
N locate - market perspective
 
Nepal load shedding apps
Nepal load shedding appsNepal load shedding apps
Nepal load shedding apps
 
Introduction to android
Introduction to androidIntroduction to android
Introduction to android
 
Ncell's scheme
Ncell's schemeNcell's scheme
Ncell's scheme
 
Android trainingforbeginners
Android trainingforbeginnersAndroid trainingforbeginners
Android trainingforbeginners
 
Scooba talk about your apps - vol 2
Scooba   talk about your apps - vol 2Scooba   talk about your apps - vol 2
Scooba talk about your apps - vol 2
 
Mvc - Titanium
Mvc - TitaniumMvc - Titanium
Mvc - Titanium
 
Cross platform mobile development titanium appcelerator
Cross platform mobile development   titanium appceleratorCross platform mobile development   titanium appcelerator
Cross platform mobile development titanium appcelerator
 
SMS Based Applications: Behind the scene
SMS Based Applications: Behind the sceneSMS Based Applications: Behind the scene
SMS Based Applications: Behind the scene
 
Listbingo
ListbingoListbingo
Listbingo
 

Último

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 

Último (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 

Presentation: Follow up on hackathon - FightVAW

  • 1.
  • 2. Talking About Violence • Violence against women is increasing •  Rape and attempt to rape in the fiscal year B.S. 2069/70 reached 922 •  WOREC reported 198 cases of Violence Against Women in Shrawan, 2070. Domestic violence was the highest reported case • Recent cases •  Sita Rai •  Rape of minors, by family members
  • 3. Talking About Violence    According  to  the  Demographic  Health  Survey  of  2011:   • Sexual Violence:   •  85% of women aged between 15-49 years, who have experienced sexual violence have never told anyone •  8% have told someone •  7% have sought help • Physical Violence: •  66% of women aged between 15-49 years have never told anyone •  12% have told someone •  22% have sought help
  • 4. Responding to Violence Against Women • More than 2300 organizations working to end Violence Against Women • Limited coordination and communication • Consequences •  Victim has to repeat their traumatic experience several times •  Holistic support is not easily available as organizations focus on a particular area •  Information asymmetry: organizations that could support a case sometimes may not know the latest updates about a case
  • 5. Understanding Violence Against Women • Paucity of data and information on violence against women • Strong evidence on the extent of the problem, the causes and the consequences is difficult to obtain • News on VAW compiled by a few organizations • Many sad stories on VAW, but few on the survivors succeed to reclaim their lives
  • 6. Technology and Violence Against Women • What  role  can  informa=on  communica=ons   technology  (ICT)  play  in  addressing  some  of   challenges  faced  by  vic=ms  and  others  who   work  to  end  VAW?   • Why  ICT?   – As  of  June  2013,  mobile  penetra=on  has  reached   70%  and  25%  of  Nepal’s  popula=on  have  access  to   the  Internet. – These  numbers  will  only  grow  
  • 8. Fight VAW An initiative to use accessible Information and Communication Technologies in fighting Violence against Women in Nepal www.fightvaw.org
  • 9. Components of FightVAW Registering of Complaints / Problems through telephone
  • 10. Components of FightVAW Registering of Complaints / Problems through mobile sms
  • 11. •  Informed your closed ones for immediate support through smart phone application •  Report problems/through the application rather than SMS or voice call Android based Smart Phone Application Components of FightVAW
  • 12. What after complaints / Problems are registered ? •  Complaints accessed and transcribed by dedicated CSO representatives working in the field of VAW •  Individual cases followed-up for the benefit of the victim •  Tracking of cases and follow-ups carried out for each individual cases
  • 13. Some more components of Fight VAW
  • 14. Some more components of Fight VAW
  • 15. Some more components of Fight VAW Organizations in Action
  • 16. What do we aim to achieve ? Fight  VAW  as  An  Integrated  plaSorm  to: •  Provide  an  alterna've  means  to  report  experiences  of  violence  through      a  24-­‐hour  help  line  and  SMS •  Increase  the  speed  at  which  a  vic'ms  gets  support  from  CSOs •  Enhance  coordina'on  and  collabora'on  among  different  CSOs  working      to  support  the  vic=m •  Compile  informa'on  on  CSOs  working  all  across  Nepal  on  VAW  and      make  it  available  in  one  plaSorm •  Monitor  the  media  for  latest  news  and  updates  on  VAW  and  make  it      available  in  one  plaSorm  and  build  the  ini=al  infrastructure  necessary      to  compile  data  on  VAW  in  one  central  loca=on
  • 18. How Did it Come About? • Hackathon • World Bank’ commitment to support the ideas generated by the youth from the IT sector and the civil society
  • 19. VAW Hackathon – June 16, 2013
  • 20. VAW Hackathon Snapshot 100 + Participants 18 Teams 3 Winners
  • 21. Self Help - 3rd Winner •  Mobile Application that can send SMS to police, pre- selected trusted network about the location of victims in case of the incident of violence. •  Anyone can report about VAW to selected organizations using the app Team Members Kabindra Shakya Nhasala Joshi Kipendra Kushi Anish Parajuli, Binisha Shrestha
  • 22. Mero Katha (My Story) – 2nd Winner Collect, share and discuss stories that inspire people to report cases of VAW using both online platform and offline community. Team Members Yukti Lal Marik Wolf Price Jayanti Mala Chapagain Olin Thakur Inge Patsch
  • 23. Your Voice Our Support – 1st Winner •  Voice Recording of complaints through the use of mobile phones and landline phones •  CSO network to access them and take necessary action Team Members Susan Joshi Namita Pradhan, Sundar Man Vaidya
  • 24. What does FightVAW means to us at the moment ? A pilot design to use innovative use of home grown ICTs to address the use of Violence Against Women An opportunity explore collaboration and coordination among different stakeholders
  • 25. What are we doing next ? • Implement the pilot program till June, 2014 together with our collaborators and partners on selected locations • Monitor and document early impact stories • Fine-tuning of the system based on feedback received during the pilot implemntation
  • 26. Our vision for the long run •  Create ownership of the system among different stakeholders •  Figure out a mechanism to sustain the system with active Government engagement and ownership •  Make a case for Nepal in fighting the issues of VAW using ICTs at a global level
  • 27. df}gtf tf]8f}F Thank You ! www.fightvaw.org