safety

Deprivation, Distance and Connectivity: The Adaptation of Mobile Phone Use To A Life in Wesbank, A Post-Apartheid Township in South Africa

Posted by EKStallings on May 01, 2012
Deprivation, Distance and Connectivity: The Adaptation of Mobile Phone Use To A Life in Wesbank, A Post-Apartheid Township in South Africa data sheet 191 Views
Author: 
Velghe, Fie
Publication Date: 
Oct 2011
Publication Type: 
Report/White paper
Abstract: 

The high uptake of mobile phones in the developing world has instigated studies on the impact of the use of Information and Communication Technologies (ICTs) on poverty reduction programs and other programs that would benefit the poorest and most excluded sections of the global population. It has created new hopes as to how mobile phones would be able to close the so-called global digital gap that exists between the developed and the developing world and transform the fortunes of the poor. As ICTs are always embedded in social and economic realities and practices which deeply influence, define, and restrict people's mobile phone use, one should however be cautious in transporting and applying findings and studies focusing on the created opportunities of mobile phone use from one continent, country or even society to another.

This article focuses on mobile phone use of middle-aged women, living in Wesbank, a post-apartheid township in Cape Town. By highlighting the main characteristics of the community (poverty, unemployment, crime, multilingualism and migration) we discuss the influences of these characteristics of 'a life in Wesbank' on mobile phone use. Although the adoption of amobile phone creates diverse opportunities with regards to connectivity, safety and re-imagination of the self, poverty proved to put a major constraint on the full use of the potentials.

Featured?: 
No

Working Towards a Deeper Understanding of Digital Safety for Children and Young People in Developing Nations

Posted by EKStallings on Dec 19, 2011
Working Towards a Deeper Understanding of Digital Safety for Children and Young People in Developing Nations data sheet 1323 Views
Author: 
Gasser, Urs, Colin Maclay, John Palfre
Publication Date: 
Jun 2010
Publication Type: 
Report/White paper
Abstract: 

This exploratory study is a first output of an ongoing collaboration between the Berkman Center for Internet & Society at Harvard University and UNICEF. It is intended as a contribution towards building a deeper understanding of children’s safety in a digital context in developing nations.

More specifically, the objectives of the paper are threefold: First (and foremost), it seeks to raise awareness about issues related to digital safety for youth in developing nations. Second, it aims to provide a tentative map of these issues and give insights into the current state of the respective research based on an exploratory literature review. Third, the paper seeks to outline the contours of a research framework through a series of working hypotheses that might inform subsequent research efforts on these issues by connecting efforts in developing and industrialized nations.

Featured?: 
No

A Guide to Mobile Security Risk Assessment

Posted by SaferMobile on Jun 10, 2011
A Guide to Mobile Security Risk Assessment data sheet 6087 Views
Author: 
SaferMobile
Abstract: 

You are an activist, rights defender, or journalist. You use a mobile device. And you work in sometimes risky situations in your country. This guide will help you implement mobile security practices in your work. It will help you assess the particular risks that face you and then assist you in developing a plan to mitigate those risks.

Location

safetyicon

You are an activist, rights defender, or journalist. You use a mobile device. And you work in sometimes risky situations in your country.

This guide will help you implement mobile security practices in your work. It will help you assess the particular risks that face you and then assist you in developing a plan to mitigate those risks. First, we'll cover some of basic concepts. Then, in the second part of this guide, we'll take you through developing your own risk assessment in 5 steps.

We have previously published a Mobile Risk Primer that describes general security vulnerabilities associated with mobile technology and communication. Read it!

Throughout this guide, we'll also highlight the fictitious case of Asima, a blogger and activist in Egypt. Examples of how Asima might complete the assessment worksheet and create a security plan for her work are highlighted in this guide.

Asima lives in Cairo, Egypt and is a blogger and an activist. She used to maintain a blog on Blogspot, but now mostly uses Facebook and Twitter to follow current events, to share information, and to communicate with colleagues. She tweets from her mobile phone while in traffic and at cafes and protests and from her computer when she is at work or at home.