Feeds:
Posts
Comments

Archive for the ‘children’ Category

Our December 2015 Technology Salon discussion in NYC focused on approaches to girls’ digital privacy, safety and security. By extension, the discussion included ways to reduce risk for other vulnerable populations. Our lead discussants were Ximena BenaventeGirl Effect Mobile (GEM) and Jonathan McKay, Praekelt Foundation. I also shared a draft Girls’ Digital Privacy, Safety and Security Policy and Toolkit I’ve been working on with both organizations over the past year.

Girls’ digital privacy, safety and security risks

Our first discussant highlighted why it’s important to think specifically about girls and digital security. In part, this is because different factors and vulnerabilities combine, exacerbating girls’ levels of risk. For example, girls living on less than $2 per day likely only have access to basic mobile phones, which are often borrowed from parents or siblings. The organization she works with always starts with deep research on aspects like ownership vs. borrowship and whether girls’ mobile usage is free/unlimited and un-supervised or controlled by gatekeepers such as parents, brothers, or other relatives. This helps to design better tools, services and platforms and to design for safety and security, she said. “Gatekeepers are very restrictive in many cases, but parental oversight is not necessarily a bad thing. We always work with parents and other gatekeepers as well as with girls themselves when we design and test.” When girls are living in more traditional or conservative societies, she said, we also need to think about how content might affect girls both online and offline. For example, “is content sufficiently progressive in terms of girls’ rights, yet safe for girls to read, comment on or discuss with friends and family without severe retaliation?”

Research suggests that girls who are more vulnerable offline (due to poverty or other forms of marginalization), are likely also more vulnerable to certain risks online, so we design with that in mind, she said. “When we started off on this project, our team members were experts in digital, but we had less experience with the safety and privacy aspects when it comes to girls living under $2/day or who were otherwise vulnerable. “Having additional guidance and developing a policy on this aspect has helped immensely – but has also slowed our processes down and sometimes made them more expensive,” she noted. “We had to go back to everything and add additional layers of security to make it as safe as possible for girls. We have also made sure to work very closely with our local partners to be sure that everyone involved in the project is aware of girls’ safety and security.”

Social media sites: Open, Closed, Private, Anonymous?

One issue that came up was safety for children and youth on social media networks. A Salon participant said his organization had thought about developing this type of a network several years back but decided in the end that the security risks outweighed the advantages. Participants discussed whether social media networks can ever be safe. One school of thought is that the more open a platform, the safer it is, as “there is no interaction in private spaces that cannot be constantly monitored or moderated.” Some worry about open sites, however, and set up smaller, closed, private groups that were closely monitored. “We work with victims of violence to share their stories and coping mechanisms, so, for us, private groups are a better option.”

Some suggested that anonymity on a social media site can protect girls and other vulnerable groups, however there is also research showing that Internet anonymity contributes to an increase in activities such as bullying and harassment. Some Salon participants felt that it was better to leverage existing platforms and try to use them safely. Others felt that there are no existing social media platforms that have enough security for girls or other vulnerable groups to use with appropriate levels of risk. “We sometimes recruit participants via existing social media platforms,” said one discussant, “but we move people off of those sites to our own more secure sites as soon as we can.”

Moderation and education on safety

Salon participants working with vulnerable populations said that they moderate their sites very closely and remove comments if users share personal information or use offensive language. “Some project budgets allow us to have a moderator check every 2 hours. For others, we sweep accounts once a day and remove offensive content within 24 hours.” One discussant uses moderation to educate the community. “We always post an explanation about why a comment was removed in order to educate the larger user base about appropriate ways to use the social network,” he said.

Close moderation becomes difficult and costly, however, as the user base grows and a platform scales. This means individual comments cannot be screened and pre-approved, because that would take too long and defeat the purpose of an engaging platform. “We need to acknowledge the very real tension between building a successful and engaging community and maintaining privacy and security,” said one Salon participant. “The more you lock it down and the more secure it is, the harder you find it is to create a real and active community.”

Another participant noted that they use their safe, closed youth platform to educate and reinforce messaging about what is safe and positive use of social media in hopes that young people will practice safe behaviors when they use other platforms. “We know that education and awareness raising can only go so far, however,” she said, “and we are not blind to that fact.” She expressed concern about risk for youth who speak out about political issues, because more and more governments are passing laws that punish critics and censor information. The organization, however, does not want to encourage youth to stop voicing opinions or participating politically.

Data breaches and project close-out

One Salon participant asked if organizations had examples of actual data breaches, and how they had handled them. Though no one shared examples, it was recommended that every organization have a contingency plan in place for accidental data leaks or a data breach or data hack. “You need to assume that you will get hacked,” said one person, “and develop your systems with that as a given.”

In addition to the day-to-day security issues, we need to think about project close-out, said one person. “Most development interventions are funded for a short, specific period of time. When a project finishes, you get a report, you do your M&E, and you move on. However, the data lives on, and the effects of the data live on. We really need to think more about budgeting for proper project wind-down and ensure that we are accountable beyond the lifetime of a project.”

Data security, anonymization, consent

Another question was related to using and keeping girls’ (and others’) data safe. “Consent to collect and use data on a website or via a mobile platform can be tricky, especially if we don’t know how to explain what we might do with the data,” said one Salon participant. Others suggested it would be better not to collect any data at all. “Why do we even need to collect this data? Who is it for?” he asked. Others countered that this data is often the only way to understand what people are doing on the site, to make adjustments and to measure impact.

One scenario was shared where several partner organizations discussed opening up a country’s cell phone data records to help contain a massive public health epidemic, but the privacy and security risks were too great, so the idea was scrapped. “Some said we could anonymize the data, but you can never really and truly anonymize data. It would have been useful to have a policy or a rubric that would have guided us in making that decision.”

Policy and Guidelines on Girls Privacy, Security and Safety

Policy guidelines related to aspects such as responsible data for NGOs, data security, privacy and other aspects of digital security in general do exist. (Here are some that we compiled along with some other resources). Most IT departments also have strict guidelines when it comes to donor data (in the case of credit card and account information, for example). This does not always cross over to program-level ICT or M&E efforts that involve the populations that NGOs are serving through their programming.

General awareness around digital security is increasing, in part due to recent major corporate data hacks (e.g., Target, Sony) and the Edward Snowden revelations from a few years back, but much more needs to be done to educate NGO staff and management on the type of privacy and security measures that need to be taken to protect the data and mitigate risk for those who participate in their programs.  There is an argument that NGOs should have specific digital privacy, safety and security policies that are tailored to their programming and that specifically focus on the types of digital risks that girls, women, children or other vulnerable people face when they are involved in humanitarian or development programs.

One such policy (focusing on vulnerable girls) and toolkit (its accompanying principles and values, guidelines, checklists and a risk matrix template); was shared at the Salon. (Disclosure: – This policy toolkit is one that I am working on. It should be ready to share in early 2016). The policy and toolkit take program implementers through a series of issues and questions to help them assess potential risks and tradeoffs in a particular context, and to document decisions and improve accountability. The toolkit covers:

  1. data privacy and security –using approaches like Privacy by Design, setting limits on the data that is collected, achieving meaningful consent.
  2. platform content and design –ensuring that content produced for girls or that girls produce or volunteer is not putting girls at risk.
  3. partnerships –vetting and managing partners who may be providing online/offline services or who may partner on an initiative and want access to data, monetizing of girls’ data.
  4. monitoring, evaluation, research and learning (MERL) – how will program implementers gather and store digital data when they are collecting it directly or through third parties for organizational MERL purposes.

Privacy, Security and Safety Implications

Our final discussant spoke about the implications of implementing the above-mentioned girls’ privacy, safety and security policy. He started out saying that the policy starts off with a manifesto: We will not compromise a girl in any way, nor will we opt for solutions that cut corners in terms of cost, process or time at the expense of her safety. “I love having this as part of our project manifesto, he said. “It’s really inspiring! On the flip side, however, it makes everything I do more difficult, time consuming and expensive!”

To demonstrate some of the trade-offs and decisions required when working with vulnerable girls, he gave examples of how the current project (implemented with girls’ privacy and security as a core principle) differed from that of a commercial social media platform and advertising campaign he had previously worked on (where the main concern was the reputation of the corporation, not that of the users of the platform and the potential risks they might put themselves in by using the platform).

Moderation

On the private sector platform, said the discussant, “we didn’t have the option of pre-moderating comments because of the budget and because we had 800 thousand users. To meet the campaign goals, it was more important for users to be engaged than to ensure content was safe. We focused on removing pornographic photos within 24 hours, using algorithms based on how much skin tone was in the photo.” In the fields of marketing and social media, it’s a fairly well-known issue that heavy-handed moderation kills platform engagement. “The more we educated and informed users about comment moderation, or removed comments, the deader the community became. The more draconian the moderation, the lower the engagement.”

The discussant had also worked on a platform for youth to discuss and learn about sexual health and practices, where he said that users responded angrily to moderators and comments that restricted their participation. “We did expose our participants to certain dangers, but we also knew that social digital platforms are more successful when they provide their users with sense of ownership and control. So we identified users that exhibited desirable behaviors and created a different tier of users who could take ownership (super users) to police and flag comments as inappropriate or temporarily banned users.” This allowed a 25% decrease in moderation. The organization discovered, however, that they had to be careful about how much power these super users had. “They ended up creating certain factions on the platform, and we then had to develop safeguards and additional mechanisms by which we moderated our super users!”

Direct Messages among users

In the private sector project example, engagement was measured by the number of direct or private messages sent between platform users. In the current scenario, however, said the discussant, “we have not allowed any direct messages between platform users because of the potential risks to girls of having places on the site that are hidden from moderators. So as you can see, we are removing some of our metrics by disallowing features because of risk. These activities are all things that would make the platform more engaging but there is a big fear that they could put girls at risk.”

Adopting a privacy, security, and safety policy

One discussant highlighted the importance of having privacy, safety and security policies before a project or program begins. “If you start thinking about it later on, you may have to go back and rebuild things from scratch because your security holes are in the design….” The way a database is set up to capture user data can make it difficult to query in the future or for users to have any control of what information is or is not being shared about them. “If you don’t set up the database with security and privacy in mind from the beginning, it might be impossible to make the platform safe for girls without starting from scratch all over again,” he said.

He also cautioned that when making more secure choices from the start, platform and tool development generally takes longer and costs more. It can be harder to budget because designers may not have experience with costing and developing the more secure options.

“A valuable lesson is that you have to make sure that what you’re trying to do in the first place is worth it if it’s going to be that expensive. It is worth a girls’ while to use a platform if she first has to wade through a 5-page terms and conditions on a small mobile phone screen? Are those terms and conditions even relevant to her personally or within her local context? Every click you ask a user to make will reduce their interest in reaching the platform. And if we don’t imagine that a girl will want to click through 5 screens of terms and conditions, the whole effort might not be worth it.” Clearly, aspects such as terms and conditions and consent processes need to be designed specifically to fit new contexts and new kinds of users.

Making responsible tradeoffs

The Girls Privacy, Security and Safety policy and toolkit shared at the Salon includes a risk matrix where project implementers rank the intensity and probability of risks as high, medium and low. Based on how a situation, feature or other potential aspect is ranked and the possibility to mitigate serious risks, decisions are made to proceed or not. There will always be areas with a certain level of risk to the user. The key is in making decisions and trade-offs that balance the level of risk with the potential benefits or rewards of the tool, service, or platform. The toolkit can also help project designers to imagine potential unintended consequences and mitigate risk related to them. The policy also offers a way to systematically and pro-actively consider potential risks, decide how to handle them, and document decisions so that organizations and project implementers are accountable to girls, peers and partners, and organizational leadership.

“We’ve started to change how we talk about user data in our organization,” said one discussant. “We have stopped thinking about it as something WE create and own, but more as something GIRLS own. Banks don’t own people’s money – they borrow it for a short time. We are trying to think about data that way in the conversations we’re having about data, funding, business models, proposals and partnerships. You don’t get to own your users’ data, we’re not going to share de-anonymized data with you. We’re seeing legislative data in some of the countries we work that are going that way also, so it’s good to be thinking about this now and getting prepared”

Take a look at our list of resources on the topic and add anything we may have missed!

 

Thanks to our friends at ThoughtWorks for hosting this Salon! If you’d like to join discussions like this one, sign up at Technology SalonSalons are held under Chatham House Rule, therefore no attribution has been made in this post.

Read Full Post »

Migration is central to the current political debate as well as to the development discussion, especially in conversations about the “post 2015” agenda, the ‘youth bulge’, and youth employment. Prevention work is not likely to end migration, regardless of the organizations and governments working to improve the well-being of children and youth in their home communities. In fact, improved economic capacity may actually enhance people’s capacity to migrate.

Our Technology Salon on January 16, 2014, discussed the role of ICTs in child and youth migration, ways ICTs are influencing migration, how ICTs could make migration safer and more productive, and ideas for mobile applications that would be useful for child and youth migrants. We welcomed Ravi Karkara, United Nations Inter-agency Network on Youth Development; Lucas Codognolla, Lead Coordinator, Connecticut Students for a DREAM; and Michael Boampong, Migration and Development Consultant, UNDP, as our lead discussants.

Some areas on where and how ICTs are playing or could play a role:

  • Sending money / remittances / mobile money. Costs to transfer money need to be reduced. Some studies have shown that the African diaspora pays up to 20% for money transfers. More needs to be done to extend mobile money services, especially in rural areas.
  • Finding a job. Many youth use ICTs from the very start of the migration process to look for work. They may also use ICTs to find work in their home countries if they return.
  • Getting a visa to migrate legally. Most legal immigration processes require making appointments with Embassies via the Internet and the ability to communicate via email.
  • Identifying migration routes. Often, youth who migrate irregularly investigate routes online before their departure. GPS can also help during transit. One program in Mexico is developing a “safe migration map” that provides crowd-sourced, near real-time information to migrants on which areas are experiencing high crime or other dangers so that they can migrate more safely.
  • Reporting abuse. Child help lines are expanding their services across many countries and providing support, advice and help to children in case of emergency or abuse, including during migration. Many help lines are experimenting with text messaging.
  • Connecting with other youth in similar situations.  Youth who have an irregular migration status are able to find others in the same circumstances and feel less alone. They can also connect with peers and organizations who can provide support, help and advice.
  • Keeping in touch with parents/family. ICT are useful for children and youth keep families informed of how they are doing, and to ask for support and help. The African Movement for Working Children and Youth works with telecoms operators to provide a free number to children and youth who migrate in West Africa. Parents and children can remain in touch that way while children are moving from one town to the next.
  • Sharing information on migration rights. Organizations like Connecticut Students for a DREAM use ICTs and social media to reach out to youth who have an irregular migration status to provide support and to engage them in organized advocacy activities. The organization encourages sharing of stories and a safe space to discuss migration difficulties. The “Pocket DACA” application helps young migrants understand the deferred action law and apply for it.
  • Engaging, organizing, and influencing government. Youth in the US are organizing via Facebook and other social media platforms. In some cases, government officials have reached out to these groups for advice on legislation.

Participants pointed out that:

Children/youth are not always victims. Often the discourse around children’s movement/migration is centered on trafficking, protection and vulnerability rather than rights, power and choices. More needs to be done to empower children and youth and to provide opportunities and participation avenues. At the same time, more needs to be done to create opportunities at home so that children and youth do not feel like their home situation is hopeless and that migration is the only option.

Children and youth are not a homogeneous population. When thinking about ICTs and children/youth, it’s important to know the context and design programs that are relevant to specific children and young people. Age, wealth, sex, literacy and other aspects need to be considered so that ICT applications are useful. Both traditional communication and ICTs need to be used depending on the population.

ICTs can widen generation gaps. In some cases, ICTs increase the communication divide among generations. Older people may feel that youth are working in a medium that they are not skilled at using, and that youth are not considering their input and advice. This can create conflict and reduce levels of support that might otherwise be provided from community leaders, elders and government officials.

The role of the State needs more thought. Often irregular migration happens because legal channels are difficult to navigate or they are prohibitive. The role of ICTs in influencing or facilitating legal migration needs more thought, as does the potential role of ICTs in advocating for change. The State may not always be friendly to migration, however, so the topic is controversial. States may also use ICTs for surveillance of youth or migrating populations, especially in places where there is political or ethnic conflict, so ICTs may put people in extreme danger.

Risks need to be considered. There are serious risks associated with using ICTs in general, and especially with vulnerable populations. These include everything from online grooming and risks of being lured into trafficking or sex work, to scamming sites that take advantage of youth, to political aspects such as surveillance and targeting of certain populations of youth by the State or other armed groups. ICTs could be a way to help break conspiracies of silence and to report and speak out about human rights abuses, but care needs to be taken that people are not put at risk when they do so.

ICTs need to fit local contexts. Rural areas are less connected and so other forms of information and communication are often more common. Both online and offline means need to be used when working with children and youth. In addition, different social media tools and platforms are used in different places. For example, though the end of Facebook is heralded by some in the US, because youth are reportedly fleeing as older people join the site, Facebook is taking off in Latin America, where many organizations use it for engaging youth and helping them to organize and get informed about their rights.

Not much is known about children, youth, ICTs and migration.  The area of child migration is relatively weak in terms of research. The upcoming World Youth Report centers on child and youth migration and has been a highly controversial process. Migration needs to be considered from an evolving age perspective, with focus on aspects that impact on children, adolescents and youth differentially. A gender perspective needs to be included. There is also a difference between children and youth who migrate for employment and those who move due to conflict or who are seeking asylum, and deeper knowledge is needed in all of these different areas.

Recommendations for future efforts included:

  • More youth voice and support for youth movements in the area of migration
  • More involvement of youth in the debate/dialogue on migration and ICTs
  • Micro-grants for youth who want to work on migration initiatives, including those that use ICTs
  • More nuanced research and understanding of the role of ICTs in child and youth migration with specific lenses on age, sex, ethnicity, and other factors

Resources on ICTs and child/youth migration:

Salons are held under Chatham House Rule, therefore no attribution has been made in this post. Many thanks to our lead discussants and to ThoughtWorks for hosting and providing breakfast.

If you’d like to attend future Salons, sign up here!

Read Full Post »

Screen Shot 2013-11-23 at 6.14.40 PM

Migration has been a part of the human experience since the dawn of time, and populations have always moved in search of resources and better conditions. Today, unaccompanied children and youth are an integral part of national and global migration patterns, often leaving their place of origin due to violence, conflict, abuse, or other rights violations, or simply to seek better opportunities for themselves.

It is estimated that 33 million (or some 16 percent) of the total migrant population today is younger than age 
20. Child and adolescent migrants make up a significant proportion of the total population of migrants in Africa (28 percent), Asia (21 percent), Oceania (11 percent), Europe (11 percent), and the Americas (10 percent).

The issue of migration is central to the current political debate as well as to the development discussion, especially in conversations about the “post 2015” agenda. Though many organizations are working to improve children’s well-being in their home communities, prevention work with children and youth is not likely to end migration. Civil society organizations, together with children and youth, government, community members, and other stakeholders can help make migration safer and more productive for those young people who do end up on the move.

As the debate around migration rages, access to and use of ICTs is expanding exponentially around the globe. For this reason Plan International USA and the Oak Foundation felt it was an opportune time to take stock of the ways that ICTs are being used in the child and youth migration process.

Our new report, “Modern Mobility: the role of ICTs in child and youth migration” takes a look at:

  • how children and youth are using ICTs to prepare for migration; to guide and facilitate their journey; to keep in touch with families; to connect with opportunities for support and work; and to cope with integration, forced repatriation or continued movement; and
  • how civil society organizations are using ICTs to facilitate and manage their work; to support children and youth on the move; and to communicate and advocate for the rights of child and youth migrants.

In the Modern Mobility paper, we identify and provide examples of three core ways that child and youth migrants are using new ICTs during the different phases of the migration process:

  1. for communicating and connecting with families and friends
  2. for accessing information
  3. for accessing services

We then outline seven areas where we found CSOs are using ICTs in their work with child and youth migrants, and we offer some examples:

Ways that CSOs are using ICTs in their work with child and youth migrants.

Ways that CSOs are using ICTs in their work with child and youth migrants.

Though we were able to identify some major trends in how children and youth themselves use ICTs and how organizations are experimenting with ICTs in programming, we found little information on the impact that ICTs and ICT-enabled programs and services have on migrating children and youth, whether positive or negative. Most CSO practitioners that we talked with said that they had very little awareness of how other organizations or initiatives similar to their own were using ICTs. Most also said they did not know where to find orientation or guidance on good practice in the use of ICTs in child-centered programming, ICTs in protection work (aside from protecting children from online risks), or use of ICTs in work with children and young people at various stages of migration. Most CSO practitioners we spoke with were interested in learning more, sharing experiences, and improving their capacities to use ICTs in their work.

Based on Plan Finland’s “ICT-Enabled Development Guide” (authored by Hannah Beardon), the Modern Mobility report provides CSOs with a checklist to support thinking around the strategic use of ICTs in general.

ICT-enabled development checklist developed by Hannah Beardon for Plan International.

ICT-enabled development checklist developed by Hannah Beardon for Plan International.

We also offer a list of key considerations for practitioners who wish to incorporate new technologies into their work, including core questions to ask about access, age, capacity, conflict, connectivity, cost, disability, economic status, electricity, existing information ecosystems, gender, information literacy, language, literacy, power, protection, privacy, sustainability, and user-involvement.

Our recommendation for taking this area forward is to develop greater awareness and capacity among CSOs regarding the potential uses and risks of ICTs in work with children and youth on the move by:

  1. Establishing an active community of practice on ICTs and children and youth on the move.
  2. Mapping and sharing existing projects and programs.
  3. Creating a guide or toolbox on good practice for ICTs in work with children and youth on the move.
  4. Further providing guidance on how ICTs can help “normal” programs to reach out to and include children and youth on the move.
  5. Further documentation and development of an evidence base.
  6. Sharing and distributing this report for discussion and action.

Download the Modern Mobility report here.

We’d love comments and feedback, and information about examples or documentation/evidence that we did not come across while writing the report!

Read Full Post »

At the November 8th Technology Salon in New York City, we looked at the role of ICTs in communication for development (C4D) initiatives with marginalized adolescent girls. Lead discussants Kerida McDonald and Katarzyna Pawelczyk discussed recent UNICEF reports related to the topic, and John Zoltner spoke about FHI360’s C4D work in practice.

To begin, it was pointed out that C4D is not donor communications or marketing. It is the use of communication approaches and methodologies to achieve influence at various levels —  e.g., family, institutional and policy —  to change behavior and social norms. C4D is one approach that is being used to address the root causes of gender inequality and exclusion.

Screen Shot 2013-10-11 at 7.24.48 AMAs the UNICEF report on ICTs and C4D* notes, girls may face a number of situations that contribute to and/or are caused by their marginalization: early pregnancy, female genital cutting, early marriage, high rates of HIV/AIDS, low levels of education, lack of control over resources. ICTs alone cannot resolve these, because there is a deep and broad set of root causes. However, ICTs can be integrated systematically into the set of C4D tools and approaches that contribute to positive change.

Issues like bandwidth, censorship and electricity need to be considered when integrating ICTs into C4D work, and approaches that fit the context need to be developed. Practitioners should use tools that are in the hands of girls and their communities now, yet be aware of advances in access and new technologies, as these change rapidly.

Key points:

Interactivity is more empowering than one-way messaging:  Many of the ICT solutions being promoted today focus on sending messages out via mobile phones. However C4D approaches aim for interactivity and multi-channel, multi-directional communication, which has proven more empowering.

Content: Traditional media normally goes through a rigorous editorial process and it is possible to infuse it with a gender balance. Social media does not have the same type of filters, and it can easily be used to reinforce stereotypes about girls. This is something to watch and be aware of.

Purpose: It’s common with ICT-related approaches to start with the technology rather than starting with the goals. As one Salon participant asked “What are the results we want to see for ourselves? What are the results that girls want to see? What are the root causes of discrimination and how are we trying to address them? What does success look like for girls? For organizations? Is there a role for ICTs in helping achieve success? If so, what is it?” These questions need to be the starting point, rather than the technology.

Participation: One Salon participant mentioned a 2-year project that is working together with girls to define their needs and their vision of success. The process is one co-design, and it is aimed at understanding what girls want. Many girls expressed a feeling of isolation and desire for connection, and so the project is looking at how ICTs can help them connect. As the process developed, the diversity of needs became very clear and plans have changed dramatically based on input from a range of girls from different contexts. Implementors need to be prepared to change, adapt and respond to what girls say they want and to local realities.

****

Screen Shot 2013-11-23 at 10.41.22 PMA second study commissioned by UNICEF explores how young people use social media. The researchers encountered some challenges in terms of a strong gender approach for the study. Though a gender lens was used for analysis, there is little available data disaggregated by sex. The study does not focus on the most marginalized, because it looks at the use of social media, which normally requires a data connection or Internet access, which the most marginalized youth usually do not have.

The authors of the report found that youth most commonly used the Internet and social media for socializing and communicating with friends. Youth connected less often for schoolwork. One reason for this may be that in the countries/contexts where the research took place, there is no real integration of ICTs into the school system. It was emphasized that the  findings in the report are not comparable or nationally representative, and blanket statements such as “this means x for the whole developing world” should be avoided.

Key points:

Self-reporting biases. Boys tend to have higher levels of confidence and self-report greater ICT proficiency than girls do. This may skew results and make it seem that boys have higher skill levels.

Do girls really have less access? We often hear that girls have less access than boys. The evidence gathered for this particular report found that “yes and no.” In some places, when researchers asked “Do you have access to a mobile,” there was not a huge difference between urban and rural or between boys and girls. When they dug deeper, however, it became more complex. In the case of Zambia, access and ownership were similar for boys and girls, but fewer girls were connecting at all to the Internet as compared to boys. Understanding connectivity and use was quite complicated.

What are girls vs. boys doing online? This is an important factor when thinking about what solutions are applicable to which situation(s). Differences came up here in the study. In Argentina, girls were doing certain activities more frequently, such as chatting and looking for information, but they were not gaming. In Zambia, girls were doing some things less often than boys; for example, fewer girls than boys were looking for health information, although the number was still significant. A notable finding was that both girls and boys were accessing general health information more often than they were accessing sensitive information, such as sexual health or mental health.

What are the risks in the online world? A qualitative portion of the study in Kenya used focus groups with girls and boys, and asked about their uses of social media and experience of risk. Many out-of-school girls aged 15-17 reported that they used social media as a way to meet a potential partner to help them out of their financial situation. They reported riskier behavior, contact with older men, and relationships more often than girls who were in school. Girls in general were more likely to report unpleasant online encounters than boys, for example, request for self-exposure photos.

Hiding social media use. Most of the young people that researchers spoke with in Kenya were hiding social media use from their parents, who disapproved of it. This is an important point to note in C4D efforts that plan on using social media, and program designers will want to take parental attitudes about different media and communication channels into consideration as they design C4D programs.

****

When implementing programs, it is noteworthy how boys and girls tend to use ICT and media tools. Gender issues often manifest themselves right away. “The boys grab the cameras, the boys sit down first at the computers.” If practitioners don’t create special rules and a safe space for girls to participate, girls may be marginalized. In practical ICT and media work, it’s common for boys and girls to take on certain roles. “Some girls like to go on camera, but more often they tend to facilitate what is being done rather than star in it.” The gender gap in ICT access and use, where it exists, is a reflection of the power gaps of society in general.

In the most rural areas, even when people have access, they usually don’t have the resources and skills to use ICTs.  Very simple challenges can affect girls’ ability to participate in projects, for example, oftentimes a project will hold training at times when it’s difficult for girls to attend. Unless someone systematically goes through and applies a gender lens to a program, organizations often don’t notice the challenges girls may face in participating. It’s not enough to do gender training or measure gender once a year; gendered approaches needs to be built into program design.

Long-terms interventions are needed if the goal is to emancipate girls, help them learn better, graduate, postpone pregnancy, and get a job. This cannot be done in a year with a simple project that has only one focus, because girls are dealing with education, healthcare, and a whole series of very entrenched social issues. What’s needed is to follow a cohort of girls and to provide information and support across all these sectors over the long-term.

Key points:

Engaging boys and men: Negative reactions from men are a concern if and when girls and women start to feel more empowered or to access resources. For example, some mobile money and cash transfer programs direct funds to girls and women, and some studies have found that violence against women increases when women start to have more money and more freedom. Another study, however, of a small-scale effort that provides unconditional cash transfers to girls ages 18-19 in rural Kenya, is demonstrating just the opposite: girls have been able to say where money is spent and the gender dynamics have improved. This raises the question of whether program methodologies need to be oriented towards engaging boys and men and involving them in changing gender dynamics, and whether engaging boys and men can help avoid an increase in violence. Working with boys to become “girl champions” was cited as a way to help to bring boys into the process as advocates and role models.

Girls as producers, not just consumers. ICTs are not only tools for sending content to girls. Some programs are working to help girls produce content and create digital stories in their own languages. Sometimes these stories are used to advocate to decision makers for change in favor of girls and their agendas. Digital stories are being used as part of research processes and to support monitoring, evaluation and accountability work through ‘real-time’ data.

ICTs and social accountability. Digital tools are helping young people address accountability issues and inform local and national development processes. In some cases, youth are able to use simple, narrow bandwidth tools to keep up to date on actions of government officials or to respond to surveys to voice their priorities. Online tools can also lead to offline, face-to-face engagement. One issue, however, is that in some countries, youth are able to establish communication with national government ministers (because there is national-level capacity and infrastructure) but at local level there is very little chance or capability for engagement with elected officials, who are unprepared to respond and engage with youth or via social media. Youth therefore tend to bypass local government and communicate with national government. There is a need for capacity building at local level and decentralized policies and practices so that response capacity is strengthened.

Do ICTs marginalize girls? Some Salon participants worried that as conversations and information increasingly move to a digital environment, ICTs are magnifying the information and communication divide and further marginalizing some girls. Others felt that the fact that we are able to reach the majority of the world’s population now is very significant, and the inability to reach absolutely everyone doesn’t mean we should stop using ICTs. For this very reason – because sharing of information is increasingly digital – we should continue working to get more girls online and strengthen their confidence and abilities to use ICTs.

Many thanks to UNICEF for hosting the Salon!

(Salons operate under Chatham House Rule, thus no attribution has been given in the above summary. Sign up here if you’d like to attend Salons in the future!)

*Disclosure: I co-authored this report with Keshet Bachan.

Read Full Post »

Screen Shot 2013-10-11 at 7.24.48 AMA paper that Keshet Bachan and I authored for Unicef is now available for your reading pleasure!

Here’s a  summary of what we talk about in the paper:

Social, cultural, economic and political traditions and systems that prevent girls, especially the most marginalized, from fully achieving their rights present a formidable challenge to development organizations. The integration of new Information and Communication Technologies (ICTs) to the Communication for Development (C4D) toolbox offers an additional means for challenging unequal power relations and increasing participation of marginalized girls in social
transformation.

We examine ways that ICTs can strengthen C4D programming by:

  • enhancing girls’ connections, engagement and agency;
  • helping girls access knowledge; and
  • supporting improved governance and service delivery efforts.

We reflect and build on the views of adolescent girls from 13 developing countries who participated in a unique discussion for this paper, and we then provide recommendations to support the integration of ICTs in C4D work with marginalized adolescent girls, including:

  • Girls as active participants in program design. Practitioners should understand local context and ensure that programs use communication channels that are accessible to girls. This will often require multi-channel and multiple platform approaches that reach more marginalized girls who may not have access to or use of ICTs. Programs should be community driven, and real-time feedback from girls should be incorporated to adjust programs to their needs and preferences. Mentoring is a key component of programming with girls, and holistic programs designed together with girls tend towards being more successful.
  • Privacy and protection. Every program should conduct a thorough risk analysis of proposed approaches to ensure that girls are not placed at risk by participating, sharing and consuming information, or publicly holding others to account. Girls should also be supported to make their own informed choices about their online presence and use of ICT devices and platforms. A broader set of stakeholders should be engaged and influenced to help mitigate systemic and structural risks to girls.
  • Research and documentation. The evidence base for use of ICTs in C4D programming with marginalized adolescent girls is quite scarce. Better documentation would improve understanding of what programs are the most effective, and what the real added value of ICTs are in these efforts.
  • Capacity building. Because the integration of ICTs into C4D work is a relatively new area that lacks a consistent methodological framework, organizations should support a comprehensive training process for staff to cover areas such as program design, effective use of new ICT tools in combination with existing tools and methods, and close attention to privacy and risk mitigation.
  • Policy. Programs should use free and open source software. In addition, child protection policies, measures and guidelines should be updated to reflect changes in technology, platforms and information sharing.

The paper was first shared at the 12th Inter-Agency Roundtable on Communication for Development in November 2011. It was then reviewed and updated in August 2012, and released in August 2013 under the title “Integrating Information and Communication Technologies into Communication for Development Strategies to Support and Empower Marginalized Adolescent Girls.”

Download it here!

Read Full Post »

Screen Shot 2013-07-14 at 2.40.51 PMLast week, 600 exceptional youth activists from 80 countries arrived to New York City for a UN Takeover, where they called for urgent action by member states to meet Millennium Development Goal 2 on education by 2015. The youth’s inputs will feed into setting the agenda for global education priorities post-2015. One of the highlights of the week was this inspiring talk by Malala Yousafzai, who made her first public address to the UN on June 12th, her 16th birthday.

Seven of the youth participating in the UN Takeover with the support of Plan joined us as lead discussants for our July 10th Technology Salon. Agung, Dina, and Nurul from Indonesia; Kamanda and Fatmata from Sierra Leone; Tova from Sweden; and Frank from Uganda told us about ICT access and use in their communities and countries. We also heard about their work as youth activists on issues of child marriage, school violence, good governance, and education, and whether ICTs are effective outreach tools for campaigning in their contexts.

The realities of access

In both Sierra Leone and Uganda Internet access is quite difficult. Traveling to Internet cafés in urban areas is too expensive for rural youth to do regularly, and it is unsafe for young women to travel in the evenings. There is not enough equipment in schools and universities, and youth have trouble affording and finding regular access. The majority of primary and secondary schools do not have ICTs, and non-governmental organizations are unable to reach everyone with their programs to supply equipment and training. Although there are often funds given to governments to build computer labs, these tend to benefit urban areas. In some cases projects and funds are used for political gain and personal favors. Even at university level, student access might be limited to 1-2 hours per week at a computer lab, meaning they end up doing almost everything on paper.

Lack of ICT access impacts on job prospects for youth, because jobs exist but employers are seeking people who know how to operate a computer. Many of these job applications have to be submitted online. This puts jobs out of reach of youth in rural areas. Basic infrastructure remains a problem in rural areas. Although telecommunication lines have been laid, electricity for charging mobile phones is still a problem and often electricity is dependent on a solar panel or a generator, making it difficult to run a computer lab or Telecenter.

ICTs are heightening the development divide, noted one Salon participant. In schools near urban areas, parents pay more in tuition and school fees and their children have better ICT access than rural children. This creates inequality. “Students going to these schools have access and they will even study computer science. But when you go to a rural village you might only see one small room where children can access a computer, if anything at all. Teachers themselves don’t know how to use computers.” In cities, parents know ICTs are important. In the rural villages, however, many people are skeptical of technologies. This inequality of access and education means that youth in rural areas and the poor are not able to meet requirements for jobs that use ICTs.

One discussant noted, “It is possible to access Internet through mobile phones. You can use some phones to access Internet, Facebook, etc. In the villages, however, you find that you can only receive calls and make calls. There is no Internet. When I went to Nairobi and saw everyone with smart phones, I wondered, ‘What is wrong with Uganda?’ We don’t have many smart phones.” Another discussant commented that her university has a wide area network, but it is only available to lecturers, not to students.

Most of the youth discussants considered that, among their peer groups, more girls than boys had mobile phones, and more girls were active on the Internet and Facebook.

Access brings concerns

In Indonesia, it was noted, Internet is very available, except for the more remote islands. In Java, commented one discussant, “every young person has a smart phone. They use Facebook and Twitter and can get all kinds of information, and those without smart phones can use Internet cafés.” Internet access, however, is creating new problems. “Parents are proud that their kids are going to the Internet shop to get information, but they also worry about increased access to pornography.” Internet is believed to contribute to an increase in child marriages. The youth discussants said they would like more guidance on how to filter information, know what is true and what is not, use Internet safely, and avoid exposure to offensive content. One discussant from Indonesia mentioned that parents in her community worried that if girls went to Internet cafes or browsed online, they would be exposed to inappropriate materials or prostitution through Facebook.

In Sweden, access to Internet and smart phones is universal. However, parents may buy children a smart phone even if they cannot really afford it. Although many children learn English early because they can easily access Internet, many also do not learn how to write properly because they only use computers.

When phones are available but there is no capacity to purchase them, additional problems also arise. According to one discussant, “Some girls want to have big things before their time.” This can lead to young women offering sex to older men in return for money, fancy phones and airtime.

ICTs in formal education

Youth discussants all said that they are increasingly expected to have access to the Internet and computers in order to complete their school assignments, and they felt this was not a realistic expectation. In one of the youth’s schools in Indonesia, computer class is offered for 4 hours per week and a computer lab is available with 30 desktop computers. In another school in Jakarta, however, every child is expected to have their own laptop. “Our problem is different than in the remote areas. Every teacher in Jakarta thinks that a smart phone or computer is ‘the world in our hands.’ They think we don’t need education about the computer itself. They think we can learn from the Internet how to use computers, and so we have to search and learn this all by ourselves with little guidance.” In Sweden, “if you don’t have Internet access, it will be very difficult to pass a course.”

Effective ways to reach and engage youth in campaigns

Discussants were asked about the communication channels that are most effective for campaigning or engaging youth and communities. In rural Sierra Leone and Uganda, face-to-face was considered the most effective outreach channel for reaching youth and communities, given low levels of access to computers, radios and mobile phones. “Most times our campaigns are face-to-face. We move to communities, we use local language to be sure everyone gets the message,” said one youth discussant. In Jakarta, however, “it’s easy to use online means, it never sleeps. Young people in Jakarta are too lazy to attend workshops. They don’t like to listen to speakers. So we share by social media, like Facebook and Twitter.”

Digital media is only useful in urban areas, said one youth discussant from Sierra Leone. “We mostly use radio to do advocacy and sensitization campaigns. We also do it face-to-face. For secondary schools, we do talks. We tell them about documents signed by government or NGOs, what is in place, what is not in place. We give advice. We talk straight about health, about sex education. You just wait for the light in their eyeball to see if they are understanding. We also do dramas, and we paste up wall bills. We do all of this in our local languages.” Youth groups and youth networks are also useful channels for passing along messages and building support.

Radio is effective in theory, but one discussant noted that in his district, there are only two radio stations. “You take your information or announcement there, and they say they will pass it, but you stay waiting… it’s a challenge.”

Campaigns must also involve engaging local decision makers, a participant noted. Often chiefs do not understand, and they may be the very ones who violate the rights of girls. Youth noted the need to be diplomatic however, or they risk being seen as impolite or trouble-makers. “You have to really risk yourself to do rights work in the community,” noted one discussant. Another commented that having support and buy-in from local leaders is critical in order to be taken seriously. “You need a ‘big voice’ to back you and to convince people to listen to you.”

INGO staff can help legitimize youth work in some cases, but there are also issues. “Local leaders always ask for money,” noted one discussant. “When they hear Plan, UNICEF, Care, Save the Children, they think these organizations gave us money and we’ve taken it for ourselves.” Youth often resort to using external INGO staff as their legitimizing force because “we don’t have other role models, everybody wants money. The politicians say they will help us but then they are always too busy. We have to take the lead ourselves.”

Conflicting information and messages can also be a problem, commented a Salon participant. “One year, it’s the ABC Campaign for HIV prevention, the next it’s condoms, and then it’s prevention. Sometimes youth don’t know who to believe. The NGO says something, the government says something, and local leaders say something else. We need consistency.” In addition, he noted, “INGOs come in with their big range rovers, so of course local leaders and communities think that there is money involved. INGOs need to think more carefully and avoid these conflicting messages.”

What would youth like to see?

Going forward, the youth would like more access, more ICT education, more transparency and accountability in terms of how governments spend funds directed to ICT programs, and more guidance on filtering information and ensuring it’s veracity so that children will not be taken advantage of.

*****

Thanks to the Population Council for hosting us for the Salon! Join us for our next Salon on July 25th: How can we scale Mobiles for Development initiatives? 

The Technology Salon methodology was used for the session, including Chatham House Rule, therefore no attribution has been made in this summary post. Sign up here to receive notifications about upcoming Salons in New York, Nairobi, San Francisco, London and Washington, DC. 

Read Full Post »

This is a cross-post from the always thoughtful and eloquent Ian Thorpe, who notes that fundraising is a means to help non-profit organizations fulfill their wider mission; it should not be mistaken as the end goal of non-profit organizations. Consistency in how we achieve our missions across all of our operations becomes ever more important in this age of growing transparency. Read the original post here.

by Ian Thorpe

I’ve been reflecting on a couple of interesting discussions lately on aid communication and fundraising.  In the first, Kurante organized a Google Hangout on “Poverty Porn” i.e. the use of negative, shocking images in aid campaigns (the recording and the twitter storify of the discussion can be found on Tom Murphy’s blog here). During the discussion @meowtree  shared a link to this rather discouraging blog post by a fundraising guru here that suggests that those who criticize the use of negative images are undermining the organizations they work for and should be fired!

A second twitter discussion concerned a new “buy one, give one” programme and whether or not it is harmful or helpful and on what basis this type of programme might be judged.

What comes out of both of these is the potential conflict between what makes good aid versus what makes good fundraising. It’s quite possible to raise money, a lot of money, if one is willing to do whatever it takes, use any kind of images and words and tactics in order to open their wallets. Marketers and fundraisers, to give them their due, make extensive use research and evidence in their work, perhaps more so than programme people, and much research backs up the claim that negative imagery is often more successful than positive imagery in evoking a response and getting out checkbooks.

If you were a private company then “maximizing shareholder value” by going where the money is might well be a great strategy. But aid agencies and civil society organizations are generally in place to serve a mission. The mission of the organization is a huge asset both in motivating staff and in generating support – but it’s also an important constraint in that in places limits around what you will be prepared to do to raise funds or attention. Essentially, if you exist to pursue a mission then all your activities need to be consistent with it. Generally an aid mission is not simply to raise as much money as possible, it’s to achieve a purpose such as reducing poverty or protecting children from harm. And it’s often more complicated to pursue this goal to maximize the amount of positive impact on your beneficiaries – you also need to do this in a principled way informed by your organization’s values such as in respecting the human dignity of the people of the people you aim to help and not exploiting them (even if with the aim of helping them).

I recall a conversation from when I worked on communication in UNICEF with our fundraisers about a similar topic (from more than 10 years ago so I’m not spilling any secrets). At that stage the organization was looking to move more into “upstream policy work” and on scaling back on “service delivery”, especially in middle-income countries. Programmatically this made a lot of sense, but the fundraisers were naturally concerned about the impact on their ability to talk about this shift in fundraising campaigns. It’s much easier to fundraise using images of nicely branded supplies coming in on trucks being handed out by aid workers to poor people than it is to “show” work on, or the results of influencing government policy, improving data collection and building capacity of civil servants.  But at the end of the discussion we were ready to say that while it might be harder to raise money for upstream work, and we might be able to raise less money as a result – if this is the work that needs to be done, then the task was to fund better ways of fundraising about this work, rather than changing the nature of the work to make it easier to raise funds.

Of course aid organizations rely on external funding (whether government, corporate or individual) and they need professional fundraisers to be able to get the resources they need to do their work. Professional fundraisers and communicators know better than programme staff, from their experience and research, how to put together effective fundraising communications in terms of who to approach, what approaches to use and what information is needed from programme staff to support it. That can include coming up with novel approaches to raising funds for something that is already a priority, even if these appear gimmicky to aid workers on the ground (such as sending a quarter coin to people to get them to send in donations or getting them to buy something to give something).

But it’s important to ensure that the fundraising is in service of the organization’s goals rather than the reverse. It can be easy to be tempted to do something because it’s popular with donors even if it isn’t fully consistent with your mission and values, and hard to forswear potential opportunities when aid funding is tight. In particular it can be tempting to agree to programmes which are appealing to donors but for which there isn’t a demand, or worse that do unintended harm. But if the organization exists to serve a mission – then it’s important to keep that front and centre in decision-making on what opportunities to pursue or what tactics to use to pursue them – in fundraising just as much as in programmes.

In fact in an age of increasing aid transparency it becomes ever more important to focus on your mission and values since it’s much more obvious if your communications, partnerships and programmes are not consistent with each other or with your mission, and your reputation will suffer as a result –as will the cause you are pursuing.

Greater transparency is also an opportunity to bring donors and beneficiaries closer together so that donors can see and hear the results of aid work directly from those being helped rather than via a “story” whether positive or negative constructed by the aid agency for the benefit of donors. Similarly donors can also hear more from those they are helping about what they want and need, seeing them more as individuals with dignity, aspirations and agency to improve their lives aided by donors rather than as passive objects of pity and charity. This way instead of going where donors give most now, you can change the discussion to educate and encourage them to give money to where it is really needed, and to understand better what their support really does and can do.

Read Full Post »

As part of their efforts to reduce violence against children, Plan Benin is rallying motorcycle-taxi drivers to use SMS to report violence against children that they witness in the streets.

Florence Cisse, Plan West Africa’s regional communications officer, says:

The Zemidjan or “Zem” swarm the streets of Cotonou like bees. They are everywhere; silent observers to all comings and goings. Now, they have received training on how to recognize cases of child trafficking or kidnapping which often occur on the same busy streets. Using SMS texting on their mobile phones, they send information which is tracked and mapped by Plan using Ushahidi, an open source web-based technology platform. Plan then alerts authorities through partnerships with the Benin Central Office of Child Protection and ministries of Family, of Home Affairs and of Justice who begin the process of retrieving the children or investigating the abuse.

“The Zem are always working on the streets, which is where children experience the greatest risk,” said Michel Kanhonou Plan Benin Programme Manager. “The use of Ushahidi to track SMS texts and map the incidents of violence has helped to inform the authorities where, block by block, they need to invest greater resources to keep our children safe.”

The Zem join youth, heads of police squads, community and religious leaders and others who have received the training on how to recognize abuse and report it through simple SMS from Plan. Plan promotes a phone number that is used to collect the SMS on billboards and radio programmes.

This is the kind of innovation I think is most interesting – identifying existing networks and systems, and seeing how to enhance or expand them via new technologies. I’m looking forward to seeing how the program advances, and what Plan Benin learns from this effort to engage broader networks in preventing, tracking and responding to violence against children.

The team in Benin has created a video about the violence reporting system, which uses both FrontlineSMS and Ushahidi. The technology tools, however, are only part of the program. In addition, the team launched billboard and community radio campaigns to promote the violence-reporting number; engaged local communities, government, child protection agents, and NGOs; and trained children, families, teachers, school directors, parents and community leaders (and now moto-taxi drivers!) about violence, its impact on children and how to respond to it. Children and young people have been involved in program design and implementation as well, and there have been thorough discussions on how to manage this type of sensitive information in a private and secure way.

For some older posts that demonstrate the evolution of the project, which started off in early 2010, click here.

Read Full Post »

birds 2I spent the weekend working on a paper about “Children on the Move.” I’m not even close to done with it yet, but the topic is fascinating. Some reports say that 1/3 of migrants are between the ages of 12 and 25, including millions of children under the age of 18. The number of children and youth who migrate is difficult to pin down with certainty, given that migration is often within country, seasonal, across porous borders, and because most child migrants don’t have legal means to migrate or they lack identification, leaving them under the radar and uncounted.

Children move for all kinds of reasons, from and into all kinds of situations. The push-pull factors that cause them to migrate vary a great deal from situation to situation. Often the movement of children is lumped under trafficking and child labor, and all children who move are considered victims, and all those who support children to move are labeled criminals or traffickers and all parents who allow their children to move are lambasted for not caring about them. If you read what children and parents involved in migration say, it’s clear that this is not the case.

One person I interviewed for the paper noted off the record that sometimes those working with children who migrate are forced to put them in the category of “trafficked” or “at risk of trafficking” because there is no real category (or funding) to support children who are “seeking better opportunity” or “fleeing domestic violence” or “scared for my life because of the gangs in my community, and traveling across several countries up to the US seems like less of a risk.”

Just like adult migrants, children often move of their own will to seek opportunity in other places. Their movement in and of itself is not negative, but moving without protection mechanisms and support can indeed put them at risk. Policies and systems that don’t talk to each other also put children and youth in peril, whether it is when children themselves move, or when their parents move with them.

For the report I’m doing, I’m looking at how ICTs are being used by children and youth to make their journey safer, and ways that communities, local child protection committees, institutions, governments and NGOs are using or could use some of these new ICT tools to better support and protect children and youth who move for any reason.

Some interesting efforts are happening, including some ingenious local networks in West Africa that work across communities to help ensure children’s paths and travels are as safe as possible; and a radio and SMS project in Tanzania that is building up a pro-child protection constituency by encouraging people to tell stories about when and where they have supported or helped a child.

It’s been heartbreaking to read about Afghan youth who are forcibly returned to a country they can barely remember because they have turned 18 and are no longer supported by the UK child welfare system, yet at least a tiny bit encouraging that a UK organization is working on a mobile app that could provide these youth with at least a map and some information about their ‘homeland’ so that they know where to go for help when they step off the plane in what is now a foreign country.

Reading about migrant parents in the US losing their children to foster care because they have been detained for migration violations and are unable to show up to court to keep their children, or they lack critical information about how the system works, or they are not allowed more than one phone call makes my blood boil. Having been married to a Salvadoran, I’ve experienced my own fair share of migration difficulties and horror stories. They are not pretty, and family separation hurts, no matter what color or nationality the family is. It seems that the root of some countries’ inability to deal with migration in a dignified way is an underlying devaluation of people from other places and an inability to see them as human. Can ICTs play a role in changing attitudes at the broad scale? Or can we at least enable migrants in detention more communication with families so that they don’t lose contact with their children? A few initiatives are looking at storytelling as a way to bring more humanity into the migration debate.

As both Duncan Green (Why is migration a Cinderella issue in development) and Owen Barder (Is migration too toxic for development) have written recently, migration has not been a hot topic on the development agenda, and it’s only now starting to get some play.

Why is that? I think Owen’s comment is pretty good to spark some thought:

Migration is a Cinderella issue in development because there is nobody to speak for the people who are disadvantaged by the current rules.  Domestic civil society organisations which work on migration are mainly focused on the rights of immigrants, not on improving the impact of migration on development or creating opportunities for people in poor countries. DFID is largely in retreat from non-aid issues. The big development NGOs at best speak for their own visions of development, and at worst promote the aid industry of which they are part. As a result, people in developing countries are denied some of the most powerful and inexpensive ways in which they could improve their lives.

We need to find a way to look at all angles and aspects of migration, including that of child migration, in a holistic way that involves all these different actors. I think that one reason migration is not talked about  enough in the development debate is because it is a touchy political issue that might make a donor base freak out. It also tends to makes agencies that work with children a bit uncomfortable – If we protect children who migrate, will we be seen to be encouraging illegal migration? Will we be seen as supporting child labor? Are we liable if we give children safety tips or information, and then something happens to them? How can we do no harm? What about unintended consequences?

More recently, many child-focused agencies have started to better come to grips with the realities that children are going to migrate, and it’s altogether possible that staying in their home community is actually not in their best interest. These are thorny questions, however, that are difficult to deal with, especially in the open when the political debate around migration has been so traditionally ugly.

Perhaps framing migration as an economic issue will help bring it into the debate, but I do hope we don’t lose touch with the human side of migration.

Read Full Post »

The November 14, 2012, Technology Salon NYC focused on ways that ICTs can support work with children who migrate. Our lead discussants were:  Sarah Engebretsen and Kate Barker from Population Council, and Brian Root and Enrique Piracés from Human Rights Watch.

This post summarizes discussions that surfaced around the Population Council’s upcoming Girls on the Move report, which looks at adolescent girls’ (ages 10-19) internal and regional migration in ‘developing’ countries, including opportunity and risk. (In a second blog post I will cover Human Rights Watch’s points and resulting discussions.)

The Girls on the Move report (to be released in February 2013) will synthesize current evidence, incorporate results of specially commissioned research, illustrate experiences of migrant girls, provide examples of promising policies and programs, and offer concrete action-oriented recommendations.

1) How are migrant girls using ICTs?

While the report’s focus is not technology, the research team notes that there is some evidence showing that adolescent girls are using ICTs for:

  • Extending social networks. In China and Southeast Asia, migrant girls are building and accessing personal networks through mobiles and texting. This is especially pronounced among girls who work long hours in tedious jobs in factories, and who do not have much time with family and friends. Text messaging helps them maintain connections with existing social networks. It also gives them space for flirtation, which may not be something they can do in their former rural context because of cultural norms that look down on flirtatious behavior.
  • Finding new jobs. Both boys and girls use mobiles and text messaging for exchanging quick news about job openings. This suggests there could be an opening for program interventions that would connect to migrant children through texting, and that might supply information on community resources, for example, where to go in cases of threat or emergency—that might then propagate across migrant virtual networks.
  • Sending remittances. Based on research with adolescent girls and drawing from examples of adult migrants, it seems likely that a vast majority of migrant girls save money and send it to their families. Evidence on how girl migrants are using remittances is limited, but a survey conducted in Kenya found that 90% of adult migrants had sent money home to families in other parts of Kenya via mobile phone in the 30 days before the survey. There is more research needed on adolescent girls’ remittance patterns. Research is also lacking on adolescent girls’ access to and use of mobile phones and on whether mobile phones are owned or borrowed from another person who is the handset owner. Remittances, however, as one participant pointed out, are obviously only sent by mobile in countries with functioning mobile money systems.
  • Keeping in touch with family back home. In Western Kenya, migrant brides who are very isolated placed great importance on mobiles to stay in touch with family and friends back home. Facebook is very popular in some countries for keeping in touch with families and friends back home. In Johannesburg and Somalia, for example, one participant said “Facebook is huge.” Migrating adolescent girls and domestic working girls in Burkina Faso, however, do not have Internet access at all, via mobiles or otherwise.

2) Areas where ICTs could support work on child protection and migration

  • Child Protection Systems There is a general global move towards developing child protection systems that work for different kinds of vulnerable children. These efforts are important in the transit phase and right upon arrival as these phases are particularly risky for children who migrate. ICTs can play a role in managing information that is part of these systems. Ways to connect community child protection systems into district and national systems need more investigation.
  • Reporting abuse and getting help One example of ways that ICTs are supporting child protection in India and several other countries is Child Help Lines. ChildLine India received almost 23 million calls as of March 2012, with 62% of callers between the ages of 11 and 18. The helplines provide vulnerable groups of children and youth with referrals to local services, and in the best cases they are public-private partnerships that link with national and state governments. Of note is that boys call in more often than girls, and this raises questions about girls’ access to phones to actually make a call to obtain support. It also points to the need for differentiated strategies to reach both boys and girls.

3) Technology and exclusion

  • Social exclusion and access is a specific challenge due to the pronounced social exclusion of many migrant girls, particularly those who are married or working in socially isolated jobs such as child domestic workers. Girls in these situations may not have any access to technology at all, including to mobile phones.  Girls and women especially tend to have less access than men; they are often not the owners of devices. There is a research gap here, as no one actually knows how many migrating adolescent girls access mobiles and how many can borrow a phone for use. It is not clear if girls have their own phones, or if they are using an employer’s or a friend’s phone or a public call box. This would be a key factor in terms of working with adolescent girls and understanding risk and designing programs.
  • Technology should build on – not be seen as a replacement for – social networks. Girls access to social capital is a huge underlying topic. There is normally a rupture in social networks when girls move. They become socially isolated and this puts them at great risk. Domestic girl workers leave home and become more vulnerable to exploitation —  they have no friends or family around them, and they may not be able to access communication technologies. For this reason it is critical to understand that technology cannot replace social networks. A social network is needed first, and then ICTs can allow girls to remain in touch with those in their network. It is very important to think about understanding and/or building social networks before pushing the idea of technology or incorporating technologies.

4) ICTs and potential risk to child migrants

  • SMS, anonymity and privacy. According to a study one participant was involved in, some children and youth report feeling that they can speak up more freely by SMS since they can text privately even in close quarters. Others noted that some organizations are incorporating online counseling services for similar reasons. A study in Nigeria is ongoing regarding this same topic, and in Southeast Asia it has been shown that girls often use text messages to flirt using an alternate identity.
  • Retaliation. Concerns were raised regarding the possibility for retaliation if a child reports abuse or uses a mobile for flirting and the phone is confiscated.  Practices of self-protection and message deleting are not very well implemented in most cases. A participant noted that some of the low-end phones in Tanzania and Kenya periodically delete outgoing messages and only keep 15 messages on the phone at a time. This can help somewhat, though it is not a feature that is particularly aimed at protection and privacy, rather, it is more a function of low memory space. Safer Mobile is one initiative that looks at risk and privacy; however, like most efforts looking at risk, it is focused on political conflict and human rights situations, not at privacy and protection for child migrants or other types of abuse reporting that children may be involved in.

5) Research gaps and challenges

  • Migration contexts. It was emphasized that migration during an emergency situation is very different from a voluntary migration, or seasonal migration. Work is being done around communication with disaster or emergency affected populations via the Communication with Disaster Affected Communities (CDAC) Network, but this theme does not seem to be one of widespread discussion among US-based NGOs and humanitarian organizations.
  • Migrants are not necessarily disadvantaged however a bias exists in that researchers tend to look for disadvantage or those who are disadvantaged. They often ask questions that are biased towards showing that migrants are disadvantaged, but this is not always the case. Sometimes migrating children are the most advantaged. In some contexts migrating requires family support and funds to migrate, and those with the least amount of resources may not be able to move. In some cases migrant children have a huge, strong family structure. In others, children are escaping early marriage, their parents’ passing away or other difficult situations.
  • Integrated information and data crossing. One issue with research around migrants is that most looks solely at migrants and does not cross migration with other information. Many girls migrate with the idea that they will be able to get an education, for example, but there is not a lot of information on whether migrating girls have more or less access to education. The literature tends to focus on girls in the worst situations. In addition, although there are 4 times as many internal migrants as there are international migrants, focus tends to be on international migration.

In a second post, I will cover Human Rights Watch’s work on using data visualization to advocate for the rights of immigrants in the US.

Many thanks to our lead discussants from the Population Council and to the Women’s Refugee Commission and the International Rescue Committee for hosting! The next Technology Salon NYC will be coming up in January 2013. Stay tuned for more information and if you’d like to receive notifications about future salons, sign up for the mailing list!

Also, if you have research or examples of how child and youth migrants are using ICTs before, during or after their journey, or information on how organizations are using ICTs to support the process, please let me know.

Related posts and resources:

How can ICTs support and protect children who migrate?

New communication tools and disaster affected communities

Empowering communities with technology tools to protect children

Children on the Move website

Read Full Post »

Older Posts »