Last year, I spent some time in Benin piloting an SMS reporting system to track and respond to Violence against Children (VAC). After almost a year developing the idea and thinking it through to see if it was potentially feasible (see 7 or more questions to ask before adding ICTs), in February 2010 we conducted 2 workshops with youth, staff and local authorities in Couffo and Atacora, Benin, to design a system with their input (see Finding Some ICT answers in Benin). The main pieces of the reporting system are FrontlineSMS and Ushahidi. A few months after, staff reported back on some of the challenges with implementation (see Tweaking: SMS Violence Reporting System in Benin).
Romeo Essou, project coordinator
Since then, many of the issues have been resolved, and we’ve improved outreach so that communities are more aware of the SMS reporting system and how to use it. We’ve also been looking at the system itself, continuing testing, and seeing what improvements are needed. We didn’t have resources to dedicate someone fully to the program at first, but after seeing the potential, Plan Benin assigned Romeo (see photo) to manage the pilot project full-time in Benin. It’s been quite a pleasure working with the team there, and Romeo is no exception. Having someone dedicated full-time to working with communities and staff in the two districts has really made a difference. From November to mid-January, several additional violence cases were reported and a good number of them have been followed up on and closed.
Last week, Romeo shared what we still need to find solutions for. Some of these are issues that we’d identified last year and others are additional things that Romeo has suggested as he’s gotten down to business.
Some people still call instead of texting, or they send “call me back” texts
Cases are now coming in
The team is fairly certain this is due to illiteracy. Plan will involve more school-going youth in the initiative because they have higher literacy levels and can support others with reporting if needed.
Romeo and the team will continue doing outreach and education on how the system works both at community meetings and via radio broadcasts in French and local languages.
To address the calls that may continue to come in, a voice mail will be set up on the phone that links up to the FrontlineSMS laptop, with a message explaining that people have to send in a text. Romeo will do some research to determine which languages to use in the message for the best result (French and the 2 main local languages….).
If that doesn’t resolve the issue, Romeo and the staff will call back anyone who phones in.
Cost of an SMS continues to be a discouraging factor for people in terms of reporting. Often when Romeo or other staff visit a community, community members take advantage of their physical presence to report additional cases of violence. This is not necessarily negative, considering that we want to increase the number of incidents reported and followed up on; however, if it turns out that awareness around violence is high but the cost of the SMS is a deterring factor in reporting, more inexpensive channels to report also need to be offered. We are still negotiating with the local operators to get a free SMS line.
Spam
Some 50 spams a day are coming in. This is an issue on all mobile phones in Benin. Much of the spam comes from the mobile service providers themselves.
If the spam is coming from the same number, it’s possible that a workaround script could be written up at the point where FrontlineSMS forwards to Ushahidi. The messages can also be marked on Ushahidi as spam, but they will still be arriving via FrontlineSMS, unfortunately, unless numbers can be blocked somehow.
Needs further thought on how it might be overcome.
The Violence Tracking Platform (Ushahidi):
Ushahidi platform
We need to be 100% sure that any personal or identifying information coming in via the SMS reports is scrubbed so we do not put any children or witnesses at risk or falsely accuse anyone of violence against children by publishing the reports to the Ushahidi platform.
Romeo will develop a Privacy and Protection Checklist and train those administering the Ushahidi system to be sure to remove identifying information thoroughly before allowing it to be published on the Ushahidi site.
The identifying information still needs to be stored somewhere on the system to support with follow-up on the cases that come in. We may need additional development work on the platform to allow for that.
We hope to integrate the Ushahidi map into the Violence against Children website, which has educational material, videos and cartoons done by youth, and a discussion forum. However if the information poses a risk to anyone, we may decide to make the Ushahidi site private and keep it as a management tool rather than a public site.
Categorizing:
The staff who administer the Ushahidi website are not always clear which type of violence an incident should be categorized as (physical violence? sexual violence? psychological violence?).
Romeo will create short guidelines to help people to categorize the incidents properly. He’d like these to be incorporated into the Ushahidi platform.
Often a reported incident can fit into more than one category – eg., both physical and sexual violence. If it’s categorized in two categories, then we lose the sense of how many incidents there have been overall, and we’re unable to properly chart the data. We need to find a way to manage this on the system so that we have proper statistics.
Recent reports of physical violence, sexual violence, forced marriage and exploitation
Follow up on reported cases:
We still want a way to track response and follow-up on cases within the Ushahidi platform, as often a report requires more than one verification visit.
We need someplace within the platform to store this type of information to keep records of follow-up.
This will require work by a developer, but it might be helpful for other institutions using Ushahidi as well. It’s also possible that FrontlineSMS Medic could be used for case management rather than Ushahidi, but it might prove confusing for staff to have to store and act on the same kind of information using two different tools.
Names of villages, hamlets, etc:
We would like to have a listing on the map of the various hamlets, villages, etc. They do not currently appear on the map since there is no record of them on Open Street Maps or Google Maps. Plan has this detailed information in its internal systems and we want to add it to the base maps so that it’s easier for administrators to locate the incident in the right community.
Coordination and outreach:
In addition to the technical work on the system, Romeo will continue to coordinate and share information with local partners and other organizations working on violence against children. There are similar initiatives already in place and we don’t want to duplicate efforts. Combining and sharing help line numbers and taking reports by both phone and SMS is one option.
A bunch of ideas and information came in via the comments section that helped us to figure out what is happening in the space, including info about ICT4D advanced degrees options, short courses, related courses, etc.
In addition to following up with a couple established universities to see if (and when) they might be offering Masters level ICT4D programs, Ernst and I had a skype meeting with Mark Weingarten and Nick Martin, the folks over at TechChange (the Institute for Technology and Social Change).
TechChange is a new organization dedicated to training practitioners and students to effectively leverage emerging technologies for social change. They are building tools and courses for ICT4D and have already partnered with a number of universities — eg., American University, George Washington University, the UN University for Peace — to deliver face-to-face courses in topics like ‘technology for crisis response’ and ‘social media for social change.’ They also have upcoming projects planned with U4Ushahidi, Souktel, and FrontlineSMS. In addition to in-person trainings, TechChange is designing learning tools for use in online courses and degree programs.
As Mark commented, ‘We are developing curricula for practitioners (including those working in the field), and recognizing that needs and schedules vary. Some people and organizations might want to quickly learn how to use specific ICT tools, but others may want a more in-depth understanding of the entire ICT4D ecosystem, its successes, its failures, and where things are headed in the future. We want to better understand this range of needs and tailor our courses. We’re also interested in knowing more about what else is being done in this space and what other examples we can learn from.’
In order to get some wider input, we invite you to join us for a twitter chat on ICT4D Distance Learning on Friday, January 14that11 am EST. The hashtag will be #ICT4DDL.
We will cover 5 questions:
Topics:What sorts of courses would interest you most? What topics are most relevant?
Timing:What timeframe for distance learning courses would best suit your schedule and needs? Short-term courses on specific topics (or tools) vs. more in-depth courses? 3 hr modules or ten week facilitated trainings?
Credit: How important are things like credit or degree programs? Are certifications enough?
Skills:What skills would you like to gain as a participant – considering 1) university students just entering the field and 2) practitioners taking professional development courses.
Delivery: How does connectivity affect your ability to take courses? What about in the case of others who might be interested in this type of training but are not on Twitter/online as often? Is a mobile option a good idea?
Tips for a good Twitter Chat:
Login 5 mins ahead of time and be ready with a short introduction (eg, Cathy here, I manage maternal health pgms at XYZ in Malawi, we’re just getting started with ICT4D).
Tools like TweetChat which automatically add the hashtag and refresh often are helpful to keep up with the conversation.
We look forward to chatting on Friday, January 14th at 11 am EST and welcome any questions or comments before then!
I spent a few days in Nairobi early last week with our education and our ICT staff from Ghana, Uganda, Senegal, Mozambique, Kenya, Egypt and a few other folks, including the brilliant Mika Valitalo from our Finnish office and people from regional and headquarters levels. We were looking at goals and challenges in our education programs and thinking about where ICTs might play a role.
The process was really interesting. Starting a few months back, each country shared their education context analysis onto a wiki. In a second round they narrowed down to a specific area in education, looked at the information and communication flow and gaps, and identified areas where there might be an ICT solution. They focused mostly on mobiles, but in many cases mobiles were supported by computers, servers and laptops as well as non-digital information and communication tools and also solar technologies. Each country team met by Skype with Mika and an external consultant to discuss the concepts and get ICT advice and support. Then they updated their concepts and got additional feedback. For the third round, they added rich pictures to show what the specific ICT solutions might look like. Everyone had an opportunity to give input into everyone else’s ideas via the wiki.
At the meeting in Nairobi, we spent a day sharing the concepts with each other for clarification and focused input. Colleagues shared the broader education context in their countries and specifically in the communities where they are working. Then they illustrated the specific education issues and the ICT solutions that they were suggesting and/or the places they felt ICTs could help. Some of the ICT solutions focused on a very specific technology or device. Others showed how different types of ICTs could be integrated at different points in the process. Others required development of a totally new ‘solution’.
Some of the areas where colleagues thought ICTs could support education included: teacher training for those working in remote communities, adult literacy (especially literacy retention post literacy training), improving exam scores, livening up and improving in-class curriculum, and transparency and accountability in education. We spent 2 days then working in different small groups on the concepts, cross-pollinating ideas and deciding which of the concepts were most relevant to all 6 countries (in order to make it more possible to scale them) and which were most feasible and do-able.
The ideas were all a good fit with our global education strategy (see page 9) which focuses on service delivery (in partnership with local governments and communities); organizing and empowering rights holders; and grassroots participatory advocacy to influence education policies, financing and practice. The strategy prioritizes actions around equal access to education, quality of education, and education governance (see page 10).
Accountability and transparency in education
One of the concepts that captured the most interest from the whole group was that of using ICTs to improve accountability and transparency in education. Education is one of the areas where “Quiet Corruption” is often found. ‘Quiet corruption, which can take the form of absenteeism among teachers or doctors, the distribution of fake drugs, or the sale of diluted fertilizers to poor farmers, is having a damaging effect on people in Africa, according to the African Development Indicators report released by the World Bank….’ (March 18, 2010 article)
It's time for class.... where is the teacher to be found?
Edison, Charles and Erik, our colleagues from Uganda, did a short skit illustrating the different points in the primary education system where corruption happens. Their points correlated well with this summary of quiet corruption in education from a July 5, 2010 article in the Independent:
‘Early this year, the Transparency International (TI) Africa Education Watch Programme report: Africa Education Watch: good governance lessons for primary education showed that the government’s perception that massive enrollment is a sign of success of the UPE [universal primary education] programme must be revised to address the problem of overcrowding in classrooms, studying under trees, poor financial management, illegal fees, and lack of school inspection. The report exposes irritating embezzlement of UPE funds and abuse of authority by head-teachers who charge illegal fees, make students offer labour on teachers’ projects, sexual harassment, and systematic teacher absenteeism. The report noted that 85% of schools surveyed had either deficient accounting systems or none at all. In most cases, financial records were either unavailable or incomplete. The survey found limited financial documentation at district education offices and at schools. Most people who handle school grants had no training in basic finance management.
Another survey titled, The Efficiency of Public Education in Uganda, conducted in 2007 by the Ministry of Education to determine efficiency in provision of education services found an average rate of teacher absenteeism of 27% in Uganda, compared to other countries like Zambia (17%), and Papa New Guinea (15%). The aggregate loss caused by this absenteeism constituted 19% which translates into Shs 53 billion out of the Shs276 billion of the Education ministry’s wage bill.
In a swift headcount at the beginning of this year, the Education ministry established that the number of pupils listed in primary school registers was 25% higher than those actually studying. Similarly, the report established that the number of students in lower secondary schools had been exaggerated by 12%. For instance at Amaji Primary School last year, the school register had 816 pupils. But when the headcount was conducted the school administration could not account for 302 pupils.
It is reported that many districts’ chief administrative officers have failed to show proper accountability for the UPE and USE funds.’
The Uganda team also explained that:
Parental interest in education is very low because since Universal Primary Education launched, parents feel it’s the government’s responsibility. Some youth we were working with in Kenya last year made a short film about poor performance in primary schools covering the same issue (see below).
Teachers’ salaries are paid directly to their bank accounts, and there is no way to punish them if they don’t show up.
There are mechanisms to ensure that donor funds go from the national level to the district level and then on to the school, but no accountability mechanisms to ensure that they get from the school to the classroom and are translated into quality education for children.
District level government authority and accountability ends when they transfer funds to the schools; school directors can report to them that they have received funding and that everything is going fine when it’s really not.
Local school committees are often made up of people who are not neutral and who do not have the best interest of the children in mind. In some cases, school committee positions are used for personal gain and to launch individual political careers and political campaigns.
Lack of parental and community involvement in the education process and in school governance means that no one is demanding accountability from teachers and schools.
Sexual and physical violence in schools is very common and underreported. When it is reported, often nothing is done about it.
(Start playing the video, then click the small ‘cc’ button to turn on captions in English)
Colleagues from the other countries face the same challenges in their work and in their own children’s education.
Can ICTs play a role?
What is the solution then? Colleagues suggest that motivating parents and the community to get more involved in school governance and demanding transparency and accountability can begin to change the situation. This obviously requires a lot more than ICTs. So several different actions would be taken to engage and motivate parents and the community to take a bigger role in their children’s education. Then ICTs can be integrated into and support the process for sharing education information with parents, such as student absenteeism, grades, parent-school meetings, exam dates and scores, etc. Parents and students would also be able to report when teachers do not show up or suspected corruption. Students could also report abusive teachers, absent teachers, and other issues they are not happy with at the school. A neutral party would manage and hold the information that flows in and out to protect students from reprisal and to protect teachers from any abuse of the system in case fraudulent or incorrect information is reported. Commitment from those responsible for overseeing education to respond to the issues raised and take serious action is also needed, and this may be the biggest challenge overall. Plan can play a role there, leveraging existing relationships with local and national governments and Ministries.
The idea needs quite a bit of further work, a closer look at feasibility, and more research and input from local communities and parents. As mentioned, the ICTs are actually a small, but potentially very important, part of a much larger initiative to get parents and communities involved in school governance to demand transparent, accountable and quality education and budget spending.
Challenges in the process
Some of the challenges that we had to manage well during this initial piece of the longer process included:
We needed to ensure that we were starting with the context and the need for better information and communications, not starting with the technology and devices and building initiatives around them. Yet we also had to avoid getting lost in the overall context and missing the opportunity to pinpoint potential ICT solutions at specific places within the context. Role play and flip chart illustrations of the ‘problem’ and the ‘solutions’ were very useful for getting more concrete (“So, Kofi is here in his community and he wants to …. So he uses xxx to do this, and then this happens and then….).
Though we wanted to specifically look at places that mobiles and other ICTs could support, it was important to list out all the factors that needed to be in place in order for the ICTs to work and to think clearly about the constraints we might face during implementation. One good question to help with that was, after seeing an idea or ICT solution presented, to ask “What needs to be in place in order for that to happen?” Then you start to remember critical things like community motivation, government interest to actually resolve a problem, electricity, someone to set up and manage a server, a strong enough network to download multimedia content, mobile versions of websites, educational content re-design for mobiles, teacher training on how to integrate ICTs in the classroom, limitations of SMS for doing something other than rote learning, higher versions of a mobile operating system, a smart phone, etc.
We had input from a potential corporate partner during the process. We learned that corporations are thinking several years ahead to what will be coming down the line; however non-profit are normally working within existing constraints and trying to find solutions that work here and now in the resource poor places where we work or ways to get around those constraints. Multi-level solutions seemed to be a good possibility; eg., ideas that can rely on SMS today, but have potential to expand as networks expand and data enabled mobiles become more available.
A corporation tends to think in terms of vendors, results, timelines, launch dates, price points, return on investment whereas a non-profit (at least ours) tends to think in terms of community members, organizations, process, participation, local context. Our facilitator even told us that a corporation normally does a presentation by starting with the solution, and then spending the rest of the presentation showing why that is the right solution. A non-profit usually starts a presentation by sharing all the context and background, and showing the process that led to eventually reaching the potential solution, including every step along the way, how ownership was achieved in the process, why different decisions were made and who participated in them. So keeping corporate vs non-profit cultures and languages in mind is also important when working on joint initiatives.
We need to remember to establish measurable indicators of success so that we can tell if this new type of intervention has a different/ better/ greater / lesser impact than carrying out a similar process without ICTs or with a different set of ICTs. This is something we will address once the full idea is developed. Impact measurement is very important to both corporate partners and development organizations.
This was the first time many were involved a process of this kind, so keeping the balance between technology and development goals was a constant challenge. We sometimes veered too far towards focusing on all the details of the context and then back to focusing too much on that piece of the context where a potential technology solution was seen. I think we were moving toward a pretty healthy mix of both. The process is nowhere near complete, and as we continue to work on the ideas and look at feasibility and actual implementation, we should find the sweet spot.
The work above was guided by Plan Finland’s recent publication ICT Enabled Development – Using ICT strategically to support Plan’s work. On the whole, it was a great learning process for everyone involved, and we came up with some good ideas that we will flesh out in the coming months. Having the opportunity to patiently and carefully think through areas and ways that ICTs can support program goals around education and discussing the ideas at length with colleagues was a capacity strengthening exercise for all involved and will mean that we will be more prone in general to thinking about incorporating ICTs in our work going forward.
I spent the first 2 weeks of November in Mozambique working on the continuation of the Youth Empowerment through Arts and Media project. This year, we are piloting digital mapping in addition to the other ICT tools that we’ve been integrating into the project. We weren’t able to find anyone locally in Mozambique who could train on Open Street Map but luckily were able to link up with Portuguese-speaking Iván Sánchez Ortega from OSM in Spain. (In case you didn’t catch the link – the official language in Mozambique is Portuguese…)
Iván was a great trainer and the youth from the two associations (Vuneka and Litanga) that we are working with really took to the idea of digital mapping and learning some new skills in the area of painting, theater, print journalism, radio, video and blogging. See some of Ivan’s thoughts on this Maps for Mozambique post.
Here are some photos of the work we did while in Mozambique….
Video training – this young woman took to video work amazingly fast. I was thoroughly impressed. She tended to her baby throughout the training and still managed to keep up with the rest.
We practiced digital mapping in Inhambane with Iván.
The arts group did a fantastic mural in the school yard that faces the busy street.
We met with community leaders to start mapping one sector of the Magaiça Community. Albertina sketched out on the ground where each group would go.
We split into 4 groups, each walking for over 2 hours, to map the perimeter of just one sector of Magaiça. (Things are really spread out here).
Albertina wasn’t quite sure why we couldn’t take any shortcuts and wanted to walk on every single path, but she was good sport. She eventually understood that we were tracking. She wanted to be sure that the community would get the map. “Lots of organizations come here but they don’t return.”
Albertina showed us a giant bees’ nest. Can we put that on an OSM map as a waypoint? It matters locally….
The ‘fuel tank’ on the little boat we used to cross from Inhambane to Maxixe to use the faster internet at the Plan Office. The scandal of the day was a girl on the boat, upon arriving to Inhambane, talking on her mobile and telling the person that she was in Maxixe. There was a general uproar on the boat and she was admonished and teased for using her mobile to lie to her man.
The guy on the left said he gets lost in Internet for hours, searching and learning. “I only go to school for the social part, I use the Internet for learning”
Working on a map.
Recruitment posters appeared on the Friday that we left. Interesting.
The fabulous team from Associations Litanga and Vuneka and the staff.
Last summer I had the chance to meet with War Child in Holland to talk about our shared excitement and common challenges in using social media and ICTs in program work (eg., to further program goals and as enablers in community level work with children and youth). I met Ernst Suur there, and over the past several months we’ve been trying to find an on-line Masters Degree in ICT4D. There are a couple places that are considering this type of course in the future, but we were not able to lay our fingers on anything concrete at this point. As Ernst says: Isn’t it funny that you can learn online how to knit, but ICT4D isn’t taught much online yet?
The constraints that both Ernst and I have are that we work full-time (and then some) at jobs that require a lot of travel so it’s impossible to attend a normal schedule of university classes. We also live on salaries that don’t leave extra for furthering our education and we don’t want to spend the rest of our lives in debt. We would like a program that is not completely focused on the technology, but that instead really goes into depth on how ICTs can enable better processes, results and outcomes in development work. We are both working on program initiatives that would benefit from focused ICT4D research and deeper thinking that a guided process of shared learning and discussion could provide. We work with colleagues across our organizations who, like us, are interested in and would benefit from more systematic learning and focused ICT4D capacity strengthening but who are also not in a position to attend traditional university courses (or these courses are simply not offered where we live).
We are assuming that there are others out there from other organizations in similar conditions with similar interests. For example, at the October 2010 International Conference on Crisis Mapping (ICCM) in Boston there was mention of the need for further education opportunities on ICTs in Crisis Situations.
After doing some on-line research to find options and contacting some individuals, Ernst and I thought a next step would be to do a bit of crowd sourcing to find out if there is something that already exists that we are missing. As Ernst said: Better well stolen than badly invented.
If anyone has any thoughts, please share them in the comments section or contact me at lindaraftree at gmail.
For example:
Are there existing on-line masters level courses that we have missed out on in our desktop research?
If you could design an on-line ICT4D masters program that would fit your needs, what would it look like – eg, would there be face-to-face meetings? How often and for how long? Where?
What are the key topics/areas/disciplines that would be covered in an on-line ICT4D course?
What would some of the required courses be and who could teach us?
What would a reasonable cost be?
Who might be willing to offer scholarships for this type of study course? Eg., in whose interest is it to strengthen these capacities?
Please share your thoughts and ideas so we can build a strong case, because we believe that ICT4D should walk the talk and talk the walk and make online higher education and distance learning available for everyone.
Our Tracking Violence Against Children in Benin project won first prize for Most Innovative Use of Technology or Social Media in Plan’s internal Global Awards contest. The competition was fierce and we were up against some really great projects.
We still have some kinks to work out and we are still in pilot phase, but we are pretty happy about the award in any case. It helps motivate us even further to improve on the idea until it’s fully functioning and sustainable and we know that it’s resulting in more reporting of violence, helping to track trends and cases of violence, and being used by local and national authorities for responding and following up on those cases that occur.
Many many thanks to everyone who has helped the project get where it is, including: Henri da Silva, Carmen Johnson, Bell’Aube Houinato, Amelie Soukossi, Eleonore Soglohoun, Morel Azanhoue, Victoire Tidjani, Alfred Santos, Jean Sewanou, Michel Kanhonou, Paul Fagnon, Camille Ogounssan, Anastasie Koudoh, Mika Valitalo, Ken Banks, Josh Nesbit, Patrick Meier, Juliana Rodich, Henry Addo, David Kobia, James Bon Tempo, Stefanie Conrad, Theresa Carpenter, Penelope Chester, Shona Hamilton, and community leaders, parents, school directors, local authorities, children and youth in the 2 participating communities.
Plan just released a new report called ICT Enabled Development: Using ICT strategically to support Plan’s work. The report is part of an on-going process by Plan Finland (kudos to Mika Valitalo for leading the process) in collaboration with Plan USA to support Plan’s country offices in Africa to use ICTs strategically and effectively in their development work. It was written by Hannah Beardon and builds on the Mobiles for Development Guide that Plan Finland produced (also written by Hannah) in 2009.
The idea for the report came out of our work with staff and communities, and the sense that we needed to better understand and document the ICT4D context in the different countries where we are working. Country offices wanted to strengthen their capacities to strategically incorporate ICTs into their work and to ensure that any fund-raising efforts for ICTs were stemming from real needs and interest from the ground. Plan offices were also in the process of updating their long-term strategic plans and wanted to think through how and where they could incorporate ICTs in their work internally and with communities.
The process for creating the report included 2-day workshops with staff in 5 countries, using a methodology that Mika, Hannah and I put together. We created a set of ICT training materials and discussion questions and used a ‘distance-learning’ process, working with a point person in each office who planned and carried out the workshop. Mika and I supported via Skype and email.
Hannah researched existing reports and initiatives by participating offices to find evidence and examples of ICT use. She also held phone or skype conversations with key staff at the country and regional levels around their ICT use, needs and challenges, and pulled together information on the national ICT context for each country.
The first section of the report explains the concept of ‘ICT enabled development’ and why it is important for Plan and other development organizations to take on board. “With so many ICT tools and applications now available, the job of a development organization is no longer to compensate for lack of access but to find innovative and effective ways of putting the tools to development ends. This means not only developing separate projects to install ICTs in under-served communities, but looking at key development challenges and needs with an ICT eye, asking ‘how could ICTs help to overcome this problem’?”
Drawing on the research, conversations, workshop input and feedback from staff, and documented experience using ICTs in Plan’s work, Hannah created a checklist with 10 key areas to think about when planning ICT-enabled development efforts.
Context Analysis: what is happening with ICT (for development) in the country or region?
Defining the need: what problems can ICT help overcome? what opportunities can it create?
Choosing a strategy: what kind of ICT4D is needed? direct? internal? strategic?
Undertaking a participatory communications assessment: who will benefit from this use of ICT and how?
Choosing the technology: what ICTs/applications are available to meet this need or goal?
Adjusting the content: can people understand and use the information provided for and by the ICTs?
Building and using capacity: what kind of support will people need to use and benefit from the ICT, and to innovate around it?
Monitoring progress: how do you know if the ICT is helping meet the development goal or need?
Keeping it going: how can you manage risks and keep up with changes?
Learning from each other: what has been done before, and what have you learned that others could use?
The checklist helps to ensure that ICT use is linked to real development needs and priorities and appropriate for those who are participating in an initiative or a project. The report elaborates on the 10 key areas with detailed observations, learning and examples to illustrate them and to help orient others who are working on similar initiatives. It places the checklist into a 4-stage process for ICT integration.
Understanding the context for ICT work: includes external context and internal experience and capacity
Finding a match between priorities and possibilities: rooting the system in local needs and priorities and finding good uses for tools and applications
Planning and implementing concrete initiatives: carrying out participatory assessments, linking to other development processes and addressing technical issues and concerns
Building a culture of systematic, sustained and strategic use of ICTs: linking ICTs with program work, transforming the role of ‘the ICT guy’, and building expertise on the cultural and social aspects of ICT use
Additional material and case studies, ICT country briefings, and an overview of Plan’s current work with ICT4D in Africa are offered at the end of the report.
The report includes input from Plan staff in Ghana, Mali, Mozambique, Senegal and Uganda who participated in the ICT4D workshops. It also draws heavily on some of the work that Mika has been doing in Finland and Kenya, and work that I’ve been involved in and have written about in Mali, Cameroon, Mozambique, Ghana, Benin and Kenya involving staff, community members and community youth. You can contact Mika to get the workshop methodology in French or English or to comment on the report (ict4d [at] plan [dot] fi).
There’s so much rich material in the report that I almost want to summarize the whole thing here on my blog, section by section, so that people will take the time to read it… I think this is a really important and useful piece of work and we’re very excited that it’s now available! Download it here.
My learning highlights for the week were in the area of m4D (mobiles for development) and ICT4D (information and communications technology for development):
World Bank Open Data. The Bank is really moving towards opening up their data. They currently have over 2000 websites and they are trying to consolidate them and make it easier for users to access the World Bank’s Data for their own purposes. The Bank has put more than 1,200 indicators, including the full World Development Indicators dataset, on the site. In addition, there are a variety of maps, dynamic graphs where you can compare data sets, and widgets for you to add information to your own website. Check the World Bank Open Data site for more.
UN Global Pulse. Over at Global Pulse the team is looking at existing indicators from UN agencies and others and trying to figure out how they can tap into human behavior patterns for early detection of crisis and as a way of quickly investigating and responding to such crises. In this age of real-time information, it’s somewhat bizarre that large development organizations are working based on extrapolations of data that are 2-3 years old. Global Pulse hopes to change that by identifying and tracking a series of pulse points, such as satellite data, mobile phone and SMS trends, internet and search word trends, increase and decrease of doctor visits and medication sales, and other human behaviors; that can serve as early warning system for crises. Think Flu Trends but pulling in all kinds of data at the global level. The UN plans to use their own data and the data of others, as well as “data exhaust” from a variety of sources to come up with a new way to predict, mitigate and manage global crises, such as the current food-fuel-finance crisis, and their impact on communities.
Civil Society 2.0 Initiative. The US State Department’s Civil Society 2.0 Initiative is working to address the chasm between what NGOs and local organizations need and what the tech community can provide. The idea is to bring the two sectors together and bridge the gap between them. The initiative would work to identify the local needs and local context, and then help with tools to meet the needs using the available technologies. They are also building toolkits for organizations on how to blog, set up SMS systems, and other common social media activities. The aim is to improve disaster response efforts by balancing between communication and ethical standards, operating procedures, alert systems, and technical capabilities and working in advance of disaster and emergencies so that civil society groups are prepared.
GSMA. I’m not sure where I’ve been hiding but I hadn’t heard about GSM Association before. GSMA represents the interests of the worldwide mobile operators. They have around 800 members from 219 countries. GSMA engages in policy debate with governments and regulators and advises mobile operators on ways to move their core business forward. GSMA has done a lot of research on women and how to market sales of mobile phones to women, especially in those countries where women are lagging behind in mobile phone ownership. They were part of the Women and Mobile: a Global Opportunity study. GSMA is working with mobile operators on mobile banking in some 147 countries, which I find a bit mind-boggling, since I hadn’t heard of them before!
Pesinet. For just about $1/month, Pesinet provides families in Mali with a micro-insurance service. Healthcare agents visit the homes of children enrolled in the program to check height and weight and for any signs of illness. If illness is detected, they arrange for a visit to a clinic. Pesinet covers half the price of medication if needed. Using the Pesinet mobile application, the healthcare agents record information about the patient and send it to a central data base at the clinic. By using mobiles and encouraging preventative healthcare, Pesinet is reaching more children and improving healthcare.
Souktel. In developing countries, finding a job can be extremely difficult, and job boards are not prevalent. Using simple SMS, Souktel has created the JobMatch application which allows a person to create a mini-CV which is uploaded into a data base. Employers can also send out job notices which people can receive by text message, in order to connect to those jobs that match their skills.
Priyanka Matanhelia’s research on mobiles in Mumbai and Kanpur, India showed that young people in both the cities used cell phones for a variety of communication, news and entertainment needs. They used cell phones to negotiate independence from parents and to maintain friendships and create friendships with members of opposite sex. The young people in the two cities used mobiles differently due to the differences in their lifestyles and socio-cultural factors, however there were only a few gender differences in the use of cell phones.
The best part of the week was meeting up with old friends, and tweeting up with people I have been conversing with for months, even years, on Twitter and through emails and blogs. New York is like a real-life Twitter. There is always something happening, you meet brilliant, intelligent, creative and energized people from all fields and walks of life, and you learn and discuss and constantly broaden your horizons.
That 20 minute Friday afternoon nap in the sun at Sheep’s Meadow in Central Park wasn’t so bad either. I really do love New York….
The urban and digital environments are the 21st century’s fastest-growing spheres. Both offer enormous potential for girls around the world, but prejudice and poverty exclude millions of girls from taking advantages of the transformative possibilities that cities and information and communication technologies (ICTs) can offer. Exploitation and the threat of violence exist in both urban spaces and in cyberspace, especially for the most marginalized and vulnerable girls.
The piece that I’m most interested is the segment on Girls and ICTs, since that’s the main area I currently work on. (Disclosure: I contributed to the development of the chapter). To give you a taste of what’s in the report, here’s a summary of Chapter 4: Adolescent girls and communications technologies – opportunity or exploitation. You can download the full report here.
Chapter 4’s introduction explains that online behaviors mimic offline behaviors. Empowerment and abuse of girls reveals itself through technology as it does in other areas of girls’ lives. Through girls own voices, expert opinion and original research, the report highlights the positive and negative consequences of ICTs, in particular mobile phones and the Internet. The authors talk about the positive ideas and new ways of thinking that ICTs open up for girls in terms of learning, networking, campaigning and personal development. They then discuss the darker side of technology — how cyberspace makes it easier for sexual predators to operate with impunity, where girls are prime targets for abuse, and where girls are sometimes perpetrators themselves.
Section Two offers girl-related statistics on the digital revolution and the digital divide and highlights the enormous variation between and within countries in terms of digital access, and the gaps between rich and poor, male and female, urban and rural. The report cautions that excluding girls from the digital revolution will have consequences on their growth and development. For additional global ICT statistics (1998-2009) see this post at ICT4D blog. Another resource on mobiles and women is the Cherie Blair study.
Section Three describes and provides statistics around 7 important reasons that ICTs are important to adolescent girls:
To keep in touch with others and reduce isolation in countries where this is an issue
To further their education and acquire new skills
To take an active part in their communities and countries
In order to have the skills to find work
To build specific skills and knowledge on subjects they might otherwise not know about, such as HIV and AIDS
Because evidence has shown that learning to use these technologies can build self-esteem
In order to keep safe
Section Four goes in depth around ways that adolescent girls compete with adolescent boys for the most use of communications technologies such as mobiles and the Internet, but that often they are using them for different reasons and different purposes. Most of the available research for this chapter is from the ‘North’, yet the studies indicate that girls tend to use ICTs for communication and boys tend toward a focus on the technology itself. Studies on this from the ‘South’ are unavailable to date.
When girls are treated as real partners....
Section Five discusses the barriers that keep adolescent girls from accessing ICTs. In other words, if the importance of ICTs has been established, girls are willing and able and keen to use ICTs, then what prevents them from having equal access to ICTs? Some of the issues that the chapter discusses are those of power and control.
‘I can immediately call the wholesale market to inquire about prices and place direct orders. I am now recognized as a businesswoman, growing and selling sesame seeds, not just as somebody’s wife or sister,’ said a woman in India.
‘You’re a girl – a mobile can cause many problems, and so you don’t need it,’ said the father of a Palestinian girl.
Girls’ access to technology is limited by their societies, communities and families. In patriarchal societies where men control technology, girls and women simply have less access, because ICT’s confer power on the user. Even in educational settings, a study found that boys tend to hog available ICTs. Teachers have distinct expectations from boys vs. girls. Girls also don’t tend to go into the field of ICTs or want to have ICT careers, since the field is typically a male field. ‘Technology appears to be marketed by men for men. It’s time we started switching bright and talented girls on to science and technology,’ comments a British government official.
Women and girls in developing countries however are not receiving the basic education and training that they need to be ready technology adopters. They are seen as users and receivers of technology, not as innovators involved in technology design and development. Once they are computer literate, however, many young women see the computer industry as a route to independence. The report offers statistics on the numbers of young women in countries like South Africa, India, Malaysia and Brazil who are working in the ICT related industries and professions.
What stops girls from using technology?
There are seven key factors that prevent girls from taking advantage of technology:
Discrimination – girls are still viewed as second-class citizens in many societies.
Numbers – boys both outnumber girls and tend to dominate access to computers.
Confidence – because they don’t have equal access at school, girls may be less confident than boys when it comes to going into IT jobs because they don’t feel they have the same skills and knowledge as the young men competing for the jobs.
Language – in order to use these technologies, English is usually a requirement, and for girls with only basic literacy in their own language, this is a major barrier.
Time – girls’ domestic roles, even at a young age, mean they have less free time than boys to explore and experiment with new technologies.
Money – girls are less likely than their brothers to have the financial resources to pay for, say, a mobile phone and its running costs, or access to the web in an internet café.
Freedom – boys are also more likely to be allowed to use internet cafés because parents are concerned about their daughters going out on their own.
Section Six digs into the dark side of cyberspace and the risks that adolescent are exposed to at a time of their lives when they are beginning to develop sexually. One in 5 women report having been sexually abused before the age of 15, according to the authors. The Internet by and large is simply a new medium for old kinds of bad behavior, however; and new technologies simply extend the possibility of abuse to new arenas. Girls who are not even using the Internet are still vulnerable, given that a photo of them can be taken and posted by someone else even if they have no computer access. Cyberbullying and cyberharrassment are other risks that girls face.
Many young people and youth organizations are active in facing these risks and protecting themselves, and various campaigns exist to help adolescent girls be more aware of how to protect themselves while using ICTs. New technology can itself also be a tool to help with counter-trafficking efforts. The chapter outlines some of the different efforts being made to protect girls online, and emphasizes the role of parents and schools in discussing on-line use and being supportive as girls begin exploring cyberspace.
There is a quite broad set of recommendations for a wide array of actors at the end of Chapter 4 that could be taken up, contextualized and fleshed out by different parties or stakeholders into specific calls to action:
Brazilian girls in a digital world. As an annex to Chapter 4 on ICTs, new research with 49 boys and 44 girls, aged 10-14 examines adolescent girls’ rights and protection in Brazil within the context of ICTs. ICT use is growing exponentially in Brazil, particularly among 15-17 year olds, where between 2005 and 2008, ICT usage went from 33.7 to 62.9 percent. The study covers use pattern, links between on-line and off-line behavior, and on-line safety.
Conclusions. The report concludes by calling for greater knowledge about ICT-related sexual exploitation and violence against girls, more emphasis on prevention and stronger international standards. It also points out that girls need to be empowered to use new communications technologies safely, on their own terms, and in ways that promote their development and build their futures.
Call to action for September 22: As part of the launch of the Because I am a Girl Report, Plan is calling for International Day of the Girl to be established on September 22. You can sign the petition here.
Coming from the viewpoint that accountability and transparency, citizen engagement and public debate are critical for good development, I posted yesterday on 5 ways that ICTs can support the MDGs. I got to thinking I would be remiss not to also post something on ways that ICTs (information and communication technologies) and poor or questionable use of ICTs and social media can hinder development.
It’s not really the fault of the technology. ICTs are tools, and the real issues lie behind the tools — they lie with people who create, market and use the tools. People cannot be separated from cultures and societies and power and money and politics. And those are the things that tend to hinder development, not really the ICTs themselves. However the combination of human tendencies and the possibilities ICTs and social media offer can can sometimes lead us down a shaky path to development or actually cause harm to the people that we are working with.
When do I start getting nervous about ICTs and social media for social good?
1) When the hype wins out over the real benefits of the technology. Sometimes the very idea of a cool and innovative technology wins out over an actual and realistic analysis of its impact and success. Here I pose the cases of the so-called Iran Twitter Revolution and One Laptop per Child (and I’ll throw in Play Pumps for good measure, though it’s not an ICT project, it’s an acknowledged hype and failure case). There are certainly other excellent examples. So many examples in fact that there are events called Fail Faires being organized to discuss these failures openly and learn how to avoid them in the future.
2) When it’s about the technology, not the information and communications needs. When you hear someone say “We want to do an mHealth project” or “We need to have a Facebook page” or “We have a donor who wants to give us a bunch of mobile phones–do you know of something we can do with them?” you can be pretty sure that you have things backwards and are going to run into trouble down the road, wasting resources and energy on programs that are resting on weak foundations. Again, we can cite the One Laptop per Child (OLPC) initiative, where you have a tool, but the context for using it isn’t there (connectivity, power, teacher training and content). There is debate whether OLPC was a total failure or whether it paved the way for netbooks, cheap computers and other technologies that we use today. I’ll still say that the grand plan of OLPC: a low-cost laptop for every child leading to development advances; had issues from the start because it was technology led.
3) When technology is designed from afar and parachuted in. If you don’t regularly involve people who will use your new technology, in the context where you’re planning for it to be used, you’re probably going to find yourself in a bind. True for ICTs and for a lot of other types of innovations out there. There’s a great conversation on Humanitarian Design vs. Design Imperialism that says it all. ICTs are no different. Designing information and communication systems in one place and imposing them on people in another place can hinder their uptake and/or waste time and money that could be spent in other ways that would better contribute to achieving development goals.
4) When the technology is part of a larger hidden agenda. I came across two very thought-provoking posts this week: one on the US Government’s Internet Freedom agenda and another from youth activists in the Middle East and North Africa region who criticize foundations and other donors for censoring their work when it doesn’t comply with US foreign policy messages. Clearly there are hidden political agendas at work which can derail the use of ICTs for human rights work and build mistrust instead of democracy. Another example of a potential hidden agenda is donation of proprietary hardware and software by large technology companies to NGOs and NGO consortia in order to lock in business (for example mHealth or eHealth) and prevent free and open source tools from being used, and which end up being costly to maintain, upgrade and license in the long-term.
5) When tech innovations put people and lives at risk. I’d encourage you to read this story about Haystack, a software hyped as a way to circumvent government censorship of social media tools that activists use to organize. After the US government fast-tracked it for use in Iran, huge security holes were found that could put activists in great danger. In our desire to see things as cool, cutting edge, and perhaps to be seen as cool and cutting edge ourselves, those of us suggesting and promoting ICTs for reporting human rights abuses or in other sensitive areas of work can cause more harm than we might imagine. It’s dangerous to push new technologies that haven’t been properly piloted and evaluated. It’s very easy to get caught up in coolness and forget the nuts and bolts and the time it takes to develop and test something new.
6) When technologists and humanitarians work in silos. A clear example of this might be the Crisis Camps that sprung up immediately after the Haiti Earthquakes in 2010. The outpouring of good will was phenomenal, and there were some positive results. The tech community got together to see how to help, which is a good thing. However the communication between the tech community and those working on the ground was not always conducive to developing tech solutions that were actually helpful. Here is an interesting overview by Ethan Zuckerman of some of the challenges the Crisis Commons faced. I remember attending a Crisis Camp and feeling confused about why one guy was building an iPhone application for local communities to gather data. Cool application for sure, but from what people I knew on the ground were saying, most people in local communities in Haiti don’t have iPhones. With better coordination among the sectors, people could put their talents and expertise to real use rather than busy work that makes them feel good.
7) When short attention spans give rise to vigilante development interventions. Because most of us in the West no longer have a full attention span (self included here), we want bite sized bits of information. But the reality of development is complicated, complex and deep. Social media has been heralded as a way to engage donors, supporters and youth; as a way to get people to help and to care. However the story being told has not gotten any deeper or more realistic in most cases than the 30 second television commercials or LiveAid concerts that shaped perceptions of the developing world 25 years ago. The myth of the simple story and simple solution propagates perhaps even further because of how quickly the message spreads. This gives rise to public perception that aid organizations are just giant bureaucracies (kind of true) and that a simple person with a simple idea could just go in and fix things without so much hullabaloo (not the case most of the time). The quick fix culture, supported and enhanced by social media, can be detrimental to the public’s patience with development, giving rise to apathy or what I might call vigilante development interventions — whereby people in the West (cough, cough, Sean Penn) parachute into a developing country or disaster scene to take development into their own hands because they can’t understand why it’s not happening as fast as the media tells them it should.
8 ) When DIY disregards proven practice. In line with the above, there are serious concerns in the aid and development community about the ‘amateurization’ of humanitarian and development work. The Internet allows people to link and communicate globally very easily. Anyone can throw up a website or a Facebook page and start a non-profit that way, regardless of their understanding of the local dynamics or good development practices built through years of experience in this line of work. Many see criticism from development workers as a form of elitism rather than a call for caution when messing around in other people’s lives or trying to do work that you may not be prepared for or have enough understanding about. The greater awareness and desire to use ‘social media for social good’ may be a positive thing, but it may also lead to good intentions gone awry and again, a waste of time and resources for people in communities, or even harm. There’s probably no better example of this phenomenon than #1millionshirts, originally promoted by Mashable, and really a terrible idea. See Good Intents for discussion around this phenomenon and tools to help donors educate themselves.
9) When the goal is not development but brand building through social media.Cause campaigns have been all the rage for the past several years. They are seen as a way for for-profit companies and non-profits to join together for the greater good. Social media and new ICTs have helped this along by making cause campaigns cheap and easy to do. However many ‘social media for social good’ efforts are simply bad development and can end up actually doing ‘social harm’. Perhaps a main reason for some of the bad ideas is that most social media cause campaigns are not actually designed to do social good. As Mashable says, through this type of campaign, ‘small businesses can gain exposure without breaking the bank, and large companies can reach millions of consumers in a matter of hours.’ When ‘social good’ goals are secondary to the ‘exposure for my brand’ goals, I really question the benefits and contribution to development.
10) When new media increases voyeurism, sensationalism or risk. In their rush to be the most innovative or hard-hitting in the competition for scarce donor dollars, organizations sometimes expose communities to child protection risks or come up with cutesy or edgy social media ideas that invade and interrupt people’s lives; for example, ideas like putting a live web camera in a community so that donors can log on 24/7 and see what’s happening in a ‘real live community.’ (This reminds me a bit of the Procrastination Pit’s 8 Cutest and Weirdest Live Animal Cams). Or when opportunities for donors to chat with people in communities become gimmicks and interrupt people in communities from their daily lives and work. Even professional journalists sometimes engage in questionable new media practices that can endanger their sources or trivialize their stories. With the Internet, stories stick around a lot longer and travel a lot farther and reach their fingers back to where they started a lot more easily than they used to. Here I will suggest two cases: Nick Kristof’s naming and fully identifying a 9-year-old victim of rape in the DRC and @MacClelland’s ‘live tweeting’ for Mother Jones of a rape survivor’s visit to the doctor in Haiti.
Update: Feb 22, 2011 – adding a 10a!
10a) When new media and new technologies put human rights activists at risk of identification and persecution. New privacy and anonymity issues are coming up due to the increasing ubiquity of video for human rights documenting. This was clearly seen in the February 2011 uprisings in Egypt, Tunisia, Libya, Bahrain and elsewhere. From Sam Gregory’s excellent piece on privacy and anonymity in the digital age: “In the case of video (or photos), a largely unaddressed question arises. What about the rights to anonymity and privacy for those people who appear, intentionally or not, in visual recordings originating in sites of individual or mass human rights violations? Consider the persecution later faced by bystanders and people who stepped in to film or assist Neda Agha-Soltan as she lay dying during the election protests in Iran in 2009. People in video can be identified by old-fashioned investigative techniques, by crowd-sourcing (as with the Iran example noted above…) or by face detection/recognition software. The latter is now even built into consumer products like the Facebook Photos, thus exposing activists using Facebook to a layer of risk largely beyond their control.”
11) When ICTs and new media turn activism to slacktivism. Quoting from Evgeny Morozov, “slacktivism” is the ideal type of activism for a lazy generation: why bother with sit-ins and the risk of arrest, police brutality, or torture if one can be as loud campaigning in the virtual space? Given the media’s fixation on all things digital — from blogging to social networking to Twitter — every click of your mouse is almost guaranteed to receive immediate media attention, as long as it’s geared towards the noble causes. That media attention doesn’t always translate into campaign effectiveness is only of secondary importance.” Nuff said.
I’ll leave you with this kick-ass Le Tigre Video: Get off the Internet.… knowing full well that I’m probably the first one who needs to take that advice.
‘It feels so 80s… or early 90s… to be political… where are my friends? GET OFF THE INTERNET, I’ll meet you in the streets….’
I work on digital development research, strategy and evaluation with an emphasis on responsible data use, inclusion, gender, and children and young people. I support organizations to develop, implement, and engage staff and partners in responsible data policy and practice. I enjoy facilitating and moderating convenings, workshops and learning-focused events.
I’m affiliated with:
The MERL Tech Initiative: I founded The MERL Tech Initiative, which sits at the intersection of digital technology and the social sector. We support thoughtful tech-enabled program design, implementation, and monitoring, evaluation, research and learning (MERL). We convene communities to share good practice and improve programmatic outcomes. We advocate for responsible, ethical, realistic approaches that center people, communities and societies. My consulting practice is under The MERL Tech Initiative umbrella.
Technology Salon:Technology Salon is an intimate, informal, and in person, discussion among information and communication technology experts and international development professionals. Technology Salons happen in various cities. I convene the NYC Technology Salon. Technology Salon is the non-profit arm of The MERL Tech Initiative, enabling The MERL Tech Initiative to accept 501c3 funding.
This is a personal blog that does not represent official views of my current, past or future employers, affiliates or other organizations with whom I engage. Any opinions expressed herein are my own, and I take responsibility for them.