Feeds:
Posts
Comments

Archive for the ‘protection’ Category

At the November 8th Technology Salon in New York City, we looked at the role of ICTs in communication for development (C4D) initiatives with marginalized adolescent girls. Lead discussants Kerida McDonald and Katarzyna Pawelczyk discussed recent UNICEF reports related to the topic, and John Zoltner spoke about FHI360’s C4D work in practice.

To begin, it was pointed out that C4D is not donor communications or marketing. It is the use of communication approaches and methodologies to achieve influence at various levels —  e.g., family, institutional and policy —  to change behavior and social norms. C4D is one approach that is being used to address the root causes of gender inequality and exclusion.

Screen Shot 2013-10-11 at 7.24.48 AMAs the UNICEF report on ICTs and C4D* notes, girls may face a number of situations that contribute to and/or are caused by their marginalization: early pregnancy, female genital cutting, early marriage, high rates of HIV/AIDS, low levels of education, lack of control over resources. ICTs alone cannot resolve these, because there is a deep and broad set of root causes. However, ICTs can be integrated systematically into the set of C4D tools and approaches that contribute to positive change.

Issues like bandwidth, censorship and electricity need to be considered when integrating ICTs into C4D work, and approaches that fit the context need to be developed. Practitioners should use tools that are in the hands of girls and their communities now, yet be aware of advances in access and new technologies, as these change rapidly.

Key points:

Interactivity is more empowering than one-way messaging:  Many of the ICT solutions being promoted today focus on sending messages out via mobile phones. However C4D approaches aim for interactivity and multi-channel, multi-directional communication, which has proven more empowering.

Content: Traditional media normally goes through a rigorous editorial process and it is possible to infuse it with a gender balance. Social media does not have the same type of filters, and it can easily be used to reinforce stereotypes about girls. This is something to watch and be aware of.

Purpose: It’s common with ICT-related approaches to start with the technology rather than starting with the goals. As one Salon participant asked “What are the results we want to see for ourselves? What are the results that girls want to see? What are the root causes of discrimination and how are we trying to address them? What does success look like for girls? For organizations? Is there a role for ICTs in helping achieve success? If so, what is it?” These questions need to be the starting point, rather than the technology.

Participation: One Salon participant mentioned a 2-year project that is working together with girls to define their needs and their vision of success. The process is one co-design, and it is aimed at understanding what girls want. Many girls expressed a feeling of isolation and desire for connection, and so the project is looking at how ICTs can help them connect. As the process developed, the diversity of needs became very clear and plans have changed dramatically based on input from a range of girls from different contexts. Implementors need to be prepared to change, adapt and respond to what girls say they want and to local realities.

****

Screen Shot 2013-11-23 at 10.41.22 PMA second study commissioned by UNICEF explores how young people use social media. The researchers encountered some challenges in terms of a strong gender approach for the study. Though a gender lens was used for analysis, there is little available data disaggregated by sex. The study does not focus on the most marginalized, because it looks at the use of social media, which normally requires a data connection or Internet access, which the most marginalized youth usually do not have.

The authors of the report found that youth most commonly used the Internet and social media for socializing and communicating with friends. Youth connected less often for schoolwork. One reason for this may be that in the countries/contexts where the research took place, there is no real integration of ICTs into the school system. It was emphasized that the  findings in the report are not comparable or nationally representative, and blanket statements such as “this means x for the whole developing world” should be avoided.

Key points:

Self-reporting biases. Boys tend to have higher levels of confidence and self-report greater ICT proficiency than girls do. This may skew results and make it seem that boys have higher skill levels.

Do girls really have less access? We often hear that girls have less access than boys. The evidence gathered for this particular report found that “yes and no.” In some places, when researchers asked “Do you have access to a mobile,” there was not a huge difference between urban and rural or between boys and girls. When they dug deeper, however, it became more complex. In the case of Zambia, access and ownership were similar for boys and girls, but fewer girls were connecting at all to the Internet as compared to boys. Understanding connectivity and use was quite complicated.

What are girls vs. boys doing online? This is an important factor when thinking about what solutions are applicable to which situation(s). Differences came up here in the study. In Argentina, girls were doing certain activities more frequently, such as chatting and looking for information, but they were not gaming. In Zambia, girls were doing some things less often than boys; for example, fewer girls than boys were looking for health information, although the number was still significant. A notable finding was that both girls and boys were accessing general health information more often than they were accessing sensitive information, such as sexual health or mental health.

What are the risks in the online world? A qualitative portion of the study in Kenya used focus groups with girls and boys, and asked about their uses of social media and experience of risk. Many out-of-school girls aged 15-17 reported that they used social media as a way to meet a potential partner to help them out of their financial situation. They reported riskier behavior, contact with older men, and relationships more often than girls who were in school. Girls in general were more likely to report unpleasant online encounters than boys, for example, request for self-exposure photos.

Hiding social media use. Most of the young people that researchers spoke with in Kenya were hiding social media use from their parents, who disapproved of it. This is an important point to note in C4D efforts that plan on using social media, and program designers will want to take parental attitudes about different media and communication channels into consideration as they design C4D programs.

****

When implementing programs, it is noteworthy how boys and girls tend to use ICT and media tools. Gender issues often manifest themselves right away. “The boys grab the cameras, the boys sit down first at the computers.” If practitioners don’t create special rules and a safe space for girls to participate, girls may be marginalized. In practical ICT and media work, it’s common for boys and girls to take on certain roles. “Some girls like to go on camera, but more often they tend to facilitate what is being done rather than star in it.” The gender gap in ICT access and use, where it exists, is a reflection of the power gaps of society in general.

In the most rural areas, even when people have access, they usually don’t have the resources and skills to use ICTs.  Very simple challenges can affect girls’ ability to participate in projects, for example, oftentimes a project will hold training at times when it’s difficult for girls to attend. Unless someone systematically goes through and applies a gender lens to a program, organizations often don’t notice the challenges girls may face in participating. It’s not enough to do gender training or measure gender once a year; gendered approaches needs to be built into program design.

Long-terms interventions are needed if the goal is to emancipate girls, help them learn better, graduate, postpone pregnancy, and get a job. This cannot be done in a year with a simple project that has only one focus, because girls are dealing with education, healthcare, and a whole series of very entrenched social issues. What’s needed is to follow a cohort of girls and to provide information and support across all these sectors over the long-term.

Key points:

Engaging boys and men: Negative reactions from men are a concern if and when girls and women start to feel more empowered or to access resources. For example, some mobile money and cash transfer programs direct funds to girls and women, and some studies have found that violence against women increases when women start to have more money and more freedom. Another study, however, of a small-scale effort that provides unconditional cash transfers to girls ages 18-19 in rural Kenya, is demonstrating just the opposite: girls have been able to say where money is spent and the gender dynamics have improved. This raises the question of whether program methodologies need to be oriented towards engaging boys and men and involving them in changing gender dynamics, and whether engaging boys and men can help avoid an increase in violence. Working with boys to become “girl champions” was cited as a way to help to bring boys into the process as advocates and role models.

Girls as producers, not just consumers. ICTs are not only tools for sending content to girls. Some programs are working to help girls produce content and create digital stories in their own languages. Sometimes these stories are used to advocate to decision makers for change in favor of girls and their agendas. Digital stories are being used as part of research processes and to support monitoring, evaluation and accountability work through ‘real-time’ data.

ICTs and social accountability. Digital tools are helping young people address accountability issues and inform local and national development processes. In some cases, youth are able to use simple, narrow bandwidth tools to keep up to date on actions of government officials or to respond to surveys to voice their priorities. Online tools can also lead to offline, face-to-face engagement. One issue, however, is that in some countries, youth are able to establish communication with national government ministers (because there is national-level capacity and infrastructure) but at local level there is very little chance or capability for engagement with elected officials, who are unprepared to respond and engage with youth or via social media. Youth therefore tend to bypass local government and communicate with national government. There is a need for capacity building at local level and decentralized policies and practices so that response capacity is strengthened.

Do ICTs marginalize girls? Some Salon participants worried that as conversations and information increasingly move to a digital environment, ICTs are magnifying the information and communication divide and further marginalizing some girls. Others felt that the fact that we are able to reach the majority of the world’s population now is very significant, and the inability to reach absolutely everyone doesn’t mean we should stop using ICTs. For this very reason – because sharing of information is increasingly digital – we should continue working to get more girls online and strengthen their confidence and abilities to use ICTs.

Many thanks to UNICEF for hosting the Salon!

(Salons operate under Chatham House Rule, thus no attribution has been given in the above summary. Sign up here if you’d like to attend Salons in the future!)

*Disclosure: I co-authored this report with Keshet Bachan.

Read Full Post »

This is a guest post from Anna Crowe, Research Officer on the Privacy in the Developing World Project, and  Carly Nyst, Head of International Advocacy at Privacy International, a London-based NGO working on issues related to technology and human rights, with a focus on privacy and data protection. Privacy International’s new report, Aiding Surveillance, which covers this topic in greater depth was released this week.

by Anna Crowe and Carly Nyst

NOV 21 CANON 040

New technologies hold great potential for the developing world, and countless development scholars and practitioners have sung the praises of technology in accelerating development, reducing poverty, spurring innovation and improving accountability and transparency.

Worryingly, however, privacy is presented as a luxury that creates barriers to development, rather than a key aspect to sustainable development. This perspective needs to change.

Privacy is not a luxury, but a fundamental human right

New technologies are being incorporated into development initiatives and programmes relating to everything from education to health and elections, and in humanitarian initiatives, including crisis response, food delivery and refugee management. But many of the same technologies being deployed in the developing world with lofty claims and high price tags have been extremely controversial in the developed world. Expansive registration systems, identity schemes and databases that collect biometric information including fingerprints, facial scans, iris information and even DNA, have been proposed, resisted, and sometimes rejected in various countries.

The deployment of surveillance technologies by development actors, foreign aid donors and humanitarian organisations, however, is often conducted in the complete absence of the type of public debate or deliberation that has occurred in developed countries. Development actors rarely consider target populations’ opinions when approving aid programmes. Important strategy documents such as the UN Office for Humanitarian Affairs’ Humanitarianism in a Networked Age and the UN High-Level Panel on the Post-2015 Development Agenda’s A New Global Partnership: Eradicate Poverty and Transfer Economies through Sustainable Development give little space to the possible impact adopting new technologies or data analysis techniques could have on individuals’ privacy.

Some of this trend can be attributed to development actors’ systematic failure to recognise the risks to privacy that development initiatives present. However, it also reflects an often unspoken view that the right to privacy must necessarily be sacrificed at the altar of development – that privacy and development are conflicting, mutually exclusive goals.

The assumptions underpinning this view are as follows:

  • that privacy is not important to people in developing countries;
  • that the privacy implications of new technologies are not significant enough to warrant special attention;
  • and that respecting privacy comes at a high cost, endangering the success of development initiatives and creating unnecessary work for development actors.

These assumptions are deeply flawed. While it should go without saying, privacy is a universal right, enshrined in numerous international human rights treaties, and matters to all individuals, including those living in the developing world. The vast majority of developing countries have explicit constitutional requirements to ensure that their policies and practices do not unnecessarily interfere with privacy. The right to privacy guarantees individuals a personal sphere, free from state interference, and the ability to determine who has information about them and how it is used. Privacy is also an “essential requirement for the realization of the right to freedom of expression”. It is not an “optional” right that only those living in the developed world deserve to see protected. To presume otherwise ignores the humanity of individuals living in various parts of the world.

Technologies undoubtedly have the potential to dramatically improve the provision of development and humanitarian aid and to empower populations. However, the privacy implications of many new technologies are significant and are not well understood by many development actors. The expectations that are placed on technologies to solve problems need to be significantly circumscribed, and the potential negative implications of technologies must be assessed before their deployment. Biometric identification systems, for example, may assist in aid disbursement, but if they also wrongly exclude whole categories of people, then the objectives of the original development intervention have not been achieved. Similarly, border surveillance and communications surveillance systems may help a government improve national security, but may also enable the surveillance of human rights defenders, political activists, immigrants and other groups.

Asking for humanitarian actors to protect and respect privacy rights must not be distorted as requiring inflexible and impossibly high standards that would derail development initiatives if put into practice. Privacy is not an absolute right and may be limited, but only where limitation is necessary, proportionate and in accordance with law. The crucial aspect is to actually undertake an analysis of the technology and its privacy implications and to do so in a thoughtful and considered manner. For example, if an intervention requires collecting personal data from those receiving aid, the first step should be to ask what information is necessary to collect, rather than just applying a standard approach to each programme. In some cases, this may mean additional work. But this work should be considered in light of the contribution upholding human rights and the rule of law make to development and to producing sustainable outcomes. And in some cases, respecting privacy can also mean saving lives, as information falling into the wrong hands could spell tragedy.

A new framing

While there is an increasing recognition among development actors that more attention needs to be paid to privacy, it is not enough to merely ensure that a programme or initiative does not actively harm the right to privacy; instead, development actors should aim to promote rights, including the right to privacy, as an integral part of achieving sustainable development outcomes. Development is not just, or even mostly, about accelerating economic growth. The core of development is building capacity and infrastructure, advancing equality, and supporting democratic societies that protect, respect and fulfill human rights.

The benefits of development and humanitarian assistance can be delivered without unnecessary and disproportionate limitations on the right to privacy. The challenge is to improve access to and understanding of technologies, ensure that policymakers and the laws they adopt respond to the challenges and possibilities of technology, and generate greater public debate to ensure that rights and freedoms are negotiated at a societal level.

Technologies can be built to satisfy both development and privacy.

Download the Aiding Surveillance report.

Read Full Post »

This post was originally published on the Open Knowledge Foundation blog

A core theme that the Open Development track covered at September’s Open Knowledge Conference was Ethics and Risk in Open Development. There were more questions than answers in the discussions, summarized below, and the Open Development working group plans to further examine these issues over the coming year.

Informed consent and opting in or out

Ethics around ‘opt in’ and ‘opt out’ when working with people in communities with fewer resources, lower connectivity, and/or less of an understanding about privacy and data are tricky. Yet project implementers have a responsibility to work to the best of their ability to ensure that participants understand what will happen with their data in general, and what might happen if it is shared openly.

There are some concerns around how these decisions are currently being made and by whom. Can an NGO make the decision to share or open data from/about program participants? Is it OK for an NGO to share ‘beneficiary’ data with the private sector in return for funding to help make a program ‘sustainable’? What liabilities might donors or program implementers face in the future as these issues develop?

Issues related to private vs. public good need further discussion, and there is no one right answer because concepts and definitions of ‘private’ and ‘public’ data change according to context and geography.

Informed participation, informed risk-taking

The ‘do no harm’ principle is applicable in emergency and conflict situations, but is it realistic to apply it to activism? There is concern that organizations implementing programs that rely on newer ICTs and open data are not ensuring that activists have enough information to make an informed choice about their involvement. At the same time, assuming that activists don’t know enough to decide for themselves can come across as paternalistic.

As one participant at OK Con commented, “human rights and accountability work are about changing power relations. Those threatened by power shifts are likely to respond with violence and intimidation. If you are trying to avoid all harm, you will probably not have any impact.” There is also the concept of transformative change: “things get worse before they get better. How do you include that in your prediction of what risks may be involved? There also may be a perception gap in terms of what different people consider harm to be. Whose opinion counts and are we listening? Are the right people involved in the conversations about this?”

A key point is that whomever assumes the risk needs to be involved in assessing that potential risk and deciding what the actions should be — but people also need to be fully informed. With new tools coming into play all the time, can people be truly ‘informed’ and are outsiders who come in with new technologies doing a good enough job of facilitating discussions about possible implications and risk with those who will face the consequences? Are community members and activists themselves included in risk analysis, assumption testing, threat modeling and risk mitigation work? Is there a way to predict the likelihood of harm? For example, can we determine whether releasing ‘x’ data will likely lead to ‘y’ harm happening? How can participants, practitioners and program designers get better at identifying and mitigating risks?

When things get scary…

Even when risk analysis is conducted, it is impossible to predict or foresee every possible way that a program can go wrong during implementation. Then the question becomes what to do when you are in the middle of something that is putting people at risk or leading to extremely negative unintended consequences. Who can you call for help? What do you do when there is no mitigation possible and you need to pull the plug on an effort? Who decides that you’ve reached that point? This is not an issue that exclusively affects programs that use open data, but open data may create new risks with which practitioners, participants and activists have less experience, thus the need to examine it more closely.

Participants felt that there is not enough honest discussion on this aspect. There is a pop culture of ‘admitting failure’ but admitting harm is different because there is a higher sense of liability and distress. “When I’m really scared shitless about what is happening in a project, what do I do?” asked one participant at the OK Con discussion sessions. “When I realize that opening data up has generated a huge potential risk to people who are already vulnerable, where do I go for help?” We tend to share our “cute” failures, not our really dismal ones.

Academia has done some work around research ethics, informed consent, human subject research and use of Internal Review Boards (IRBs). What aspects of this can or should be applied to mobile data gathering, crowdsourcing, open data work and the like? What about when citizens are their own source of information and they voluntarily share data without a clear understanding of what happens to the data, or what the possible implications are?

Do we need to think about updating and modernizing the concept of IRBs? A major issue is that many people who are conducting these kinds of data collection and sharing activities using new ICTs are unaware of research ethics and IRBs and don’t consider what they are doing to be ‘research’. How can we broaden this discussion and engage those who may not be aware of the need to integrate informed consent, risk analysis and privacy awareness into their approaches?

The elephant in the room

Despite our good intentions to do better planning and risk management, one big problem is donors, according to some of the OK Con participants.  Do donors require enough risk assessment and mitigation planning in their program proposal designs? Do they allow organizations enough time to develop a well-thought-out and participatory Theory of Change along with a rigorous risk assessment together with program participants? Are funding recipients required to report back on risks and how they played out? As one person put it, “talk about failure is currently more like a ‘cult of failure’ and there is no real learning from it. Systematically we have to report up the chain on money and results and all the good things happening. and no one up at the top really wants to know about the bad things. The most interesting learning doesn’t get back to the donors or permeate across practitioners. We never talk about all the work-arounds and backdoor negotiations that make development work happen. This is a serious systemic issue.”

Greater transparency can actually be a deterrent to talking about some of these complexities, because “the last thing donors want is more complexity as it raises difficult questions.”

Reporting upwards into government representatives in Parliament or Congress leads to continued aversion to any failures or ‘bad news’. Though funding recipients are urged to be innovative, they still need to hit numeric targets so that the international aid budget can be defended in government spaces. Thus, the message is mixed: “Make sure you are learning and recognizing failure, but please don’t put anything too serious in the final report.” There is awareness that rigid program planning doesn’t work and that we need to be adaptive, yet we are asked to “put it all into a log frame and make sure the government aid person can defend it to their superiors.”

Where to from here?

It was suggested that monitoring and evaluation (M&E) could be used as a tool for examining some of these issues, but M&E needs to be seen as a learning component, not only an accountability one. M&E needs to feed into the choices people are making along the way and linking it in well during program design may be one way to include a more adaptive and iterative approach. M&E should force practitioners to ask themselves the right questions as they design programs and as they assess them throughout implementation. Theory of Change might help, and an ethics-based approach could be introduced as well to raise these questions about risk and privacy and ensure that they are addressed from the start of an initiative.

Practitioners have also expressed the need for additional resources to help them predict and manage possible risk: case studies, a safe space for sharing concerns during implementation, people who can help when things go pear-shaped, a menu of methodologies, a set of principles or questions to ask during program design, or even an ICT4D Implementation Hotline or a forum for questions and discussion.

These ethical issues around privacy and risk are not exclusive to Open Development. Similar issues were raised last week at the Open Government Partnership Summit sessions on whistle blowing, privacy, and safeguarding civic space, especially in light of the Snowden case. They were also raised at last year’s Technology Salon on Participatory Mapping.

A number of groups are looking more deeply into this area, including the Capture the Ocean Project, The Engine Room, IDRC’s research network, The Open Technology InstitutePrivacy InternationalGSMA, those working on “Big Data,” those in the Internet of Things space, and others.

I’m looking forward to further discussion with the Open Development working group on all of this in the coming months, and will also be putting a little time into mapping out existing initiatives and identifying gaps when it comes to these cross-cutting ethics, power, privacy and risk issues in open development and other ICT-enabled data-heavy initiatives.

Please do share information, projects, research, opinion pieces and more if you have them!

Read Full Post »

Screen Shot 2013-10-11 at 7.24.48 AMA paper that Keshet Bachan and I authored for Unicef is now available for your reading pleasure!

Here’s a  summary of what we talk about in the paper:

Social, cultural, economic and political traditions and systems that prevent girls, especially the most marginalized, from fully achieving their rights present a formidable challenge to development organizations. The integration of new Information and Communication Technologies (ICTs) to the Communication for Development (C4D) toolbox offers an additional means for challenging unequal power relations and increasing participation of marginalized girls in social
transformation.

We examine ways that ICTs can strengthen C4D programming by:

  • enhancing girls’ connections, engagement and agency;
  • helping girls access knowledge; and
  • supporting improved governance and service delivery efforts.

We reflect and build on the views of adolescent girls from 13 developing countries who participated in a unique discussion for this paper, and we then provide recommendations to support the integration of ICTs in C4D work with marginalized adolescent girls, including:

  • Girls as active participants in program design. Practitioners should understand local context and ensure that programs use communication channels that are accessible to girls. This will often require multi-channel and multiple platform approaches that reach more marginalized girls who may not have access to or use of ICTs. Programs should be community driven, and real-time feedback from girls should be incorporated to adjust programs to their needs and preferences. Mentoring is a key component of programming with girls, and holistic programs designed together with girls tend towards being more successful.
  • Privacy and protection. Every program should conduct a thorough risk analysis of proposed approaches to ensure that girls are not placed at risk by participating, sharing and consuming information, or publicly holding others to account. Girls should also be supported to make their own informed choices about their online presence and use of ICT devices and platforms. A broader set of stakeholders should be engaged and influenced to help mitigate systemic and structural risks to girls.
  • Research and documentation. The evidence base for use of ICTs in C4D programming with marginalized adolescent girls is quite scarce. Better documentation would improve understanding of what programs are the most effective, and what the real added value of ICTs are in these efforts.
  • Capacity building. Because the integration of ICTs into C4D work is a relatively new area that lacks a consistent methodological framework, organizations should support a comprehensive training process for staff to cover areas such as program design, effective use of new ICT tools in combination with existing tools and methods, and close attention to privacy and risk mitigation.
  • Policy. Programs should use free and open source software. In addition, child protection policies, measures and guidelines should be updated to reflect changes in technology, platforms and information sharing.

The paper was first shared at the 12th Inter-Agency Roundtable on Communication for Development in November 2011. It was then reviewed and updated in August 2012, and released in August 2013 under the title “Integrating Information and Communication Technologies into Communication for Development Strategies to Support and Empower Marginalized Adolescent Girls.”

Download it here!

Read Full Post »

Screen Shot 2013-07-14 at 2.40.51 PMLast week, 600 exceptional youth activists from 80 countries arrived to New York City for a UN Takeover, where they called for urgent action by member states to meet Millennium Development Goal 2 on education by 2015. The youth’s inputs will feed into setting the agenda for global education priorities post-2015. One of the highlights of the week was this inspiring talk by Malala Yousafzai, who made her first public address to the UN on June 12th, her 16th birthday.

Seven of the youth participating in the UN Takeover with the support of Plan joined us as lead discussants for our July 10th Technology Salon. Agung, Dina, and Nurul from Indonesia; Kamanda and Fatmata from Sierra Leone; Tova from Sweden; and Frank from Uganda told us about ICT access and use in their communities and countries. We also heard about their work as youth activists on issues of child marriage, school violence, good governance, and education, and whether ICTs are effective outreach tools for campaigning in their contexts.

The realities of access

In both Sierra Leone and Uganda Internet access is quite difficult. Traveling to Internet cafés in urban areas is too expensive for rural youth to do regularly, and it is unsafe for young women to travel in the evenings. There is not enough equipment in schools and universities, and youth have trouble affording and finding regular access. The majority of primary and secondary schools do not have ICTs, and non-governmental organizations are unable to reach everyone with their programs to supply equipment and training. Although there are often funds given to governments to build computer labs, these tend to benefit urban areas. In some cases projects and funds are used for political gain and personal favors. Even at university level, student access might be limited to 1-2 hours per week at a computer lab, meaning they end up doing almost everything on paper.

Lack of ICT access impacts on job prospects for youth, because jobs exist but employers are seeking people who know how to operate a computer. Many of these job applications have to be submitted online. This puts jobs out of reach of youth in rural areas. Basic infrastructure remains a problem in rural areas. Although telecommunication lines have been laid, electricity for charging mobile phones is still a problem and often electricity is dependent on a solar panel or a generator, making it difficult to run a computer lab or Telecenter.

ICTs are heightening the development divide, noted one Salon participant. In schools near urban areas, parents pay more in tuition and school fees and their children have better ICT access than rural children. This creates inequality. “Students going to these schools have access and they will even study computer science. But when you go to a rural village you might only see one small room where children can access a computer, if anything at all. Teachers themselves don’t know how to use computers.” In cities, parents know ICTs are important. In the rural villages, however, many people are skeptical of technologies. This inequality of access and education means that youth in rural areas and the poor are not able to meet requirements for jobs that use ICTs.

One discussant noted, “It is possible to access Internet through mobile phones. You can use some phones to access Internet, Facebook, etc. In the villages, however, you find that you can only receive calls and make calls. There is no Internet. When I went to Nairobi and saw everyone with smart phones, I wondered, ‘What is wrong with Uganda?’ We don’t have many smart phones.” Another discussant commented that her university has a wide area network, but it is only available to lecturers, not to students.

Most of the youth discussants considered that, among their peer groups, more girls than boys had mobile phones, and more girls were active on the Internet and Facebook.

Access brings concerns

In Indonesia, it was noted, Internet is very available, except for the more remote islands. In Java, commented one discussant, “every young person has a smart phone. They use Facebook and Twitter and can get all kinds of information, and those without smart phones can use Internet cafés.” Internet access, however, is creating new problems. “Parents are proud that their kids are going to the Internet shop to get information, but they also worry about increased access to pornography.” Internet is believed to contribute to an increase in child marriages. The youth discussants said they would like more guidance on how to filter information, know what is true and what is not, use Internet safely, and avoid exposure to offensive content. One discussant from Indonesia mentioned that parents in her community worried that if girls went to Internet cafes or browsed online, they would be exposed to inappropriate materials or prostitution through Facebook.

In Sweden, access to Internet and smart phones is universal. However, parents may buy children a smart phone even if they cannot really afford it. Although many children learn English early because they can easily access Internet, many also do not learn how to write properly because they only use computers.

When phones are available but there is no capacity to purchase them, additional problems also arise. According to one discussant, “Some girls want to have big things before their time.” This can lead to young women offering sex to older men in return for money, fancy phones and airtime.

ICTs in formal education

Youth discussants all said that they are increasingly expected to have access to the Internet and computers in order to complete their school assignments, and they felt this was not a realistic expectation. In one of the youth’s schools in Indonesia, computer class is offered for 4 hours per week and a computer lab is available with 30 desktop computers. In another school in Jakarta, however, every child is expected to have their own laptop. “Our problem is different than in the remote areas. Every teacher in Jakarta thinks that a smart phone or computer is ‘the world in our hands.’ They think we don’t need education about the computer itself. They think we can learn from the Internet how to use computers, and so we have to search and learn this all by ourselves with little guidance.” In Sweden, “if you don’t have Internet access, it will be very difficult to pass a course.”

Effective ways to reach and engage youth in campaigns

Discussants were asked about the communication channels that are most effective for campaigning or engaging youth and communities. In rural Sierra Leone and Uganda, face-to-face was considered the most effective outreach channel for reaching youth and communities, given low levels of access to computers, radios and mobile phones. “Most times our campaigns are face-to-face. We move to communities, we use local language to be sure everyone gets the message,” said one youth discussant. In Jakarta, however, “it’s easy to use online means, it never sleeps. Young people in Jakarta are too lazy to attend workshops. They don’t like to listen to speakers. So we share by social media, like Facebook and Twitter.”

Digital media is only useful in urban areas, said one youth discussant from Sierra Leone. “We mostly use radio to do advocacy and sensitization campaigns. We also do it face-to-face. For secondary schools, we do talks. We tell them about documents signed by government or NGOs, what is in place, what is not in place. We give advice. We talk straight about health, about sex education. You just wait for the light in their eyeball to see if they are understanding. We also do dramas, and we paste up wall bills. We do all of this in our local languages.” Youth groups and youth networks are also useful channels for passing along messages and building support.

Radio is effective in theory, but one discussant noted that in his district, there are only two radio stations. “You take your information or announcement there, and they say they will pass it, but you stay waiting… it’s a challenge.”

Campaigns must also involve engaging local decision makers, a participant noted. Often chiefs do not understand, and they may be the very ones who violate the rights of girls. Youth noted the need to be diplomatic however, or they risk being seen as impolite or trouble-makers. “You have to really risk yourself to do rights work in the community,” noted one discussant. Another commented that having support and buy-in from local leaders is critical in order to be taken seriously. “You need a ‘big voice’ to back you and to convince people to listen to you.”

INGO staff can help legitimize youth work in some cases, but there are also issues. “Local leaders always ask for money,” noted one discussant. “When they hear Plan, UNICEF, Care, Save the Children, they think these organizations gave us money and we’ve taken it for ourselves.” Youth often resort to using external INGO staff as their legitimizing force because “we don’t have other role models, everybody wants money. The politicians say they will help us but then they are always too busy. We have to take the lead ourselves.”

Conflicting information and messages can also be a problem, commented a Salon participant. “One year, it’s the ABC Campaign for HIV prevention, the next it’s condoms, and then it’s prevention. Sometimes youth don’t know who to believe. The NGO says something, the government says something, and local leaders say something else. We need consistency.” In addition, he noted, “INGOs come in with their big range rovers, so of course local leaders and communities think that there is money involved. INGOs need to think more carefully and avoid these conflicting messages.”

What would youth like to see?

Going forward, the youth would like more access, more ICT education, more transparency and accountability in terms of how governments spend funds directed to ICT programs, and more guidance on filtering information and ensuring it’s veracity so that children will not be taken advantage of.

*****

Thanks to the Population Council for hosting us for the Salon! Join us for our next Salon on July 25th: How can we scale Mobiles for Development initiatives? 

The Technology Salon methodology was used for the session, including Chatham House Rule, therefore no attribution has been made in this summary post. Sign up here to receive notifications about upcoming Salons in New York, Nairobi, San Francisco, London and Washington, DC. 

Read Full Post »

The February 5 Technology Salon in New York City asked “What are the ethics in participatory digital mapping?” Judging by the packed Salon and long waiting list, many of us are struggling with these questions in our work.

Some of the key ethical points raised at the Salon related to the benefits of open data vs privacy and the desire to do no harm. Others were about whether digital maps are an effective tool in participatory community development or if they are mostly an innovation showcase for donors or a backdrop for individual egos to assert their ‘personal coolness’. The absence of research and ethics protocols for some of these new kinds of data gathering and sharing was also an issue of concern for participants.

During the Salon we were only able to scratch the surface, and we hope to get together soon for a more in-depth session (or maybe 2 or 3 sessions – stay tuned!) to further unpack the ethical issues around participatory digital community mapping.

The points raised by discussants and participants included:

1) Showcasing innovation

Is digital mapping really about communities, or are we really just using communities as a backdrop to showcase our own innovation and coolness or that of our donors?

2) Can you do justice to both process and product?

Maps should be less an “in-out tool“ and more part of a broader program. External agents should be supporting communities to articulate and to be full partners in saying, doing, and knowing what they want to do with maps. Digital mapping may not be better than hand drawn maps, if we consider that the process of mapping is just as or more important than the final product. Hand drawn maps can allow for important discussions to happen while people draw. This seems to happens much less with the digital mapping process, which is more technical, and it happens even less when outside agents are doing the mapping. A hand drawn map can be imbued with meaning in terms of the size, color or placement of objects or borders. Important meaning may be missed when hand drawn maps are replaced with digital ones.

Digital maps, however, can be printed and further enhanced with comments and drawings and discussed in the community, as some noted. And digital maps can lend a sense of professionalism to community members and help them to make a stronger case to authorities and decisions makers. Some participants raised concerns about power relations during mapping processes, and worried that using digital tools could emphasize those.

3) The ethics of wasting people’s time.

Community mapping is difficult. The goal of external agents should be to train local people so that they can be owners of the process and sustain it in the long term. This takes time. Often, however, mapping experts are flown in for a week or two to train community members. They leave people with some knowledge, but not enough to fully manage the mapping process and tools. If people end up only half-trained and without local options to continue training, their time has essentially been wasted. In addition, if young people see the training as a pathway to a highly demanded skill set yet are left partially trained and without access to tools and equipment, they will also feel they have wasted their time.

4) Data extraction

When agencies, academics and mappers come in with their clipboards or their GPS units and conduct the same surveys and studies over and over with the same populations, people’s time is also wasted. Open digital community mapping comes from a viewpoint that an open map and open data are one way to make sure that data that is taken from or created by communities is made available to the communities for their own use and can be accessed by others so that the same data is not collected repeatedly. Though there are privacy concerns around opening data, there is a counter balanced ethical dilemma related to how much time gets wasted by keeping data closed.

5) The (missing) link between data and action

Related to the issue of time wasting is the common issue of a missing link between data collected and/or mapped, action and results. Making a map identifying issues is certainly no guarantee that the government will come and take care of those issues. Maps are a means to an end, but often the end is not clear. What do we really hope the data leads to? What does the community hope for? Mapping can be a flashy technology that brings people to the table, but that is no guarantee that something will happen to resolve the issues the map is aimed at solving.

6) Intermediaries are important

One way to ensure that there is a link between data and action is to identify stakeholders that have the ability to use, understand and re-interpret the data. One case was mentioned where health workers collected data and then wanted to know “What do we do now? How does this affect the work that we do? How do we present this information to community health workers in a way that it is useful to our work?” It’s important to tone the data down and make them understandable to the base population, and to also show them in a way that is useful to people working at local institutions. Each audience will need the data to be visualized or shared in a different, contextually appropriate way if they are going to use the data for decision-making. It’s possible to provide the same data in different ways across different platforms from paper to high tech. The challenge of keeping all the data and the different sharing platforms updated, however, is one that can’t be overlooked.

7) What does informed consent actually mean in today’s world?

There is a viewpoint that data must be open and that locking up data is unethical. On the other hand, there are questions about research ethics and protocols when doing mapping projects and sharing or opening data. Are those who do mapping getting informed consent from people to use or open their data? This is the cornerstone of ethics when doing research with human beings. One must be able to explain and be clear about the risks of this data collection, or it is impossible to get truly informed consent. What consent do community mappers need from other community members if they are opening data or information? What about when people are volunteering their information and self-reporting? What does informed consent mean in those cases? And what needs to be done to ensure that consent is truly informed? How can open data and mapping be explained to those who have not used the Internet before? How can we have informed consent if we cannot promise anyone that their data are really secure? Do we have ethics review boards for these new technological ways of gathering data?

8) Not having community data also has ethical implications

It may seem like time wasting, and there may be privacy and protection questions, but there are are also ethical implications of not having community data. When tools like satellite remote sensing are used to do slum mapping, for example, data are very dehumanized and can lead to sterile decision-making. The data that come from a community itself can make these maps more human and these decisions more humane. But there is a balance between the human/humanizing side and the need to protect. Standards are needed for bringing in community and/or human data in an anonymized way, because there are ethical implications on both ends.

9) The problem with donors….

Big donors are not asking the tough questions, according to some participants. There is a lack of understanding around the meaning, use and value of the data being collected and the utility of maps. “If the data is crap, you’ll have crap GIS and a crap map. If you are just doing a map to do a map, there’s an issue.” There is great incentive from the donor side to show maps and to demonstrate value, because maps are a great photo op, a great visual. But how to go a level down to make a map really useful? Are the M&E folks raising the bar and asking these hard questions? Often from the funder’s perspective, mapping is seen as something that can be done quickly. “Get the map up and the project is done. Voila! And if you can do it in 3 weeks, even better!”

Some participants felt the need for greater donor awareness of these ethical questions because many of them are directly related to funding issues. As one participant noted, whether you coordinate, whether it’s participatory, whether you communicate and share back the information, whether you can do the right thing with the privacy issue — these all depend on what you can convince a donor to fund. Often it’s faster to reinvent the wheel because doing it the right way – coordinating, learning from past efforts, involving the community — takes more time and money. That’s often the hard constraint on these questions of ethics.

Check this link for some resources on the topic, and add yours to the list.

Many thanks to our lead discussants, Robert Banick from the American Red Cross and Erica Hagen from Ground Truth, and to Population Council for hosting us for this month’s Salon!

The next Technology Salon NYC will be coming up in March. Stay tuned for more information, and if you’d like to receive notifications about future salons, sign up for the mailing list!

Read Full Post »

birds 2I spent the weekend working on a paper about “Children on the Move.” I’m not even close to done with it yet, but the topic is fascinating. Some reports say that 1/3 of migrants are between the ages of 12 and 25, including millions of children under the age of 18. The number of children and youth who migrate is difficult to pin down with certainty, given that migration is often within country, seasonal, across porous borders, and because most child migrants don’t have legal means to migrate or they lack identification, leaving them under the radar and uncounted.

Children move for all kinds of reasons, from and into all kinds of situations. The push-pull factors that cause them to migrate vary a great deal from situation to situation. Often the movement of children is lumped under trafficking and child labor, and all children who move are considered victims, and all those who support children to move are labeled criminals or traffickers and all parents who allow their children to move are lambasted for not caring about them. If you read what children and parents involved in migration say, it’s clear that this is not the case.

One person I interviewed for the paper noted off the record that sometimes those working with children who migrate are forced to put them in the category of “trafficked” or “at risk of trafficking” because there is no real category (or funding) to support children who are “seeking better opportunity” or “fleeing domestic violence” or “scared for my life because of the gangs in my community, and traveling across several countries up to the US seems like less of a risk.”

Just like adult migrants, children often move of their own will to seek opportunity in other places. Their movement in and of itself is not negative, but moving without protection mechanisms and support can indeed put them at risk. Policies and systems that don’t talk to each other also put children and youth in peril, whether it is when children themselves move, or when their parents move with them.

For the report I’m doing, I’m looking at how ICTs are being used by children and youth to make their journey safer, and ways that communities, local child protection committees, institutions, governments and NGOs are using or could use some of these new ICT tools to better support and protect children and youth who move for any reason.

Some interesting efforts are happening, including some ingenious local networks in West Africa that work across communities to help ensure children’s paths and travels are as safe as possible; and a radio and SMS project in Tanzania that is building up a pro-child protection constituency by encouraging people to tell stories about when and where they have supported or helped a child.

It’s been heartbreaking to read about Afghan youth who are forcibly returned to a country they can barely remember because they have turned 18 and are no longer supported by the UK child welfare system, yet at least a tiny bit encouraging that a UK organization is working on a mobile app that could provide these youth with at least a map and some information about their ‘homeland’ so that they know where to go for help when they step off the plane in what is now a foreign country.

Reading about migrant parents in the US losing their children to foster care because they have been detained for migration violations and are unable to show up to court to keep their children, or they lack critical information about how the system works, or they are not allowed more than one phone call makes my blood boil. Having been married to a Salvadoran, I’ve experienced my own fair share of migration difficulties and horror stories. They are not pretty, and family separation hurts, no matter what color or nationality the family is. It seems that the root of some countries’ inability to deal with migration in a dignified way is an underlying devaluation of people from other places and an inability to see them as human. Can ICTs play a role in changing attitudes at the broad scale? Or can we at least enable migrants in detention more communication with families so that they don’t lose contact with their children? A few initiatives are looking at storytelling as a way to bring more humanity into the migration debate.

As both Duncan Green (Why is migration a Cinderella issue in development) and Owen Barder (Is migration too toxic for development) have written recently, migration has not been a hot topic on the development agenda, and it’s only now starting to get some play.

Why is that? I think Owen’s comment is pretty good to spark some thought:

Migration is a Cinderella issue in development because there is nobody to speak for the people who are disadvantaged by the current rules.  Domestic civil society organisations which work on migration are mainly focused on the rights of immigrants, not on improving the impact of migration on development or creating opportunities for people in poor countries. DFID is largely in retreat from non-aid issues. The big development NGOs at best speak for their own visions of development, and at worst promote the aid industry of which they are part. As a result, people in developing countries are denied some of the most powerful and inexpensive ways in which they could improve their lives.

We need to find a way to look at all angles and aspects of migration, including that of child migration, in a holistic way that involves all these different actors. I think that one reason migration is not talked about  enough in the development debate is because it is a touchy political issue that might make a donor base freak out. It also tends to makes agencies that work with children a bit uncomfortable – If we protect children who migrate, will we be seen to be encouraging illegal migration? Will we be seen as supporting child labor? Are we liable if we give children safety tips or information, and then something happens to them? How can we do no harm? What about unintended consequences?

More recently, many child-focused agencies have started to better come to grips with the realities that children are going to migrate, and it’s altogether possible that staying in their home community is actually not in their best interest. These are thorny questions, however, that are difficult to deal with, especially in the open when the political debate around migration has been so traditionally ugly.

Perhaps framing migration as an economic issue will help bring it into the debate, but I do hope we don’t lose touch with the human side of migration.

Read Full Post »

policy forum

This past Monday I had the opportunity to join Engineers without Borders (EWB) in Calgary, Canada, at their Annual Policy Forum on Global Development to discuss “How can open government contribute to community and economic development?”

Morning panels covered some examples of open government initiatives from Finland, Ghana and Canada. In the afternoon we heard about some of the challenges with open data, open government and the International Aid Transparency Initiative. Table discussions followed both of the panels. The group was a mix of Canadian and African government representatives, people from organizations and groups working in different countries on open government and open data initiatives, and young people who are connected with EWB. The session was under Chatham House Rule in order to encourage frank conversation.

Drawing from such documents as the Open Government Partnership’s Open Government Declaration, Harlan Yu and David G. Robinson’s “The New Ambiguity of “Open Government,” Beth Noveck’s What’s in a Name? Open Gov and Good Gov and Nathaniel Heller, A Working Definition of ‘Open Government’, the following definition of Open Government was used to frame the discussions.

EWB Definition of Open Government

Below (in a very-much-longer-than-you-are-supposed-to-write-in-a-blogpost summary) are the highlights and points I found interesting and useful as related to Open Development, Open Data, Open Government and the International Aid Transparency Initiative (IATI)

1.  Participation thresholds need to be as low as possible for people to participate and engage in open government or open data initiatives. You need to understand well what engagement tools are most useful or comfortable for different groups. In some places, to engage the public you can use tools such as etherpad, wiki platforms, google docs, open tools and online collaboration spaces. In other places and with other populations, regardless of what country, you may be more successful with face-to-face methods or with traditional media like television and radio, but these need to be enhanced with different types of feedback methods like phone calls or surveys or going house to house so that your information is not only traveling one way. Community organizing skills are key to this work, regardless of whether the tools are digital or not.

2.  Literacy remains a huge challenge hindering access to information and citizen engagement in holding government accountable in many countries. This is why face-to-face engagement is important, as well as radio and more popular or broad-based communication channels. One participant asked “how can you make open government a rural, rather than an urban only, phenomenon?” This question resonated for participants from all countries.

3.  Language is still a critical issue. Language poses a big challenge for these kinds of initiatives, from the grassroots level to the global level, within and among countries, for citizens, governments, and anyone trying to share or collect data or information. It was noted that all the countries who have published data to IATI are publishing in English. All the IATI Standards are in English, as is the entire support system for IATI. As one participant noted, this begs the question of who the information in IATI is actually designed for and serving, and who are the expected users of it. Open data initiatives should consider the implications of language they publish in, both politically and practically.

4.  Open data can serve to empower the already empowered. As one speaker noted, “the idea that everyone has the potential to make use of open data is simply not true.” Access to digital infrastructure and educational resource may be missing, meaning that many do not have the ability to access, interpret or use data for their own purposes. Governments can also manipulate data and selectively release data that serves their own interests. Some questioned government motives, citing the example of a government that released “data” saying its unemployment rate was 10% when “everyone knew this to be false, and people grumbled but we did not feel empowered to challenge that statement.” Concern was expressed over the lack of an independent body or commission in some countries to oversee open data and open government processes. Some did not trust the government bodies who were currently in charge of collecting and opening information, saying that due to politics, they would never release any information that made their party or their government look bad.

5.  Privacy rights can be exploited if data is opened without data protection laws and effort to build capacity around how to make certain data anonymous. Citizens may also not be aware of what rights are being violated, so this should also be addressed.

6.  Too much open data discussion takes place without a power analysis, as one participant commented, making some of the ideas around open data and open government somewhat naïve. “Those who have the greatest stake will be the most determined to push their point of view and to make sure it prevails.”

7.  Open data needs to become open data 2.0. According to one participant, open data is still mostly one-way information delivery. In some cases there isn’t even any delivery – information is opened on a portal but no one knows it’s there or what it refers to or why it would be useful. When will open data, open government and open aid become more of a dialogue? When will data be released that answers questions that citizens have rather than the government deciding what it will release? The importance of working with community groups to strengthen their capacity to ask questions and build critical consciousness to question the data was emphasized. A counter point was that government is not necessarily there to start collecting information or creating data sets according to public demand. Governments collect certain data to help them function.

8.  Intermediaries working on open government should be careful of real or perceived bias. Non-profits have their own agendas, and ‘open data’ and ‘open information’ is not immune to being interpreted in non-objective ways. Those working on civic engagement initiatives need to be careful that they are not biased in their support for citizen initiatives. One presenter who works on a platform that encourages citizens to be involved in petitioning new laws for contemplation in Parliament said “Our software is open source so that anyone can set up a similar process to compete with us if they feel we are biased towards one or another type of agenda.”

9.  Technology-based engagement tools change who is participating. Whether in Finland, Canada, Ghana or Malawi, it’s critical to think about reaching those who are not active already online, those who are not the typical early adopters. To reach a broader public, one speaker noted “We are going to remote places, doing events in smaller towns and cities to see how people want to influence and take part in this. Making sure the website is accessible and understandable.”

10. Technological platforms are modifying how political parties and democratic processes operate. This may or may not be a good thing. Normally priorities arise and are discussed within political parties. Will people now bypass the party process and use ‘direct democracy’ channels if they are passionate about an issue but do not want to enter into negotiation around it? Will this weaken political processes or longer standing democratic processes? One speaker considered this change to be positive. People are not happy with being able to vote every 4 years and they want opportunities to participate in between elections cycles and direct voice in how priorities are decided. Others questioned whether bypassing official processes can lead to less participation and more apathy overall on national issues. Some questioned whether within fairly long-standing democracies, open data will have any real impact, considering existing levels of apathy and the lack of political participation.

11. Strong information, statistical, monitoring and evaluation systems are critical for open data and open government processes and to ensure more effective management of development results. This is still a challenge for some countries that need to review their mechanisms and improve their tools and processes for data collection and dissemination. If there is no data, or no current data, there is not much point in opening it. In addition, there are capacity and technical competency challenges within institutions in some countries. One participant mentioned a lack of current government geological information about gold and oil deposits that weakens government capacity to negotiate with the private sector extraction industry and ensure partnerships and earnings will contribute to national development. In addition more evidence is needed on the impact, use, and outcomes of open data. At the moment it’s quite difficult to say with any real authority what the outcomes and impact of open data and open government have been.

12. IATI (International Aid Transparency Initiative) needs more partners. Government representatives noted that they are opening their data, but they can only open the data they possess. In order for data on aid to be useful, more data is needed, especially that of NGOs who are implementing programs. Not many NGOs have published their information to the IATI standard at this point. “The really interesting thing will be when we can start mashing up and mapping out the different kinds of information,” as one speaker noted, “for example, this is the goal of the Open Aid Partnership. It will involve combining information from the donor, development indicators from the World Bank, and country information, and this will open up amazing possibilities once this is all geo-coded.” There are reporting challenges related to IATI and open government data, however, because at times countries and NGOs do not see the benefits of reporting – it feels like just one more top-down administrative burden. There are also issues with donor governments reporting their committed intentions and amounts, recipient governments reporting back, and communications with citizens on both sides (donor and recipient countries). One example that was reported to be enjoying some success was the multi-donor budget support initiative in Ghana, where development partners and government work together to establish development indicators and commitments. If the government delivers on the indicators, the development partners will then provide them with the funding. Development partners can also earmark funding to particular areas if there is government agreement.

13. We need more accountability towards ‘beneficiaries’.Currently many of these initiatives are perceived as being focused on donors and donor publics. As one participant noted, “the interesting thing is less about government and more about getting regular people involved in these processes. When you engage the public you’ll engage government leaders in thinking they will need to change to respond to what citizens are asking for.” Another noted that the essential issue is the link between transparency/accountability and citizens and their own governments. In addition, as one participant asked, “How can you strengthen capacity among citizens to ask the right questions about the data that’s being opened?” For example, citizens may ask about the number of schools being built, but not ask about the quality of education being provided. Public education was a strong focus of discussions around citizen engagement during the policy forum.

14. Should citizens be consulted on everything? however, was one big question. The public at large may not understand the ramifications of its own deep misunderstandings on particular issues and may be inputting from a viewpoint that lacks scientific evidence or fact. “It’s one thing to have an opinion about whether your child should be able to drink energy drinks before age 16, it’s another to input about technical programs like the best policy for green energy,” commented one group.

15. Can citizens really have greater participation if government is still in control of data? was another big question. An example was given of an open consultative process that became unwieldy for a local government, which then shut down the consultation process and changed the nature of the documents to ‘administrative’ and therefore no longer open. Others asked why governments pat themselves on the back over being part of the Open Government Partnership yet they do not have Freedom of Information Acts (FOIA) or they prosecute those who open data in alternative ways, such as Bradley Manning and Aaron Swartz.

16. If citizens don’t get a response from government (or if they don’t like the response, or feel it’s biased or manipulated), apathy and cynicism will increase. It’s important to make sure that ‘open government’ is not just a box that gets ticked off, but rather a long-term change in mentality of those in power and deeper expectations and efforts by citizens for openness and participation in conversations of national importance.

The conclusion was that Open Government is somewhat of a paradox, rooted in aims that are not necessarily new. Open Government strives to enable leaders in their communities to create change and transform their lives and those of people in their communities. It is a complex process that involves many actors and multiple conflicting goals and interests. It’s also something new that we are all learning about and experimenting with, but we are very impatient to know what works and what the impact is. In the room, the feeling was one of ‘radical pragmatism,’ as one participant put it. Open Government is a big idea that represents a big change. It’s something that can transform communities at the global level and there is a great deal of hope and excitement around it. At the same time, we need to acknowledge the challenges associated with it in order to address them and move things forward.

I’ll do a follow up post with the points I made during the panel as this post is clearly way too too long already. Kudos if you are still reading, and a huge thanks to the organizers and participants in the EWB policy forum.

Read Full Post »

The November 14, 2012, Technology Salon NYC (TSNYC) focused on ways that ICTs can support work with children who migrate. An earlier post covers the discussion around Population Council’s upcoming ‘Adolescent Girls on the Move’ report. The current post focuses on the strategic use of data visualization for immigration advocacy, based on opening points from Brian Root and Enrique Piracés of Human Rights Watch (HRW).

Visualizing the US Detention Network and the transfers between detention centers.

The project

The HRW initiative used data to track and visualize the movement of people through the US immigration detention system after noticing that U.S. Immigration and Customs Enforcement (ICE) was moving people very freely without notifying their families or attorneys. HRW was aware of the problem but not its pervasiveness. The team obtained some large data sets from the US government via Freedom of Information Act (FOIA) requests. They used the data to track individuals’ routes through the immigration detention system, eventually mapping the whole system out at both aggregate levels and the level of individual. The patterns in the data informed HRW’s advocacy at the state and federal levels. In the process, HRW was able to learn some key lessons on advocacy and the importance of targeting data visualizations to specific advocacy purposes.

Data advocacy and storytelling

The data set HRW obtained included over 5.4 million records of 2.3 million people, with 10-12 variables. The team was able to connect these records to individuals, which helped tell a meaningful story to a broad audience. By mapping out all the US facilities involved and using geo-location to measure the distance that any individual had been transferred, the number of times an individual from Country X in Age Range X was transferred from one facility to another was visible, and patterns could be found. For example, often people on the East Coast were transferred to Texas, where there is a low ratio of immigration lawyers per detainee.

Even though the team had data and good stories to tell with the data, the two were not enough to create change. Human rights are often not high priority for decision makers, but budgeting is; so the team attached a cost to each vector that would allow HRW to tell decision makers how much was being spent for each of these unnecessary transfers.

They were also able to produce aggregated data at the local level. They created a state dashboard so that people could understand the data at the state level, since the detention facilities are state-run. The data highlighted local-level inefficiencies. The local press was then able to tell locally relevant stories, thus generating public opinion around the issue. This is a good example of the importance of moving from data to story telling in order to strengthen advocacy work.

HRW conveyed information and advocated both privately and publicly for change in the system. Their work resulted in the issuing of a new directive in January 2012.

FOIA and the data set

Obtaining data via FOIA acts can be quite difficult if an organization is a known human rights advocate. For others it can be much easier. It is a process of much letter sending and sometimes legal support.

Because FOIA data comes from the source, validation is not a major issue. Publishing methodologies openly helps with validation because others can observe how data are being used. In the case of HRW, data interpretations were shared with the US Government for discussion and refutation. The organization’s strength is in its credibility, thus HRW makes every effort to be conservative with data interpretation before publishing or making any type of statement.

One important issue is knowing what data to ask for and what is possible or available. Phrasing the FOI request to obtain the right data can be a challenge. In addition, sometimes agencies do not know how to generate the requested information from their data systems. Google searches for additional data sets that others have obtained can help. Sites such as CREW (Citizens for Responsibility and Ethics in Washington), which has 20,000 documents open on Scribd, and the Government Attic project, which collects and lists FOI requests, are attempting to consolidate existing FOI information.

The type of information available in the US could help identify which immigration facilities are dealing with the under-18 population and help speculate on the flow of child migrants. Gender and nationality variables could also tell stories about migration in the US. In addition, the data can be used to understand probability: If you are a Mexican male in San Jose, California, what is the likelihood of being detained? Of being deported?

The US Government collects and shares this type of data, however many other countries do not. Currently only 80 countries have FOI laws. Obtaining these large data sets is both a question of whether government ministries are collecting statistics and whether there are legal mechanisms to obtain data and information.

Data parsing

Several steps and tools helped HRW with data parsing. To determine whether data were stable, data were divided by column and reviewed, using a SHELL. Then the data were moved to a database (MySQL), however other programs may be a better choice. A set of programs and scripts was built to analyze the data, and detention facilities were geo-located using GeoNames. The highest quality result was used to move geo-location down to the block level and map all the facilities. Then TileMill and Quantum GIS (QGIS) were used to make maps and ProtoViz (now D3) was used to create data visualizations.

Once the data were there, common variables were noted throughout the different fields and used to group and link information and records to individuals. Many individuals had been in the system multiple times. The team then looked at different ways that the information could be linked. They were able to measure time, distance and the “bounce factor”, eg.., how many times an individual was transferred from one place to the other.

Highlighting problematic cases: One man’s history of transfers.

Key learning:

Remember the goal. Visualization tools are very exciting, and it is easy to be seduced by cool visualizations. It is critical to keep in mind the goal of the project. In the HRW case the goal was to change policy, so the team needed to create visualizations that would specifically lead to policy change. In discussions with the advocacy team, they defined that the visualizations needed to 1) demonstrate the complexity 2) allow people to understand the distance 3) show the vast numbers of people being moved.

Privacy. It is possible to link together individual records and other information to tell a broader story, but one needs to be very careful about this type of information identifying individuals and putting them at risk. For this reason not all information needs to be shared publicly for advocacy purposes. It can be visualized in private conversations with decision makers.

Data and the future

Open data, open source, data visualization, and big data are shaping the world we are embedded in. More and more information is being released, whether through open data, FOIA or information leaks like Wikileaks. Organizations need to begin learning how to use this information in more and better ways.

Many thanks to the Women’s Refugee Commission and the International Rescue Committee for hosting the Salon.

The next Technology Salon NYC will be coming up soon. Stay tuned for more information, and if you’d like to receive notifications about future salons, sign up for the mailing list!

Read Full Post »

The November 14, 2012, Technology Salon NYC focused on ways that ICTs can support work with children who migrate. Our lead discussants were:  Sarah Engebretsen and Kate Barker from Population Council, and Brian Root and Enrique Piracés from Human Rights Watch.

This post summarizes discussions that surfaced around the Population Council’s upcoming Girls on the Move report, which looks at adolescent girls’ (ages 10-19) internal and regional migration in ‘developing’ countries, including opportunity and risk. (In a second blog post I will cover Human Rights Watch’s points and resulting discussions.)

The Girls on the Move report (to be released in February 2013) will synthesize current evidence, incorporate results of specially commissioned research, illustrate experiences of migrant girls, provide examples of promising policies and programs, and offer concrete action-oriented recommendations.

1) How are migrant girls using ICTs?

While the report’s focus is not technology, the research team notes that there is some evidence showing that adolescent girls are using ICTs for:

  • Extending social networks. In China and Southeast Asia, migrant girls are building and accessing personal networks through mobiles and texting. This is especially pronounced among girls who work long hours in tedious jobs in factories, and who do not have much time with family and friends. Text messaging helps them maintain connections with existing social networks. It also gives them space for flirtation, which may not be something they can do in their former rural context because of cultural norms that look down on flirtatious behavior.
  • Finding new jobs. Both boys and girls use mobiles and text messaging for exchanging quick news about job openings. This suggests there could be an opening for program interventions that would connect to migrant children through texting, and that might supply information on community resources, for example, where to go in cases of threat or emergency—that might then propagate across migrant virtual networks.
  • Sending remittances. Based on research with adolescent girls and drawing from examples of adult migrants, it seems likely that a vast majority of migrant girls save money and send it to their families. Evidence on how girl migrants are using remittances is limited, but a survey conducted in Kenya found that 90% of adult migrants had sent money home to families in other parts of Kenya via mobile phone in the 30 days before the survey. There is more research needed on adolescent girls’ remittance patterns. Research is also lacking on adolescent girls’ access to and use of mobile phones and on whether mobile phones are owned or borrowed from another person who is the handset owner. Remittances, however, as one participant pointed out, are obviously only sent by mobile in countries with functioning mobile money systems.
  • Keeping in touch with family back home. In Western Kenya, migrant brides who are very isolated placed great importance on mobiles to stay in touch with family and friends back home. Facebook is very popular in some countries for keeping in touch with families and friends back home. In Johannesburg and Somalia, for example, one participant said “Facebook is huge.” Migrating adolescent girls and domestic working girls in Burkina Faso, however, do not have Internet access at all, via mobiles or otherwise.

2) Areas where ICTs could support work on child protection and migration

  • Child Protection Systems There is a general global move towards developing child protection systems that work for different kinds of vulnerable children. These efforts are important in the transit phase and right upon arrival as these phases are particularly risky for children who migrate. ICTs can play a role in managing information that is part of these systems. Ways to connect community child protection systems into district and national systems need more investigation.
  • Reporting abuse and getting help One example of ways that ICTs are supporting child protection in India and several other countries is Child Help Lines. ChildLine India received almost 23 million calls as of March 2012, with 62% of callers between the ages of 11 and 18. The helplines provide vulnerable groups of children and youth with referrals to local services, and in the best cases they are public-private partnerships that link with national and state governments. Of note is that boys call in more often than girls, and this raises questions about girls’ access to phones to actually make a call to obtain support. It also points to the need for differentiated strategies to reach both boys and girls.

3) Technology and exclusion

  • Social exclusion and access is a specific challenge due to the pronounced social exclusion of many migrant girls, particularly those who are married or working in socially isolated jobs such as child domestic workers. Girls in these situations may not have any access to technology at all, including to mobile phones.  Girls and women especially tend to have less access than men; they are often not the owners of devices. There is a research gap here, as no one actually knows how many migrating adolescent girls access mobiles and how many can borrow a phone for use. It is not clear if girls have their own phones, or if they are using an employer’s or a friend’s phone or a public call box. This would be a key factor in terms of working with adolescent girls and understanding risk and designing programs.
  • Technology should build on – not be seen as a replacement for – social networks. Girls access to social capital is a huge underlying topic. There is normally a rupture in social networks when girls move. They become socially isolated and this puts them at great risk. Domestic girl workers leave home and become more vulnerable to exploitation —  they have no friends or family around them, and they may not be able to access communication technologies. For this reason it is critical to understand that technology cannot replace social networks. A social network is needed first, and then ICTs can allow girls to remain in touch with those in their network. It is very important to think about understanding and/or building social networks before pushing the idea of technology or incorporating technologies.

4) ICTs and potential risk to child migrants

  • SMS, anonymity and privacy. According to a study one participant was involved in, some children and youth report feeling that they can speak up more freely by SMS since they can text privately even in close quarters. Others noted that some organizations are incorporating online counseling services for similar reasons. A study in Nigeria is ongoing regarding this same topic, and in Southeast Asia it has been shown that girls often use text messages to flirt using an alternate identity.
  • Retaliation. Concerns were raised regarding the possibility for retaliation if a child reports abuse or uses a mobile for flirting and the phone is confiscated.  Practices of self-protection and message deleting are not very well implemented in most cases. A participant noted that some of the low-end phones in Tanzania and Kenya periodically delete outgoing messages and only keep 15 messages on the phone at a time. This can help somewhat, though it is not a feature that is particularly aimed at protection and privacy, rather, it is more a function of low memory space. Safer Mobile is one initiative that looks at risk and privacy; however, like most efforts looking at risk, it is focused on political conflict and human rights situations, not at privacy and protection for child migrants or other types of abuse reporting that children may be involved in.

5) Research gaps and challenges

  • Migration contexts. It was emphasized that migration during an emergency situation is very different from a voluntary migration, or seasonal migration. Work is being done around communication with disaster or emergency affected populations via the Communication with Disaster Affected Communities (CDAC) Network, but this theme does not seem to be one of widespread discussion among US-based NGOs and humanitarian organizations.
  • Migrants are not necessarily disadvantaged however a bias exists in that researchers tend to look for disadvantage or those who are disadvantaged. They often ask questions that are biased towards showing that migrants are disadvantaged, but this is not always the case. Sometimes migrating children are the most advantaged. In some contexts migrating requires family support and funds to migrate, and those with the least amount of resources may not be able to move. In some cases migrant children have a huge, strong family structure. In others, children are escaping early marriage, their parents’ passing away or other difficult situations.
  • Integrated information and data crossing. One issue with research around migrants is that most looks solely at migrants and does not cross migration with other information. Many girls migrate with the idea that they will be able to get an education, for example, but there is not a lot of information on whether migrating girls have more or less access to education. The literature tends to focus on girls in the worst situations. In addition, although there are 4 times as many internal migrants as there are international migrants, focus tends to be on international migration.

In a second post, I will cover Human Rights Watch’s work on using data visualization to advocate for the rights of immigrants in the US.

Many thanks to our lead discussants from the Population Council and to the Women’s Refugee Commission and the International Rescue Committee for hosting! The next Technology Salon NYC will be coming up in January 2013. Stay tuned for more information and if you’d like to receive notifications about future salons, sign up for the mailing list!

Also, if you have research or examples of how child and youth migrants are using ICTs before, during or after their journey, or information on how organizations are using ICTs to support the process, please let me know.

Related posts and resources:

How can ICTs support and protect children who migrate?

New communication tools and disaster affected communities

Empowering communities with technology tools to protect children

Children on the Move website

Read Full Post »

« Newer Posts - Older Posts »