2.1

Digital ecosystem consists of Policy and Legal/Regulatory Framework and specific ICT interventions. The cornerstone of the Policy and Legal/Regulatory Framework is the design of National ICT sector policy. The focus of the Toolkit is on specific interventions that pose different exclusion risks and offer different opportunities for pursuing gender equity goals. These interventions are listed below. The Digital Ecosystem focuses on the areas like Institutional capacity building, Facilitating digital entrepreneurship, Training and Cyber-security, - the areas that have direct impact on expanding opportunities for women.

ICT Intervention types:

  • Infrastructure
  • Universal service policy
  • Spectrum management
  • Interconnection
  • Competition and pricing
  • Taxation
  • Licensing
  • Quality of service regulation
  • Right to information/access to information (RTI/ATI)
  • Intellectual property rights
  • Online safety
  • Privacy and data protection
  • Mobile money and other financial services
  • PPPs

The section provides summary tables against each intervention, with internal links to possible gender barriers and opportunities that can be found in Section 3 of the Toolkit, and associated targeted actions to mitigate/capitalize on these, that can be found in Section 4.

This section includes several sub sections where the theme is further developed, as described below.

Sub section 2.1.1. describes the need to identify at the policy, legislative and regulatory level, what actions can be taken to ensure Equitable access of women to ICT networks and services.
2.1.2. points out the need to Strengthen institutions and sensitize decision makers to the need of being gender-aware and design/implement programs and budgets that promote women’s inclusion. 2.1.3. briefly outlines the inherent structural disadvantages and stigmas that prevent women from starting and upscaling businesses.
2.1.4. describes the need for women to Take advantage of education and training that would enable them to fully use and benefit from ICTs.
2.1.5. discusses Vulnerability of women to cyber-security risks taking into account that they are less likely to be digitally literate.

References

BMZ. (2017). Women’s Pathways to the Digital Sector: Stories of Opportunities and Challenges.
https://www.enterprise-development.org/wp-content/uploads/GIZ_WEE-digital-sector_2017.pdf

ISCOM. (2004). Network Security in Critical Infrastructures.
http://www.isticom.it/documenti/news/pub_003_eng.pdf

Science Daily. (2010). Believing Stereotype Undermines Girls' Math Performance: Elementary School Women Teachers Transfer Their Fear of Doing Math to Girls.
https://www.sciencedaily.com/releases/2010/01/100125172940.htm

USAID. (2017). Gender and Information Communication Technology (ICT) Survey Toolkit.
https://www.usaid.gov/sites/default/files/documents/15396/Gender_and_ICT_Toolkit.pdf