"1. While gender gaps are observable in most aspects of ICT access, skills and leadership, the picture is complex. There are large regional variations: some countries are close to parity or have even reversed the gender gap on some indicators, while others still have persistent gaps. Individual coun...tries can have both large and small gaps, depending on the indicator being measured. Interpreting the gaps requires careful and contextualised analysis.2. Barriers to gender digital equality are generally related to one or more of the following: 1) availability of infrastructure; 2) financial constraints; 3) ICT ability and aptitude; 4) interest and perceived relevance of ICTs; 5) safety and security; and 6) socio-cultural and institutional contexts. Most of these barriers cut across issues of access, skills, and leadership, although they may manifest in slightly different ways. While research has documented these barriers, the evidence from different sources is sometimes contradictory, even within the same country contexts.3. There is no one conclusive strategy for eliminating gender digital inequalities. Recommendations generally call either for targeting specific contributing factors of gender digital inequality (such as affordability or recruiting practices), or for reshaping deeply ingrained social norms and practices (such as gender stereotypes) that are at the root of gender inequalities. As with the evidence on barriers, research results are sometimes contradictory or nuanced.4. The dominant approaches to gender equality in ICT access, skills, and leadership mostly frame issues in binary (male/female) terms, thereby masking the relevance of other pertinent identities. Insufficient research has been done on the implications of ICTs for intersectional identities. Data collection should move from binary sexdisaggregation towards finer degrees of status disaggregation in order to recognise multiple and interacting identities (such as sexuality, poverty, class, education, age, disability, and occupation).5. To ensure privacy and safety as well as full participation in the digital economy, women should have equal opportunities to develop adequate basic and advanced digital skills. Cyberstalking, online harassment, image manipulation, privacy violations, geotracking, and surveillance can compromise women’s and girls’ safety both online and offline. In addition, some evidence suggests the digital transformation of labour may be widening gender wage gaps. These outcomes can be averted with the right types of training combined with social and institutional change.6. Developments in digital technologies open new pathways to gender diversity and inclusion; however, lack of attention to gender dynamics and differences hampers the potential for true progress. For example, evidence suggests that most women’s work in the digital economy, particularly in the Global South, reinforces existing social divisions. Moreover, artificial Intelligence (AI) systems, designed largely by men, tend to ignore the negative gender implications of their designs. Research, government policy and design principles should include gender awareness and analysis, for example by building in data and privacy protections and avoiding gender stereotypes." (Key findings, p.19-20)
more
"Despite information disorder being a widespread problem in countries in the Global South, the study of this phenomenon remains dominated by examples, case studies, and models from the Global North. Knowledge about the various manifestations of information disorder, the range of responses, and the s...uccess rate of interventions to counter the disorder remains fragmented and partial. In order to gain a better understanding of the knowledge gaps and areas where further research is required, as well as to identify opportunities for inter- and intra-regional cooperation, a scoping study of efforts to counter information disorder in the Global South was needed. The project that was subsequently launched had three interconnected objectives: 1. To map the actors currently working to counter information disorder and to identify the frameworks upon which such interventions are based; 2. To learn from current approaches, tools, and methods used to counter information disorder; 3. To gain an overview of the research landscape and to identify key issues and questions for further research. This scoping study provides an overview of key stakeholders and regional networks and a wide overview of approaches, tools, and methods being used currently. On the basis of the information gathered through this scoping, an agenda for further research and areas for intervention has been identified." (Introduction, p.7)
more