SlideShare a Scribd company logo
Talking About Violence	
• Violence against women is increasing	
•  Rape and attempt to rape in the fiscal year B.S. 2069/70
reached 922	
•  WOREC reported 198 cases of Violence Against Women
in Shrawan, 2070. Domestic violence was the highest
reported case	
• Recent cases	
•  Sita Rai	
•  Rape of minors, by family members
Talking About Violence    	
According	
  to	
  the	
  Demographic	
  Health	
  Survey	
  of	
  2011:	
  
• Sexual Violence:	
  
•  85% of women aged between 15-49 years, who have
experienced sexual violence have never told anyone	
•  8% have told someone	
•  7% have sought help	
	
• Physical Violence: 	
•  66% of women aged between 15-49 years have never
told anyone	
•  12% have told someone	
•  22% have sought help
Responding to Violence
Against Women	
• More than 2300 organizations working to end Violence
Against Women	
• Limited coordination and communication	
• Consequences	
•  Victim has to repeat their traumatic experience
several times	
•  Holistic support is not easily available as
organizations focus on a particular area	
•  Information asymmetry: organizations that could
support a case sometimes may not know the latest
updates about a case
Understanding Violence
Against Women	
• Paucity of data and information on violence against women	
• Strong evidence on the extent of the problem, the causes and
the consequences is difficult to obtain	
• News on VAW compiled by a few organizations	
• Many sad stories on VAW, but few on the survivors succeed to
reclaim their lives
Technology and Violence
Against Women	
• What	
  role	
  can	
  informa=on	
  communica=ons	
  
technology	
  (ICT)	
  play	
  in	
  addressing	
  some	
  of	
  
challenges	
  faced	
  by	
  vic=ms	
  and	
  others	
  who	
  
work	
  to	
  end	
  VAW?	
  
• Why	
  ICT?	
  
– As	
  of	
  June	
  2013,	
  mobile	
  penetra=on	
  has	
  reached	
  
70%	
  and	
  25%	
  of	
  Nepal’s	
  popula=on	
  have	
  access	
  to	
  
the	
  Internet.
– These	
  numbers	
  will	
  only	
  grow	
  
df}gtf tf]8f}F
Fight VAW	
An initiative to use accessible 	
Information and Communication Technologies 	
in fighting	
Violence against Women in Nepal	
www.fightvaw.org
Components of FightVAW	
Registering of Complaints / Problems	
through telephone
Components of FightVAW	
Registering of 	
Complaints / Problems	
through mobile sms
•  Informed your closed ones for 	
	
immediate support through 	
	
smart phone application	
•  Report problems/through the 	
	
application rather than SMS 	
	
or voice call	
Android based
Smart Phone Application
Components of FightVAW
What after complaints / 	
Problems are registered ?	
•  Complaints accessed and transcribed by dedicated
CSO representatives working in the field of VAW
•  Individual cases followed-up for the benefit of the victim
•  Tracking of cases and follow-ups carried out for each
individual cases
Some more components of 	
Fight VAW
Some more components of 	
Fight VAW
Some more components of 	
Fight VAW	
Organizations in Action
What do we aim to achieve ?	
Fight	
  VAW	
  as	
  An	
  Integrated	
  plaSorm	
  to:
•  Provide	
  an	
  alterna've  means	
  to	
  report	
  experiences	
  of	
  violence	
  through	
  	
  
	
  a	
  24-­‐hour	
  help	
  line	
  and	
  SMS
•  Increase	
  the	
  speed  at  which  a  vic'ms  gets  support	
  from	
  CSOs
•  Enhance	
  coordina'on  and  collabora'on	
  among	
  different	
  CSOs	
  working	
  	
  
	
  to	
  support	
  the	
  vic=m
•  Compile	
  informa'on  on  CSOs	
  working	
  all	
  across	
  Nepal	
  on	
  VAW	
  and	
  	
  
	
  make	
  it	
  available	
  in	
  one	
  plaSorm
•  Monitor	
  the	
  media	
  for  latest  news  and  updates	
  on	
  VAW	
  and	
  make	
  it	
  	
  
	
  available	
  in	
  one	
  plaSorm	
  and	
  build	
  the	
  ini=al	
  infrastructure	
  necessary	
  	
  
	
  to	
  compile	
  data	
  on	
  VAW	
  in	
  one	
  central	
  loca=on
The Actors
How Did it Come About?	
• Hackathon	
• World Bank’ commitment to support the ideas generated by
the youth from the IT sector and the civil society
VAW Hackathon – June 16, 2013
VAW Hackathon Snapshot	
100 + Participants	
18 Teams
3 Winners
Self Help - 3rd Winner	
•  Mobile Application that can send SMS to police, pre-
selected trusted network about the location of victims in
case of the incident of violence. 	
•  Anyone can report about VAW to selected organizations
using the app	
Team Members
Kabindra Shakya
Nhasala Joshi
Kipendra Kushi
Anish Parajuli,
Binisha Shrestha
Mero Katha (My Story) – 	
2nd Winner 	
Collect, share and discuss stories that inspire people to
report cases of VAW using both online platform and
offline community.	
Team Members	
Yukti Lal Marik	
Wolf Price	
Jayanti Mala Chapagain 	
Olin Thakur	
Inge Patsch
Your Voice Our Support – 	
1st Winner	
•  Voice Recording of complaints through the use of mobile
phones and landline phones
•  CSO network to access them and take necessary action
Team Members	
	
Susan Joshi 	
	
Namita Pradhan, 	
	
Sundar Man Vaidya
What does FightVAW means to 	
us at the moment ?	
A pilot design to use innovative use of home grown ICTs to 	
address the use of Violence Against Women	
	
An opportunity explore collaboration and coordination among 	
different stakeholders
What are we doing next ?	
• Implement the pilot program till June, 2014 together with our
collaborators and partners on selected locations	
• Monitor and document early impact stories	
	
• Fine-tuning of the system based on feedback received during
the pilot implemntation
Our vision for the long run	
•  Create ownership of the system among different stakeholders	
•  Figure out a mechanism to sustain the system with active 	
	
Government engagement and ownership	
•  Make a case for Nepal in fighting the issues of VAW using 	
	
ICTs at a global level
df}gtf tf]8f}F
Thank You !	
	
www.fightvaw.org

More Related Content

Viewers also liked

Software quality and mobile apps
Software quality and mobile appsSoftware quality and mobile apps
Software quality and mobile appsPrawesh Shrestha
 
Business plan and presentation iii - financials and risk
Business plan and presentation   iii - financials and riskBusiness plan and presentation   iii - financials and risk
Business plan and presentation iii - financials and riskPrawesh Shrestha
 
Leveraging Corporate Community Partnerships For Women’S Programs
Leveraging Corporate Community Partnerships For Women’S ProgramsLeveraging Corporate Community Partnerships For Women’S Programs
Leveraging Corporate Community Partnerships For Women’S Programs
dennispbutler
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
eSAT Journals
 
4xN Winning Entry Avon Global App Challenge
4xN Winning Entry Avon Global App Challenge 4xN Winning Entry Avon Global App Challenge
4xN Winning Entry Avon Global App Challenge
eekatpants
 
Creating Change in a Digital World
Creating Change in a Digital WorldCreating Change in a Digital World
Creating Change in a Digital World
Marnie Webb
 
SafeNight | Developing a Mobile App from Idea to Launch
SafeNight | Developing a Mobile App from Idea to LaunchSafeNight | Developing a Mobile App from Idea to Launch
SafeNight | Developing a Mobile App from Idea to Launch
Caravan Studios, a division of TechSoup
 
Raasta
RaastaRaasta
FixIt: A Public Utility App
FixIt: A Public Utility AppFixIt: A Public Utility App
FixIt: A Public Utility App
Jinwai Goh
 
Revoda: Mobile Election App for Nigeria 2011 Elections
Revoda: Mobile Election App for Nigeria 2011 ElectionsRevoda: Mobile Election App for Nigeria 2011 Elections
Revoda: Mobile Election App for Nigeria 2011 Elections
Emeka Okoye
 
Safe Night Overview
Safe Night OverviewSafe Night Overview
Domestic violence: Through the Eyes of a Survivor
Domestic violence: Through the Eyes of a SurvivorDomestic violence: Through the Eyes of a Survivor
Domestic violence: Through the Eyes of a Survivor
Cassie Walker
 
2013 Umeng Insight Report
2013 Umeng Insight Report2013 Umeng Insight Report
2013 Umeng Insight ReportUmeng
 
Partners in Technology (PiT) - Department of Communities, Child Safety and Di...
Partners in Technology (PiT) - Department of Communities, Child Safety and Di...Partners in Technology (PiT) - Department of Communities, Child Safety and Di...
Partners in Technology (PiT) - Department of Communities, Child Safety and Di...
Digital Queensland
 

Viewers also liked (15)

Software quality and mobile apps
Software quality and mobile appsSoftware quality and mobile apps
Software quality and mobile apps
 
M billionth 2012 concept
M billionth 2012 conceptM billionth 2012 concept
M billionth 2012 concept
 
Business plan and presentation iii - financials and risk
Business plan and presentation   iii - financials and riskBusiness plan and presentation   iii - financials and risk
Business plan and presentation iii - financials and risk
 
Leveraging Corporate Community Partnerships For Women’S Programs
Leveraging Corporate Community Partnerships For Women’S ProgramsLeveraging Corporate Community Partnerships For Women’S Programs
Leveraging Corporate Community Partnerships For Women’S Programs
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
 
4xN Winning Entry Avon Global App Challenge
4xN Winning Entry Avon Global App Challenge 4xN Winning Entry Avon Global App Challenge
4xN Winning Entry Avon Global App Challenge
 
Creating Change in a Digital World
Creating Change in a Digital WorldCreating Change in a Digital World
Creating Change in a Digital World
 
SafeNight | Developing a Mobile App from Idea to Launch
SafeNight | Developing a Mobile App from Idea to LaunchSafeNight | Developing a Mobile App from Idea to Launch
SafeNight | Developing a Mobile App from Idea to Launch
 
Raasta
RaastaRaasta
Raasta
 
FixIt: A Public Utility App
FixIt: A Public Utility AppFixIt: A Public Utility App
FixIt: A Public Utility App
 
Revoda: Mobile Election App for Nigeria 2011 Elections
Revoda: Mobile Election App for Nigeria 2011 ElectionsRevoda: Mobile Election App for Nigeria 2011 Elections
Revoda: Mobile Election App for Nigeria 2011 Elections
 
Safe Night Overview
Safe Night OverviewSafe Night Overview
Safe Night Overview
 
Domestic violence: Through the Eyes of a Survivor
Domestic violence: Through the Eyes of a SurvivorDomestic violence: Through the Eyes of a Survivor
Domestic violence: Through the Eyes of a Survivor
 
2013 Umeng Insight Report
2013 Umeng Insight Report2013 Umeng Insight Report
2013 Umeng Insight Report
 
Partners in Technology (PiT) - Department of Communities, Child Safety and Di...
Partners in Technology (PiT) - Department of Communities, Child Safety and Di...Partners in Technology (PiT) - Department of Communities, Child Safety and Di...
Partners in Technology (PiT) - Department of Communities, Child Safety and Di...
 

Similar to Presentation: Follow up on hackathon - FightVAW

VSO webinar: Addressing social exclusion and gender inequality in Zimbabwe
VSO webinar: Addressing social exclusion and gender inequality in ZimbabweVSO webinar: Addressing social exclusion and gender inequality in Zimbabwe
VSO webinar: Addressing social exclusion and gender inequality in Zimbabwe
Jane Dustan
 
Lambeth violence against women and girls customer insight project
Lambeth violence against women and girls customer insight projectLambeth violence against women and girls customer insight project
Lambeth violence against women and girls customer insight projectlocalinsight
 
presentation_shailja_a_preventive_approch_towards_crime_against_women_1481180...
presentation_shailja_a_preventive_approch_towards_crime_against_women_1481180...presentation_shailja_a_preventive_approch_towards_crime_against_women_1481180...
presentation_shailja_a_preventive_approch_towards_crime_against_women_1481180...
SudeshnaThandar
 
Women right-nooria-ahmadi-af sig-2017-nitpaa
Women right-nooria-ahmadi-af sig-2017-nitpaaWomen right-nooria-ahmadi-af sig-2017-nitpaa
Women right-nooria-ahmadi-af sig-2017-nitpaa
National IT Professionals Association of Afghanistan
 
16 days presentation ppt about violence campaign
16 days presentation ppt about violence campaign16 days presentation ppt about violence campaign
16 days presentation ppt about violence campaign
DrmariaDana
 
Addressing gender violence in traditional rural communities
Addressing gender violence in traditional rural communitiesAddressing gender violence in traditional rural communities
Addressing gender violence in traditional rural communities
lizc38
 
Use of mobile phones for advocacy campaigns
Use of mobile  phones for advocacy campaignsUse of mobile  phones for advocacy campaigns
Use of mobile phones for advocacy campaignsChristiana Charles-Iyoha
 
Violence Against Women Presentation.pdf
Violence Against Women Presentation.pdfViolence Against Women Presentation.pdf
Violence Against Women Presentation.pdf
SudeshnaThandar
 
Newsletter enr.1_ENG
Newsletter enr.1_ENGNewsletter enr.1_ENG
Newsletter enr.1_ENG
Natalia Rezneac
 
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraeParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
Victor van R
 
Mobile vaani media consumer profile
Mobile vaani media consumer profileMobile vaani media consumer profile
Mobile vaani media consumer profile
Ashish Tandon
 
Mobile Messaging for Organizing
Mobile Messaging for OrganizingMobile Messaging for Organizing
Mobile Messaging for Organizing
NAACP
 
The LifeLine GBV Program in rural areas of Kwazulunatal South Africa, Sinikiw...
The LifeLine GBV Program in rural areas of Kwazulunatal South Africa, Sinikiw...The LifeLine GBV Program in rural areas of Kwazulunatal South Africa, Sinikiw...
The LifeLine GBV Program in rural areas of Kwazulunatal South Africa, Sinikiw...
terre des hommes schweiz
 
Shining Stars De-Vio Pitch Presentation Zimbabwe
Shining Stars De-Vio Pitch Presentation Zimbabwe Shining Stars De-Vio Pitch Presentation Zimbabwe
Shining Stars De-Vio Pitch Presentation Zimbabwe
Sandiswe Oka-Bhule
 

Similar to Presentation: Follow up on hackathon - FightVAW (20)

Seagulls
SeagullsSeagulls
Seagulls
 
VSO webinar: Addressing social exclusion and gender inequality in Zimbabwe
VSO webinar: Addressing social exclusion and gender inequality in ZimbabweVSO webinar: Addressing social exclusion and gender inequality in Zimbabwe
VSO webinar: Addressing social exclusion and gender inequality in Zimbabwe
 
Utkrasht
UtkrashtUtkrasht
Utkrasht
 
Lambeth violence against women and girls customer insight project
Lambeth violence against women and girls customer insight projectLambeth violence against women and girls customer insight project
Lambeth violence against women and girls customer insight project
 
B3 jade holvey
B3   jade holveyB3   jade holvey
B3 jade holvey
 
presentation_shailja_a_preventive_approch_towards_crime_against_women_1481180...
presentation_shailja_a_preventive_approch_towards_crime_against_women_1481180...presentation_shailja_a_preventive_approch_towards_crime_against_women_1481180...
presentation_shailja_a_preventive_approch_towards_crime_against_women_1481180...
 
WomEmpow
WomEmpowWomEmpow
WomEmpow
 
Women right-nooria-ahmadi-af sig-2017-nitpaa
Women right-nooria-ahmadi-af sig-2017-nitpaaWomen right-nooria-ahmadi-af sig-2017-nitpaa
Women right-nooria-ahmadi-af sig-2017-nitpaa
 
16 days presentation ppt about violence campaign
16 days presentation ppt about violence campaign16 days presentation ppt about violence campaign
16 days presentation ppt about violence campaign
 
Addressing gender violence in traditional rural communities
Addressing gender violence in traditional rural communitiesAddressing gender violence in traditional rural communities
Addressing gender violence in traditional rural communities
 
Accord
AccordAccord
Accord
 
Use of mobile phones for advocacy campaigns
Use of mobile  phones for advocacy campaignsUse of mobile  phones for advocacy campaigns
Use of mobile phones for advocacy campaigns
 
05
0505
05
 
Violence Against Women Presentation.pdf
Violence Against Women Presentation.pdfViolence Against Women Presentation.pdf
Violence Against Women Presentation.pdf
 
Newsletter enr.1_ENG
Newsletter enr.1_ENGNewsletter enr.1_ENG
Newsletter enr.1_ENG
 
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraeParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
 
Mobile vaani media consumer profile
Mobile vaani media consumer profileMobile vaani media consumer profile
Mobile vaani media consumer profile
 
Mobile Messaging for Organizing
Mobile Messaging for OrganizingMobile Messaging for Organizing
Mobile Messaging for Organizing
 
The LifeLine GBV Program in rural areas of Kwazulunatal South Africa, Sinikiw...
The LifeLine GBV Program in rural areas of Kwazulunatal South Africa, Sinikiw...The LifeLine GBV Program in rural areas of Kwazulunatal South Africa, Sinikiw...
The LifeLine GBV Program in rural areas of Kwazulunatal South Africa, Sinikiw...
 
Shining Stars De-Vio Pitch Presentation Zimbabwe
Shining Stars De-Vio Pitch Presentation Zimbabwe Shining Stars De-Vio Pitch Presentation Zimbabwe
Shining Stars De-Vio Pitch Presentation Zimbabwe
 

More from Prawesh Shrestha

Business plan and presentation ii - marketing and operations
Business plan and presentation   ii - marketing and operationsBusiness plan and presentation   ii - marketing and operations
Business plan and presentation ii - marketing and operationsPrawesh Shrestha
 
Business plan and presentation i - concept-growth-risk
Business plan and presentation   i - concept-growth-riskBusiness plan and presentation   i - concept-growth-risk
Business plan and presentation i - concept-growth-risk
Prawesh Shrestha
 
Technology Entrepreneurship - Making Business Sense
Technology Entrepreneurship - Making Business SenseTechnology Entrepreneurship - Making Business Sense
Technology Entrepreneurship - Making Business Sense
Prawesh Shrestha
 
Pivot Nepal - Presentation
Pivot Nepal - PresentationPivot Nepal - Presentation
Pivot Nepal - Presentation
Prawesh Shrestha
 
Swktm gdg presentation v1.0
Swktm gdg presentation v1.0Swktm gdg presentation v1.0
Swktm gdg presentation v1.0
Prawesh Shrestha
 
I os 101:basic training rajan
I os 101:basic training   rajanI os 101:basic training   rajan
I os 101:basic training rajan
Prawesh Shrestha
 
GSMA mWomen design challenge 2012
GSMA mWomen design challenge 2012GSMA mWomen design challenge 2012
GSMA mWomen design challenge 2012
Prawesh Shrestha
 
Introduction to fragments in android
Introduction to fragments in androidIntroduction to fragments in android
Introduction to fragments in android
Prawesh Shrestha
 
Design patterns
Design patternsDesign patterns
Design patterns
Prawesh Shrestha
 
N locate - market perspective
N locate - market perspectiveN locate - market perspective
N locate - market perspective
Prawesh Shrestha
 
Nepal load shedding apps
Nepal load shedding appsNepal load shedding apps
Nepal load shedding apps
Prawesh Shrestha
 
Introduction to android
Introduction to androidIntroduction to android
Introduction to android
Prawesh Shrestha
 
Ncell's scheme
Ncell's schemeNcell's scheme
Ncell's scheme
Prawesh Shrestha
 
Android trainingforbeginners
Android trainingforbeginnersAndroid trainingforbeginners
Android trainingforbeginners
Prawesh Shrestha
 
Scooba talk about your apps - vol 2
Scooba   talk about your apps - vol 2Scooba   talk about your apps - vol 2
Scooba talk about your apps - vol 2Prawesh Shrestha
 
Cross platform mobile development titanium appcelerator
Cross platform mobile development   titanium appceleratorCross platform mobile development   titanium appcelerator
Cross platform mobile development titanium appceleratorPrawesh Shrestha
 
SMS Based Applications: Behind the scene
SMS Based Applications: Behind the sceneSMS Based Applications: Behind the scene
SMS Based Applications: Behind the scenePrawesh Shrestha
 
Listbingo
ListbingoListbingo
Listbingo
Prawesh Shrestha
 

More from Prawesh Shrestha (19)

Business plan and presentation ii - marketing and operations
Business plan and presentation   ii - marketing and operationsBusiness plan and presentation   ii - marketing and operations
Business plan and presentation ii - marketing and operations
 
Business plan and presentation i - concept-growth-risk
Business plan and presentation   i - concept-growth-riskBusiness plan and presentation   i - concept-growth-risk
Business plan and presentation i - concept-growth-risk
 
Technology Entrepreneurship - Making Business Sense
Technology Entrepreneurship - Making Business SenseTechnology Entrepreneurship - Making Business Sense
Technology Entrepreneurship - Making Business Sense
 
Pivot Nepal - Presentation
Pivot Nepal - PresentationPivot Nepal - Presentation
Pivot Nepal - Presentation
 
Swktm gdg presentation v1.0
Swktm gdg presentation v1.0Swktm gdg presentation v1.0
Swktm gdg presentation v1.0
 
I os 101:basic training rajan
I os 101:basic training   rajanI os 101:basic training   rajan
I os 101:basic training rajan
 
GSMA mWomen design challenge 2012
GSMA mWomen design challenge 2012GSMA mWomen design challenge 2012
GSMA mWomen design challenge 2012
 
Introduction to fragments in android
Introduction to fragments in androidIntroduction to fragments in android
Introduction to fragments in android
 
Design patterns
Design patternsDesign patterns
Design patterns
 
N locate - market perspective
N locate - market perspectiveN locate - market perspective
N locate - market perspective
 
Nepal load shedding apps
Nepal load shedding appsNepal load shedding apps
Nepal load shedding apps
 
Introduction to android
Introduction to androidIntroduction to android
Introduction to android
 
Ncell's scheme
Ncell's schemeNcell's scheme
Ncell's scheme
 
Android trainingforbeginners
Android trainingforbeginnersAndroid trainingforbeginners
Android trainingforbeginners
 
Scooba talk about your apps - vol 2
Scooba   talk about your apps - vol 2Scooba   talk about your apps - vol 2
Scooba talk about your apps - vol 2
 
Mvc - Titanium
Mvc - TitaniumMvc - Titanium
Mvc - Titanium
 
Cross platform mobile development titanium appcelerator
Cross platform mobile development   titanium appceleratorCross platform mobile development   titanium appcelerator
Cross platform mobile development titanium appcelerator
 
SMS Based Applications: Behind the scene
SMS Based Applications: Behind the sceneSMS Based Applications: Behind the scene
SMS Based Applications: Behind the scene
 
Listbingo
ListbingoListbingo
Listbingo
 

Recently uploaded

Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Presentation: Follow up on hackathon - FightVAW

  • 1.
  • 2. Talking About Violence • Violence against women is increasing •  Rape and attempt to rape in the fiscal year B.S. 2069/70 reached 922 •  WOREC reported 198 cases of Violence Against Women in Shrawan, 2070. Domestic violence was the highest reported case • Recent cases •  Sita Rai •  Rape of minors, by family members
  • 3. Talking About Violence    According  to  the  Demographic  Health  Survey  of  2011:   • Sexual Violence:   •  85% of women aged between 15-49 years, who have experienced sexual violence have never told anyone •  8% have told someone •  7% have sought help • Physical Violence: •  66% of women aged between 15-49 years have never told anyone •  12% have told someone •  22% have sought help
  • 4. Responding to Violence Against Women • More than 2300 organizations working to end Violence Against Women • Limited coordination and communication • Consequences •  Victim has to repeat their traumatic experience several times •  Holistic support is not easily available as organizations focus on a particular area •  Information asymmetry: organizations that could support a case sometimes may not know the latest updates about a case
  • 5. Understanding Violence Against Women • Paucity of data and information on violence against women • Strong evidence on the extent of the problem, the causes and the consequences is difficult to obtain • News on VAW compiled by a few organizations • Many sad stories on VAW, but few on the survivors succeed to reclaim their lives
  • 6. Technology and Violence Against Women • What  role  can  informa=on  communica=ons   technology  (ICT)  play  in  addressing  some  of   challenges  faced  by  vic=ms  and  others  who   work  to  end  VAW?   • Why  ICT?   – As  of  June  2013,  mobile  penetra=on  has  reached   70%  and  25%  of  Nepal’s  popula=on  have  access  to   the  Internet. – These  numbers  will  only  grow  
  • 8. Fight VAW An initiative to use accessible Information and Communication Technologies in fighting Violence against Women in Nepal www.fightvaw.org
  • 9. Components of FightVAW Registering of Complaints / Problems through telephone
  • 10. Components of FightVAW Registering of Complaints / Problems through mobile sms
  • 11. •  Informed your closed ones for immediate support through smart phone application •  Report problems/through the application rather than SMS or voice call Android based Smart Phone Application Components of FightVAW
  • 12. What after complaints / Problems are registered ? •  Complaints accessed and transcribed by dedicated CSO representatives working in the field of VAW •  Individual cases followed-up for the benefit of the victim •  Tracking of cases and follow-ups carried out for each individual cases
  • 13. Some more components of Fight VAW
  • 14. Some more components of Fight VAW
  • 15. Some more components of Fight VAW Organizations in Action
  • 16. What do we aim to achieve ? Fight  VAW  as  An  Integrated  plaSorm  to: •  Provide  an  alterna've  means  to  report  experiences  of  violence  through      a  24-­‐hour  help  line  and  SMS •  Increase  the  speed  at  which  a  vic'ms  gets  support  from  CSOs •  Enhance  coordina'on  and  collabora'on  among  different  CSOs  working      to  support  the  vic=m •  Compile  informa'on  on  CSOs  working  all  across  Nepal  on  VAW  and      make  it  available  in  one  plaSorm •  Monitor  the  media  for  latest  news  and  updates  on  VAW  and  make  it      available  in  one  plaSorm  and  build  the  ini=al  infrastructure  necessary      to  compile  data  on  VAW  in  one  central  loca=on
  • 18. How Did it Come About? • Hackathon • World Bank’ commitment to support the ideas generated by the youth from the IT sector and the civil society
  • 19. VAW Hackathon – June 16, 2013
  • 20. VAW Hackathon Snapshot 100 + Participants 18 Teams 3 Winners
  • 21. Self Help - 3rd Winner •  Mobile Application that can send SMS to police, pre- selected trusted network about the location of victims in case of the incident of violence. •  Anyone can report about VAW to selected organizations using the app Team Members Kabindra Shakya Nhasala Joshi Kipendra Kushi Anish Parajuli, Binisha Shrestha
  • 22. Mero Katha (My Story) – 2nd Winner Collect, share and discuss stories that inspire people to report cases of VAW using both online platform and offline community. Team Members Yukti Lal Marik Wolf Price Jayanti Mala Chapagain Olin Thakur Inge Patsch
  • 23. Your Voice Our Support – 1st Winner •  Voice Recording of complaints through the use of mobile phones and landline phones •  CSO network to access them and take necessary action Team Members Susan Joshi Namita Pradhan, Sundar Man Vaidya
  • 24. What does FightVAW means to us at the moment ? A pilot design to use innovative use of home grown ICTs to address the use of Violence Against Women An opportunity explore collaboration and coordination among different stakeholders
  • 25. What are we doing next ? • Implement the pilot program till June, 2014 together with our collaborators and partners on selected locations • Monitor and document early impact stories • Fine-tuning of the system based on feedback received during the pilot implemntation
  • 26. Our vision for the long run •  Create ownership of the system among different stakeholders •  Figure out a mechanism to sustain the system with active Government engagement and ownership •  Make a case for Nepal in fighting the issues of VAW using ICTs at a global level
  • 27. df}gtf tf]8f}F Thank You ! www.fightvaw.org