<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=Content-Type content="text/html; charset=us-ascii">
<meta name=Generator content="Microsoft Word 12 (filtered medium)">
<style>
<!--
 /* Font Definitions */
 @font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:"Century Gothic";
        panose-1:2 11 5 2 2 2 2 2 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0cm;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
        {mso-style-priority:34;
        margin-top:0cm;
        margin-right:0cm;
        margin-bottom:0cm;
        margin-left:36.0pt;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman","serif";}
span.EmailStyle17
        {mso-style-type:personal-reply;
        font-family:"Century Gothic","sans-serif";
        color:#1F497D;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page Section1
        {size:612.0pt 792.0pt;
        margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.Section1
        {page:Section1;}
 /* List Definitions */
 @list l0
        {mso-list-id:833186911;
        mso-list-type:hybrid;
        mso-list-template-ids:-1352389748 134807567 134807577 134807579 134807567 134807577 134807579 134807567 134807577 134807579;}
@list l0:level1
        {mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level2
        {mso-level-tab-stop:72.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level3
        {mso-level-tab-stop:108.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level4
        {mso-level-tab-stop:144.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level5
        {mso-level-tab-stop:180.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level6
        {mso-level-tab-stop:216.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level7
        {mso-level-tab-stop:252.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level8
        {mso-level-tab-stop:288.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level9
        {mso-level-tab-stop:324.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l1
        {mso-list-id:2088382106;
        mso-list-type:hybrid;
        mso-list-template-ids:322859884 134807567 134807577 134807579 134807567 134807577 134807579 134807567 134807577 134807579;}
@list l1:level1
        {mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
ol
        {margin-bottom:0cm;}
ul
        {margin-bottom:0cm;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext="edit">
  <o:idmap v:ext="edit" data="1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=EN-GB link=blue vlink=purple>

<div class=Section1>

<p class=MsoNormal><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'>HI colleagues <o:p></o:p></span></p>

<p class=MsoNormal><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'>Cybercrime against the person and in   this case the
woman is real and is rising . unfortunately, all the efforts to understand the
vice focuses on the cyber crime against property and against governments . the
only other notable effort against the person is against the child.  <o:p></o:p></span></p>

<p class=MsoNormal><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'><o:p> </o:p></span></p>

<p class=MsoNormal><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'>While cyberspace  have provided secure tools and spaces
where women can enjoy their freedom of expression, information and privacy of
communication, the same benefits of anonymity and privacy also extend to those
who employ ICTs for criminal activities and use the internet to commit violence
against women.  The use of mobile phones and internet to stalk, abuse,
traffic, intimidate and humiliate women is palpable in developing countries
including Kenya. The lack of specific cybercrime/cyber security legislation
makes it even more difficult to punish those who use ICTs tools to conduct
violence against women. Kenya Communications ( Amendment) Act 2009  focused
on the cybercrime against property and not the person. Kenya is not alone 
but that is not a consolation.  With increased use of internet in Kenya
with the onset of broadband, it is necessary to create the necessary policy /
regulatory and the operational framework to reign in the vice . <o:p></o:p></span></p>

<p class=MsoNormal><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'><o:p> </o:p></span></p>

<p class=MsoNormal><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'>KICTANET has launched a study   on the vice whose research
questions  are;<o:p></o:p></span></p>

<p class=MsoNormal><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'> <o:p></o:p></span></p>

<p class=MsoListParagraph style='text-indent:-18.0pt;mso-list:l1 level1 lfo3'><![if !supportLists]><span
style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";color:#1F497D'><span
style='mso-list:Ignore'>1.<span style='font:7.0pt "Times New Roman"'>      
</span></span></span><![endif]><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'>What is the prevalence of cybercrime against women in terms of
degree, level, quantity, and distribution?<o:p></o:p></span></p>

<p class=MsoListParagraph style='text-indent:-18.0pt;mso-list:l1 level1 lfo3'><![if !supportLists]><span
style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";color:#1F497D'><span
style='mso-list:Ignore'>2.<span style='font:7.0pt "Times New Roman"'>      
</span></span></span><![endif]><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'>How does cyber crime affect women differently? (Demonstrate
spiral effect and determine if women are already intimidated by cyber space
e.g.   mailing lists, how active do women participate in debates? Is
the design of the cyber already woman unfriendly?)<o:p></o:p></span></p>

<p class=MsoListParagraph style='text-indent:-18.0pt;mso-list:l1 level1 lfo3'><![if !supportLists]><span
style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";color:#1F497D'><span
style='mso-list:Ignore'>3.<span style='font:7.0pt "Times New Roman"'>      
</span></span></span><![endif]><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'>What are the current measures and gaps (technological, legal,
social, and psychological) to address cyber crime against women (local,
regional, and global)? Map the efforts (lessons of best practice).<o:p></o:p></span></p>

<p class=MsoListParagraph style='text-indent:-18.0pt;mso-list:l1 level1 lfo3'><![if !supportLists]><span
style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";color:#1F497D'><span
style='mso-list:Ignore'>4.<span style='font:7.0pt "Times New Roman"'>      
</span></span></span><![endif]><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'>What mechanisms are appropriate for addressing cyber crime
against women?<o:p></o:p></span></p>

<p class=MsoNormal><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'><o:p> </o:p></span></p>

<p class=MsoNormal><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'><o:p> </o:p></span></p>

<p class=MsoNormal><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'>Kictanet will   mount a validation workshop to review
literature  as well as the research strategy  on Feb 16<sup>th</sup>,
2010<o:p></o:p></span></p>

<p class=MsoNormal><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'><o:p> </o:p></span></p>

<p class=MsoNormal><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'>If you wish to contribute to make the cyberspace safer for women
, we have limited spaces(free)  for Kictanet members  at the
workshop- send your request  for space OFFLINE not to clog the mailing
list.<o:p></o:p></span></p>

<p class=MsoNormal><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'><o:p> </o:p></span></p>

<p class=MsoNormal><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'>Cheers <o:p></o:p></span></p>

<p class=MsoNormal><span style='font-size:9.0pt;font-family:"Century Gothic","sans-serif";
color:#1F497D'>Muriuki Mureithi<o:p></o:p></span></p>

</div>

</body>

</html>