Gender Considerations

  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 1-15 of 15 results

   
   
Publication

Cybersecurity Threats, Vulnerabilities and Resilience Among Women Human Rights Defenders and Civil Society in South-East Asia

Authors

Year

  • 2024

Description

  • Authored by Jaimee Stuart with contributions from Cara Antonaccio and Min Yang, and published by UN …

 

Publication

Final Report: Women’s Participation in Southeast Asia’s Cybersecurity Sector

Authors

Year

  • 2024

Description

  • This report compiles research findings from the “Women’s Participation in Southeast Asia…

 

Tool

A Framework for Developing Gender-Responsive Cybersecurity Policy: Assessment Tool

Authors

Year

  • 2023

Description

  • This assessment tool seeks to provide step-by-step advice and concrete recommendations for those wis…

 

Publication

Workforce Report: Women in Cybersecurity

Authors

Year

  • 2019

 

Tool

Guide To Fostering Inclusive Cyber Norm Processes (Inclusive Cyber Norms Toolkit)

Authors

Year

  • 2023

Description

  • This toolkit is a pathbreaking new resource which aims to support and empower policymakers and other…

 

Publication

Gendering Cybersecurity through Women, Peace and Security: Gender and Human Rights in National-level Approaches to Cybersecurity

Authors

Year

  • 2023

Description

  • There is a growing awareness on the multilateral level of the need to integrate a gender perspective…

 

Tool

Integrating gender in cybercrime capacity-building: A toolkit

Authors

Year

  • 2023

Description

  • About The ‘Integrating gender in cybercrime capacity-building’ toolkit by Chatham House …

 

Publication

Cyber Violence against Women and Girls in the Western Balkans: Selected Case Studies and a Cybersecurity Governance Approach

Authors

Year

  • 2021

Description

  • This publication focuses on the Western Balkan region and seeks to portray this important issue thro…

 

Publication

Gender Equality, Cybersecurity and Security Sector Governance

Authors

Year

  • 2022

Description

  • This paper describes for the first time the link between good governance in cybersecurity and gende…

 

Publication

La ciberseguridad de las mujeres durante la pandemia del COVID-19: experiencias, riesgos y estrategias de autocuidado en la nueva normalidad digital

Authors

Year

  • 2021

Description

  • En este documento, se propone un análisis del escenario de ciberataques surgido a propósito de la …

 

Tool

Manual on Online Gender Violence and its Impact on the Lives of Women and Girls

Authors

Year

  • 2021

Description

  • The Inter-American Commission of Women (CIM) and Cybersecurity Program of the Inter-American Committ…

 

Publication

System Update: Towards a Women, Peace and Cybersecurity Agenda

Authors

Year

  • 2021

Description

  • System Update explores the relationship between the Women, Peace and Security (WPS) agenda on the on…

 

Publication

Gender Approaches to Cybersecurity: Design, Defence and Response

Authors

Year

  • 2021

Description

  • “Gender Approaches to Cybersecurity” explores how gender norms shape specific activities…

 

Publication

New Ways to Bring Women Into and Up Through Cybersecurity Careers

Authors

Year

  • 2019

Description

  • Women make up less than one-quarter of the cybersecurity workforce, which can lead to less innovatio…

 

Publication

Why Gender Matters in International Cyber Security

Authors

Year

  • 2020

Description

  • Gender matters in international cyber security. It shapes and influences our online behaviour; deter…

 

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.