"In the 1991 cyclones that hit Bangladesh, 90 per cent of the 140 000 victims were women. In the deadly heat waves that hit France in 2003, most fatalities were elderly women. During the 2005 Hurricane Katrina emergency in New Orleans, most of the victims were Afro-American women and their children. And yet again, with the COVID-19 pandemic, women are bearing the brunt; not only because they represent an estimated 70 per cent of frontline healthcare workers and undertake most of the care work in the home, but because their over-representation in the informal economy and lower pay rates mean they are significantly harder hit by the economic downturn. In such times of crises, access to accurate information is life-saving and life-changing for women, their families and their communities. Their perspectives and experiences, as well as their ability to organize, lobby and inform, can dramatically improve disaster risk management. That is why we need more innovative and culturally sensitive approaches to empowering women and girls through digital networks, platforms and technologies. With many years of experience in delivering communications in times of disasters, ITU and the other partners of the Emergency Telecommunications Cluster (ETC) can attest to the importance and impact of such empowerment. That is why we are working to involve more women in the development of national disaster management strategies and strategic consultations on disaster preparedness and response, including for early warning systems. We hope this joint paper will go a long way towards integrating women’s needs into national disaster risk reduction frameworks, as well as in ensuring they get access to the digital tools that can play such an important role in their own safety and security, and that of their families and communities." (Foreword)
1 Introduction, 1
2 Gendered disaster and digital asymmetries, 4
3 Gisele’s story, 13
4 ICTs reduce gender-based disaster vulnerabilities, 15
Radio -- Television -- Basic voice and SMS -- Internet -- Supporting ICT tools
5 Unintended consequences, 37
6 Analysis, 40
7 Recommendations, 46
Principled foundations -- Alliances and advocates -- Stratified targets -- Strategies for early adopters -- Strategies by ICT service -- Strategies specific to key vulnerability factors -- Research and innovation
8 Conclusions, 64