An Enabling ICT Policy Environment for Women Entrepreneurs in Nepal

An Enabling ICT Policy Environment for Women Entrepreneurs in Nepal

An Enabling ICT Policy Environment for Women Entrepreneurs in Nepal An Enabling ICT Policy Environment for Women Entrepreneurs in Nepal Objectives of the Module The objective of the module is to inform policymakers and contribute to developing their actual gender-related policymaking skills or knowledge for women entrepreneurs. It is specifically designed for Nepal. Learning Outcomes: After completing this module, readers should be able to 1. Make appropriate decisions to integrate a gender perspective in entrepreneurship programmes 2. Design programmes and projects which address specific constraints to the inclusion of women and girls in entrepreneurial development 3. Make appropriate choices of ICTs for promoting digital financial inclusion and other support services for promoting entrepreneurship among women. 1 An Enabling ICT Policy Environment for Women Entrepreneurs in Nepal Table of Contents SECTION I ............................................................................................................................................. 7 I. Introduction ........................................................................................................................................ 8 II. SDGs, women’s empowerment, and women’s entrepreneurship ............................... 10 2.1 Understanding the Gender Divide in Nepal ....................................................................... 10 2.2 Sustainable Development Goals and Women’s Empowerment ................................ 11 2.3 To Sum Up ...................................................................................................................................... 15 SECTION II ........................................................................................................................................ 16 III. Trends in ICTs ............................................................................................................................. 17 3.1 Devices ........................................................................................................................................ 17 3.2 Trending Technologies for Storage and Processing .................................................. 18 3.2.1 Cloud Computing ............................................................................................................ 18 3.2.2 Internet of Things (IoT) ............................................................................................... 19 3.2.3 3D Printing ....................................................................................................................... 19 3.2.4 Artificial Intelligence .................................................................................................... 19 3.2.5 Technology Stacks ......................................................................................................... 20 3.2.6 Blockchain Technology ................................................................................................ 21 3.2.7 Bots ...................................................................................................................................... 21 3.3 Trending Applications .......................................................................................................... 22 3.3.1 Social Media ..................................................................................................................... 22 3.3.2 Big Data and Analytics ................................................................................................. 22 3.4 Trends in Usage ....................................................................................................................... 23 3.5 Sociopolitical and Legal Concerns .................................................................................... 24 3.6 To Sum Up ...................................................................................................................................... 25 IV. Women and ICTs—The Gender Digital Divide ............................................................... 27 4.1 The Digital Divide ................................................................................................................... 27 4.2 The Gender Digital Divide ................................................................................................... 29 4.2.1 Access: ................................................................................................................................ 30 4.2.2 Ownership and Control ............................................................................................... 31 4.2.3 Content and Language ................................................................................................. 31 4.2.4 Technology ....................................................................................................................... 31 4.2.5 Participation .................................................................................................................... 32 4.3 The ICT Opportunity for Women and Girls .................................................................. 33 4.4 To Sum Up ......................................................................................................................... 35 2 An Enabling ICT Policy Environment for Women Entrepreneurs in Nepal SECTION III ....................................................................................................................................... 37 V. Framing a Gender Sensitive Policy and Implementation Plan for Women’s Entrepreneurship .................................................................................................................................... 38 5.1 A Situational analysis ............................................................................................................ 40 5.2 The Policy .................................................................................................................................. 43 5.3 The Implementation Strategy or Action Plan .............................................................. 46 5.4 Awareness Creation among Beneficiaries .................................................................... 47 5.5 To Sum Up ................................................................................................................................ 49 VI. ICTs—Exploiting ICTs for Gender Sensitive Implementation in Women’s Entrepreneurship .................................................................................................................................... 50 6.1 ICTs for MSME Policy, laws, and regulation ................................................................ 51 6.2 ICTs for Financial Inclusion, Products and Services ................................................. 52 6.3 ICT Infrastructure and Technology ................................................................................. 55 6.4 ICTs for Capacity Building and Business Development Services (BDS) ........... 56 6.5 ICTs for Service Outreach and Marketing ..................................................................... 57 6.6 ICT Data to be collected ........................................................................................................ 58 6.7 Other factors impacting on programmes and projects ........................................... 61 6.7.1 Time .................................................................................................................................... 61 6.7.2 Cost ...................................................................................................................................... 61 6.7.3 Other factors. ................................................................................................................... 62 6.7 To Sum Up ................................................................................................................................ 62 VII. Conclusion .................................................................................................................................... 64 7.1 Mainstreaming Laws and Policies .................................................................................... 64 7.2 The ICT opportunity for women entrepreneurs ........................................................ 65 7.3 To Sum Up ................................................................................................................................. 66 3 An Enabling ICT Policy Environment for Women Entrepreneurs in Nepal Boxes Box 1: Goal 5 of the Sustainable Development Goals .................................................. 13 Box 2: Types of Devices ........................................................................................................... 18 Box 3 Shah’s Methodology for Gender Analysis .......................................................... 42 Box 4: Traditional Savings: Rotating Savings and Credit Association (ROSCA) 55 Case Studies Case Study 1 India Stack ......................................................................................................... 20 Case Study 2: eHomemakers ................................................................................................. 34 Case Study 3: GREAT Women Project, Philippines ...................................................... 44 Case Study 4: Gender Fund in Philippines ....................................................................... 46 Case Study 5: Community Radio

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    76 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us