Part I: Conceptualizing Inequality and Insecurity in the Digital Age

Author:

Exploring the digital frontiers of feminist international relations, this book investigates how gender can be mainstreamed into discourse about technology and security.

With a focus on big data, communications technology, social media, cryptocurrency, and decentralized finance, the book explores the ways in which technology presents sites for gender-based violence. Crucially, it examines potential avenues for resistance at these sites, especially regarding the actions of major tech companies, surveillance by repressive governments, and attempts to use the Global South as a laboratory for new interventions.

The book draws valuable insights which will be essential to researchers in International Relations, Security Studies, and Feminist Security Studies.

  • 2017 IIC Winner: Digital Citizen Fund (Technology Access). 2017. www.youtube.com/watch?v=Bqhuz6TMT7o&feature=emb_logo&ab_channel=MITInitiativeontheDigitalEconomy (accessed 25 January 2021).

    • Search Google Scholar
    • Export Citation
  • 37Coins. 2015. ‘Thank You’. Medium. https://medium.com/@37Coins/thank-you-59baedb13c50 (accessed 7 August 2020).

  • Abu-Laban, Yasmeen. 2015. ‘Gendering Surveillance Studies: The Empirical and Normative Promise of Feminist Methodology’. Surveillance & Society 13(1): 4456.

    • Search Google Scholar
    • Export Citation
  • Access Now/Front Line Defenders. 2022. ‘Women Human Rights Defenders Speak out about Pegasus Attacks’. Access Now. www.accessnow.org/women-human-rights-defenders-pegasus-attacks-bahrain-jordan/ (accessed 12 February 2022).

    • Search Google Scholar
    • Export Citation
  • Ackerly, Brooke A., Maria Stern, and Jacqui True, eds. 2006. Feminist Methodologies for International Relations. 1st edition. Cambridge, UK and New York: Cambridge University Press.

    • Search Google Scholar
    • Export Citation
  • ACLED. 2020. ‘Where Are Demonstrations Featuring Women Most Prevalent?’. Acled Data. https://acleddata.com/2020/03/06/where-are-demonstrations-featuring-women-most-prevalent/ (accessed 7 April 2020).

    • Search Google Scholar
    • Export Citation
  • Adams, Philippa R., Julie Frizzo-Barker, Betty B. Ackah, and Peter Chow-White. 2020. ‘Meetups’. In Blockchain and Web 3.0: Social, Economic, and Technical Challenges, edited by Massimo Ragnedda and Giuseppe Destefanis. New York: Routledge, pp 48–61.

    • Search Google Scholar
    • Export Citation
  • Ahmed, Azam, and Nicole Perlroth. 2017. ‘Using Texts as Lures, Government Spyware Targets Mexican Journalists and Their Families’. The New York Times. www.nytimes.com/2017/06/19/world/americas/mexico-spyware-anticrime.html (accessed 10 February 2022).

    • Search Google Scholar
    • Export Citation
  • Ahmed, Fauzia Erfan. 2008. ‘Microcredit, Men, and Masculinity’. NWSA Journal 20(2): 122155.

  • Aizura, Aren Z., Carsten Trystan Cotton, Carla Balzer, Marcia Ochoa LaGata and Slavador Vidal-Ortiz 2014. ‘Introduction’. TSQ: Transgender Studies Quarterly 1(3): 308319.

    • Search Google Scholar
    • Export Citation
  • Al-Dayel, Nadia, and Andrew Mumford. 2020. ISIS and Their Use of Slavery. The Hague: International Centre for Counter-Terrorism – The Hague.

    • Search Google Scholar
    • Export Citation
  • Al-Dayel, Nadia, Andrew Mumford, and Kevin Bales. 2020. ‘Not Yet Dead: The Establishment and Regulation of Slavery by the Islamic State’. Studies in Conflict & Terrorism 45(11): 124.

    • Search Google Scholar
    • Export Citation
  • Al Saqqaf, Walid. nd. ‘Ep. 143 – UN World Food Programme on the Blockchain’. https://insureblocks.com/ep-143-un-world-food-programme-on-the-blockchain/ (accessed 5 April 2022).

    • Search Google Scholar
    • Export Citation
  • Alkurd, Ibrahim. 2020. ‘Council Post: A Guide To Decentralized Finance’. Forbes. www.forbes.com/sites/theyec/2020/10/16/a-guide-to-decentralized-finance/ (accessed 22 January 2021).

    • Search Google Scholar
    • Export Citation
  • Allyn, Bobby. 2021. ‘“Lex Luthor of the Internet”: Meet the Man Keeping Far-Right Websites Alive’. NPR.org. www.npr.org/2021/02/08/965448572/meet-the-man-behind-epik-the-tech-firm-keeping-far-right-websites-alive (accessed 8 July 2021).

    • Search Google Scholar
    • Export Citation
  • Alsema, Adriaan. 2016. ‘Colombia’s Most Important Vote in Recent History Marred by Disinformation’. Colombia Reports. https://colombiareports.com/amp/colombias-important-vote-recent-history-marred-disinformation/ (accessed 20 January 2022).

    • Search Google Scholar
    • Export Citation
  • Alsuwaida, Nouf. 2016. ‘Women’s Education in Saudi Arabia’. Journal of International Education Research 12(4): 111118.

  • al-Thaibani, Kawkab. 2019. Agents for Change: Women as Grassroots Peacebuilders in Yemen. Vale City: Women4Yemen Network. www.academia.edu/49510283/Agents_for_Change_Women_as_Grassroots_Peacebuilding_in_Yemen (accessed 31 August 2022).

    • Search Google Scholar
    • Export Citation
  • Alvarez, Fernando E., David Argente, and Diana Van Patten. 2022. Are Cryptocurrencies Currencies? Bitcoin as Legal Tender in El Salvador. Cambridge, MA: National Bureau of Economic Research.

    • Search Google Scholar
    • Export Citation
  • Aly, Anne, and Jason-Leigh Striegher. 2012. ‘Examining the Role of Religion in Radicalization to Violent Islamist Extremism’. Studies in Conflict & Terrorism 35(12): 849862.

    • Search Google Scholar
    • Export Citation
  • Amarasingam, Amarnath, and Marc-André Argentino. 2020. ‘The QAnon Conspiracy Theory: A Security Threat in the Making?’. Combating Terrorism Center at West Point. https://ctc.usma.edu/the-qanon-conspiracy-theory-a-security-threat-in-the-making/ (accessed 10 December 2020).

    • Search Google Scholar
    • Export Citation
  • Ambler, Pamela, Angel Au-Yeung, Grace Chung, Jeff Kauflin, Alex Konrad, Laura Shin et al. 2018. ‘The Richest People in Cryptocurrency’. Forbes. www.forbes.com/richest-in-cryptocurrency/ (accessed 30 July 2020).

    • Search Google Scholar
    • Export Citation
  • Amnesty International. 2018. Toxic Twitter: A Toxic Place for Women. London: Amnesty International.

  • Amnesty International. 2022. ‘Amnesty International Verifies Use of Pegasus Spyware against Journalists in El Salvador’. Amnesty International. www.amnesty.org/en/latest/news/2022/01/el-salvador-pegasus-spyware-surveillance-journalists/ (accessed 8 February 2022).

    • Search Google Scholar
    • Export Citation
  • Amnesty International India. 2020. Troll Patrol India: Exposing Online Abuse Faced by Women Politicians in India. Bengaluru: Indians for Amnesty International Trust. https://decoders.blob.core.windows.net/troll-patrol-india-findings/Amnesty_International_India_Troll_Patrol_India_Findings_2020.pdf (accessed 31 March 2021).

    • Search Google Scholar
    • Export Citation
  • AP. 2021. ‘India Restores 4G Mobile Internet in Kashmir after 18-Month Ban’. NBC News. www.nbcnews.com/news/world/india-restores-4g-mobile-internet-kashmir-after-18-month-ban-n1256930 (accessed 5 February 2022).

    • Search Google Scholar
    • Export Citation
  • Argentino, Marc-André, Blyth Crawford, Florence Keen, and Hannah Rose. 2021. Far From Gone: The Evolution of Extremism in the First 100 Days of the Biden Administration. Londo n: International Centre for the Study of Radicalisation.

    • Search Google Scholar
    • Export Citation
  • Arisandi, Fifi. 2019. ‘Ripple vs Stellar: The History, Rivalry, and Future’. Medium. https://medium.com/@fifiarisandi_/ripple-vs-stellar-the-history-rivalry-and-future-53de6a6f5add (accessed 14 August 2020).

    • Search Google Scholar
    • Export Citation
  • Armstrong, Charles K. 2002. ‘The Origins of North Korean Cinema: Art and Propaganda in the Democratic People’s Republic’. Acta Koreana 5(1): 120.

    • Search Google Scholar
    • Export Citation
  • Armstrong, Gary, and Clive Norris. 1999. The Maximum Surveillance Society: The Rise of CCTV. New York: Routledge.

  • Asmann, Parker. 2021. ‘Colombia Report Triples Number of Known False Positives Victims’. InSight Crime. https://insightcrime.org/news/report-colombia-false-positives/ (accessed 11 November 2021).

    • Search Google Scholar
    • Export Citation
  • Associated Press. 2021. ‘Taliban Fighters Who Rolled into Kabul Appeared Awestruck by the Towering Apartment Blocks, Modern Office Buildings and Shopping Malls: Afghanistan’s Cities Have Been Transformed in the Two Decades since a U.S.-Led Invasion Drove the Militants from Power’. 17 August. https://apnews.com/article/afghanistan-taliban-then-and-now-82594865156f9fdae9db4ce1c34d8d43?utm_source=Twitter&utm_campaign=SocialFlow&utm_medium=AP (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Avant, Deborah. 2004. ‘The Privatization of Security and Change in the Control of Force’. International Studies Perspectives 5(2): 153157.

    • Search Google Scholar
    • Export Citation
  • Avant, Deborah, and Kara Kingma Neu. 2019. ‘The Private Security Events Database’. Journal of Conflict Resolution 63(8): 19862006.

    • Search Google Scholar
    • Export Citation
  • Awan, Farah, and Soheib Nunhuck. 2020. ‘Governing Blocks: Building Interagency Consensus to Coordinate Humanitarian Aid’. Journal of Science Policy and Governance 16(2). www.sciencepolicyjournal.org/uploads/5/4/3/4/5434385/awan_nunhuck_jspg_v16.2.pdf (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Azam, Mehtabul, Yana Rodgers, Michael Stewart-Evans, and Inkeri von Hase. 2020 . Migrant Women and Remittances: Exploring the Data from Selected Countries. New York: UN Women.

    • Search Google Scholar
    • Export Citation
  • Baldet, Amber, and Catherine Powell. 2019. ‘Women Revolutionizing Blockchain: Cryptocurrencies for Change’. Presented at the Council on Foreign Relations. www.cfr.org/event/women-revolutionizing-blockchain-cryptocurrencies-change-0 (accessed 29 July 2020).

    • Search Google Scholar
    • Export Citation
  • Ball, Kirstie, Kevin Haggerty, and David Lyon. 2012. ‘Introducing Surveillance Studies’. In Routledge Handbook of Surveillance Studies, edited by Kirstie Ball, Kevin Haggerty, and David Lyon. Florence, SC: Taylor & Francis, pp 1–12.

    • Search Google Scholar
    • Export Citation
  • Bandurski, David. 2022. ‘China and Russia are Joining Forces to Spread Disinformation’. Brookings. www.brookings.edu/techstream/china-and-russia-are-joining-forces-to-spread-disinformation/ (accessed 25 April 2022).

    • Search Google Scholar
    • Export Citation
  • Baraniuk, Chris. 2019. ‘Bitcoin’s Energy Consumption “Equals that of Switzerland”’. BBC News. www.bbc.com/news/technology-48853230 (accessed 22 January 2021).

    • Search Google Scholar
    • Export Citation
  • Barkawi, Ban. 2020. ‘Six Years on: Yazidi Survivors See “Only Empty Promises” in Aftermath of Massacre’. Reuters. www.reuters.com/article/iraq-war-yazidis-idINL8N2DW0XI (accessed 7 January 2021).

    • Search Google Scholar
    • Export Citation
  • Basu, Soumita. 2016. ‘The Global South Writes 1325 (Too)’. International Political Science Review 37(3): 362374.

  • Basu, Soumita, and Paul Kirby, eds. 2020. ‘Women, Peace and Security: A Critical Cartography’. In New Directions in Women, Peace and Security, edited by Soumita Basu, Paul Kirby, and Laura Shepherd. Bristol: Policy Press, pp 128.

    • Search Google Scholar
    • Export Citation
  • BBC News. 2021. ‘Peace Court: Colombia Army “behind 6,400 Extrajudicial Killings”’. BBC News. www.bbc.com/news/world-latin-america-56112386 (accessed 11 November 2021).

    • Search Google Scholar
    • Export Citation
  • Bearman, Christopher J. 2005. ‘An Examination of Suffragette Violence’. The English Historical Review 120(486): 365397.

  • Bedford, Kate. 2007. ‘The Imperative of Male Inclusion: How Institutional Context Influences World Bank Gender Policy’. International Feminist Journal of Politics 9(3): 289311.

    • Search Google Scholar
    • Export Citation
  • Bell, Christine, Sanja Badanjak, Robert Forester, Astrid Jamar, Kevin McNicholl, Kathryn Nash et al. 2019. PA-X Codebook, Version 1. Edinburgh: Political Settlements Research Programme, University of Edinburgh. www.peaceagreements.org/wsearch?WggSearchForm%5Bregion%5D=&WggSearchForm%5Bcountry_entity%5D=&WggSearchForm%5Bname%5D=&WggSearchForm%5Bcategory_addressed%5D%5B%5D=70&WggSearchForm%5Bcategory_addressed%5D%5B%5D=71&WggSearchForm%5Bcategory_mode%5D=any&WggSearchForm%5Bagreement_text%5D=&s=Search+Database (accessed 11 November 2021).

    • Search Google Scholar
    • Export Citation
  • Benjamin, Ruha. 2019. Race After Technology: Abolitionist Tools for the New Jim Code. 1st edition. Medford, MA: Polity.

  • Berger, J.M., and Jonathon Morgan. 2015. The ISIS Twitter Census. Washington, DC: The Brookings Institution.

  • Bergman, Ronen, and Mark Mazzetti. 2021. ‘Israeli Companies Aided Saudi Spying Despite Khashoggi Killing’. The New York Times. www.nytimes.com/2021/07/17/world/middleeast/israel-saudi-khashoggi-hacking-nso.html (accessed 12 February 2022).

    • Search Google Scholar
    • Export Citation
  • Bergman, Ronen, and Mark Mazzetti. 2022. ‘The Battle for the World’s Most Powerful Cyberweapon’. The New York Times. www.nytimes.com/2022/01/28/magazine/nso-group-israel-spyware.html (accessed 10 February 2022).

    • Search Google Scholar
    • Export Citation
  • Bernards, Nick. 2019. ‘The Poverty of Fintech? Psychometrics, Credit Infrastructures, and the Limits of Financialization’. Review of International Political Economy 26(5): 815838.

    • Search Google Scholar
    • Export Citation
  • Bernards, Nick, and Malcom Campbell-Verduyn. 2019. ‘Understanding Technological Change in Global Finance through Infrastructures’. Review of International Political Economy 26(5): 773789.

    • Search Google Scholar
    • Export Citation
  • Berners-Lee, Tim, James Hendler, and Ora Lassila. 2001. ‘The Semantic Web’. Scientific American. www.scientificamerican.com/article/the-semantic-web/ (accessed 15 February 2021).

    • Search Google Scholar
    • Export Citation
  • Bertram, Theo, Elie Bursztein, Stephanie Caro, Hubert Chao, Rutledge Chin Feman, Albin Gustafsson et al. 2019. ‘Five Years of the Right to Be Forgotten’. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. London: ACM, pp 959972.

    • Search Google Scholar
    • Export Citation
  • Beteta, Hanny Cueva. 2006. ‘What Is Missing in Measures of Women’s Empowerment?Journal of Human Development 7(2): 221241.

  • Bhandari, Vrinda. 2021. What’s Sex Got to Do with It? Mapping the Impact of Questions of Gender and Sexuality on the Evolution of the Digital Rights Landscape in India. Delhi: Internet Democracy Project. https://internetdemocracy.in/reports/whats-sex-got-to-do-with-it-mapping-the-impact-of-questions-of-gender-and-sexuality-on-the-evolution-of-the-digital-rights-landscape-in-india/ (accessed 31 March 2021).

    • Search Google Scholar
    • Export Citation
  • Bhatia, Monish. 2021. ‘Racial Surveillance and the Mental Health Impacts of Electronic Monitoring on Migrants’. Race & Class 62(3): 1836.

    • Search Google Scholar
    • Export Citation
  • Biddle, Sam, and Ryan Devereaux. 2019. ‘Peter Thiel’s Palantir was Used to Bust Relatives of Migrant Children, New Documents Show’. The Intercept. https://theintercept.com/2019/05/02/peter-thiels-palantir-was-used-to-bust-hundreds-of-relatives-of-migrant-children-new-documents-show/ (accessed 8 February 2022).

    • Search Google Scholar
    • Export Citation
  • Black, Edwin. 2012. IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America’s Most Powerful Corporation. Expanded edition. Washington, DC: Dialog Press.

    • Search Google Scholar
    • Export Citation
  • Blanck, Peter. 2016. eQuality: The Struggle for Web Accessibility by Persons with Cognitive Disabilities. Reprint edition. Cambridge: Cambridge University Press.

    • Search Google Scholar
    • Export Citation
  • Blee, Kathleen M. 2008. Women of the Klan: Racism and Gender in the 1920s. Berkeley, CA: University of California Press.

  • Boateng, Godfred O., Torsten B. Neilands, Edward A. Frongillo, Hugo R. Melgar-Quiñonez, Sera L. Young et al. 2018. ‘Best Practices for Developing and Validating Scales for Health, Social, and Behavioral Research: A Primer’. Frontiers in Public Health 6. www.frontiersin.org/articles/10.3389/fpubh.2018.00149/full (accessed 18 March 2021).

    • Search Google Scholar
    • Export Citation
  • Boesch, Diana, and Shilpa Phadke. 2021. ‘When Women Lose All the Jobs: Essential Actions for a Gender-Equitable Recovery’. Center for American Progress. www.americanprogress.org/article/women-lose-jobs-essential-actions-gender-equitable-recovery/ (accessed 1 February 2022).

    • Search Google Scholar
    • Export Citation
  • Bohórquez Oviedo, Ángela María. 2021. ‘Weaponizing Gender: The Campaign against “Gender Ideology” in the Colombian Peace Plebiscite’. Doctoral Dissertation. University of Delaware.

    • Search Google Scholar
    • Export Citation
  • Bohra, Neelam, and A.J. Willingham. 2021. ‘Remote Work Made Life Easier for Many People with Disabilities. They Want the Option to Stay’. CNN. www.cnn.com/2021/08/10/health/remote-work-disabilities-pandemic-wellness-trnd/index.html (accessed 8 February 2022).

    • Search Google Scholar
    • Export Citation
  • Bond, Jeremy, Kathryn Dirkin, Alexa Jean Tyler, and Stefanie Lassitter. 2021. ‘Ladders and Escalators: Examining Advancement Obstacles for Women in Instructional Design’. The Journal of Applied Instructional Design 10(2). https://edtechbooks.org/jaid_10_2/examining_advancemen (accessed 1 February 2022).

    • Search Google Scholar
    • Export Citation
  • Bowles, Nellie. 2018. ‘Women in Cryptocurrencies Push Back Against “Blockchain Bros”’. The New York Times. www.nytimes.com/2018/02/25/business/cryptocurrency-women-blockchain-bros.html (accessed 30 July 2020).

    • Search Google Scholar
    • Export Citation
  • Brand, Dalana. 2019. ‘Inclusion & Diversity Report September 2019’. https://blog.twitter.com/en_us/topics/company/2019/inclusion-and-diversity-report-september-2019.html (accessed 29 March 2021).

    • Search Google Scholar
    • Export Citation
  • Brown, Robyn Lewis, and Mairead Eastin Moloney. 2019. ‘Intersectionality, Work, and Well-Being: The Effects of Gender and Disability’. Gender & Society 33(1): 94122.

    • Search Google Scholar
    • Export Citation
  • Browne, Simone. 2012. ‘Race and Surveillance’. In Routledge Handbook of Surveillance Studies, edited by Kirstie Ball, Kevin Haggerty, and David Lyon. Florence, SC: Taylor & Francis, pp 72–80.

    • Search Google Scholar
    • Export Citation
  • Browning, Kellen, and Taylor Lorenz. 2021. ‘Pro-Trump Mob Livestreamed Its Rampage, and Made Money Doing It’. The New York Times. www.nytimes.com/2021/01/08/technology/dlive-capitol-mob.html (accessed 24 August 2021).

    • Search Google Scholar
    • Export Citation
  • BSR. 2021. Human Rights Assessment: Global Internet Forum to Counter Terrorism. London: Business for Social Responsibility. https://gifct.org/wp-content/uploads/2021/07/BSR_GIFCT_HRIA.pdf (accessed 10 August 2021).

    • Search Google Scholar
    • Export Citation
  • Buolamwini, Joy, and Timnit Gebru. 2018. ‘Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification’. Proceedings of Machine Learning Research 81: 115.

    • Search Google Scholar
    • Export Citation
  • Burke, Sloane C., Michele Wallen, Karen Vail-Smith, and David Knox. 2011. ‘Using Technology to Control Intimate Partners: An Exploratory Study of College Undergraduates’. Computers in Human Behavior 27(3): 11621167.

    • Search Google Scholar
    • Export Citation
  • Burton, Anthony Glyn, Greg Elmer, and Stephen J. Neville. 2020. ‘Zoom-Bombings Disrupt Online Events with Racist and Misogynist Attacks’. The Conversation. http://theconversation.com/zoom-bombings-disrupt-online-events-with-racist-and-misogynist-attacks-138389 (accessed 12 November 2020).

    • Search Google Scholar
    • Export Citation
  • Buzatu, Anne-Marie, Agnieszka Fal-Dutra Santos, Dinah Lakehal, Panthea Pourmalek, Michaela Zelenanska. 2021. Women, Peace, and Security and Human Rights in the Digital Age: Opportunities and Risks to Advance Women’s Meaningful Participation and Protect Their Rights. Policy Brief. Global Network of Women Peacebuilders/ICT4Peace Foundation. https://gnwp.org/wp-content/uploads/PolicyBriefGNWP-2021c.pdf (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Bytes for All Bangladesh. 2022. ‘BDOSN Survey on Gender Based Online Violence (GBV) in Bangladesh: What It Tells about Our Internet Environment?’. www.bytesforall.org/bytesforall-bangladesh-survey-on-gender-based-online-violence-gbv-in-bangladesh-what-it-tells-about-our-internet-environment/ (accessed 27 April 2022).

    • Search Google Scholar
    • Export Citation
  • Cabanes Ragandang, Primitivo. 2020. ‘Social Media and Youth Peacebuilding Agency: A Case From Muslim Mindanao’. Journal of Peacebuilding & Development 15(3): 348361.

    • Search Google Scholar
    • Export Citation
  • Calvão, Filipe. 2018. ‘Crypto-Miners: Digital Labor and the Power of Blockchain Technology’. Economic Anthropology 6(1): 123134.

    • Search Google Scholar
    • Export Citation
  • Caprioli, Mary. 2000. ‘Gendered Conflict’. Journal of Peace Research 37(1): 5168.

  • Caprioli, Mary. 2004. ‘Feminist IR Theory and Quantitative Methodology: A Critical Analysis’. International Studies Review 6(2): 253269.

    • Search Google Scholar
    • Export Citation
  • Caprioli, Mary, and Mark A. Boyer. 2001. ‘Gender, Violence, and International Crisis’. Journal of Conflict Resolution 45(4): 503518.

    • Search Google Scholar
    • Export Citation
  • Carletti, Laura, Derek McAuley, Dominic Price, Gabriella Giannachi and Steve Benford. 2013. ‘Digital Humanities and Crowdsourcing: An Exploration’. Annual Conference of Museums and the Web, Portland, OR. https://ore.exeter.ac.uk/repository/bitstream/handle/10871/17763/Digital?sequence=2 (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Carter Olson, Candi S. 2021. ‘“To Ask Freedom for Women”: The Night of Terror and Public Memory’. Journalism & Mass Communication Quarterly 98(1): 179199.

    • Search Google Scholar
    • Export Citation
  • Casey, Michael J., and Paul Vigna. 2018. ‘In Blockchain We Trust’. MIT Technology Review. www.technologyreview.com/2018/04/09/3066/in-blockchain-we-trust/ (accessed 22 January 2021).

    • Search Google Scholar
    • Export Citation
  • CCRI. 2021. ‘Frequently Asked Questions’. Cyber Civil Rights Initiative. www.cybercivilrights.org/faqs/ (accessed 15 February 2021).

    • Search Google Scholar
    • Export Citation
  • CDCA. 2020. ‘Live from Nicaragua: Coronavirus Update’. Presented at the Online and Managua, Nicaragua, 25 June 2020.

  • Chandran, Rina, and Maya Gebeily. 2021. ‘Analysis: From Middle East to India, Women “Violated” in Pegasus Hack’. Reuters. www.reuters.com/article/tech-women-surveillance-idUSL8N2P91KX (accessed 12 February 2022).

    • Search Google Scholar
    • Export Citation
  • Chang, Leslie T. 2009. Factory Girls: From Village to City in a Changing China. New York: Random House.

  • Chanlett-Avery, Emma, Liana W. Rosen, John W. Rollins, and Catherine A. Theohary. 2017. North Korean Cyber Capabilities: In Brief. CRS Report for Congress. Washington, DC: Congressional Research Service. www.ncnk.org/sites/default/files/CRS_DPRK_Cyber.pdf (accessed 15 February 2021).

    • Search Google Scholar
    • Export Citation
  • Charmes, Jacques, and Saskia Wieringa. 2003. ‘Measuring Women’s Empowerment: An Assessment of the Gender-Related Development Index and the Gender Empowerment Measure’. Journal of Human Development 4(3): 419435.

    • Search Google Scholar
    • Export Citation
  • Chatterjee, R., P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed et al. 2018. ‘The Spyware Used in Intimate Partner Violence’. In 2018 IEEE Symposium on Security and Privacy (SP), pp 441458.

    • Search Google Scholar
    • Export Citation
  • Cheesman, Margie. 2022. ‘Self-Sovereignty for Refugees? The Contested Horizons of Digital Identity’. Geopolitics 27(1): 134159.

  • Chemaly, Soraya. 2016. ‘The Problem with a Technology Revolution Designed Primarily for Men’. Quartz. https://qz.com/640302/why-is-so-much-of-our-new-technology-designed-primarily-for-men/ (accessed 12 January 2021).

    • Search Google Scholar
    • Export Citation
  • Chowdhury, Rumman, and Luca Belli. 2021. ‘Examining Algorithmic Amplification of Political Content on Twitter’. https://blog.twitter.com/en_us/topics/company/2021/rml-politicalcontent (accessed 23 March 2022).

    • Search Google Scholar
    • Export Citation
  • Chun, Rene. 2017. ‘Big in Venezuela: Bitcoin Mining’. The Atlantic. www.theatlantic.com/magazine/archive/2017/09/big-in-venezuela/534177/ (accessed 4 October 2020).

    • Search Google Scholar
    • Export Citation
  • Clarke, Colin, and Liana Turner. 2020. ‘The “Incel” Ideology Continues to Build a Strong Following in the Online “Manosphere”’. GNET. https://gnet-research.org/2020/04/22/the-incel-ideology-continues-to-build-a-strong-following-in-the-online-manosphere/ (accessed 20 June 2021).

    • Search Google Scholar
    • Export Citation
  • Clausen Nielsen, René. 2014. ‘Big Data, Innovation and the Data Revolution’. UN Data Revolution. www.undatarevolution.org/data-innovation/ (accessed 3 March 2022).

    • Search Google Scholar
    • Export Citation
  • Cleaver, Tony. 2010. Economics: The Basics. New York: Taylor & Francis. http://ebookcentral.proquest.com/lib/troy/detail.action?docID=683999 (accessed 4 October 2020).

    • Search Google Scholar
    • Export Citation
  • Clifford Simplican, Stacy. 2021. ‘Politicizing Disability in Political Science, COVID-19, and Police Violence’. Politics, Groups, and Identities 9(2): 387394.

    • Search Google Scholar
    • Export Citation
  • Cockburn, Cynthia. 2017. ‘A Continuum of Violence: Gender, War and Peace’. In The Criminology of War , edited by Ruth Jamieson. Abingdon: Routledge, pp 357–376.

    • Search Google Scholar
    • Export Citation
  • Cohen, Dara Kay, and Ragnhild Nordås. 2014. ‘Sexual Violence in Armed Conflict: Introducing SVAC Dataset 1989–2009’. Journal of Peace Research 51(3): 418428.

    • Search Google Scholar
    • Export Citation
  • Cohn, Carol. 1987. ‘Sex and Death in the Rational World of Defense Intellectuals’. Signs 12(4): 687718.

  • Cohn, Carol. 2006. ‘Motives and Methods: Using Multi-Sited Ethnography to Study U.S. National Security Discourses’. In Feminist Methodologies for International Relations, edited by Brooke A. Ackerly, Maria Stern, and Jacqui True. New York: Cambridge University Press, pp 91107.

    • Search Google Scholar
    • Export Citation
  • Cohn, Carol. 2014. ‘Women and Wars: A Conceptual Framework’. In Women and Wars. Cambridge: Polity Press, pp 135.

  • Cohn, Carol. 2018. ‘The Perils of Mixing Masculinity and Missiles’. The New York Times. www.nytimes.com/2018/01/05/opinion/security-masculinity-nuclear-weapons.html (accessed 15 February 2021).

    • Search Google Scholar
    • Export Citation
  • Coin Dance. 2020. ‘Coin Dance: Bitcoin Statistics’. https://coin.dance/stats (accessed 29 July 2020).

  • CoinSummit London 2014 – Start-up Showcase – 37 Coins. 2014. www.youtube.com/watch?v=Mau0XFS2L8A (accessed 7 August 2020).

  • Comben, Christina. 2019. ‘Female Engagement in Bitcoin Hits New High as Adoption Grows’. Bitcoinist. https://bitcoinist.com/women-in-bitcoin-engagement-new-high/ (accessed 30 July 2020).

    • Search Google Scholar
    • Export Citation
  • Community at Klaytn. 2019. ‘Diversity in Blockchain Series #2: Songyi Lee, the Pioneer of Blockchain Diversity’. Medium. https://medium.com/klaytn/diversity-in-blockchain-series-2-songyi-lee-the-pioneer-of-blockchain-diversity-571f47ff6bb3 (accessed 7 August 2020).

    • Search Google Scholar
    • Export Citation
  • Cook, Joana, and Gina Vale. 2018. From Daesh to ‘Diaspora’: Tracing the Women and Minors of the Islamic State. London: International Centre for the Study of Radicalisation. https://icsr.info/wp-content/uploads/2018/07/ICSR-Report-From-Daesh-to-%E2%80%98Diaspora%E2%80%99-Tracing-the-Women-and-Minors-of-Islamic-State.pdf (accessed 7 January 2021).

    • Search Google Scholar
    • Export Citation
  • Cornish, Chloe. 2019. ‘Yazidi Hostages Traded to Criminals as Isis Loses Ground’. Financial Times. www.ft.com/content/cabb2f68-4570-11e9-a965-23d669740bfb (accessed 7 January 2021).

    • Search Google Scholar
    • Export Citation
  • Cornwall, Andrea, Frank G. Karioris, and Nancy Lindisfarne. 2016. Masculinities under Neoliberalism. London: Zed Books.

  • Corredor, Elizabeth S. 2019. ‘Unpacking “Gender Ideology” and the Global Right’s Antigender Countermovement’. Signs: Journal of Women in Culture and Society 44(3): 613638.

    • Search Google Scholar
    • Export Citation
  • Cowman, Krista. 1996. ‘“The Stone-Throwing Has Been Forced Upon Us”: The Function of Militancy Within the Liverpool W.S.P.U., 1906–14’. Transactions of the Historic Society of Lancashire and Cheshire 145: 171192.

    • Search Google Scholar
    • Export Citation
  • Cox, Joseph. 2022. ‘Data Broker SafeGraph Stops Selling Location Data of People Who Visit Planned Parenthood’. Vice. www.vice.com/en/article/88gyn5/data-broker-safegraph-stops-selling-location-data-of-people-who-visit-planned-parenthood (accessed 1 September 2022).

    • Search Google Scholar
    • Export Citation
  • Cragin, Kim, and Sara A. Daly. 2009. Women as Terrorists: Mothers, Recruiters, and Martyrs. Washington, DC: ABC-CLIO.

  • Crenshaw, Kimberlé. 1990. ‘Mapping the Margins: Intersectionality, Identity Politics, and Violence against Women of Color’. Stanford Law Review 43: 12411299.

    • Search Google Scholar
    • Export Citation
  • Crenshaw, Kimberlé. 2013. ‘Demarginalizing the Intersection of Race and Sex: A Black Feminist Critique of Antidiscrimination Doctrine, Feminist Theory and Antiracist Politics’. In Feminist Legal Theories, edited by Karen Maschke. New York: Routledge, pp 23–51.

    • Search Google Scholar
    • Export Citation
  • Criado-Perez, Caroline. 2019. Invisible Women: Data Bias in a World Designed for Men. First printing edition. New York: Harry N. Abrams.

    • Search Google Scholar
    • Export Citation
  • D’Anastasio, Cecilia. 2021. ‘A Game Livestreaming Site Has Become an Extremist Haven’. Wired. www.wired.com/story/dlive-livestreaming-site-extremist-haven/ (accessed 24 August 2021).

    • Search Google Scholar
    • Export Citation
  • Darby, Seyward. 2020. Sisters in Hate: American Women on the Front Lines of White Nationalism. London: Hachette.

  • Dasgupta, Partha. 2007. Economics: A Very Short Introduction. Illustrated edition. Oxford and New York: Oxford University Press.

  • DashText. 2020. ‘Dash Text Worldwide Statistics’. DashText. https://stats.dashtext.io/ (accessed 14 August 2020).

  • Data Revolution Group. 2014. A World That Counts: Mobilising the Data Revolution for Sustainable Development. New York: United Nations/Independent Expert Advisory Group on a Data Revolution for Sustainable Development. www.undatarevolution.org/wp-content/uploads/2014/12/A-World-That-Counts2.pdf (accessed 2 March 2022).

    • Search Google Scholar
    • Export Citation
  • Davey, Jacob, and Julia Ebner. 2017. The Fringe Insurgency: Connectivity, Convergence and Mainstreaming of the Extreme Right. London: Institute for Strategic Dialogue.

    • Search Google Scholar
    • Export Citation
  • Davis, Megan. 2016. ‘Data and the United Nations Declaration on the Rights of Indigenous Peoples’. In Indigenous Data Sovereignty: Toward an Agenda, edited by Tahu Kukutai and John Taylor. Acton: ANU Press, pp 2538.

    • Search Google Scholar
    • Export Citation
  • de Córdoba, José and Juan Montes. 2020. ‘As Coronavirus Spreads in Nicaragua, Official Denials Amplify Risk’. Wall Street Journal. www.wsj.com/articles/as-coronavirus-spreads-in-nicaragua-official-denials-amplify-risk-11590246000 (accessed 25 March 2021).

    • Search Google Scholar
    • Export Citation
  • Demick, Barbara. 2009. Nothing to Envy: Ordinary Lives in North Korea. 1st edition. New York: Random House.

  • Devika, J., Chithira Vijayakumar, Darshana Sreedhar Mini, and Resmi P S. 2019. Walking on Eggshells: A Study on Gender Justice and Women’s Struggles in Malayali Cyberspace. IT for Change. https://itforchange.net/sites/default/files/1618/Kerala-Report_Righting-Gender-Norms.pdf (accessed 30 March 2022).

    • Search Google Scholar
    • Export Citation
  • deVries, Jacqueline R. 2013. ‘Popular and Smart: Why Scholarship on the Women’s Suffrage Movement in Britain Still Matters’. History Compass 1(1/3): 177188.

    • Search Google Scholar
    • Export Citation
  • DiBranco, Alex. 2020. ‘Male Supremacist Terrorism as a Rising Threat’. https://icct.nl/publication/male-supremacist-terrorism-as-a-rising-threat/ (accessed 17 December 2020).

    • Search Google Scholar
    • Export Citation
  • Dickey, Megan Rose. 2017. ‘Facebook Defends Revenge Porn Pilot That Has People Upload Nude Images of Themselves’. TechCrunch. https://social.techcrunch.com/2017/11/09/facebook-revenge-porn-pilot-details/ (accessed 1 April 2021).

    • Search Google Scholar
    • Export Citation
  • Digital Rights Foundation. 2019. Experiences of Online Harassment in Pakistan: Case Studies from the Cyber Harassment Helpline. Pakistan: Digital Rights Foundation. https://digitalrightsfoundation.pk/wp-content/uploads/2019/01/Research-Work.pdf (accessed 30 March 2021).

    • Search Google Scholar
    • Export Citation
  • D’Ignazio, Catherine, and Lauren F. Klein. 2020. Data Feminism. Cambridge, MA: The MIT Press.

  • Di Meco, Lucina. 2019. #ShePersisted: Women, Politics, and Power in the New Media World. Washington, DC: The Wilson Center.

  • Dineen, Katherine, and Quan V. Le. 2015. ‘The Impact of an Integrated Microcredit Program on the Empowerment of Women and Gender Equality in Rural Vietnam’. The Journal of Developing Areas 49(1): 2338.

    • Search Google Scholar
    • Export Citation
  • Di Salvo, Mathew. 2019. ‘Why Are Venezuelans Seeking Refuge in Crypto-Currencies?’ BBC News. www.bbc.com/news/business-47553048 (accessed 4 October 2020).

    • Search Google Scholar
    • Export Citation
  • Diskaya, Ali. 2013. ‘Towards a Critical Securitization Theory: The Copenhagen and Aberystwyth Schools of Security Studies’. E-International Relations. www.e-ir.info/2013/02/01/towards-a-critical-securitization-theory-the-copenhagen-and-aberystwyth-schools-of-security-studies/ (accessed 16 February 2021).

    • Search Google Scholar
    • Export Citation
  • Doval, Pankaj. 2017. ‘Rajan Anandan: “90% of New Net Users Non-English”’. The Times of India. https://timesofindia.indiatimes.com/business/india-business/90-of-new-net-users-non-english/articleshow/58371769.cms (accessed 31 March 2021).

    • Search Google Scholar
    • Export Citation
  • DRF. 2020. Addressing Online Attacks on Women Journalists in Pakistan. Pakistan: Digital Rights Foundation. https://digitalrightsfoundation.pk/wp-content/uploads/2020/11/Policy-1.pdf (accessed 30 March 2021).

    • Search Google Scholar
    • Export Citation
  • DRF/Hamara Internet. 2021. Cyber Harassment during the COVID-19 Pandemic in Pakistan. New York: UN Women/Hamara Internet/Digital Rights Foundation. https://digitalrightsfoundation.pk/wp-content/uploads/2021/02/UN-Policy-Brief-2.pdf (accessed 30 March 2021).

    • Search Google Scholar
    • Export Citation
  • Driskill, Qwo-Li. 2010. ‘Doubleweaving Two-Spirit Critiques: Building Alliances between Native and Queer Studies’. GLQ: A Journal of Lesbian and Gay Studies 16(1–2): 6992.

    • Search Google Scholar
    • Export Citation
  • Duckett, Chris. 2021. ‘Volcano-Powered Bitcoin City Could Be Bond Villainy or the State of Play in 2021’. ZDNet. www.zdnet.com/article/volcano-powered-bitcoin-city-could-be-bond-villainy-or-the-state-of-play-in-2021/ (accessed 8 February 2022).

    • Search Google Scholar
    • Export Citation
  • Duriesmith, David. 2017. Engaging Men and Boys in the Women, Peace, and Security Agenda: Beyond the ‘Good Men’ Industry. London: London School of Economics Centre for Women, Peace, and Security.

    • Search Google Scholar
    • Export Citation
  • Duriesmith, David. 2019. ‘Engaging or Changing Men? Understandings of Masculinity and Change in the New “Men, Peace and Security” Agenda’. Peacebuilding 8(4): 418431.

    • Search Google Scholar
    • Export Citation
  • Duriesmith, David. 2020. ‘Friends Don’t Let Friends Cite the Malestream: A Case for Strategic Silence in Feminist International Relations’. International Feminist Journal of Politics 22(1): 2632.

    • Search Google Scholar
    • Export Citation
  • Dutta, Aniruddha, and Raina Roy. 2014. ‘Decolonizing Transgender in India: Some Reflections’. TSQ: Transgender Studies Quarterly 1(3): 320337.

    • Search Google Scholar
    • Export Citation
  • Duvendack, Maren, Richard Palmer-Jones, James G Copestake, Lee Hooper, Yoon Loke and Nitya Rao. 2011. What Is the Evidence of the Impact of Microfinance on the Well-Being of Poor People? London: EPPI-Centre, Social Science Research Unit, Institute of Education, University of London. https://ueaeprints.uea.ac.uk/id/eprint/35466/ (accessed 14 September 2021).

    • Search Google Scholar
    • Export Citation
  • Dwoskin, Elizabeth, Tory Newmyer, and Shibani Mahtani. 2021. ‘Mark Zuckerberg Was More Involved in Decision Making at Facebook than He Let On’. The Washington Post. www.washingtonpost.com/technology/2021/10/25/mark-zuckerberg-facebook-whistleblower/ (accessed 15 November 2021).

    • Search Google Scholar
    • Export Citation
  • Eager, Paige Whaley. 2008. From Freedom Fighters to Terrorists. New York: Ashgate.

  • Ebner, Julia, and Jacob Davey. 2019. How Women Advance the Internationalization of the Far-Right. Washington, DC: GWU Program on Extremism. https://extremism.gwu.edu/sites/g/files/zaxdzs2191/f/How%20Women%20Advance%20the%20Internationalization%20of%20the%20Far-Right.pdf (accessed 14 January 2021).

    • Search Google Scholar
    • Export Citation
  • Eck, Kristine, and Sophia Hatz. 2020. ‘State Surveillance and the COVID-19 Crisis’. Journal of Human Rights 19(5): 603612.

  • Economist Intelligence Unit/Facebook. 2020. ‘Inclusive Internet Index 2020’. Inclusive Internet Index 2020. https://theinclusiveinternet.eiu.com/explore/countries/performance/availability/usage/gender-gap-in-internet-access?highlighted=AZ (accessed 13 November 2020).

    • Search Google Scholar
    • Export Citation
  • Elias, Juanita, and Shirin Rai. 2015. ‘The Everyday Gendered Political Economy of Violence’. Politics & Gender 11(2): 424429.

  • Elks, Sonia. 2018. ‘Migrants Losing $25 Billion per Year through Remittance Fees: UN’. Reuters. www.reuters.com/article/us-global-migrants-un-idUSKCN1NP2BA (accessed 27 January 2021).

    • Search Google Scholar
    • Export Citation
  • Ellerby, Kara. 2011. ‘Engendered Security: Norms, Gender and Peace Agreements’. Dissertation. University of Arizona. http://arizona.openrepository.com/arizona/bitstream/10150/204911/1/azu_etd_11682_sip1_m.pdf (accessed 20 February 2013).

    • Search Google Scholar
    • Export Citation
  • Ellerby, Kara. 2017. No Shortcut to Change: An Unlikely Path to a More Gender Equitable World. New York: New York University Press.

  • Enloe, Cynthia. 1999. Maneuvers. Berkeley: University of California Press.

  • Enloe, Cynthia. 2016. Globalization and Militarism: Feminists Make the Link. Lanham, MD: Rowman & Littlefield.

  • ERA Education Project. 2013. ‘Doesn’t the 14th Amendment Already Guarantee Women Equal Rights Under the Law?’ ERA Education Project. https://eraeducationproject.com/doesnt-the-14th-amendment-already-guarantee-women-equal-rights-under-the-law/ (accessed 26 March 2021).

    • Search Google Scholar
    • Export Citation
  • Estermann, Beat. 2014. ‘Diffusion of Open Data and Crowdsourcing among Heritage Institutions: Results of a Pilot Survey in Switzerland’. Journal of Theoretical and Applied Electronic Commerce Research 9(3): 1531.

    • Search Google Scholar
    • Export Citation
  • Fabian, Christopher. 2018. ‘Un-Chained: Experiments and Learnings in Crypto at UNICEF’. Innovations: Technology, Governance, Globalization 12(1–2): 3045.

    • Search Google Scholar
    • Export Citation
  • Facebook. 2018. ‘Free Basics’. Facebook Connectivity. https://connectivity.fb.com/free-basics/ (accessed 30 March 2021).

  • Facebook. 2021a. ‘Free Basics: Documentation’. Facebook for Developers. https://developers.facebook.com/docs/internet-org/ (accessed 30 March 2021).

    • Search Google Scholar
    • Export Citation
  • Facebook. 2021b. ‘NCII Pilot’. NCII Pilot: Not Without My Consent. www.facebook.com/safetyv2 (accessed 1 April 2021).

  • Farzan, Antonia Noori. 2019. ‘A Neo-Nazi Unleashed a “Troll Storm”. Now He Could Owe His Jewish Victim $14 Million’. Washington Post. www.washingtonpost.com/nation/2019/07/16/andrew-anglin-daily-stormer-tanya-gersh-million-verdict/ (accessed 7 July 2021).

    • Search Google Scholar
    • Export Citation
  • Feder, Lester. 2017. ‘These Lawyers Have a Case for Charging ISIS with Killing LGBT People’. BuzzFeed News. www.buzzfeednews.com/article/lesterfeder/these-lawyers-have-a-case-for-charging-isis-with-killing (accessed 7 July 2021).

    • Search Google Scholar
    • Export Citation
  • Fedorov, Aleksey, Evgeniy Kiktenko, and Alexander Lvovsky. 2018. ‘Quantum Computers Put Blockchain Security at Risk’. Nature 19 November.

    • Search Google Scholar
    • Export Citation
  • Feminism and Nonviolence Study Group. 1983. Piecing It Together: Feminism and Nonviolence. Feminism and Nonviolence Study Group, Bilthoven, 17 November. https://wri-irg.org/en/story/2010/piecing-it-together-feminism-and-nonviolence (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • FIDH/Kinyat. 2018. Iraq: Sexual and Gender-based Crimes against the Yazidi Community: The Role of ISIL Foreign Fighters. Paris: International Federation for Human Rights.

    • Search Google Scholar
    • Export Citation
  • Fischer, Paul. 2015. A Kim Jong-Il Production: The Extraordinary True Story of a Kidnapped Filmmaker, His Star Actress, and a Young Dictator’s Rise to Power. New York: Flatiron Books.

    • Search Google Scholar
    • Export Citation
  • Fisher, Chris. 2019. ‘IBM Quantum: Use Cases’. www.ibm.com/quantum-computing/learn/welcome/ (accessed 24 March 2021).

  • Fitzgerald, Kelly C. 2020. ‘Mapping the Manosphere: A Social Network Analysis of the Manosphere on Reddit’. Master’s Thesis. Naval Postgraduate School.

    • Search Google Scholar
    • Export Citation
  • FNIGC. 2016. ‘Pathways to First Nations Data and Information Sovereignty’. In Indigenous Data Sovereignty: Toward an Agenda, edited by Tahu Kukutai and John Taylor. Acton: ANU Press, pp 139156.

    • Search Google Scholar
    • Export Citation
  • Foucault, Michel. 2019 [1975]. Discipline and Punish: The Birth of the Prison. New York. Penguin.

  • Fowler, Rowena. 1991. ‘Why Did Suffragettes Attack Works of Art?’. Journal of Women’s History 2(3): 109125.

  • Freed, Diana, Jackeline Palmer, Diana Elizabeth Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2017. ‘Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders’. Proceedings of the ACM on Human-Computer Interaction 1(CSCW): 46:1–46:22.

    • Search Google Scholar
    • Export Citation
  • Freed, Diana, Jackeline Palmer, Diana Elizabeth Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. ‘“A Stalker’s Paradise”: How Intimate Partner Abusers Exploit Technology’. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. New York: Association for Computing Machinery, pp 113. https://doi.org/10.1145/3173574.3174241 (accessed 1 April 2021).

    • Search Google Scholar
    • Export Citation
  • Freedom House. 2019. ‘Azerbaijan: Government Must Stop Blackmailing Women Journalists in Response to Criticism’. Freedom House. https://freedomhouse.org/article/azerbaijan-government-must-stop-blackmailing-women-journalists-response-criticism (accessed 10 February 2022).

    • Search Google Scholar
    • Export Citation
  • Freedom House. 2020a. ‘India: Freedom on the Net 2020 Country Report’. Freedom House. https://freedomhouse.org/country/india/freedom-net/2020 (accessed 30 March 2021).

    • Search Google Scholar
    • Export Citation
  • Freedom House. 2020b. ‘Myanmar: Freedom on the Net 2020 Country Report’. Freedom House. https://freedomhouse.org/country/myanmar/freedom-net/2020 (accessed 25 March 2021).

    • Search Google Scholar
    • Export Citation
  • Freedom House. 2020c. ‘Pakistan: Freedom on the Net 2020 Country Report’. Freedom House. https://freedomhouse.org/country/pakistan/freedom-net/2020 (accessed 30 March 2021).

    • Search Google Scholar
    • Export Citation
  • Freedom House. 2021. ‘Freedom on the Net 2021: India’. Freedom House. https://freedomhouse.org/country/india/freedom-net/2021 (accessed 15 November 2021).

    • Search Google Scholar
    • Export Citation
  • Frenkel, Sheera. 2018. ‘Microsoft Employees Protest Work with ICE, as Tech Industry Mobilizes Over Immigration’. The New York Times. www.nytimes.com/2018/06/19/technology/tech-companies-immigration-border.html (accessed 8 February 2022).

    • Search Google Scholar
    • Export Citation
  • Frenkel, Sheera, Nathaniel Popper, Kate Conger, and David E. Sanger. 2020. ‘A Brazen Online Attack Targets V.I.P. Twitter Users in a Bitcoin Scam’. The New York Times. www.nytimes.com/2020/07/15/technology/twitter-hack-bill-gates-elon-musk.html (accessed 29 July 2020).

    • Search Google Scholar
    • Export Citation
  • Frizzo-Barker, Julie. 2020. ‘Women in Blockchain: Discourse and Practice in the Co-Construction of Gender and Emerging Technologies’. The 21st Annual Conference of the Association of Internet Researchers. http://spir.aoir.org/ (accessed 4 April 2022).

    • Search Google Scholar
    • Export Citation
  • Gabor, Daniela, and Sally Brooks. 2017. ‘The Digital Revolution in Financial Inclusion: International Development in the Fintech Era’. New Political Economy 22(4): 423436.

    • Search Google Scholar
    • Export Citation
  • Gannon, Kathy. 2021. ‘Taliban Encounter Afghan Cities Remade in Their Absence’. AP NEWS. https://apnews.com/article/afghanistan-taliban-then-and-now-82594865156f9fdae9db4ce1c34d8d43 (accessed 18 August 2021).

    • Search Google Scholar
    • Export Citation
  • Gartzke, Erik. 2013. ‘The Myth of Cyberwar’. International Security 38(2): 4173.

  • Garvie, Clare, Alvaro Bedova, and Jonathan Frankle. 2016. ‘Perpetual Line Up: Unregulated Police Face Recognition in America’. Georgetown Center on Privacy and Technology. www.perpetuallineup.org/ (accessed 16 November 2021).

    • Search Google Scholar
    • Export Citation
  • Genon, Lynrose Jane D. 2021. ‘Beyond Resistance: Youth in Local Peacebuilding’. In Youth, Peacebuilding, and Sustainability: Connecting Theory to Practice, edited by Mary Koren Apas Witting-Acuesa and Primitivo III Cabanes Ragandang. np: Seeds for Mindanao’s Advocacy and Youth Leadership (SMAYL), pp 56–77. http://smayl.org/wp-content/uploads/2022/01/SMAYL-Book-Final-1.pdf (accessed 31 March 2022).

    • Search Google Scholar
    • Export Citation
  • George, Nicole. 2020. ‘The Price of Peace? Frictional Encounters on Gender, Security and the “Economic Peace Paradigm”’. In New Directions in Women, Peace and Security, edited by Soumita Basu, Paul Kirby, and Laura Shepherd. Bristol: Policy Press, pp 4160.

    • Search Google Scholar
    • Export Citation
  • Gerard, David. 2021. ‘Bitcoin Failed in El Salvador: The President Says the Answer is More Bitcoin’. Foreign Policy. https://foreignpolicy.com/2021/12/06/bitcoin-city-el-salvador-nayib-bukele/ (accessed 8 February 2022).

    • Search Google Scholar
    • Export Citation
  • Gerschick, Thomas J. 2000. ‘Toward a Theory of Disability and Gender’. Signs 25(4): 12631268.

  • Geybulla, Arzu. 2019. ‘Azerbaijan: Women Journalists Under Pressure’. IWPR. https://iwpr.net/global-voices/azerbaijan-women-journalists-under-pressure (accessed 10 February 2022).

    • Search Google Scholar
    • Export Citation
  • Geybulla, Arzu. 2020. ‘Government Hits Activists’ Online Profiles’. Index on Censorship 49(3): 810.

  • Ghittoni, Marta, Lèa Lehouck, and Megan Bastick. 2019. A Security Sector Governance Approach to Women, Peace and Security. Geneva: Geneva Centre for Security Sector Governance/OSCE/UN Women. www.dcaf.ch/sites/default/files/publications/documents/GSPolicyBrief_1%20EN%20FINAL_1.pdf (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • GIFCT. 2019. Transparency Report: July 2019. Washington, DC: GIFCT. https://gifct.org/wp-content/uploads/2020/10/GIFCT-Transparency-Report-July-2019-Final.pdf (accessed 1 April 2019).

    • Search Google Scholar
    • Export Citation
  • Gill, Jeff. 2021. ‘Political Science is a Data Science’. The Journal of Politics 83(1): 1–7.

  • Gill, Rosalind. 2019. ‘Surveillance is a Feminist Issue’. In Routledge Handbook of Contemporary Feminism, edited by Tasha Oren and Andrea Lee Press. Abingdon: Routledge.

    • Search Google Scholar
    • Export Citation
  • Gillespie, Eden. 2020. ‘“Pastel QAnon”: The Female Lifestyle Bloggers and Influencers Spreading Conspiracy Theories through Instagram’. The Feed. www.sbs.com.au/news/the-feed/pastel-qanon-the-female-lifestyle-bloggers-and-influencers-spreading-conspiracy-theories-through-instagram (accessed 10 December 2020).

    • Search Google Scholar
    • Export Citation
  • Gilmore, Justin. 2019. ‘Incels: The New Politics of Indifference’. Centre for the Analysis of the Radical Right. www.radicalrightanalysis.com/2019/11/11/incels-the-new-politics-of-indifference/ (accessed 16 December 2020).

    • Search Google Scholar
    • Export Citation
  • Gimase Magenya, Sheena, and Tigist Shewarega Hussen. 2022. ‘Feminist Peace for Digital Movement Building in Kenya and Ethiopia: Reflections, Lessons, Hopes, and Dreams’. In Feminist Conversations on Peace, edited by Sarah Smith and Keina Yoshida. Bristol: Bristol University Press, pp 6375.

    • Search Google Scholar
    • Export Citation
  • GIWPS. 2020. The Best and Worst States to Be a Woman: Introducing the U.S. Women, Peace, and Security Index 2020. Washington, DC: Georgetown Institute for Women, Peace, and Security. https://giwps.georgetown.edu/wp-content/uploads/2020/10/The-Best-and-Worst-States-to-Be-a-Woman.pdf (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • GIWPS/PRIO. 2018. Women Peace and Security Index 2017/18 (Report). Washington DC: Georgetown Institute for Women, Peace, and Security. https://giwps.georgetown.edu/wp-content/uploads/2019/11/WPS-Index-Report-2017-18.pdf (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • GIWPS/PRIO. 2019. ‘Women, Peace, and Security Index’. Women, Peace, and Security Index. https://giwps.georgetown.edu/the-index/ (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Global Voices. 2017. Free Basics in Real Life: Six Case Studies on Facebook’s Internet ‘On Ramp’ Initiative. Global Voices. https://advox.globalvoices.org/wp-content/uploads/2017/08/FreeBasicsinRealLife_FINALJuly27.pdf (accessed 31 March 2021).

    • Search Google Scholar
    • Export Citation
  • GoFundMe. 2021. ‘GoFundMe Providing Support for Afghanistan’. GoFundMe. www.gofundme.com/c/blog/support-for-afghanistan (accessed 21 January 2022).

    • Search Google Scholar
    • Export Citation
  • Goggin, Gerard. 2017. ‘Disability and Digital Inequalities: Rethinking Digital Divides with Disability Theory’. In Theorizing Digital Divides, edited by Massimo Ragnedda and Glenn W. Muschert. New York: Routledge, pp 6374.

    • Search Google Scholar
    • Export Citation
  • Goldstein, Jessica M. 2020. ‘“Revenge Porn” was Already Commonplace. The Pandemic has Made Things Even Worse’. Washington Post. www.washingtonpost.com/lifestyle/style/revenge-porn-nonconsensual-porn/2020/10/28/603b88f4-dbf1-11ea-b205-ff838e15a9a6_story.html (accessed 15 February 2021).

    • Search Google Scholar
    • Export Citation
  • Golumbia, David. 2016. The Politics of Bitcoin: Software as Right-Wing Extremism. Minneapolis, MN: University of Minnesota Press.

  • Gordon, Eleanor. 2017. ‘Crimes of the Powerful in Conflict-Affected Environments: False Positives, Transitional Justice and the Prospects for Peace in Colombia’. State Crime Journal 6(1): 132155.

    • Search Google Scholar
    • Export Citation
  • Goswami, Ranjit, S.K. De, and B. Datta. 2009. ‘Linguistic Diversity and Information Poverty in South Asia and Sub-Saharan Africa’. Universal Access in the Information Society 8(3): 219238.

    • Search Google Scholar
    • Export Citation
  • Government of Ireland. 2019. Women, Peace and Security: Ireland’s Third National Action Plan for the Implementation of UNSCR 1325 and Related Resolutions. Dublin: Government of Ireland. www.dfa.ie/media/dfa/ourrolepolicies/womenpeaceandsecurity/Third-National-Action-Plan.pdf (accessed 15 February 2021).

    • Search Google Scholar
    • Export Citation
  • Government of the Peoples’ Republic of Bangladesh. 2011. National Women Development Policy. Dhaka: Ministry of Women and Children Affairs. https://mowca.portal.gov.bd/sites/default/files/files/mowca.portal.gov.bd/policies/64238d39_0ecd_4a56_b00c_b834cc54f88d/National-Women%20Development%20Policy-2011English.pdf (accessed 31 March 2021).

    • Search Google Scholar
    • Export Citation
  • Graham, Mark. 2016. ‘Facebook is No Charity, and the “Free” in Free Basics Comes at a Price’. The Conversation. http://theconversation.com/facebook-is-no-charity-and-the-free-in-free-basics-comes-at-a-price-52839 (accessed 30 March 2021).

    • Search Google Scholar
    • Export Citation
  • Gray, Mary L., and Siddharth Suri. 2019. Ghost Work: How to Stop Silicon Valley from Building a New Global Underclass. Illustrated edition. Boston, MA: Mariner Books.

    • Search Google Scholar
    • Export Citation
  • Greenberg, Andy. 2022. ‘North Korea Hacked Him. So He Took Down Its Internet.’ Wired. www.wired.com/story/north-korea-hacker-internet-outage/ (accessed 4 February 2022).

    • Search Google Scholar
    • Export Citation
  • Griffin, Penny. 2010. ‘Gender, Governance and the Global Political Economy’. Australian Journal of International Affairs 64(1): 86104.

    • Search Google Scholar
    • Export Citation
  • Griset, Pamala, and Sue Mahan. 2002. Terrorism in Perspective. Thousand Oaks, CA: SAGE.

  • GSMA. 2020. The Mobile Gender Gap Report 2020. London: Global System for Mobile Communications (GSM) Association. www.gsma.com/mobilefordevelopment/wp-content/uploads/2020/05/GSMA-The-Mobile-Gender-Gap-Report-2020.pdf (accessed 30 March 2021).

    • Search Google Scholar
    • Export Citation
  • Guo, Eileen, and Hikmat Noori. 2021. ‘This is the Real Story of the Afghan Biometric Databases Abandoned to the Taliban’. MIT Technology Review. www.technologyreview.com/2021/08/30/1033941/afghanistan-biometric-databases-us-military-40-data-points/ (accessed 2 November 2021).

    • Search Google Scholar
    • Export Citation
  • Guyan, Kevin. 2022. Queer Data: Using Gender, Sex and Sexuality Data for Action. London: Bloomsbury.

  • Haastrup, Toni, and Jamie Hagen. 2020. ‘Global Racial Hierarchies and the Limits of Localization via National Action Plans’. In New Directions in Women, Peace and Security, edited by Soumita Basu, Paul Kirby, and Laura J. Shepherd. Bristol: Policy Press, pp 133153.

    • Search Google Scholar
    • Export Citation
  • Haastrup, Toni, and Jamie J. Hagen. 2021. ‘Racial Hierarchies of Knowledge Production in the Women, Peace and Security Agenda’. Critical Studies on Security. https://doi.org/10.1080/21624887

    • Search Google Scholar
    • Export Citation
  • Haer, Roos, and Tobias Böhmelt. 2018. ‘Girl Soldiering in Rebel Groups, 1989–2013: Introducing a New Dataset’. Journal of Peace Research 55(3): 395403.

    • Search Google Scholar
    • Export Citation
  • Hagen, Jamie. 2016. Sexual Orientation and Gender Identity as Part of the WPS Project. London: London School of Economics Centre for Women, Peace, and Security. www.lse.ac.uk/women-peace-security/assets/documents/2016/wps2Hagen.pdf (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Haggard, Stephan, and Jon R. Lindsay. 2015. North Korea and the Sony Hack: Exporting Instability Through Cyberspace. Manoa: East-West Center. https://scholarspace.manoa.hawaii.edu/bitstream/10125/36444/1/api117.pdf (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Haleem, Abid, Mohd Javaid, Ibrahim Haleem Khan, and Raju Vaishya. 2020. ‘Significant Applications of Big Data in COVID-19 Pandemic’. Indian Journal of Orthopaedics 54: 13.

    • Search Google Scholar
    • Export Citation
  • Hamilton, Caitlin, and Laura J. Shepherd. 2020. ‘WPS National Action Plans: Content Analysis and Data Visualization, V2’. University of Sydney/LSE Centre for Women, Peace, and Security. www.wpsnaps.org (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Hamilton, Caitlin, Nyibeny Naam, and Laura Shepherd. 2020. Twenty Years of Women, Peace and Security National Action Plans: Analysis and Lessons Learned. Sydney: University of Sydney. www.wpsnaps.org/app/uploads/2020/03/Twenty-Years-of-Women-Peace-and-Security-National-Action-Plans_Report_Final_Web.pdf (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Han, Jongwoo, and L.H.M. Ling. 1998. Authoritarianism in the Hypermasculinized State: Hybridity, Patriarchy, and Capitalism in Korea’. International Studies Quarterly 42(1): 5378.

    • Search Google Scholar
    • Export Citation
  • Hao, Karen. 2018. ‘The First Rule of Being a Woman in Crypto’. Quartz. https://qz.com/1262167/the-first-rule-of-being-a-woman-in-crypto-is-you-do-not-talk-about-being-a-woman-in-crypto/ (accessed 30 July 2020).

    • Search Google Scholar
    • Export Citation
  • Hao, Karen. 2021. ‘Deepfake Porn is Ruining Women’s Lives: Now the Law May Finally Ban it.’ MIT Technology Review. www.technologyreview.com/2021/02/12/1018222/deepfake-revenge-porn-coming-ban/ (accessed 15 February 2021).

    • Search Google Scholar
    • Export Citation
  • Hao, Karen, and Andrea P. Hernández. 2022. ‘How the AI Industry Profits from Catastrophe’. MIT Technology Review. www.technologyreview.com/2022/04/20/1050392/ai-industry-appen-scale-data-labels/ (accessed 25 April 2022).

    • Search Google Scholar
    • Export Citation
  • Harding, Sandra. 1986. The Science Question in Feminism. 1st edition. Ithaca: Cornell University Press.

  • Harlan, Elisa, and Oliver Schnuck. 2021. ‘Objective or Biased’. BR24. https://web.br.de/interaktiv/ki-bewerbung/en (accessed 27 March 2021).

    • Search Google Scholar
    • Export Citation
  • Hawley, Caroline. 2015. ‘Why My Own Father Would Have Let IS Kill Me’. BBC News. www.bbc.com/news/magazine-33565055 (accessed 7 July 2021).

    • Search Google Scholar
    • Export Citation
  • Henshaw, Alexis Leanna. 2016. ‘Where Women Rebel: Patterns of Women’s Participation in Armed Rebel Groups 1990–2008’. International Feminist Journal of Politics 18(1): 3960.

    • Search Google Scholar
    • Export Citation
  • Henshaw, Alexis Leanna. 2017. Why Women Rebel: Understanding Women’s Participation in Armed Rebel Groups. New York: Routledge.

  • Henshaw, Alexis Leanna. 2020. ‘“Peace with a Woman’s Face”: Women, Social Media, and the Colombian Peace Process’. Contexto Internacional 42(3): 515538.

    • Search Google Scholar
    • Export Citation
  • Henshaw, Alexis, June Eric-Udorie, Hannah Godefa, Kathryn Howley, Cat Jeon, Elise Sweezy, and Katheryn Zhao. 2019. ‘Understanding Women at War: A Mixed-Methods Exploration of Leadership in Non-State Armed Groups’. Small Wars & Insurgencies 30(6–7): 10891116.

    • Search Google Scholar
    • Export Citation
  • Henshaw, Alexis. 2021a. ‘Extremism in the Manosphere During the Presidential Transition’. GNET. https://gnet-research.org/2021/01/22/extremism-in-the-manosphere-during-presidential-transition/ (accessed 20 June 2021).

    • Search Google Scholar
    • Export Citation
  • Henshaw, Alexis. 2021b. ‘Mainstreaming Gender in Research Methods’. In Teaching Research Methods in Political Science, edited by Jeffrey Bernstein. Cheltenham: Edward Elgar, pp 222237.

    • Search Google Scholar
    • Export Citation
  • Hill, Kashmir. 2020. ‘The Secretive Company That Might End Privacy as We Know It’. The New York Times. www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html (accessed 15 November 2021).

    • Search Google Scholar
    • Export Citation
  • Hinnant, Lori, Maya Alleruzzo, and Balint Szlanko. 2016. ‘Islamic State Tightens Grip on Captives Held as Sex Slaves’. AP Explore. www.ap.org/explore/a-savage-legacy/islamic-state-tightens-grip-on-captives-held-as-sex-slaves.html (accessed 7 January 2021).

    • Search Google Scholar
    • Export Citation
  • Hoffman, Bruce, and Jacob Ware. 2020. ‘Incels: America’s Newest Domestic Terrorism Threat’. Lawfare. www.lawfareblog.com/incels-americas-newest-domestic-terrorism-threat (accessed 16 December 2020).

    • Search Google Scholar
    • Export Citation
  • Hoffman, Bruce, Jacob Ware, and Ezra Shapiro. 2020. ‘Assessing the Threat of Incel Violence’. Studies in Conflict & Terrorism 43(7): 565587.

    • Search Google Scholar
    • Export Citation
  • Holmes, Aaron, Paige Leskin, Tyler Sonnemaker, and Charles Davis. 2020. ‘Hackers Took over Dozens of High-Profile Twitter Accounts Including Those of Barack Obama, Joe Biden, Elon Musk, Kim Kardashian, and Apple and Used Them to Post Bitcoin Scam Links’. Business Insider. www.businessinsider.com/hackers-bitcoin-crypto-cashapp-gates-ripple-coindesk-twitter-scam-links-2020-7 (accessed 29 July 2020).

    • Search Google Scholar
    • Export Citation
  • Hong Fincher, Leta. 2018. Betraying Big Brother: The Feminist Awakening in China. London: Verso.

  • Horgan, John. 2009. ‘Deradicalization or Disengagement? A Process in Need of Clarity and a Counterterrorism Initiative in Need of Evaluation’. International Journal of Social Psychology 24(2): 291298.

    • Search Google Scholar
    • Export Citation
  • Horowitz, Julia. 2022. ‘A Crypto-based Dossier Could Help Prove Russia Committed War Crimes’. CNN. www.cnn.com/2022/06/10/tech/ukraine-war-crimes-blockchain/index.html (accessed 1 September 2022).

    • Search Google Scholar
    • Export Citation
  • Horta Ribeiro, Manoel, Jeremy Blackburn, Barry Bradlyn, Emiliano De Cristofaro, Gianluca Stringhini, Summer Long et al. 2021. ‘The Evolution of the Manosphere across the Web’. https://arxiv.org/pdf/2001.07600.pdf (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • HRGJ/MADRE/OWFI. 2017. Gender-based Persecution and Torture as Crimes Against Humanity and War Crimes Committed by the Islamic State of Iraq and the Levant (ISIL) in Iraq. New York: The Human Rights and Gender Justice (HRGJ) Clinic of the City University of New York (CUNY) School of Law/MADRE/The Organization of Women’s Freedom in Iraq (OWFI). https://s3.documentcloud.org/documents/4177269/CUNY-MADRE-OWFI-Article-15-Communication.pdf (accessed 4 April 2022).

    • Search Google Scholar
    • Export Citation
  • Huckerby, Jayne, and Fionnuala Ní Aoláin. 2018. ‘Gendering Counterterrorism: How to, and How Not to – Part II’. Just Security. www.justsecurity.org/55670/gendering-counterterrorism-to-part-ii/ (accessed 10 December 2020).

    • Search Google Scholar
    • Export Citation
  • Hudson, Valerie, Bonnie Ballif-Spanvill, Mary Caprioli, and Chad Emmett. 2014a. Sex and World Peace. Revised edition. New York: Columbia University Press.

    • Search Google Scholar
    • Export Citation
  • Hudson, Valerie M., Bonnie Ballif-Spanvill, Mary Caprioli, Chad Emmett, Rose McDermott, and Matthew Stearmer. 2014b. WomanStats Codebook. www.womanstats.org/CodebookCurrent.htm (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Huete-Pérez, Jorge, and John Hildebrand. 2020. ‘Nicaragua’s COVID-19 Crisis Demands a Response’. Science 369(6502): 385.

  • Hui, Mary. 2021. ‘Hong Kongers Are Using Blockchain Archives to Fight Government Censorship’. Quartz. https://qz.com/2008673/hong-kongers-use-blockchain-to-fight-government-censorship (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Human Rights Centre. nd. Ways to Bridge the Gender Digital Divide from a Human Rights Perspective. Essex: Human Rights, Big Data and Technology Project at the Human Rights Centre of the University of Essex. www.ohchr.org/Documents/Issues/Women/WRGS/GenderDigital/HRBDT_submission.pdf (accessed 29 March 2021).

    • Search Google Scholar
    • Export Citation
  • Human Rights Watch. 2022. ‘Ukraine: Apparent War Crimes in Russia-Controlled Areas’. Human Rights Watch. www.hrw.org/news/2022/04/03/ukraine-apparent-war-crimes-russia-controlled-areas (accessed 25 April 2022).

    • Search Google Scholar
    • Export Citation
  • Hurlburt, Heather, Elizabeth Weingarten, Alexandra Stark, and Elena Souris. 2019. The ‘Consensual Straitjacket’: Four Decades of Women in Nuclear Security. Washington, DC: New America. http://newamerica.org/political-reform/reports/the-consensual-straitjacket-four-decades-of-women-in-nuclear-security/ (accessed 29 May 2020).

    • Search Google Scholar
    • Export Citation
  • Huszár, Ferenc, Sofia Ira Ktena, Conor O’Brien, Luca Belli, Andrew Schlaikjera, and Moritz Hardt. 2021. Algorithmic Amplification of Politics on Twitter. Twitter. https://cdn.cms-twdigitalassets.com/content/dam/blog-twitter/official/en_us/company/2021/rml/Algorithmic-Amplification-of-Politics-on-Twitter.pdf (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Hutchinson, Susan. 2020. ‘Financing Da’esh with Sexual Slavery: A Case Study in Not Gendering Conflict Analysis and Intervention ’. Journal of Global Security Studies 5(2): 379386.

    • Search Google Scholar
    • Export Citation
  • IBM. 2021. ‘Big Data Analytics’. www.ibm.com/analytics/hadoop/big-data-analytics (accessed 24 March 2021).

  • Ibtasam, Samia, Lubna Razaq, Maryam Ayub, Jennifer Webster, Syed Ishtiaque Ahmed and Richard Anderson. 2019. ‘“My Cousin Bought the Phone for Me. I Never Go to Mobile Shops”: The Role of Family in Women’s Technological Inclusion in Islamic Culture’. Proceedings of ACM Human-Comput. Interaction 3: CSCW, Article 46.

    • Search Google Scholar
    • Export Citation
  • IFF. 2016. ‘Campaigns and Projects’. Internet Freedom Foundation. https://internetfreedom.in/campaigns/ (accessed 31 March 2021).

  • ILGA. 2019. Trans Legal Mapping Report. 3rd edition. Geneva: International Lesbian, Gay, Bisexual, Trans, and Intersex Association. https://ilga.org/downloads/ILGA_World_Trans_Legal_Mapping_Report_2019_EN.pdf (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Imran, Syed Tajamul, and Mohd Tahir Ganie. 2020. ‘Surviving the Occupation’. Adi Magazine. https://adimagazine.com/articles/surviving-the-occupation/ (accessed 5 February 2022).

    • Search Google Scholar
    • Export Citation
  • ING/Ipsos. 2018. Cracking the Code on Cryptocurrency. ING/Ipsos. https://think.ing.com/uploads/reports/ING_International_Survey_Mobile_Banking_2018.pdf (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Ingram, Kiriloi M. 2021. ‘An Analysis of Islamic State’s Gendered Propaganda Targeted Towards Women: From Territorial Control to Insurgency’. Terrorism and Political Violence. https://doi.org/10.1080/09546553.2021.1919637

    • Search Google Scholar
    • Export Citation
  • International Crisis Group. 2020. A Course Correction for the Women, Peace, and Security Agenda. Crisis Group Special Briefing No. 5. London and Brussels: International Crisis Group.

    • Search Google Scholar
    • Export Citation
  • IPU. 2016. Sexism, Harassment and Violence against Women Parliamentarians. Geneva: Inter-Parliamentary Union. http://archive.ipu.org/pdf/publications/issuesbrief-e.pdf (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Isaac, Mike, and Kellen Browning. 2020. ‘Fact-Checked on Facebook and Twitter, Conservatives Switch Their Apps’. The New York Times. www.nytimes.com/2020/11/11/technology/parler-rumble-newsmax.html (accessed 8 July 2021).

    • Search Google Scholar
    • Export Citation
  • ITU. 2019. ‘Bridging the Gender Divide’. www.itu.int/en/mediacentre/backgrounders/Pages/bridging-the-gender-divide.aspx (accessed 13 November 2020).

    • Search Google Scholar
    • Export Citation
  • IWHR/MADRE. 2015. Dying to Be Free: LGBT Human Rights Violations in Iraq. New York: The International Women’s Human Rights Clinic at the City University of New York (CUNY) School of Law/MADRE. https://tbinternet.ohchr.org/Treaties/CESCR/Shared%20Documents/IRQ/INT_CESCR_CSS_IRQ_21554_E.pdf (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Jacinto, Leela. 2021. ‘Online Education Is the Only Hope for Afghan Schoolgirl, but It’s a Slog’. France 24. www.france24.com/en/asia-pacific/20211012-online-education-is-the-only-hope-for-afghan-schoolgirl-but-it-s-a-slog (accessed 21 January 2022).

    • Search Google Scholar
    • Export Citation
  • Jadhav, Rajendra. 2021. ‘India Proposes Law to Ban Cryptocurrencies, Create Official Digital Currency’. Reuters. www.reuters.com/article/us-india-cryptocurrency-lawmaking-idUSKBN29Z0EX (accessed 1 February 2021).

    • Search Google Scholar
    • Export Citation
  • Jamison, Amelia, David Broniatowski, Mark Dredze, Anu Sangraula, Michael Smith and Sandra Quinn. 2020. ‘Not Just Conspiracy Theories: Vaccine Opponents and Proponents Add to the COVID-19 “Infodemic” on Twitter’. Harvard Kennedy School Misinformation Review 1(3). https://misinforeview.hks.harvard.edu/article/not-just-conspiracy-theories-vaccine-opponents-and-pro-ponents-add-to-the-covid-19-infodemic-on-twitter/ (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Jammu and Kashmir Coalition of Civil Society. 2020. Kashmir’s Internet Siege: An Ongoing Assault on Digital Rights. Jammu and Kashmir Coalition of Civil Society. https://jkccs.net/report-kashmirs-internet-siege/ (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Janetsky, Megan. 2020. ‘Violence against Women up amid Latin America COVID-19 Lockdowns’. Al Jazeera. www.aljazeera.com/features/2020/4/20/violence-against-women-up-amid-latin-america-covid-19-lockdowns (accessed 16 November 2020).

    • Search Google Scholar
    • Export Citation
  • Jankowicz, Nina, Jillian Hunchak, Alexandra Pavliuc, Celia Davies, Shannon Pierson and Zoë Kaufmann. 2021. Malign Creativity: How Gender, Sex, and Lies Are Weaponized Against Women Online. Washington, DC: The Wilson Center. www.wilsoncenter.org/publication/malign-creativity-how-gender-sex-and-lies-are-weaponized-against-women-online?utm_medium=social&utm_source=twitter.com&utm_campaign=wilson (accessed 25 January 2021).

    • Search Google Scholar
    • Export Citation
  • Jansson, Ina-Maria. 2020. ‘Creating Value of the Past through Negotiations in the Present: Balancing Professional Authority with Influence of Participants’. Archival Science 20(4): 327345.

    • Search Google Scholar
    • Export Citation
  • John, Alun. 2020. ‘Explainer: How Does China’s Digital Yuan Work?Reuters. www.reuters.com/article/us-china-currency-digital-explainer-idUSKBN27411T (accessed 1 February 2021).

    • Search Google Scholar
    • Export Citation
  • Johnson, Britney, Ben Rydal Shapiro, Betsy DiSalvo, Annabel Rothschild and Carl DiSalvo. 2021. ‘Exploring Approaches to Data Literacy Through a Critical Race Theory Perspective’. https://dl.acm.org/doi/pdf/10.1145/3411764.3445141 (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Johnson, Sydney. 2019. ‘Turnitin to Be Acquired by Advance Publications for $1.75B’. EdSurge. www.edsurge.com/news/2019-03-06-turnitin-to-be-acquired-by-advance-publications-for-1-75b (accessed 15 November 2021).

    • Search Google Scholar
    • Export Citation
  • Jones, Christopher. 2021. ‘Law Enforcement Use of Facial Recognition: Bias, Disparate Impacts to People of Color, and the Need for Federal Legislation’. North Carolina Journal of Law & Technology 22(4): 777815.

    • Search Google Scholar
    • Export Citation
  • Kaku, Michio. 2011. Physics of the Future: How Science Will Shape Human Destiny and Our Daily Lives by the Year 2100. New York: Penguin.

    • Search Google Scholar
    • Export Citation
  • Kapadia, Faisal, and Mahnoor Jalil. 2017. Free Basics in Pakistan. Global Voices. https://advox.globalvoices.org/wp-content/uploads/2017/07/PAKISTAN.pdf (accessed 31 March 2021).

    • Search Google Scholar
    • Export Citation
  • Karacaoglu, Yusuf, Stela Mocan, and Rachel Alexander Halsema. 2018. ‘The World Bank Group’s Technology and Innovation Lab, From Concept to Development’. Innovations: Technology, Governance, Globalization, November: 18–28.

    • Search Google Scholar
    • Export Citation
  • Karim, Sabrina, and Daniel Hill. 2018. ‘The Study of Gender and Women in Cross-National Political Science Research: Rethinking Concepts and Measurements’. Unpublished working paper. www.womanstats.org/KarimHillGenderEqualityArticleApr2018.pdf (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Karimi, Ali. 2019. ‘Surveillance in Weak States: The Problem of Population Information in Afghanistan’. International Journal of Communication 13: 47784793.

    • Search Google Scholar
    • Export Citation
  • Katwala, Amit. 2020. ‘Quantum Computing and Quantum Supremacy, Explained’. Wired UK. www.wired.co.uk/article/quantum-computing-explained (accessed 24 March 2021).

    • Search Google Scholar
    • Export Citation
  • Keating, Christine, Claire Rasmussen, and Pooja Rishi. 2010. ‘The Rationality of Empowerment: Microcredit, Accumulation by Dispossession, and the Gendered Economy’. Signs: Journal of Women in Culture and Society 36(1): 153176.

    • Search Google Scholar
    • Export Citation
  • Kent, Susan Kingsley. 1990. Sex and Suffrage in Britain 1860–1914. New York: Routledge.

  • Keyson, Lauren, and Dana Stevens. 2014. ‘Fereshteh Forough Is Fascinated by Bitcoin’. Disruptive Technologists. https://disruptivetechnologists.com/2014/08/fereshteh-forough-is-fascinated-by-bitcoin/ (accessed 25 January 2021).

    • Search Google Scholar
    • Export Citation
  • Kilbride, Erin. 2015. ‘The Forgotten: Pakistan’s Transgender Population, and the Islamic State’. E-International Relations. www.e-ir.info/2015/01/07/the-forgotten-pakistans-transgender-population-and-the-islamic-state/ (accessed 18 January 2015).

    • Search Google Scholar
    • Export Citation
  • King-Close, Alexandria. 2016. ‘A Gender Analysis of Cyber War’. Master’s Thesis. Harvard Extension School. https://dash.harvard.edu/bitstream/handle/1/33797321/KING-CLOSE-DOCUMENT-2016.pdf?sequence=1 (accessed 3 November 2022).

    • Search Google Scholar
    • Export Citation
  • Kirby, Paul, and Laura J. Shepherd. 2016. ‘The Futures Past of the Women, Peace and Security Agenda’. International Affairs 92(2): 373392.

    • Search Google Scholar
    • Export Citation
  • Kirchgaessner, Stephanie. 2021. ‘New Evidence Suggests Spyware Used to Surveil Emirati Activist Alaa Al-Siddiq’. The Guardian. www.theguardian.com/world/2021/sep/24/new-evidence-suggests-spyware-used-to-surveil-emirati-activist-alaa-al-siddiq (accessed 10 February 2022).

    • Search Google Scholar
    • Export Citation
  • Klasen, Stephan. 2006. ‘UNDP’s Gender-related Measures: Some Conceptual Problems and Possible Solutions’. Journal of Human Development 7(2): 243274.

    • Search Google Scholar
    • Export Citation
  • Klasen, Stephan, and Dana Schüler. 2011. ‘Reforming the Gender-Related Development Index and the Gender Empowerment Measure: Implementing Some Specific Proposals’. Feminist Economics 17(1): 130.

    • Search Google Scholar
    • Export Citation
  • Klippenstein, Ken, and Sara Sirota. 2021. ‘The Taliban Have Seized U.S. Military Biometrics Devices’. The Intercept. https://theintercept.com/2021/08/17/afghanistan-taliban-military-biometrics/ (accessed 1 November 2021).

    • Search Google Scholar
    • Export Citation
  • Koskela, Hille. 2012. ‘“You Shouldn’t Wear That Body”: The Problematic of Surveillance and Gender’. In Routledge Handbook of Surveillance Studies, edited by Kirstie Ball, Kevin Haggerty, and David Lyon. Florence, SC: Taylor & Francis, pp 49–56.

    • Search Google Scholar
    • Export Citation
  • Kreps, Sarah. 2020. Social Media and International Relations. New York: Cambridge University Press.

  • Kronstadt, K. Allen. 2020. Kashmir: Background, Recent Developments, and U.S. Policy. Washington, DC: Congressional Research Service.

  • Krook, Mona Lena. 2020. Violence against Women in Politics. 1st edition. New York: Oxford University Press.

  • Kshetri, Nir. 2020. ‘The Lack of Women in Cybersecurity Leaves the Online World at Greater Risk’. The Conversation. http://theconversation.com/the-lack-of-women-in-cybersecurity-leaves-the-online-world-at-greater-risk-136654 (accessed 15 February 2021).

    • Search Google Scholar
    • Export Citation
  • Kukutai, Tahu, and John Taylor. 2016. ‘Data Sovereignty for Indigenous Peoples: Current Practice and Future Needs’. In Indigenous Data Sovereignty: Toward an Agenda, edited by Tahu Kukutai and John Taylor. Acton: ANU Press, pp 124.

    • Search Google Scholar
    • Export Citation
  • Kunz, Rahel. 2008. ‘“Remittances Are Beautiful”? Gender Implications of the New Global Remittances Trend’. Third World Quarterly 29(7