Protecting sex-workers from violence in Tanzania

Submitted by alajous@mit.edu on Tue, 03/17/2009 - 18:37.

Description of the project

The present project has the objective of establishing a pilot experiment where two kinds of applications involving the use of cell phone technology would be used in a cohort of sex-workers in the city of Mwanza Tanzania.

The two applications are designed to provide sex workers with a private co-sex worker’s list that would benefit each member by exchanging information about their physical location when they are confronted with violent clients.

1. The system has a phone side component that is based on a count-down application which prompts the user to enter the location and number of hours she will be with the client. The information would only be distributed to a network of friends in the event that the application is not stopped. The phone would send an emergency SMS directly to a list of friends alerting them in real time about a possible danger situation.
2. The second phone side component is based on an application that allows users to send data on potential dangerous individuals to be stored in a server and the information can be retrieved by subscribers to the server list. Both types of applications require secure distribution of the information and are not designed to be used by the government services, but are available to NGOs that may provide support.

Rationale

It is well established that government based support to prevent violence is scarce and sub-optimal in Tanzania, and that community based organization is required to solve many of the problems faced in this society including violence prevention. Information regarding violence against women is hard to standardize because of underreporting. In the case of Tanzania 19% of the women in Dar es Salaam reported being subject of physical violence by someone other than their partner.(WHO, 2004). Although the information is not particular to women related to the sex industry, it does tell us something about the general context of women in the country.

According to the WHO there are several factors that increase the risk of being subjects of violence. Among them are:

− financial autonomy,
− level of empowerment and social support,
− employment status,
− the degree of economic inequality between men and women,
− and attitudes toward gender roles.

Considering these risk factors, sex-workers appear to be in a continuously precarious situation. Because of the structure of their occupation all this risks seem to be augmented by being present at the same time. Although a full-scale solution for violence would have to go deeper into the causes and solutions for these risk factors, empowerment and social support can be increased by the creation of networks and the enhancement of information sharing in the short term. We believe that the use of wireless technology can achieve this and help sex-workers reduce the risk of being subjected to gender-based violence.

Materials and Methods

We built three applications, two phone-based, and one server-based.

The server-based application is a cell-phone based social network that takes in “bad date reports” from sex workers. The bad date reports are then sent out immediately (in real time) to members of the reporter's friends (as defined by the social network—coming soon), and also logged in a database. Newcomers, and those already in the system, can make use of the database by searching it for keywords. The idea is that sex workers will enter client violence information in free-form, for example by sending a text message saying “Australian blonde named Steve tried to hit me at Joe's Bar. He was refusing to wear condoms, and got unhappy when I insisted. Joe's wife helped me sneak out the back.” A new sex worker can then come along, and search the database for this message by any of the key words, for example, “getinfo Steve” or “getinfo Australian” will get him/her the previous message that was entered.

SMS interface: Since SMS's are packaged up, and delivered via email, the server-based application is currently email based. In our tests, we were able to email to the programmer's cell-phone, by using the email gateway address of his cellphone “XXX@tmomobile.com” for a cell-phone XXX and t-mobile service carrier. The current reporting system uses cfa.baddate@gmail.com as it's sms recipient. In a field deployment, the system would want to use an actual number. This can be fed in through a GSM modem into python, and python can call a simple “process” function in our server in order to process these text messages.

Database: As the application is built as a proof of concept, the database used is a simple python dictionary that is saved in a file using the cPickle library. The cPickle library simply generates text encodings of objects. In a real implementation, one would want to use a real database like SQL to do operations.

“Social Network”: In order to determine who your friends are, there needs to be some sort of “social network” that needs to be built up on the server. The social network can be of differing varieties, and we explored three possibilities, which we can call the list-serve variety, the twitter variety, and the facebook variety. In the list-serve variety, there are entities which we can call list-serves that people can sign up to. Whenever somebody signs up to a list-serve, they become “friends” with everybody else on the list-serve. The facebook idea is that people can sign up friends directly, rather than using a list-serve as an intermediary. However, since this idea assumes that friendships are reciprocal, we would need a confirmation process. The third idea is that I can decide who's friend I am, but not who is my friend. This is the twitter idea—in that I can decide who to listen to, but not (directly) who listens to me. No confirmation is ostensibly required, but more user control needs to be built into the system.
The current system is based on the list-serve idea, again as proof of concept. The code is easy to modify into a twitter style friend network, or even a facebook-style friend network, even though that is more complicated. Two types of messages “add X” and “lists” are devoted to the implementation of the social network. “add X” adds you the sender to listserve X, and “lists” returns the list-serves that you currently belong to.

Feedback: The motivation for the server app is that it can store information that sex workers put in, and deliver it back to them in the future. The way to relay back information is again complicated, and calls for some ingenuity and experimentation. The current system simply searches all text messages for the user's query, and returns back the latest-by-date text message that has that query string in it. Other ideas could be: return the last N text messages sent regarding this query, use technologies such as SMS find to find appropriate answers, or have NGO curators looking at the database, and for each keyword (example: Australian, Steve, skinny, etc), make a summary text message that sex workers would get back when that keyword was queried. Again, the program is built to be easily modifiable to do any of the above things.

Phone-based Applications

The two phone-based applications are meant to further strengthen the sex worker community and encourage them to work together for their safety.

Emergency Callback

The first phone-based application is an Emergency Callback system modeled on a mobile phone system in use on some university campuses in the US. For example when the user is about to walk home to their dorm from a night out they enter into the mobile application the amount of time it should reasonably take them to get there. If the timer reaches the preset time limit and the user has not canceled the countdown then the system notifies campus security with their number and location and they try to call the user to see if they are alright. If no response then they go looking for the user. Our system operates in a similar manner based on a simple timer countdown. It can be used when a sex worker is walking home for the night or can be used to estimate how long they should reasonably be with a client before someone should check in on them. Because the local police are at best ignoring sex workers and at worse contributing to their abuse and exploitation our system notifies the users “social network” sending an SMS to all their friends either added locally on the phone from their list of contacts or via an SMS to the bad date reporting server which would then send out the message to the “social network”. In addition, since we cannot rely on sex workers’ cell-phones to be GPS enabled or network provided cell ID information we decided to use a simple prompt when entering the countdown time to also ask for their probable location.

Bad Date Reporting

The second phone-based application is to work in conjunction with the bad date reporting server. The open manner in which the bad date server receives reports is very useful in keeping the system flexible. However, victims of physical and sexual assault can be emotionally traumatized and have difficulty providing useful information in a strictly voluntary unprompted manner. For this reason we developed a simple cell-phone-based application that prompts the user for pertinent information about the incident.

1. Name of the client
2. Nationality of the client
3. Physical description (long hair, tattoos, etc.)
4. Location of assault
5. Date and time of assault
6. Was a weapon used? If so what kind

The above information is consolidated into an SMS with each answer separated by a delineator that is then sent to the bad date reporting server. Five or six questions seemed the appropriate number to ask, asking too many or too detailed questions can actually cause the victim to re-live the incident which can be difficult and potentially turn victims off from completing a report or using the system again in the future. Having a formatted series of questions with the answers delineated in the SMS makes the information easier to parse on the server side.

Cell phone penetration and providers in Tanzania

In Tanzania, the teledensity has been increasing from one per cent in 2000 to 25 per cent in 2008. Currently, there are six licensed mobile phone operators — Tanzania Telecommunications Company Ltd (TTCL), Zantel, Zain, Tigo, Vodacom and Benson.

Cell phones are ideal tools for a mobile team and the equipment is less likely to be stolen compared with laptops or personal digital assistants. Cell phones don’t stick out in the field because from an outside observer, it looks like a sex-workers is just making a phone call. Therefore protecting this group from possible police investigation of retaliation from violent clients.

However, there is a limitation to the use of cell phones because of the cost of the service in relation to the per capita income of the country. In fact Tanzania is one of the countries with the most expensive services according to the ITU, which calculated the cost of 25 monthly calls and 30 SMS at around 33% of the per capita income. In consequence cellphone penetration is not very high at 24 lines per 100 inhabitants.
Review of the literature on using cell phones for health interventions

Applications involving the phone and the Internet have been described previously in literature. For example, Voxiva developed Alerta, a system that involves the phone and the Internet for communication and disease surveillance. Alerta was piloted initially in health clinics of the Ministry of Health in Peru, and later in October, 2002 http://www.prevenperu.org Voxiva platform for health solutions have been deployed in Latin America, Africa, Iraq, and India. For example, in Africa, Voxiva created a national HIV/AIDS information system for eight countries that monitors current data for national and global reporting requirements, and manages the use of antiretrovirals to reduce the spread of viral resistance. In India, Voxiva created, within a month, a surveillance system for Japanese encephalitis http://www.voxiva.net/. In South Africa, the project Cell Life http://www.cell-life.org/ is using cell phones to monitor adherence for the management of HIV/AIDS in patients on antiretroviral therapy. Some of the platforms Cell Life is using include a global system for mobile communications (GSM), wireless Internet gateway (WIG), and a geographical information system (GIS) database. Karras et al. reported in the procedures of the AMIA Symposium that a Java-enabled wireless phone could be potentially used in disaster response and public health informatics. They emphasized that the technology was inherently deployable, portable and that minimal orientation to new hardware was needed since everyone was comfortable with entering numbers on a phone keypad and pushing the send button. But not often these applications in data collection emphasize that communities should have access to the data generated nor there are sufficient planning in implementing the use of the data by the communities.