Nobel Women’s Initiative founders ‘shaken’ as seven staff resign | The Guardian

External review launched following collective resignation, which cited need for ‘profound organisational reforms’Five women Nobel laureates said this week they were “profoundly shaken and saddened” by the resignation of seven staff at the organisation created to promote peace, justice and women’s rights.Shirin Ebadi, Rigoberta Menchú Tum, Leymah Gbowee, Tawakkol Karman and Jody Williams said while they were aware of challenges within the Nobel Women’s Initiative, they “deeply regret not recognising the depth of their broader impact on staff”. They have launched an external review. Continue reading…

External review launched following collective resignation, which cited need for ‘profound organisational reforms’

Five women Nobel laureates said this week they were “profoundly shaken and saddened” by the resignation of seven staff at the organisation created to promote peace, justice and women’s rights.

Shirin Ebadi, Rigoberta Menchú Tum, Leymah Gbowee, Tawakkol Karman and Jody Williams said while they were aware of challenges within the Nobel Women’s Initiative, they “deeply regret not recognising the depth of their broader impact on staff”. They have launched an external review.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more