"In 2015 there are more than 7 billion mobile cellular subscriptions worldwide, up from less than 1 billion in 2000. Globally 3.2 billion people are using the Internet of which 2 billion are from developing countries. ICTs will play an even more significant role in the post 2015 development agenda a
...
nd in achieving future sustainable development goals as the world moves faster and faster towards a digital society. Our mission is to connect everyone and to create a truly inclusive information society, for which we need comparable and high-quality data and statistics to measure progress." (Page 1)
more
"Data for this report were gathered through an electronic survey of 895 Cambodian Internet users conducted from March 12 to 18, 2015, as well as through three follow-up focus group discussions [...] Cambodians find the Internet to be useful for personal, professional and civic interests, with the ma
...
jority of respondents agreeing that the Internet makes their job easier (78.8%) and helps in their education and studies (73.7%). 75.3% of Cambodians report the Internet provides them with access to news and information they cannot find elsewhere in Cambodia’s mainstream, offline media. The majority of Cambodian Internet users (62.7%) feel “very” or “somewhat” free to express their opinions online without fear of repercussions." (Executive summary)
more
"The Mobile Information Literacy Curriculum is a growing collection of training materials designed to build information literacies for the millions of people worldwide coming online every month via a mobile phone. Most information and digital literacy curricula were designed for a PC age, and public
...
and private organizations around the world have used these curricula to help newcomers use computers and the internet effectively and safely. The better curricula address not only skills, but also concepts and attitudes. The central question for this project is: what are the relevant skills, concepts, and attitudes for people using mobiles, not PCs, to access the internet?" (Publisher description)
more
"Many of the research approaches to smartphones actually regard them as more or less transparent points of access to other kinds of communication experiences. That is, rather than considering the smartphone as something in itself, the researchers look at how individuals use the smartphone for their
...
communicative purposes, whether these be talking, surfing the web, using on-line data access for off-site data sources, downloading or uploading materials, or any kind of interaction with social media. They focus not so much on the smartphone itself but on the activities that people engage in with their smartphones.
Though most communication research examines on individual and group usage of smartphones, a few people outside of the more technical journals and books have sketched—at least in overview form—the key factors for smartphone success, what Goggin and Hjorth (2014b) identify as infrastructure, economics, and policy. Apart from the manufacture of the handsets, smartphones require an infrastructure of telecommunications operators, with systems across the world divided between national telecommunication services and competing privately owned companies (Curwen & Whalley, 2014; Feijóo, 2014). Secondly, smartphones depend upon both formal and informal economies, from the manufacture and sale of the phones themselves to the production and sale of the apps to the revenues supporting particular app services (music sales, data storage, on-demand services, and so on) (Lobato & Thomas, 2014). Goldsmith (2014) adds a bit of detail, describing an app ecosystem: “Each ecosystem consists of a core company, which creates and maintains a platform and an app marketplace, plus small and large companies that produce apps and/or mobile devices for that platform” (p. 171). Finally, both manufacturers and operators must negotiate agreed-on technical specifications for voice and data transmission, specifications that governments must approve both locally and perhaps in cross-border treaty agreements (Middleton, 2014). These factors lead to a more complex view of smartphones: not only do they function as communication devices and embodiments of technical negotiations, but they also take on identities as symbols of economic and cultural systems, as “moral objects” (whose value justifies their purchase price), as fashion accessories, and as lifestyle supports (Koskinen, 2012, p. 225)." (Introduction, pages 3-4)
more
"Ranking Digital Rights’ inaugural Corporate Accountability Index evaluates 16 of the world’s most powerful Internet and telecommunications companies on their commitments, policies, and practices that affect users’ freedom of expression and privacy. By opening the door for greater corporate tr
...
ansparency and public scrutiny of business practices, the Index encourages companies to do a better job of respecting their users’ rights around the globe [...] Highlights: There are no “winners.” Even companies in the lead are falling short. Across the board, companies need to improve their disclosure of policies and practices that affect users’ freedom of expression and privacy, as well as their commitments to these human rights. Only six companies scored at least 50 percent of the total possible points. The highest score was only 65 percent." (Executive summary)
more
"Die vorliegende Broschüre fasst die Erkenntnisse von jugendschutz.net aus den Recherchen zu Islamismus im Internet zusammen und beschreibt das Phänomen aus der Perspektive des Jugendschutzes. Im Blick sind dabei vor allem Strategien, mit denen junge User für islamistische Propaganda geködert we
...
rden. Aufgezeigt werden auch mögliche Gegenaktivitäten." (Seite 2)
more
"This kit is a contribution from activists for activists to help us be more secure in our digital practices. It’s designed to help activists deal with the most common security issues that might jeopardise the integrity of our devices and communications. Any at-risk user who encounters security-rel
...
ated problems can use this kit to mitigate the immediate consequences and find guidance to address ongoing security issues. The kit is simply written for computer non-experts. Since security is complex and simple answers might not always be sufficient, this kit also provides links to more exhaustive resources for additional support. The work on this kit has been guided by APC’s many years of work in the area of digital security, particularly its work with human rights defenders, those who deal with digital dangers most frequently as a matter of course in their work." (APC website)
more
"This paper does suggest that child abuse content is the most popular type of content on the Tor Dark Net. While law enforcement may crawl such sites, the number of requests that would be seen would be only a tiny fraction, and hence not skew the outline ratios. Similarly, denial of service attacks
...
were not observed and so are also unlikely to account for the high requests. The usage of Tor2Web may underrepresent some categories, but it is not currently clear whether, or why, such groups would exclusively use this tool." (Page 9)
more
"The scale of the Internet’s underworld is immense. The number of non-indexed web sites, known as the Deep Web, is estimated to be 400 to 500 times larger than the surface web of indexed, searchable web sites. And the Deep Web is where the dark side of the Internet flourishes. While there are plen
...
ty of law-abiding citizens and well-intentioned individuals (such as journalists, political dissidents, and whistleblowers) who conduct their online activities below the surface, the part of the Deep Web known as the Darknet has become a conduit for illegal and often dangerous activities. This policy brief outlines what the Deep Web and Darknet are, how they are accessed, and why we should care about them. For policymakers, the continuing growth of the Deep Web in general and the accelerated expansion of the Darknet in particular pose new policy challenges." (Summary)
more
"This study encompasses both quantitative and qualitative assessment: On the one hand, the more than 50 evaluated declarations, guidelines, and frameworks are briefly described in the given context; on the other hand, the issues contained in these documents are also qualitatively analyzed. In this,
...
it is evident that multiple initiatives have been taken during the last 25 years. The prevailing impression is of a wide diversity of documents and of attention to diverse Internet Governance principles. The contents of the analyzed documents heavily depend on the given actors and environment at the time of the drafting. Furthermore, some principles (for example freedom of expression, access to information, privacy) have gained much more attention than other principles (for example, multistakeholder participation, ethical behavior, sustainability, education, gender equality)." (Executive summary)
more
"Featuring a range of examples from ACP countries, this booklet includes testimonies on how Web 2.0 and social media have contributed to policy dialogue and advocacy (Chapter 1), value chain development (Chapter 2) and provision of information services (Chapter 3). The booklet features 18 stories co
...
vering all ACP regions, documenting the transformative power of these innovative technologies." (Page 6)
more
"Drawn from multisited fieldwork conducted among Cameroonians in Germany and Cameroon, the article reveals that the liveness of mobile phone communication influences expectations and narratives of remittances in Cameroonian transnational social relationships. These expectations are meaningful within
...
a cultural context where economic resources are expected to flow from migrants to nonmigrants. As this case demonstrates, the general belief in nonmigrants' entitlement to the achievements of those who migrate regardless of their status abroad, also means migrant students are involved in remittances practices. The students are expected to remit and at the same time, they are conscious of their obligation to support people who stay back in the home country. As such, the mobile phone ideally provides an infrastructure through which monetary resources could be coordinated and channeled to Cameroon. While exploring this possibility of remittances transfer, I argue that instant communication contradictorily generates and fuels conflicts mainly as a result of unmet expectations of deploying the phone to directly request money from abroad." (Abstract)
more
"This study explores the spatial politics of Othering and whether women are marginalized in political conversations online in India. It's methodology consists of an analysis of 23,350 tweets over an eight-day period. It shows a significant underrepresentation of women in Twitter's political conversa
...
tions, which mirrors a real-world marginalization of women in India's political processes." (Abstract)
more
"Cette étude comprend une évaluation à la fois quantitative et qualitative : d’un côté, la cinquantaine de déclarations, directives et cadres évalués sont présentés brièvement dans le contexte donné; d’un autre côté, les questions contenues dans ces documents sont analysées d’un
...
point de vue qualitatif. À cet égard, il est évident que de multiples initiatives ont été prises au cours des 25 dernières années. La principale impression qui se dégage, c’est que les documents et les principes retenus montrent une grande diversité. Le contenu des documents examinés dépend fortement des acteurs et du contexte au moment de l’élaboration. En outre, certains principes (par exemple la liberté d’expression, l’accès à l’information, le respect de la vie privée) ont reçu beaucoup plus d’attention que d’autres (par exemple, la participation de multiples acteurs, le comportement éthique, la durabilité, l’éducation, l’égalité des genres)." (Résumé exécutif)
more
"The playbook addresses ten technology areas and explores how each might be applied to achieve the Sustainable Development Goals (SDG). We provide a basic overview of each, discuss benefits, trends and challenges and make recommendations for what nonprofits, governments and the private sector can do
...
to enhance the impact of these promising technologies against the SDGs. It is designed to be informative and actionable, a utilitarian resource for any organization seeking to leverage the most promising tools to address the highest priority challenges our world faces." (Foreword, page 5)
more