"The Typology of Online Harms provides a comprehensive framework for understanding and categorizing various types of online harm through a human rights lens [...] This typology recognizes the complex nature of online safety, by classifying the threats into content, contact and conduct risks. Online
...
harms can occur throughout the production, distribution and consumption of content (content) but can also arise as a result of online interactions with others (contact) and through behaviour facilitated by technology (conduct)." (Conclusion)
more
"This study aims to examine the impact of Internet development on the urban-rural income gap in China. By using a provincial level panel dataset comprising 31 of China’s provinces, it analyzes and compares the effects of the eastern, central, and western regions over the period of 2005–2016. The
...
results show that Internet development aggravates the gap in the central region much more than that in the eastern and western regions. The trade openness expands the urban-rural income gap only in the eastern region. Urbanization reduces the urban-rural income gap in the western region more than that in the eastern and central regions. Additionally, the regional economic development level also reduces the urban-rural income gap in central region more than that in the eastern region. FDI reduces the urban-rural income gap only in the central region. Additionally, while the urban-rural income gap can widen further by Internet development with trade openness, it can be decreased if Internet development is combined with FDI and urbanization. To reduce urban-rural income gap, the government should accelerate the construction of Internet according to regional differences." (Abstract)
more
"Taking stock of media activist initiatives in the Southwest Asia and North Africa (SWANA) region, this article discusses findings from case study research informing the media education platform "diraya.media." Through participatory methodology, the case studies and the bilingual (Arabic/English) we
...
bsite aim to analyze and strengthen local media literacy pedagogies by learning with and from media activists in the region. This article reports on six case studies of SWANA-based media activist organizations and pedagogical material for the media literacy classroom. The goal is to reflect and discuss the methodological and theoretical ramifications of Diraya as a pedagogical space for reflection and knowledge exchange between media activists and other learners in the region and beyond. Drawing on the participating activists' experiences, Diraya is embedded in the turn toward radical media education and civic media literacies, contributing to (1) de-Westernizing media literacy education, (2) creating more learning materials based on local activist knowledge as important resources to increase media literacy, and (3) enabling of long-term collaborations by archiving and making public experiences from SWANA-based media activists." (Abstract)
more
"Indigenous Peoples are increasingly being sought out for research partnerships that incorporate Indigenous Knowledges into ecology research. In such research partnerships, it is essential that Indigenous data are cared for ethically and responsibly. Here we outline how the ‘CARE Principles for In
...
digenous Data Governance’ can sow community ethics into disciplines that are inundated with extractive helicopter research practices, and we provide standardized practices for evolving data and research landscapes." (Abstract)
more
"Threats associated with the consumer Internet of Things (IoT) may particularly inhibit the work and wellbeing of journalists, especially because of the danger of technological surveillance and the imperative to protect confidential sources. These issues may have knock-on effects on societal stabili
...
ty and democratic processes if press freedom is eroded. Still, journalists remain unaware of potential IoT threats, and so are unable to incorporate them into risk assessments or to advise their sources. This shows a clear gap in the literature, requiring immediate attention. This article therefore identifies and organises distinctive and novel threats to journalism from the consumer IoT. The article presents a novel conceptualisation of threats to the press in six categories: regulatory gaps, legal threats, profiling threats, tracking threats, data and device modification threats and networked device threats. Each of the threats in these categories includes a description and hypothetical consequences that include real-life ways in which IoT devices can be used to inhibit journalistic work, building on interdisciplinary literature analysis and expert interviews. In so doing, this article synthesises technical information about IoT device capabilities with human security and privacy requirements tailored to a specific at-risk population: journalists. It is therefore important for cyber science scholarship to address the contemporary and emerging risks associated with IoT devices to vulnerable groups such as journalists. This exploratory conceptualisation enables the evidence-based conceptual evolution of understandings of cyber security risks to journalists." (Abstract)
more
"Today, social networks are the most popular and widely used applications among smartphone users all around the world. Three years ago, the Telegram messaging app was the most widely used social messaging app in Iran due to its technical features and user-friendliness. Despite its popularity, Telegr
...
am caused controversial debates among policymakers and public opinion. To discover the nature of these conflicts, two main discourses were identified through qualitative data analysis based on Laclau and Mouffe’s discourse theory. Proponents of Minaret discourse consider the Telegram as a threat to national security, thus they have tried to provide favorable condition to limit using it, and develop alternative domestic apps. In contrast, Cylinder discourse supports using the Telegram app to fulfill citizens’ digital rights and their rights of privacy and freedom of expression. This discursive conflict among policymakers, along with users’ resistance, resulted in some failures in the adoption of foreign apps (e.g., Telegram). Despite the extensive technical, financial, and moral supports to popularize domestic apps, users still prefer foreign apps such as Telegram, WhatsApp, and Instagram. The analysis of emergent discourses demonstrates the origins of contestations and provides insights into how to adopt social messaging apps." (Abstract)
more
"The purpose of this study is to investigate the extent of digital surveillance by Arab authorities, which face risks and threats of surveillance, and how journalists seek to press freedom by using tools and techniques to communicate securely. Design/methodology/approach: The study used focus group
...
discussions with 14 journalists from Syria, Saudi Arabia, Libya, Yemen, Oman, Jordan and Egypt. While in Egypt, questionnaires were distributed to 199 journalists from both independent and semi-governmental outlets to investigate how Egyptian journalists interpret the new data protection law and its implications for press freedom. Findings: The study indicated that journalists from these countries revealed severe censorship by their respective governments, an element inconsistent with the Arab Constitution. The recommendation of the study encourages media organisations to play a more active role in setting policies that make it easier for journalists to adopt and use digital security tools, while Egyptian journalists see the law as a barrier to media independence because it allows the government to exercise greater information control through digital policy and imposes regulatory rules on journalists. Practical implications: The study identifies practical and theoretical issues in Arab legislation and may reveal practices of interest to scientists researching the balance between data protection, the right of access to information and media research as an example of contemporary government indirect or ‘‘soft’’ censorship methods. Originality/value: To the best of the authors’ knowledge, this paper is one of the first research contributions to analyse the relationships between Arab authoritarians who used surveillance to restrict freedom of the press after the Arab Spring revolutions of 2011 to keep themselves in power as long as they could. In addition, Egypt’s use of surveillance under new laws allowed the regimes to install software on the journalists’ phones that enabled them to read the files and emails and track their locations; accordingly, journalists can be targeted by the cyberattack and can be arrested." (Abstract)
more
"Today we use the Internet for everything: studying, working, communicating, shopping, getting information... even for switching on and off different household appliances, thanks to the use of the so-called Internet of Things (IoT). This intensive use of the Internet, and therefore of electronic dev
...
ices, with larger and smaller screens, touchscreens and keyboards, creates new challenges and possible consequences of which we need to be aware. Excessive use of, as is often the case, social networks; can have consequences in areas such as socialisation (face-to-face), physical activity or concentration. In this module you will learn what these risks are, and how to use electronic devices correctly, achieving digital wellbeing." (Page 3)
more
"Although the figures for access and use of ICT have gradually improved in Colombia, the situation is far from optimal. The same goes for connectivity. The most concerning aspect overall is the difference between urban centers and rural areas. The gap is significant and seems to be far from closing,
...
despite the efforts made by the government and other actors to narrow this gap. Geographic, social, and economic barriers continue to be difficult to tackle. In 2021, the percentage of households nationwide that owned some type of television was 89.5%. As for the infrastructure to receive television services, the figures varied depending on the area. For example, cable television was the most used in municipal capitals, while free-to-air television was most used in rural areas. The same year, the percentage of households that owned a desktop computer, laptop, or tablet was 37.9%, and the percentage of people who had a cell phone of any type was 76.3%. As for connectivity, 60.5% of the total national households had fixed internet connection, with a higher proportion in large cities. In rural areas, mobile connection, which 75% of the total population have access to, is more popular. As for fixed Internet operators, the market is dominated by Claro, followed by Tigo and Movistar. Regarding mobile internet suppliers, the market is also dominated by Claro, followed by Movistar and Tigo. Among internet users, the device most used to get online access is the cellphone with 93.9%. WhatsApp is the most popular social media platform with 94% of internet users, followed very closely by Facebook with 91.7% and Instagram with 84.4%, all belonging to the Meta conglomerate. Google leads in the search engine market with more than 97% of all users who performed searches on the internet. Thus, although the internet seems to be a diverse market, the truth is that it is not so. On the other hand, although the country is more connected than ever before and citizens have more options to consume information, the media do not have it easy. Apart from tensions over advertising revenue, which have been exacerbated by the growing power of conglomerates like Meta and Google, they face more competition and, in many ways, more obstacles than before. Successfully overcoming those challenges is key and depends on their ability to stay afloat economically and to earn or regain the public's trust, especially in times when disinformation and fake news are everyday realities." (Conclusions, page 16)
more
"Eritrean refugees are being trafficked and enslaved in Libya, where they are tortured to force relatives to pay a ransom for their release. Labelled with a digital code, they are moved along in the possession of the traffickers through a series of ‘black holes’, in which their access to digital
...
technologies and connectivity is highly controlled. They are tortured, abused, extorted and subjected to sexual violence. Many die along the way. If they make it to the Mediterranean Sea, they risk being intercepted and returned to Libya or dying at sea. Over the period of this study (2017–21), it is conservatively estimated that at least 200,000 men, women and children have fallen victim to human trafficking for ransom in Libya, and the cumulative value of this trade for that period is estimated at over 1 billion USD. This detailed ethnographic study identifies the routes, modus operandi, organisation, and key actors involved in the human trafficking for ransom of refugees and migrants, who are desperately in need of protection." (Publisher description)
more
"Journalists are increasingly attacked in response to their work yet they often lack the necessary support and training to protect themselves, their sources, and their communications. Despite this, there has been limited scholarly attention that addresses how journalism schools approach digital secu
...
rity education. This paper draws from an analysis of 106 US programs and 23 semi-structured interviews with journalism students and professors to examine how the next generation of journalists learn about digital security practices. Our findings show that most programs (88.7%) don’t offer formal digital security programming and that digital security skills are often deprioritized in favor of skills seen as more significant contributors to post-graduate hiring—a key priority of journalism programs. Additional barriers include a lack of space and time in existing curricula for added digital security coursework, a perception that students are not interested, and few professors with related knowledge. When security education is introduced, it’s done so in often informal and ad-hoc ways, largely led by “security champions,” both within and outside of journalism, who advocate for its legitimacy. These findings have important implications for journalism education and journalists’ capacity to carry out their work amidst a deteriorating safety environment in the United States." (Abstract)
more
"This paper serves as a summary report for the Democracy and Internet Governance Initiative, a two-year joint initiative between Harvard Kennedy School’s Belfer Center for Science and International Affairs and Shorenstein Center on Media, Politics, and Public Policy. It delves into the rationale a
...
nd components of a new risk-centered approach to analyze and address the negative impacts of digital platforms. It also explores the key dimensions that should be considered when assessing platform risk, including mental and physical health, financial security, privacy, social and reputational wellbeing, professional security, sovereignty, and strength of public goods. The paper then underscores the necessity and value of comprehensive disclosure schemes in order to better understand the cause and effect of digital platforms and related products within the scope of a risk framework. Through the establishment of standards setting bodies dedicated to addressing itemized risks, we argue that this is the infrastructure necessary for sustainable regulation and self-governance that is dynamic and public purpose-oriented. Throughout each section, we aim to underline the significance of stakeholder engagement in the governance process. Platforms themselves, civil society organizations, policymakers, researchers, and users all have important perspectives, experiences, and jurisdiction needed to effectively mitigate harms of digital platforms. Engaging all stakeholders in a collaborative manner will enhance the framework's relevance, legitimacy, and practicality." (Executive summary)
more