"Privacy scholarship has shown how norms of appropriate information flow and information regulatory processes vary according to environment, which change as the environment changes, including through the introduction of new technologies. This paper describes findings from a qualitative research stud
...
y that examines practices and perceptions of privacy in Cambodia as the population rapidly moves into an online environment (specifically Facebook, the most popular Internet tool in Cambodia today). We empirically demonstrate how the concept of privacy differs across cultures and show how the Facebook platform, as it becomes popular worldwide, catalyzes change in norms of information regulation. We discuss how the localization of transnational technology platforms provides a key site in which to investigate changing cultural ideas about privacy, and to discover misalignments between different expectations for information flow. Finally, we explore ways that insufficient localization effort by transnational technology companies puts some of the most marginalized users at disproportionate information disclosure risk when using new Internet tools, and offer some pragmatic suggestions for how such companies could improve privacy tools for users who are far -geographically or culturally - from where the tools are designed." (Abstract)
more
"Media companies in Serbia are not sufficiently aware of the importance of personal data protection, nor are there developed procedures regarding the fulfilment of standards in line with new rules for personal data protection. Taking into account media business models in a digital environment, which
...
are substantially based on collecting data of visitors and users of websites, it is necessary to advance their practices and internal policies. This is necessary so that they can use the potentials of digital economy and respect the privacy of their audiences in accordance with the new legislation." (Summary)
more
"The Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological perspective. Privacy is in the news almost every day: mass surveillance by intelligence agencies, th
...
e use of social media data for commercial profit and political microtargeting, password hacks and identity theft, new data protection regimes, questionable reuse of medical data, and concerns about how algorithms shape the way we think and decide. This book offers interdisciplinary background information about these developments and how to understand and properly evaluate them. The book is set up for use in interdisciplinary educational programmes. Each chapter provides a structured analysis of the role of privacy within that discipline, its characteristics, themes anddebates, as well as current challenges. Disciplinary approaches are presented in such a way that students and researchers from every scientific background can follow the argumentation and enrich their own understanding of privacy issues." (Publisher description)
more
"In our increasingly digital environment, it is of paramount importance that citizens be in possession of a legal and digital identity if they are to access digital government services and participate fully in the digital economy. In 2018, of the 175 countries with a national ID (foundational or leg
...
al identification) system in place, 160 have a system that is at least partially e-ID. However, even in these countries a significant portion of the population still do not have a national ID and over a one billion are still “invisible”, lacking all proof of legal identity. In some countries around the world, significant progress is being made to remedy this, building on established practices and often using the Subscriber Identity Module (SIM) registration, “Know-Your-Customer” (KYC) processes and mobile devices as a foundation. “Digital Identity in the ICT ecosystem: An overview” sets out clearly the different elements in this complex and unfolding landscape. It defines digital identity, provides an overview of the various types of digital identity systems, looks at different approaches taken and the range of challenges being faced, as well as opportunities that arise from using digital identity platforms." (Executive summary)
more
"Cyberwomen is a digital security curriculum with a holistic and gender perspective, geared towards both professional trainers and those who want to learn how to train others on their digital protection and include gender considerations as they do so. It is made up of training modules, interactive g
...
ames and recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids." (https://iwpr.net)
more
"We wrote this booklet to help our sisters learn about problems that we can run into on the internet (like leaked or stolen personal photos, viruses, and scams), how we can make informed decisions every day to protect ourselves, and to help make the internet a safe space for ourselves, our families,
...
and all other women." (Page 1)
more
"While the digital era has delivered unprecedented opportunities for big-data based investigative journalism—from the Snowden Files to the Panama Papers—it has also thrown up a host of new threats to the sustainability of journalism based on confidential sources. These include: mass and targeted
...
surveillance; data retention regimes and the handover of data by third party intermediaries such as social media platforms, telecommunications companies and Internet Service Providers (ISPs); national security and anti-terrorism overreach; attempts to ban encryption and online anonymity; and malicious digital attacks targeting journalists. If sources cannot securely connect with journalists, they risk exposure, with impacts including economic penalties through to extra-judicial killings. The effect of these threats to accountability journalism and public access to information is chilling, and it is leading to significant changes in the practice of investigative journalism dependent upon confidential sources and information on a global scale." (Abstract)
more
"This study, which covers 121 UNESCO Member States, represents a global benchmarking of journalistic source protection in the Digital Age. It focuses on developments during the period 2007-2015. The legal frameworks that support protection of journalistic sources, at international, regional and coun
...
try levels, are under significant strain in 2015. They are increasingly at risk of erosion, restriction and compromise - a development that is seen to represent a direct challenge to the established universal human rights of freedom of expression and privacy, and one that especially may constitute a threat to the sustainability of investigative journalism. In many of the countries examined in this Study, it was found that legal source protection frameworks are being actually or potentially: overridden by national security and anti-terrorism legislation; undercut by surveillance – both mass and targeted; jeopardised by mandatory data retention policies and pressure applied to third party intermediaries - like ISPs, telcos, search engines, social media platforms - to release data which risks exposing sources; outdated when it comes to regulating the collection and use of digital data, such as whether information recorded without consent is admissible in a court case against either a journalist or a source; and whether digitally stored material gathered by journalistic actors is covered by existing source protection laws." (Executive summary)
more
"Frente a la tendencia regional y global que lleva a gobiernos y a proveedores de servicio a acumular una cantidad cada vez mayor de información sobre sus usuarios, este estudio intenta una aproximación comparada a la manera en que las legislaciones de México, Brasil, Colombia, Perú, Argentina y
...
Chile abordan la retención de datos y el registro de teléfonos móviles, de cara a sus obligaciones y compromisos internacionales en el marco interamericano, y en particular en relación a los proyectos legislativos que en Chile buscan realizar cambios al actual marco regulatorio de las telecomunicaciones." (Resumen)
more
"These are the basic tools to protect confidentiality, integrity and availability of your information. This list has been built with the support of the Information Security and Capacity Project (ISC Project)." (Page 1)
"In its first section, the study examines the legal framework regarding personal data in Lebanon. Even though Lebanon participated in developing the directives on data protection legislation issued by the United Nations Economic and Social Commission for Western Asia (ESCWA) in 2012, the country sti
...
ll lacks specific legislation on personal data [...] In its second section, the study defines biometric data, explains the technology employed in collecting it, and summarizes the most important methods used to encrypt and protect it from breaches. The study highlights the use of biometrics given recent technological advances and discusses the importance of using sophisticated protections to ensure that data is protected from leaks and breaches [...] In the third section, the study reviews data leaks originating from different sectors, underscoring the extent to which Lebanese citizens and residents’ personal data is being misused. The study reveals that personal data collected in the country is susceptible to infiltration and to leaks due to weak protection systems and the absence of specialized legislation [...] In the fourth section, the study reviews the “Electronic Transactions and Personal Data Protection” draft law, which a subcommittee formed by the joint parliamentary committees is currently discussing." (Executive summary)
more
"La seguridad digital perfecta casi nunca se alcanza pero es posible fortalecerla con algunas prácticas sencillas que si se implementan continuamente mejorarán la protección de la información sensible y se evitará poner en riesgo a las víctimas así como a los defensores que trabajan para ello
...
s." (Página 1)
more