Filter
271
Featured
242
4
7
Topics
178
39
28
24
17
8
8
8
8
7
7
7
7
7
7
6
5
5
5
5
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
73
28
13
6
4
3
2
2
2
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
Building Trust: Toward a Legal Framework That Protects Personal Data in Lebanon
Beirut: Social Media Exchange Association (SMEX) (2017), 24 pp.
"In its first section, the study examines the legal framework regarding personal data in Lebanon. Even though Lebanon participated in developing the directives on data protection legislation issued by the United Nations Economic and Social Commission for Western Asia (ESCWA) in 2012, the country sti
...
ESOMAR Data Protection Checklist
ESOMAR (2017), 16 pp.
"The purpose of this document is to provide researchers, especially those working in smaller organisations that might not have extensive resources or experience in data protection requirements, with general guidance on their responsibilities within a global data protection framework to ensure that d
...
Guía de seguridad digital para activistas y defensores de derechos humanos
Caracas: Espacio Público (2017), 4 pp.
"La seguridad digital perfecta casi nunca se alcanza pero es posible fortalecerla con algunas prácticas sencillas que si se implementan continuamente mejorarán la protección de la información sensible y se evitará poner en riesgo a las víctimas así como a los defensores que trabajan para ello
...
Survey on Privacy in Media and Information Literacy with Youth Perspectives
Paris: UNESCO (2017), 121 pp.
Seguridad digital en tiempos de vigilancia
Espacio Público (2017), 4 pp.
"La presente propuesta metodológica para la promoción del uso seguro del Internet producto de un acuerdo de trabajo entre el Instituto Interamericano del Niño, la Niña y Adolescentes (IIN-OEA) y World Visión República Dominicana aborda, en forma conjunta, los desafíos que, desde la perspectiv
...
Human Rights and Encryption
Deep Insights
Paris: UNESCO (2016), 83 pp.
"Encryption is a hot topic in the current global discussion on Internet governance. This research delves into the subject, to outline a global overview of the various means of encryption, their availability and their potential applications in the media and communications landscape. The research expl
...
Terminology Guidelines for the Protection of Children from Sexual Exploitation and Sexual Abuse
Luxembourg: ECPAT (2016), x, 100 pp.
Journalist Security in the Digital World: A Survey. Are We Using the Right Tools?
Washington, DC: Center for International Media Assistance (CIMA) (2016), 13 pp.
"This survey was designed to measure how journalists around the world take advantage of technology to enhance their security. The results suggest that there is a general lack of awareness about the power that digital tools have to improve a journalist’s protection. There are scores of organization
...
Travel Guide to the Digital World: Cybersecurity Policy for Human Rights Defenders
London: Global Partners Digital (2016), 106 pp.
"This guide aims to help correct the imbalance in capacity and expertise between human rights defenders and cybersecurity professionals and policy-makers. At the heart of the guide is an attempt to address perhaps the fundamental barrier: the absence of clear definitions and agreed terms. It will do
...
Protecting Children from Online Sexual Exploitation: A Guide to Action for Religious Leaders and Communities
Bangkok; New York: ECPAT International; Religions for Peace (2016), 46 pp.
"It is our sincerest hope that this guide will have provided you with a greater understanding about online child sexual exploitation. We hope it has also given you a clearer realisation of the important role that you and your faith community can play in helping to prevent and end this crime. Togethe
...
Understanding the Use of Circumvention Tools to Bypass Online Censorship
New Media & Society, volume 18, issue 5 (2016), pp. 837-856
"Circumvention tools designed to bypass online censorship such as simple web proxies, virtual private network service, and so on are frequently used in countries whose governments impose heavy Internet censorship. Around 18 million Internet users in China are currently using those tools to bypass th
...
Protegiendo a niñas, niños y adolescentes contra la explotación sexual en línea: Una guía para la acción para líderes y comunidades religiosas
Bangkok: ECPAT International; Religiones por la Paz (2016), 52 pp.
"En los últimos 20 años, se han dado pasos importantes para construir y fortalecer a la sociedad civil y la participación religiosa en la lucha contra la explotación sexual de niñas, niños y adolescentes. Sin embargo, debemos hacer mucho más y, por consiguiente, Religiones por la Paz (RfP) y
...
Compromised Connections: Overcoming Privacy Challenges of the Mobile Internet
Internews; Vodafone Foundation (2016), 14 pp.
"Compromised Connections is a brief introduction to emerging security issues facing mobile phones in development. It recommends safety measures that can be quickly adopted – from device safety to data security – and points to resources that may be useful for people interested in following future
...
Mapping the Cyber Policy Landscape: Kenya
London: Global Partners Digital (2016), 21 pp.
"This mapping study investigates the ways in which the Kenyan government and other actors have initiated or engaged in multistakeholder processes in order to address cybersecurity-related matters in the country. Based on this, it will identify best practices, gaps and missing links, as well as oppor
...
Cybersecurity Policy and Law Making in the EU, US and Brazil
Computer Law Review International, volume 17, issue 3 (2016), pp. 71-75
"IT Governance requires public and corporate cybersecurity policies to improve fighting against cybercrime and other violations. The EU, the USA and Brazil have recently developed different regulatory approaches on the subject. Assessing how to design policies in line with them across geographies se
...
"This series aims to help human rights defenders develop the tools, skills and knowledge they need to engage effectively in cyber policy debates. The series is structured around five modules. The first four each focus on a different aspect of cyber policy - human rights, cybersecurity, regulatory fr
...