Digital Privacy & Safety
Filter
266
Featured
Topics
Cybersecurity, Digital Safety, Privacy, Right to Privacy
173
Surveillance, Surveillance Technologies, Spyware
38
Data Protection: Law & Regulation
27
Safety of Journalists, Safety Risks of Media Workers
23
Child Protection Online
17
Freedom of Expression
8
Algorithms & Big Data
8
Cybercrimes
8
Gender-Based Online Harassment & Sexual Threats
8
Child Abuse: Digital Media
7
Child Protection, Protection of Minors
7
Encryption, Cryptology
7
Internet Censorship Circumvention Tools & Strategies
7
Data Governance, Data Justice, Data Sovereignty
7
Internet Governance, Internet Policies
7
Data Protection (Computer Software)
6
Communication Rights
5
Digital Ethics, AI Ethics, Social Media Ethics, Data & Information Ethics
5
Internet / Social Media Law & Regulation
5
Children's Rights
4
Freedom of Expression Online, Internet Freedom
4
Harassment & Intimidation of Journalists
4
Cyberwarfare, Cyber Operations: Attacking Enemy Computers, Software, and Control Systems
4
Cyberbullying, Cyberharassment
4
Digital & Information Literacy
4
Sexual Abuse: Digital Media
4
Investigative Journalism
4
Human Rights Protection
4
Software Security
4
Access to Public Information, Freedom of Information, Right to Information
3
Digital Activism, Cyber Advocacy
3
Digital & Social Media Use: Children
3
Digital & Social Media Use: Youth
3
Digital Rights
3
Digital Platforms & Intermediaries
3
Google
3
Social Media
3
Content Moderation & Regulation: Social Media
3
Disinformation, Misinformation, Fake News
3
Countering Hate Speech, Disinformation & Propaganda
3
Gender and Media, Gender and Communication
3
Female Journalists & Media Workers
3
Digital Literacy: Youth
3
Media Law & Regulation
3
Helplines, Hotlines
3
Access to Internet & Digital Communications
2
Digital Divide, Digital Inequalities
2
Open Data
2
Audience Research Methods
2
Media & ICT Use in Authoritarian Regimes / Dictatorships
2
Mobile Phone Use: Migrants & Refugees
2
Digital Literacy: Children
2
Media / Communication Control
2
Censorship
2
Secret Services, Intelligence Services
2
Big Digital Platforms, Big Tech Companies
2
Digital Inclusion
2
Digital Platform & Intermediaries Regulation
2
Facebook
2
Artificial Intelligence
2
Digitalization, Digital Transformation
2
Gender and ICTs / Internet
2
ICT Development Assistance
2
Enterprises, Companies, Corporations
2
Ethics & Data Protection in Research
2
Fact-Checking & Verification of Sources
2
Sexuality: Media Representation, Sexually Explicit Media Content, Pornography
2
COVID-19 Pandemic: Effects on Journalism, Media & Communication
2
Accountability & Transparency
2
Data Collection, Data Collection Methods
2
Open Source Software
2
Mobile Phones, Smartphones
2
Telecommunication Industries & Markets
2
Access to Media & Information
1
Advertising
1
Advocacy & Empowerment: Children
1
Civic Engagement, Citizen Participation, Civil Society & Digital Communication
1
Behavior Tracking & Cookies
1
Digital & Social Media Use, Internet Use
1
Internet & Social Media Use: Women
1
Mobile Phone Use: Children
1
Mobile Phone Use: Youth
1
Mobile Phone Use
1
Opinion Polls, Public Opinion Research
1
Authoritarian Regimes: Government Communication Strategies
1
Girls and Media
1
Digital Media Censorship, Control & Filtering, Internet & Social Media Censorship
1
Intellectual Property
1
Media Assistance: Freedom of Expression & Safety of Journalists
1
Facial Recognition, Biometric Surveillance
1
Press Freedom & Communication Rights Violations
1
Self-Censorship
1
Right to be Forgotten
1
Community Informatics
1
Conflicts: Victims' Perspectives
1
Crime & Violence Reporting
1
Development Projects
1
Digital Communication, Digital Media
1
Data
1
Data Journalism, Computer-Assisted Investigative Reporting
1
E-Governance, E-Democracy
1
Internet
1
Microtargeting
1
Political Blogging
1
Scoring, Scoring Systems
1
Sexting (Sending Sexually Explicit Messages of Oneself to Others)
1
Blogging, Blogs
1
Telegram
1
Twitter & Microblogs
1
Weibo (Microblogging Website, China)
1
VK (Russian Social Network)
1
AI Regulation & Legislation
1
Online Learning, E-Learning
1
ICT Policies
1
Postal Services, Letters & Parcels, Stamps
1
LGBT & Communication / Media
1
Humanitarian Aid
1
Disinformation & Misinformation Law & Regulation
1
Digital Economies & Markets
1
Informal Sector, Informal Economy
1
Labour, Labour Markets, Labour Laws, Working Conditions
1
Training of Trainers, Teacher Education
1
Sports
1
Accountability & Transparency of the Media
1
Defamation Law & Regulation
1
Journalism Ethics
1
Self-Regulation of Media
1
Impact Assessment & Outcome Evaluation
1
Feminism & Communication
1
Gender-Based Harassment, Intimidation & Violence
1
Media Assistance: Gender Focus
1
Decolonial & Non-Western Approaches
1
COVID-19 Communication
1
European Union (EU)
1
Journalism Education & Training
1
Journalism Education Curricula
1
Corruption Reporting & Role of Media in Curbing Corruption
1
Media & Information Literacy
1
Media Literacy: Families
1
Media Literacy: Youth
1
Child Protection: Legislation & Regulation
1
Civil Rights
1
Confidential Sources, Whistleblowing, Protection of Journalists' Sources
1
Consumer Protection
1
Criminal Law & Criminal Prosecution
1
Forced Labour & Human Trafficking
1
Human Rights
1
Law & Regulation: Protection of Confidential Sources & Whistleblowers
1
Personal Identification (ID) Systems
1
Digital Media Use: Migrants & Diasporas
1
Youth Migrants, Youth Refugees, Youth Dasporas
1
Political Resistance
1
Personal Safety
1
Politics and Media
1
Election Campaigns: Social Media
1
Independent & Oppositional Media
1
Political Communication
1
Political Parties: Communication Strategies
1
Manipulation
1
Religion (General)
1
Religious Social Work
1
Sampling (Survey Methodologies, Statistics)
1
Researchers
1
Crimes, Criminality, Organized Crime
1
Computer Networks, Local Area Networks (LAN)
1
Software
1
Digital Contact Tracing
1
Remote Work, Teleworking, Working from Home
1
Telecommunication Companies, Mobile Phone & Fixed Line Operators
1
Telecommunication Law, Regulation & Policies
1
Telephone
1
Suburbs, Poor Districts, Slums, Shanty Towns
1
Language
Document type
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type

Seguridad digital en tiempos de vigilancia

Espacio Público (2017), 4 pp.

ESOMAR Data Protection Checklist

ESOMAR (2017), 16 pp.
"The purpose of this document is to provide researchers, especially those working in smaller organisations that might not have extensive resources or experience in data protection requirements, with general guidance on their responsibilities within a global data protection framework to ensure that d ... more

Red Intergeneracional para la Promoción del Uso Seguro de Internet: Una mirada a la situación actual y una propuesta metodológica

Instituto Interamericano del Niño, la Niña y Adolescentes;World Visión República Dominicana (2016), 128 pp.
"La presente propuesta metodológica para la promoción del uso seguro del Internet producto de un acuerdo de trabajo entre el Instituto Interamericano del Niño, la Niña y Adolescentes (IIN-OEA) y World Visión República Dominicana aborda, en forma conjunta, los desafíos que, desde la perspectiv ... more
"Compromised Connections is a brief introduction to emerging security issues facing mobile phones in development. It recommends safety measures that can be quickly adopted – from device safety to data security – and points to resources that may be useful for people interested in following future ... more

Human Rights and Encryption

Paris: UNESCO (2016), 83 pp.
"Encryption is a hot topic in the current global discussion on Internet governance. This research delves into the subject, to outline a global overview of the various means of encryption, their availability and their potential applications in the media and communications landscape. The research expl ... more
"Circumvention tools designed to bypass online censorship such as simple web proxies, virtual private network service, and so on are frequently used in countries whose governments impose heavy Internet censorship. Around 18 million Internet users in China are currently using those tools to bypass th ... more
"This series aims to help human rights defenders develop the tools, skills and knowledge they need to engage effectively in cyber policy debates. The series is structured around five modules. The first four each focus on a different aspect of cyber policy - human rights, cybersecurity, regulatory fr ... more

Protecting Children from Online Sexual Exploitation: A Guide to Action for Religious Leaders and Communities

Bangkok; New York: ECPAT International;Religions for Peace (2016), 46 pp.
"It is our sincerest hope that this guide will have provided you with a greater understanding about online child sexual exploitation. We hope it has also given you a clearer realisation of the important role that you and your faith community can play in helping to prevent and end this crime. Togethe ... more

Obfuscation: A User's Guide for Privacy and Protest

Cambridge, Mass.; London: MIT Press (2016), x, 123 pp.
"With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance. To the toolkit of privacy protecting techniques and projects, they propose adding obfusca ... more
"En los últimos 20 años, se han dado pasos importantes para construir y fortalecer a la sociedad civil y la participación religiosa en la lucha contra la explotación sexual de niñas, niños y adolescentes. Sin embargo, debemos hacer mucho más y, por consiguiente, Religiones por la Paz (RfP) y ... more
"IT Governance requires public and corporate cybersecurity policies to improve fighting against cybercrime and other violations. The EU, the USA and Brazil have recently developed different regulatory approaches on the subject. Assessing how to design policies in line with them across geographies se ... more
"This mapping study investigates the ways in which the Kenyan government and other actors have initiated or engaged in multistakeholder processes in order to address cybersecurity-related matters in the country. Based on this, it will identify best practices, gaps and missing links, as well as oppor ... more

Journalist Security in the Digital World: A Survey. Are We Using the Right Tools?

Washington, DC: Center for International Media Assistance (CIMA) (2016), 13 pp.
"This survey was designed to measure how journalists around the world take advantage of technology to enhance their security. The results suggest that there is a general lack of awareness about the power that digital tools have to improve a journalist’s protection. There are scores of organization ... more
"This guide aims to help correct the imbalance in capacity and expertise between human rights defenders and cybersecurity professionals and policy-makers. At the heart of the guide is an attempt to address perhaps the fundamental barrier: the absence of clear definitions and agreed terms. It will do ... more
"Mit unserer digitalen Identität müssen wir pfleglich umgehen, denn sie wird immer wichtiger für uns und ist zunehmend Gefahren ausgesetzt. Dieser Ratgeber stellt einfache Maßnahmen vor, wie Sie sich gegen Phishing-Attacken und Virenangriffe wehren. Praktische Tipps zeigen, wie Sie Ihre persönl ... more
"This publication identifies at least 12 digital threats, including illegal or arbitrary digital surveillance, location tracking, and software and hardware exploits without the knowledge of the target. Further examples that are considered are: phishing, fake domain attacks, Man-in-the-Middle (MitM) ... more

Watchdogs Under Watch: Media in the Age of Cyber Surveillance

Washington, DC: Center for International Media Assistance (CIMA) (2015), 20 pp.
"The fundamental problem with cyber surveillance, even for the most well-intentioned governments, is that laws have not evolved with the technology. Governments must enforce the laws that exist and apply them to the modern age. And they should consider that just because technology makes surveillance ... more
"UNESCO’s vision of universal Knowledge Societies builds on a free, open and trusted Internet that enables people to not only have the ability to access information resources from around the world, but to also contribute information and knowledge to local and global communities. What can UNESCO do ... more