"The purpose of this document is to provide researchers, especially those working in smaller organisations that might not have extensive resources or experience in data protection requirements, with general guidance on their responsibilities within a global data protection framework to ensure that d
...
ata subjects retain control over their personal information. The specific framework used was developed by the Organisation for Economic Co-operation and Development (OECD). This framework includes a set of eight principles for use in designing programs to ensure privacy and protect personal data: Collection limitation, Data quality, Purpose specification, Use limitation, Security safeguards, Openness, Individual participation, Accountability." (Page 4)
more
"La presente propuesta metodológica para la promoción del uso seguro del Internet producto de un acuerdo de trabajo entre el Instituto Interamericano del Niño, la Niña y Adolescentes (IIN-OEA) y World Visión República Dominicana aborda, en forma conjunta, los desafíos que, desde la perspectiv
...
a de los Derechos de la niñez y adolescencia nos presenta la expansión del Internet y su creciente presencia en la vida cotidiana de las nuevas generaciones. No se trata de diabolizar los avances tecnológicos ni los cambios en las comunicaciones humanas, producto de dichos avances, sino de reconocer las oportunidades y las amenazas que representan el uso masivo de las mismas. El acceso a Internet es para niños, niñas y adolescentes una herramienta de enorme valor para la obtención de información, comunicación y expresión de sus puntos de vista, así como el conocimiento de nuevas y variadas realidades. Para muchos el acceso a Internet, en la fase histórica en que vivimos, tiene un significado similar a lo que fue la incorporación de la lectoescritura a principios del siglo pasado: una herramienta imprescindible de integración, comunicación y acceso a los bienes de la cultura. Desde esta mirada, el no acceso constituye una brecha de exclusión que se entrelaza y potencializa con otras variables asociadas a la producción social de la vulnerabilidad. Por otra parte, no podemos desconocer que las potencialidades del internet coexisten con riesgos y amenazas. Para los niños, niñas y adolescentes navegar en Internet tiene riesgos similares o tal vez superiores a los que supone el transitar cualquier espacio público sin el acompañamiento responsable de un adulto [...]
Muchas experiencias dan cuenta de continuidades entre violencias virtuales y físicas. Solo a modo de ejemplo, podemos citar el bullying que es extendido a través del cyberbullying o la utilización de Internet para reclutar posibles víctimas de trata o de explotación sexual. El dualismo del Internet nos enfrenta al desafío de articular acceso e inclusión con protección. Acceso seguro con realización de derechos y es aquí donde es necesario reafirmar algunos principios y conceptos presentes en la Convención de los Derechos del niño. En primer lugar, el principio de corresponsabilidad, los niveles de protección de los niños, niñas y adolescentes requieren una corresponsabilidad entre familia, comunidad y Estado." (Palabras introductorias, página 7)
more
"Compromised Connections is a brief introduction to emerging security issues facing mobile phones in development. It recommends safety measures that can be quickly adopted – from device safety to data security – and points to resources that may be useful for people interested in following future
...
developments. Ultimately, it advocates a "mobile first” approach: adoption of an information management strategy that prioritizes the safety of mobile devices and their users." (Internews website)
more
"Encryption is a hot topic in the current global discussion on Internet governance. This research delves into the subject, to outline a global overview of the various means of encryption, their availability and their potential applications in the media and communications landscape. The research expl
...
ains how the deployment of encryption is affected by different areas of law and policy, and it offers detailed case studies of encryption in selected jurisdictions. It analyzes in-depth the role of encryption in the media and communications landscape, and the impact on different services, entities and end users. Built on this exploration and analysis, the research provides recommendations on encryption policy that are useful for various stakeholders. These include signaling the need to counter the lack of gender sensitivity in the current debate, and also highlighting ideas for enhancing “encryption literacy." (Back cover)
more
"Circumvention tools designed to bypass online censorship such as simple web proxies, virtual private network service, and so on are frequently used in countries whose governments impose heavy Internet censorship. Around 18 million Internet users in China are currently using those tools to bypass th
...
e Great Firewall and access unblocked online content. In a pioneering empirical investigation of unblocked information seeking in China's censored online environment, the present study systematically examines a wide range of macro-social and micro-individual factors which affect the use of circumvention tools to bypass Internet censorship under the guidance of the interactive communication technology adoption model. The results reveal that, with the exception of social trust, macro-social factors have only a modest influence on the use of circumvention tools. In contrast, micro-individual-level variables-including perceived technology fluidity, gratifications, and selected demographic variables-play a much larger role in our multivariate model. Theoretical and practical implications are discussed." (Abstract)
more
"This series aims to help human rights defenders develop the tools, skills and knowledge they need to engage effectively in cyber policy debates. The series is structured around five modules. The first four each focus on a different aspect of cyber policy - human rights, cybersecurity, regulatory fr
...
ameworks and cyber capacity building - with a final regional module highlighting how these apply in Africa, Asia and Latin America. Each module consists of several videos, which take participants through a key cyber issue or concept - explaining how it relates to human rights, who the key actors are, and how and where to engage." (Introduction)
more
"It is our sincerest hope that this guide will have provided you with a greater understanding about online child sexual exploitation. We hope it has also given you a clearer realisation of the important role that you and your faith community can play in helping to prevent and end this crime. Togethe
...
r, we can combine the spiritual maturity, influence, expertise and authority you carry as leaders in your community, with the technical experience gained from policymakers, law enforcement and child-focused experts to ensure this violence stops." (Conclusion, page 36)
more
"With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance. To the toolkit of privacy protecting techniques and projects, they propose adding obfusca
...
tion: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage - especially for average users, those of us not in a position to opt out or exert control over data about ourselves." (Back cover)
more
"En los últimos 20 años, se han dado pasos importantes para construir y fortalecer a la sociedad civil y la participación religiosa en la lucha contra la explotación sexual de niñas, niños y adolescentes. Sin embargo, debemos hacer mucho más y, por consiguiente, Religiones por la Paz (RfP) y
...
ECPAT International se complacen en presentar esta guía para la acción con el fin de ayudar a las comunidades religiosas a aprovechar al máximo sus capacidades para prevenir, responder y eliminar la explotación sexual de niñas, niños y adolescentes en línea. Esperamos que esta guía ofrezca algunas herramientas básicas para equipar a los y las líderes religiosos y a las comunidades y que puedan actuar, abogar, educar y colaborar entre sí y con iniciativas más amplias para que cada niña, niño y adolescente pueda vivir sin temor, desarrollar su verdadero potencial y disfrutar del regalo inviolable de su dignidad humana." (Preámbulo, página 2)
more
"IT Governance requires public and corporate cybersecurity policies to improve fighting against cybercrime and other violations. The EU, the USA and Brazil have recently developed different regulatory approaches on the subject. Assessing how to design policies in line with them across geographies se
...
ems key for effectively managing relevant global issues. After a brief introduction, the article touches on three sample topics: online privacy, open-source platforms, and latest-generation cyber-threats to illustrate how EU, US and Brazil have taken different paths. Each sample topic is analysed in detail and followed by a conclusion indicating how possibly regional or national particularities may be pragmatically reconciled by public and corporate interested parties." (Abstract)
more
"This mapping study investigates the ways in which the Kenyan government and other actors have initiated or engaged in multistakeholder processes in order to address cybersecurity-related matters in the country. Based on this, it will identify best practices, gaps and missing links, as well as oppor
...
tunities and recommendations for improving the cyber policy landscape in the country. The assessment of Kenya’s cybersecurity landscape in this report will identify actors within the government and civil society, as well as existing laws and frameworks, and address the proposed ones, based on the information that is currently available. Unless otherwise stated, all institutions and legislative documents listed here are existent and/or functional." (Page 7)
more
"This survey was designed to measure how journalists around the world take advantage of technology to enhance their security. The results suggest that there is a general lack of awareness about the power that digital tools have to improve a journalist’s protection. There are scores of organization
...
s of journalists, technologists, and activists developing tools for physical or digital protection or training reporters and editors on how to use them. But there can never be enough education about the risks that journalists face and the security measures they can take, especially when it seems that the press is under attack more frequently and in more aggressive ways than before." (Page 12)
more
"This guide aims to help correct the imbalance in capacity and expertise between human rights defenders and cybersecurity professionals and policy-makers. At the heart of the guide is an attempt to address perhaps the fundamental barrier: the absence of clear definitions and agreed terms. It will do
...
this by closely examining three separate policy areas which are often conflated under the umbrella of cybersecurity – information security, cybercrime, and cyber conflict – unpacking their policy and legal dimensions, mapping relevant stakeholders, and outlining the issues at stake. It is hoped this will help human rights defenders engage effectively in cyber policy debates at the domestic, regional and international levels." (Overview, page 6)
more
"Mit unserer digitalen Identität müssen wir pfleglich umgehen, denn sie wird immer wichtiger für uns und ist zunehmend Gefahren ausgesetzt. Dieser Ratgeber stellt einfache Maßnahmen vor, wie Sie sich gegen Phishing-Attacken und Virenangriffe wehren. Praktische Tipps zeigen, wie Sie Ihre persönl
...
ichen Daten vor Datenkraken schützen, die personenbezogene Informationen auswerten und weiterverkaufen. Und ein Thema, das – bisher noch weitgehend unbemerkt – immer wichtiger wird: Ein ausführlicher Leitfaden mit Anleitungen hilft, das eigene Onlineleben zu dokumentieren und den digitalen Nachlass zu regeln." (Verlagsbeschreibung)
more
"This publication identifies at least 12 digital threats, including illegal or arbitrary digital surveillance, location tracking, and software and hardware exploits without the knowledge of the target. Further examples that are considered are: phishing, fake domain attacks, Man-in-the-Middle (MitM)
...
attacks, and Denial of Service (DoS) [...] In examining cases worldwide, this publication serves as a resource for a range of actors. In a nutshell, it surveys the evolving threats, and assesses preventive, protective and pre-emptive measures. It shows that digital security for journalism encompasses, but also goes beyond, the technical dimension. This publication also gives an overview of actors and initiatives working to address digital safety, as well as identifying gaps in knowledge that call for awareness-raising." (UNESCO website)
more
"The fundamental problem with cyber surveillance, even for the most well-intentioned governments, is that laws have not evolved with the technology. Governments must enforce the laws that exist and apply them to the modern age. And they should consider that just because technology makes surveillance
...
possible doesn’t mean it makes it necessary or justifiable in all cases. The best one can hope for is international adoption of a set of standards, and the use of those standards by international monitoring organizations to apply pressure on authoritarian governments to meet them." (Conclusion)
more
"UNESCO’s vision of universal Knowledge Societies builds on a free, open and trusted Internet that enables people to not only have the ability to access information resources from around the world, but to also contribute information and knowledge to local and global communities. What can UNESCO do
...
to move towards the realization of this vision of Internet-enabled Knowledge Societies that can foster inclusive sustainable human development worldwide? To address this question within the mandate of this study, UNESCO has worked with Member States and other stakeholders to analyse four separate but interdependent fields of Internet policy and practice, within the mandate of UNESCO, perceived to be central to achieving this vision. These are access to information and knowledge, freedom of expression, privacy, and ethical norms and behaviour online. This report assesses these four fields by viewing them as keystones for building a free and trusted global Internet that will enable inclusive Knowledge Societies." (Executive summary)
more