Filter
272
Featured
243
4
7
Topics
178
39
28
24
17
8
8
8
8
7
7
7
7
7
7
6
5
5
5
5
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
73
28
13
6
4
3
2
2
2
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
Mapping the Cyber Policy Landscape: Kenya
London: Global Partners Digital (2016), 21 pp.
"This mapping study investigates the ways in which the Kenyan government and other actors have initiated or engaged in multistakeholder processes in order to address cybersecurity-related matters in the country. Based on this, it will identify best practices, gaps and missing links, as well as oppor
...
Travel Guide to the Digital World: Cybersecurity Policy for Human Rights Defenders
London: Global Partners Digital (2016), 106 pp.
"This guide aims to help correct the imbalance in capacity and expertise between human rights defenders and cybersecurity professionals and policy-makers. At the heart of the guide is an attempt to address perhaps the fundamental barrier: the absence of clear definitions and agreed terms. It will do
...
"The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the vari
...
Keystones to Foster Inclusive Knowledge Societies: Access to Information and Knowledge, Freedom of Expression, Privacy, and Ethics on a Global Internet
Paris: UNESCO (2015), 107 pp.
"UNESCO’s vision of universal Knowledge Societies builds on a free, open and trusted Internet that enables people to not only have the ability to access information resources from around the world, but to also contribute information and knowledge to local and global communities. What can UNESCO do
...
Digital Security First Aid Kit for Human Rights Defenders
Association for Progressive Communications (APC), 2nd ed. (2015)
"This kit is a contribution from activists for activists to help us be more secure in our digital practices. It’s designed to help activists deal with the most common security issues that might jeopardise the integrity of our devices and communications. Any at-risk user who encounters security-rel
...
Mein Recht im Netz: Der Ratgeber für die digitale Selbstbestimmung
Berlin: Stiftung Warentest (2015), 221 pp.
"Mit unserer digitalen Identität müssen wir pfleglich umgehen, denn sie wird immer wichtiger für uns und ist zunehmend Gefahren ausgesetzt. Dieser Ratgeber stellt einfache Maßnahmen vor, wie Sie sich gegen Phishing-Attacken und Virenangriffe wehren. Praktische Tipps zeigen, wie Sie Ihre persönl
...
2015 Corporate Accountability Index
Ranking Digital Rights (2015), 77 pp.
"Ranking Digital Rights’ inaugural Corporate Accountability Index evaluates 16 of the world’s most powerful Internet and telecommunications companies on their commitments, policies, and practices that affect users’ freedom of expression and privacy. By opening the door for greater corporate tr
...
Watchdogs Under Watch: Media in the Age of Cyber Surveillance
Washington, DC: Center for International Media Assistance (CIMA) (2015), 20 pp.
"The fundamental problem with cyber surveillance, even for the most well-intentioned governments, is that laws have not evolved with the technology. Governments must enforce the laws that exist and apply them to the modern age. And they should consider that just because technology makes surveillance
...
Building Digital Safety for Journalism: A Survey of Selected Issues
Paris: UNESCO (2015), 101 pp.
"This publication identifies at least 12 digital threats, including illegal or arbitrary digital surveillance, location tracking, and software and hardware exploits without the knowledge of the target. Further examples that are considered are: phishing, fake domain attacks, Man-in-the-Middle (MitM)
...
SaferJourno: Digital Security Resources for Media Trainers
Washington, DC; Arcata, Calif.: Internews (2014), 126 pp.
"The six modules [...] are designed to help trainers integrate digital safety and online security topics into their media training. The modules do not assume that the trainer has special knowledge of the subject. While we wrote the toolkit with journalism trainers in mind, we believe that the module
...
Cybersecurity and Cyberwar: What Everyone Needs to Know
Oxford; New York: Oxford University Press (2014), viii, 306 pp.
"Given the Internet’s potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran’s nuclear faci
...
Cyber Security in Developing Countries, a Digital Divide Issue: The Case of Georgia
Journal of International Communication, volume 20, issue 2 (2014), pp. 200-217
"Based on the case study of the cyber war between Russia and Georgia in August 2008, this paper is a theoretical deliberation in an attempt to illustrate connection between the Digital Divide and cyber security. Through a qualitative study of cyber warfare between the two countries, one on the devel
...
Hotlines: Responding to Reports of Illegal Online Content. A Guide to Setting Up an Internet Hotline
"As part of its ongoing commitment to fighting online child sexual abuse content and, in particular, to helping its members realise the objectives of the Mobile Alliance Against Child Sexual Abuse Content, the GSMA has worked with INHOPE, Save the Children, ECPAT, IWF, Net Safe Latvia, Meldpunt, ICM
...
Vigilancia de las comunicaciones en Colombia: Al abismo entre la capacidad tecnológica y los controles legales
Bogotá: Dejusticia (2014), 50 pp.
"El objetivo de este documento es examinar el marco legal y jurisprudencial colombiano sobre vigilancia de comunicaciones, a la luz de las capacidades tecnológicas de hoy. Dicho a manera de hipótesis, el propósito es mostrar cómo la regulación y la jurisprudencia en materia de inteligencia no s
...
Safe Surfer: Schutz der Privatsphäre im digitalen Zeitalter
Bonn: Bundeszentrale für politische Bildung (bpb) (2014), 190 pp.
"Ein praktisches, verständliches und effizientes Schutzprogramm für alle, die sich in der digitalen Welt bewegen. Safe Surfer funktioniert wie ein Arbeitsbuch – alle Tipps lassen sich parallel zum Lesen umsetzen. Google, Facebook oder die NSA – wie können wir unsere Privatsphäre im digitalen
...
Travel Guide to the Digital World: Surveillance and International Standards
London: Global Partners Digital (2014), 98 pp.
"The internet has enabled an unprecedented ability to monitor and track people and information flows as highlighted in the 2013 revelations by Edward Snowden about online surveillance carried out by the United States’ National Security Agency. The revelations have kicked off debates across the wor
...
Guide to Human Rights for Internet Users
Council of Europe (2014), 28 pp.
"1. This guide is a tool for you, the Internet user, to learn about your human rights online, their possible limitations, and available remedies for such limitations. Human rights and fundamental freedoms apply equally offline and online. This principle includes respect for the rights and freedoms o
...