Filter
271
Featured
242
4
7
Topics
178
39
28
24
17
8
8
8
8
7
7
7
7
7
7
6
5
5
5
5
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
73
28
13
6
4
3
2
2
2
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
Hotlines: Responding to Reports of Illegal Online Content. A Guide to Setting Up an Internet Hotline
"As part of its ongoing commitment to fighting online child sexual abuse content and, in particular, to helping its members realise the objectives of the Mobile Alliance Against Child Sexual Abuse Content, the GSMA has worked with INHOPE, Save the Children, ECPAT, IWF, Net Safe Latvia, Meldpunt, ICM
...
Überwachtes Deutschland: Post- und Telefonüberwachung in der alten Bundesrepublik
Bonn: Bundeszentrale für politische Bildung (bpb), Sonderausg. (2013), 377 pp.
Internet Security Threat Report 2013
Mountain View, Calif.: Symantec Corporation (2013), 57 pp.
"Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threa
...
Training Digital Security Trainers: A Preliminary Review of Methods, Needs, and Challenges
Washington, DC; Arcata, Calif.: Internews (2013), 18 pp.
"This paper draws on interviews with digital security trainers and coordinators of digital security trainings of trainers (ToT)s whose end-goal is the support of human rights defenders, civil society, activists, and local media worldwide [...] Among its main findings, this paper notes the following
...
Evading Censorship with Browser-Based Proxies
Stanford University; Massachusetts Institute of Technology (MIT) (2012), 20 pp.
"While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxies are blocked as soon as they are discovered. In this paper we propose a browser-based proxy creation system that gene
...
Safety on the Line: Exposing the Myth of Mobile Communication Security
Washington, DC: Freedom House; Broadcasting Board of Governors (BBG) (2012), 175 pp.
"This report evaluates the risks and vulnerabilities of mobile phone services and apps in 12 specified countries: the Republic of Azerbaijan, the Republic of Belarus, the People’s Republic of China, the Arab Republic of Egypt, the Islamic Republic of Iran, Libya, the Sultanate of Oman, the Kingdom
...
Global Survey on Internet Privacy and Freedom of Expression
Paris: UNESCO (2012), 142 pp.
"This publication seeks to identify the relationship between freedom of expression and Internet privacy, assessing where they support or compete with each other in different circumstances. The publication maps out the issues in the current regulatory landscape of Internet privacy from the viewpoint
...
Speak Safe: Media Workers’ Toolkit for Safer Online and Mobile Practices
Key Guides
Washington, DC; Arcata, Calif.: Internews (2012), 56 pp.
"Speak safe" introduces reporters, journalists and bloggers to simple yet effective practices for maintaining control of important information and communications. Thirteen short chapters, of two to four pages each, provide basic knowledge about issues such as safe emailing, surfing, Wi-Fi, data dele
...
#public life: Digitale Intimität, die Privatspäre und das Netz
Berlin: Heinrich Böll Stiftung (2011), 124 pp.
Die Datenfresser: Wie Internetfirmen und Staat sich unsere persönlichen Daten einverleiben und wie wir die Kontrolle darüber zurückerlangen
Bonn: Bundeszentrale für politische Bildung (bpb) (2011), 271 pp.
"Warum findet Facebook jeden meiner Bekannten? Auf welche Datenspuren hat der Staat Zugriff? Und was kann man aus ihnen herauslesen? Die Experten für Informationssicherheit, Constanze Kurz und Frank Rieger, weisen uns den Weg zu einer neuen digitalen Mündigkeit. Sachkundig und verständlich erklä
...
Online Security in the Middle East and North Africa: A Survey of Perceptions, Knowledge, and Practice
Berkman Center for Internet & Society at Harvard University (2011), 15 pp.
"In this report we describe the results of a survey of 98 bloggers in the Middle East and North Africa (MENA) carried out in May 2011 in order to study bloggers’ perceptions of online risk and the actions they take to address digital communications security, including both Internet and cell phone
...
Leaping Over the Firewall: A Review of Censorship Circumvention Tools
Washington, DC: Freedom House (2011), 75 pp.
"Internet censorship poses a large and growing challenge to online freedom of expression around the world. Censorship circumvention tools are critical to bypass restrictions on the internet and thereby to protect free expression online. Circumvention tools are primarily designed to bypass internet f
...
Working Towards a Deeper Understanding of Digital Safety for Children and Young People in Developing Nations
Cambridge, Mass.: Berkman Center for Internet & Society at Harvard University (2010), 32 pp.
"While the safety of children and young people in digital spaces has become an important issue of qualitative as well as quantitative research in the developed world and has led to a significant body of knowledge, the research efforts in the developing nations, with few exceptions, are still relativ
...
Entscheidung im Unterricht: Privates im Netz?
Bonn: Bundeszentrale für politische Bildung (bpb) (2010), 16 pp.
Seguridad y privacidad digital para los defendores de los derechos humanos
Dublin: Front Line, actualizada ed. (2009), vi, 139 pp.
"Este manual está dividido en cuatro partes que pueden leerse en cualquier orden. El lector no requiere conocimientos especiales, aunque tener unas nociones básicas del funcionamiento del ordenador y de Internet le ayudaría. Los capítulos que contienen información de carácter más técnico est
...