Filter
271
Featured
242
4
7
Topics
178
39
28
24
17
8
8
8
8
7
7
7
7
7
7
6
5
5
5
5
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
73
28
13
6
4
3
2
2
2
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
Understanding Cybercrime: A Guide for Developing Countries. Draft April 2009
Geneva: ITU, ICT Applications and Cybersecurity Division (2009), 225 pp.
"The Guide contains six main chapters. After an Introduction (Chapter 1) the Guide provides an overview of the phenomena of cybercrime (Chapter 2). This includes descriptions of how crimes are committed and explanations of the most widespread cybercrime offences such as hacking, identity theft and d
...
Unerkannt im Netz: Sicher kommunizieren und recherchieren im Internet
Konstanz: UVK (2008), 293 pp.
"Gewerkschaften und Datenschützer fürchten um die Pressefreiheit: Immer neue Gesetze erschweren die vertrauliche Kommunikation per Internet und Telefon. Besonders stark betroffen sind Berufsgruppen, die bislang nur in Sonderfällen ausgespäht werden durften: Journalisten, Juristen und Ärzte. Doc
...
Digital Security and Privacy for Human Rights Defenders
Dublin: FrontLine (2007), 152 pp.
"This manual is divided into four parts which can be read in any order. The reader does not require any special expertise, although some basic knowledge of computer and Internet operations would come handy. The chapters, containing information of a more technical nature, are marked ‘For Techies’
...
Everyone's Guide to By-Passing Internet Censorship for Citizens Worldwide
[Toronto]: University of Toronto, Citizen Lab (2007), 31 pp.
"This guide is meant to introduce non-technical users to Internet censorship circumvention technologies, and help them choose which of them best suits their circumstances and needs." (Page 5)
Violence Against Children in Cyberspace: A Contribution to the United Nations Study on Violence Against Children
Bangkok: ECPAT International (2005), 71 pp.
"This report is intended to provide a framework for promoting recognition and understanding of the real risks of violence for children and young people within cyberspace and through the use of new technologies, in particular the Internet and mobile phones. It identifies the harms confronted by child
...
The Private and the Public in the Media: Regulation and Implementation in Slovenia
Ljubljana: Peace Institute (2005), 110 pp.
"This book is divided into three main parts. In the first part, I speak about one important human right long neglected in Slovenia: the right to obtain information [...] The second part is dedicated to the right to privacy and the mechanisms of its protection when it is invaded, unjustifiably or dis
...
Information Technology Security Handbook
Washington, DC: World Bank (2003), 389 pp.
Online-Brother is watching you: Ein Praxis-Leitfaden zu Fragen der Sicherheit im Internet
Düsseldorf; Köln: Landesanstalt für Medien NRW; medienakademie (2003), 58 pp.