"In the aftermath of the COVID-19 pandemic, there is a growing use of Information and Communication Technology (ICT) for the purposes of labor control and surveillance. This trend significantly affects the knowledge workers who are deeply connected with ICT. However, there is a lack of studies tackl
...
ing the perceptions of knowledge workers regarding surveillance, its impact on their work practices, and how they push back against it. Based on Scott’s concept of hidden transcripts, this article studies the workplace surveillance faced by Chinese knowledge workers and their responses and reveals the complex interplay between workplace control, the meaning of work, and hidden transcripts. Based on the findings of 13 in-depth interviews and the analysis of the content of 3,205 Weibo posts, 4 themes are identified in the discussions about the work of Chinese knowledge workers, the influence of their perceived meaning of work on their interpretation of surveillance, and the specific strategies of their hidden transcripts. The paradoxical role of ICT is demonstrated in labor rights as sites of surveillance and countersurveillance, especially digital platforms. Furthermore, a more comprehensive internal view of the survival dynamics among knowledge workers is provided." (Abstract)
more
"Despite the scientific significance of journalism practice, the gap between academic and applied fields persists. In this paper, based on our project on the digital security of journalists and their sources, we argue that practice-relevant research in the form of the action-innovation model benefit
...
s both the academic and the applied realms. To this end, we provide hands-on practical training on the important topic of digital security, which remains under-researched and therefore requires an exploratory approach. A total of 23 training sessions were conducted for 230 participants representing various media outlets in Germany. The objective was to enhance awareness and skills regarding digital threats. This constituted the core of a mixed-methods approach, which included surveys, observation, and interviews. In evaluating the process and results, it was found that the combination of applied and scholarly elements enhanced the project in terms of access, commitment, contextualisation and depth. The data were analysed according to an adaptation of the socio-technological Newsafety concept. The findings revealed a general lack of competence in dealing with cyber threats and a severely lacking in-house communication. In general, to address and explore relevant and current issues like this, it is recommended to consider the practical value to research participants and to collaborate with practice-based trainers who can help bridge the gap and foster mutual understanding." (Abstract)
more
"The fifth edition of the Global Cybersecurity Index (GCI) measures the commitment of countries to cybersecurity in the context of measures across the following five pillars: legal; technical; organizational; capacity development; cooperation. The GCI, launched in 2015 by the International Telecommu
...
nication Union, seeks to help countries to identify areas of improvement and encourage countries to act in building capacity and capabilities under each pillar. The GCI has been continuously adapted across editions to respond to changing risks, priorities and resources, in order to provide a more relevant snapshot of cybersecurity measures taken by countries. Since 2021, countries have on average taken more cybersecurity-related actions and improved their commitments to cybersecurity. The global average country score has risen to 65.7/100. Across the five GCI pillars, most countries are strongest in the legal pillar. By contrast, the average country is weakest in the capacity-development and technical pillars. Each region has countries that are role-modelling or are advancing, and each region also has countries that are in the beginning stages of building their cybersecurity commitments. To capture these differences, country performance is measured across five tiers, with Tier 1 being the highest and Tier 5 the lowest. These tiers provide peer groups based on scores to help countries to understand and identify role models for improvement." (Report summary, page 1)
more
"This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the complex landscape of Information and Communication Technologies (ICTs) and their impact on human rights. The toolkit is designed for a wide range of PSC stakeholders, including security professionals
...
, management, human rights officers, compliance teams, technology teams, and government and civil society groups. It consists of 12 interconnected but independent tools, each addressing a specific aspect of ICT use in the private security industry." (https://ict4peace.org)
more
"PEN America, the Online News Association, and the International Women’s Media Foundation have teamed up to create Digital Safety Snacks, step-by-step videos to help you defend yourself against online abuse. We’ll explain how to protect your most sensitive accounts from hackers and how to dox yo
...
urself before someone else does. We want to empower you to feel safer and more secure while maintaining the public profile you need to do your job." (Abstract)
more
"In 2023, Advancing Rights in Southern Africa (ARISA) through its consortium partner, Internews, undertook the most comprehensive review yet of laws affecting media practice and the freedom of expression, including cyber laws, penal codes, constitutions and acts of parliament, in the sixteen Souther
...
n African Development Community (SADC) countries. The Information Ecosystem Analysis (IEA) provides an in-depth overview of the legal provisions that have been enacted or are in various stages of becoming laws in the region, and are being used by SADC governments to stifle and limit press freedom and public debate. Each of the sixteen SADC countries are included as individual country chapters in this report, providing country-specific legal analyses of the relevant Cyber security and related laws used by the respective country’s governments to stifle freedom of expression. The approach used by the researchers considered the legislative environment together with literature on the relevant topics, court cases and media reports about the application of specific laws and focused on incidents of where laws were used, dating from 2020 to present. The respective country analyses have been informed by extensive virtual interviews conducted with journalists, civil society representatives and academics in the region. Attention was also given to countries holding elections in 2023 and 2024." (Executive summary)
more
"This assessment tool seeks to provide step-by-step advice and concrete recommendations for those wishing to develop a gender approach to cybersecurity policy. Building on APC’s previous work on a human rights approach to cybersecurity, online gender-based violence, and cybersecurity and gender, r
...
anging from research to advocacy, this document is part of a framework we have designed to support policy makers and civil society organisations in developing gender-responsive cybersecurity policies. This framework also includes two other documents, and we recommend that those using this assessment tool consult them before putting the principles and processes we outline here into practice: a literature review that explores how cybersecurity as a gendered space has been addressed in research; a document identifying norms, standards and guidelines that cybersecurity policy makers and advocates can draw on when seeking to promote a gender approach within national or multilateral cybersecurity discussions." (Intgroduction, page 4)
more
"This handbook is divided into three main sections: Fact-Checking, Digital Security, and Data Journalism. Each section contains a series of chapters that cover essential topics, providing you with a holistic understanding of these subjects. Let's take a brief look at what each section entails. In th
...
e Fact-Checking section, we will explore the fundamentals of fact-checking, including the identification and debunking of false information. We will delve into the importance of verification and provide you with practical techniques to verify images and videos. Additionally, we will discuss transparency in media and the vital role it plays in fostering trust and credibility. The Digital Security section focuses on safeguarding digital information and protecting against cyber-attacks. We will examine various types of cyber threats and discuss the importance of digital security in the context of journalism. You will learn valuable tips and tools to enhance your digital security and reduce risks in an increasingly interconnected world. The Data Journalism section introduces the world of data and its application in journalism. You will learn how to find and analyse data, as well as how to create compelling data-driven stories. We will explore data visualisation techniques and discuss the role of social media in engaging with audiences. Throughout this handbook, you will encounter readings, notes, self-tests, and activities designed to enhance your learning experience. We encourage you to engage actively with the material, complete the suggested activities, and seek further clarification if needed." (Preamble, page 6)
more
"Surveillance infrastructure in China monitors and enables authorities to react to potential risky, miscreant or criminal behaviour. What type of behaviours are perceived to be so, is determined in large part by ideology. Therefore, surveillance infrastructure relies on the machinery of ideology to
...
define the boundaries of its use. In this paper, we outline six key ideological concepts relating to governance in Xi Jinping’s China that have helped to expand the boundaries of surveillance. We identify terms embedded in promotional material of Hikvision and other surveillance technology firms as a springboard for conceptual discussion. The aim is to survey the ideological lexicon of concepts that position surveillance within the Party-state’s broad capacity-building ambitions for governance in Xi’s China. This positioning amplifies the political responsibility of state, social and market actors to work together to broaden surveillance activities for ‘society-building’ purposes, and ultimately for the realisation of Xi Jinping’s goal of National Rejuvenation." (Abstract)
more
"Welche Strategien führen zu mehr IT-Sicherheit? Welche Reformen sind notwendig, um die deutsche Cybersicherheitsarchitektur zu stärken? Und wie soll auf den IT-Fachkräftemangel reagiert werden? Bei der Beantwortung dieser Fragen sind sich die Bundesregierung und Vertreterinnen und Vertreter aus
...
Wissenschaft und Zivilgesellschaft nicht immer einig." (Verlagsbeschreibung)
more
"Open source software (OSS) is the backbone and driver of digitization across sectors worldwide. This makes OSS a cornerstone of every society and economy, including the core of national security concerns. Therefore, governments have a vested interest in OSS security. At the same time, governments,
...
as large users of OSS, bear some of the responsibility for supporting the OSS ecosystem. To assume responsibility, governments must understand the existing OSS communities and the culture surrounding OSS. Governments will be able to effectively foster OSS security only if they work with the ecosystem stakeholders. Doing so requires governments to adhere to guidelines such as respect, cooperation, collaboration and sincerity. In addition, governments must identify their own role(s) in consultation with the OSS ecosystem. Governments can serve as internal coordinators, role models, supporters and regulators. The role of internal coordinator requires governments to be more transparent and systematic in their own use of OSS. In particular, they should take stock of what is being used, where exactly the components are being used and how they are used. As role models, governments engage with OSS, adhering to best practices in the ecosystem and encouraging other governments and stakeholders to do so. As supporters, governments actively engage with the OSS ecosystem, mobilizing and channeling resources into it through various means. Governments use their regulatory powers to create a legal framework that reflects the characteristics of the OSS ecosystem. They can mix and match from different roles and shift between them as they gain more experience, trust and credibility in the OSS ecosystem." (Executive summary)
more