Digital Privacy & Safety
Filter
272
Featured
Topics
178
39
28
24
17
8
8
8
8
7
7
7
7
7
7
6
5
5
5
5
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
73
28
13
6
4
3
2
2
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"The purpose of this study is to investigate the extent of digital surveillance by Arab authorities, which face risks and threats of surveillance, and how journalists seek to press freedom by using tools and techniques to communicate securely. Design/methodology/approach: The study used focus group ... more
"Surveillance infrastructure in China monitors and enables authorities to react to potential risky, miscreant or criminal behaviour. What type of behaviours are perceived to be so, is determined in large part by ideology. Therefore, surveillance infrastructure relies on the machinery of ideology to ... more
"Open source software (OSS) is the backbone and driver of digitization across sectors worldwide. This makes OSS a cornerstone of every society and economy, including the core of national security concerns. Therefore, governments have a vested interest in OSS security. At the same time, governments, ... more
"1. Aus dem nationalen Verfassungsrecht ist ein Recht auf Verschlüsselung ableitbar. 2. Aus dem europäischen Verfassungsrecht ist ein Recht auf Verschlüsselung ableitbar. 3. Ein Recht auf Verschlüsselung ergibt sich zwar nicht als solches aus den nationalen und europäischen verfassungsrechtlich ... more
"The Typology of Online Harms provides a comprehensive framework for understanding and categorizing various types of online harm through a human rights lens [...] This typology recognizes the complex nature of online safety, by classifying the threats into content, contact and conduct risks. Online ... more

Threats to Journalists from the Consumer Internet of Things

In: Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media
Singapore: Springer (2023), pp. 303–326
"Threats associated with the consumer Internet of Things (IoT) may particularly inhibit the work and wellbeing of journalists, especially because of the danger of technological surveillance and the imperative to protect confidential sources. These issues may have knock-on effects on societal stabili ... more
"Journalists are increasingly attacked in response to their work yet they often lack the necessary support and training to protect themselves, their sources, and their communications. Despite this, there has been limited scholarly attention that addresses how journalism schools approach digital secu ... more
"This assessment tool seeks to provide step-by-step advice and concrete recommendations for those wishing to develop a gender approach to cybersecurity policy. Building on APC’s previous work on a human rights approach to cybersecurity, online gender-based violence, and cybersecurity and gender, r ... more
"Mit parteistaatlicher Unterstützung avancierten die großen IT-Unternehmen Chinas seit Ende der 1990er Jahre schnell zu den Motoren der am dynamischsten wachsenden Digitalwirtschaft der Welt. Sie adaptierten zunächst Produkte und Geschäftsmodelle aus dem Ausland, gingen danach aber eigene Wege. ... more