"The guidelines contained here specify steps and measures that newsrooms and journalists in West Africa can take to mitigate the problem of online abuse. The purpose is not to shield journalists from criticism or promote the criminalization of online speech, but to deal with a real threat facing jou
...
rnalism today, which has the potential to erode press freedom in West Africa if it goes unchecked." (Introduction, page 4)
more
"The purpose of this ex-post evaluation is for Internews to understand the impact that Safe Sisters has had on women in East Africa by documenting and publicly sharing their stories and evaluating the training approach itself. As women and girls come online for the first time, they disproportionatel
...
y face violence, which creates risks to their physical safety and stifles their ability to capture the Internet’s transformative economic and social potential. Internews, together with partner DefendDefenders — a Uganda-based non-governmental organization (NGO) — developed the Safe Sisters program, a year-long fellowship that provides women human rights defenders and journalists with the techniques and tools they need to navigate online spaces safely, assume informed risks, and take control of their lives in an increasingly digital world." (Publisher description)
more
"Jeder von uns hinterlässt Datenspuren, beim Surfen, Onlineshopping und in den Social Media. Es sind der Staat, die Wirtschaft, aber auch Kriminelle, die Zugang zu diesen Daten haben oder sich zu verschaffen wissen. Dieser Sachverhalt hat große Bedeutung für den Einzelnen, aber auch für die demo
...
kratische Gesellschaft, die es zu verstehen gilt. Barbara Wiesner stellt Aspekte der Verarbeitung von privaten Daten vor, die Laien selten bekannt sind. Dabei orientiert sie sich an Zitaten von Persönlichkeiten aus Wirtschaft, Wissenschaft und Politik und regt dazu an, sich eine eigene Meinung zu bilden. So wird das Thema Privatheit vor dem Hintergrund vielfältiger digitaler Datenkanäle ausgeleuchtet." (Verlagsbeschreibung)
more
"Of the eight countries surveyed here, only four have comprehensive data protection privacy acts in place: Kenya, South Africa, Togo and Uganda. But as these research reports suggest, this is not necessarily a strong indicator of whether a country is committed to privacy rights, or of the efficacy o
...
f a country’s legislative environment in ensuring the right to privacy and data protection. Instead, reading across the reports, what can be described as an asymmetry between legislation and practice is evident at different levels. This asymmetry can be political – for example, Togo, an effective constitutional dictatorship marked by fierce government crackdowns on opposition and recent reports of surveillance of religious and political leaders, enacted a data protection law in 2019, and is one of the few countries in Africa to have ratified the African Union Convention on Cyber Security and Personal Data Protection (Malabo Convention). Yet, as the country author suggests, “This interest [by policy makers in digital rights] is not necessarily to protect the citizens but rather out of concern to adapt state policies to the global digital situation.” This asymmetry also concerns the regulatory framework for the implementation of a data protection act. Amongst the countries surveyed here, South Africa was the first to pass a protection of personal information act (in 2013), but still has not implemented the necessary regulations to give practical force to the law. In contrast, while Nigeria’s privacy law is still in draft form, it already has what the country author describes as “watershed” privacy regulations." (Introduction, page 5)
more
"This report outlines the relevance of gender norms to cybersecurity. It draws on existing research, supplemented by stakeholder and expert interviews, to assess gender-based differences in the social roles and interaction of women, men and non-binary people of all ages reflected in the distribution
...
of power (e.g. influence over policy decisions and corporate governance), access to resources (e.g. equitable access to education, wages or privacy protections), and construction of gender norms and roles (e.g. assumptions regarding victims and perpetrators of cyber-facilitated violence)." (Executive summary)
more
"The module aims to: 1. Clarify the concept of information security, privacy and related concepts; 2. Describe threats to information security and how they can be addressed; 3. Discuss the requirements for the establishment and implementation of policy on information security, as well as the life cy
...
cle of information security policy; and 4. Provide an overview of standards of information security and privacy protection that are used by some countries and international information security organizations." (Module objectives, page iv)
more
"Beim so genannten „Scoring“ wird einer Person mithilfe algorithmischer Verfahren ein Zahlenwert zugeordnet, um ihr Verhalten zu bewerten und zu beeinflussen. „Super-Scoring“-Praktiken gehen noch weiter und führen Punktesysteme und Skalen aus unterschiedlichen Lebensbereichen zusammen, wie
...
etwa Bonität, Gesundheitsverhalten oder Lernleistungen. Diese Ver-fahren könnten sich zu einem neuen und übergreifenden Governance-Prinzip in der digitalen Gesellschaft entwickeln. Ein besonders prominentes Beispiel ist das Social Credit System in China. Aber auch in westlichen Gesellschaften gewinnen Scoring-Praktiken und digitale Soziometrien an Bedeutung. Dieser Open Access Band stellt aktuelle Beispiele von datengetriebenen sozialen Steuerungs-prozessen aus verschiedenen Ländern vor, diskutiert ihre normativen Grundlagen und gesell-schaftspolitischen Auswirkungen und gibt erste bildungspolitische Empfehlungen. Wie ist der aktuelle Stand einschlägiger Praktiken in China und in westlichen Gesellschaften? Wie sind die individuellen und sozialen Folgen zu bewerten? Wie wandelt sich das Bild vom Menschen und wie sollte bereits heute die politische und aufklärerische Bildung darauf reagieren?" (Buchrückseite)
more
"This Primer is intended to increase awareness and provide a basic understanding of cyber threats, cybersecurity, and cyber resilience as they relate to development programming for USAID staff. It does not provide specific cybersecurity programming or operational recommendations or address technical
...
cybersecurity needs of USAID or its implementing partners. This Primer is a resource on cybersecurity for the broader development community and spotlights how USAID’s approach to cybersecurity in development is evolving." (Page 7)
more
"This report aims to bridge two communities – the broader development community and the cybersecurity capacity building community – to achieve more resilient outcomes by ensuring incorporation of cybersecurity and digital resilience into digital development activities. This report is a product o
...
f the partnership between the World Bank and the Global Forum on Cyber Expertise (GFCE) Foundation, who recognize the importance of including cybersecurity, digital resilience, and cyber capacity building (CCB) as components of development projects. They also understand that advocates are needed to promote the eligibility of these activities for assistance in the broader development agenda." (Aim and objectives, page 11)
more
"On the one hand, “Free Flow of Data” is advocated by many as a critical enabler of digital transformation, innovation, economic growth and social benefits. At the same time, various concerns related to privacy, taxation, competition, security, and even the democratic process, have prompted poli
...
cy initiatives invoking the notion of “Data Sovereignty”. “Free flow” and “sovereignty” are terms which strongly resonate with policy-makers, businesses and even citizens. Their coupling with the word data too often generates visceral reactions and intense exchanges devoid of nuance, in a context of heated debates about the impacts of digitalization and growing geopolitical tensions. The diversity of sectoral silos where discussions are conducted worsens the situation and makes solutions even harder to find. This framing report seeks to unpack these two polarizing expressions to better understand actors’ perspectives, and shift the debate towards reconciling apparently conflicting approaches. The goal is not to provide a comprehensive overview of all the issues and stakeholder views, but to offer a holistic snapshot of the concerns and prominent perspectives to kick-start further debate. The report is organized in three self-explanatory parts: Data, Free Flows of Data, and Data Sovereignty. It concludes, in Moving Forward, with a call to reframe the discussion, harness emerging innovative approaches, and engage in a much needed global, multistakeholder and cross-sectoral debate." (Introduction)
more
"Efforts to establish or improve national identification systems in Africa have coincided with the increasing deployment of mobile technology. This has led to the prioritisation of digital “solutions” for facilitating forms of identification and registration – often via biometric attributes [.
...
..] Research ICT Africa (RIA) and the Centre for Internet and Society (CIS) partnered in 2020 and 2021 to investigate, map, and report on the state of digital identity ecosystems in 10 African countries. The project looked at local, digitised (in full or partially) foundational ID systems in Ghana, Kenya, Lesotho, Mozambique, Nigeria, Rwanda, South Africa, Tanzania, Uganda, and Zimbabwe. The project set out to contribute to the broader question of whether digital identity ecosystems increase choices and opportunities for Africans, or whether they exacerbate the multidimensional aspects of digital inequality on the continent." (Executive summary)
more
"This report has documented the surveillance measures and practices in Kenya and Uganda during the first year of the COVID-19 pandemic. The key trends include poor oversight over COVID-19 data collection, the lack of independent data protection authorities, the use of telecommunications data to ‘t
...
rack and trace’ individuals, the surveillance of public spaces using CCTV and biometric technologies, the possession of broad search powers by medical and public health officers, and a lack of transparency and accountability by state and nonstate actors. Also, the coronavirus apps deployed in both countries presented new challenges including their limited impact and effectiveness, non-compliance of the apps with privacy standards, their inadequate privacy policies, and a lack of transparency in partnerships. While international human rights law and the constitutions in both countries guarantee the protection of the rights to privacy, data protection, and freedom of expression and information, these were not complied with during the pandemic period. The result is an overall expansion of the surveillance environment in Kenya and Uganda, leading to interference with, and infringements and violations of these rights, a situation which is worrying if left unchanged." (Conclusion, page 20)
more
"To ensure that social media becomes safer, more open, and more equitable for all users, platforms like Twitter, Facebook, and Instagram must prioritize curbing online harassment. In this report, PEN America proposes concrete, actionable changes that social media companies should make immediately to
...
the design of their products to better protect people from online abuse—without jeopardizing free expression." (Introduction)
more