Digital Privacy & Safety
Filter
271
Featured
Topics
178
39
28
24
17
8
8
8
8
7
7
7
7
7
7
6
5
5
5
5
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
73
28
13
6
4
3
2
2
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"The OECD Policy Framework on Digital Security helps policy makers understand the economic and social dimension of cybersecurity, raises their awareness about the OECD approach to digital security policy, and encourages them to make use of OECD digital security recommendations to develop better poli ... more
"This guide looks at how our mobile devices could leak data about our locations and what we could do to protect ourselves against it. It’s designed for most Central European journalists’ threat models and only looks at how our mobile devices could give up precise location data on us. It doesn’ ... more
"The Zimbabwean state has in recent years stepped up its surveillance efforts on citizens, civil society and journalists who are viewed as the “enemies of the state”. This state surveillance has been argued to infringe on citizens’ right to privacy and access to information. We are mindful tha ... more
"The Digital Enquirer Kit is an e-learning course that guides learners through lessons on how to prevent the spread of misinformation, available on the free platform atingi.org. The course covers topics including media literacy, verification, and how to navigate the internet safely. The first four m ... more
"To ensure that social media becomes safer, more open, and more equitable for all users, platforms like Twitter, Facebook, and Instagram must prioritize curbing online harassment. In this report, PEN America proposes concrete, actionable changes that social media companies should make immediately to ... more
"Jeder von uns hinterlässt Datenspuren, beim Surfen, Onlineshopping und in den Social Media. Es sind der Staat, die Wirtschaft, aber auch Kriminelle, die Zugang zu diesen Daten haben oder sich zu verschaffen wissen. Dieser Sachverhalt hat große Bedeutung für den Einzelnen, aber auch für die demo ... more
"Of the eight countries surveyed here, only four have comprehensive data protection privacy acts in place: Kenya, South Africa, Togo and Uganda. But as these research reports suggest, this is not necessarily a strong indicator of whether a country is committed to privacy rights, or of the efficacy o ... more
"This report outlines the relevance of gender norms to cybersecurity. It draws on existing research, supplemented by stakeholder and expert interviews, to assess gender-based differences in the social roles and interaction of women, men and non-binary people of all ages reflected in the distribution ... more
"The module aims to: 1. Clarify the concept of information security, privacy and related concepts; 2. Describe threats to information security and how they can be addressed; 3. Discuss the requirements for the establishment and implementation of policy on information security, as well as the life cy ... more
"Beim so genannten „Scoring“ wird einer Person mithilfe algorithmischer Verfahren ein Zahlenwert zugeordnet, um ihr Verhalten zu bewerten und zu beeinflussen. „Super-Scoring“-Praktiken gehen noch weiter und führen Punktesysteme und Skalen aus unterschiedlichen Lebensbereichen zusammen, wie ... more
"Based on the needs assessment, a high proportion of women in Cameroon face online violence and are increasingly concerned about their safety in digital spaces. However, many of these respondents are unaware of any legal protections offered to them. Additionally, they believe that they lack the appr ... more
"This Primer is intended to increase awareness and provide a basic understanding of cyber threats, cybersecurity, and cyber resilience as they relate to development programming for USAID staff. It does not provide specific cybersecurity programming or operational recommendations or address technical ... more
"This report aims to bridge two communities – the broader development community and the cybersecurity capacity building community – to achieve more resilient outcomes by ensuring incorporation of cybersecurity and digital resilience into digital development activities. This report is a product o ... more
"Efforts to establish or improve national identification systems in Africa have coincided with the increasing deployment of mobile technology. This has led to the prioritisation of digital “solutions” for facilitating forms of identification and registration – often via biometric attributes [. ... more