"The Girls Online (GO!) Cybersafety project (GO! Cyber) aims to equip young women and girls with the skills and resources to participate meaningfully and safely in cyberspace. The project is implemented by CARE Vanuatu and Sista with the support of Australia’s Cyber and Critical Tech Cooperation P
...
rogram and ABC International Development. The GO! Cyber project started with a series of co-design workshops, supported by Portable Design Studio, with young women aged between 18-30 years old to understand how young women and girls navigate cyberspace. While there have been interventions to enhance cyber safety in Vanuatu in recent years, there is little research to understand the experiences and behaviours of young women and girls in cyberspace. The guiding principle of the GO! Cyber project is recognising young women as experts of their own experience, so they led the identification and exploration of cyber safety rights, experiences, and issues. The young women then proposed contextually relevant, needs-based and practical solutions for their online safety, which included a series of informative videos and this booklet." (Why this booklet, page 6)
more
"Based on the needs assessment, a high proportion of women in Cameroon face online violence and are increasingly concerned about their safety in digital spaces. However, many of these respondents are unaware of any legal protections offered to them. Additionally, they believe that they lack the appr
...
opriate knowledge to protect themselves in these digital spaces. Results from the needs assessment show that there is a significant need for training programs aimed at building digital security awareness and digital hygiene skills." (Conclusion)
more
"Journalists, across the world, are ever more at risk of surveillance from state and non-state antagonists. However, to work safely in a monitored environment is a substantial challenge for journalists. In such regimes, journalists and media organizations are often prone to attacks by the state auth
...
orities. Surveillance, no matter real or implied, the presence of state panopticon power is felt strongly by the journalists, especially in competitive authoritarian countries like Pakistan. While international organizations monitoring media freedom and journalists’ protection do regularly highlight the increasing surveillance of Pakistani journalists, it is imperative to investigate the way they experience it in their real lives and its implications for them. Thus, informed by the theoretical approaches of panopticism, post-panopticism and competitive authoritarianism, this study aims to address the journalists’ lived experiences of surveillance and its impacts on their professional and personal lives in Pakistan. To accomplish these aims, this study uses the qualitative methods of document review and in-depth interviews, and offers a thematic analysis of the gathered data." (Abstract)
more
"Internet surveillance has become a crucial issue for journalism. The “Snowden moment” has shed light on the risks that journalists and their sources face while communicating online and has shown how journalists themselves can be targets of surveillance operations or other forms of malicious dig
...
ital attacks from different actors. More recent revelations, such as those coming from the “Pegasus Project”, have underlined even more dangerous threats posed to the safety of journalists, increasingly targeted with spyware technology. Due to the sensitivity of their work and sources and given their strong “watchdog” role in democracies, investigative reporters are in a particularly dangerous position when it comes to the potential chilling effects of surveillance on their work of journalists. This paper analyzes investigative journalists’ views and self-reflections on the impacts of Internet surveillance on their work by means of in-depth qualitative interviews with reporters affiliated with the International Consortium of Investigative Journalists (ICIJ) and working in Italy, Germany, Hungary, Spain, Switzerland, and the UK. The paper touches on different angles of the Internet surveillance issue by analyzing journalists’ concerns about national and international surveillance players and the overall impact of surveillance on news work." (Abstract)
more
"The Digital Enquirer Kit is an e-learning course that guides learners through lessons on how to prevent the spread of misinformation, available on the free platform atingi.org. The course covers topics including media literacy, verification, and how to navigate the internet safely. The first four m
...
odules have been authored by Tactical Tech: Module 1: Identifying and Responding to Misinformation; Module 2: Verifying Online Information; Module 3: Collaborating on and Documenting Your Digital Enquiry; Module 4: Examining and Sharing Your Findings. Access the course on digitalenquirer.org or track your progress and earn a certificate on atingi.org. The content contains simple explanations and real-world examples, illustrating secure research and information-gathering methods. The modules feature engaging and creative formats such as tutorials, quizzes, and interactive games. The contents are data-light and available in offline mode via the free atingi Android app. The Digital Enquirer Kit is available in English (including West African, East African, South African, and Southeast Asian dialects), Arabic, Bahasa Indonesian, Brazilian Portuguese, French, Hausa, Hindi, Sinhala, and Swahili, among other languages." (https://tacticaltech.org/projects/Digital-Enquirer-Kit)
more
"Each section of this guide will explore another dimension of digital security—assets, attackers, risks and likelihood—and address these key questions: What do I want to protect? Who are my attackers? Is my attacker able to succeed? How likely is it that my attacker will succeed? Threat modeling
...
consists of two types of assessments: Firstly, an analysis of the project’s environment (questions one and two). Secondly, an estimation of the likelihood that potential attacks will really happen (questions three and four). To prepare for threat modeling, we have added a “question zero” for project managers: Who are we and what do we do? This helps to establish a clear understanding of the entire project, with all of its workflows and challenges that employees face in their day-to-day work environment. A threat model is the basis for a digital security concept that should be developed along with IT experts so that your concept is both technically sound and practically enforceable. Having a clearly defined list of assets and their vulnerability empowers employees to protect them with appropriate countermeasures, and educates them on risks. This will increase the efficacy of a security concept in practice." (Executive summary)
more
"Here are some practical steps you can follow to keep yourself safer during this period and improve the time that you and your family have both online and offline: 1. It is important to check your privacy settings on ALL of your social media accounts and know how to set your accounts to private or t
...
o friends online. You can find advice here or here on how to change your settings. 2. Make sure that when you are using any applications that use video, your location cannot be identified. 3. When you step away from the camera for any reason, the video may still be on and recording. It is okay to cover the camera when not using it. ALWAYS ensure that the video is turned off at the end of a session. And think about what other people can see when the video is on. 4. Be extra careful of how you treat and communicate with your friends online during this time. Think about how your posts, comments, likes and shares might affect those who see them. 5. Meeting new people is part of the attraction of being online but be extra careful while you are online during the pandemic. Remember that not everyone online who wants to talk to you has the same reason as you for wanting to chat. If you are in any doubt, block the person and speak to a trusted adult about your concerns [...]" (Pages 2-3)
more
"The Institut für Auslandsbeziehungen (ifa) supports civil society actors worldwide in their advocacy for democracy and peace, encourages dialogue within civil society and contributes to the protection of minorities and persons at risk. With the fellowships of the CrossCulture Programme (CCP), ifa
...
supports the interlacing of German and foreign civil society actors from the cultural, educational, scientific, artistic and medial sectors from more than 40 partner countries. The goals for the participating fellows and organisations are to broaden and deepen their expertise, share and acquire intercultural skills, learn from each other and impart their own knowledge. »Digital Civil Society« is one of the focal topics of the programme which is treated within the scope of CCP Fellowships and thematic workshops. In 2019, CCP fellows, alumni and experts came together in a workshop to exchange ideas, share practices and seek solutions in the fields of digital inclusion and digital security. This publication is the product of this global cross-cultural cooperation and collects personal commentaries, best-practice examples and recommendations for action." (Back cover)
more
"[...] se identificaron rápidamente las principales temáticas a incluir en el libro. Estas son: acceso a Internet y derechos humanos online, populismo y desinformación, privacidad, ciberseguridad, big data y datos abiertos, teleeducación, teletrabajo, cooperación digital y transformación digit
...
al de las empresas. El libro tiene como propósito mostrar cómo Internet, en tiempos de la COVID-19, desde diversas áreas, le ha servido a la humanidad, pero en particular a nuestra región, que, con una perspectiva latinoamericana, ha sabido tomar como referencia experiencias globales. Además, su objetivo es presentar los nuevos retos y riesgos que han surgido, a fin de demostrar cómo estos pueden atenderse coordinadamente entre los diversos actores comprometidos para minimizar su impacto." (Introducción, página 19)
more
"The Child Online Safety Index (COSI) measures the level of online safety for children across the world based on six pillars: Cyber Risks, Disciplined Digital Use, Digital Competency, Guidance & Education, Social Infrastructure, and Connectivity. Each of these pillars are formed by 2-8 focused areas
...
, allowing for a comprehensive assessment of online safety for children. A COSI score was calculated for each country ranging from 0 (the worst online safety for children) to 100 (the best online safety for children)." (https://www.dqinstitute.org)
more
"There is no “one size fits all” approach to digital contact tracing technologies (DCTT). Technology design should not be static, but it should be capable of evolving depending upon local conditions, new evidence, and changing preferences and priorities. Technology companies alone should not con
...
trol the terms, conditions, or capabilities of DCTT, nor should they presume to know what is acceptable to members of the public. DCTT should be designed to have a base set of features that protect privacy, with layers of additional capabilities that users may choose to activate. An initial default should be that user location data are not shared, but users should be provided with easy mechanisms and prompts to allow for opting-in to this capability, with encouragement to the public if it is shown to be critical to achieving public health goals. Data collected through DCTT should be made available to public health professionals and to researchers in de-identified form to support population-level epidemiologic analyses." (Summary, page 2)
more
"This document is a compilation of the outcomes of the research component of a small project entitled “Putting cybersecurity on the rights track” that the Association for Progressive Communications (APC) implemented during the course of 2019 with the participation of APC members." (About this pr
...
oject, page 4)
more