"We found that knowledge around digital security amongst women in Kampala is quite low. A high proportion of women have been victims of cyberbullying without any obvious routes to seeking justice against perpetrators. There is an urgency for law enforcement and government to hand down stricter penal
...
ties for offenders and to provide measures that protect women from online gender-based violence. Furthermore, there is a large role for service providers and civil society to play in building the capacity of women to take precautionary steps to protect their online identities as well as to advocate for regulations and policies that can readily address the growing and changing threats to digital safety and security. As more women continue to access the internet, we must focus on keeping the internet a safe space where these women can benefit rather than become victims of violence and fraud." (Conclusions)
more
"The Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological perspective. Privacy is in the news almost every day: mass surveillance by intelligence agencies, th
...
e use of social media data for commercial profit and political microtargeting, password hacks and identity theft, new data protection regimes, questionable reuse of medical data, and concerns about how algorithms shape the way we think and decide. This book offers interdisciplinary background information about these developments and how to understand and properly evaluate them. The book is set up for use in interdisciplinary educational programmes. Each chapter provides a structured analysis of the role of privacy within that discipline, its characteristics, themes anddebates, as well as current challenges. Disciplinary approaches are presented in such a way that students and researchers from every scientific background can follow the argumentation and enrich their own understanding of privacy issues." (Publisher description)
more
"While the digital era has delivered unprecedented opportunities for big-data based investigative journalism—from the Snowden Files to the Panama Papers—it has also thrown up a host of new threats to the sustainability of journalism based on confidential sources. These include: mass and targeted
...
surveillance; data retention regimes and the handover of data by third party intermediaries such as social media platforms, telecommunications companies and Internet Service Providers (ISPs); national security and anti-terrorism overreach; attempts to ban encryption and online anonymity; and malicious digital attacks targeting journalists. If sources cannot securely connect with journalists, they risk exposure, with impacts including economic penalties through to extra-judicial killings. The effect of these threats to accountability journalism and public access to information is chilling, and it is leading to significant changes in the practice of investigative journalism dependent upon confidential sources and information on a global scale." (Abstract)
more
"Ein umfassender aktueller Überblick über das Medienrecht. Aufgrund der sich ständig und grundlegend ändernden Medienlandschaft und des sich wandelnden Medienrechts hat Frank Fechner in den letzten 20 Jahren sein Lehrbuch jedes Jahr überarbeitet und Gesetzesänderungen, Rechtsprechung und die e
...
ntsprechende Literatur jeweils auf den aktuellen Stand gebracht." (Verlagsbeschreibung)
more
"This study, which covers 121 UNESCO Member States, represents a global benchmarking of journalistic source protection in the Digital Age. It focuses on developments during the period 2007-2015. The legal frameworks that support protection of journalistic sources, at international, regional and coun
...
try levels, are under significant strain in 2015. They are increasingly at risk of erosion, restriction and compromise - a development that is seen to represent a direct challenge to the established universal human rights of freedom of expression and privacy, and one that especially may constitute a threat to the sustainability of investigative journalism. In many of the countries examined in this Study, it was found that legal source protection frameworks are being actually or potentially: overridden by national security and anti-terrorism legislation; undercut by surveillance – both mass and targeted; jeopardised by mandatory data retention policies and pressure applied to third party intermediaries - like ISPs, telcos, search engines, social media platforms - to release data which risks exposing sources; outdated when it comes to regulating the collection and use of digital data, such as whether information recorded without consent is admissible in a court case against either a journalist or a source; and whether digitally stored material gathered by journalistic actors is covered by existing source protection laws." (Executive summary)
more
"These are the basic tools to protect confidentiality, integrity and availability of your information. This list has been built with the support of the Information Security and Capacity Project (ISC Project)." (Page 1)
"The research in these pages covers the theory around multistakeholder participation in Internet governance through a review of relevant literature. It also analyses case studies from Kenya to Brazil, South Korea, and the Internet Governance Forum (IGF), which illustrate how multistakeholder approac
...
hes to Internet governance are applied in practice in diverse places and on different issues. In two of these cases, the outcome had legal repercussions that advanced the role of the Internet in terms of respect for rights; in the other two, the impact was positive for wider norms and processes." (Foreword, page 6)
more
"Compared to five years ago, internet penetration rose in all six countries surveyed and most dramatically in Jordan, Lebanon, and Tunisia. Smartphone ownership tracks closely with internet use in the six surveyed countries. Nearly all nationals in Lebanon, Qatar, Saudi Arabia, and the UAE own a sma
...
rtphone compared with 83% of Jordanians and 65% of Tunisians. Use of Arabic online has increased proportionally with the increase in internet users. In comparison, use of the internet in English remains essentially flat, 25% in 2013 and 28% in 2017, despite the increase in internet use. As internet penetration rises, nationals are less likely to be using offline media platforms compared with 2013. Most nationals still watch TV, but the rate declined modestly since 2013 (98% in 2013 vs. 93% in 2017). Rates of newspaper readership, however, declined more sharply from 47% in 2013 to 25% in 2017. Radio and magazines also declined in popularity since 2013 (radio: 59% in 2013 vs. 49% in 2017; magazines: 26% in 2013 vs. 19% in 2017)." (Executive summary, page 10)
more
"Getting to the heart of stories by asking the really tough questions and going places where no one wants to go. That’s documentary at its best. This Safe+Secure Handbook has been designed to help filmmakers get there—and back—and get their stories into the public domain as safely as possible.
...
The Documentary Funders behind this initiative want to help filmmakers remove unnecessary risk, minimise possible risk, and have a contingency plan for the rest. As supporters of great documentaries, we drew on what many of the best independent filmmakers told us they wished they had done differently. We also worked with the smartest journalism and legal professionals." (Page 2)
more
"La seguridad digital perfecta casi nunca se alcanza pero es posible fortalecerla con algunas prácticas sencillas que si se implementan continuamente mejorarán la protección de la información sensible y se evitará poner en riesgo a las víctimas así como a los defensores que trabajan para ello
...
s." (Página 1)
more
"At the forefront in its field, this Handbook examines the theoretical, conceptual, pedagogical and methodological development of media literacy education and research around the world. Building on traditional media literacy frameworks in critical analysis, evaluation, and assessment, it incorporate
...
s new literacies emerging around connective technologies, mobile platforms, and social networks. A global perspective rather than a Western-centric point of view is explicitly highlighted, with contributors from all continents, to show the empirical research being done at the intersection of media, education, and engagement in daily life. Structured around five themes—Educational Interventions; Safeguarding/Data and Online Privacy; Engagement in Civic Life; Media, Creativity and Production; Digital Media Literacy—the volume as a whole emphasizes the competencies needed to engage in meaningful participation in digital culture." (Publisher description)
more
"The purpose of this document is to provide researchers, especially those working in smaller organisations that might not have extensive resources or experience in data protection requirements, with general guidance on their responsibilities within a global data protection framework to ensure that d
...
ata subjects retain control over their personal information. The specific framework used was developed by the Organisation for Economic Co-operation and Development (OECD). This framework includes a set of eight principles for use in designing programs to ensure privacy and protect personal data: Collection limitation, Data quality, Purpose specification, Use limitation, Security safeguards, Openness, Individual participation, Accountability." (Page 4)
more
"The central thesis of Crtl+Z is that a digital right to be forgotten is an innovative idea with a lot of possibilities and potential. The idea simply needs to be opened up, reframed, and restructured. The extreme options currently on the table limit the many ways to think about digital redemption a
...
nd polarize regions. By utilizing new theories of privacy, breaking down the concept to organize its many meanings, and reframing the problem as one of information stewardship instead of information permanence, a host of choices become available for consideration. In order to make these difficult choices once they are on the table, the issues must be configured to fit within a digital discourse, existing legal cultures, and the international community. My approach to analyzing digital redemption is inherently comparative. The right to be forgotten is indisputably a European creation, but there is a great deal to be gained from studying digital redemption beyond European borders. The right to be forgotten sits at the intersection of change: change in national and transnational policy and change in everyday information technology practices, demands, and expectations. Situated in this unique position, the right to be forgotten encompasses many of the big questions surrounding information technologies and offers a particularly valuable site and moment for comparison of democratic information societies. Comparison among regional treatments of information technology should help us make sense of legal particularities and assumptions that otherwise go unnoticed." (Introduction, page 21)
more
"La presente propuesta metodológica para la promoción del uso seguro del Internet producto de un acuerdo de trabajo entre el Instituto Interamericano del Niño, la Niña y Adolescentes (IIN-OEA) y World Visión República Dominicana aborda, en forma conjunta, los desafíos que, desde la perspectiv
...
a de los Derechos de la niñez y adolescencia nos presenta la expansión del Internet y su creciente presencia en la vida cotidiana de las nuevas generaciones. No se trata de diabolizar los avances tecnológicos ni los cambios en las comunicaciones humanas, producto de dichos avances, sino de reconocer las oportunidades y las amenazas que representan el uso masivo de las mismas. El acceso a Internet es para niños, niñas y adolescentes una herramienta de enorme valor para la obtención de información, comunicación y expresión de sus puntos de vista, así como el conocimiento de nuevas y variadas realidades. Para muchos el acceso a Internet, en la fase histórica en que vivimos, tiene un significado similar a lo que fue la incorporación de la lectoescritura a principios del siglo pasado: una herramienta imprescindible de integración, comunicación y acceso a los bienes de la cultura. Desde esta mirada, el no acceso constituye una brecha de exclusión que se entrelaza y potencializa con otras variables asociadas a la producción social de la vulnerabilidad. Por otra parte, no podemos desconocer que las potencialidades del internet coexisten con riesgos y amenazas. Para los niños, niñas y adolescentes navegar en Internet tiene riesgos similares o tal vez superiores a los que supone el transitar cualquier espacio público sin el acompañamiento responsable de un adulto [...]
Muchas experiencias dan cuenta de continuidades entre violencias virtuales y físicas. Solo a modo de ejemplo, podemos citar el bullying que es extendido a través del cyberbullying o la utilización de Internet para reclutar posibles víctimas de trata o de explotación sexual. El dualismo del Internet nos enfrenta al desafío de articular acceso e inclusión con protección. Acceso seguro con realización de derechos y es aquí donde es necesario reafirmar algunos principios y conceptos presentes en la Convención de los Derechos del niño. En primer lugar, el principio de corresponsabilidad, los niveles de protección de los niños, niñas y adolescentes requieren una corresponsabilidad entre familia, comunidad y Estado." (Palabras introductorias, página 7)
more
"To many in the media, Internet governance seems to be an issue far removed from their daily life and work. This misconception can have substantial consequences. The Internet is fast becoming the infrastructure for all communications between media and citizens. If journalists and media freedom activ
...
ists do not get involved in the debates about how to govern the net, it will be left to governments and private companies to define the rules for our public arena." (Introduction, page 9)
more