"To many in the media, Internet governance seems to be an issue far removed from their daily life and work. This misconception can have substantial consequences. The Internet is fast becoming the infrastructure for all communications between media and citizens. If journalists and media freedom activ
...
ists do not get involved in the debates about how to govern the net, it will be left to governments and private companies to define the rules for our public arena." (Introduction, page 9)
more
"Compromised Connections is a brief introduction to emerging security issues facing mobile phones in development. It recommends safety measures that can be quickly adopted – from device safety to data security – and points to resources that may be useful for people interested in following future
...
developments. Ultimately, it advocates a "mobile first” approach: adoption of an information management strategy that prioritizes the safety of mobile devices and their users." (Internews website)
more
"Encryption is a hot topic in the current global discussion on Internet governance. This research delves into the subject, to outline a global overview of the various means of encryption, their availability and their potential applications in the media and communications landscape. The research expl
...
ains how the deployment of encryption is affected by different areas of law and policy, and it offers detailed case studies of encryption in selected jurisdictions. It analyzes in-depth the role of encryption in the media and communications landscape, and the impact on different services, entities and end users. Built on this exploration and analysis, the research provides recommendations on encryption policy that are useful for various stakeholders. These include signaling the need to counter the lack of gender sensitivity in the current debate, and also highlighting ideas for enhancing “encryption literacy." (Back cover)
more
"The debate on Facebook raises questions about the use and users of this information service. This collected volume gathers a broad spectrum of social science and information science articles about Facebook. Facebook has many facets, and we just look forward above all to the use and users. The facet
...
of users has sub-facets, such as different age, sex, and culture. The facet of use consists of sub-facets of privacy behavior after the Snowden affair, dealing with friends, unfriending and becoming unfriended on Facebook, and possible Facebook addiction. We also consider Facebook as a source for local temporary history and respond to acceptance and quality perceptions of this social network service, as well. This book brings together all the contributions of research facets on Facebook." (Publisher description)
more
"This series aims to help human rights defenders develop the tools, skills and knowledge they need to engage effectively in cyber policy debates. The series is structured around five modules. The first four each focus on a different aspect of cyber policy - human rights, cybersecurity, regulatory fr
...
ameworks and cyber capacity building - with a final regional module highlighting how these apply in Africa, Asia and Latin America. Each module consists of several videos, which take participants through a key cyber issue or concept - explaining how it relates to human rights, who the key actors are, and how and where to engage." (Introduction)
more
"This survey was designed to measure how journalists around the world take advantage of technology to enhance their security. The results suggest that there is a general lack of awareness about the power that digital tools have to improve a journalist’s protection. There are scores of organization
...
s of journalists, technologists, and activists developing tools for physical or digital protection or training reporters and editors on how to use them. But there can never be enough education about the risks that journalists face and the security measures they can take, especially when it seems that the press is under attack more frequently and in more aggressive ways than before." (Page 12)
more
"This mapping study investigates the ways in which the Kenyan government and other actors have initiated or engaged in multistakeholder processes in order to address cybersecurity-related matters in the country. Based on this, it will identify best practices, gaps and missing links, as well as oppor
...
tunities and recommendations for improving the cyber policy landscape in the country. The assessment of Kenya’s cybersecurity landscape in this report will identify actors within the government and civil society, as well as existing laws and frameworks, and address the proposed ones, based on the information that is currently available. Unless otherwise stated, all institutions and legislative documents listed here are existent and/or functional." (Page 7)
more
"IT Governance requires public and corporate cybersecurity policies to improve fighting against cybercrime and other violations. The EU, the USA and Brazil have recently developed different regulatory approaches on the subject. Assessing how to design policies in line with them across geographies se
...
ems key for effectively managing relevant global issues. After a brief introduction, the article touches on three sample topics: online privacy, open-source platforms, and latest-generation cyber-threats to illustrate how EU, US and Brazil have taken different paths. Each sample topic is analysed in detail and followed by a conclusion indicating how possibly regional or national particularities may be pragmatically reconciled by public and corporate interested parties." (Abstract)
more
"This guide aims to help correct the imbalance in capacity and expertise between human rights defenders and cybersecurity professionals and policy-makers. At the heart of the guide is an attempt to address perhaps the fundamental barrier: the absence of clear definitions and agreed terms. It will do
...
this by closely examining three separate policy areas which are often conflated under the umbrella of cybersecurity – information security, cybercrime, and cyber conflict – unpacking their policy and legal dimensions, mapping relevant stakeholders, and outlining the issues at stake. It is hoped this will help human rights defenders engage effectively in cyber policy debates at the domestic, regional and international levels." (Overview, page 6)
more
"This publication identifies at least 12 digital threats, including illegal or arbitrary digital surveillance, location tracking, and software and hardware exploits without the knowledge of the target. Further examples that are considered are: phishing, fake domain attacks, Man-in-the-Middle (MitM)
...
attacks, and Denial of Service (DoS) [...] In examining cases worldwide, this publication serves as a resource for a range of actors. In a nutshell, it surveys the evolving threats, and assesses preventive, protective and pre-emptive measures. It shows that digital security for journalism encompasses, but also goes beyond, the technical dimension. This publication also gives an overview of actors and initiatives working to address digital safety, as well as identifying gaps in knowledge that call for awareness-raising." (UNESCO website)
more
"UNESCO’s vision of universal Knowledge Societies builds on a free, open and trusted Internet that enables people to not only have the ability to access information resources from around the world, but to also contribute information and knowledge to local and global communities. What can UNESCO do
...
to move towards the realization of this vision of Internet-enabled Knowledge Societies that can foster inclusive sustainable human development worldwide? To address this question within the mandate of this study, UNESCO has worked with Member States and other stakeholders to analyse four separate but interdependent fields of Internet policy and practice, within the mandate of UNESCO, perceived to be central to achieving this vision. These are access to information and knowledge, freedom of expression, privacy, and ethical norms and behaviour online. This report assesses these four fields by viewing them as keystones for building a free and trusted global Internet that will enable inclusive Knowledge Societies." (Executive summary)
more
"Ranking Digital Rights’ inaugural Corporate Accountability Index evaluates 16 of the world’s most powerful Internet and telecommunications companies on their commitments, policies, and practices that affect users’ freedom of expression and privacy. By opening the door for greater corporate tr
...
ansparency and public scrutiny of business practices, the Index encourages companies to do a better job of respecting their users’ rights around the globe [...] Highlights: There are no “winners.” Even companies in the lead are falling short. Across the board, companies need to improve their disclosure of policies and practices that affect users’ freedom of expression and privacy, as well as their commitments to these human rights. Only six companies scored at least 50 percent of the total possible points. The highest score was only 65 percent." (Executive summary)
more
"This kit is a contribution from activists for activists to help us be more secure in our digital practices. It’s designed to help activists deal with the most common security issues that might jeopardise the integrity of our devices and communications. Any at-risk user who encounters security-rel
...
ated problems can use this kit to mitigate the immediate consequences and find guidance to address ongoing security issues. The kit is simply written for computer non-experts. Since security is complex and simple answers might not always be sufficient, this kit also provides links to more exhaustive resources for additional support. The work on this kit has been guided by APC’s many years of work in the area of digital security, particularly its work with human rights defenders, those who deal with digital dangers most frequently as a matter of course in their work." (APC website)
more
"This handbook is a compilation of advice from child psychologists and the police and also the personal narratives of people who have been subjected to abuse. We hope this book will make it easier for adults to talk to children about the risks of the internet. We also hope it will inspire you and he
...
lp you to be part of children’s everyday activities on the internet." (Page 3)
more
"Sex offenders know that social media offer new opportunities for contacting children and forming friendships with them. They have also realised how simple it is to take pictures and make videos of sexual abuse and share them with other people with the same sexual interests. Digital information tech
...
nology and social media add new aspects to our understanding of how sexual abuse takes place and how it affects victims. It is necessary for all practitioners working with children and young people to have knowledge of this field. All types of sexual abuse are shameful and taboo-ridden. Consequently, children and young people who feel unhappy need to be asked directly how negative online encounters have affected them. However, the dialogue with them must proceed with an understanding of ow demeaning, intimidating and traumatic such experiences can be, including when living through them on the internet. Save the Children Denmark has compiled this anthology with the latest knowledge in a field that is in constant flux and full of professional challenges." (Back cover)
more
"Esta guía pretende proveer los elementos necesarios para establecer un protocolo de seguridad en una diversidad de contextos; así como recomendaciones prácticas para hacer frente a diversas situaciones. La guía está enfocada en todos los periodistas visuales, en particular aquellos que trabaja
...
n en zonas de riesgo. El primer apartado del texto se enfoca en los elementos necesarios para elaborar un protocolo de seguridad. Se enlistan las herramientas necesarias para valorar el riesgo y las amenazas y se dan los lineamientos para decidir qué medidas de seguridad adoptar. En el segundo apartado se dan recomendaciones para enfrentar diversos escenarios. La labor de los periodistas visuales los obliga a enfrentar una diversidad de circunstancias con características particulares. Este segundo apartado pretende brindar al lector recomendaciones específicas que le serán útiles en cierto tipo de contextos, pero sin olvidar que no hay dos situaciones iguales, por lo que cada cobertura requiere de medidas específicas de seguridad. El último apartado está dedicado al manejo de estrés y los efectos psicológicos que pueden surgir por el trabajo en situaciones de alto riesgo. El bienestar psicológico es fundamental para poder desarrollar una buena cobertura periodística. La labor de los reporteros gráficos los obliga a estar en estados de alto nivel de adrenalina, lo que puede causar estragos en la salud." (Página 6)
more
"This report assesses how countries can maximise the potential of the digital economy as a driver for innovation and inclusive growth, and discusses the evolutions in the digital economy that policy makers need to consider as well as the emerging challenges they need to address as a part of national
...
digital strategies. Chapters include an overview of the current status and outlook of the digital economy; the main trends in the ICT sector, and developments in communication and regulation policy; and overviews of ICT demand and adoption, plus the effects of the digital economy on growth and development. This volume also includes a chapter on developments related to trust in the digital economy and on the emerging Internet of things." (Publisher description)
more