"In enhancing the fight against ICT-facilitated child abuse and exploitation, governments and national authorities may focus on a child protection approach that fully respects human rights; on ensuring that legislation keeps pace with technological innovation; on recruiting, training and maintaining
...
specialized personnel; on gaining access to state-of-the-art technological resources; developing effective mechanisms for accessing third party data and conducting undercover investigations that are consistent with the rule of law; as well as developing policyguidance on harmful conduct committed by youth. The formulation of policies in this area is best based on a multidisciplinary approach that draws on research findings and best practices from social science, legal policy and public policy." (Executive summary, page xi)
more
"Vom eigenen Staat auf Schritt und Tritt überwacht zu werden, ist eine Horrorvision für viele Menschen. Möglich wird dies auch durch den Spion in der Hosentasche. Smartphones kommunizieren ständig mit staatlichen Lauschern, ohne dass wir es wollen – und bemerken. Stefan Aust und Thomas Ammann
...
erhellen die politischen Hintergründe und schildern, wie die Informationstechnologie aus den Denkfabriken der Militärs zum weltumspannenden Machtinstrument wurde. Längst tobt ein Krieg um Informationen zwischen Geheimdiensten, Staaten und Konzernen – um die Daten von uns allen." (Verlagsbeschreibung)
more
"Mit unserer digitalen Identität müssen wir pfleglich umgehen, denn sie wird immer wichtiger für uns und ist zunehmend Gefahren ausgesetzt. Dieser Ratgeber stellt einfache Maßnahmen vor, wie Sie sich gegen Phishing-Attacken und Virenangriffe wehren. Praktische Tipps zeigen, wie Sie Ihre persönl
...
ichen Daten vor Datenkraken schützen, die personenbezogene Informationen auswerten und weiterverkaufen. Und ein Thema, das – bisher noch weitgehend unbemerkt – immer wichtiger wird: Ein ausführlicher Leitfaden mit Anleitungen hilft, das eigene Onlineleben zu dokumentieren und den digitalen Nachlass zu regeln." (Verlagsbeschreibung)
more
"This edited volume documents the current reflections on the 'Right to be Forgotten' and the interplay between the value of memory and citizen rights about memory. It provides a comprehensive analysis of problems associated with persistence of memory, the definition of identities (legal and social)
...
and the issues arising for data management." (Publisher description)
more
"The six modules [...] are designed to help trainers integrate digital safety and online security topics into their media training. The modules do not assume that the trainer has special knowledge of the subject. While we wrote the toolkit with journalism trainers in mind, we believe that the module
...
s can also be used when training a wide range of media content producers (i.e., bloggers, citizen reporters, human rights activists who work with information, etc.) who use smartphones and the Internet to communicate." (Page 3)
more
"1. This guide is a tool for you, the Internet user, to learn about your human rights online, their possible limitations, and available remedies for such limitations. Human rights and fundamental freedoms apply equally offline and online. This principle includes respect for the rights and freedoms o
...
f other Internet users. The guide provides you with information about what rights and freedoms mean in practice in the context of the Internet, how they can be relied and acted upon, as well as how to access remedies. It is an evolving document, open to periodic updating. 2. This guide is based on the European Convention on Human Rights and other Council of Europe conventions and instruments that deal with various aspects of human rights protection. All Council of Europe member States have a duty to respect, protect and fulfil the rights and freedoms contained in the instruments that they have ratified. The guide is also inspired by the continuous interpretation of these rights and freedoms by the European Court of Human Rights and by other relevant legal instruments of the Council of Europe. 3. The guide does not establish new human rights and fundamental freedoms. It builds on existing human rights standards and enforcement mechanisms." (Introduction)
more
"[The publication] documents how Ethiopia’s government uses its control over the telecom system to restrict individuals’ rights. Based on over 100 interviews with victims of government abuses, former government officials, and former staff of telecom companies, the report describes the various me
...
thods used by Ethiopian authorities to monitor individuals and inhibit their activities online. Individuals with perceived or tenuous connections to opposition groups are arbitrarily arrested and interrogated based on their phone calls. Security agencies rarely acquire warrants, despite the legal requirement to obtain them in most circumstances. Government censors routinely block websites of opposition groups and independent media, while bloggers and social media users face harassment and the threat of arrest should they refuse to tone down their writings." (Back cover)
more
"The internet has enabled an unprecedented ability to monitor and track people and information flows as highlighted in the 2013 revelations by Edward Snowden about online surveillance carried out by the United States’ National Security Agency. The revelations have kicked off debates across the wor
...
ld about the correct balance between citizen privacy and national security in the context of the internet. In the face of this shifting landscape it is critical for human rights activists to understand how internet surveillance works, and what privacy and anonymity really mean in a digital world." (Back cover)
more
"A more connected, data-driven humanitarian system creates an opportunity to save lives and reduce suffering, even as it raises concerns for privacy and security. On one hand, in a humanitarian crisis, in which any delay can cost lives, privacy concerns and consent may be justifiably ignored in the
...
service of the greater good. At the same time, humanitarian principles demand greater moral accountability and consideration of potential harm. Humanitarians also need to address concerns that technologies are being tested without public debate or ability to opt-out. The bulk of international assistance goes to long-term, complex crises and conflicts,45 often in areas with weak governance and little regard for human rights, and in which sophisticated surveillance by governments and cyber-warfare by armed groups is increasingly the norm. By modelling best practices in the principled use of information and respect for privacy, humanitarian organizations can set a positive example and allay concerns about their neutrality." (Conclusion, page 18)
more
"This toolkit is designed for journalists working in any media – newspapers, radio, and television – as well as bloggers and other information professionals who need to get access to information held by public bodies for their stories. The toolkit is for journalists making requests in their own
...
country or considering submitting a request in another country. It is based on a comparative analysis of the access to information laws in the region covered by the Organization for Security and Cooperation in Europe, which has 56 participating states in Europe, Central Asia and North America; of these 48 have legal provisions on the right of access to information held by public bodies; the law of Kosovo is also analysed." (Overview, page 7)
more
"This guide is intended for use by international NGOs who want to use social media with children and the youth that they work with. This may include developing children’s skills and capacity, using social media as a development tool for a community project, providing access to technology, or offer
...
ing social media as a communication tool between communities or between sponsors and sponsored children. The information here is particularly relevant to NGOs working with children and youth in developing countries with increasing use of social media and a need for organisations working with children to protect them in the online world. This guide reviews some of the main risks and presents a range of tools for combating them. Due to the multifaceted nature of some of these risks, this guide makes no claim to address all of them exhaustively." (Resourcecentre.savethechildren.net)
more
"Given the Internet’s potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran’s nuclear faci
...
lities, is one such example. Penetration into US government computer systems by Chinese hackers-presumably sponsored by the Chinese government-is another. Together, they point to a new era in the evolution of human conflict. In Cybersecurity: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves." (Publisher description)
more
"Ein praktisches, verständliches und effizientes Schutzprogramm für alle, die sich in der digitalen Welt bewegen. Safe Surfer funktioniert wie ein Arbeitsbuch – alle Tipps lassen sich parallel zum Lesen umsetzen. Google, Facebook oder die NSA – wie können wir unsere Privatsphäre im digitalen
...
Zeitalter noch schützen? Diese Frage ist nicht nur in den Medien ein Thema, sondern betrifft uns alle. Denn jeder von uns kann Opfer eines digitalen Anschlags werden. Safe Surfer ist ein praktisches, effizientes Präventionsprogramm für den Nutzer mit IT-Grundkenntnissen. Mit zahlreichen Fallbeispielen und konkreten Ratschlägen für Laptop, Tablet und Smartphone rüsten Sie sich gegen unerlaubte Überwachung, Datenklau, Trickbetrug und Hackerangriffe" (Verlagsbeschreibung)
more
"Based on the case study of the cyber war between Russia and Georgia in August 2008, this paper is a theoretical deliberation in an attempt to illustrate connection between the Digital Divide and cyber security. Through a qualitative study of cyber warfare between the two countries, one on the devel
...
oped and one on the underdeveloped side of Digital Divide, it shows that disadvantaged states are subject to cyber insecurity. As a result, even though relatively low dependence of their vital systems on online networks supposedly makes them less vulnerable to cyber offensives, disruptions to communication infrastructures cause these states turn dysfunctional. To test the dependence of cyber security on Digital Divide, this paper also reviews other instances of coordinated cyber-attacks between countries, but in these cases, with both parties digitally advanced (Russia vs. Estonia, China vs. USA). These cases show that differences in states’ capabilities and available resources allowed them to withstand and relatively quickly repel cyber offensives without outside support and great harm. The general conclusion is that country’s position along Digital Divide translates into the level of that country’s cyber security, which serves as a litmus test for the level of its cyber power that, in turn, is indicative of the country’s strategic political standing among other states." (Abstract)
more
"In assessing attitudes toward the media, one notable finding was a vote of confidence for improved quality of news media reporting between 2011 and 2013 with a majority of adults agreeing that it has improved in six of the eight countries surveyed. This optimism is also reflected in overall percept
...
ions of media credibility in such countries as Saudi Arabia, Jordan, Qatar and the UAE, while less so in more volatile states including Egypt, Lebanon and Tunisia. Internet use is strongest in the Gulf countries—UAE, Qatar, Bahrain and Saudi Arabia and lowest in the most populous Arab country, Egypt, which appears in question after question to be a media-poor country in spite of its large population. Only in Qatar is the internet regarded as a more important source of news than is television. In all countries respondents are multi-media users, of course. In the midst of great enthusiasm for the internet, the importance of satellite television, notably Al Jazeera, is the most popular source for news and public affairs across the region. While its popularity varies by country depending on local sources of news and other factors, Al Jazeera was mentioned by respondents in every country surveyed as a top source of news. At the same time, social networking is nearly universal among those online and no other social media site comes close to Facebook in popularity. Twitter and Google+ also get high marks in Bahrain, Saudi Arabia and UAE. Although critics once complained “that the internet only speaks English,” Arabic language use exceeded that of English across the region on most media platforms." (Introduction, page 8)
more
"Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threa
...
ts into new forums. In particular, social media and mobile devices have come under increasing attack in 2012, even as spam and phishing attacks via traditional routes have fallen. Online criminals are following users onto these new platforms." (Executive summary)
more
"This paper draws on interviews with digital security trainers and coordinators of digital security trainings of trainers (ToT)s whose end-goal is the support of human rights defenders, civil society, activists, and local media worldwide [...] Among its main findings, this paper notes the following
...
four gaps: a lack of sustained support for digital security trainers after they receive training at ToT events and return to their own training efforts; a lack of standardized frameworks for determining the effectiveness of digital security ToTs, a lack of standardized frameworks for trainers to conduct digital security training events around the world, pedagogical approaches drawing on extensive research and developments in the field of adult education are not significantly utilized in ToTs." (Executive summary)
more