Filter
318
Featured
251
12
16
Topics
25
25
19
18
16
16
15
15
11
11
11
10
10
9
9
9
9
9
8
8
8
8
8
8
8
7
7
7
7
7
6
6
6
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
83
35
17
9
8
8
8
7
6
3
2
1
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
Legal Leaks Toolkit: A Guide for Journalists on How to Access Government Information
Key Guides
Madrid; Berlin: Access Info Europe; N-ost Netzwerk für Osteuropa-Berichterstattung (2014), 85 pp.
"This toolkit is designed for journalists working in any media – newspapers, radio, and television – as well as bloggers and other information professionals who need to get access to information held by public bodies for their stories. The toolkit is for journalists making requests in their own
...
Safe Surfer: Schutz der Privatsphäre im digitalen Zeitalter
Bonn: Bundeszentrale für politische Bildung (bpb) (2014), 190 pp.
"Ein praktisches, verständliches und effizientes Schutzprogramm für alle, die sich in der digitalen Welt bewegen. Safe Surfer funktioniert wie ein Arbeitsbuch – alle Tipps lassen sich parallel zum Lesen umsetzen. Google, Facebook oder die NSA – wie können wir unsere Privatsphäre im digitalen
...
Travel Guide to the Digital World: Surveillance and International Standards
London: Global Partners Digital (2014), 98 pp.
"The internet has enabled an unprecedented ability to monitor and track people and information flows as highlighted in the 2013 revelations by Edward Snowden about online surveillance carried out by the United States’ National Security Agency. The revelations have kicked off debates across the wor
...
Guide to Human Rights for Internet Users
Council of Europe (2014), 28 pp.
"1. This guide is a tool for you, the Internet user, to learn about your human rights online, their possible limitations, and available remedies for such limitations. Human rights and fundamental freedoms apply equally offline and online. This principle includes respect for the rights and freedoms o
...
"They Know Everything We Do": Telecom and Internet Surveillance in Ethiopia
Human Rights Watch (2014), 137 pp.
"[The publication] documents how Ethiopia’s government uses its control over the telecom system to restrict individuals’ rights. Based on over 100 interviews with victims of government abuses, former government officials, and former staff of telecom companies, the report describes the various me
...
The Ethics of Memory in a Digital Age: Interrogating the Right to be Forgotten
London: Palgrave Macmillan (2014), xi, 143 pp.
"This edited volume documents the current reflections on the 'Right to be Forgotten' and the interplay between the value of memory and citizen rights about memory. It provides a comprehensive analysis of problems associated with persistence of memory, the definition of identities (legal and social)
...
"This guide is intended for use by international NGOs who want to use social media with children and the youth that they work with. This may include developing children’s skills and capacity, using social media as a development tool for a community project, providing access to technology, or offer
...
Enabling Openness: The Future of the Information Society in Latin America and the Caribbean
Montevideo; Ottawa: Comunica; International Development Research Centre (IDRC) (2013), 200 pp.
Internet Security Threat Report 2013
Mountain View, Calif.: Symantec Corporation (2013), 57 pp.
"Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threa
...
Überwachtes Deutschland: Post- und Telefonüberwachung in der alten Bundesrepublik
Bonn: Bundeszentrale für politische Bildung (bpb), Sonderausg. (2013), 377 pp.
Training Digital Security Trainers: A Preliminary Review of Methods, Needs, and Challenges
Washington, DC; Arcata, Calif.: Internews (2013), 18 pp.
"This paper draws on interviews with digital security trainers and coordinators of digital security trainings of trainers (ToT)s whose end-goal is the support of human rights defenders, civil society, activists, and local media worldwide [...] Among its main findings, this paper notes the following
...
Diplomacy, Development and Security in the Information Age
Washington, DC: Georgetown University, Institute for the Study of Diplomacy (2013), v, 142 pp.
"[...] This series thus proposes to unpack the concepts of transparency and volatility across three major arenas of international affairs: security, diplomacy, and development. Each issue-area features two essays, each focusing on different aspects of transparency and/or volatility. Two additional e
...
Media Use in the Middle East: An Eight-Nation Survey
Qatar: Northwestern University in Qatar; Harris Interactive (2013), 97 pp.
"In assessing attitudes toward the media, one notable finding was a vote of confidence for improved quality of news media reporting between 2011 and 2013 with a majority of adults agreeing that it has improved in six of the eight countries surveyed. This optimism is also reflected in overall percept
...
Safety on the Line: Exposing the Myth of Mobile Communication Security
Washington, DC: Freedom House; Broadcasting Board of Governors (BBG) (2012), 175 pp.
"This report evaluates the risks and vulnerabilities of mobile phone services and apps in 12 specified countries: the Republic of Azerbaijan, the Republic of Belarus, the People’s Republic of China, the Arab Republic of Egypt, the Islamic Republic of Iran, Libya, the Sultanate of Oman, the Kingdom
...
Global Information Society Watch 2012. The Internet and Corruption: Transparency and Accountability Online
Association for Progressive Communications (APC); Hivos (2012), 273 pp.
"GISWatch 2012 explores how the internet is being used to ensure transparency and accountability, the challenges that civil society activists face in fighting corruption, and when the internet fails as an enabler of a transparent and fair society. The eight thematic reports and 48 country reports pu
...
Child Safety Online: Global Challenges and Strategies
Florence: UNICEF Innocenti Research Centre (2012), 130 pp.
"The research explored children’s online behaviour, risks and vulnerability to harm, documenting existing preventive and protective measures to combat their online abuse and exploitation. The study draws on lessons from high- and middle-income countries, viewed through the lens of the dynamic that
...
Speak Safe: Media Workers’ Toolkit for Safer Online and Mobile Practices
Key Guides
Washington, DC; Arcata, Calif.: Internews (2012), 56 pp.
"Speak safe" introduces reporters, journalists and bloggers to simple yet effective practices for maintaining control of important information and communications. Thirteen short chapters, of two to four pages each, provide basic knowledge about issues such as safe emailing, surfing, Wi-Fi, data dele
...
Global Survey on Internet Privacy and Freedom of Expression
Paris: UNESCO (2012), 142 pp.
"This publication seeks to identify the relationship between freedom of expression and Internet privacy, assessing where they support or compete with each other in different circumstances. The publication maps out the issues in the current regulatory landscape of Internet privacy from the viewpoint
...