"This handbook is divided into three main sections: Fact-Checking, Digital Security, and Data Journalism. Each section contains a series of chapters that cover essential topics, providing you with a holistic understanding of these subjects. Let's take a brief look at what each section entails. In th
...
e Fact-Checking section, we will explore the fundamentals of fact-checking, including the identification and debunking of false information. We will delve into the importance of verification and provide you with practical techniques to verify images and videos. Additionally, we will discuss transparency in media and the vital role it plays in fostering trust and credibility. The Digital Security section focuses on safeguarding digital information and protecting against cyber-attacks. We will examine various types of cyber threats and discuss the importance of digital security in the context of journalism. You will learn valuable tips and tools to enhance your digital security and reduce risks in an increasingly interconnected world. The Data Journalism section introduces the world of data and its application in journalism. You will learn how to find and analyse data, as well as how to create compelling data-driven stories. We will explore data visualisation techniques and discuss the role of social media in engaging with audiences. Throughout this handbook, you will encounter readings, notes, self-tests, and activities designed to enhance your learning experience. We encourage you to engage actively with the material, complete the suggested activities, and seek further clarification if needed." (Preamble, page 6)
more
"Welche Strategien führen zu mehr IT-Sicherheit? Welche Reformen sind notwendig, um die deutsche Cybersicherheitsarchitektur zu stärken? Und wie soll auf den IT-Fachkräftemangel reagiert werden? Bei der Beantwortung dieser Fragen sind sich die Bundesregierung und Vertreterinnen und Vertreter aus
...
Wissenschaft und Zivilgesellschaft nicht immer einig." (Verlagsbeschreibung)
more
"Open source software (OSS) is the backbone and driver of digitization across sectors worldwide. This makes OSS a cornerstone of every society and economy, including the core of national security concerns. Therefore, governments have a vested interest in OSS security. At the same time, governments,
...
as large users of OSS, bear some of the responsibility for supporting the OSS ecosystem. To assume responsibility, governments must understand the existing OSS communities and the culture surrounding OSS. Governments will be able to effectively foster OSS security only if they work with the ecosystem stakeholders. Doing so requires governments to adhere to guidelines such as respect, cooperation, collaboration and sincerity. In addition, governments must identify their own role(s) in consultation with the OSS ecosystem. Governments can serve as internal coordinators, role models, supporters and regulators. The role of internal coordinator requires governments to be more transparent and systematic in their own use of OSS. In particular, they should take stock of what is being used, where exactly the components are being used and how they are used. As role models, governments engage with OSS, adhering to best practices in the ecosystem and encouraging other governments and stakeholders to do so. As supporters, governments actively engage with the OSS ecosystem, mobilizing and channeling resources into it through various means. Governments use their regulatory powers to create a legal framework that reflects the characteristics of the OSS ecosystem. They can mix and match from different roles and shift between them as they gain more experience, trust and credibility in the OSS ecosystem." (Executive summary)
more
"1. Aus dem nationalen Verfassungsrecht ist ein Recht auf Verschlüsselung ableitbar.
2. Aus dem europäischen Verfassungsrecht ist ein Recht auf Verschlüsselung ableitbar.
3. Ein Recht auf Verschlüsselung ergibt sich zwar nicht als solches aus den nationalen und europäischen verfassungsrechtlich
...
en Gewährleistungen. Es kann aber aus der Zusammenschau verschiedener Grundrechte abgeleitet werden. Relevant sind die Grundrechtspositionen, die die digitale Datenverarbeitung und -übermittlung zum Gegenstand haben [...]
4. Bei einer Ableitung eines Rechts auf Verschlüsselung aus verschiedenen verfassungsrechtlichen Gewährleistungen auf nationaler und europäischer Ebene ergibt sich im chronologischen Kommunikationsablauf ein nahezu lückenloser Grundrechtsschutz [...]
5. Ein Recht auf Verschlüsselung besteht aus einer aktiven sowie aus einer passiven Dimension. Damit ist es nicht nur Abwehrrecht gegenüber staatlichem Handeln umfasst, sondern kann für den Staat auch (weit gefasste) Handlungspflichten auslösen, um der Umsetzung von Datenverschlüsselung als Methode zur Ausübung effektiven Grundrechtsschutzes gerecht zu werden." (Executive summary)
more
"The Typology of Online Harms provides a comprehensive framework for understanding and categorizing various types of online harm through a human rights lens [...] This typology recognizes the complex nature of online safety, by classifying the threats into content, contact and conduct risks. Online
...
harms can occur throughout the production, distribution and consumption of content (content) but can also arise as a result of online interactions with others (contact) and through behaviour facilitated by technology (conduct)." (Conclusion)
more