Filter
318
Featured
251
12
16
Topics
25
25
19
18
16
16
15
15
11
11
11
10
10
9
9
9
9
9
8
8
8
8
8
8
8
7
7
7
7
7
6
6
6
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
83
35
17
9
8
8
8
7
6
3
2
1
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
From Boots on the Ground to Bytes in Cyberspace: A Comprehensive Guide for Responsible Technology Use by the Private Security Sector
Geneva: ICT for Peace Foundation (2024), 13 parts
"This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the complex landscape of Information and Communication Technologies (ICTs) and their impact on human rights. The toolkit is designed for a wide range of PSC stakeholders, including security professionals
...
Global Cybersecurity Index 2024
Geneva: ITU, 5th ed. (2024), viii, 139 pp.
"The fifth edition of the Global Cybersecurity Index (GCI) measures the commitment of countries to cybersecurity in the context of measures across the following five pillars: legal; technical; organizational; capacity development; cooperation. The GCI, launched in 2015 by the International Telecommu
...
Digitalization and Development: Ecosystem for Promoting Industrial Revolution 4.0 Technologies in Malaysia
London; New York: Routledge (2023), xxii, 272 pp.
"This book examines the diffusion of digitalization and Industry 4.0 technologies in Malaysia by focusing on the ecosystem critical for its expansion. The chapters examine the digital proliferation in major sectors of agriculture, manufacturing, e-commerce and services, as well as the intermediary o
...
Cybersicherheit
Aus Politik und Zeitgeschichte, volume 73, issue 22-24 (2023), 37 pp.
"Welche Strategien führen zu mehr IT-Sicherheit? Welche Reformen sind notwendig, um die deutsche Cybersicherheitsarchitektur zu stärken? Und wie soll auf den IT-Fachkräftemangel reagiert werden? Bei der Beantwortung dieser Fragen sind sich die Bundesregierung und Vertreterinnen und Vertreter aus
...
Field Guide to Incident Response for Civil Society and Media
Key Guides
Internews (2023), 123 pp.
Digital Security and Human Rights Defenders Landscape: Recommendations for NHRIs in the Asia-Pacific
Bangkog: Asia Centre (2023), 22 pp.
"Governments in the Asia-Pacific region have responded to human rights defenders' (HRD’s) new online advocacy strategies, affecting their online advocacy through the use of legal and non-legal measures to harass them and impede their work. Against this backdrop, National Human Rights Institutions
...
Investigative Journalism in the Digital Age: An Online Safety Checklist
Public Media Alliance (2023), 1 p.
"This ten-point checklist highlights key tips for journalists undertaking digital approaches to investigative journalism." (Introduction)
Fact-Checking, Digital Security, Data Journalism Starter's Guide
Nairobi: Kenya Community Media Network (KCOMNET) (2023), 109 pp.
"This handbook is divided into three main sections: Fact-Checking, Digital Security, and Data Journalism. Each section contains a series of chapters that cover essential topics, providing you with a holistic understanding of these subjects. Let's take a brief look at what each section entails. In th
...
Digital ethics
London; New York: Routledge (2023), x, 252 pp.
"This fifth volume in Christian Fuchs's Media, Communication and Society series presents foundations and applications of digital ethics based on Critical Theory. It applies a critical approach to ethics within the realm of digital technology. Based on the notions of alienation, communication (in)jus
...
Threats to Journalists from the Consumer Internet of Things
In: Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media
Cyril Onwubiko, Pierangelo Rosati, Aunshul Rege, Arnau Erola, Xavier Bellekens, Hanan Hindy, Martin Gilje Jaatun (eds.)
Singapore: Springer (2023), pp. 303–326
"Threats associated with the consumer Internet of Things (IoT) may particularly inhibit the work and wellbeing of journalists, especially because of the danger of technological surveillance and the imperative to protect confidential sources. These issues may have knock-on effects on societal stabili
...
Boundaries, Barriers, and Champions: Understanding Digital Security Education in US Journalism Programs
Journalism Studies, volume 24, issue 3 (2023), pp. 309-328
"Journalists are increasingly attacked in response to their work yet they often lack the necessary support and training to protect themselves, their sources, and their communications. Despite this, there has been limited scholarly attention that addresses how journalism schools approach digital secu
...
Zu nackt fürs Internet?
Düsseldorf: klicksafe; Landesanstalt für Medien NRW (2023), 2 pp.
Privacy and Freedom of Expression
New York: Columbia University, Global Freedom of Expression (2023), 41 pp.
Fostering Open Source Software Security: Blueprint for a Government Cybersecurity Open Source Program Office
Berlin: Stiftung Neue Verantwortung (2023), 44 pp.
"Open source software (OSS) is the backbone and driver of digitization across sectors worldwide. This makes OSS a cornerstone of every society and economy, including the core of national security concerns. Therefore, governments have a vested interest in OSS security. At the same time, governments,
...
Das digitale Briefgeheimnis: Herleitung des Rechts auf Verschlüsselung
Potsdam: Friedrich Naumann Stiftung (2023), 26 pp.
"1. Aus dem nationalen Verfassungsrecht ist ein Recht auf Verschlüsselung ableitbar.
2. Aus dem europäischen Verfassungsrecht ist ein Recht auf Verschlüsselung ableitbar.
3. Ein Recht auf Verschlüsselung ergibt sich zwar nicht als solches aus den nationalen und europäischen verfassungsrechtlich
...