"Threats associated with the consumer Internet of Things (IoT) may particularly inhibit the work and wellbeing of journalists, especially because of the danger of technological surveillance and the imperative to protect confidential sources. These issues may have knock-on effects on societal stabili
...
ty and democratic processes if press freedom is eroded. Still, journalists remain unaware of potential IoT threats, and so are unable to incorporate them into risk assessments or to advise their sources. This shows a clear gap in the literature, requiring immediate attention. This article therefore identifies and organises distinctive and novel threats to journalism from the consumer IoT. The article presents a novel conceptualisation of threats to the press in six categories: regulatory gaps, legal threats, profiling threats, tracking threats, data and device modification threats and networked device threats. Each of the threats in these categories includes a description and hypothetical consequences that include real-life ways in which IoT devices can be used to inhibit journalistic work, building on interdisciplinary literature analysis and expert interviews. In so doing, this article synthesises technical information about IoT device capabilities with human security and privacy requirements tailored to a specific at-risk population: journalists. It is therefore important for cyber science scholarship to address the contemporary and emerging risks associated with IoT devices to vulnerable groups such as journalists. This exploratory conceptualisation enables the evidence-based conceptual evolution of understandings of cyber security risks to journalists." (Abstract)
more
"Journalists are increasingly attacked in response to their work yet they often lack the necessary support and training to protect themselves, their sources, and their communications. Despite this, there has been limited scholarly attention that addresses how journalism schools approach digital secu
...
rity education. This paper draws from an analysis of 106 US programs and 23 semi-structured interviews with journalism students and professors to examine how the next generation of journalists learn about digital security practices. Our findings show that most programs (88.7%) don’t offer formal digital security programming and that digital security skills are often deprioritized in favor of skills seen as more significant contributors to post-graduate hiring—a key priority of journalism programs. Additional barriers include a lack of space and time in existing curricula for added digital security coursework, a perception that students are not interested, and few professors with related knowledge. When security education is introduced, it’s done so in often informal and ad-hoc ways, largely led by “security champions,” both within and outside of journalism, who advocate for its legitimacy. These findings have important implications for journalism education and journalists’ capacity to carry out their work amidst a deteriorating safety environment in the United States." (Abstract)
more
"This fifth volume in Christian Fuchs's Media, Communication and Society series presents foundations and applications of digital ethics based on Critical Theory. It applies a critical approach to ethics within the realm of digital technology. Based on the notions of alienation, communication (in)jus
...
tice, media (in)justice, and digital (in)justice, it analyses ethics in the context of digital labour and the surveillance-industrial complex, social media research ethics, privacy on Facebook, participation, co-operation and sustainability in the information society, the digital commons, the digital public sphere, and digital democracy. The book consists of three parts. Part One presents some of the philosophical foundations of critical, humanist digital ethics. Part Two applies these foundations to concrete digital ethics case studies. Part Three presents broad conclusions about how to advance the digital commons, the digital public sphere, and digital democracy, which is the ultimate goal of digital ethics." (Publisher description)
more
"Governments in the Asia-Pacific region have responded to human rights defenders' (HRD’s) new online advocacy strategies, affecting their online advocacy through the use of legal and non-legal measures to harass them and impede their work. Against this backdrop, National Human Rights Institutions
...
(NHRIs) have a mandate to protect human rights, including those of HRDs. The Marrakech Declaration of 2018, outlined a framework for NHRIs to support HRDs, emphasising both offline and online civic space. However, there is a need for NHRIs to adapt these plans to address digital security threats to HRDs.
This report contributes to this goal by outlining four specific ways through which HDRs are threatened online. First, it shows that, in the Asia-Pacific region, HRDs often face legal threats through laws related to defamation, insult, and "fake news”, as well as broader online regulations granting government authorities extensive powers to limit online freedoms. Second, governments have disrupted online communications by limiting or suspending internet connectivity. Some countries control internet gateways to regulate information flow, and during political instability, internet service providers (ISPs) and mobile carriers are ordered to restrict internet speed or access. Third, governments in the region use technology for legal and covert mass data collection and surveillance. They create national internet gateways for centralized control, consolidating information and data storage. Lastly, HRDs encounter digital threats from “cybertroops”, combining human operatives and bots on social media to influence public opinion in favour of the government. Governments are complicit by showing minimal commitment to addressing the problem. Identifying these threats is the basis for this report to recognise the efforts and limitations of NHRIs in ensuring HRDs’ rights online in three areas - monitoring and reporting; advocacy and awareness-rising; and capacity and network building - and provide a set of recommendations aimed at increasing NHRI’s institutional capacity." (Executive summary)
more
"The open access edited volume addresses children's rights and their ability to act in the digital world. The focus is on the position of children as subjects with their own rights and developing capacities. Their consideration by parents, courts and legislators is critically examined. Aspects of di
...
gital parenting, especially educational practices and strategies in the context of social media, are analyzed with regard to the tension between protection and participation of children. The edited volume brings debates on privacy and data protection together with those from tort, family and intellectual property law, while also examining the role of families and children in the regulation of data and digital economies, especially online platforms. Legal reflections from Germany, Israel, Portugal and the United States of America are complemented by perspectives from media studies, political science, educational science and sociology of law." (Publisher description)
more
"This book examines the diffusion of digitalization and Industry 4.0 technologies in Malaysia by focusing on the ecosystem critical for its expansion. The chapters examine the digital proliferation in major sectors of agriculture, manufacturing, e-commerce and services, as well as the intermediary o
...
rganizations essential for the orderly performance of socioeconomic agents. The book incisively reviews policy instruments critical for the effective and orderly development of the embedding organizations, and the regulatory framework needed to quicken the appropriation of socioeconomic synergies from digitalization and Industry 4.0 technologies. It highlights the importance of collaboration between government, academic and industry partners, as well as makes key recommendations on how to encourage adoption of IR4.0 technologies in the short- and long-term." (Publisher description)
more
"The Zimbabwean state has in recent years stepped up its surveillance efforts on citizens, civil society and journalists who are viewed as the “enemies of the state”. This state surveillance has been argued to infringe on citizens’ right to privacy and access to information. We are mindful tha
...
t the “Second Republic” or the “New Dispensation” government has invested heavily in surveillance to silence its critics, among them activists, opposition leaders and journalists. Based on this, the study critically examines the use of surveillance strategies by Zimbabwean journalists and assesses the challenges and opportunities. The study uses in-depth interviews with selected journalists from Zimpapers, Alpha Media Holdings and freelance journalists around the country. The data show that journalists in Zimbabwe use different surveillance strategies, while some are benefiting from state sources for surveillance. Journalists further indicated that they live in fear of the state, which tracks them down. As a result, however, journalists have resorted to various means of security, which include “hunting in packs” and deploying digital security strategies. Findings further demonstrate that newsrooms are poorly equipped with technology for surveillance." (Abstract)
more
"The Digital citizenship education handbook is intended for teachers and parents, education decision makers and platform providers alike. It describes in depth the multiple dimensions that make up each of 10 digital citizenship domains, and includes a fact sheet on each domain providing ideas, good
...
practice and further references to support educators in building the competences that will stand children in good stead when they are confronted with the challenges of tomorrow’s digital world. The Digital citizenship education handbook is consistent with the Council of Europe’s Reference Framework of Competences for Democratic Culture and compatible for use with the Internet literacy handbook." (Back cover)
more
"This policy brief is an Access Now publication. It gives context about the Personal Data Protection Bill in the Parliament of Sri Lank, states the key areas of concerns in the present bill, and proposes nine (9) recommendations." (commbox)
"Surveillance of journalists has become a very topical and controversial issue that now requires attention at a number of levels – the level of the state, CSOs, and journalism organisations themselves. The systematic and arbitrary harvesting of journalists’ information, tracking and targeting of
...
journalists is on the increase especially in the SADC region where some regimes seek to retain control of the media and stifle divergent views and suffocate opponents. In countries such as Zambia, Zimbabwe, Namibia and Malawi, there is deep-rooted fear that enacted cyber laws are already being used for surveillance purposes. For instance, South Africa uses the RICA Act to regulate the interception of communication and Zimbabwe has the Interception of Communications Act while Zambia deploys the Electronic Communications and Transactions Act of 2009. Thus, anecdotal evidence in Southern Africa shows that governments in the region are increasingly resorting to digital tools for surveillance and this is a serious cause for concern. At least three Southern African countries; Botswana, Zambia, and Zimbabwe have acquired sophisticated tools developed by an Israeli company, Circles, which they use to monitor the behavior of their citizens online. This calls for journalists, their organisations and other media- support institutions to act in ways that protect journalists from surveillance, be it by state or non-state agency. There is need, therefore, to come up with a toolkit of strategies that journalists in Southern Africa can make use of in quotidian news gathering and reporting practices." (Introduction)
more
"These guidelines aim to provide a general framework for judicial actors to assess matters of privacy and data protection in the face of other rights, such as freedom of expression and the right to privacy. The document includes relevant case law from various national, international and regional bod
...
ies that may inform judicial actors’ understanding of the matters at hand. It draws a coherent line from privacy rights to data protection rights and the challenges of upholding these rights in the face of new technologies." (Page 2)
more
"En la era digital los equipos electrónicos y la información manejada por los activistas y defensores de Derechos Humanos también están en riesgo. La seguridad digital, está compuesta por un conjunto de herramientas, hábitos y métodos empleados para proteger los equipos electrónicos y la inf
...
ormación manejada a través de ellos. Esta guia explica puntos sobre seguridad digital y da recomendaciones." (Publisher description)
more
"In the past few years, many countries across the continent have enacted various laws that permit surveillance, mandate telecommunication intermediaries to facilitate the interception of communication, stipulate the mandatory collection of biometric data, limit the use of encryption, require the loc
...
alisation of personal data, and grant law enforcement agents broad search and seizure powers. This report therefore maps and analyses the laws and policies that impact on privacy, notably those that regulate surveillance, limitations on encryption, data localisation, and biometric databases. This analysis could inform remedial and mitigatory steps to protect the right to privacy, which may include strategic litigation and advocacy for legislative and policy reforms. Moreover, the results of this analysis are also crucial for monitoring developments and trends on privacy regulation and practice in the region." (Introduction, page 5-6)
more
"This report documents the emerging and current trends in biometric data collection and processing in Africa. It focuses on the deployment of national biometric technology-based programmes on the continent, and the associated challenges, gaps and risks that are posed to data protection and privacy."
...
(Introduction, p 3)
more
"Die in diesem Open-Access-Buch zusammengeführten interdisziplinären Untersuchungen des „Forums Privatheit“ gehen der Frage nach, wie sich die Verwirklichungsbedingungen von Privatheit und Selbstbestimmung durch die Digitalisierung aller Lebensbereiche radikal ändern. Nahezu jede Lebensregung
...
hinterlässt Datenspuren, ermöglicht vielfältige und intensive Datensammlungen über Menschen, unterstützt Verhaltensbeeinflussungen und verstärkt Ungleichgewichte in der Informationsmacht. Es analysiert die Auswirkungen der Digitalisierung auf den rechtlichen und politischen Schutz der Grundrechte, die ökonomischen Beziehungen, die gesellschaftliche Integration und die individuelle Entfaltung. Das Buch zeigt aber auch auf, wie Digitalisierung und ihre gesellschaftlichen Rahmenbedingungen technisch, sozial, ökonomisch und rechtlich gestaltet werden können, um Privatheit und Selbstbestimmung zu schützen." (Verlagsbeschreibung)
more
"This research was conducted to assess the digital security posture among independent media organizations in Lebanon. It is significant for media organizations in Lebanon to maintain a good standard of digital security, especially in an era when press freedom is increasingly under attack." (Introduc
...
tion and Methodology, 5)
more
"The handbook is an advocacy tool that details laws and regulations that enable and impact freedom of expression, media freedom, work of human rights defenders and activists in Zambia." (Publisher description)
"Die neuen sozio-technischen Verhältnisse der digitalen Transformation fordern neuzeitliche Konzepte des »souveränen Staates« und des »souveränen Subjekts« heraus, was in Debatten um »digitale Souveränität« problematisiert wird. Die Beiträger*innen des Bandes diskutieren diese Herausford
...
erungen für zentrale gesellschaftliche Teilbereiche (u.a. Recht, Politik, Wirtschaft, Technik und Ethik) und tragen damit zu einer Systematisierung und Anreicherung der öffentlichen und wissenschaftlichen Diskussion bei. Zentrale Bruchlinien sind dabei neben Souveränitätskonzepten auch die Selbst- und Fremdbestimmung sowie der Umgang mit Daten." (Verlagsbeschreibung)
more