"This book has compiled the tech policy debate into a toolkit for policy makers, legal experts, and academics seeking to address platform dominance and its impact on society today. It discusses the global consensus around technology regulation with recommendations of cutting-edge policy innovations
...
from around the world. It also explores the proposed policy toolkit through comprehensive coverage of existing and future policy on data, antitrust, competition, freedom of expression, jurisdiction, fake news, elections, liability, and accountability. The book identifies potential policy impacts on global communication, user rights, public welfare, and economic activity. It outlines a policy framework that address the interlocking challenges of contemporary tech regulation and offer actionable solutions for the technological future." (Publisher description)
more
"The consumer Internet of Things (IoT) is a fast-growing area of technology, increasingly embedded in the public and private spheres, including both in and on bodies. There are various security concerns and academic investigations into potential risks of this expansion, but none yet specifically add
...
ressing the implications to journalists and the democratic pillar of press freedom. Not only are risks to this community not yet assessed, but IoT threats generally are not communicated without technical jargon, making them inaccessible to non-experts. Given the importance of a free press, mapping IoT devices and, crucially, communicating associated risk in ways understandable and actionable to journalists themselves, is key.
Journalists and the press are particularly at-risk from IoT devices that may feature in the environments with which they must regularly interact because of the fundamental imperative of source confidentiality. Previous research demonstrated that members of the press are largely unaware of the ways in which the IoT can threaten their work and wellbeing. The networked capabilities of IoT devices increases the ease with which well-resourced threat actors can target journalists who routinely handle confidential information and are already at risk around the world from a variety of non-IoT threats. This paper therefore presents a novel categorisation of both ambient and wearable consumer IoT devices according to the environments in which journalists are most likely to interact with them. It draws on related academic work classifying devices for technical audiences to create a system that is accessible to journalists and their sources. Its goal is to make members of the media aware of the prevalence of these technologies and which of the devices’ capabilities may increase their individual risk. Useful risk assessments cannot be undertaken without an accurate understanding of where threats may be encountered. By systematically outlining risks in numerous environments, this taxonomy can be easily incorporated into existing security training materials and risk assessments for journalists. This paper presents a novel taxonomy to codify and organise IoT present in different environments, with examples of how journalists and their work could be impacted, both passively (i.e. via surveillance) or actively (i.e. via information theft). It also discusses how different environments that may contain IoT devices are often under the control of actors whom journalists cannot easily influence, nor protect themselves against. Especially as these devices continue to proliferate, journalistic risk from IoT devices in surrounding environments are growing. It is therefore important to address the contemporary and emerging risks to journalism that are associated with connected devices. This paper enables journalists and readers to not only visualise and conceptualise how IoT devices in different environments may create risks, its user-focused language and organisation also empower journalists to begin to use this taxonomy for awareness, mitigation, and protective purposes." (Abstract)
more
"The OECD Policy Framework on Digital Security helps policy makers understand the economic and social dimension of cybersecurity, raises their awareness about the OECD approach to digital security policy, and encourages them to make use of OECD digital security recommendations to develop better poli
...
cies. The Framework provides a helpful narrative based upon OECD digital security recommendations and identifies linkages with other policy areas addressed through existing OECD standards and tools." (Foreword, page 3)
more
"This report seeks to serve two purposes. The first is to research and document the state of media freedom and safety of journalists in Africa and to provide specific and evidence-based recommendations to guide policy makers, media development organisations and other media freedom and human rights a
...
ctors to address identified gaps that undermine the safety of journalists and media freedom in Africa. Secondly, the report seeks to reinforce the safety of journalists and enhance legal and institutional frameworks by providing recommendations to support the implementation of the UN Plan of Action on the Safety of Journalists (UNPoA) and the Issue of Impunity" (Introduction, page 6)
more
"This is a report on the health of the open-source digital safety tool ecosystem that draws from the BASICS experience. Internews' BASICS project (Building Analytical and Support Infrastructure for Critical Security tools) was a 30-month initiative to strengthen the capacity of open source digital s
...
afety tool development teams ("tool teams") to better understand their vulnerable users, respond to urgent security and privacy threats, and evaluate their impact. BASICS set out to address the unique challenges faced by tool teams in order to improve the protection of the users of these tools. Vulnerable populations, such as human rights defenders and marginalized groups, count on independently-developed open source digital safety tools not only to provide safety and censorship circumvention, but also to avoid reliance on cloud-based services which can be censored or hacked, and to protect themselves from costly licensing issues when using commercial tools. Many of the most popular and most critical open source digital security tools are maintained and updated by "tool teams" rather than businesses or organizations. These ad-hoc groups have little if any institutional capacity, are often under-resourced, and have limited insight into the specific needs of at-risk users." (Publisher description).
more
"The guidelines contained here specify steps and measures that newsrooms and journalists in West Africa can take to mitigate the problem of online abuse. The purpose is not to shield journalists from criticism or promote the criminalization of online speech, but to deal with a real threat facing jou
...
rnalism today, which has the potential to erode press freedom in West Africa if it goes unchecked." (Introduction, page 4)
more
"This report examines the widespread use of encrypted messaging apps (EMAs) in developing countries and emerging democracies has prompted news outlets in these regions to experiment with them as mechanisms for distributing the news. From news products designed specifically for sharing via EMAs to pr
...
ivate channels used to circumvent restrictions in repressive media environments, media outlets are testing how best to use these apps to reach audiences even in the face of technical challenges, resource demands, and sometimes, political pressure. The document concludes that a) news outlets are turning to EMAs to reach new audiences and to bypass state censorship in authoritarian contexts; b) many newsrooms are experimenting with monetizing EMA content, however, it is still too early to tell whether EMAs can provide a reliable revenue stream; c) platform dependency is a big issue when it comes to using EMAs for news-policy changes can have a big impact on how news outlets interact with their audiences." (Publisher description)
more
"International contributors assess a variety of key contexts that impact access to digital technologies, including contextual variations related to geography and infrastructure, as well as individual differences related to age, income, health and disability status. Chapters explore how variations em
...
erge across the life course, illustrating the effects of digital disparities on personal wellbeing. Intervening in critical debates relating to the digital divide, this Handbook offers key insights into privacy and trust issues that affect technological usage." (Publisher description)
more
"The purpose of this ex-post evaluation is for Internews to understand the impact that Safe Sisters has had on women in East Africa by documenting and publicly sharing their stories and evaluating the training approach itself. As women and girls come online for the first time, they disproportionatel
...
y face violence, which creates risks to their physical safety and stifles their ability to capture the Internet’s transformative economic and social potential. Internews, together with partner DefendDefenders — a Uganda-based non-governmental organization (NGO) — developed the Safe Sisters program, a year-long fellowship that provides women human rights defenders and journalists with the techniques and tools they need to navigate online spaces safely, assume informed risks, and take control of their lives in an increasingly digital world." (Publisher description)
more
"Jeder von uns hinterlässt Datenspuren, beim Surfen, Onlineshopping und in den Social Media. Es sind der Staat, die Wirtschaft, aber auch Kriminelle, die Zugang zu diesen Daten haben oder sich zu verschaffen wissen. Dieser Sachverhalt hat große Bedeutung für den Einzelnen, aber auch für die demo
...
kratische Gesellschaft, die es zu verstehen gilt. Barbara Wiesner stellt Aspekte der Verarbeitung von privaten Daten vor, die Laien selten bekannt sind. Dabei orientiert sie sich an Zitaten von Persönlichkeiten aus Wirtschaft, Wissenschaft und Politik und regt dazu an, sich eine eigene Meinung zu bilden. So wird das Thema Privatheit vor dem Hintergrund vielfältiger digitaler Datenkanäle ausgeleuchtet." (Verlagsbeschreibung)
more
"Digitale Gewalt kommt nicht nur im öffentlichen Raum vor, sondern auch in privaten Beziehungen – und hat in Kombination mit häuslicher und sexualisierter Gewalt eine deutlich geschlechtsspezifische Komponente. Durch Informations- und Kommunikationstechnologien haben Gewaltformen wie Doxing, Sta
...
lking, Hate Speech und Online-Belästigung und -Bedrohung stark zugenommen und durch die Nutzung des Internets ihre Wirkmächtigkeit verstärkt. Die Beiträger*innen des Bandes liefern für den Umgang mit diesen Gewaltformen grundlegende interdisziplinäre Analysen und diskutieren sowohl juristische, technische und aktivistische Interventionen als auch Erfahrungen aus der Beratungspraxis. Dabei werden zentrale politische Änderungsbedarfe ausgemacht und entsprechende Handlungsoptionen aufgezeigt." (Verlagsbeschreibung)
more
"Of the eight countries surveyed here, only four have comprehensive data protection privacy acts in place: Kenya, South Africa, Togo and Uganda. But as these research reports suggest, this is not necessarily a strong indicator of whether a country is committed to privacy rights, or of the efficacy o
...
f a country’s legislative environment in ensuring the right to privacy and data protection. Instead, reading across the reports, what can be described as an asymmetry between legislation and practice is evident at different levels. This asymmetry can be political – for example, Togo, an effective constitutional dictatorship marked by fierce government crackdowns on opposition and recent reports of surveillance of religious and political leaders, enacted a data protection law in 2019, and is one of the few countries in Africa to have ratified the African Union Convention on Cyber Security and Personal Data Protection (Malabo Convention). Yet, as the country author suggests, “This interest [by policy makers in digital rights] is not necessarily to protect the citizens but rather out of concern to adapt state policies to the global digital situation.” This asymmetry also concerns the regulatory framework for the implementation of a data protection act. Amongst the countries surveyed here, South Africa was the first to pass a protection of personal information act (in 2013), but still has not implemented the necessary regulations to give practical force to the law. In contrast, while Nigeria’s privacy law is still in draft form, it already has what the country author describes as “watershed” privacy regulations." (Introduction, page 5)
more
"This report outlines the relevance of gender norms to cybersecurity. It draws on existing research, supplemented by stakeholder and expert interviews, to assess gender-based differences in the social roles and interaction of women, men and non-binary people of all ages reflected in the distribution
...
of power (e.g. influence over policy decisions and corporate governance), access to resources (e.g. equitable access to education, wages or privacy protections), and construction of gender norms and roles (e.g. assumptions regarding victims and perpetrators of cyber-facilitated violence)." (Executive summary)
more
"The module aims to: 1. Clarify the concept of information security, privacy and related concepts; 2. Describe threats to information security and how they can be addressed; 3. Discuss the requirements for the establishment and implementation of policy on information security, as well as the life cy
...
cle of information security policy; and 4. Provide an overview of standards of information security and privacy protection that are used by some countries and international information security organizations." (Module objectives, page iv)
more
"We structured the report by beginning with an overview of the digital environment in the Philippines in 2020 before delving into the impact of technology on human rights: the key events, challenges and accomplishments, then a forecast of 2021 and 2022. These are divided into the following key thema
...
tic areas: Internet Access; Gender and Information and Communications Technologies (ICTs); Privacy and Data Protection; Freedom of Expression. This report is based on the Foundation for Media Alternatives’ (FMA) monitoring of situations where technology impacted human rights in the country. It covers the months of January to December 2020, and the analysis and scoping is conducted using secondary resources such as news articles, press releases and reports." (About this report, page 2)
more
"Beim so genannten „Scoring“ wird einer Person mithilfe algorithmischer Verfahren ein Zahlenwert zugeordnet, um ihr Verhalten zu bewerten und zu beeinflussen. „Super-Scoring“-Praktiken gehen noch weiter und führen Punktesysteme und Skalen aus unterschiedlichen Lebensbereichen zusammen, wie
...
etwa Bonität, Gesundheitsverhalten oder Lernleistungen. Diese Ver-fahren könnten sich zu einem neuen und übergreifenden Governance-Prinzip in der digitalen Gesellschaft entwickeln. Ein besonders prominentes Beispiel ist das Social Credit System in China. Aber auch in westlichen Gesellschaften gewinnen Scoring-Praktiken und digitale Soziometrien an Bedeutung. Dieser Open Access Band stellt aktuelle Beispiele von datengetriebenen sozialen Steuerungs-prozessen aus verschiedenen Ländern vor, diskutiert ihre normativen Grundlagen und gesell-schaftspolitischen Auswirkungen und gibt erste bildungspolitische Empfehlungen. Wie ist der aktuelle Stand einschlägiger Praktiken in China und in westlichen Gesellschaften? Wie sind die individuellen und sozialen Folgen zu bewerten? Wie wandelt sich das Bild vom Menschen und wie sollte bereits heute die politische und aufklärerische Bildung darauf reagieren?" (Buchrückseite)
more
"Wie wahren wir die Menschen-, Grund- und Bürgerrechte? Und wie können wir unsere Werte für die Gestaltung disruptiver Innovationen und der digitalen Zukunft nutzen? Die Autor*innen aus Politik, Wissenschaft und Praxis zeigen auf, wie technologische Phänomene mit unseren Werten in Einklang gebra
...
cht werden können und diskutieren normative Impulse und Ideen für die Regelung des Gemeinwohls in der digitalen Welt." (Verlagsbeschreibung)
more