"The Digital Ecosystem Framework is organized around three separate, overlapping pillars:
Digital Infrastructure and Adoption: the resources that make digital systems possible and how individuals and organizations access and use these resources;
Digital Society, Rights, and Governance: how digital t
...
echnology intersects with government, civil society, and the media;
Digital Economy: the role digital technology plays in increasing economic opportunity and efficiency.
USAID’s Digital Ecosystem framework encompasses four cross-cutting topics:
Inclusion: reducing disparities in access and the “digital divide”;
Cybersecurity: protecting information against damage, unauthorized use or modification, or exploitation;
Emerging Technologies: encompassing artificial intelligence, Internet of Things, blockchain, 5G and other new technologies;
Geopolitical Positioning: the influence of authoritarian states that are actively working to shape the global digital space." (https://www.ictworks.org/usaid-digital-ecosystem-framework)
more
"This Primer is intended to increase awareness and provide a basic understanding of cyber threats, cybersecurity, and cyber resilience as they relate to development programming for USAID staff. It does not provide specific cybersecurity programming or operational recommendations or address technical
...
cybersecurity needs of USAID or its implementing partners. This Primer is a resource on cybersecurity for the broader development community and spotlights how USAID’s approach to cybersecurity in development is evolving." (Page 7)
more
"This report aims to bridge two communities – the broader development community and the cybersecurity capacity building community – to achieve more resilient outcomes by ensuring incorporation of cybersecurity and digital resilience into digital development activities. This report is a product o
...
f the partnership between the World Bank and the Global Forum on Cyber Expertise (GFCE) Foundation, who recognize the importance of including cybersecurity, digital resilience, and cyber capacity building (CCB) as components of development projects. They also understand that advocates are needed to promote the eligibility of these activities for assistance in the broader development agenda." (Aim and objectives, page 11)
more
"In this report, we highlight how privacy and data protection violations by state and non-state actors are compounded by the lack of legal data protection safeguards which would obligate public entities, private companies, and international organizations to respect and adhere to data protection prin
...
ciples, empower users to take agency and control over their personal information, and create mechanisms for grievance and redress when such violations occur. We explore these issues and propose safeguards and policy recommendations for those involved in the collection and processing of personal data: governments, private companies, and international aid organizations. We include case studies for Jordan, Lebanon, Palestine, and Tunisia. Our goal is not to include an exhaustive list of all cases related to data protection, but to present a few key illustrative cases for each country." (Executive summary, page 3)
more
"This book frames digital sovereignty as a right to be claimed and a process constantly in the making, as a condition of the ability to critically partake in the digital transformation. Emphasizing a political and transformative significance of the term, this interdisciplinary publication gathers sc
...
holars, activists, artists and human rights advocates who develop practices or provide spaces and structures to foster sophisticated means of digital involvement. Its aim is to identify diverse facets of what it means to be digitally sovereign, but also to critically discuss the viability of the term, especially in the light of modern-day crises and for the many future challenges yet to come. The positions assembled in this volume analyze new opportunities for social participation and policy making and recommend alternative technological and social practices utilized by various groups and collectives – both before and after COVID-19." (Introduction, page 13)
more
"There is no question that we must address the issues of child safety, disinformation, national security, and criminal activity in the digital age. However, even if the stated end goal for mandating encryption backdoors is legitimate, the means must be necessary and proportionate. Deliberately intro
...
ducing security weaknesses in encrypted systems fails this test. Weakening encryption will create more dangers than it will prevent. Further, there is no evidence base for claiming that breaking encryption will achieve the desired outcomes. At best, exceptional access to encrypted content will only serve as a short-term or partial solution for law enforcement. As we have explained in this brief, encryption is a vital tool for the protection of human rights, democracy, cybersecurity, and the economy. The right to privacy and the right to freedom of expression are basic human rights, and in today’s digital world, we cannot meaningfully separate these rights from the need for secure online communication channels that are free from undue surveillance. Encryption is a crucial building block for a secure technological infrastructure, and governments should promote its use, not repeatedly seek to undermine it." (Conclusion, page 16)
more
"Hay una variedad de estrategias y enfoques que se pueden aplicar para enseñar a la Alfabetización mediática e informacional (AMI), los cuales se centran en el conocimiento, la actitud y las habilidades. Por supuesto, las y los capacitadores están en la libertad de modificar las metodologías pr
...
opuestas y desarrollar sus propios métodos de enseñanza. Sin embargo, deben tener muy claros sus objetivos y la manera de alcanzarlos. Deben también reflexionar sobre sus estrategias de formación después de cada sesión. Asimismo, es importante que sean conscientes de sus hábitos con relación a los medios de comunicación y de cómo estos influyen en su enseñanza. Se anima a las y los capacitadores a que sigan estos cinco pasos para la formación en AMI: acceder, analizar, crear, reflexionar y actuar (AACRA)." (Página 9-10)
more
"This pioneering curriculum presents a comprehensive competency framework of media and information literacy and offers educators and leraners structured pedagogical suggestions. It features various detailed modules covering the range of competencies needed to navigate today’s communications ecosys
...
tem. This resource links media and information literacy to emerging issues, such as artificial intelligence, digital citizenship education, education for sustainable development, cultural literacy and the exponential rise in misinformation and disinformation. With effective use of this media and information literacy curriculum, everyone can become media and information literate as well as peer-educators of media and information literacy." (Short summary)
more
"The Digital Enquirer Kit is an e-learning course that guides learners through lessons on how to prevent the spread of misinformation, available on the free platform atingi.org. The course covers topics including media literacy, verification, and how to navigate the internet safely. The first four m
...
odules have been authored by Tactical Tech: Module 1: Identifying and Responding to Misinformation; Module 2: Verifying Online Information; Module 3: Collaborating on and Documenting Your Digital Enquiry; Module 4: Examining and Sharing Your Findings. Access the course on digitalenquirer.org or track your progress and earn a certificate on atingi.org. The content contains simple explanations and real-world examples, illustrating secure research and information-gathering methods. The modules feature engaging and creative formats such as tutorials, quizzes, and interactive games. The contents are data-light and available in offline mode via the free atingi Android app. The Digital Enquirer Kit is available in English (including West African, East African, South African, and Southeast Asian dialects), Arabic, Bahasa Indonesian, Brazilian Portuguese, French, Hausa, Hindi, Sinhala, and Swahili, among other languages." (https://tacticaltech.org/projects/Digital-Enquirer-Kit)
more
"The Girls Online (GO!) Cybersafety project (GO! Cyber) aims to equip young women and girls with the skills and resources to participate meaningfully and safely in cyberspace. The project is implemented by CARE Vanuatu and Sista with the support of Australia’s Cyber and Critical Tech Cooperation P
...
rogram and ABC International Development. The GO! Cyber project started with a series of co-design workshops, supported by Portable Design Studio, with young women aged between 18-30 years old to understand how young women and girls navigate cyberspace. While there have been interventions to enhance cyber safety in Vanuatu in recent years, there is little research to understand the experiences and behaviours of young women and girls in cyberspace. The guiding principle of the GO! Cyber project is recognising young women as experts of their own experience, so they led the identification and exploration of cyber safety rights, experiences, and issues. The young women then proposed contextually relevant, needs-based and practical solutions for their online safety, which included a series of informative videos and this booklet." (Why this booklet, page 6)
more
"The interviews and the analyses by the experts show that: –– Quality content increases safety. The editors interviewed for this publication confirm that fair and balanced journalism, which clearly distinguishes between facts and opinion and treats the people at the center of the story with resp
...
ect tends to lead to increased respect from the audience and makes the journalists less of a target for potential attackers. It also increases trust on the part of audiences as well as with advertisers willing to pay for content. –– Audience engagement plays a crucial role in terms of safety. No matter whether through a membership model, regular informal exchanges or listener clubs — an audience that values a certain media outlet will be less likely to accept any attacks against it. –– Flexible and resilient business models are a must-have. They help organizations to react to new threats, to adapt strategies, and to maintain high quality and independent reporting in times of crisis. –– No viability without digital security. A media outlet that loses all its data or whose data gets hacked and its sensitive sources revealed, loses everything: content and credibility. Online attacks are more likely and easier to carry out than physical attacks. Digital security is an essential part of any safety concept. –– Diversity pays off. During the COVID-19 crisis, women and minority groups came under particular attack all around the world, online and offline. To include their stories and perspectives is not only a moral obligation but also makes business sense as they make up an essential part of audiences anywhere on the globe." (Synopsis, page 39)
more
"Based on the needs assessment, a high proportion of women in Cameroon face online violence and are increasingly concerned about their safety in digital spaces. However, many of these respondents are unaware of any legal protections offered to them. Additionally, they believe that they lack the appr
...
opriate knowledge to protect themselves in these digital spaces. Results from the needs assessment show that there is a significant need for training programs aimed at building digital security awareness and digital hygiene skills." (Conclusion)
more
"The internet brought new opportunities for Pakistan to develop into a progressive society and a more democratic country, and it opened doors for more forms of criminal activity (like fraud, child pornography, etc.), more intimidation and the spreading extremism, and more information gathering on ci
...
tizens by business and state agents. It will be highly important to Pakistan to more actively and more successfully develop the positive sides of IT technology, internet services, and the social media, while at the same time check its excesses, problems and abuses. FES Pakistan is delighted to present the report “Internet Landscape 2020” It is providing an excellent overview of internet usage, and on its dangers and opportunities. We hope, the report will facilitate a broad discussion about the use and further development of the internet in Pakistan, to fully tun it into another means for Pakistan to utilize its full potential and develop into a more progressive, citizen-oriented country." (Preface, page 4)
more
"Each section of this guide will explore another dimension of digital security—assets, attackers, risks and likelihood—and address these key questions: What do I want to protect? Who are my attackers? Is my attacker able to succeed? How likely is it that my attacker will succeed? Threat modeling
...
consists of two types of assessments: Firstly, an analysis of the project’s environment (questions one and two). Secondly, an estimation of the likelihood that potential attacks will really happen (questions three and four). To prepare for threat modeling, we have added a “question zero” for project managers: Who are we and what do we do? This helps to establish a clear understanding of the entire project, with all of its workflows and challenges that employees face in their day-to-day work environment. A threat model is the basis for a digital security concept that should be developed along with IT experts so that your concept is both technically sound and practically enforceable. Having a clearly defined list of assets and their vulnerability empowers employees to protect them with appropriate countermeasures, and educates them on risks. This will increase the efficacy of a security concept in practice." (Executive summary)
more