Search database
Filter
318
Featured
Topics
25
25
19
18
16
16
15
15
11
11
11
10
10
9
9
9
9
9
8
8
8
8
8
8
8
7
7
7
7
7
6
6
6
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
83
35
17
9
8
8
8
7
6
3
1
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"Digitale Gewalt kommt nicht nur im öffentlichen Raum vor, sondern auch in privaten Beziehungen – und hat in Kombination mit häuslicher und sexualisierter Gewalt eine deutlich geschlechtsspezifische Komponente. Durch Informations- und Kommunikationstechnologien haben Gewaltformen wie Doxing, Sta ... more
"Hay una variedad de estrategias y enfoques que se pueden aplicar para enseñar a la Alfabetización mediática e informacional (AMI), los cuales se centran en el conocimiento, la actitud y las habilidades. Por supuesto, las y los capacitadores están en la libertad de modificar las metodologías pr ... more
"The Digital Enquirer Kit is an e-learning course that guides learners through lessons on how to prevent the spread of misinformation, available on the free platform atingi.org. The course covers topics including media literacy, verification, and how to navigate the internet safely. The first four m ... more
"Jeder von uns hinterlässt Datenspuren, beim Surfen, Onlineshopping und in den Social Media. Es sind der Staat, die Wirtschaft, aber auch Kriminelle, die Zugang zu diesen Daten haben oder sich zu verschaffen wissen. Dieser Sachverhalt hat große Bedeutung für den Einzelnen, aber auch für die demo ... more
"The purpose of this ex-post evaluation is for Internews to understand the impact that Safe Sisters has had on women in East Africa by documenting and publicly sharing their stories and evaluating the training approach itself. As women and girls come online for the first time, they disproportionatel ... more
"The module aims to: 1. Clarify the concept of information security, privacy and related concepts; 2. Describe threats to information security and how they can be addressed; 3. Discuss the requirements for the establishment and implementation of policy on information security, as well as the life cy ... more
"The interviews and the analyses by the experts show that: –– Quality content increases safety. The editors interviewed for this publication confirm that fair and balanced journalism, which clearly distinguishes between facts and opinion and treats the people at the center of the story with resp ... more
"This report aims to bridge two communities – the broader development community and the cybersecurity capacity building community – to achieve more resilient outcomes by ensuring incorporation of cybersecurity and digital resilience into digital development activities. This report is a product o ... more
"The Girls Online (GO!) Cybersafety project (GO! Cyber) aims to equip young women and girls with the skills and resources to participate meaningfully and safely in cyberspace. The project is implemented by CARE Vanuatu and Sista with the support of Australia’s Cyber and Critical Tech Cooperation P ... more
"Of the eight countries surveyed here, only four have comprehensive data protection privacy acts in place: Kenya, South Africa, Togo and Uganda. But as these research reports suggest, this is not necessarily a strong indicator of whether a country is committed to privacy rights, or of the efficacy o ... more
"The Digital Ecosystem Framework is organized around three separate, overlapping pillars: Digital Infrastructure and Adoption: the resources that make digital systems possible and how individuals and organizations access and use these resources; Digital Society, Rights, and Governance: how digital t ... more
"This report outlines the relevance of gender norms to cybersecurity. It draws on existing research, supplemented by stakeholder and expert interviews, to assess gender-based differences in the social roles and interaction of women, men and non-binary people of all ages reflected in the distribution ... more
"There is no question that we must address the issues of child safety, disinformation, national security, and criminal activity in the digital age. However, even if the stated end goal for mandating encryption backdoors is legitimate, the means must be necessary and proportionate. Deliberately intro ... more