"Como se podrá observar en cada una de las páginas del texto, en realidad las tecnologías están diseñadas para incrementar los mecanismos de penetración del capitalismo y otras formas de dominación en cada una de las esferas de nuestras vidas. En este sentido, es menester observar las relacio
...
nes sociales bajo las cuales se construyen y desarrollan, sus fines y su capacidad de asombrarnos ante las posibilidades que nos ofrecen. Sólo un análisis crítico de estas contradicciones nos puede permitir transformarlas para convertirlas en herramientas que, no sólo rompan estas formas de dominación y fetichización, sino que coadyuven a la realización de los objetivos, sueños y deseos que las propias personas, colectivos, organizaciones o comunidades han decidido autónomamente llevar a cabo. La comunicación y sus tecnologías, como es señalado por las propias experiencias de comunicación y es bien acogido en las líneas de este texto, no se ven como fines en sí mismas. A diferencia de lo que ocurre en los medios de comunicación masiva o en las grandes empresas de telecomunicaciones en donde se piensa en productos o contenidos para vender o hacer propaganda. En las experiencias de comunicación como las que se recogen en el libro, la comunicación es vista a partir del proceso social en el que se construye de manera colectiva un determinado mensaje. En este proceso es en donde reside la importancia de estas experiencias; no se trata del mensaje o el producto final en sí mismo, sino en la capacidad y el diálogo que se genera en todo el proceso. Las tecnologías son sólo herramientas que se necesitan analizar críticamente y transformar para que se logren los objetivos que las mismas comunidades, organizaciones o colectivos se propongan." (Prólogo, página 9-10)
more
"In 2021, the international community has the chance to radically reform global digital governance. The aim should be to guarantee a global, open, free, stable and secure Internet while promoting responsible State behaviour in cyberspace. Mapping the two strands of this policy – improving models f
...
or cooperation on the collective development of Internet governance, and implementing the cyber norms already adopted – is a matter for the United Nations (UN). A reformed architecture for digital cooperation has the potential to make Internet governance more inclusive and effective, while new mechanisms can help to advance the currently divided debate on cyber norms and enhance the predictability of State behaviour in cyberspace." (Page 1)
more
"The Institut für Auslandsbeziehungen (ifa) supports civil society actors worldwide in their advocacy for democracy and peace, encourages dialogue within civil society and contributes to the protection of minorities and persons at risk. With the fellowships of the CrossCulture Programme (CCP), ifa
...
supports the interlacing of German and foreign civil society actors from the cultural, educational, scientific, artistic and medial sectors from more than 40 partner countries. The goals for the participating fellows and organisations are to broaden and deepen their expertise, share and acquire intercultural skills, learn from each other and impart their own knowledge. »Digital Civil Society« is one of the focal topics of the programme which is treated within the scope of CCP Fellowships and thematic workshops. In 2019, CCP fellows, alumni and experts came together in a workshop to exchange ideas, share practices and seek solutions in the fields of digital inclusion and digital security. This publication is the product of this global cross-cultural cooperation and collects personal commentaries, best-practice examples and recommendations for action." (Back cover)
more
"[...] se identificaron rápidamente las principales temáticas a incluir en el libro. Estas son: acceso a Internet y derechos humanos online, populismo y desinformación, privacidad, ciberseguridad, big data y datos abiertos, teleeducación, teletrabajo, cooperación digital y transformación digit
...
al de las empresas. El libro tiene como propósito mostrar cómo Internet, en tiempos de la COVID-19, desde diversas áreas, le ha servido a la humanidad, pero en particular a nuestra región, que, con una perspectiva latinoamericana, ha sabido tomar como referencia experiencias globales. Además, su objetivo es presentar los nuevos retos y riesgos que han surgido, a fin de demostrar cómo estos pueden atenderse coordinadamente entre los diversos actores comprometidos para minimizar su impacto." (Introducción, página 19)
more
"There is no “one size fits all” approach to digital contact tracing technologies (DCTT). Technology design should not be static, but it should be capable of evolving depending upon local conditions, new evidence, and changing preferences and priorities. Technology companies alone should not con
...
trol the terms, conditions, or capabilities of DCTT, nor should they presume to know what is acceptable to members of the public. DCTT should be designed to have a base set of features that protect privacy, with layers of additional capabilities that users may choose to activate. An initial default should be that user location data are not shared, but users should be provided with easy mechanisms and prompts to allow for opting-in to this capability, with encouragement to the public if it is shown to be critical to achieving public health goals. Data collected through DCTT should be made available to public health professionals and to researchers in de-identified form to support population-level epidemiologic analyses." (Summary, page 2)
more
"This publication is a compilation of 19 articles by African researchers, academics, journalists and human and digital rights activists on the impact of the COVID-19 pandemic on digital rights in Africa. The articles were commissioned by the African Declaration on Internet Rights and Freedoms (AfDec
...
) Coalition as part of its project on “Securing human rights online in Africa through a strong and active ‘African Declaration on Internet Rights and Freedoms’ network”. The AfDec Coalition is a pan-African initiative which promotes human rights standards and principles of openness in internet policy formulation and implementation on the continent, guided by the 13 principles established in the African Declaration on Internet Rights and Freedoms. At the time that the papers were commissioned, in June 2020, African states had either invoked existing policies or adopted new policies for prevention of spread, containment and treatment of the virus that had an impact on the enjoyment of digital rights. For example, most governments employed the use of contact tracing applications to track and trace citizens’ movements and put in place measures criminalising free speech when it contained false information about the pandemic. These two examples had the potential to be abused, particularly the latter, which was used to silence journalists and government critics. The pandemic also moved most citizens’ communication, education, work, trade and access to basic services from physical interactions to primilary online interactions. However, the continent is still largely made up of informal economies, has a low internet penetration rate of 28.2% (far below the global average of around 53%), and has seen an increase in reports of digital rights violations resulting from repressive cyberlaws, making the efforts to address the pandemic inadequate and inequitable. These articles offer reflective analyses on government efforts to curb the COVID-19 pandemic from the perspective of the AfDec principles, with a focus on a number of the principles including privacy and personal data protection, gender equality, freedom of expression, internet access and affordability, and the right to development and access to knowledge." (Introduction)
more
"This document is a compilation of the outcomes of the research component of a small project entitled “Putting cybersecurity on the rights track” that the Association for Progressive Communications (APC) implemented during the course of 2019 with the participation of APC members." (About this pr
...
oject, page 4)
more
"Understanding and improving the science behind the algorithms that run our lives is quickly becoming one of the most pressing issues of this century. Traditional solutions, such as laws, regulations and watchdog groups, have proven woefully inadequate, at best. Derived from the cutting-edge of scie
...
ntific research, The Ethical Algorithm offers a new approach: a set of principled solutions based on the emerging and exciting science of socially aware algorithm design. Weaving together the science behind algorithm design with stories of citizens, lawyers, scientists, and activists experiencing the trial-and-error of research in real-time, Michael Kearns and Aaron Roth present a strikingly original way forward, showing how we can begin to work together to protect people from the unintended impacts of algorithms—and, sometimes, protect the science that could save us from ourselves." (Publisher description)
more
"Commonly held truths surrounding privacy and data protection may negatively impact the design of effective policy and regulatory solutions. Debunking the privacy paradox in the context of public intersections with data subjects helps to highlight how individualized privacy self-management strategie
...
s are problematic as the sole (or chief) model for data protection. Identity projects, given the high level personal identifiable data required, are an important vulnerability context for considering new solutions on collective rights and protections." (Page 1)
more
"This Digital Citizenship Toolkit (DCT) is an attempt to introduce key concepts related to digital citizenship while taking into account the local socio-economic realities, technology adoption patterns, societal actions and other considerations. For young people, in particular, the demarcation betwe
...
en online and offline is completely blurred. Therefore, in this book we do not separate the online from offline. Instead we consider it as part of a continuum, encouraging respectful and responsible behaviour in all spaces and environments. The Toolkit is presented as seven inter-linked modules. Each module starts with a brief overview, and clarification of key terms. It is followed by an exploration of the key topics coming under the module’s theme. One or more case studies are offered to illustrate some of the concepts, and wherever possible we have compiled examples and experiences from Sri Lanka." (About this digital citizenship toolkit)
more
"Specifically, the review focuses on the means, barriers, and associated cybersecurity and privacy concerns that refugees face around connectivity. This includes but is not limited to mobile connectivity and social media, particularly in displacement contexts. While these subjects may at times inter
...
sect with parallel conversations on digital identity or biometrics, the latter are not the focus of this chapter. UNHCR provides support and international protection to forcibly displaced persons, including refugees, returnees, stateless people, the internally displaced and asylum-seekers. This report will reference ‘refugees’ and this can be read broadly to encompass refugees and other persons of concern, unless explicity stated otherwise. This literature review is divided into different sub-themes. An annex also provides a brief overview of who are the main actors writing about connectivity in humanitarian contexts, and with what angles and / or interests." (Introduction)
more
"Divisive Internet regulation is fragmenting the formerly worldwide web into numerous shards that follow their own rules. The US, the EU and China are influential in shaping regulation even beyond their own jurisdictions, with consequences for human rights, particularly in Africa. This paper argues
...
that, as of 2020, the Western post-9/11 security agenda and uncontrolled digital capitalism had a more detrimental impact on Internet regulation in Africa than the authoritarian Chinese concept of Internet sovereignty, seriously affecting freedom of expression and the right to privacy online. However, particularly authoritarian governments in Africa use China’s economic and political agenda to their advantage, leaving civil societies at the mercy of digitally empowered states. Direct ways of impacting Internet regulation in Africa include loans, development programs or influential laws, whereas indirect means include engagement in multilateral and multi-stakeholder fora. Besides the political and economic interests of states, the datafication agendas of ICT corporations shape Internet landscapes in Africa. An emerging data protection framework pushed by the EU has the potential to mitigate their impact. Other means of protecting human rights require a united approach by the African Union and a deconstruction of digital capitalism and dependence relations between African states and the Global North." (Abstract)
more
"Open-source intelligence gathering and analysis (OSINT) techniques are no longer predominantly the remit of private investigators and journalists. An estimated 80-90% of data analysed by intelligence agencies is also now derived from publicly available material. Additionally, the massive expansion
...
of the internet and, in particular, social media platforms, have made OSINT increasingly accessible to civilians who simply want to trawl the Web for information on a specific individual, organisation or product. In May 2018, the European Union’s General Data Protection Regulation (GDPR) was implemented in the UK through the new Data Protection Act, intended to secure personal data against unjustified collection, storage and exploitation. This document presents a preliminary literature review of work related to the GDPR and OSINT, which was collated as the basis for an as-yet-unpublished study evaluating the effects of the GDPR on OSINT capabilities in the UK. The literature reviewed is separated into the following six sections:‘What is OSINT?’,‘What are the risks and benefits of OSINT?’,‘What is the rationale for data protection legislation?’,‘What are the current legislative frameworks in the UK and Europe?’,‘What is the potential impact of the GDPR on OSINT?’, and ‘Have the views of civilian and commercial stakeholders been sought and why is this important?’. As OSINT tools and techniques are accessible to anyone, they have the unique capacity for being used to hold power to account. It is therefore important that new data protection legislation does not impede civilian OSINT capabilities." (Abstract)
more