"Open-source intelligence (OSINT) gathering and analysis techniques are used by investigators from a variety of fields, owing to their accessibility and exceptional capacity for corroboration. It has previously been argued that proposed data protection legislation can chill the free press, but there
...
have been no studies assessing the effect of such reforms on more general OSINT capabilities. European Union’s General Data Protection Regulation (GDPR) was implemented in the UK through the 2018 Data Protection Act (DPA) to protect personal data against exploitation. This study surveyed 16 OSINT gathering and analysis practitioners across public and private sectors to determine firstly, what, if any impact the implementation of the GDPR/DPA have had on their ability to successfully operate as OSINT analysts and secondly, if they have noticed any subsequent changes in UK public perception around issues of the surveillance state and digital privacy. I argue that this initial survey shows that the GDPR is merely a first step in establishing societal expectations and regulations around digital privacy. While some changes to OSINT practice have been reported, to date few substantive changes to OSINT methods or analysis resulted or seemed poised to take effect, one year after the advent of the GDPR/DPA." (Abstract)
more
"Die Ökonomen Achim Wambach und Hans Christian Müller zeigen die wesentlichen Problemfelder auf, die durch die Digitalisierung entstehen: die wachsende Macht weniger Großkonzerne, ein für Nutzerinnen und Nutzer undurchsichtiger Umgang mit ihren persönlichen Daten und eine zunehmende Spaltung au
...
f dem Arbeitsmarkt. Trotz dieser Probleme sehen sie im digitalen Wandel ein enormes Potenzial. Um es zu entfalten, bedürfe es der Gestaltung durch gezielte politische Maßnahmen. Wambach und Müller unterbreiten wettbewerbs- und ordnungspolitische sowie bildungs- und sozialpolitische Reformvorschläge, um das Versprechen der Sozialen Marktwirtschaft auf Wohlstand für alle zu erneuern." (Buchrücken)
more
"This third edition has been thoroughly updated to incorporate the latest research and developments, including the rise of Big Data, AI, and the Internet of Things. The book's case studies and pedagogical material have also been extensively revised and updated to include such watershed events as the
...
Snowden revelations, #Gamergate, the Cambridge Analytica scandal, privacy policy developments, and the emerging Chinese Social Credit System. New sections include "Death Online," "Slow/Fair Technology", and material on sexbots. The "ethical toolkit" that introduces prevailing ethical theories and their applications to the central issues of privacy, copyright, pornography and violence, and the ethics of cross-cultural communication online, has likewise been revised and expanded. Each topic and theory are interwoven throughout the volume with detailed sets of questions, additional resources, and suggestions for further research and writing." (Back cover)
more
"Journalists have long been the targets of both physical and cyber-attacks from well-resourced adversaries. Internet of Things (IoT) devices are arguably a new avenue of threat towards journalists through both targeted and generalised cyber-physical exploitation. This study comprises three parts: Fi
...
rst, we interviewed 11 journalists and surveyed 5 further journalists, to determine the extent to which journalists perceive threats through the IoT, particularly via consumer IoT devices. Second, we surveyed 34 cyber security experts to establish if and how lay-people can combat IoT threats. Third, we compared these findings to assess journalists' knowledge of threats, and whether their protective mechanisms would be effective against experts' depictions and predictions of IoT threats. Our results indicate that journalists generally are unaware of IoT-related risks and are not adequately protecting themselves; this considers cases where they possess IoT devices, or where they enter IoT-enabled environments (e.g., at work or home). Expert recommendations spanned both immediate and long-term mitigation methods, including practical actions that are technical and socio-political in nature. However, all proposed individual mitigation methods are likely to be short-term solutions, with 26 of 34 (76.5%) of cyber security experts responding that within the next five years it will not be possible for the public to opt-out of interaction with the IoT." (Abstract)
more
"The European Union (EU) recently passed the General Data Protection Regulation-a sweeping regulatory framework that sets a new global standard for the collection, storage, and use of personal data. To ensure far-reaching compliance with the GDPR, the EU has adopted a strict take-it-or-leave-it appr
...
oachcountries that wish to engage with digital users in the EU must either comply with the GDPR's expansive data obligations or risk losing access to the world's largest trading block. This presents significant obstacles for several African nations. Notably, no African country currently has domestic laws that comply with the GDPR. Even if they did, several African countries lack stable judicial branches to enforce such laws, and many do not have the technological infrastructures or expertise to ensure ongoing compliance. Additionally, the GDPR's extraterritoriale ffects may amount to data imperialism, allowing the EU to impose its own definition of data privacy on African countries without concern for their unique social values and economic realities. This Note analyzes how the GDPR negatively impacts several African countries, as well as the difficulties in solving these economic and social problems. Although there are no easy solutions for these complex issues, this Note recommends that African countries adopt data privacy legislation at the regional level, create regional enforcement authorities, and invest in technological infrastructure and training." (Abstract)
more
"helpdesk.rsf.org is a resource for journalists who want to inform and train themselves about digital security. Media production today can be threatened online in various ways, such as surveillance of communication, blocking of content, or defamation of journalists over social media. Reporters Witho
...
ut Borders supports journalists all over the world in their fight for freedom of expression, both through our work on the ground as well as with this website. We provide guides for digital security concepts, give recommendations about tools and their uses, offer an interactive formula to practice individualized threat modeling, and conduct regular online webinars about digital security. Although we try to be as clear as possible and to update the website constantly, we have to indicate that the use of certain tools is always at the own risk of the individual. If want to reach out to us, please reach out to us via E-Mail." (About the project)
more
"The News Organizations Safety Self-Assessment provides a tool for news outlets to review and improve safety practices and protocols that affect the newsroom and journalists out in the field. The Self-Assessment should help news organizations to identify and better understand their own weaknesses an
...
d strengths in relation to the security of all the individuals working for them who are exposed to danger, including freelancers. The Self-Assessment should prompt a constructive internal conversation around best practices and encourage practical and effective ways to advance these internally. The suggested Self-Assessment can be used as a template, can be modified and adapted according to the nature of the news organization, or used to inform mechanisms already in place." (Introduction)
more
"This report is structured according to five overlapping themes that we consider a helpful framework for assessing internet health: privacy and security, openness, digital inclusion, web literacy, and decentralization, but it’s designed so you can read the articles in any order." (Introduction)
"This report recognizes artificial intelligence (AI) as an opportunity to achieve the United Nations Sustainable Development Goals (SDGs), through its contribution to building inclusive knowledge societies. Based on UNESCO’s Internet Universality ROAM framework agreed by UNESCO’s Member States i
...
n 2015, this study analyzes how AI and advanced information and communication technologies (ICTs) will impact Human Rights in terms of freedom of expression, privacy, media, journalism and non-discrimination; how Openness needs to inform the technological and safety challenges related to AI; how Access to AI hinges upon access to algorithms, hardware, human resources and data; and how a Multi-stakeholder approach concerning AI governance can address the challenges and opportunities for the benefit of humanity." (Back cover)
more
"Queremos entender la comunicación y el acceso a la información como medios para la conquista de otros derechos. Hay innumerables rutas que podríamos tomar para llegar a este destino; la elegida acá es la que entiende la comunicación como un ecosistema complejo que debe estar imbricado en la co
...
ncepción, ejecución y retroalimentación de las políticas públicas. Piense en una política pública cualquiera. En una democracia, ¿cuál es el momento T0 de esta política pública? La respuesta es el proceso electoral. Es allí donde la sociedad decide cuáles propuestas quiere ver implementadas y cuáles no. ¿Hay comunicación en esta etapa? ¿Y el momento T1? Una vez electos, los tomadores de decisiones deben empezar el proceso de planificación de las políticas que van a implementar. De nuevo, ¿está presente la comunicación aquí? Y continuemos… T2: aprobación legislativa. T3: implementación/ejecución. T4: monitoreo y evaluación. T5: retroalimentación y reinicio del ciclo electoral. En cada una de las etapas del diseño e implementación de una política pública cualquiera, hay palabras clave presentes: información, participación, diálogo, empoderamiento, mitigación de riesgos, corrección de rumbos, rendición de cuentas… En todos estos quehaceres hay robustos aspectos comunicativos y de acceso a la información. A estas alturas, usted, lector juicioso, se estará preguntando: ¿por qué todo este esfuerzo para subrayar lo obvio? Y es aquí donde reside el segundo pilar de esta caja de herramientas y estrategias: aunque parezca evidente, la comunicación, comprendida en su complejidad, diversidad y amplitud, debe estar incorporada en la ruta integral de las políticas públicas; cambiar este escenario es central para la eficiencia misma de las políticas que buscamos implementar." (Introducción, página 8-9)
more
"This paper describes findings from a qualitative research study that examines practices and perceptions of privacy in Cambodia as the population rapidly moves into an online environment (specifically Facebook, the most popular Internet tool in Cambodia today). We empirically demonstrate how the con
...
cept of privacy differs across cultures and show how the Facebook platform, as it becomes popular worldwide, catalyzes change in norms of information regulation. We discuss how the localization of transnational technology platforms provides a key site in which to investigate changing cultural ideas about privacy, and to discover misalignments between different expectations for information flow. Finally, we explore ways that insufficient localization effort by transnational technology companies puts some of the most marginalized users at disproportionate information disclosure risk when using new Internet tools, and offer some pragmatic suggestions for how such companies could improve privacy tools for users who are far - geographically or culturally - from where the tools are designed." (Abstract)
more
"In chapters examining a broad range of issues - including sexuality, politics, education, race, gender relations, the environment and social protest movements - Digitized Lives argues that making sense of digitized culture means looking past the glossy surface of techno gear to ask deeper questions
...
about how we can utilize technology to create a more socially, politically and economically just world. This second edition includes important updates on mobile and social media, examining how new platforms and devices have altered how we interact with digital technologies in an allegedly 'post-truth' era." (Publisher description)
more
"This study aims to measure the level of digital security awareness of journalists in Turkey who use digital technology in the course of their work. In the study, research questions are answered using data collected by means of an online survey in relation to the digital security risks faced, the ex
...
tent to which digital technology is used, the digital security tools employed and the extent of digital security training undertaken. The study reveals that journalists in Turkey are faced with security issues ranging from personal threats to physical and digital attacks and that they rely heavily on digital technology. The study concludes that they lack awareness of digital security risks, and only a small percentage have undertaken safety training to protect themselves and their sources in either the physical or digital worlds." (Abstract)
more