Filter
322
Breadcrumb:
Cybersecurity, Digital Safety, Privacy, Right to Privacy
Featured
254
13
17
Topics
26
25
19
18
17
16
15
15
11
11
11
10
10
9
9
9
9
9
9
9
8
8
8
8
8
8
7
7
7
7
7
7
6
6
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
85
36
17
10
9
8
8
7
6
3
2
1
1
1
1
1
1
Countries
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
New Rules for Personal Data Protection and Media: Why Reconcile Privacy Policies and Media Business Models in the Digital Environment?
USAID; Share Foundation (2018), 7 pp.
"Media companies in Serbia are not sufficiently aware of the importance of personal data protection, nor are there developed procedures regarding the fulfilment of standards in line with new rules for personal data protection. Taking into account media business models in a digital environment, which
...
Cyberwomen: Holistic Digital Security Training Curriculum for Women Human Rights Defenders
Key Guides
Institute for War & Peace Reporting (IWPR) (2018), 331 pp.
"Cyberwomen is a digital security curriculum with a holistic and gender perspective, geared towards both professional trainers and those who want to learn how to train others on their digital protection and include gender considerations as they do so. It is made up of training modules, interactive g
...
Digital Asia
Berlin: Heinrich Böll Stiftung (2018), 40 pp.
Guía de seguridad digital para activistas y defensores de derechos humanos
Caracas: Espacio Público (2017), 4 pp.
"La seguridad digital perfecta casi nunca se alcanza pero es posible fortalecerla con algunas prácticas sencillas que si se implementan continuamente mejorarán la protección de la información sensible y se evitará poner en riesgo a las víctimas así como a los defensores que trabajan para ello
...
Media Use in the Middle East: A Seven-Nation Survey
Deep Insights
Qatar: Northwestern University in Qatar; Harris Interactive (2017), 139 pp.
"Compared to five years ago, internet penetration rose in all six countries surveyed and most dramatically in Jordan, Lebanon, and Tunisia. Smartphone ownership tracks closely with internet use in the six surveyed countries. Nearly all nationals in Lebanon, Qatar, Saudi Arabia, and the UAE own a sma
...
Seguridad digital en tiempos de vigilancia
Espacio Público (2017), 4 pp.
Safe+Secure Handbook
Key Guides
DOC Funders Network (2017), 59 pp.
"Getting to the heart of stories by asking the really tough questions and going places where no one wants to go. That’s documentary at its best. This Safe+Secure Handbook has been designed to help filmmakers get there—and back—and get their stories into the public domain as safely as possible.
...
ESOMAR Data Protection Checklist
ESOMAR (2017), 16 pp.
"The purpose of this document is to provide researchers, especially those working in smaller organisations that might not have extensive resources or experience in data protection requirements, with general guidance on their responsibilities within a global data protection framework to ensure that d
...
What if We All Governed the Internet? Advancing Multistakeholder Participation in Internet Governance
Paris: UNESCO (2017), 108 pp.
"The research in these pages covers the theory around multistakeholder participation in Internet governance through a review of relevant literature. It also analyses case studies from Kenya to Brazil, South Korea, and the Internet Governance Forum (IGF), which illustrate how multistakeholder approac
...
International Handbook of Media Literacy Education
Deep Insights
New York; London: Routledge (2017), xiii, 415 pp.
"At the forefront in its field, this Handbook examines the theoretical, conceptual, pedagogical and methodological development of media literacy education and research around the world. Building on traditional media literacy frameworks in critical analysis, evaluation, and assessment, it incorporate
...
Protecting Journalism Sources in the Digital Age
Deep Insights
Paris: UNESCO (2017), 191 pp.
"This study, which covers 121 UNESCO Member States, represents a global benchmarking of journalistic source protection in the Digital Age. It focuses on developments during the period 2007-2015. The legal frameworks that support protection of journalistic sources, at international, regional and coun
...
Digital Security Toolkit for Journalists and Bloggers
Information Security and Capacity Project (2017), 4 pp.
"These are the basic tools to protect confidentiality, integrity and availability of your information. This list has been built with the support of the Information Security and Capacity Project (ISC Project)." (Page 1)
Compromised Connections: Overcoming Privacy Challenges of the Mobile Internet
Internews; Vodafone Foundation (2016), 14 pp.
"Compromised Connections is a brief introduction to emerging security issues facing mobile phones in development. It recommends safety measures that can be quickly adopted – from device safety to data security – and points to resources that may be useful for people interested in following future
...
Facets of Facebook: Use and Users
Berlin; Boston: De Gruyter Saur (2016), x, 328 pp.
"The debate on Facebook raises questions about the use and users of this information service. This collected volume gathers a broad spectrum of social science and information science articles about Facebook. Facebook has many facets, and we just look forward above all to the use and users. The facet
...
Redefreiheit: Prinzipien für eine vernetzte Welt
Bonn: Bundeszentrale für politische Bildung (bpb), Lizenzausg. (2016), 687 pp.
Human Rights and Encryption
Deep Insights
Paris: UNESCO (2016), 83 pp.
"Encryption is a hot topic in the current global discussion on Internet governance. This research delves into the subject, to outline a global overview of the various means of encryption, their availability and their potential applications in the media and communications landscape. The research expl
...
Ctrl + Z: The Right to be Forgotten
New York; London: New York University Press (2016), xiii, 269 pp.
"The central thesis of Crtl+Z is that a digital right to be forgotten is an innovative idea with a lot of possibilities and potential. The idea simply needs to be opened up, reframed, and restructured. The extreme options currently on the table limit the many ways to think about digital redemption a
...
Cybersecurity Policy and Law Making in the EU, US and Brazil
Computer Law Review International, volume 17, issue 3 (2016), pp. 71-75
"IT Governance requires public and corporate cybersecurity policies to improve fighting against cybercrime and other violations. The EU, the USA and Brazil have recently developed different regulatory approaches on the subject. Assessing how to design policies in line with them across geographies se
...
"This series aims to help human rights defenders develop the tools, skills and knowledge they need to engage effectively in cyber policy debates. The series is structured around five modules. The first four each focus on a different aspect of cyber policy - human rights, cybersecurity, regulatory fr
...