Search database
Filter
322
Breadcrumb: Cybersecurity, Digital Safety, Privacy, Right to Privacy
Featured
Topics
26
25
19
18
17
16
15
15
11
11
11
10
10
9
9
9
9
9
9
9
8
8
8
8
8
8
7
7
7
7
7
7
6
6
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
85
36
17
10
9
8
8
7
6
3
1
1
1
1
1
1
Countries
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"Media companies in Serbia are not sufficiently aware of the importance of personal data protection, nor are there developed procedures regarding the fulfilment of standards in line with new rules for personal data protection. Taking into account media business models in a digital environment, which ... more
"Cyberwomen is a digital security curriculum with a holistic and gender perspective, geared towards both professional trainers and those who want to learn how to train others on their digital protection and include gender considerations as they do so. It is made up of training modules, interactive g ... more

Digital Asia

Berlin: Heinrich Böll Stiftung (2018), 40 pp.
"La seguridad digital perfecta casi nunca se alcanza pero es posible fortalecerla con algunas prácticas sencillas que si se implementan continuamente mejorarán la protección de la información sensible y se evitará poner en riesgo a las víctimas así como a los defensores que trabajan para ello ... more
"Compared to five years ago, internet penetration rose in all six countries surveyed and most dramatically in Jordan, Lebanon, and Tunisia. Smartphone ownership tracks closely with internet use in the six surveyed countries. Nearly all nationals in Lebanon, Qatar, Saudi Arabia, and the UAE own a sma ... more

Safe+Secure Handbook

DOC Funders Network (2017), 59 pp.
"Getting to the heart of stories by asking the really tough questions and going places where no one wants to go. That’s documentary at its best. This Safe+Secure Handbook has been designed to help filmmakers get there—and back—and get their stories into the public domain as safely as possible. ... more
"The purpose of this document is to provide researchers, especially those working in smaller organisations that might not have extensive resources or experience in data protection requirements, with general guidance on their responsibilities within a global data protection framework to ensure that d ... more
"The research in these pages covers the theory around multistakeholder participation in Internet governance through a review of relevant literature. It also analyses case studies from Kenya to Brazil, South Korea, and the Internet Governance Forum (IGF), which illustrate how multistakeholder approac ... more
"At the forefront in its field, this Handbook examines the theoretical, conceptual, pedagogical and methodological development of media literacy education and research around the world. Building on traditional media literacy frameworks in critical analysis, evaluation, and assessment, it incorporate ... more
"This study, which covers 121 UNESCO Member States, represents a global benchmarking of journalistic source protection in the Digital Age. It focuses on developments during the period 2007-2015. The legal frameworks that support protection of journalistic sources, at international, regional and coun ... more
"These are the basic tools to protect confidentiality, integrity and availability of your information. This list has been built with the support of the Information Security and Capacity Project (ISC Project)." (Page 1)
"Compromised Connections is a brief introduction to emerging security issues facing mobile phones in development. It recommends safety measures that can be quickly adopted – from device safety to data security – and points to resources that may be useful for people interested in following future ... more
"The debate on Facebook raises questions about the use and users of this information service. This collected volume gathers a broad spectrum of social science and information science articles about Facebook. Facebook has many facets, and we just look forward above all to the use and users. The facet ... more
"Encryption is a hot topic in the current global discussion on Internet governance. This research delves into the subject, to outline a global overview of the various means of encryption, their availability and their potential applications in the media and communications landscape. The research expl ... more
"The central thesis of Crtl+Z is that a digital right to be forgotten is an innovative idea with a lot of possibilities and potential. The idea simply needs to be opened up, reframed, and restructured. The extreme options currently on the table limit the many ways to think about digital redemption a ... more
"IT Governance requires public and corporate cybersecurity policies to improve fighting against cybercrime and other violations. The EU, the USA and Brazil have recently developed different regulatory approaches on the subject. Assessing how to design policies in line with them across geographies se ... more
"This series aims to help human rights defenders develop the tools, skills and knowledge they need to engage effectively in cyber policy debates. The series is structured around five modules. The first four each focus on a different aspect of cyber policy - human rights, cybersecurity, regulatory fr ... more