Search database
Filter
322
Breadcrumb: Cybersecurity, Digital Safety, Privacy, Right to Privacy
Featured
Topics
26
25
19
18
17
16
15
15
11
11
11
10
10
9
9
9
9
9
9
9
8
8
8
8
8
8
7
7
7
7
7
7
6
6
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
85
36
17
10
9
8
8
7
6
3
1
1
1
1
1
1
Countries
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"The six modules [...] are designed to help trainers integrate digital safety and online security topics into their media training. The modules do not assume that the trainer has special knowledge of the subject. While we wrote the toolkit with journalism trainers in mind, we believe that the module ... more
"[The publication] documents how Ethiopia’s government uses its control over the telecom system to restrict individuals’ rights. Based on over 100 interviews with victims of government abuses, former government officials, and former staff of telecom companies, the report describes the various me ... more
"This toolkit is designed for journalists working in any media – newspapers, radio, and television – as well as bloggers and other information professionals who need to get access to information held by public bodies for their stories. The toolkit is for journalists making requests in their own ... more
"This edited volume documents the current reflections on the 'Right to be Forgotten' and the interplay between the value of memory and citizen rights about memory. It provides a comprehensive analysis of problems associated with persistence of memory, the definition of identities (legal and social) ... more
"Based on the case study of the cyber war between Russia and Georgia in August 2008, this paper is a theoretical deliberation in an attempt to illustrate connection between the Digital Divide and cyber security. Through a qualitative study of cyber warfare between the two countries, one on the devel ... more
"The internet has enabled an unprecedented ability to monitor and track people and information flows as highlighted in the 2013 revelations by Edward Snowden about online surveillance carried out by the United States’ National Security Agency. The revelations have kicked off debates across the wor ... more
"1. This guide is a tool for you, the Internet user, to learn about your human rights online, their possible limitations, and available remedies for such limitations. Human rights and fundamental freedoms apply equally offline and online. This principle includes respect for the rights and freedoms o ... more
"Ein praktisches, verständliches und effizientes Schutzprogramm für alle, die sich in der digitalen Welt bewegen. Safe Surfer funktioniert wie ein Arbeitsbuch – alle Tipps lassen sich parallel zum Lesen umsetzen. Google, Facebook oder die NSA – wie können wir unsere Privatsphäre im digitalen ... more
"Given the Internet’s potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran’s nuclear faci ... more
"A more connected, data-driven humanitarian system creates an opportunity to save lives and reduce suffering, even as it raises concerns for privacy and security. On one hand, in a humanitarian crisis, in which any delay can cost lives, privacy concerns and consent may be justifiably ignored in the ... more
"This guide is intended for use by international NGOs who want to use social media with children and the youth that they work with. This may include developing children’s skills and capacity, using social media as a development tool for a community project, providing access to technology, or offer ... more
"[...] This series thus proposes to unpack the concepts of transparency and volatility across three major arenas of international affairs: security, diplomacy, and development. Each issue-area features two essays, each focusing on different aspects of transparency and/or volatility. Two additional e ... more

Internet Security Threat Report 2013

Mountain View, Calif.: Symantec Corporation (2013), 57 pp.
"Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threa ... more
"This paper draws on interviews with digital security trainers and coordinators of digital security trainings of trainers (ToT)s whose end-goal is the support of human rights defenders, civil society, activists, and local media worldwide [...] Among its main findings, this paper notes the following ... more
"In assessing attitudes toward the media, one notable finding was a vote of confidence for improved quality of news media reporting between 2011 and 2013 with a majority of adults agreeing that it has improved in six of the eight countries surveyed. This optimism is also reflected in overall percept ... more
"This report evaluates the risks and vulnerabilities of mobile phone services and apps in 12 specified countries: the Republic of Azerbaijan, the Republic of Belarus, the People’s Republic of China, the Arab Republic of Egypt, the Islamic Republic of Iran, Libya, the Sultanate of Oman, the Kingdom ... more