Filter
322
Breadcrumb:
Cybersecurity, Digital Safety, Privacy, Right to Privacy
Featured
254
13
17
Topics
26
25
19
18
17
16
15
15
11
11
11
10
10
9
9
9
9
9
9
9
8
8
8
8
8
8
7
7
7
7
7
7
6
6
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
85
36
17
10
9
8
8
7
6
3
2
1
1
1
1
1
1
Countries
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
SaferJourno: Digital Security Resources for Media Trainers
Washington, DC; Arcata, Calif.: Internews (2014), 126 pp.
"The six modules [...] are designed to help trainers integrate digital safety and online security topics into their media training. The modules do not assume that the trainer has special knowledge of the subject. While we wrote the toolkit with journalism trainers in mind, we believe that the module
...
"They Know Everything We Do": Telecom and Internet Surveillance in Ethiopia
Human Rights Watch (2014), 137 pp.
"[The publication] documents how Ethiopia’s government uses its control over the telecom system to restrict individuals’ rights. Based on over 100 interviews with victims of government abuses, former government officials, and former staff of telecom companies, the report describes the various me
...
Legal Leaks Toolkit: A Guide for Journalists on How to Access Government Information
Key Guides
Madrid; Berlin: Access Info Europe; N-ost Netzwerk für Osteuropa-Berichterstattung (2014), 85 pp.
"This toolkit is designed for journalists working in any media – newspapers, radio, and television – as well as bloggers and other information professionals who need to get access to information held by public bodies for their stories. The toolkit is for journalists making requests in their own
...
The Ethics of Memory in a Digital Age: Interrogating the Right to be Forgotten
London: Palgrave Macmillan (2014), xi, 143 pp.
"This edited volume documents the current reflections on the 'Right to be Forgotten' and the interplay between the value of memory and citizen rights about memory. It provides a comprehensive analysis of problems associated with persistence of memory, the definition of identities (legal and social)
...
Cyber Security in Developing Countries, a Digital Divide Issue: The Case of Georgia
Journal of International Communication, volume 20, issue 2 (2014), pp. 200-217
"Based on the case study of the cyber war between Russia and Georgia in August 2008, this paper is a theoretical deliberation in an attempt to illustrate connection between the Digital Divide and cyber security. Through a qualitative study of cyber warfare between the two countries, one on the devel
...
Travel Guide to the Digital World: Surveillance and International Standards
London: Global Partners Digital (2014), 98 pp.
"The internet has enabled an unprecedented ability to monitor and track people and information flows as highlighted in the 2013 revelations by Edward Snowden about online surveillance carried out by the United States’ National Security Agency. The revelations have kicked off debates across the wor
...
Guide to Human Rights for Internet Users
Council of Europe (2014), 28 pp.
"1. This guide is a tool for you, the Internet user, to learn about your human rights online, their possible limitations, and available remedies for such limitations. Human rights and fundamental freedoms apply equally offline and online. This principle includes respect for the rights and freedoms o
...
Safe Surfer: Schutz der Privatsphäre im digitalen Zeitalter
Bonn: Bundeszentrale für politische Bildung (bpb) (2014), 190 pp.
"Ein praktisches, verständliches und effizientes Schutzprogramm für alle, die sich in der digitalen Welt bewegen. Safe Surfer funktioniert wie ein Arbeitsbuch – alle Tipps lassen sich parallel zum Lesen umsetzen. Google, Facebook oder die NSA – wie können wir unsere Privatsphäre im digitalen
...
Cybersecurity and Cyberwar: What Everyone Needs to Know
Oxford; New York: Oxford University Press (2014), viii, 306 pp.
"Given the Internet’s potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran’s nuclear faci
...
"A more connected, data-driven humanitarian system creates an opportunity to save lives and reduce suffering, even as it raises concerns for privacy and security. On one hand, in a humanitarian crisis, in which any delay can cost lives, privacy concerns and consent may be justifiably ignored in the
...
"This guide is intended for use by international NGOs who want to use social media with children and the youth that they work with. This may include developing children’s skills and capacity, using social media as a development tool for a community project, providing access to technology, or offer
...
Diplomacy, Development and Security in the Information Age
Washington, DC: Georgetown University, Institute for the Study of Diplomacy (2013), v, 142 pp.
"[...] This series thus proposes to unpack the concepts of transparency and volatility across three major arenas of international affairs: security, diplomacy, and development. Each issue-area features two essays, each focusing on different aspects of transparency and/or volatility. Two additional e
...
Internet Security Threat Report 2013
Mountain View, Calif.: Symantec Corporation (2013), 57 pp.
"Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threa
...
Enabling Openness: The Future of the Information Society in Latin America and the Caribbean
Montevideo; Ottawa: Comunica; International Development Research Centre (IDRC) (2013), 200 pp.
Training Digital Security Trainers: A Preliminary Review of Methods, Needs, and Challenges
Washington, DC; Arcata, Calif.: Internews (2013), 18 pp.
"This paper draws on interviews with digital security trainers and coordinators of digital security trainings of trainers (ToT)s whose end-goal is the support of human rights defenders, civil society, activists, and local media worldwide [...] Among its main findings, this paper notes the following
...
Überwachtes Deutschland: Post- und Telefonüberwachung in der alten Bundesrepublik
Bonn: Bundeszentrale für politische Bildung (bpb), Sonderausg. (2013), 377 pp.
Media Use in the Middle East: An Eight-Nation Survey
Qatar: Northwestern University in Qatar; Harris Interactive (2013), 97 pp.
"In assessing attitudes toward the media, one notable finding was a vote of confidence for improved quality of news media reporting between 2011 and 2013 with a majority of adults agreeing that it has improved in six of the eight countries surveyed. This optimism is also reflected in overall percept
...
Safety on the Line: Exposing the Myth of Mobile Communication Security
Washington, DC: Freedom House; Broadcasting Board of Governors (BBG) (2012), 175 pp.
"This report evaluates the risks and vulnerabilities of mobile phone services and apps in 12 specified countries: the Republic of Azerbaijan, the Republic of Belarus, the People’s Republic of China, the Arab Republic of Egypt, the Islamic Republic of Iran, Libya, the Sultanate of Oman, the Kingdom
...