Search database
Filter
322
Breadcrumb: Cybersecurity, Digital Safety, Privacy, Right to Privacy
Featured
Topics
26
25
19
18
17
16
15
15
11
11
11
10
10
9
9
9
9
9
9
9
8
8
8
8
8
8
7
7
7
7
7
7
6
6
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
85
36
17
10
9
8
8
7
6
3
1
1
1
1
1
1
Countries
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"Of the eight countries surveyed here, only four have comprehensive data protection privacy acts in place: Kenya, South Africa, Togo and Uganda. But as these research reports suggest, this is not necessarily a strong indicator of whether a country is committed to privacy rights, or of the efficacy o ... more
"Jeder von uns hinterlässt Datenspuren, beim Surfen, Onlineshopping und in den Social Media. Es sind der Staat, die Wirtschaft, aber auch Kriminelle, die Zugang zu diesen Daten haben oder sich zu verschaffen wissen. Dieser Sachverhalt hat große Bedeutung für den Einzelnen, aber auch für die demo ... more
"In this report, we highlight how privacy and data protection violations by state and non-state actors are compounded by the lack of legal data protection safeguards which would obligate public entities, private companies, and international organizations to respect and adhere to data protection prin ... more
"There is no question that we must address the issues of child safety, disinformation, national security, and criminal activity in the digital age. However, even if the stated end goal for mandating encryption backdoors is legitimate, the means must be necessary and proportionate. Deliberately intro ... more
"Wie wahren wir die Menschen-, Grund- und Bürgerrechte? Und wie können wir unsere Werte für die Gestaltung disruptiver Innovationen und der digitalen Zukunft nutzen? Die Autor*innen aus Politik, Wissenschaft und Praxis zeigen auf, wie technologische Phänomene mit unseren Werten in Einklang gebra ... more
"The module aims to: 1. Clarify the concept of information security, privacy and related concepts; 2. Describe threats to information security and how they can be addressed; 3. Discuss the requirements for the establishment and implementation of policy on information security, as well as the life cy ... more
"This Primer is intended to increase awareness and provide a basic understanding of cyber threats, cybersecurity, and cyber resilience as they relate to development programming for USAID staff. It does not provide specific cybersecurity programming or operational recommendations or address technical ... more
"This book frames digital sovereignty as a right to be claimed and a process constantly in the making, as a condition of the ability to critically partake in the digital transformation. Emphasizing a political and transformative significance of the term, this interdisciplinary publication gathers sc ... more
"We structured the report by beginning with an overview of the digital environment in the Philippines in 2020 before delving into the impact of technology on human rights: the key events, challenges and accomplishments, then a forecast of 2021 and 2022. These are divided into the following key thema ... more
"Specifically, the review focuses on the means, barriers, and associated cybersecurity and privacy concerns that refugees face around connectivity. This includes but is not limited to mobile connectivity and social media, particularly in displacement contexts. While these subjects may at times inter ... more
"Each section of this guide will explore another dimension of digital security—assets, attackers, risks and likelihood—and address these key questions: What do I want to protect? Who are my attackers? Is my attacker able to succeed? How likely is it that my attacker will succeed? Threat modeling ... more
"This document is a compilation of the outcomes of the research component of a small project entitled “Putting cybersecurity on the rights track” that the Association for Progressive Communications (APC) implemented during the course of 2019 with the participation of APC members." (About this pr ... more
"This publication is a compilation of 19 articles by African researchers, academics, journalists and human and digital rights activists on the impact of the COVID-19 pandemic on digital rights in Africa. The articles were commissioned by the African Declaration on Internet Rights and Freedoms (AfDec ... more