Search database
Filter
28
Featured
Topics
Internet Shutdowns
9
Digital Media Censorship, Control & Filtering, Internet & Social Media Censorship
7
Cybersecurity, Digital Safety, Privacy, Right to Privacy
5
Digital Activism, Cyber Advocacy
4
Surveillance, Surveillance Technologies, Spyware
3
Independent & Oppositional Media in Authoritarian Regimes
2
Access to Media & Information
1
Access to Internet & Digital Communications
1
Civic Engagement, Citizen Participation, Civil Society & Digital Communication
1
News Consumption & Information Sources of Media Users
1
Authoritarian Regimes: Government Communication Strategies
1
Encryption, Cryptology
1
Censorship Circumvention Tools & Strategies
1
Press Freedom & Communication Rights Violations
1
Media Freedom, Press Freedom
1
Crisis Communication
1
Citizen Journalism, Community Journalism
1
Community Telecommunication Networks
1
ICT / Internet Projects (Development Aid)
1
Digital Communication, Digital Media
1
Algorithms & Big Data
1
Big Digital Platforms, Big Tech Companies
1
Cybercrimes
1
Darknet
1
Google
1
Indigenous Digital & Social Media Communication
1
Internet / Social Media Law & Regulation
1
Digital Journalism, Online Journalism
1
Political Blogging
1
Social Media in Political Communication
1
Blogging, Blogs
1
Facebook
1
Journalistic Social Media Use
1
Weibo (Microblogging Website, China)
1
Digitalisation, Online Communication & Democracy / Democratization
1
Uyghurs, Uighurs
1
Feminism & Communication
1
Safety of Journalists, Safety Risks of Media Workers
1
News
1
Kiswahili
1
Informal Communication Channels, Networks & Structures
1
Confidential Sources, Whistleblowing, Protection of Journalists' Sources
1
Election Campaigns: Social Media
1
Software
1
Software Security
1
Language
Document type
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"This publication identifies at least 12 digital threats, including illegal or arbitrary digital surveillance, location tracking, and software and hardware exploits without the knowledge of the target. Further examples that are considered are: phishing, fake domain attacks, Man-in-the-Middle (MitM) ... more

Supporting Internet Freedom: The Case of Iran

Washington, DC: Center for International Media Assistance (CIMA) (2014), 24 pp.
"The aim of this report is not to question the value of supporting Internet freedom in closed societies such as Iran. Rather, the intent is to provide a picture of how difficult it is to achieve progress in such countries. In times of tightening budgets for media development work, it is worth consid ... more

Evading Censorship with Browser-Based Proxies

Stanford University;Massachusetts Institute of Technology (MIT) (2012), 20 pp.
"While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxies are blocked as soon as they are discovered. In this paper we propose a browser-based proxy creation system that gene ... more
"Internet censorship poses a large and growing challenge to online freedom of expression around the world. Censorship circumvention tools are critical to bypass restrictions on the internet and thereby to protect free expression online. Circumvention tools are primarily designed to bypass internet f ... more

Internetzensur in China: Aufbau und Grenzen des Chinesischen Kontrollsystems

Wiesbaden: VS Verlag für Sozialwissenschaften (2011), 246 pp.
"Eine Serie von Fallstudien – unter anderem zur Funktion von Blogs und Microblogs als „bottom- up journalism“ und zu Aktivitätsfeldern des chinesischen „hacktivism“ – verdeutlicht, welches Potenzial politischer Mobilisierung auch im chinesischen Kontext in der internetbasierten Kommunik ... more

Handbook for Bloggers and Cyber-Dissidents

Paris: Reporters Without Borders (2008), 79 pp.
"Blogs are more or less controllable for those who want to keep them under surveillance. Governments that are most up to do date with new technology use the most sophisticated filtering or blocking techniques, preventing them from appearing on the Web at all. But bloggers don't just sit back and let ... more

Everyone's Guide to By-Passing Internet Censorship for Citizens Worldwide

[Toronto]: University of Toronto, Citizen Lab (2007), 31 pp.
"This guide is meant to introduce non-technical users to Internet censorship circumvention technologies, and help them choose which of them best suits their circumstances and needs." (Page 5)