Search database
Filter
33
Topics
Internet / Social Media Law & Regulation
6
Child Abuse: Digital Media
5
Cybersecurity, Digital Safety, Privacy, Right to Privacy
5
Cyberbullying, Cyberharassment
5
Child Protection Online
4
Digital Media Censorship, Control & Filtering, Internet & Social Media Censorship
4
Darknet
4
Surveillance, Surveillance Technologies, Spyware
3
Sexual Abuse: Digital Media
3
Sexuality: Media Representation, Sexually Explicit Media Content, Pornography
3
Access to Internet & Digital Communications
2
Digital & Social Media Use, Internet Use
2
Freedom of Expression
2
Cyberwarfare, Cyber Operations: Attacking Enemy Computers, Software, and Control Systems
2
Internet
2
Electronic Commerce
2
Gender-Based Online Harassment & Sexual Threats
2
Media Law & Regulation
2
Human Rights Protection
2
Internet Governance, Internet Policies
2
Cyberpsychology
2
Digital & Social Media Use: Youth
1
Gaming: Uses & Effects
1
Children's Rights
1
Communication Rights
1
Data Protection: Law & Regulation
1
Digital Rights
1
Freedom of Expression Online, Internet Freedom
1
Intellectual Property
1
Media / Communication Control
1
Censorship
1
Internet Censorship Circumvention Tools & Strategies
1
Press Freedom & Communication Rights Violations
1
Secret Services, Intelligence Services
1
Conflicts: Victims' Perspectives
1
Hate Speech, Hate Speech in Social Media
1
Algorithms & Big Data
1
Digital Ethics, AI Ethics, Social Media Ethics, Data & Information Ethics
1
Digital Healthcare & Information, Mobile Health, E-Health, Telemedicine
1
Digital & Information Literacy
1
Sexting (Sending Sexually Explicit Messages of Oneself to Others)
1
ICT Regulation
1
LGBT & Communication / Media
1
Racism in Communication & Media
1
Xenophobia
1
Disinformation, Misinformation, Fake News
1
Disinformation & Misinformation Law & Regulation
1
Gaming, Video Games
1
Addiction to Media & Video Games, Effects of Media on Mental Health
1
Defamation: Effects on Victims
1
Defamation Law & Regulation
1
Defamation of Religion (Blasphemy)
1
Gender-Based Harassment, Intimidation & Violence: Media Representation & Reporting
1
Therapeutical Use of Communication & Media
1
Confidential Sources, Whistleblowing, Protection of Journalists' Sources
1
Consumer Protection
1
Criminal Law & Criminal Prosecution
1
Sampling (Survey Methodologies, Statistics)
1
Countering Discrimination & Racism
1
Language
Document type
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Journals
Output Type
"IT Governance requires public and corporate cybersecurity policies to improve fighting against cybercrime and other violations. The EU, the USA and Brazil have recently developed different regulatory approaches on the subject. Assessing how to design policies in line with them across geographies se ... more
"This guide aims to help correct the imbalance in capacity and expertise between human rights defenders and cybersecurity professionals and policy-makers. At the heart of the guide is an attempt to address perhaps the fundamental barrier: the absence of clear definitions and agreed terms. It will do ... more

The Tor Dark Net

London: Centre for International Governance Innovation;Chatham House, Royal Institute of International Affairs (2015), 9 pp.
"This paper does suggest that child abuse content is the most popular type of content on the Tor Dark Net. While law enforcement may crawl such sites, the number of requests that would be seen would be only a tiny fraction, and hence not skew the outline ratios. Similarly, denial of service attacks ... more

The Deep Web and the Darknet, a Look Inside the Internet's Massive Black Box

Washington, DC: Woodrow Wilson International Center for Scholars (2015), 17 pp.
"The scale of the Internet’s underworld is immense. The number of non-indexed web sites, known as the Deep Web, is estimated to be 400 to 500 times larger than the surface web of indexed, searchable web sites. And the Deep Web is where the dark side of the Internet flourishes. While there are plen ... more
"Advocates of Internet freedom need to develop more responses to cybercrime and online ethics to make sure that real concerns are not exploited by repressive governments to impose Internet controls and other measures, which violate the rights to freedom of expression and freedom of information. An i ... more
"Iraq’s parliament is in the process of enacting an “Information Crimes Law” to regulate the use of information networks, computers, and other electronic devices and systems. The draft law includes vague provisions that would allow Iraqi authorities to deter legitimate criticisms of or peacefu ... more

Handbook of Internet Crime

London; New York: Routledge (2010), xvii, 654 pp.
"The Handbook of Internet Crime gathers together the leading scholars in the field to explore issues and debates surrounding internet-related crime, deviance, policing, law and regulation in the 21st century. The Handbook reflects the range and depth of cybercrime research and scholarship, combining ... more

Understanding Cybercrime: A Guide for Developing Countries. Draft April 2009

Geneva: ITU, ICT Applications and Cybersecurity Division (2009), 225 pp.
"The Guide contains six main chapters. After an Introduction (Chapter 1) the Guide provides an overview of the phenomena of cybercrime (Chapter 2). This includes descriptions of how crimes are committed and explanations of the most widespread cybercrime offences such as hacking, identity theft and d ... more
"This report is intended to provide a framework for promoting recognition and understanding of the real risks of violence for children and young people within cyberspace and through the use of new technologies, in particular the Internet and mobile phones. It identifies the harms confronted by child ... more

La violencia contra los niños en el ciberespacio

Bangkok: ECPAT International (2005), 97 pp.

La violence contre les enfants dans le cyberspace

Bangkok: ECPAT International (2005), 99 pp.