Digital Transformation
Filter
3233
Featured
Topics
256
251
232
198
148
147
144
138
135
123
116
107
106
101
95
93
86
86
85
82
74
74
74
73
71
70
68
67
66
62
62
60
59
57
57
57
56
55
54
54
54
53
53
51
50
50
50
50
47
46
46
46
45
44
44
43
42
42
41
41
40
40
39
39
38
37
36
36
35
34
34
34
33
33
33
33
32
32
32
31
30
30
30
30
30
29
29
29
29
27
27
26
26
25
25
25
25
25
24
24
24
24
24
24
23
23
23
23
22
22
22
22
22
21
21
21
21
20
20
20
20
20
20
19
19
19
19
18
18
18
18
18
18
17
17
17
17
17
17
17
17
17
16
16
16
16
16
16
16
15
15
15
15
15
15
15
14
14
14
14
13
13
13
13
13
13
13
13
13
13
13
13
13
12
12
12
12
12
12
12
12
12
12
12
12
12
11
11
11
11
11
11
11
11
11
11
11
11
11
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
9
9
9
9
9
9
9
9
9
9
9
9
9
9
9
9
9
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
7
7
7
7
7
7
7
7
7
7
7
7
7
7
7
7
7
7
7
7
7
7
7
7
7
7
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
397
310
276
225
50
49
49
48
41
39
38
29
22
21
21
12
11
6
5
4
4
3
2
2
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"This Information Sharing Protocol (ISP) is designed to support data responsibility in Somalia. Data responsibility in humanitarian action is the safe, ethical and effective management of personal and non-personal data for operational response, in accordance with established frameworks for personal ... more
"El estudio se compone de dos secciones. En la primera se describe el área de estudio, de las organizaciones indígenas involucradas en la investigación representados por organizaciones. En la segunda sección se analizan los medios de comunicación existentes, y el grado de conectividad que tie ... more
"There is a heated debate about the social-sustainability implications of infrastructure. We engage this debate by delving into China’s Digital Silk Road (DSR), an important component of China’s infrastructure-centric Belt and Road Initiative (BRI). Optimists and pessimists have offered strong v ... more
"Journalists, across the world, are ever more at risk of surveillance from state and non-state antagonists. However, to work safely in a monitored environment is a substantial challenge for journalists. In such regimes, journalists and media organizations are often prone to attacks by the state auth ... more
"This report is the culmination of an in-depth investigation aimed at better defining the causes and challenges of information disorder, and offering a viable framework for action [...] The Aspen Institute’s Commission on Information Disorder invited voices from across our society to help build up ... more
"The Chinese digital technology giants, Baidu, Alibaba and Tencent (BAT), dominate over their competitors in China across platforms that include e-commerce, digital entertainment, e-finance and artificial intelligence (AI). To understand BAT’s corporate power and their strategic role working with ... more
"This report assesses the extent to which the public participated in three recent ICT policy and law-making processes. These include the National Information Communications and Technology (ICT) Policy, 2019, the Computer Misuse and Cybercrimes Act, 2018, and the Data Protection Act, 2019 [...] Gener ... more
"Wir leben in einer zunehmend digitalen Welt. Weltweit nutzen über vier Milliarden Menschen das Internet – seit 2011 hat sich die Zahl fast verdoppelt. Nach aktuellen Schätzungen werden im Jahr 2023 weltweit rund 30 Milliarden Geräte an das Internet angeschlossen sein. Die fortschreitende Digit ... more
"In this article, we employed communication infrastructure theory (CIT) to analyze Gram Vaani’s (“Voice of the Village”) Covid-19 Response Network in India. We reviewed key CIT components (i.e., storytelling network and communication action context) and their applications in civic engagement, ... more
"The objective of this case study is to analyse the current institutional and regulatory framework of Tanzania to understand how it reflects the principles and nature of collaborative regulation. The case study also highlights areas of strength and possible improvements as Tanzania journeys towards ... more
"Internet surveillance has become a crucial issue for journalism. The “Snowden moment” has shed light on the risks that journalists and their sources face while communicating online and has shown how journalists themselves can be targets of surveillance operations or other forms of malicious dig ... more