Digital Privacy & Safety
Filter
271
Featured
Topics
178
39
28
24
17
8
8
8
8
7
7
7
7
7
7
6
5
5
5
5
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
73
28
13
6
4
3
2
2
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"La seguridad digital perfecta casi nunca se alcanza pero es posible fortalecerla con algunas prácticas sencillas que si se implementan continuamente mejorarán la protección de la información sensible y se evitará poner en riesgo a las víctimas así como a los defensores que trabajan para ello ... more
"This study, which covers 121 UNESCO Member States, represents a global benchmarking of journalistic source protection in the Digital Age. It focuses on developments during the period 2007-2015. The legal frameworks that support protection of journalistic sources, at international, regional and coun ... more
"Frente a la tendencia regional y global que lleva a gobiernos y a proveedores de servicio a acumular una cantidad cada vez mayor de información sobre sus usuarios, este estudio intenta una aproximación comparada a la manera en que las legislaciones de México, Brasil, Colombia, Perú, Argentina y ... more
"This guide aims to help correct the imbalance in capacity and expertise between human rights defenders and cybersecurity professionals and policy-makers. At the heart of the guide is an attempt to address perhaps the fundamental barrier: the absence of clear definitions and agreed terms. It will do ... more
"This series aims to help human rights defenders develop the tools, skills and knowledge they need to engage effectively in cyber policy debates. The series is structured around five modules. The first four each focus on a different aspect of cyber policy - human rights, cybersecurity, regulatory fr ... more
"It is our sincerest hope that this guide will have provided you with a greater understanding about online child sexual exploitation. We hope it has also given you a clearer realisation of the important role that you and your faith community can play in helping to prevent and end this crime. Togethe ... more
"Compromised Connections is a brief introduction to emerging security issues facing mobile phones in development. It recommends safety measures that can be quickly adopted – from device safety to data security – and points to resources that may be useful for people interested in following future ... more
"La presente propuesta metodológica para la promoción del uso seguro del Internet producto de un acuerdo de trabajo entre el Instituto Interamericano del Niño, la Niña y Adolescentes (IIN-OEA) y World Visión República Dominicana aborda, en forma conjunta, los desafíos que, desde la perspectiv ... more
"Encryption is a hot topic in the current global discussion on Internet governance. This research delves into the subject, to outline a global overview of the various means of encryption, their availability and their potential applications in the media and communications landscape. The research expl ... more
"This mapping study investigates the ways in which the Kenyan government and other actors have initiated or engaged in multistakeholder processes in order to address cybersecurity-related matters in the country. Based on this, it will identify best practices, gaps and missing links, as well as oppor ... more
"With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance. To the toolkit of privacy protecting techniques and projects, they propose adding obfusca ... more
"En los últimos 20 años, se han dado pasos importantes para construir y fortalecer a la sociedad civil y la participación religiosa en la lucha contra la explotación sexual de niñas, niños y adolescentes. Sin embargo, debemos hacer mucho más y, por consiguiente, Religiones por la Paz (RfP) y ... more
"Circumvention tools designed to bypass online censorship such as simple web proxies, virtual private network service, and so on are frequently used in countries whose governments impose heavy Internet censorship. Around 18 million Internet users in China are currently using those tools to bypass th ... more
"IT Governance requires public and corporate cybersecurity policies to improve fighting against cybercrime and other violations. The EU, the USA and Brazil have recently developed different regulatory approaches on the subject. Assessing how to design policies in line with them across geographies se ... more