Digital Privacy & Safety
Filter
274
Featured
Topics
179
39
28
24
17
9
8
8
8
7
7
7
7
7
7
6
5
5
5
5
5
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
74
29
13
6
4
3
2
2
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"These are the basic tools to protect confidentiality, integrity and availability of your information. This list has been built with the support of the Information Security and Capacity Project (ISC Project)." (Page 1)
"The purpose of this document is to provide researchers, especially those working in smaller organisations that might not have extensive resources or experience in data protection requirements, with general guidance on their responsibilities within a global data protection framework to ensure that d ... more
"La seguridad digital perfecta casi nunca se alcanza pero es posible fortalecerla con algunas prácticas sencillas que si se implementan continuamente mejorarán la protección de la información sensible y se evitará poner en riesgo a las víctimas así como a los defensores que trabajan para ello ... more
"Frente a la tendencia regional y global que lleva a gobiernos y a proveedores de servicio a acumular una cantidad cada vez mayor de información sobre sus usuarios, este estudio intenta una aproximación comparada a la manera en que las legislaciones de México, Brasil, Colombia, Perú, Argentina y ... more
"In its first section, the study examines the legal framework regarding personal data in Lebanon. Even though Lebanon participated in developing the directives on data protection legislation issued by the United Nations Economic and Social Commission for Western Asia (ESCWA) in 2012, the country sti ... more
"This study, which covers 121 UNESCO Member States, represents a global benchmarking of journalistic source protection in the Digital Age. It focuses on developments during the period 2007-2015. The legal frameworks that support protection of journalistic sources, at international, regional and coun ... more
"Circumvention tools designed to bypass online censorship such as simple web proxies, virtual private network service, and so on are frequently used in countries whose governments impose heavy Internet censorship. Around 18 million Internet users in China are currently using those tools to bypass th ... more
"This series aims to help human rights defenders develop the tools, skills and knowledge they need to engage effectively in cyber policy debates. The series is structured around five modules. The first four each focus on a different aspect of cyber policy - human rights, cybersecurity, regulatory fr ... more
"This mapping study investigates the ways in which the Kenyan government and other actors have initiated or engaged in multistakeholder processes in order to address cybersecurity-related matters in the country. Based on this, it will identify best practices, gaps and missing links, as well as oppor ... more
"La presente propuesta metodológica para la promoción del uso seguro del Internet producto de un acuerdo de trabajo entre el Instituto Interamericano del Niño, la Niña y Adolescentes (IIN-OEA) y World Visión República Dominicana aborda, en forma conjunta, los desafíos que, desde la perspectiv ... more
"Encryption is a hot topic in the current global discussion on Internet governance. This research delves into the subject, to outline a global overview of the various means of encryption, their availability and their potential applications in the media and communications landscape. The research expl ... more
"IT Governance requires public and corporate cybersecurity policies to improve fighting against cybercrime and other violations. The EU, the USA and Brazil have recently developed different regulatory approaches on the subject. Assessing how to design policies in line with them across geographies se ... more
"With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance. To the toolkit of privacy protecting techniques and projects, they propose adding obfusca ... more
"En los últimos 20 años, se han dado pasos importantes para construir y fortalecer a la sociedad civil y la participación religiosa en la lucha contra la explotación sexual de niñas, niños y adolescentes. Sin embargo, debemos hacer mucho más y, por consiguiente, Religiones por la Paz (RfP) y ... more