Filter
274
Featured
245
4
8
Topics
179
39
28
24
17
9
8
8
8
7
7
7
7
7
7
6
5
5
5
5
5
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
74
29
13
6
4
3
2
2
2
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
Compromised Connections: Overcoming Privacy Challenges of the Mobile Internet
Internews; Vodafone Foundation (2016), 14 pp.
"Compromised Connections is a brief introduction to emerging security issues facing mobile phones in development. It recommends safety measures that can be quickly adopted – from device safety to data security – and points to resources that may be useful for people interested in following future
...
Journalist Security in the Digital World: A Survey. Are We Using the Right Tools?
Washington, DC: Center for International Media Assistance (CIMA) (2016), 13 pp.
"This survey was designed to measure how journalists around the world take advantage of technology to enhance their security. The results suggest that there is a general lack of awareness about the power that digital tools have to improve a journalist’s protection. There are scores of organization
...
Protecting Children from Online Sexual Exploitation: A Guide to Action for Religious Leaders and Communities
Bangkok; New York: ECPAT International; Religions for Peace (2016), 46 pp.
"It is our sincerest hope that this guide will have provided you with a greater understanding about online child sexual exploitation. We hope it has also given you a clearer realisation of the important role that you and your faith community can play in helping to prevent and end this crime. Togethe
...
Travel Guide to the Digital World: Cybersecurity Policy for Human Rights Defenders
London: Global Partners Digital (2016), 106 pp.
"This guide aims to help correct the imbalance in capacity and expertise between human rights defenders and cybersecurity professionals and policy-makers. At the heart of the guide is an attempt to address perhaps the fundamental barrier: the absence of clear definitions and agreed terms. It will do
...
Mein Recht im Netz: Der Ratgeber für die digitale Selbstbestimmung
Berlin: Stiftung Warentest (2015), 221 pp.
"Mit unserer digitalen Identität müssen wir pfleglich umgehen, denn sie wird immer wichtiger für uns und ist zunehmend Gefahren ausgesetzt. Dieser Ratgeber stellt einfache Maßnahmen vor, wie Sie sich gegen Phishing-Attacken und Virenangriffe wehren. Praktische Tipps zeigen, wie Sie Ihre persönl
...
Keystones to Foster Inclusive Knowledge Societies: Access to Information and Knowledge, Freedom of Expression, Privacy, and Ethics on a Global Internet
Paris: UNESCO (2015), 107 pp.
"UNESCO’s vision of universal Knowledge Societies builds on a free, open and trusted Internet that enables people to not only have the ability to access information resources from around the world, but to also contribute information and knowledge to local and global communities. What can UNESCO do
...
Digital Security First Aid Kit for Human Rights Defenders
Association for Progressive Communications (APC), 2nd ed. (2015)
"This kit is a contribution from activists for activists to help us be more secure in our digital practices. It’s designed to help activists deal with the most common security issues that might jeopardise the integrity of our devices and communications. Any at-risk user who encounters security-rel
...
Watchdogs Under Watch: Media in the Age of Cyber Surveillance
Washington, DC: Center for International Media Assistance (CIMA) (2015), 20 pp.
"The fundamental problem with cyber surveillance, even for the most well-intentioned governments, is that laws have not evolved with the technology. Governments must enforce the laws that exist and apply them to the modern age. And they should consider that just because technology makes surveillance
...
2015 Corporate Accountability Index
Ranking Digital Rights (2015), 77 pp.
"Ranking Digital Rights’ inaugural Corporate Accountability Index evaluates 16 of the world’s most powerful Internet and telecommunications companies on their commitments, policies, and practices that affect users’ freedom of expression and privacy. By opening the door for greater corporate tr
...
"The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the vari
...
Building Digital Safety for Journalism: A Survey of Selected Issues
Paris: UNESCO (2015), 101 pp.
"This publication identifies at least 12 digital threats, including illegal or arbitrary digital surveillance, location tracking, and software and hardware exploits without the knowledge of the target. Further examples that are considered are: phishing, fake domain attacks, Man-in-the-Middle (MitM)
...
Travel Guide to the Digital World: Surveillance and International Standards
London: Global Partners Digital (2014), 98 pp.
"The internet has enabled an unprecedented ability to monitor and track people and information flows as highlighted in the 2013 revelations by Edward Snowden about online surveillance carried out by the United States’ National Security Agency. The revelations have kicked off debates across the wor
...
Hotlines: Responding to Reports of Illegal Online Content. A Guide to Setting Up an Internet Hotline
"As part of its ongoing commitment to fighting online child sexual abuse content and, in particular, to helping its members realise the objectives of the Mobile Alliance Against Child Sexual Abuse Content, the GSMA has worked with INHOPE, Save the Children, ECPAT, IWF, Net Safe Latvia, Meldpunt, ICM
...
Cyber Security in Developing Countries, a Digital Divide Issue: The Case of Georgia
Journal of International Communication, volume 20, issue 2 (2014), pp. 200-217
"Based on the case study of the cyber war between Russia and Georgia in August 2008, this paper is a theoretical deliberation in an attempt to illustrate connection between the Digital Divide and cyber security. Through a qualitative study of cyber warfare between the two countries, one on the devel
...
Cybersecurity and Cyberwar: What Everyone Needs to Know
Oxford; New York: Oxford University Press (2014), viii, 306 pp.
"Given the Internet’s potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran’s nuclear faci
...
Vigilancia de las comunicaciones en Colombia: Al abismo entre la capacidad tecnológica y los controles legales
Bogotá: Dejusticia (2014), 50 pp.
"El objetivo de este documento es examinar el marco legal y jurisprudencial colombiano sobre vigilancia de comunicaciones, a la luz de las capacidades tecnológicas de hoy. Dicho a manera de hipótesis, el propósito es mostrar cómo la regulación y la jurisprudencia en materia de inteligencia no s
...
"They Know Everything We Do": Telecom and Internet Surveillance in Ethiopia
Human Rights Watch (2014), 137 pp.
"[The publication] documents how Ethiopia’s government uses its control over the telecom system to restrict individuals’ rights. Based on over 100 interviews with victims of government abuses, former government officials, and former staff of telecom companies, the report describes the various me
...