Filter
274
Featured
245
4
8
Topics
179
39
28
24
17
9
8
8
8
7
7
7
7
7
7
6
5
5
5
5
5
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
74
29
13
6
4
3
2
2
2
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
Guide to Human Rights for Internet Users
Council of Europe (2014), 28 pp.
"1. This guide is a tool for you, the Internet user, to learn about your human rights online, their possible limitations, and available remedies for such limitations. Human rights and fundamental freedoms apply equally offline and online. This principle includes respect for the rights and freedoms o
...
Travel Guide to the Digital World: Surveillance and International Standards
London: Global Partners Digital (2014), 98 pp.
"The internet has enabled an unprecedented ability to monitor and track people and information flows as highlighted in the 2013 revelations by Edward Snowden about online surveillance carried out by the United States’ National Security Agency. The revelations have kicked off debates across the wor
...
Data Protection and Journalism: A Guide for the Media
Wilmslow, Cheshire (UK): Information Commissioner's Office (ICO) (2014), 52 pp.
"This guide explains how the Data Protection Act (DPA) applies to journalism, advises on good practice, and clarifies the role of the Information Commissioner’s Office (ICO). It does not have any formal legal status and cannot set any new rules, but it will help those working in the media understa
...
SaferJourno: Digital Security Resources for Media Trainers
Washington, DC; Arcata, Calif.: Internews (2014), 126 pp.
"The six modules [...] are designed to help trainers integrate digital safety and online security topics into their media training. The modules do not assume that the trainer has special knowledge of the subject. While we wrote the toolkit with journalism trainers in mind, we believe that the module
...
Überwachtes Deutschland: Post- und Telefonüberwachung in der alten Bundesrepublik
Bonn: Bundeszentrale für politische Bildung (bpb), Sonderausg. (2013), 377 pp.
Training Digital Security Trainers: A Preliminary Review of Methods, Needs, and Challenges
Washington, DC; Arcata, Calif.: Internews (2013), 18 pp.
"This paper draws on interviews with digital security trainers and coordinators of digital security trainings of trainers (ToT)s whose end-goal is the support of human rights defenders, civil society, activists, and local media worldwide [...] Among its main findings, this paper notes the following
...
Internet Security Threat Report 2013
Mountain View, Calif.: Symantec Corporation (2013), 57 pp.
"Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threa
...
Evading Censorship with Browser-Based Proxies
Stanford University; Massachusetts Institute of Technology (MIT) (2012), 20 pp.
"While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxies are blocked as soon as they are discovered. In this paper we propose a browser-based proxy creation system that gene
...
Speak Safe: Media Workers’ Toolkit for Safer Online and Mobile Practices
Key Guides
Washington, DC; Arcata, Calif.: Internews (2012), 56 pp.
"Speak safe" introduces reporters, journalists and bloggers to simple yet effective practices for maintaining control of important information and communications. Thirteen short chapters, of two to four pages each, provide basic knowledge about issues such as safe emailing, surfing, Wi-Fi, data dele
...
Global Survey on Internet Privacy and Freedom of Expression
Paris: UNESCO (2012), 142 pp.
"This publication seeks to identify the relationship between freedom of expression and Internet privacy, assessing where they support or compete with each other in different circumstances. The publication maps out the issues in the current regulatory landscape of Internet privacy from the viewpoint
...
Safety on the Line: Exposing the Myth of Mobile Communication Security
Washington, DC: Freedom House; Broadcasting Board of Governors (BBG) (2012), 175 pp.
"This report evaluates the risks and vulnerabilities of mobile phone services and apps in 12 specified countries: the Republic of Azerbaijan, the Republic of Belarus, the People’s Republic of China, the Arab Republic of Egypt, the Islamic Republic of Iran, Libya, the Sultanate of Oman, the Kingdom
...
#public life: Digitale Intimität, die Privatspäre und das Netz
Berlin: Heinrich Böll Stiftung (2011), 124 pp.
Online Security in the Middle East and North Africa: A Survey of Perceptions, Knowledge, and Practice
Berkman Center for Internet & Society at Harvard University (2011), 15 pp.
"In this report we describe the results of a survey of 98 bloggers in the Middle East and North Africa (MENA) carried out in May 2011 in order to study bloggers’ perceptions of online risk and the actions they take to address digital communications security, including both Internet and cell phone
...
Die Datenfresser: Wie Internetfirmen und Staat sich unsere persönlichen Daten einverleiben und wie wir die Kontrolle darüber zurückerlangen
Bonn: Bundeszentrale für politische Bildung (bpb) (2011), 271 pp.
"Warum findet Facebook jeden meiner Bekannten? Auf welche Datenspuren hat der Staat Zugriff? Und was kann man aus ihnen herauslesen? Die Experten für Informationssicherheit, Constanze Kurz und Frank Rieger, weisen uns den Weg zu einer neuen digitalen Mündigkeit. Sachkundig und verständlich erklä
...
Leaping Over the Firewall: A Review of Censorship Circumvention Tools
Washington, DC: Freedom House (2011), 75 pp.
"Internet censorship poses a large and growing challenge to online freedom of expression around the world. Censorship circumvention tools are critical to bypass restrictions on the internet and thereby to protect free expression online. Circumvention tools are primarily designed to bypass internet f
...