Digital Privacy & Safety
Filter
274
Featured
Topics
179
39
28
24
17
9
8
8
8
7
7
7
7
7
7
6
5
5
5
5
5
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
74
29
13
6
4
3
2
2
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"Surveillance infrastructure in China monitors and enables authorities to react to potential risky, miscreant or criminal behaviour. What type of behaviours are perceived to be so, is determined in large part by ideology. Therefore, surveillance infrastructure relies on the machinery of ideology to ... more
"1. Aus dem nationalen Verfassungsrecht ist ein Recht auf Verschlüsselung ableitbar. 2. Aus dem europäischen Verfassungsrecht ist ein Recht auf Verschlüsselung ableitbar. 3. Ein Recht auf Verschlüsselung ergibt sich zwar nicht als solches aus den nationalen und europäischen verfassungsrechtlich ... more
"Mit parteistaatlicher Unterstützung avancierten die großen IT-Unternehmen Chinas seit Ende der 1990er Jahre schnell zu den Motoren der am dynamischsten wachsenden Digitalwirtschaft der Welt. Sie adaptierten zunächst Produkte und Geschäftsmodelle aus dem Ausland, gingen danach aber eigene Wege. ... more
"In 2023, Advancing Rights in Southern Africa (ARISA) through its consortium partner, Internews, undertook the most comprehensive review yet of laws affecting media practice and the freedom of expression, including cyber laws, penal codes, constitutions and acts of parliament, in the sixteen Souther ... more
"Whether you’re experiencing or witnessing online abuse, this Field Manual offers concrete strategies for how to defend yourself and others. We wrote this guidance with and for those disproportionately impacted by online abuse: writers, journalists, artists, and activists who identify as women, BI ... more
"This assessment tool seeks to provide step-by-step advice and concrete recommendations for those wishing to develop a gender approach to cybersecurity policy. Building on APC’s previous work on a human rights approach to cybersecurity, online gender-based violence, and cybersecurity and gender, r ... more

Threats to Journalists from the Consumer Internet of Things

In: Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media
Singapore: Springer (2023), pp. 303–326
"Threats associated with the consumer Internet of Things (IoT) may particularly inhibit the work and wellbeing of journalists, especially because of the danger of technological surveillance and the imperative to protect confidential sources. These issues may have knock-on effects on societal stabili ... more