Filter
271
Featured
242
4
7
Topics
178
39
28
24
17
8
8
8
8
7
7
7
7
7
7
6
5
5
5
5
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
73
28
13
6
4
3
2
2
2
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
La privacidad en la era de las redes sociales
México, DF: Instituto Nacional de Transparencia, Acceso a la Información y Protección de Datos Personales (INAI) (2022), 135 pp.
"El presente ensayo que usted tiene entre sus manos trata sobre las consideraciones y desafíos entorno a la agenda de la privacidad y protección de datos personales en las redes sociales digitales. El autor hace mención reiteradamente sobre las implicaciones que tiene en el ámbito legal; pero si
...
Project Torogoz: Extensive Hacking of Media & Civil Society in El Salvador with Pegasus Spyware
Toronto: Citizen Lab; Access Now (2022)
"The Citizen Lab and Access Now have conducted a joint investigation into Pegasus hacking in El Salvador in collaboration with Frontline Defenders, SocialTIC, and Fundación Acceso. We confirmed 35 cases of journalists and members of civil society whose phones were successfully infected with NSO’s
...
Guidelines for Judicial Actors on Privacy and Data Protection
Paris: UNESCO (2022), 23 pp.
"These guidelines aim to provide a general framework for judicial actors to assess matters of privacy and data protection in the face of other rights, such as freedom of expression and the right to privacy. The document includes relevant case law from various national, international and regional bod
...
"These recommendations are targeted towards individuals working with sensitive sources on high-level projects that uncover government or corporate misdeeds. We have drafted a few additional steps you should keep in mind if you will be communicating with sensitive sources. Following the below steps w
...
A Survival Toolkit for Journalists: How to Protect Yourself Against Digital Surveillance
Internews; Advancing Rights in Southern Africa (ARISA) (2022), 24 pp.
"Surveillance of journalists has become a very topical and controversial issue that now requires attention at a number of levels – the level of the state, CSOs, and journalism organisations themselves. The systematic and arbitrary harvesting of journalists’ information, tracking and targeting of
...
Cybersecurity Primer: How to Build Cybersecurity Into USAID Programming
USAID; Digital Frontiers (2021), 65 pp.
"This Primer is intended to increase awareness and provide a basic understanding of cyber threats, cybersecurity, and cyber resilience as they relate to development programming for USAID staff. It does not provide specific cybersecurity programming or operational recommendations or address technical
...
No Excuse for Abuse: What Social Media Companies Can Do Now to Combat Online Harassment and Empower Users
PEN America (2021), 7 pp.
"To ensure that social media becomes safer, more open, and more equitable for all users, platforms like Twitter, Facebook, and Instagram must prioritize curbing online harassment. In this report, PEN America proposes concrete, actionable changes that social media companies should make immediately to
...
“We Have to act Like our Devices are Already Infected”: Investigative Journalists and Internet Surveillance
Journalism Practice, volume 16, issue 9 (2021), pp. 1849-1866
"Internet surveillance has become a crucial issue for journalism. The “Snowden moment” has shed light on the risks that journalists and their sources face while communicating online and has shown how journalists themselves can be targets of surveillance operations or other forms of malicious dig
...
Towards the Evaluation of Socio-Digital ID Ecosystems in Africa: Comparative Analysis of Findings from Ten Country Case Studies
Centre for Internet and Society (CIS); Research ICT Africa (2021), 61 pp.
"Efforts to establish or improve national identification systems in Africa have coincided with the increasing deployment of mobile technology. This has led to the prioritisation of digital “solutions” for facilitating forms of identification and registration – often via biometric attributes [.
...
"The Digital Enquirer Kit is an e-learning course that guides learners through lessons on how to prevent the spread of misinformation, available on the free platform atingi.org. The course covers topics including media literacy, verification, and how to navigate the internet safely. The first four m
...
Privacy and Personal Data Protection in Africa: A Rights-Based Survey of Legislation in Eight Countries
African Declaration on Internet Rights and Freedoms Coalition (2021), 372 pp.
"Of the eight countries surveyed here, only four have comprehensive data protection privacy acts in place: Kenya, South Africa, Togo and Uganda. But as these research reports suggest, this is not necessarily a strong indicator of whether a country is committed to privacy rights, or of the efficacy o
...
Gender Approaches to Cybersecurity: Design, Defence and Response
United Nations Institute for Disarmament Research (UNIDIR) (2021), 70 pp.
"This report outlines the relevance of gender norms to cybersecurity. It draws on existing research, supplemented by stakeholder and expert interviews, to assess gender-based differences in the social roles and interaction of women, men and non-binary people of all ages reflected in the distribution
...
Information Security and Privacy
Incheon: Asian and Pacific Training Centre for Information and Communication Technology for Development (APCICT-ESCAP), 4th ed. (2021), viii, 121 pp.
"The module aims to: 1. Clarify the concept of information security, privacy and related concepts; 2. Describe threats to information security and how they can be addressed; 3. Discuss the requirements for the establishment and implementation of policy on information security, as well as the life cy
...
Super-Scoring? Datengetriebene Sozialtechnologien als neue Bildungsherausforderung
kopaed; Grimme-Institut (2021), 263 pp.
"Beim so genannten „Scoring“ wird einer Person mithilfe algorithmischer Verfahren ein Zahlenwert zugeordnet, um ihr Verhalten zu bewerten und zu beeinflussen. „Super-Scoring“-Praktiken gehen noch weiter und führen Punktesysteme und Skalen aus unterschiedlichen Lebensbereichen zusammen, wie
...
Integrating Cyber Capacity Into the Digital Development Agenda
The Hague: Global Forum on Cyber Expertise Foundation (GFCE); Digital Development Partnership (DDP) (2021), 85 pp.
"This report aims to bridge two communities – the broader development community and the cybersecurity capacity building community – to achieve more resilient outcomes by ensuring incorporation of cybersecurity and digital resilience into digital development activities. This report is a product o
...