Digital Privacy & Safety
Filter
271
Featured
Topics
178
39
28
24
17
8
8
8
8
7
7
7
7
7
7
6
5
5
5
5
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
73
28
13
6
4
3
2
2
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"El presente ensayo que usted tiene entre sus manos trata sobre las consideraciones y desafíos entorno a la agenda de la privacidad y protección de datos personales en las redes sociales digitales. El autor hace mención reiteradamente sobre las implicaciones que tiene en el ámbito legal; pero si ... more
"The Citizen Lab and Access Now have conducted a joint investigation into Pegasus hacking in El Salvador in collaboration with Frontline Defenders, SocialTIC, and Fundación Acceso. We confirmed 35 cases of journalists and members of civil society whose phones were successfully infected with NSO’s ... more
"These guidelines aim to provide a general framework for judicial actors to assess matters of privacy and data protection in the face of other rights, such as freedom of expression and the right to privacy. The document includes relevant case law from various national, international and regional bod ... more
"These recommendations are targeted towards individuals working with sensitive sources on high-level projects that uncover government or corporate misdeeds. We have drafted a few additional steps you should keep in mind if you will be communicating with sensitive sources. Following the below steps w ... more
"Surveillance of journalists has become a very topical and controversial issue that now requires attention at a number of levels – the level of the state, CSOs, and journalism organisations themselves. The systematic and arbitrary harvesting of journalists’ information, tracking and targeting of ... more
"This Primer is intended to increase awareness and provide a basic understanding of cyber threats, cybersecurity, and cyber resilience as they relate to development programming for USAID staff. It does not provide specific cybersecurity programming or operational recommendations or address technical ... more
"To ensure that social media becomes safer, more open, and more equitable for all users, platforms like Twitter, Facebook, and Instagram must prioritize curbing online harassment. In this report, PEN America proposes concrete, actionable changes that social media companies should make immediately to ... more
"Internet surveillance has become a crucial issue for journalism. The “Snowden moment” has shed light on the risks that journalists and their sources face while communicating online and has shown how journalists themselves can be targets of surveillance operations or other forms of malicious dig ... more
"Efforts to establish or improve national identification systems in Africa have coincided with the increasing deployment of mobile technology. This has led to the prioritisation of digital “solutions” for facilitating forms of identification and registration – often via biometric attributes [. ... more
"The Digital Enquirer Kit is an e-learning course that guides learners through lessons on how to prevent the spread of misinformation, available on the free platform atingi.org. The course covers topics including media literacy, verification, and how to navigate the internet safely. The first four m ... more
"Of the eight countries surveyed here, only four have comprehensive data protection privacy acts in place: Kenya, South Africa, Togo and Uganda. But as these research reports suggest, this is not necessarily a strong indicator of whether a country is committed to privacy rights, or of the efficacy o ... more
"This report outlines the relevance of gender norms to cybersecurity. It draws on existing research, supplemented by stakeholder and expert interviews, to assess gender-based differences in the social roles and interaction of women, men and non-binary people of all ages reflected in the distribution ... more
"The module aims to: 1. Clarify the concept of information security, privacy and related concepts; 2. Describe threats to information security and how they can be addressed; 3. Discuss the requirements for the establishment and implementation of policy on information security, as well as the life cy ... more
"Beim so genannten „Scoring“ wird einer Person mithilfe algorithmischer Verfahren ein Zahlenwert zugeordnet, um ihr Verhalten zu bewerten und zu beeinflussen. „Super-Scoring“-Praktiken gehen noch weiter und führen Punktesysteme und Skalen aus unterschiedlichen Lebensbereichen zusammen, wie ... more
"This report aims to bridge two communities – the broader development community and the cybersecurity capacity building community – to achieve more resilient outcomes by ensuring incorporation of cybersecurity and digital resilience into digital development activities. This report is a product o ... more