Search database
Filter
1123
Featured
Topics
69
64
55
53
48
37
36
36
35
34
32
31
30
29
29
28
27
27
26
26
25
24
23
21
20
18
18
18
18
18
17
17
17
16
15
15
15
15
15
14
14
14
13
13
13
13
13
13
12
12
12
12
12
12
11
11
11
11
11
11
10
10
10
10
9
9
9
9
9
9
9
9
9
9
9
9
9
9
8
8
8
8
8
8
8
8
8
8
8
7
7
7
7
7
7
7
7
7
7
7
7
7
7
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
174
111
98
93
37
35
34
25
22
16
12
9
9
8
8
7
7
7
6
4
3
3
3
2
1
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Output Type
"This publication identifies at least 12 digital threats, including illegal or arbitrary digital surveillance, location tracking, and software and hardware exploits without the knowledge of the target. Further examples that are considered are: phishing, fake domain attacks, Man-in-the-Middle (MitM) ... more
"The conference called the 'Global Media Forum: The role of media in realizing the future we want for all' was hosted by the Government of Indonesia in 2014 [...] The event brought together journalists, media experts and young communicators from South East Asia and around the world, as a contributio ... more
"This work aims to extend the UNESCO Model Curricula for Journalism Education to include new syllabi covering emerging or particularly relevant themes in journalism education globally. As such, it builds on the model curricula – as well as the supplementary UNESCO publication titled A Compendium o ... more
"This study encompasses both quantitative and qualitative assessment: On the one hand, the more than 50 evaluated declarations, guidelines, and frameworks are briefly described in the given context; on the other hand, the issues contained in these documents are also qualitatively analyzed. In this, ... more
"Democratic reform has been on the agenda in Jordan for decades and media reform has naturally been an important part of that debate. Over the quarter of a century since the restoration of parliamentary elections following the 1989 “April uprising” there have been important democratic gains, inc ... more
"We are very, very pleased to advise you that we have added dozens of new languages to our multilingual database, more than doubling the 42 which appeared in the first edition. At the same time, we are very happy to report that there is a great deal of interest in maintaining this database as an imp ... more
"25 members of influential media in Latin America met in Montevideo, along with academics and representatives of civil society. The event aimed to discuss which could be sustainability models that guide journalistic projects in the region. New communication possibilities thanks to new technologies l ... more
"Cette boîte à outils offre aux radios d'Afrique et d'ailleurs des propositions d'approches de programmation participatives afin d'assurer la présence des jeunes dans la radiodiffusion. La publication est divisée en quatre parties qui guident le lecteur à travers un processus étape par étape ... more