Filter
315
Featured
249
12
16
Topics
25
24
18
18
16
15
15
14
11
11
10
10
9
9
9
9
9
9
8
8
8
7
7
7
7
7
7
7
7
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
83
35
17
8
8
8
7
7
6
3
2
1
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
Digital Identity in the ICT Ecosystem: An Overview
Geneva: ITU (2018), vii, 29 pp.
"In our increasingly digital environment, it is of paramount importance that citizens be in possession of a legal and digital identity if they are to access digital government services and participate fully in the digital economy. In 2018, of the 175 countries with a national ID (foundational or leg
...
The Handbook of Privacy Studies: An Interdisciplinary Introduction
Amsterdam: Amsterdam University Press (2018), 456 pp.
"The Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological perspective. Privacy is in the news almost every day: mass surveillance by intelligence agencies, th
...
Experiences of ICT Use in Shared, Public Access Settings in Philippine Slums
Development in Practice, volume 28, issue 3 (2018), pp. 358-373
"This article examines how privacy is understood, lived, and negotiated by youth users of information and communication technology (ICT) in slum communities in the Philippines. In the context of shared and public access arrangements prevalent in many low-income communities in the Global South, the a
...
Schwacher Staat im Netz: Wie die Digitalisierung den Staat in Frage stellt
Bonn: Bundeszentrale für politische Bildung (bpb), Sonderausg. (2018), vi, 271 pp.
Cyberwomen: Holistic Digital Security Training Curriculum for Women Human Rights Defenders
Key Guides
Institute for War & Peace Reporting (IWPR) (2018), 331 pp.
"Cyberwomen is a digital security curriculum with a holistic and gender perspective, geared towards both professional trainers and those who want to learn how to train others on their digital protection and include gender considerations as they do so. It is made up of training modules, interactive g
...
Medienrecht: Lehrbuch des gesamten Medienrechts unter besonderer Berücksichtigung von Presse, Rundfunk und Multimedia
Tübingen: Mohr Siebeck, 22., aktual. und erg. Aufl. (2018), xxxiv, 481 pp.
"Ein umfassender aktueller Überblick über das Medienrecht. Aufgrund der sich ständig und grundlegend ändernden Medienlandschaft und des sich wandelnden Medienrechts hat Frank Fechner in den letzten 20 Jahren sein Lehrbuch jedes Jahr überarbeitet und Gesetzesänderungen, Rechtsprechung und die e
...
New Rules for Personal Data Protection and Media: Why Reconcile Privacy Policies and Media Business Models in the Digital Environment?
USAID; Share Foundation (2018), 7 pp.
"Media companies in Serbia are not sufficiently aware of the importance of personal data protection, nor are there developed procedures regarding the fulfilment of standards in line with new rules for personal data protection. Taking into account media business models in a digital environment, which
...
Privacy and Personal Data Challenges and Trends in Malawi
Kampala: CIPESA (2018), 19 pp.
"We found that knowledge around digital security amongst women in Kampala is quite low. A high proportion of women have been victims of cyberbullying without any obvious routes to seeking justice against perpetrators. There is an urgency for law enforcement and government to hand down stricter penal
...
Information Not Found: The “Right to be Forgotten” as an Emerging Threat to Media Freedom in the Digital Age
Washington, DC: Center for International Media Assistance (CIMA) (2018)
"The so-called Right to be Forgotten (RTBF) refers to the removal of content from either search engine indexes or even the entire internet so that it is not readily accessible to end users. While the concept emerged out of a European legal tradition that favors the privacy of non-public individuals,
...
Privacy and Personal Data Protection in Ethiopia
Kampala: CIPESA (2018), 26 pp.
Visual Security Studies: Sights and Spectacles of Insecurity and War
Abingdon; New York, NY: Routledge (2018), xii, 207 pp.
Safe Sisters: A Common Sense Guide to Digital Safety for Women and Girls in Sub-Saharan Africa
Internews; Defend Defenders (2018), 10 pp.
"We wrote this booklet to help our sisters learn about problems that we can run into on the internet (like leaked or stolen personal photos, viruses, and scams), how we can make informed decisions every day to protect ourselves, and to help make the internet a safe space for ourselves, our families,
...
Digital Asia
Berlin: Heinrich Böll Stiftung (2018), 40 pp.
Digital Security Toolkit for Journalists and Bloggers
Information Security and Capacity Project (2017), 4 pp.
"These are the basic tools to protect confidentiality, integrity and availability of your information. This list has been built with the support of the Information Security and Capacity Project (ISC Project)." (Page 1)
Media Use in the Middle East: A Seven-Nation Survey
Deep Insights
Qatar: Northwestern University in Qatar; Harris Interactive (2017), 139 pp.
"Compared to five years ago, internet penetration rose in all six countries surveyed and most dramatically in Jordan, Lebanon, and Tunisia. Smartphone ownership tracks closely with internet use in the six surveyed countries. Nearly all nationals in Lebanon, Qatar, Saudi Arabia, and the UAE own a sma
...
ESOMAR Data Protection Checklist
ESOMAR (2017), 16 pp.
"The purpose of this document is to provide researchers, especially those working in smaller organisations that might not have extensive resources or experience in data protection requirements, with general guidance on their responsibilities within a global data protection framework to ensure that d
...