Search database
Filter
315
Featured
Topics
25
24
18
18
16
15
15
14
11
11
10
10
9
9
9
9
9
9
8
8
8
7
7
7
7
7
7
7
7
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
83
35
17
8
8
8
7
7
6
3
1
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"In our increasingly digital environment, it is of paramount importance that citizens be in possession of a legal and digital identity if they are to access digital government services and participate fully in the digital economy. In 2018, of the 175 countries with a national ID (foundational or leg ... more
"The Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological perspective. Privacy is in the news almost every day: mass surveillance by intelligence agencies, th ... more
"This article examines how privacy is understood, lived, and negotiated by youth users of information and communication technology (ICT) in slum communities in the Philippines. In the context of shared and public access arrangements prevalent in many low-income communities in the Global South, the a ... more
"We wrote this booklet to help our sisters learn about problems that we can run into on the internet (like leaked or stolen personal photos, viruses, and scams), how we can make informed decisions every day to protect ourselves, and to help make the internet a safe space for ourselves, our families, ... more
"Cyberwomen is a digital security curriculum with a holistic and gender perspective, geared towards both professional trainers and those who want to learn how to train others on their digital protection and include gender considerations as they do so. It is made up of training modules, interactive g ... more
"Ein umfassender aktueller Überblick über das Medienrecht. Aufgrund der sich ständig und grundlegend ändernden Medienlandschaft und des sich wandelnden Medienrechts hat Frank Fechner in den letzten 20 Jahren sein Lehrbuch jedes Jahr überarbeitet und Gesetzesänderungen, Rechtsprechung und die e ... more
"Media companies in Serbia are not sufficiently aware of the importance of personal data protection, nor are there developed procedures regarding the fulfilment of standards in line with new rules for personal data protection. Taking into account media business models in a digital environment, which ... more
"We found that knowledge around digital security amongst women in Kampala is quite low. A high proportion of women have been victims of cyberbullying without any obvious routes to seeking justice against perpetrators. There is an urgency for law enforcement and government to hand down stricter penal ... more
"The so-called Right to be Forgotten (RTBF) refers to the removal of content from either search engine indexes or even the entire internet so that it is not readily accessible to end users. While the concept emerged out of a European legal tradition that favors the privacy of non-public individuals, ... more

Digital Asia

Berlin: Heinrich Böll Stiftung (2018), 40 pp.
"These are the basic tools to protect confidentiality, integrity and availability of your information. This list has been built with the support of the Information Security and Capacity Project (ISC Project)." (Page 1)
"Compared to five years ago, internet penetration rose in all six countries surveyed and most dramatically in Jordan, Lebanon, and Tunisia. Smartphone ownership tracks closely with internet use in the six surveyed countries. Nearly all nationals in Lebanon, Qatar, Saudi Arabia, and the UAE own a sma ... more
"The purpose of this document is to provide researchers, especially those working in smaller organisations that might not have extensive resources or experience in data protection requirements, with general guidance on their responsibilities within a global data protection framework to ensure that d ... more