Filter
315
Featured
249
12
16
Topics
25
24
18
18
16
15
15
14
11
11
10
10
9
9
9
9
9
9
8
8
8
7
7
7
7
7
7
7
7
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
83
35
17
8
8
8
7
7
6
3
2
1
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
Building Digital Safety for Journalism: A Survey of Selected Issues
Paris: UNESCO (2015), 101 pp.
"This publication identifies at least 12 digital threats, including illegal or arbitrary digital surveillance, location tracking, and software and hardware exploits without the knowledge of the target. Further examples that are considered are: phishing, fake domain attacks, Man-in-the-Middle (MitM)
...
2015 Corporate Accountability Index
Ranking Digital Rights (2015), 77 pp.
"Ranking Digital Rights’ inaugural Corporate Accountability Index evaluates 16 of the world’s most powerful Internet and telecommunications companies on their commitments, policies, and practices that affect users’ freedom of expression and privacy. By opening the door for greater corporate tr
...
#netsmart: A Handbook for Grown-ups on How to Protect Children from Sexual Abuse on the Internet
Stockholm: Save the Children (2015), 15 pp.
"This handbook is a compilation of advice from child psychologists and the police and also the personal narratives of people who have been subjected to abuse. We hope this book will make it easier for adults to talk to children about the risks of the internet. We also hope it will inspire you and he
...
"The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the vari
...
Digitale Diktatur: Totalüberwachung, Datenmissbrauch, Cyberkrieg
Bonn: Bundeszentrale für politische Bildung (bpb) (2015), 345 pp.
"Vom eigenen Staat auf Schritt und Tritt überwacht zu werden, ist eine Horrorvision für viele Menschen. Möglich wird dies auch durch den Spion in der Hosentasche. Smartphones kommunizieren ständig mit staatlichen Lauschern, ohne dass wir es wollen – und bemerken. Stefan Aust und Thomas Ammann
...
Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children
Vienna: United Nations Office on Drugs and Crime (UNODC) (2015), xi, 60 pp.
"In enhancing the fight against ICT-facilitated child abuse and exploitation, governments and national authorities may focus on a child protection approach that fully respects human rights; on ensuring that legislation keeps pace with technological innovation; on recruiting, training and maintaining
...
Guía de seguridad para periodistas visuales
Key Guides
Article 19; World Press Photo (2015), 108 pp.
"Esta guía pretende proveer los elementos necesarios para establecer un protocolo de seguridad en una diversidad de contextos; así como recomendaciones prácticas para hacer frente a diversas situaciones. La guía está enfocada en todos los periodistas visuales, en particular aquellos que trabaja
...
Mein Recht im Netz: Der Ratgeber für die digitale Selbstbestimmung
Berlin: Stiftung Warentest (2015), 221 pp.
"Mit unserer digitalen Identität müssen wir pfleglich umgehen, denn sie wird immer wichtiger für uns und ist zunehmend Gefahren ausgesetzt. Dieser Ratgeber stellt einfache Maßnahmen vor, wie Sie sich gegen Phishing-Attacken und Virenangriffe wehren. Praktische Tipps zeigen, wie Sie Ihre persönl
...
Digital Security First Aid Kit for Human Rights Defenders
Association for Progressive Communications (APC), 2nd ed. (2015)
"This kit is a contribution from activists for activists to help us be more secure in our digital practices. It’s designed to help activists deal with the most common security issues that might jeopardise the integrity of our devices and communications. Any at-risk user who encounters security-rel
...
OECD Digital Economy Outlook 2015
Paris: OECD (2015), 284 pp.
"This report assesses how countries can maximise the potential of the digital economy as a driver for innovation and inclusive growth, and discusses the evolutions in the digital economy that policy makers need to consider as well as the emerging challenges they need to address as a part of national
...
Is it Really That Bad? An Anthology of Online Sexual Abuse of Children and Young People
Copenhagen: Save the Children (2015), 114 pp.
"Sex offenders know that social media offer new opportunities for contacting children and forming friendships with them. They have also realised how simple it is to take pictures and make videos of sexual abuse and share them with other people with the same sexual interests. Digital information tech
...
Keystones to Foster Inclusive Knowledge Societies: Access to Information and Knowledge, Freedom of Expression, Privacy, and Ethics on a Global Internet
Paris: UNESCO (2015), 107 pp.
"UNESCO’s vision of universal Knowledge Societies builds on a free, open and trusted Internet that enables people to not only have the ability to access information resources from around the world, but to also contribute information and knowledge to local and global communities. What can UNESCO do
...
"A more connected, data-driven humanitarian system creates an opportunity to save lives and reduce suffering, even as it raises concerns for privacy and security. On one hand, in a humanitarian crisis, in which any delay can cost lives, privacy concerns and consent may be justifiably ignored in the
...
Legal Leaks Toolkit: A Guide for Journalists on How to Access Government Information
Key Guides
Madrid; Berlin: Access Info Europe; N-ost Netzwerk für Osteuropa-Berichterstattung (2014), 85 pp.
"This toolkit is designed for journalists working in any media – newspapers, radio, and television – as well as bloggers and other information professionals who need to get access to information held by public bodies for their stories. The toolkit is for journalists making requests in their own
...
"This guide is intended for use by international NGOs who want to use social media with children and the youth that they work with. This may include developing children’s skills and capacity, using social media as a development tool for a community project, providing access to technology, or offer
...
Guide to Human Rights for Internet Users
Council of Europe (2014), 28 pp.
"1. This guide is a tool for you, the Internet user, to learn about your human rights online, their possible limitations, and available remedies for such limitations. Human rights and fundamental freedoms apply equally offline and online. This principle includes respect for the rights and freedoms o
...
"They Know Everything We Do": Telecom and Internet Surveillance in Ethiopia
Human Rights Watch (2014), 137 pp.
"[The publication] documents how Ethiopia’s government uses its control over the telecom system to restrict individuals’ rights. Based on over 100 interviews with victims of government abuses, former government officials, and former staff of telecom companies, the report describes the various me
...
SaferJourno: Digital Security Resources for Media Trainers
Washington, DC; Arcata, Calif.: Internews (2014), 126 pp.
"The six modules [...] are designed to help trainers integrate digital safety and online security topics into their media training. The modules do not assume that the trainer has special knowledge of the subject. While we wrote the toolkit with journalism trainers in mind, we believe that the module
...
Cyber Security in Developing Countries, a Digital Divide Issue: The Case of Georgia
Journal of International Communication, volume 20, issue 2 (2014), pp. 200-217
"Based on the case study of the cyber war between Russia and Georgia in August 2008, this paper is a theoretical deliberation in an attempt to illustrate connection between the Digital Divide and cyber security. Through a qualitative study of cyber warfare between the two countries, one on the devel
...