Search database
Filter
315
Featured
Topics
25
24
18
18
16
15
15
14
11
11
10
10
9
9
9
9
9
9
8
8
8
7
7
7
7
7
7
7
7
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
83
35
17
8
8
8
7
7
6
3
1
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"This publication identifies at least 12 digital threats, including illegal or arbitrary digital surveillance, location tracking, and software and hardware exploits without the knowledge of the target. Further examples that are considered are: phishing, fake domain attacks, Man-in-the-Middle (MitM) ... more
"Ranking Digital Rights’ inaugural Corporate Accountability Index evaluates 16 of the world’s most powerful Internet and telecommunications companies on their commitments, policies, and practices that affect users’ freedom of expression and privacy. By opening the door for greater corporate tr ... more
"This handbook is a compilation of advice from child psychologists and the police and also the personal narratives of people who have been subjected to abuse. We hope this book will make it easier for adults to talk to children about the risks of the internet. We also hope it will inspire you and he ... more
"The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the vari ... more
"Vom eigenen Staat auf Schritt und Tritt überwacht zu werden, ist eine Horrorvision für viele Menschen. Möglich wird dies auch durch den Spion in der Hosentasche. Smartphones kommunizieren ständig mit staatlichen Lauschern, ohne dass wir es wollen – und bemerken. Stefan Aust und Thomas Ammann ... more
"In enhancing the fight against ICT-facilitated child abuse and exploitation, governments and national authorities may focus on a child protection approach that fully respects human rights; on ensuring that legislation keeps pace with technological innovation; on recruiting, training and maintaining ... more
"Esta guía pretende proveer los elementos necesarios para establecer un protocolo de seguridad en una diversidad de contextos; así como recomendaciones prácticas para hacer frente a diversas situaciones. La guía está enfocada en todos los periodistas visuales, en particular aquellos que trabaja ... more
"Mit unserer digitalen Identität müssen wir pfleglich umgehen, denn sie wird immer wichtiger für uns und ist zunehmend Gefahren ausgesetzt. Dieser Ratgeber stellt einfache Maßnahmen vor, wie Sie sich gegen Phishing-Attacken und Virenangriffe wehren. Praktische Tipps zeigen, wie Sie Ihre persönl ... more
"This kit is a contribution from activists for activists to help us be more secure in our digital practices. It’s designed to help activists deal with the most common security issues that might jeopardise the integrity of our devices and communications. Any at-risk user who encounters security-rel ... more
"This report assesses how countries can maximise the potential of the digital economy as a driver for innovation and inclusive growth, and discusses the evolutions in the digital economy that policy makers need to consider as well as the emerging challenges they need to address as a part of national ... more
"Sex offenders know that social media offer new opportunities for contacting children and forming friendships with them. They have also realised how simple it is to take pictures and make videos of sexual abuse and share them with other people with the same sexual interests. Digital information tech ... more
"UNESCO’s vision of universal Knowledge Societies builds on a free, open and trusted Internet that enables people to not only have the ability to access information resources from around the world, but to also contribute information and knowledge to local and global communities. What can UNESCO do ... more
"A more connected, data-driven humanitarian system creates an opportunity to save lives and reduce suffering, even as it raises concerns for privacy and security. On one hand, in a humanitarian crisis, in which any delay can cost lives, privacy concerns and consent may be justifiably ignored in the ... more
"This toolkit is designed for journalists working in any media – newspapers, radio, and television – as well as bloggers and other information professionals who need to get access to information held by public bodies for their stories. The toolkit is for journalists making requests in their own ... more
"This guide is intended for use by international NGOs who want to use social media with children and the youth that they work with. This may include developing children’s skills and capacity, using social media as a development tool for a community project, providing access to technology, or offer ... more
"1. This guide is a tool for you, the Internet user, to learn about your human rights online, their possible limitations, and available remedies for such limitations. Human rights and fundamental freedoms apply equally offline and online. This principle includes respect for the rights and freedoms o ... more
"[The publication] documents how Ethiopia’s government uses its control over the telecom system to restrict individuals’ rights. Based on over 100 interviews with victims of government abuses, former government officials, and former staff of telecom companies, the report describes the various me ... more
"The six modules [...] are designed to help trainers integrate digital safety and online security topics into their media training. The modules do not assume that the trainer has special knowledge of the subject. While we wrote the toolkit with journalism trainers in mind, we believe that the module ... more
"Based on the case study of the cyber war between Russia and Georgia in August 2008, this paper is a theoretical deliberation in an attempt to illustrate connection between the Digital Divide and cyber security. Through a qualitative study of cyber warfare between the two countries, one on the devel ... more