Search database
Filter
315
Featured
Topics
25
24
18
18
16
15
15
14
11
11
10
10
9
9
9
9
9
9
8
8
8
7
7
7
7
7
7
7
7
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
83
35
17
8
8
8
7
7
6
3
1
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"This edited volume documents the current reflections on the 'Right to be Forgotten' and the interplay between the value of memory and citizen rights about memory. It provides a comprehensive analysis of problems associated with persistence of memory, the definition of identities (legal and social) ... more
"Given the Internet’s potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran’s nuclear faci ... more
"Ein praktisches, verständliches und effizientes Schutzprogramm für alle, die sich in der digitalen Welt bewegen. Safe Surfer funktioniert wie ein Arbeitsbuch – alle Tipps lassen sich parallel zum Lesen umsetzen. Google, Facebook oder die NSA – wie können wir unsere Privatsphäre im digitalen ... more
"The internet has enabled an unprecedented ability to monitor and track people and information flows as highlighted in the 2013 revelations by Edward Snowden about online surveillance carried out by the United States’ National Security Agency. The revelations have kicked off debates across the wor ... more
"[...] This series thus proposes to unpack the concepts of transparency and volatility across three major arenas of international affairs: security, diplomacy, and development. Each issue-area features two essays, each focusing on different aspects of transparency and/or volatility. Two additional e ... more

Internet Security Threat Report 2013

Mountain View, Calif.: Symantec Corporation (2013), 57 pp.
"Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threa ... more
"In assessing attitudes toward the media, one notable finding was a vote of confidence for improved quality of news media reporting between 2011 and 2013 with a majority of adults agreeing that it has improved in six of the eight countries surveyed. This optimism is also reflected in overall percept ... more
"This paper draws on interviews with digital security trainers and coordinators of digital security trainings of trainers (ToT)s whose end-goal is the support of human rights defenders, civil society, activists, and local media worldwide [...] Among its main findings, this paper notes the following ... more
"GISWatch 2012 explores how the internet is being used to ensure transparency and accountability, the challenges that civil society activists face in fighting corruption, and when the internet fails as an enabler of a transparent and fair society. The eight thematic reports and 48 country reports pu ... more
"This report evaluates the risks and vulnerabilities of mobile phone services and apps in 12 specified countries: the Republic of Azerbaijan, the Republic of Belarus, the People’s Republic of China, the Arab Republic of Egypt, the Islamic Republic of Iran, Libya, the Sultanate of Oman, the Kingdom ... more
"This publication seeks to identify the relationship between freedom of expression and Internet privacy, assessing where they support or compete with each other in different circumstances. The publication maps out the issues in the current regulatory landscape of Internet privacy from the viewpoint ... more
"Speak safe" introduces reporters, journalists and bloggers to simple yet effective practices for maintaining control of important information and communications. Thirteen short chapters, of two to four pages each, provide basic knowledge about issues such as safe emailing, surfing, Wi-Fi, data dele ... more
"The research explored children’s online behaviour, risks and vulnerability to harm, documenting existing preventive and protective measures to combat their online abuse and exploitation. The study draws on lessons from high- and middle-income countries, viewed through the lens of the dynamic that ... more
"The right to privacy and the right to information are both essential human rights in the modern information society. For the most part, these two rights complement each other in holding governments accountable to individuals. But there is a potential conflict between these rights when there is a de ... more
"In this report we describe the results of a survey of 98 bloggers in the Middle East and North Africa (MENA) carried out in May 2011 in order to study bloggers’ perceptions of online risk and the actions they take to address digital communications security, including both Internet and cell phone ... more