Filter
320
Featured
253
13
17
Topics
26
25
19
18
17
16
15
15
11
11
11
10
10
9
9
9
9
9
9
9
8
8
8
8
8
8
7
7
7
7
7
7
6
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
84
35
17
10
9
8
8
7
6
3
2
1
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
Device Location Security
Internews (2022), 4 pp.
"This guide looks at how our mobile devices could leak data about our locations and what we could do to protect ourselves against it. It’s designed for most Central European journalists’ threat models and only looks at how our mobile devices could give up precise location data on us. It doesn’
...
Handbook on Laws and Regulations Affecting Freedom of Expression, Media Freedom and Digital Rights in Zambia
Lusaka: Media Institute of Southern Africa (MISA) (2022), vi, 74 pp.
"The handbook is an advocacy tool that details laws and regulations that enable and impact freedom of expression, media freedom, work of human rights defenders and activists in Zambia." (Publisher description)
Policy Brief: Nine Steps to Protect Our Data and Privacy in Sri Lanka. Sri Lanka’s Personal Data Protection Bill, 2021
Access Now (2022), 10 pp.
"This policy brief is an Access Now publication. It gives context about the Personal Data Protection Bill in the Parliament of Sri Lank, states the key areas of concerns in the present bill, and proposes nine (9) recommendations." (commbox)
Was heißt digitale Souveränität? Diskurse, Praktiken und Voraussetzungen »individueller« und »staatlicher Souveränität« im digitalen Zeitalter
Bielefeld: transcript Verlag (2022), 320 pp.
"Die neuen sozio-technischen Verhältnisse der digitalen Transformation fordern neuzeitliche Konzepte des »souveränen Staates« und des »souveränen Subjekts« heraus, was in Debatten um »digitale Souveränität« problematisiert wird. Die Beiträger*innen des Bandes diskutieren diese Herausford
...
The Unfreedom Monitor: Data Governance
Amsterdam: Global Voices Advox (2022), 11 pp.
"Data governance is an integral aspect of digital authoritarianism because it incorporates any type of control, authority, and manipulation of data […]. Within the context of digital authoritarianism, data governance may incorporate both states and non-state actors that collaborate with states to
...
Tech Care: A step-by-step guide to providing digital support for civil society
Digital Defenders Partnership; Access Now (2022), 90 pp.
"What we lacked was a set of simple instructions that could help navigate the workflows and procedures of a digital security helpline, while focusing on the specific demand of offering a service to groups that are often underfunded, understaffed, non-hierarchical and exposed to disproportionate thre
...
"This joint stakeholder report focuses on key issues relating to human rights online in India, including internet shutdowns, digital exclusion, freedom of speech and expression online, online harassment and hate speech, privacy, surveillance and data protection. The report draws on extensive and ong
...
“Playing” in the Eyes of the Ferret Team: Examining the Use of Surveillance Strategies by Zimbabwean Journalists
African Journalism Studies, volume 43, issue 1 (2022), pp. 53-69
"The Zimbabwean state has in recent years stepped up its surveillance efforts on citizens, civil society and journalists who are viewed as the “enemies of the state”. This state surveillance has been argued to infringe on citizens’ right to privacy and access to information. We are mindful tha
...
Trapped in a Web: The Exploitation of Personal Data in Hungary’s 2022 Elections
Human Rights Watch (2022), 94 pp.
"On April 3, 2022, Hungary’s ruling Fidesz party won a fourth term in national elections, cementing its dominance with a two-thirds majority that will allow it to continue traveling what critics of the party and many others would describe as the path of centralizing power and rolling back democrat
...
Guia tá na rede! O que vira é navegar com segurança. Para crianças e adolescentes
São Paulo: Viração Educomunicação; Projeto Consulta Brasil (2022), 51 pp.
"A internet já faz parte da vida de crianças e adolescentes. No Brasil, são 24,3 milhões de meninas e meninos conectados! Eles usam a rede para estudar, jogar, namorar, conversar com a galera e muitas outras atividades do dia a dia. Mas 3 milhões de crianças e adolescentes, entre 9 e 17 anos,
...
Human Rights and Technological Change: Conflicts and Convergences After 1945
Göttingen: Wallstein Verlag (2022), 392 pp.
"The volume analyses the ambivalent relationship between human rights and modern technologies since 1945. Tools of suppression or agents of emancipation? Modern technologies have become a major subject of human rights policy. Surveillance technology, the military use of drones, and the possibilities
...
La privacidad en la era de las redes sociales
México, DF: Instituto Nacional de Transparencia, Acceso a la Información y Protección de Datos Personales (INAI) (2022), 135 pp.
"El presente ensayo que usted tiene entre sus manos trata sobre las consideraciones y desafíos entorno a la agenda de la privacidad y protección de datos personales en las redes sociales digitales. El autor hace mención reiteradamente sobre las implicaciones que tiene en el ámbito legal; pero si
...
Cyber security, surveillance and journalism in Scotland
Dundee: Leverhulme Research Centre for Forensic Sciences (2022), 21 pp.
"The report is the output of a RSE-funded project on how journalists in Scotland undertake their work in the digital age from the point of view of cyber security and surveillance impacts. This research interviewed ten journalists from Scotland, from various beats, locations, and employment backgroun
...
Guidelines for Judicial Actors on Privacy and Data Protection
Paris: UNESCO (2022), 23 pp.
"These guidelines aim to provide a general framework for judicial actors to assess matters of privacy and data protection in the face of other rights, such as freedom of expression and the right to privacy. The document includes relevant case law from various national, international and regional bod
...
Regulating Big Tech: Policy Responses to Digital Dominance
Deep Insights
New York: Oxford University Press (2022), xii, 368 pp.
"This book has compiled the tech policy debate into a toolkit for policy makers, legal experts, and academics seeking to address platform dominance and its impact on society today. It discusses the global consensus around technology regulation with recommendations of cutting-edge policy innovations
...
"The consumer Internet of Things (IoT) is a fast-growing area of technology, increasingly embedded in the public and private spheres, including both in and on bodies. There are various security concerns and academic investigations into potential risks of this expansion, but none yet specifically add
...
Cybersecurity in Poland: Legal Aspects
Cham: Springer (2022), xvi, 513 pp.
The State of Digital Security Among Independent Media Organizations in Lebanon
Beirut: Samir Kassir Foundation (2022), 31 pp.
"This research was conducted to assess the digital security posture among independent media organizations in Lebanon. It is significant for media organizations in Lebanon to maintain a good standard of digital security, especially in an era when press freedom is increasingly under attack." (Introduc
...
Seguridad digital
FundaRedes (2022), 15 pp.
"En la era digital los equipos electrónicos y la información manejada por los activistas y defensores de Derechos Humanos también están en riesgo. La seguridad digital, está compuesta por un conjunto de herramientas, hábitos y métodos empleados para proteger los equipos electrónicos y la inf
...