Search database
Filter
315
Featured
Topics
25
24
18
18
16
15
15
14
11
11
10
10
9
9
9
9
9
9
8
8
8
7
7
7
7
7
7
7
7
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
83
35
17
8
8
8
7
7
6
3
1
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"The handbook is an advocacy tool that details laws and regulations that enable and impact freedom of expression, media freedom, work of human rights defenders and activists in Zambia." (Publisher description)
"What we lacked was a set of simple instructions that could help navigate the workflows and procedures of a digital security helpline, while focusing on the specific demand of offering a service to groups that are often underfunded, understaffed, non-hierarchical and exposed to disproportionate thre ... more
"This guide looks at how our mobile devices could leak data about our locations and what we could do to protect ourselves against it. It’s designed for most Central European journalists’ threat models and only looks at how our mobile devices could give up precise location data on us. It doesn’ ... more
"This white paper seeks to provide an overview of the core thematic issues around digital rights and digital safety across the world. The content builds off a global mapping exercise of organisations and knowledge, predominantly focused on Africa and the Middle East, Latin America, Asia-Pacific, Eas ... more
"This report documents the emerging and current trends in biometric data collection and processing in Africa. It focuses on the deployment of national biometric technology-based programmes on the continent, and the associated challenges, gaps and risks that are posed to data protection and privacy." ... more
"The consumer Internet of Things (IoT) is a fast-growing area of technology, increasingly embedded in the public and private spheres, including both in and on bodies. There are various security concerns and academic investigations into potential risks of this expansion, but none yet specifically add ... more
"The OECD Policy Framework on Digital Security helps policy makers understand the economic and social dimension of cybersecurity, raises their awareness about the OECD approach to digital security policy, and encourages them to make use of OECD digital security recommendations to develop better poli ... more
"This is a report on the health of the open-source digital safety tool ecosystem that draws from the BASICS experience. Internews' BASICS project (Building Analytical and Support Infrastructure for Critical Security tools) was a 30-month initiative to strengthen the capacity of open source digital s ... more
"In the past few years, many countries across the continent have enacted various laws that permit surveillance, mandate telecommunication intermediaries to facilitate the interception of communication, stipulate the mandatory collection of biometric data, limit the use of encryption, require the loc ... more
"Die in diesem Open-Access-Buch zusammengeführten interdisziplinären Untersuchungen des „Forums Privatheit“ gehen der Frage nach, wie sich die Verwirklichungsbedingungen von Privatheit und Selbstbestimmung durch die Digitalisierung aller Lebensbereiche radikal ändern. Nahezu jede Lebensregung ... more
"This research was conducted to assess the digital security posture among independent media organizations in Lebanon. It is significant for media organizations in Lebanon to maintain a good standard of digital security, especially in an era when press freedom is increasingly under attack." (Introduc ... more
"Data governance is an integral aspect of digital authoritarianism because it incorporates any type of control, authority, and manipulation of data […]. Within the context of digital authoritarianism, data governance may incorporate both states and non-state actors that collaborate with states to ... more
"On April 3, 2022, Hungary’s ruling Fidesz party won a fourth term in national elections, cementing its dominance with a two-thirds majority that will allow it to continue traveling what critics of the party and many others would describe as the path of centralizing power and rolling back democrat ... more
"This report examines the widespread use of encrypted messaging apps (EMAs) in developing countries and emerging democracies has prompted news outlets in these regions to experiment with them as mechanisms for distributing the news. From news products designed specifically for sharing via EMAs to pr ... more
"The Zimbabwean state has in recent years stepped up its surveillance efforts on citizens, civil society and journalists who are viewed as the “enemies of the state”. This state surveillance has been argued to infringe on citizens’ right to privacy and access to information. We are mindful tha ... more