Search database
Filter
315
Featured
Topics
25
24
18
18
16
15
15
14
11
11
10
10
9
9
9
9
9
9
8
8
8
7
7
7
7
7
7
7
7
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
83
35
17
8
8
8
7
7
6
3
1
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"Digitale Gewalt kommt nicht nur im öffentlichen Raum vor, sondern auch in privaten Beziehungen – und hat in Kombination mit häuslicher und sexualisierter Gewalt eine deutlich geschlechtsspezifische Komponente. Durch Informations- und Kommunikationstechnologien haben Gewaltformen wie Doxing, Sta ... more
"Of the eight countries surveyed here, only four have comprehensive data protection privacy acts in place: Kenya, South Africa, Togo and Uganda. But as these research reports suggest, this is not necessarily a strong indicator of whether a country is committed to privacy rights, or of the efficacy o ... more
"This report outlines the relevance of gender norms to cybersecurity. It draws on existing research, supplemented by stakeholder and expert interviews, to assess gender-based differences in the social roles and interaction of women, men and non-binary people of all ages reflected in the distribution ... more
"The module aims to: 1. Clarify the concept of information security, privacy and related concepts; 2. Describe threats to information security and how they can be addressed; 3. Discuss the requirements for the establishment and implementation of policy on information security, as well as the life cy ... more
"We structured the report by beginning with an overview of the digital environment in the Philippines in 2020 before delving into the impact of technology on human rights: the key events, challenges and accomplishments, then a forecast of 2021 and 2022. These are divided into the following key thema ... more
"Beim so genannten „Scoring“ wird einer Person mithilfe algorithmischer Verfahren ein Zahlenwert zugeordnet, um ihr Verhalten zu bewerten und zu beeinflussen. „Super-Scoring“-Praktiken gehen noch weiter und führen Punktesysteme und Skalen aus unterschiedlichen Lebensbereichen zusammen, wie ... more
"This report aims to bridge two communities – the broader development community and the cybersecurity capacity building community – to achieve more resilient outcomes by ensuring incorporation of cybersecurity and digital resilience into digital development activities. This report is a product o ... more
"In this report, we highlight how privacy and data protection violations by state and non-state actors are compounded by the lack of legal data protection safeguards which would obligate public entities, private companies, and international organizations to respect and adhere to data protection prin ... more
"This book frames digital sovereignty as a right to be claimed and a process constantly in the making, as a condition of the ability to critically partake in the digital transformation. Emphasizing a political and transformative significance of the term, this interdisciplinary publication gathers sc ... more
"The interviews and the analyses by the experts show that: –– Quality content increases safety. The editors interviewed for this publication confirm that fair and balanced journalism, which clearly distinguishes between facts and opinion and treats the people at the center of the story with resp ... more
"Hay una variedad de estrategias y enfoques que se pueden aplicar para enseñar a la Alfabetización mediática e informacional (AMI), los cuales se centran en el conocimiento, la actitud y las habilidades. Por supuesto, las y los capacitadores están en la libertad de modificar las metodologías pr ... more
"Based on the needs assessment, a high proportion of women in Cameroon face online violence and are increasingly concerned about their safety in digital spaces. However, many of these respondents are unaware of any legal protections offered to them. Additionally, they believe that they lack the appr ... more
"The Girls Online (GO!) Cybersafety project (GO! Cyber) aims to equip young women and girls with the skills and resources to participate meaningfully and safely in cyberspace. The project is implemented by CARE Vanuatu and Sista with the support of Australia’s Cyber and Critical Tech Cooperation P ... more
"The Digital Ecosystem Framework is organized around three separate, overlapping pillars: Digital Infrastructure and Adoption: the resources that make digital systems possible and how individuals and organizations access and use these resources; Digital Society, Rights, and Governance: how digital t ... more
"There is no question that we must address the issues of child safety, disinformation, national security, and criminal activity in the digital age. However, even if the stated end goal for mandating encryption backdoors is legitimate, the means must be necessary and proportionate. Deliberately intro ... more