Search database
Filter
315
Featured
Topics
25
24
18
18
16
15
15
14
11
11
10
10
9
9
9
9
9
9
8
8
8
7
7
7
7
7
7
7
7
6
6
6
6
6
6
6
5
5
5
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
83
35
17
8
8
8
7
7
6
3
1
1
1
1
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"The internet brought new opportunities for Pakistan to develop into a progressive society and a more democratic country, and it opened doors for more forms of criminal activity (like fraud, child pornography, etc.), more intimidation and the spreading extremism, and more information gathering on ci ... more
"The interviews and the analyses by the experts show that: –– Quality content increases safety. The editors interviewed for this publication confirm that fair and balanced journalism, which clearly distinguishes between facts and opinion and treats the people at the center of the story with resp ... more
"The purpose of this ex-post evaluation is for Internews to understand the impact that Safe Sisters has had on women in East Africa by documenting and publicly sharing their stories and evaluating the training approach itself. As women and girls come online for the first time, they disproportionatel ... more
"Hay una variedad de estrategias y enfoques que se pueden aplicar para enseñar a la Alfabetización mediática e informacional (AMI), los cuales se centran en el conocimiento, la actitud y las habilidades. Por supuesto, las y los capacitadores están en la libertad de modificar las metodologías pr ... more
"This book frames digital sovereignty as a right to be claimed and a process constantly in the making, as a condition of the ability to critically partake in the digital transformation. Emphasizing a political and transformative significance of the term, this interdisciplinary publication gathers sc ... more
"Each section of this guide will explore another dimension of digital security—assets, attackers, risks and likelihood—and address these key questions: What do I want to protect? Who are my attackers? Is my attacker able to succeed? How likely is it that my attacker will succeed? Threat modeling ... more
"The European Union (EU) recently passed the General Data Protection Regulation-a sweeping regulatory framework that sets a new global standard for the collection, storage, and use of personal data. To ensure far-reaching compliance with the GDPR, the EU has adopted a strict take-it-or-leave-it appr ... more
"Journalists have long been the targets of both physical and cyber-attacks from well-resourced adversaries. Internet of Things (IoT) devices are arguably a new avenue of threat towards journalists through both targeted and generalised cyber-physical exploitation. This study comprises three parts: Fi ... more
"[...] se identificaron rápidamente las principales temáticas a incluir en el libro. Estas son: acceso a Internet y derechos humanos online, populismo y desinformación, privacidad, ciberseguridad, big data y datos abiertos, teleeducación, teletrabajo, cooperación digital y transformación digit ... more
"This document is a compilation of the outcomes of the research component of a small project entitled “Putting cybersecurity on the rights track” that the Association for Progressive Communications (APC) implemented during the course of 2019 with the participation of APC members." (About this pr ... more
"Specifically, the review focuses on the means, barriers, and associated cybersecurity and privacy concerns that refugees face around connectivity. This includes but is not limited to mobile connectivity and social media, particularly in displacement contexts. While these subjects may at times inter ... more
"This Digital Citizenship Toolkit (DCT) is an attempt to introduce key concepts related to digital citizenship while taking into account the local socio-economic realities, technology adoption patterns, societal actions and other considerations. For young people, in particular, the demarcation betwe ... more
"Open-source intelligence gathering and analysis (OSINT) techniques are no longer predominantly the remit of private investigators and journalists. An estimated 80-90% of data analysed by intelligence agencies is also now derived from publicly available material. Additionally, the massive expansion ... more
"Open-source intelligence (OSINT) gathering and analysis techniques are used by investigators from a variety of fields, owing to their accessibility and exceptional capacity for corroboration. It has previously been argued that proposed data protection legislation can chill the free press, but there ... more