Digital Privacy & Safety
Filter
268
Featured
Topics
Cybersecurity, Digital Safety, Privacy, Right to Privacy
175
Surveillance, Surveillance Technologies, Spyware
38
Data Protection: Law & Regulation
27
Safety of Journalists, Safety Risks of Media Workers
23
Child Protection Online
17
Freedom of Expression
8
Algorithms & Big Data
8
Cybercrimes
8
Gender-Based Online Harassment & Sexual Threats
8
Child Abuse: Digital Media
7
Child Protection, Protection of Minors
7
Encryption, Cryptology
7
Internet Censorship Circumvention Tools & Strategies
7
Data Governance, Data Justice, Data Sovereignty
7
Internet Governance, Internet Policies
7
Data Protection (Computer Software)
6
Communication Rights
5
Freedom of Expression Online, Internet Freedom
5
Digital Ethics, AI Ethics, Social Media Ethics, Data & Information Ethics
5
Internet / Social Media Law & Regulation
5
Children's Rights
4
Harassment & Intimidation of Journalists
4
Cyberwarfare, Cyber Operations: Attacking Enemy Computers, Software, and Control Systems
4
Cyberbullying, Cyberharassment
4
Digital & Information Literacy
4
Sexual Abuse: Digital Media
4
Investigative Journalism
4
Human Rights Protection
4
Software Security
4
Access to Public Information, Freedom of Information, Right to Information
3
Digital Activism, Cyber Advocacy
3
Digital & Social Media Use: Children
3
Digital & Social Media Use: Youth
3
Digital Rights
3
Digital Platforms & Intermediaries
3
Google
3
Social Media
3
Content Moderation & Regulation: Social Media
3
Digitalization, Digital Transformation
3
Disinformation, Misinformation, Fake News
3
Countering Hate Speech, Disinformation & Propaganda
3
Gender and Media, Gender and Communication
3
Female Journalists & Media Workers
3
Digital Literacy: Youth
3
Media Law & Regulation
3
Helplines, Hotlines
3
Access to Internet & Digital Communications
2
Digital Divide, Digital Inequalities
2
Open Data
2
Audience Research Methods
2
Media & ICT Use in Authoritarian Regimes / Dictatorships
2
Mobile Phone Use: Migrants & Refugees
2
Digital Literacy: Children
2
Media / Communication Control
2
Censorship
2
Secret Services, Intelligence Services
2
Digital Communication, Digital Media
2
Big Digital Platforms, Big Tech Companies
2
Digital Inclusion
2
Digital Platform & Intermediaries Regulation
2
Facebook
2
Artificial Intelligence
2
Gender and ICTs / Internet
2
ICT Development Assistance
2
Humanitarian Aid
2
Enterprises, Companies, Corporations
2
Ethics & Data Protection in Research
2
Fact-Checking & Verification of Sources
2
Sexuality: Media Representation, Sexually Explicit Media Content, Pornography
2
COVID-19 Pandemic: Effects on Journalism, Media & Communication
2
Accountability & Transparency
2
Data Collection, Data Collection Methods
2
Open Source Software
2
Mobile Phones, Smartphones
2
Telecommunication Industries & Markets
2
Access to Media & Information
1
Advertising
1
Advocacy & Empowerment: Children
1
Civic Engagement, Citizen Participation, Civil Society & Digital Communication
1
Behavior Tracking & Cookies
1
Digital & Social Media Use, Internet Use
1
Internet & Social Media Use: Women
1
Mobile Phone Use: Children
1
Mobile Phone Use: Youth
1
Mobile Phone Use
1
Opinion Polls, Public Opinion Research
1
Authoritarian Regimes: Government Communication Strategies
1
Girls and Media
1
Digital Media Censorship, Control & Filtering, Internet & Social Media Censorship
1
Intellectual Property
1
Media Assistance: Freedom of Expression & Safety of Journalists
1
Facial Recognition, Biometric Surveillance
1
Press Freedom & Communication Rights Violations
1
Self-Censorship
1
Right to be Forgotten
1
Community Informatics
1
Conflicts: Victims' Perspectives
1
Crime & Violence Reporting
1
Development Projects
1
Data
1
Data Journalism, Computer-Assisted Investigative Reporting
1
E-Governance, E-Democracy
1
Internet
1
Microtargeting
1
Digital Political Communication
1
Political Blogging
1
Scoring, Scoring Systems
1
Sexting (Sending Sexually Explicit Messages of Oneself to Others)
1
Blogging, Blogs
1
Telegram
1
Twitter & Microblogs
1
Weibo (Microblogging Website, China)
1
VK (Russian Social Network)
1
AI Regulation & Legislation
1
Online Learning, E-Learning
1
ICT Policies
1
Postal Services, Letters & Parcels, Stamps
1
LGBT & Communication / Media
1
Disinformation & Misinformation Law & Regulation
1
Digital Economies & Markets
1
Informal Sector, Informal Economy
1
Labour, Labour Markets, Labour Laws, Working Conditions
1
Training of Trainers, Teacher Education
1
Sports
1
Accountability & Transparency of the Media
1
Defamation Law & Regulation
1
Journalism Ethics
1
Self-Regulation of Media
1
Impact Assessment & Outcome Evaluation
1
Feminism & Communication
1
Gender-Based Harassment, Intimidation & Violence
1
Media Assistance: Gender Focus
1
Decolonial & Non-Western Approaches
1
COVID-19 Communication
1
European Union (EU)
1
Journalism Education & Training
1
Journalism Education Curricula
1
Corruption Reporting & Role of Media in Curbing Corruption
1
Media & Information Literacy
1
Media Literacy: Families
1
Media Literacy: Youth
1
Child Protection: Legislation & Regulation
1
Civil Rights
1
Confidential Sources, Whistleblowing, Protection of Journalists' Sources
1
Consumer Protection
1
Criminal Law & Criminal Prosecution
1
Forced Labour & Human Trafficking
1
Human Rights
1
Law & Regulation: Protection of Confidential Sources & Whistleblowers
1
Personal Identification (ID) Systems
1
Digital Media Use: Migrants & Diasporas
1
Youth Migrants, Youth Refugees, Youth Dasporas
1
Political Resistance
1
Personal Safety
1
Politics and Media
1
Election Campaigns: Social Media
1
Independent & Oppositional Media
1
Political Communication
1
Political Parties: Communication Strategies
1
Manipulation
1
Religion (General)
1
Religious Social Work
1
Sampling (Survey Methodologies, Statistics)
1
Researchers
1
Crimes, Criminality, Organized Crime
1
Computer Networks, Local Area Networks (LAN)
1
Software
1
Digital Contact Tracing
1
Remote Work, Teleworking, Working from Home
1
Telecommunication Companies, Mobile Phone & Fixed Line Operators
1
Telecommunication Law, Regulation & Policies
1
Telephone
1
Suburbs, Poor Districts, Slums, Shanty Towns
1
Language
Document type
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"In its first section, the study examines the legal framework regarding personal data in Lebanon. Even though Lebanon participated in developing the directives on data protection legislation issued by the United Nations Economic and Social Commission for Western Asia (ESCWA) in 2012, the country sti ... more
"This study, which covers 121 UNESCO Member States, represents a global benchmarking of journalistic source protection in the Digital Age. It focuses on developments during the period 2007-2015. The legal frameworks that support protection of journalistic sources, at international, regional and coun ... more
"It is our sincerest hope that this guide will have provided you with a greater understanding about online child sexual exploitation. We hope it has also given you a clearer realisation of the important role that you and your faith community can play in helping to prevent and end this crime. Togethe ... more
"La presente propuesta metodológica para la promoción del uso seguro del Internet producto de un acuerdo de trabajo entre el Instituto Interamericano del Niño, la Niña y Adolescentes (IIN-OEA) y World Visión República Dominicana aborda, en forma conjunta, los desafíos que, desde la perspectiv ... more
"Circumvention tools designed to bypass online censorship such as simple web proxies, virtual private network service, and so on are frequently used in countries whose governments impose heavy Internet censorship. Around 18 million Internet users in China are currently using those tools to bypass th ... more
"En los últimos 20 años, se han dado pasos importantes para construir y fortalecer a la sociedad civil y la participación religiosa en la lucha contra la explotación sexual de niñas, niños y adolescentes. Sin embargo, debemos hacer mucho más y, por consiguiente, Religiones por la Paz (RfP) y ... more
"With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance. To the toolkit of privacy protecting techniques and projects, they propose adding obfusca ... more
"This mapping study investigates the ways in which the Kenyan government and other actors have initiated or engaged in multistakeholder processes in order to address cybersecurity-related matters in the country. Based on this, it will identify best practices, gaps and missing links, as well as oppor ... more
"Encryption is a hot topic in the current global discussion on Internet governance. This research delves into the subject, to outline a global overview of the various means of encryption, their availability and their potential applications in the media and communications landscape. The research expl ... more
"This guide aims to help correct the imbalance in capacity and expertise between human rights defenders and cybersecurity professionals and policy-makers. At the heart of the guide is an attempt to address perhaps the fundamental barrier: the absence of clear definitions and agreed terms. It will do ... more
"This survey was designed to measure how journalists around the world take advantage of technology to enhance their security. The results suggest that there is a general lack of awareness about the power that digital tools have to improve a journalist’s protection. There are scores of organization ... more
"IT Governance requires public and corporate cybersecurity policies to improve fighting against cybercrime and other violations. The EU, the USA and Brazil have recently developed different regulatory approaches on the subject. Assessing how to design policies in line with them across geographies se ... more
"Compromised Connections is a brief introduction to emerging security issues facing mobile phones in development. It recommends safety measures that can be quickly adopted – from device safety to data security – and points to resources that may be useful for people interested in following future ... more
"This series aims to help human rights defenders develop the tools, skills and knowledge they need to engage effectively in cyber policy debates. The series is structured around five modules. The first four each focus on a different aspect of cyber policy - human rights, cybersecurity, regulatory fr ... more
"This publication identifies at least 12 digital threats, including illegal or arbitrary digital surveillance, location tracking, and software and hardware exploits without the knowledge of the target. Further examples that are considered are: phishing, fake domain attacks, Man-in-the-Middle (MitM) ... more