"This article discusses the perspectives of European Union (EU) / European Economic Area Data Protection Authorities (DPAs) on their role in protecting democratic rights and freedoms in digitalised societies. Data Protection Authorities, which are independent regulators, are responsible for implemen
...
ting the EU’s General Data Protection Regulation in their respective countries. The views of DPAs are important given their special role in monitoring newly emerging digital technologies and how their use may impact on the functioning of democracies. The article highlights three key themes which emerged in interviews with 18 DPAs in answer to the question about what they consider to be the greatest challenges to democratic freedoms. These are: (1) threats to elections due to the manipulation of voters; (2) discriminatory effects of automated decision-making; and (3) broader chilling effects on democratic norms due to ubiquitous surveillance. The article then analyses the solutions named by DPAs to mitigate these challenges to identify their governing, or political, rationalities. The paper finds that the solutions available to DPAs to manage democratic harms tend to emphasise individual over collective responsibility and are connected to broader currents of neoliberal governance. The paper highlights the ways in which some DPAs act as important critical voices within their respective jurisdictions to draw political attention to potentially anti-democratic effects of certain practices, such as profiling, or to the model of digitalisation as it is currently constructed." (Abstract)
more
"In the aftermath of the COVID-19 pandemic, there is a growing use of Information and Communication Technology (ICT) for the purposes of labor control and surveillance. This trend significantly affects the knowledge workers who are deeply connected with ICT. However, there is a lack of studies tackl
...
ing the perceptions of knowledge workers regarding surveillance, its impact on their work practices, and how they push back against it. Based on Scott’s concept of hidden transcripts, this article studies the workplace surveillance faced by Chinese knowledge workers and their responses and reveals the complex interplay between workplace control, the meaning of work, and hidden transcripts. Based on the findings of 13 in-depth interviews and the analysis of the content of 3,205 Weibo posts, 4 themes are identified in the discussions about the work of Chinese knowledge workers, the influence of their perceived meaning of work on their interpretation of surveillance, and the specific strategies of their hidden transcripts. The paradoxical role of ICT is demonstrated in labor rights as sites of surveillance and countersurveillance, especially digital platforms. Furthermore, a more comprehensive internal view of the survival dynamics among knowledge workers is provided." (Abstract)
more
"Despite the scientific significance of journalism practice, the gap between academic and applied fields persists. In this paper, based on our project on the digital security of journalists and their sources, we argue that practice-relevant research in the form of the action-innovation model benefit
...
s both the academic and the applied realms. To this end, we provide hands-on practical training on the important topic of digital security, which remains under-researched and therefore requires an exploratory approach. A total of 23 training sessions were conducted for 230 participants representing various media outlets in Germany. The objective was to enhance awareness and skills regarding digital threats. This constituted the core of a mixed-methods approach, which included surveys, observation, and interviews. In evaluating the process and results, it was found that the combination of applied and scholarly elements enhanced the project in terms of access, commitment, contextualisation and depth. The data were analysed according to an adaptation of the socio-technological Newsafety concept. The findings revealed a general lack of competence in dealing with cyber threats and a severely lacking in-house communication. In general, to address and explore relevant and current issues like this, it is recommended to consider the practical value to research participants and to collaborate with practice-based trainers who can help bridge the gap and foster mutual understanding." (Abstract)
more
"The fifth edition of the Global Cybersecurity Index (GCI) measures the commitment of countries to cybersecurity in the context of measures across the following five pillars: legal; technical; organizational; capacity development; cooperation. The GCI, launched in 2015 by the International Telecommu
...
nication Union, seeks to help countries to identify areas of improvement and encourage countries to act in building capacity and capabilities under each pillar. The GCI has been continuously adapted across editions to respond to changing risks, priorities and resources, in order to provide a more relevant snapshot of cybersecurity measures taken by countries. Since 2021, countries have on average taken more cybersecurity-related actions and improved their commitments to cybersecurity. The global average country score has risen to 65.7/100. Across the five GCI pillars, most countries are strongest in the legal pillar. By contrast, the average country is weakest in the capacity-development and technical pillars. Each region has countries that are role-modelling or are advancing, and each region also has countries that are in the beginning stages of building their cybersecurity commitments. To capture these differences, country performance is measured across five tiers, with Tier 1 being the highest and Tier 5 the lowest. These tiers provide peer groups based on scores to help countries to understand and identify role models for improvement." (Report summary, page 1)
more
"This assessment tool seeks to provide step-by-step advice and concrete recommendations for those wishing to develop a gender approach to cybersecurity policy. Building on APC’s previous work on a human rights approach to cybersecurity, online gender-based violence, and cybersecurity and gender, r
...
anging from research to advocacy, this document is part of a framework we have designed to support policy makers and civil society organisations in developing gender-responsive cybersecurity policies. This framework also includes two other documents, and we recommend that those using this assessment tool consult them before putting the principles and processes we outline here into practice: a literature review that explores how cybersecurity as a gendered space has been addressed in research; a document identifying norms, standards and guidelines that cybersecurity policy makers and advocates can draw on when seeking to promote a gender approach within national or multilateral cybersecurity discussions." (Intgroduction, page 4)
more
"This handbook is divided into three main sections: Fact-Checking, Digital Security, and Data Journalism. Each section contains a series of chapters that cover essential topics, providing you with a holistic understanding of these subjects. Let's take a brief look at what each section entails. In th
...
e Fact-Checking section, we will explore the fundamentals of fact-checking, including the identification and debunking of false information. We will delve into the importance of verification and provide you with practical techniques to verify images and videos. Additionally, we will discuss transparency in media and the vital role it plays in fostering trust and credibility. The Digital Security section focuses on safeguarding digital information and protecting against cyber-attacks. We will examine various types of cyber threats and discuss the importance of digital security in the context of journalism. You will learn valuable tips and tools to enhance your digital security and reduce risks in an increasingly interconnected world. The Data Journalism section introduces the world of data and its application in journalism. You will learn how to find and analyse data, as well as how to create compelling data-driven stories. We will explore data visualisation techniques and discuss the role of social media in engaging with audiences. Throughout this handbook, you will encounter readings, notes, self-tests, and activities designed to enhance your learning experience. We encourage you to engage actively with the material, complete the suggested activities, and seek further clarification if needed." (Preamble, page 6)
more
"Surveillance infrastructure in China monitors and enables authorities to react to potential isky,miscreant or criminal behaviour. What type of behaviours are perceived to be so, is determined in large part by ideology. Therefore, surveillance infrastructure relies on the machinery of ideology to de
...
fine the boundaries of its use. In this paper, we outline six key ideological concepts relating to governance in Xi Jinping’s China that have helped to expand the boundaries of surveillance. We identify terms embedded in promotional material of Hikvision and other surveillance technology firms as a springboard for conceptual discussion. The aim is to survey the ideological lexicon of concepts that position surveillance within the Party-state’s broad capacity-building ambitions for governance in Xi’s China. This positioning amplifies the political responsibility of state, social and market actors to work together to broaden surveillance activities for ‘society-building’ purposes, and ultimately for the realisation of Xi Jinping’s goal of National Rejuvenation." (Abstract)
more
"Das vorliegende Papier soll die Umsetzung des neuen Digital Services Act (DSA) konstruktiv aus einer kinderrechtlichen Perspektive begleiten. Dabei wird gezeigt, welche Potenziale sich aus dem DSA ergeben, um Kinderrechte im Digitalen zu stärken. Im Fokus stehen Anbietermaßnahmen sowie auch Präv
...
entions- und Befähigungsanliegen. Dabei wird über Points to Consider erarbeitet, was kinderrechtliche Good- und Best-Practice-Ansätze bei der Erfüllung der Anforderungen des DSA ausmacht." (Zusammenfassung)
more
"Welche Strategien führen zu mehr IT-Sicherheit? Welche Reformen sind notwendig, um die deutsche Cybersicherheitsarchitektur zu stärken? Und wie soll auf den IT-Fachkräftemangel reagiert werden? Bei der Beantwortung dieser Fragen sind sich die Bundesregierung und Vertreterinnen und Vertreter aus
...
Wissenschaft und Zivilgesellschaft nicht immer einig." (Verlagsbeschreibung)
more
"Open source software (OSS) is the backbone and driver of digitization across sectors worldwide. This makes OSS a cornerstone of every society and economy, including the core of national security concerns. Therefore, governments have a vested interest in OSS security. At the same time, governments,
...
as large users of OSS, bear some of the responsibility for supporting the OSS ecosystem. To assume responsibility, governments must understand the existing OSS communities and the culture surrounding OSS. Governments will be able to effectively foster OSS security only if they work with the ecosystem stakeholders. Doing so requires governments to adhere to guidelines such as respect, cooperation, collaboration and sincerity. In addition, governments must identify their own role(s) in consultation with the OSS ecosystem. Governments can serve as internal coordinators, role models, supporters and regulators. The role of internal coordinator requires governments to be more transparent and systematic in their own use of OSS. In particular, they should take stock of what is being used, where exactly the components are being used and how they are used. As role models, governments engage with OSS, adhering to best practices in the ecosystem and encouraging other governments and stakeholders to do so. As supporters, governments actively engage with the OSS ecosystem, mobilizing and channeling resources into it through various means. Governments use their regulatory powers to create a legal framework that reflects the characteristics of the OSS ecosystem. They can mix and match from different roles and shift between them as they gain more experience, trust and credibility in the OSS ecosystem." (Executive summary)
more