"This article examines how privacy is understood, lived, and negotiated by youth users of information and communication technology (ICT) in slum communities in the Philippines. In the context of shared and public access arrangements prevalent in many low-income communities in the Global South, the a
...
rticle discusses the intersections of space, technology, and the sharing economy underlying socio-technical practice that shape the privacy notions. It argues for rethinking the ICT for development and privacy policy discourse to integrate experiences from shared access settings." (Abstract)
more
"Media companies in Serbia are not sufficiently aware of the importance of personal data protection, nor are there developed procedures regarding the fulfilment of standards in line with new rules for personal data protection. Taking into account media business models in a digital environment, which
...
are substantially based on collecting data of visitors and users of websites, it is necessary to advance their practices and internal policies. This is necessary so that they can use the potentials of digital economy and respect the privacy of their audiences in accordance with the new legislation." (Summary)
more
"In our increasingly digital environment, it is of paramount importance that citizens be in possession of a legal and digital identity if they are to access digital government services and participate fully in the digital economy. In 2018, of the 175 countries with a national ID (foundational or leg
...
al identification) system in place, 160 have a system that is at least partially e-ID. However, even in these countries a significant portion of the population still do not have a national ID and over a one billion are still “invisible”, lacking all proof of legal identity. In some countries around the world, significant progress is being made to remedy this, building on established practices and often using the Subscriber Identity Module (SIM) registration, “Know-Your-Customer” (KYC) processes and mobile devices as a foundation. “Digital Identity in the ICT ecosystem: An overview” sets out clearly the different elements in this complex and unfolding landscape. It defines digital identity, provides an overview of the various types of digital identity systems, looks at different approaches taken and the range of challenges being faced, as well as opportunities that arise from using digital identity platforms." (Executive summary)
more
"The Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological perspective. Privacy is in the news almost every day: mass surveillance by intelligence agencies, th
...
e use of social media data for commercial profit and political microtargeting, password hacks and identity theft, new data protection regimes, questionable reuse of medical data, and concerns about how algorithms shape the way we think and decide. This book offers interdisciplinary background information about these developments and how to understand and properly evaluate them. The book is set up for use in interdisciplinary educational programmes. Each chapter provides a structured analysis of the role of privacy within that discipline, its characteristics, themes anddebates, as well as current challenges. Disciplinary approaches are presented in such a way that students and researchers from every scientific background can follow the argumentation and enrich their own understanding of privacy issues." (Publisher description)
more
"We wrote this booklet to help our sisters learn about problems that we can run into on the internet (like leaked or stolen personal photos, viruses, and scams), how we can make informed decisions every day to protect ourselves, and to help make the internet a safe space for ourselves, our families,
...
and all other women." (Page 1)
more
"We found that knowledge around digital security amongst women in Kampala is quite low. A high proportion of women have been victims of cyberbullying without any obvious routes to seeking justice against perpetrators. There is an urgency for law enforcement and government to hand down stricter penal
...
ties for offenders and to provide measures that protect women from online gender-based violence. Furthermore, there is a large role for service providers and civil society to play in building the capacity of women to take precautionary steps to protect their online identities as well as to advocate for regulations and policies that can readily address the growing and changing threats to digital safety and security. As more women continue to access the internet, we must focus on keeping the internet a safe space where these women can benefit rather than become victims of violence and fraud." (Conclusions)
more
"At the forefront in its field, this Handbook examines the theoretical, conceptual, pedagogical and methodological development of media literacy education and research around the world. Building on traditional media literacy frameworks in critical analysis, evaluation, and assessment, it incorporate
...
s new literacies emerging around connective technologies, mobile platforms, and social networks. A global perspective rather than a Western-centric point of view is explicitly highlighted, with contributors from all continents, to show the empirical research being done at the intersection of media, education, and engagement in daily life. Structured around five themes—Educational Interventions; Safeguarding/Data and Online Privacy; Engagement in Civic Life; Media, Creativity and Production; Digital Media Literacy—the volume as a whole emphasizes the competencies needed to engage in meaningful participation in digital culture." (Publisher description)
more
"Compared to five years ago, internet penetration rose in all six countries surveyed and most dramatically in Jordan, Lebanon, and Tunisia. Smartphone ownership tracks closely with internet use in the six surveyed countries. Nearly all nationals in Lebanon, Qatar, Saudi Arabia, and the UAE own a sma
...
rtphone compared with 83% of Jordanians and 65% of Tunisians. Use of Arabic online has increased proportionally with the increase in internet users. In comparison, use of the internet in English remains essentially flat, 25% in 2013 and 28% in 2017, despite the increase in internet use. As internet penetration rises, nationals are less likely to be using offline media platforms compared with 2013. Most nationals still watch TV, but the rate declined modestly since 2013 (98% in 2013 vs. 93% in 2017). Rates of newspaper readership, however, declined more sharply from 47% in 2013 to 25% in 2017. Radio and magazines also declined in popularity since 2013 (radio: 59% in 2013 vs. 49% in 2017; magazines: 26% in 2013 vs. 19% in 2017)." (Executive summary, page 10)
more
"This study, which covers 121 UNESCO Member States, represents a global benchmarking of journalistic source protection in the Digital Age. It focuses on developments during the period 2007-2015. The legal frameworks that support protection of journalistic sources, at international, regional and coun
...
try levels, are under significant strain in 2015. They are increasingly at risk of erosion, restriction and compromise - a development that is seen to represent a direct challenge to the established universal human rights of freedom of expression and privacy, and one that especially may constitute a threat to the sustainability of investigative journalism. In many of the countries examined in this Study, it was found that legal source protection frameworks are being actually or potentially: overridden by national security and anti-terrorism legislation; undercut by surveillance – both mass and targeted; jeopardised by mandatory data retention policies and pressure applied to third party intermediaries - like ISPs, telcos, search engines, social media platforms - to release data which risks exposing sources; outdated when it comes to regulating the collection and use of digital data, such as whether information recorded without consent is admissible in a court case against either a journalist or a source; and whether digitally stored material gathered by journalistic actors is covered by existing source protection laws." (Executive summary)
more
"These are the basic tools to protect confidentiality, integrity and availability of your information. This list has been built with the support of the Information Security and Capacity Project (ISC Project)." (Page 1)
"The research in these pages covers the theory around multistakeholder participation in Internet governance through a review of relevant literature. It also analyses case studies from Kenya to Brazil, South Korea, and the Internet Governance Forum (IGF), which illustrate how multistakeholder approac
...
hes to Internet governance are applied in practice in diverse places and on different issues. In two of these cases, the outcome had legal repercussions that advanced the role of the Internet in terms of respect for rights; in the other two, the impact was positive for wider norms and processes." (Foreword, page 6)
more
"The purpose of this document is to provide researchers, especially those working in smaller organisations that might not have extensive resources or experience in data protection requirements, with general guidance on their responsibilities within a global data protection framework to ensure that d
...
ata subjects retain control over their personal information. The specific framework used was developed by the Organisation for Economic Co-operation and Development (OECD). This framework includes a set of eight principles for use in designing programs to ensure privacy and protect personal data: Collection limitation, Data quality, Purpose specification, Use limitation, Security safeguards, Openness, Individual participation, Accountability." (Page 4)
more
"Getting to the heart of stories by asking the really tough questions and going places where no one wants to go. That’s documentary at its best. This Safe+Secure Handbook has been designed to help filmmakers get there—and back—and get their stories into the public domain as safely as possible.
...
The Documentary Funders behind this initiative want to help filmmakers remove unnecessary risk, minimise possible risk, and have a contingency plan for the rest. As supporters of great documentaries, we drew on what many of the best independent filmmakers told us they wished they had done differently. We also worked with the smartest journalism and legal professionals." (Page 2)
more
"La seguridad digital perfecta casi nunca se alcanza pero es posible fortalecerla con algunas prácticas sencillas que si se implementan continuamente mejorarán la protección de la información sensible y se evitará poner en riesgo a las víctimas así como a los defensores que trabajan para ello
...
s." (Página 1)
more
"La presente propuesta metodológica para la promoción del uso seguro del Internet producto de un acuerdo de trabajo entre el Instituto Interamericano del Niño, la Niña y Adolescentes (IIN-OEA) y World Visión República Dominicana aborda, en forma conjunta, los desafíos que, desde la perspectiv
...
a de los Derechos de la niñez y adolescencia nos presenta la expansión del Internet y su creciente presencia en la vida cotidiana de las nuevas generaciones. No se trata de diabolizar los avances tecnológicos ni los cambios en las comunicaciones humanas, producto de dichos avances, sino de reconocer las oportunidades y las amenazas que representan el uso masivo de las mismas. El acceso a Internet es para niños, niñas y adolescentes una herramienta de enorme valor para la obtención de información, comunicación y expresión de sus puntos de vista, así como el conocimiento de nuevas y variadas realidades. Para muchos el acceso a Internet, en la fase histórica en que vivimos, tiene un significado similar a lo que fue la incorporación de la lectoescritura a principios del siglo pasado: una herramienta imprescindible de integración, comunicación y acceso a los bienes de la cultura. Desde esta mirada, el no acceso constituye una brecha de exclusión que se entrelaza y potencializa con otras variables asociadas a la producción social de la vulnerabilidad. Por otra parte, no podemos desconocer que las potencialidades del internet coexisten con riesgos y amenazas. Para los niños, niñas y adolescentes navegar en Internet tiene riesgos similares o tal vez superiores a los que supone el transitar cualquier espacio público sin el acompañamiento responsable de un adulto [...]
Muchas experiencias dan cuenta de continuidades entre violencias virtuales y físicas. Solo a modo de ejemplo, podemos citar el bullying que es extendido a través del cyberbullying o la utilización de Internet para reclutar posibles víctimas de trata o de explotación sexual. El dualismo del Internet nos enfrenta al desafío de articular acceso e inclusión con protección. Acceso seguro con realización de derechos y es aquí donde es necesario reafirmar algunos principios y conceptos presentes en la Convención de los Derechos del niño. En primer lugar, el principio de corresponsabilidad, los niveles de protección de los niños, niñas y adolescentes requieren una corresponsabilidad entre familia, comunidad y Estado." (Palabras introductorias, página 7)
more
"With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance. To the toolkit of privacy protecting techniques and projects, they propose adding obfusca
...
tion: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage - especially for average users, those of us not in a position to opt out or exert control over data about ourselves." (Back cover)
more
"To many in the media, Internet governance seems to be an issue far removed from their daily life and work. This misconception can have substantial consequences. The Internet is fast becoming the infrastructure for all communications between media and citizens. If journalists and media freedom activ
...
ists do not get involved in the debates about how to govern the net, it will be left to governments and private companies to define the rules for our public arena." (Introduction, page 9)
more