"Compromised Connections is a brief introduction to emerging security issues facing mobile phones in development. It recommends safety measures that can be quickly adopted – from device safety to data security – and points to resources that may be useful for people interested in following future
...
developments. Ultimately, it advocates a "mobile first” approach: adoption of an information management strategy that prioritizes the safety of mobile devices and their users." (Internews website)
more
"Encryption is a hot topic in the current global discussion on Internet governance. This research delves into the subject, to outline a global overview of the various means of encryption, their availability and their potential applications in the media and communications landscape. The research expl
...
ains how the deployment of encryption is affected by different areas of law and policy, and it offers detailed case studies of encryption in selected jurisdictions. It analyzes in-depth the role of encryption in the media and communications landscape, and the impact on different services, entities and end users. Built on this exploration and analysis, the research provides recommendations on encryption policy that are useful for various stakeholders. These include signaling the need to counter the lack of gender sensitivity in the current debate, and also highlighting ideas for enhancing “encryption literacy." (Back cover)
more
"The debate on Facebook raises questions about the use and users of this information service. This collected volume gathers a broad spectrum of social science and information science articles about Facebook.Facebook has many facets, and we just look forward above all to the use and users. The facet
...
of users has sub-facets, such as different age, sex, and culture. The facet of use consists of sub-facets of privacy behavior after the Snowden affair, dealing with friends, unfriending and becoming unfriended on Facebook, and possible Facebook addiction. We also consider Facebook as a source for local temporary history and respond to acceptance and quality perceptions of this social network service, as well. This book brings together all the contributions of research facets on Facebook." (Publisher description)
more
"This survey was designed to measure how journalists around the world take advantage of technology to enhance their security. The results suggest that there is a general lack of awareness about the power that digital tools have to improve a journalist’s protection. There are scores of organization
...
s of journalists, technologists, and activists developing tools for physical or digital protection or training reporters and editors on how to use them. But there can never be enough education about the risks that journalists face and the security measures they can take, especially when it seems that the press is under attack more frequently and in more aggressive ways than before." (Page 12)
more
"The central thesis of Crtl+Z is that a digital right to be forgotten is an innovative idea with a lot of possibilities and potential. The idea simply needs to be opened up, reframed, and restructured. The extreme options currently on the table limit the many ways to think about digital redemption a
...
nd polarize regions. By utilizing new theories of privacy, breaking down the concept to organize its many meanings, and reframing the problem as one of information stewardship instead of information permanence, a host of choices become available for consideration. In order to make these difficult choices once they are on the table, the issues must be configured to fit within a digital discourse, existing legal cultures, and the international community. My approach to analyzing digital redemption is inherently comparative. The right to be forgotten is indisputably a European creation, but there is a great deal to be gained from studying digital redemption beyond European borders. The right to be forgotten sits at the intersection of change: change in national and transnational policy and change in everyday information technology practices, demands, and expectations. Situated in this unique position, the right to be forgotten encompasses many of the big questions surrounding information technologies and offers a particularly valuable site and moment for comparison of democratic information societies. Comparison among regional treatments of information technology should help us make sense of legal particularities and assumptions that otherwise go unnoticed." (Introduction, page 21)
more
"This series aims to help human rights defenders develop the tools, skills and knowledge they need to engage effectively in cyber policy debates. The series is structured around five modules. The first four each focus on a different aspect of cyber policy - human rights, cybersecurity, regulatory fr
...
ameworks and cyber capacity building - with a final regional module highlighting how these apply in Africa, Asia and Latin America. Each module consists of several videos, which take participants through a key cyber issue or concept - explaining how it relates to human rights, who the key actors are, and how and where to engage." (Introduction)
more
"IT Governance requires public and corporate cybersecurity policies to improve fighting against cybercrime and other violations. The EU, the USA and Brazil have recently developed different regulatory approaches on the subject. Assessing how to design policies in line with them across geographies se
...
ems key for effectively managing relevant global issues. After a brief introduction, the article touches on three sample topics: online privacy, open-source platforms, and latest-generation cyber-threats to illustrate how EU, US and Brazil have taken different paths. Each sample topic is analysed in detail and followed by a conclusion indicating how possibly regional or national particularities may be pragmatically reconciled by public and corporate interested parties." (Abstract)
more
"This mapping study investigates the ways in which the Kenyan government and other actors have initiated or engaged in multistakeholder processes in order to address cybersecurity-related matters in the country. Based on this, it will identify best practices, gaps and missing links, as well as oppor
...
tunities and recommendations for improving the cyber policy landscape in the country. The assessment of Kenya’s cybersecurity landscape in this report will identify actors within the government and civil society, as well as existing laws and frameworks, and address the proposed ones, based on the information that is currently available. Unless otherwise stated, all institutions and legislative documents listed here are existent and/or functional." (Page 7)
more
"With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance. To the toolkit of privacy protecting techniques and projects, they propose adding obfusca
...
tion: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage - especially for average users, those of us not in a position to opt out or exert control over data about ourselves." (Back cover)
more
"This kit is a contribution from activists for activists to help us be more secure in our digital practices. It’s designed to help activists deal with the most common security issues that might jeopardise the integrity of our devices and communications. Any at-risk user who encounters security-rel
...
ated problems can use this kit to mitigate the immediate consequences and find guidance to address ongoing security issues. The kit is simply written for computer non-experts. Since security is complex and simple answers might not always be sufficient, this kit also provides links to more exhaustive resources for additional support. The work on this kit has been guided by APC’s many years of work in the area of digital security, particularly its work with human rights defenders, those who deal with digital dangers most frequently as a matter of course in their work." (APC website)
more
"This publication identifies at least 12 digital threats, including illegal or arbitrary digital surveillance, location tracking, and software and hardware exploits without the knowledge of the target. Further examples that are considered are: phishing, fake domain attacks, Man-in-the-Middle (MitM)
...
attacks, and Denial of Service (DoS) [...] In examining cases worldwide, this publication serves as a resource for a range of actors. In a nutshell, it surveys the evolving threats, and assesses preventive, protective and pre-emptive measures. It shows that digital security for journalism encompasses, but also goes beyond, the technical dimension. This publication also gives an overview of actors and initiatives working to address digital safety, as well as identifying gaps in knowledge that call for awareness-raising." (UNESCO website)
more
"UNESCO’s vision of universal Knowledge Societies builds on a free, open and trusted Internet that enables people to not only have the ability to access information resources from around the world, but to also contribute information and knowledge to local and global communities. What can UNESCO do
...
to move towards the realization of this vision of Internet-enabled Knowledge Societies that can foster inclusive sustainable human development worldwide? To address this question within the mandate of this study, UNESCO has worked with Member States and other stakeholders to analyse four separate but interdependent fields of Internet policy and practice, within the mandate of UNESCO, perceived to be central to achieving this vision. These are access to information and knowledge, freedom of expression, privacy, and ethical norms and behaviour online. This report assesses these four fields by viewing them as keystones for building a free and trusted global Internet that will enable inclusive Knowledge Societies." (Executive summary)
more
"Ranking Digital Rights’ inaugural Corporate Accountability Index evaluates 16 of the world’s most powerful Internet and telecommunications companies on their commitments, policies, and practices that affect users’ freedom of expression and privacy. By opening the door for greater corporate tr
...
ansparency and public scrutiny of business practices, the Index encourages companies to do a better job of respecting their users’ rights around the globe [...] Highlights: There are no “winners.” Even companies in the lead are falling short. Across the board, companies need to improve their disclosure of policies and practices that affect users’ freedom of expression and privacy, as well as their commitments to these human rights. Only six companies scored at least 50 percent of the total possible points. The highest score was only 65 percent." (Executive summary)
more
"This handbook is a compilation of advice from child psychologists and the police and also the personal narratives of people who have been subjected to abuse. We hope this book will make it easier for adults to talk to children about the risks of the internet. We also hope it will inspire you and he
...
lp you to be part of children’s everyday activities on the internet." (Page 3)
more
"Sex offenders know that social media offer new opportunities for contacting children and forming friendships with them. They have also realised how simple it is to take pictures and make videos of sexual abuse and share them with other people with the same sexual interests. Digital information tech
...
nology and social media add new aspects to our understanding of how sexual abuse takes place and how it affects victims. It is necessary for all practitioners working with children and young people to have knowledge of this field. All types of sexual abuse are shameful and taboo-ridden. Consequently, children and young people who feel unhappy need to be asked directly how negative online encounters have affected them. However, the dialogue with them must proceed with an understanding of ow demeaning, intimidating and traumatic such experiences can be, including when living through them on the internet. Save the Children Denmark has compiled this anthology with the latest knowledge in a field that is in constant flux and full of professional challenges." (Back cover)
more
"In enhancing the fight against ICT-facilitated child abuse and exploitation, governments and national authorities may focus on a child protection approach that fully respects human rights; on ensuring that legislation keeps pace with technological innovation; on recruiting, training and maintaining
...
specialized personnel; on gaining access to state-of-the-art technological resources; developing effective mechanisms for accessing third party data and conducting undercover investigations that are consistent with the rule of law; as well as developing policyguidance on harmful conduct committed by youth. The formulation of policies in this area is best based on a multidisciplinary approach that draws on research findings and best practices from social science, legal policy and public policy." (Executive summary, page xi)
more
"Esta guía pretende proveer los elementos necesarios para establecer un protocolo de seguridad en una diversidad de contextos; así como recomendaciones prácticas para hacer frente a diversas situaciones. La guía está enfocada en todos los periodistas visuales, en particular aquellos que trabaja
...
n en zonas de riesgo. El primer apartado del texto se enfoca en los elementos necesarios para elaborar un protocolo de seguridad. Se enlistan las herramientas necesarias para valorar el riesgo y las amenazas y se dan los lineamientos para decidir qué medidas de seguridad adoptar. En el segundo apartado se dan recomendaciones para enfrentar diversos escenarios. La labor de los periodistas visuales los obliga a enfrentar una diversidad de circunstancias con características particulares. Este segundo apartado pretende brindar al lector recomendaciones específicas que le serán útiles en cierto tipo de contextos, pero sin olvidar que no hay dos situaciones iguales, por lo que cada cobertura requiere de medidas específicas de seguridad. El último apartado está dedicado al manejo de estrés y los efectos psicológicos que pueden surgir por el trabajo en situaciones de alto riesgo. El bienestar psicológico es fundamental para poder desarrollar una buena cobertura periodística. La labor de los reporteros gráficos los obliga a estar en estados de alto nivel de adrenalina, lo que puede causar estragos en la salud." (Página 6)
more