"This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the complex landscape of Information and Communication Technologies (ICTs) and their impact on human rights. The toolkit is designed for a wide range of PSC stakeholders, including security professionals
...
, management, human rights officers, compliance teams, technology teams, and government and civil society groups. It consists of 12 interconnected but independent tools, each addressing a specific aspect of ICT use in the private security industry." (https://ict4peace.org)
more
"Ghana is among Sub-Saharan Africa’s leaders in digital transformation. Over the past decade, the government has put the key institutions, legislative frameworks, strategies, and policies in place that are necessary to drive change. The Ministry of Communications and Digitalization leads and coord
...
inates development and implementation of a core set of policies and strategies that are digitally transforming the government, economy, and society. The ICT for Accelerated Development (ICT4AD) Policy has guided this journey for more than a decade. A new Digital Economy Policy is drafted and under review to drive the next stage of Ghana’s digital development. The National Financial Inclusion and Development Strategy and the National Cyber Security Policy and Strategy have also been key. Ghana adopted an inclusive approach to developing its cybersecurity strategy, which contributed to improved cybersecurity capacity and considered citizens’ online safety and freedoms. However, a clear strategy for protecting critical national infrastructure is missing. Ghana has been a pioneer and champion of digital government transformation in West Africa over the past decade, with funding and support from the World Bank. Important whole-of-government platforms and services have been put in place, including the Government Wide Area Network (GWAN), which provides internet connection to more than 1,000 district assemblies, hospitals, police stations, and post offices across the country; a National Data Center; the Smart workplace suite, which includes email and productivity tools for government employees; and Ghana.gov portal, a one-stop-shop for citizen services. Still, digital government transformation is incomplete. Easy, efficient, online government services are in demand, but the Ghana.gov portal options are limited, and most major government service providers have their own separate online services portals. The national identity Ghana Card could enhance digital service delivery by providing a universally recognized, secure, and easy-to-use means of digital identification and authentication for citizens when accessing both public and private digital services, but the current identification system is not integrated with other government-operated databases, significantly reducing its many potential applications. The Regional Coordinating Councils, and metropolitan, municipal, and district assemblies (MMDAs) are just now embarking on the digital transformation journey. The Ministry of Local Government and Rural Development coordinates their efforts. Challenges for Ghana’s remaining efforts at digital government transformation include adequate funding to manage and maintain its connectivity and data center infrastructure, affordable internet for regional governments, inadequate digital literacy and skills among mid-level and regional staff, or related national training programs. A big skill gap exists in cybersecurity; Ghana faces a deficit of skilled cybersecurity professionals. The government also needs to improve efforts at stakeholder engagement and awareness-raising when developing new policy proposals." (Executive summary, pages 11-12)
more
"Despite the scientific significance of journalism practice, the gap between academic and applied fields persists. In this paper, based on our project on the digital security of journalists and their sources, we argue that practice-relevant research in the form of the action-innovation model benefit
...
s both the academic and the applied realms. To this end, we provide hands-on practical training on the important topic of digital security, which remains under-researched and therefore requires an exploratory approach. A total of 23 training sessions were conducted for 230 participants representing various media outlets in Germany. The objective was to enhance awareness and skills regarding digital threats. This constituted the core of a mixed-methods approach, which included surveys, observation, and interviews. In evaluating the process and results, it was found that the combination of applied and scholarly elements enhanced the project in terms of access, commitment, contextualisation and depth. The data were analysed according to an adaptation of the socio-technological Newsafety concept. The findings revealed a general lack of competence in dealing with cyber threats and a severely lacking in-house communication. In general, to address and explore relevant and current issues like this, it is recommended to consider the practical value to research participants and to collaborate with practice-based trainers who can help bridge the gap and foster mutual understanding." (Abstract)
more
"The fifth edition of the Global Cybersecurity Index (GCI) measures the commitment of countries to cybersecurity in the context of measures across the following five pillars: legal; technical; organizational; capacity development; cooperation. The GCI, launched in 2015 by the International Telecommu
...
nication Union, seeks to help countries to identify areas of improvement and encourage countries to act in building capacity and capabilities under each pillar. The GCI has been continuously adapted across editions to respond to changing risks, priorities and resources, in order to provide a more relevant snapshot of cybersecurity measures taken by countries. Since 2021, countries have on average taken more cybersecurity-related actions and improved their commitments to cybersecurity. The global average country score has risen to 65.7/100. Across the five GCI pillars, most countries are strongest in the legal pillar. By contrast, the average country is weakest in the capacity-development and technical pillars. Each region has countries that are role-modelling or are advancing, and each region also has countries that are in the beginning stages of building their cybersecurity commitments. To capture these differences, country performance is measured across five tiers, with Tier 1 being the highest and Tier 5 the lowest. These tiers provide peer groups based on scores to help countries to understand and identify role models for improvement." (Report summary, page 1)
more
"The youth are ardent users of digital media and there is no much difference between virtual and real life for them. So, the Catholic Church has persistently invited the faithful, especially the youth who are the true natives of the digital world, to adopt online platforms for evangelization. Concer
...
ns, however, arise from cyber security issues which are part of the online experiences of the users of digital technologies. The prevalence of abuses of digital technology generated a need for legislation to foster a safe environment for those who use online platforms. Malawi’s Electronic Transactions and Cybersecurity Act 2016 is one such legislation aimed at creating a free and safe online environment. Nevertheless, concerns arise regarding the influence and relevance of this Act in Malawi, with certain sections blaming its application for curtailing freedom of expression online. This study sought to investigate the influence of Malawi’s Cybersecurity Act 2016 on online evangelisation among young Catholics in Blantyre. The study had three objectives. First, to explore the motivations and experiences of young Catholics in Blantyre as they engage in online evangelisation. Secondly, to investigate the influence of Malawi’s Cybersecurity Act 2016 on online evangelisation efforts by young Catholics. Thirdly, to assess the perceptions of young Catholics regarding the relevance of Malawi’s Cybersecurity Act 2016 in fostering safe online evangelisation. The researcher employed two theories; Diffusion of Innovation and the Chilling Effects theory of social conformity to rigorously explore the purpose of the study. Participants in this study were purposively sampled and four focus group discussions (FDGs) comprising five and seven participants were chosen for the study. The findings have revealed that there is a significant presence of the youth online platforms that are adopting online evangelisation. It also discovered that there are chilling effects resulting from the political weaponisation of the cyber laws contained in the Act. Consequently, the relevance of the Act in fostering a safe environment was questioned as it is compromised. The researcher recommended further research on other demographics and using different research methods may give a more comprehensive picture of the influence of cyber law on online evangelisation." (Abstract)
more
"Das neue umfassende Standardwerk für den Bereich der Digitalen Ethik. Das Handbuch verschafft einen Überblick über die Herausforderungen und Besonderheiten der Ethik im digitalen Raum und versammelt namhafte Expert:innen zu folgenden Themenfeldern: Theoretische Zugänge (Deontologische Ansätze,
...
Narrative Ethik, Trans- und posthumane Ansätze u.a.m.); Werte der Digitalen Ethik (Gerechtigkeit, Autonomie, Privatheit u.a.m.); Diskurse (Benachteiligung, Überwachung, Datenschutz u.a.m.); Praxisfelder (Kommunikation, Gaming, Lernen und Bildung u.a.m.)." (Verlagsbeschreibung)
more
"The open access edited volume addresses children's rights and their ability to act in the digital world. The focus is on the position of children as subjects with their own rights and developing capacities. Their consideration by parents, courts and legislators is critically examined. Aspects of di
...
gital parenting, especially educational practices and strategies in the context of social media, are analyzed with regard to the tension between protection and participation of children. The edited volume brings debates on privacy and data protection together with those from tort, family and intellectual property law, while also examining the role of families and children in the regulation of data and digital economies, especially online platforms. Legal reflections from Germany, Israel, Portugal and the United States of America are complemented by perspectives from media studies, political science, educational science and sociology of law." (Publisher description)
more
"This handbook is divided into three main sections: Fact-Checking, Digital Security, and Data Journalism. Each section contains a series of chapters that cover essential topics, providing you with a holistic understanding of these subjects. Let's take a brief look at what each section entails. In th
...
e Fact-Checking section, we will explore the fundamentals of fact-checking, including the identification and debunking of false information. We will delve into the importance of verification and provide you with practical techniques to verify images and videos. Additionally, we will discuss transparency in media and the vital role it plays in fostering trust and credibility. The Digital Security section focuses on safeguarding digital information and protecting against cyber-attacks. We will examine various types of cyber threats and discuss the importance of digital security in the context of journalism. You will learn valuable tips and tools to enhance your digital security and reduce risks in an increasingly interconnected world. The Data Journalism section introduces the world of data and its application in journalism. You will learn how to find and analyse data, as well as how to create compelling data-driven stories. We will explore data visualisation techniques and discuss the role of social media in engaging with audiences. Throughout this handbook, you will encounter readings, notes, self-tests, and activities designed to enhance your learning experience. We encourage you to engage actively with the material, complete the suggested activities, and seek further clarification if needed." (Preamble, page 6)
more
"Welche Strategien führen zu mehr IT-Sicherheit? Welche Reformen sind notwendig, um die deutsche Cybersicherheitsarchitektur zu stärken? Und wie soll auf den IT-Fachkräftemangel reagiert werden? Bei der Beantwortung dieser Fragen sind sich die Bundesregierung und Vertreterinnen und Vertreter aus
...
Wissenschaft und Zivilgesellschaft nicht immer einig." (Verlagsbeschreibung)
more
"Open source software (OSS) is the backbone and driver of digitization across sectors worldwide. This makes OSS a cornerstone of every society and economy, including the core of national security concerns. Therefore, governments have a vested interest in OSS security. At the same time, governments,
...
as large users of OSS, bear some of the responsibility for supporting the OSS ecosystem. To assume responsibility, governments must understand the existing OSS communities and the culture surrounding OSS. Governments will be able to effectively foster OSS security only if they work with the ecosystem stakeholders. Doing so requires governments to adhere to guidelines such as respect, cooperation, collaboration and sincerity. In addition, governments must identify their own role(s) in consultation with the OSS ecosystem. Governments can serve as internal coordinators, role models, supporters and regulators. The role of internal coordinator requires governments to be more transparent and systematic in their own use of OSS. In particular, they should take stock of what is being used, where exactly the components are being used and how they are used. As role models, governments engage with OSS, adhering to best practices in the ecosystem and encouraging other governments and stakeholders to do so. As supporters, governments actively engage with the OSS ecosystem, mobilizing and channeling resources into it through various means. Governments use their regulatory powers to create a legal framework that reflects the characteristics of the OSS ecosystem. They can mix and match from different roles and shift between them as they gain more experience, trust and credibility in the OSS ecosystem." (Executive summary)
more
"Threats associated with the consumer Internet of Things (IoT) may particularly inhibit the work and wellbeing of journalists, especially because of the danger of technological surveillance and the imperative to protect confidential sources. These issues may have knock-on effects on societal stabili
...
ty and democratic processes if press freedom is eroded. Still, journalists remain unaware of potential IoT threats, and so are unable to incorporate them into risk assessments or to advise their sources. This shows a clear gap in the literature, requiring immediate attention. This article therefore identifies and organises distinctive and novel threats to journalism from the consumer IoT. The article presents a novel conceptualisation of threats to the press in six categories: regulatory gaps, legal threats, profiling threats, tracking threats, data and device modification threats and networked device threats. Each of the threats in these categories includes a description and hypothetical consequences that include real-life ways in which IoT devices can be used to inhibit journalistic work, building on interdisciplinary literature analysis and expert interviews. In so doing, this article synthesises technical information about IoT device capabilities with human security and privacy requirements tailored to a specific at-risk population: journalists. It is therefore important for cyber science scholarship to address the contemporary and emerging risks associated with IoT devices to vulnerable groups such as journalists. This exploratory conceptualisation enables the evidence-based conceptual evolution of understandings of cyber security risks to journalists." (Abstract)
more