"The Typology of Online Harms provides a comprehensive framework for understanding and categorizing various types of online harm through a human rights lens [...] This typology recognizes the complex nature of online safety, by classifying the threats into content, contact and conduct risks. Online
...
harms can occur throughout the production, distribution and consumption of content (content) but can also arise as a result of online interactions with others (contact) and through behaviour facilitated by technology (conduct)." (Conclusion)
more
"The Digital citizenship education handbook is intended for teachers and parents, education decision makers and platform providers alike. It describes in depth the multiple dimensions that make up each of 10 digital citizenship domains, and includes a fact sheet on each domain providing ideas, good
...
practice and further references to support educators in building the competences that will stand children in good stead when they are confronted with the challenges of tomorrow’s digital world. The Digital citizenship education handbook is consistent with the Council of Europe’s Reference Framework of Competences for Democratic Culture and compatible for use with the Internet literacy handbook." (Back cover)
more
"The OECD Policy Framework on Digital Security helps policy makers understand the economic and social dimension of cybersecurity, raises their awareness about the OECD approach to digital security policy, and encourages them to make use of OECD digital security recommendations to develop better poli
...
cies. The Framework provides a helpful narrative based upon OECD digital security recommendations and identifies linkages with other policy areas addressed through existing OECD standards and tools." (Foreword, page 3)
more
"This report examines the widespread use of encrypted messaging apps (EMAs) in developing countries and emerging democracies has prompted news outlets in these regions to experiment with them as mechanisms for distributing the news. From news products designed specifically for sharing via EMAs to pr
...
ivate channels used to circumvent restrictions in repressive media environments, media outlets are testing how best to use these apps to reach audiences even in the face of technical challenges, resource demands, and sometimes, political pressure. The document concludes that a) news outlets are turning to EMAs to reach new audiences and to bypass state censorship in authoritarian contexts; b) many newsrooms are experimenting with monetizing EMA content, however, it is still too early to tell whether EMAs can provide a reliable revenue stream; c) platform dependency is a big issue when it comes to using EMAs for news-policy changes can have a big impact on how news outlets interact with their audiences." (Publisher description)
more
"This policy brief is an Access Now publication. It gives context about the Personal Data Protection Bill in the Parliament of Sri Lank, states the key areas of concerns in the present bill, and proposes nine (9) recommendations." (commbox)
"The consumer Internet of Things (IoT) is a fast-growing area of technology, increasingly embedded in the public and private spheres, including both in and on bodies. There are various security concerns and academic investigations into potential risks of this expansion, but none yet specifically add
...
ressing the implications to journalists and the democratic pillar of press freedom. Not only are risks to this community not yet assessed, but IoT threats generally are not communicated without technical jargon, making them inaccessible to non-experts. Given the importance of a free press, mapping IoT devices and, crucially, communicating associated risk in ways understandable and actionable to journalists themselves, is key.
Journalists and the press are particularly at-risk from IoT devices that may feature in the environments with which they must regularly interact because of the fundamental imperative of source confidentiality. Previous research demonstrated that members of the press are largely unaware of the ways in which the IoT can threaten their work and wellbeing. The networked capabilities of IoT devices increases the ease with which well-resourced threat actors can target journalists who routinely handle confidential information and are already at risk around the world from a variety of non-IoT threats. This paper therefore presents a novel categorisation of both ambient and wearable consumer IoT devices according to the environments in which journalists are most likely to interact with them. It draws on related academic work classifying devices for technical audiences to create a system that is accessible to journalists and their sources. Its goal is to make members of the media aware of the prevalence of these technologies and which of the devices’ capabilities may increase their individual risk. Useful risk assessments cannot be undertaken without an accurate understanding of where threats may be encountered. By systematically outlining risks in numerous environments, this taxonomy can be easily incorporated into existing security training materials and risk assessments for journalists. This paper presents a novel taxonomy to codify and organise IoT present in different environments, with examples of how journalists and their work could be impacted, both passively (i.e. via surveillance) or actively (i.e. via information theft). It also discusses how different environments that may contain IoT devices are often under the control of actors whom journalists cannot easily influence, nor protect themselves against. Especially as these devices continue to proliferate, journalistic risk from IoT devices in surrounding environments are growing. It is therefore important to address the contemporary and emerging risks to journalism that are associated with connected devices. This paper enables journalists and readers to not only visualise and conceptualise how IoT devices in different environments may create risks, its user-focused language and organisation also empower journalists to begin to use this taxonomy for awareness, mitigation, and protective purposes." (Abstract)
more
"The report is the output of a RSE-funded project on how journalists in Scotland undertake their work in the digital age from the point of view of cyber security and surveillance impacts. This research interviewed ten journalists from Scotland, from various beats, locations, and employment backgroun
...
ds (including freelance, editorial, broadcast, etc.) during July and August 2022. Interviewees were asked about their perceptions of cyber security threats, surveillance, and their knowledge of cyber security. They were also asked about other related issues that affected their work, including defamation, harassment, and data protection." (Abstract)
more
"In Australia, the Data Retention Act (2015), the Assistance and Access Act (2018), the Identify and Disrupt Act (2021), and the International Production Orders Act (2020) have significantly increased the surveillance powers of law enforcement and intelligence agencies with implications for journali
...
sts and the free press. This report draws on interviews with 19 journalists and 2 media-lawyers in Australia. The interviews were conducted between May and November 2021. The aim of the interviews was to gauge (a) the level of preparedness amongst journalists in Australia concerning surveillance, and (b) the impacts of increased surveillance powers on journalistic practices. There was wide variation in information security understanding and applied skill among media organisations and journalists. Some expressed “very low confidence” (Journalist F) that journalists were adequately prepared for the threats of electronic surveillance and a number conceded that they were not thinking about it “enough” (Journalist Q) or were just “learning on the job but could know more” (Journalist I). Some media organisations do not offer support in terms of education and training, policies and procedures, or formal guidance, and even among the most active and equipped organisations, support for cyber security concerns was described as “probably too far down the list of considerations” (Journalist D). In most instances, journalists were self-educating as “it is up to the individual journalist to make sure they are secure” (Journalist A). The 2019 AFP raids on the ABC and Annika Smethurst were described as a “holy shit” moment (Journalist P) that raised awareness of government surveillance of journalists. These raids resulted in many journalists and media organisations raising their efforts to protect their digital communications. Subsequently, over the past 2 to 3 years many journalists have migrated to encrypted communication applications such as Signal and Protonmail, while several media organisations have implemented SecureDrop for whistle-blowers to provide anonymity and security. Journalists suggested media organisations could do more to provide “formalised training” and “organisational support” (Journalist P) and invest more in their employees to provide confidence to potential sources that “journalists are good at this” (Journalist J)." (Executive summary)
more
"International contributors assess a variety of key contexts that impact access to digital technologies, including contextual variations related to geography and infrastructure, as well as individual differences related to age, income, health and disability status. Chapters explore how variations em
...
erge across the life course, illustrating the effects of digital disparities on personal wellbeing. Intervening in critical debates relating to the digital divide, this Handbook offers key insights into privacy and trust issues that affect technological usage." (Publisher description)
more
"The guidelines contained here specify steps and measures that newsrooms and journalists in West Africa can take to mitigate the problem of online abuse. The purpose is not to shield journalists from criticism or promote the criminalization of online speech, but to deal with a real threat facing jou
...
rnalism today, which has the potential to erode press freedom in West Africa if it goes unchecked." (Introduction, page 4)
more
"What we lacked was a set of simple instructions that could help navigate the workflows and procedures of a digital security helpline, while focusing on the specific demand of offering a service to groups that are often underfunded, understaffed, non-hierarchical and exposed to disproportionate thre
...
ats and the consequent risk of post-traumatic stress disorder among their staff or volunteers. In publishing this guide we aim to fill this gap, enabling smaller organisations and grassroots groups to set up a team to respond to the digital safety needs of the people they work and fight with. It can be read by techies who want to organise and join forces to help their movement, but also by managers and organisers, who can follow the steps outlined in the initial chapters to start planning the creation of a digital security help desk for civil society and then look for people with a technical background to staff their help desk during the implementation phase." (Introduction, page 10)
more