"El presente ensayo que usted tiene entre sus manos trata sobre las consideraciones y desafíos entorno a la agenda de la privacidad y protección de datos personales en las redes sociales digitales. El autor hace mención reiteradamente sobre las implicaciones que tiene en el ámbito legal; pero si
...
empre poniendo en el centro la discusión sobre los usuarios de las redes sociales, lo que implica hacer efectivas las medidas necesarias para proteger la privacidad, así como el uso apropiado y proporcional de sus datos personales, los cuales, no pueden quedarse en el vacio, apelando a su vez por el uso racional y proporcional de los datos en los medios digitales." (Presentación, página 9)
more
"This is a report on the health of the open-source digital safety tool ecosystem that draws from the BASICS experience. Internews' BASICS project (Building Analytical and Support Infrastructure for Critical Security tools) was a 30-month initiative to strengthen the capacity of open source digital s
...
afety tool development teams ("tool teams") to better understand their vulnerable users, respond to urgent security and privacy threats, and evaluate their impact. BASICS set out to address the unique challenges faced by tool teams in order to improve the protection of the users of these tools. Vulnerable populations, such as human rights defenders and marginalized groups, count on independently-developed open source digital safety tools not only to provide safety and censorship circumvention, but also to avoid reliance on cloud-based services which can be censored or hacked, and to protect themselves from costly licensing issues when using commercial tools. Many of the most popular and most critical open source digital security tools are maintained and updated by "tool teams" rather than businesses or organizations. These ad-hoc groups have little if any institutional capacity, are often under-resourced, and have limited insight into the specific needs of at-risk users." (Publisher description).
more
"On April 3, 2022, Hungary’s ruling Fidesz party won a fourth term in national elections, cementing its dominance with a two-thirds majority that will allow it to continue traveling what critics of the party and many others would describe as the path of centralizing power and rolling back democrat
...
ic safeguards. International observers characterized the elections as free but raised serious concerns about their fairness. These included blurring the lines between the government and the ruling party in campaigning, which amplified the advantage of the ruling coalition, the absence of a level playing field, and lack of balance in campaign coverage in the press, on television, and on billboards. Fidesz’s effective control over large sections of the media, undermining the independence of the judiciary and public institutions, and curbing of civil society has received considerable attention from international media and international observers. However, its misuse of people’s personal data, which helped the party reach voters in new, opaque ways, has received relatively little scrutiny. This report examines how data-driven campaigning in Hungary’s 2022 elections exacerbated an already uneven playing field and undermined the right to privacy. It also documents new forms of misuse of personal data collected by the government and used for political campaigning by Fidesz in the 2022 elections." (Summary)
more
"This book has compiled the tech policy debate into a toolkit for policy makers, legal experts, and academics seeking to address platform dominance and its impact on society today. It discusses the global consensus around technology regulation with recommendations of cutting-edge policy innovations
...
from around the world. It also explores the proposed policy toolkit through comprehensive coverage of existing and future policy on data, antitrust, competition, freedom of expression, jurisdiction, fake news, elections, liability, and accountability. The book identifies potential policy impacts on global communication, user rights, public welfare, and economic activity. It outlines a policy framework that address the interlocking challenges of contemporary tech regulation and offer actionable solutions for the technological future." (Publisher description)
more
"This guide looks at how our mobile devices could leak data about our locations and what we could do to protect ourselves against it. It’s designed for most Central European journalists’ threat models and only looks at how our mobile devices could give up precise location data on us. It doesn’
...
t look at some of the other ways your location can be tracked, such as through payments, CCTV cameras, or images you post online, and doesn’t cover coarse location data (for example, how your IP address might reveal which country or city you’re in)." (Page 1)
more
"The interviews and the analyses by the experts show that: –– Quality content increases safety. The editors interviewed for this publication confirm that fair and balanced journalism, which clearly distinguishes between facts and opinion and treats the people at the center of the story with resp
...
ect tends to lead to increased respect from the audience and makes the journalists less of a target for potential attackers. It also increases trust on the part of audiences as well as with advertisers willing to pay for content. –– Audience engagement plays a crucial role in terms of safety. No matter whether through a membership model, regular informal exchanges or listener clubs — an audience that values a certain media outlet will be less likely to accept any attacks against it. –– Flexible and resilient business models are a must-have. They help organizations to react to new threats, to adapt strategies, and to maintain high quality and independent reporting in times of crisis. –– No viability without digital security. A media outlet that loses all its data or whose data gets hacked and its sensitive sources revealed, loses everything: content and credibility. Online attacks are more likely and easier to carry out than physical attacks. Digital security is an essential part of any safety concept. –– Diversity pays off. During the COVID-19 crisis, women and minority groups came under particular attack all around the world, online and offline. To include their stories and perspectives is not only a moral obligation but also makes business sense as they make up an essential part of audiences anywhere on the globe." (Synopsis, page 39)
more
"This pioneering curriculum presents a comprehensive competency framework of media and information literacy and offers educators and leraners structured pedagogical suggestions. It features various detailed modules covering the range of competencies needed to navigate today’s communications ecosys
...
tem. This resource links media and information literacy to emerging issues, such as artificial intelligence, digital citizenship education, education for sustainable development, cultural literacy and the exponential rise in misinformation and disinformation. With effective use of this media and information literacy curriculum, everyone can become media and information literate as well as peer-educators of media and information literacy." (Short summary)
more
"The Girls Online (GO!) Cybersafety project (GO! Cyber) aims to equip young women and girls with the skills and resources to participate meaningfully and safely in cyberspace. The project is implemented by CARE Vanuatu and Sista with the support of Australia’s Cyber and Critical Tech Cooperation P
...
rogram and ABC International Development. The GO! Cyber project started with a series of co-design workshops, supported by Portable Design Studio, with young women aged between 18-30 years old to understand how young women and girls navigate cyberspace. While there have been interventions to enhance cyber safety in Vanuatu in recent years, there is little research to understand the experiences and behaviours of young women and girls in cyberspace. The guiding principle of the GO! Cyber project is recognising young women as experts of their own experience, so they led the identification and exploration of cyber safety rights, experiences, and issues. The young women then proposed contextually relevant, needs-based and practical solutions for their online safety, which included a series of informative videos and this booklet." (Why this booklet, page 6)
more
"The purpose of this ex-post evaluation is for Internews to understand the impact that Safe Sisters has had on women in East Africa by documenting and publicly sharing their stories and evaluating the training approach itself. As women and girls come online for the first time, they disproportionatel
...
y face violence, which creates risks to their physical safety and stifles their ability to capture the Internet’s transformative economic and social potential. Internews, together with partner DefendDefenders — a Uganda-based non-governmental organization (NGO) — developed the Safe Sisters program, a year-long fellowship that provides women human rights defenders and journalists with the techniques and tools they need to navigate online spaces safely, assume informed risks, and take control of their lives in an increasingly digital world." (Publisher description)
more
"Jeder von uns hinterlässt Datenspuren, beim Surfen, Onlineshopping und in den Social Media. Es sind der Staat, die Wirtschaft, aber auch Kriminelle, die Zugang zu diesen Daten haben oder sich zu verschaffen wissen. Dieser Sachverhalt hat große Bedeutung für den Einzelnen, aber auch für die demo
...
kratische Gesellschaft, die es zu verstehen gilt. Barbara Wiesner stellt Aspekte der Verarbeitung von privaten Daten vor, die Laien selten bekannt sind. Dabei orientiert sie sich an Zitaten von Persönlichkeiten aus Wirtschaft, Wissenschaft und Politik und regt dazu an, sich eine eigene Meinung zu bilden. So wird das Thema Privatheit vor dem Hintergrund vielfältiger digitaler Datenkanäle ausgeleuchtet." (Verlagsbeschreibung)
more
"Digitale Gewalt kommt nicht nur im öffentlichen Raum vor, sondern auch in privaten Beziehungen – und hat in Kombination mit häuslicher und sexualisierter Gewalt eine deutlich geschlechtsspezifische Komponente. Durch Informations- und Kommunikationstechnologien haben Gewaltformen wie Doxing, Sta
...
lking, Hate Speech und Online-Belästigung und -Bedrohung stark zugenommen und durch die Nutzung des Internets ihre Wirkmächtigkeit verstärkt. Die Beiträger*innen des Bandes liefern für den Umgang mit diesen Gewaltformen grundlegende interdisziplinäre Analysen und diskutieren sowohl juristische, technische und aktivistische Interventionen als auch Erfahrungen aus der Beratungspraxis. Dabei werden zentrale politische Änderungsbedarfe ausgemacht und entsprechende Handlungsoptionen aufgezeigt." (Verlagsbeschreibung)
more
"Of the eight countries surveyed here, only four have comprehensive data protection privacy acts in place: Kenya, South Africa, Togo and Uganda. But as these research reports suggest, this is not necessarily a strong indicator of whether a country is committed to privacy rights, or of the efficacy o
...
f a country’s legislative environment in ensuring the right to privacy and data protection. Instead, reading across the reports, what can be described as an asymmetry between legislation and practice is evident at different levels. This asymmetry can be political – for example, Togo, an effective constitutional dictatorship marked by fierce government crackdowns on opposition and recent reports of surveillance of religious and political leaders, enacted a data protection law in 2019, and is one of the few countries in Africa to have ratified the African Union Convention on Cyber Security and Personal Data Protection (Malabo Convention). Yet, as the country author suggests, “This interest [by policy makers in digital rights] is not necessarily to protect the citizens but rather out of concern to adapt state policies to the global digital situation.” This asymmetry also concerns the regulatory framework for the implementation of a data protection act. Amongst the countries surveyed here, South Africa was the first to pass a protection of personal information act (in 2013), but still has not implemented the necessary regulations to give practical force to the law. In contrast, while Nigeria’s privacy law is still in draft form, it already has what the country author describes as “watershed” privacy regulations." (Introduction, page 5)
more
"This report outlines the relevance of gender norms to cybersecurity. It draws on existing research, supplemented by stakeholder and expert interviews, to assess gender-based differences in the social roles and interaction of women, men and non-binary people of all ages reflected in the distribution
...
of power (e.g. influence over policy decisions and corporate governance), access to resources (e.g. equitable access to education, wages or privacy protections), and construction of gender norms and roles (e.g. assumptions regarding victims and perpetrators of cyber-facilitated violence)." (Executive summary)
more
"The module aims to: 1. Clarify the concept of information security, privacy and related concepts; 2. Describe threats to information security and how they can be addressed; 3. Discuss the requirements for the establishment and implementation of policy on information security, as well as the life cy
...
cle of information security policy; and 4. Provide an overview of standards of information security and privacy protection that are used by some countries and international information security organizations." (Module objectives, page iv)
more