"The module aims to: 1. Clarify the concept of information security, privacy and related concepts; 2. Describe threats to information security and how they can be addressed; 3. Discuss the requirements for the establishment and implementation of policy on information security, as well as the life cy
...
cle of information security policy; and 4. Provide an overview of standards of information security and privacy protection that are used by some countries and international information security organizations." (Module objectives, page iv)
more
"We structured the report by beginning with an overview of the digital environment in the Philippines in 2020 before delving into the impact of technology on human rights: the key events, challenges and accomplishments, then a forecast of 2021 and 2022. These are divided into the following key thema
...
tic areas: Internet Access; Gender and Information and Communications Technologies (ICTs); Privacy and Data Protection; Freedom of Expression. This report is based on the Foundation for Media Alternatives’ (FMA) monitoring of situations where technology impacted human rights in the country. It covers the months of January to December 2020, and the analysis and scoping is conducted using secondary resources such as news articles, press releases and reports." (About this report, page 2)
more
"The internet brought new opportunities for Pakistan to develop into a progressive society and a more democratic country, and it opened doors for more forms of criminal activity (like fraud, child pornography, etc.), more intimidation and the spreading extremism, and more information gathering on ci
...
tizens by business and state agents. It will be highly important to Pakistan to more actively and more successfully develop the positive sides of IT technology, internet services, and the social media, while at the same time check its excesses, problems and abuses. FES Pakistan is delighted to present the report “Internet Landscape 2020” It is providing an excellent overview of internet usage, and on its dangers and opportunities. We hope, the report will facilitate a broad discussion about the use and further development of the internet in Pakistan, to fully tun it into another means for Pakistan to utilize its full potential and develop into a more progressive, citizen-oriented country." (Preface, page 4)
more
"Wie wahren wir die Menschen-, Grund- und Bürgerrechte? Und wie können wir unsere Werte für die Gestaltung disruptiver Innovationen und der digitalen Zukunft nutzen? Die Autor*innen aus Politik, Wissenschaft und Praxis zeigen auf, wie technologische Phänomene mit unseren Werten in Einklang gebra
...
cht werden können und diskutieren normative Impulse und Ideen für die Regelung des Gemeinwohls in der digitalen Welt." (Verlagsbeschreibung)
more
"The Digital Ecosystem Framework is organized around three separate, overlapping pillars:
Digital Infrastructure and Adoption: the resources that make digital systems possible and how individuals and organizations access and use these resources;
Digital Society, Rights, and Governance: how digital t
...
echnology intersects with government, civil society, and the media;
Digital Economy: the role digital technology plays in increasing economic opportunity and efficiency.
USAID’s Digital Ecosystem framework encompasses four cross-cutting topics:
Inclusion: reducing disparities in access and the “digital divide”;
Cybersecurity: protecting information against damage, unauthorized use or modification, or exploitation;
Emerging Technologies: encompassing artificial intelligence, Internet of Things, blockchain, 5G and other new technologies;
Geopolitical Positioning: the influence of authoritarian states that are actively working to shape the global digital space." (https://www.ictworks.org/usaid-digital-ecosystem-framework)
more
"This Primer is intended to increase awareness and provide a basic understanding of cyber threats, cybersecurity, and cyber resilience as they relate to development programming for USAID staff. It does not provide specific cybersecurity programming or operational recommendations or address technical
...
cybersecurity needs of USAID or its implementing partners. This Primer is a resource on cybersecurity for the broader development community and spotlights how USAID’s approach to cybersecurity in development is evolving." (Page 7)
more
"This report aims to bridge two communities – the broader development community and the cybersecurity capacity building community – to achieve more resilient outcomes by ensuring incorporation of cybersecurity and digital resilience into digital development activities. This report is a product o
...
f the partnership between the World Bank and the Global Forum on Cyber Expertise (GFCE) Foundation, who recognize the importance of including cybersecurity, digital resilience, and cyber capacity building (CCB) as components of development projects. They also understand that advocates are needed to promote the eligibility of these activities for assistance in the broader development agenda." (Aim and objectives, page 11)
more
"In this report, we highlight how privacy and data protection violations by state and non-state actors are compounded by the lack of legal data protection safeguards which would obligate public entities, private companies, and international organizations to respect and adhere to data protection prin
...
ciples, empower users to take agency and control over their personal information, and create mechanisms for grievance and redress when such violations occur. We explore these issues and propose safeguards and policy recommendations for those involved in the collection and processing of personal data: governments, private companies, and international aid organizations. We include case studies for Jordan, Lebanon, Palestine, and Tunisia. Our goal is not to include an exhaustive list of all cases related to data protection, but to present a few key illustrative cases for each country." (Executive summary, page 3)
more
"This book frames digital sovereignty as a right to be claimed and a process constantly in the making, as a condition of the ability to critically partake in the digital transformation. Emphasizing a political and transformative significance of the term, this interdisciplinary publication gathers sc
...
holars, activists, artists and human rights advocates who develop practices or provide spaces and structures to foster sophisticated means of digital involvement. Its aim is to identify diverse facets of what it means to be digitally sovereign, but also to critically discuss the viability of the term, especially in the light of modern-day crises and for the many future challenges yet to come. The positions assembled in this volume analyze new opportunities for social participation and policy making and recommend alternative technological and social practices utilized by various groups and collectives – both before and after COVID-19." (Introduction, page 13)
more
"There is no question that we must address the issues of child safety, disinformation, national security, and criminal activity in the digital age. However, even if the stated end goal for mandating encryption backdoors is legitimate, the means must be necessary and proportionate. Deliberately intro
...
ducing security weaknesses in encrypted systems fails this test. Weakening encryption will create more dangers than it will prevent. Further, there is no evidence base for claiming that breaking encryption will achieve the desired outcomes. At best, exceptional access to encrypted content will only serve as a short-term or partial solution for law enforcement. As we have explained in this brief, encryption is a vital tool for the protection of human rights, democracy, cybersecurity, and the economy. The right to privacy and the right to freedom of expression are basic human rights, and in today’s digital world, we cannot meaningfully separate these rights from the need for secure online communication channels that are free from undue surveillance. Encryption is a crucial building block for a secure technological infrastructure, and governments should promote its use, not repeatedly seek to undermine it." (Conclusion, page 16)
more
"Hay una variedad de estrategias y enfoques que se pueden aplicar para enseñar a la Alfabetización mediática e informacional (AMI), los cuales se centran en el conocimiento, la actitud y las habilidades. Por supuesto, las y los capacitadores están en la libertad de modificar las metodologías pr
...
opuestas y desarrollar sus propios métodos de enseñanza. Sin embargo, deben tener muy claros sus objetivos y la manera de alcanzarlos. Deben también reflexionar sobre sus estrategias de formación después de cada sesión. Asimismo, es importante que sean conscientes de sus hábitos con relación a los medios de comunicación y de cómo estos influyen en su enseñanza. Se anima a las y los capacitadores a que sigan estos cinco pasos para la formación en AMI: acceder, analizar, crear, reflexionar y actuar (AACRA)." (Página 9-10)
more
"Based on the needs assessment, a high proportion of women in Cameroon face online violence and are increasingly concerned about their safety in digital spaces. However, many of these respondents are unaware of any legal protections offered to them. Additionally, they believe that they lack the appr
...
opriate knowledge to protect themselves in these digital spaces. Results from the needs assessment show that there is a significant need for training programs aimed at building digital security awareness and digital hygiene skills." (Conclusion)
more
"Beim so genannten „Scoring“ wird einer Person mithilfe algorithmischer Verfahren ein Zahlenwert zugeordnet, um ihr Verhalten zu bewerten und zu beeinflussen. „Super-Scoring“-Praktiken gehen noch weiter und führen Punktesysteme und Skalen aus unterschiedlichen Lebensbereichen zusammen, wie
...
etwa Bonität, Gesundheitsverhalten oder Lernleistungen. Diese Ver-fahren könnten sich zu einem neuen und übergreifenden Governance-Prinzip in der digitalen Gesellschaft entwickeln. Ein besonders prominentes Beispiel ist das Social Credit System in China. Aber auch in westlichen Gesellschaften gewinnen Scoring-Praktiken und digitale Soziometrien an Bedeutung. Dieser Open Access Band stellt aktuelle Beispiele von datengetriebenen sozialen Steuerungs-prozessen aus verschiedenen Ländern vor, diskutiert ihre normativen Grundlagen und gesell-schaftspolitischen Auswirkungen und gibt erste bildungspolitische Empfehlungen. Wie ist der aktuelle Stand einschlägiger Praktiken in China und in westlichen Gesellschaften? Wie sind die individuellen und sozialen Folgen zu bewerten? Wie wandelt sich das Bild vom Menschen und wie sollte bereits heute die politische und aufklärerische Bildung darauf reagieren?" (Buchrückseite)
more
"Specifically, the review focuses on the means, barriers, and associated cybersecurity and privacy concerns that refugees face around connectivity. This includes but is not limited to mobile connectivity and social media, particularly in displacement contexts. While these subjects may at times inter
...
sect with parallel conversations on digital identity or biometrics, the latter are not the focus of this chapter. UNHCR provides support and international protection to forcibly displaced persons, including refugees, returnees, stateless people, the internally displaced and asylum-seekers. This report will reference ‘refugees’ and this can be read broadly to encompass refugees and other persons of concern, unless explicity stated otherwise. This literature review is divided into different sub-themes. An annex also provides a brief overview of who are the main actors writing about connectivity in humanitarian contexts, and with what angles and / or interests." (Introduction)
more
"Open-source intelligence (OSINT) gathering and analysis techniques are used by investigators from a variety of fields, owing to their accessibility and exceptional capacity for corroboration. It has previously been argued that proposed data protection legislation can chill the free press, but there
...
have been no studies assessing the effect of such reforms on more general OSINT capabilities. European Union’s General Data Protection Regulation (GDPR) was implemented in the UK through the 2018 Data Protection Act (DPA) to protect personal data against exploitation. This study surveyed 16 OSINT gathering and analysis practitioners across public and private sectors to determine firstly, what, if any impact the implementation of the GDPR/DPA have had on their ability to successfully operate as OSINT analysts and secondly, if they have noticed any subsequent changes in UK public perception around issues of the surveillance state and digital privacy. I argue that this initial survey shows that the GDPR is merely a first step in establishing societal expectations and regulations around digital privacy. While some changes to OSINT practice have been reported, to date few substantive changes to OSINT methods or analysis resulted or seemed poised to take effect, one year after the advent of the GDPR/DPA." (Abstract)
more
"Divisive Internet regulation is fragmenting the formerly worldwide web into numerous shards that follow their own rules. The US, the EU and China are influential in shaping regulation even beyond their own jurisdictions, with consequences for human rights, particularly in Africa. This paper argues
...
that, as of 2020, the Western post-9/11 security agenda and uncontrolled digital capitalism had a more detrimental impact on Internet regulation in Africa than the authoritarian Chinese concept of Internet sovereignty, seriously affecting freedom of expression and the right to privacy online. However, particularly authoritarian governments in Africa use China’s economic and political agenda to their advantage, leaving civil societies at the mercy of digitally empowered states. Direct ways of impacting Internet regulation in Africa include loans, development programs or influential laws, whereas indirect means include engagement in multilateral and multi-stakeholder fora. Besides the political and economic interests of states, the datafication agendas of ICT corporations shape Internet landscapes in Africa. An emerging data protection framework pushed by the EU has the potential to mitigate their impact. Other means of protecting human rights require a united approach by the African Union and a deconstruction of digital capitalism and dependence relations between African states and the Global North." (Abstract)
more