Your search
Results 96 resources
-
An American defense contractor is accused of offering military secrets to Beijing.
-
An American defense contractor is accused of offering military secrets to Beijing.
-
An American defense contractor is accused of offering military secrets to Beijing.
-
The Tor network’s privacy architecture creates a safe haven for predators to share child sexual abuse material
-
Standard Public Open Licences (SPOLs) may unintentionally reinforce exclusion and enable extractive data practices that disadvantage communities contributing valuable datasets that they have preserved and curated through historically challenging conditions.
-
The center operates in the memorial site at the notorious former Navy School of Mechanics, where nearly 5,000 people were kidnapped and disappeared by Argentina’s dictatorship
-
A new digital repository preserves Bangladesh’s linguistic heritage, featuring words, phrases, and IPA transcriptions from 42 indigenous languages, aiming to promote understanding and celebrate the nation’s cultural diversity.
-
What does artificial intelligence mean for Mexico's Indigenous languages? For two days, digital activists reflected on how these technologies can revitalize or threaten their languages and cultures.
-
Under pressure from aid cuts, humanitarian groups may be exposing themselves and people they serve to privacy risks as they seek support from the private sector to improve efficiency. As artificial intelligence gains ground, experts say the rules of the game are due for a rethink.
-
The Trump administration highlighted material dealing with topics like sexuality, slavery and immigration.
-
Invisible displacement is a growing yet under-recognized phenomenon in humanitarian settings. This report explores the structural, operational, and political factors that obscure the presence of displaced persons who remain outside formal tracking systems, such as IDPs living outside camps, unregistered returnees, nomadic groups, or those who deliberately avoid institutional engagement due to protection concerns. Their invisibility skews humanitarian planning, which can lead to inaccurate...
-
State department says all people who hold valid US visas are subject to ‘continuous vetting’, including of social media
-
Open data fall short of their goal to empower all social groups equally. Although the literature examines this issue through the concept of inclusion, substantial gaps remain in defining and understanding the implications of open data for equity in public administration, with research on this topic scattered across disciplines. This fragmentation hinders the possibility of evaluating public policies.
-
Alisa Kuzmina reflects on the overlap between her marriage green card experience and her research on Cold War–era immigration.
-
Magistrates and law enforcement are particularly worried about the Chinese firm handling highly sensitive police wiretap data
-
Magistrates and law enforcement are particularly worried about the Chinese firm handling highly sensitive police wiretap data
-
The Facebook page of a major Quechua-speaking community radio station in Bolivia was hacked and it lost tens of thousands of followers.
-
Editorial: The UK’s plans seem to outsource sovereignty for phantom efficiency. Public services provide the data and power while US tech giants reap the rewards
-
Breach at Inflite The Jet Centre is latest in series of leaks involving private information of Afghan refugees
-
Breach at Inflite The Jet Centre is latest in series of leaks involving private information of Afghan refugees
Explore
Resource
Resource type
- Blog Post (33)
- Journal Article (2)
- Newspaper Article (60)
- Presentation (1)
Publication year
-
Between 2000 and 2025
(95)
-
Between 2020 and 2025
(95)
- 2025 (95)
-
Between 2020 and 2025
(95)
- Unknown (1)
Online resource
- yes (96)