Skip to main content
en
Close

Cybersecurity and data protection in humanitarian action

As the use of technology impacts our everyday lives, our access to information, our privacy and our ability to work, connect and access essential services, it has increased the vulnerability of individuals and society to cyber threats including destructive and disruptive attacks, data weaponization, cyber influence operations, and misuse of surveillance technologies.

This series on Cybersecurity and Data Protection in Humanitarian Action aims to address some of these challenges and further explores different approaches to tackle them from a myriad of perspectives.

Victim/survivor-centeredness, data protection and open-source collection in accountability: lessons from IIIM-Syria

Victim/survivor-centeredness, data protection and open-source collection in accountability: lessons from IIIM-Syria

9 mins read Accountability / Analysis / Artificial Intelligence and Armed Conflict / Cybersecurity and data protection in humanitarian action / Humanitarian Action / New Technologies / Technology in Humanitarian Action Rayyan Ghuma & Birhane Wossen Reta

The extent to which a victim/survivor-centered approach (VSCA) should be incorporated into data protection remains ...