Visualization – Parliament openness in the region and Macedonia

In cooperation with the partners from the “ACTION SEE” regional NGO network, Metamorphosis Foundation for Internet and Society prepared the policy paper in which we analyze the level of transparency, openness, accountability of the parliaments in the Western Balkans region.

According to the Openness Index, strongest points of the Macedonian Parliament are the control mechanisms with high 83% and its awareness that amounts to 76%. However, the Parliament adopted its very first Code of Ethics just recently, on 11 June 2018, and there aren’t indicators of its application.

The entire analysis is available here.

Beyond the promises: The Reform Аgenda under scrutiny

Metamorphosis Foundation, in cooperation with the Prespa Institute and as part of the Citizens’ Alliance for Reform and Growth – CARGrow, contributed to the development of a methodology for monitoring the implementation of the Reform Agenda with an emphasis on the key area of ​​”Digital Transition” and prepared an overview of progress in this area. […]

Shadow Report on Media Freedom in North Macedonia

Metamorphosis Foundation, together with Osservatorio Balcani Caucaso Transeuropa publishes a Shadow Report on Media Freedom in North Macedonia. This shadow report offers an updated overview of North Macedonia’s media landscape. It highlights both positive developments and persisting or emerging challenges. The report also includes a set of recommendations addressed to national authorities and EU stakeholders, […]

Blueprint for Protection of Democracy from Information Threats

The Metamorphosis Foundation and the Anti-Disinformation Network for the Balkans (ADN-Balkans), through an interdisciplinary process of broad consultations in cooperation with international and regional partners, including the international conference “Together for Truth: Whole-of-Society Approach to Safeguard Democracy,” held in April 2025 in Skopje, developed the Position Paper: Blueprint for Protection of Democracy from Information Threats. […]