Information security and journalism: Mapping a nascent research field
Information security (infosec) has become a field of primary interest for journalism, especially in the wake of the 2013 Edward Snowden revelations about the ramifications of Internet mass surveillance. Following the increasing dangers posed by digital threats—and surveillance in particular—to the s...
Saved in:
Published in: | Sociology compass Vol. 16; no. 3 |
---|---|
Main Author: | |
Format: | Journal Article |
Language: | English |
Published: |
Hoboken
Wiley Subscription Services, Inc
01-03-2022
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Information security (infosec) has become a field of primary interest for journalism, especially in the wake of the 2013 Edward Snowden revelations about the ramifications of Internet mass surveillance. Following the increasing dangers posed by digital threats—and surveillance in particular—to the safety of journalists and their sources, newsrooms and reporters have shown an increased interest in technological solutions for improved protection of their work and sources. In particular, the adoption of strong encryption tools for communication purposes has become an urgent matter for journalists worldwide, becoming a niche of research in journalism studies as well. By reviewing the existing literature in the field, this article examines how journalism studies approach the use of encryption and information security tools for journalistic purposes. Based on research on the major journalism studies journals and other publications, the article offers an overview of the research advancements, highlighting current major trends and research areas. |
---|---|
AbstractList | Information security (infosec) has become a field of primary interest for journalism, especially in the wake of the 2013 Edward Snowden revelations about the ramifications of Internet mass surveillance. Following the increasing dangers posed by digital threats—and surveillance in particular—to the safety of journalists and their sources, newsrooms and reporters have shown an increased interest in technological solutions for improved protection of their work and sources. In particular, the adoption of strong encryption tools for communication purposes has become an urgent matter for journalists worldwide, becoming a niche of research in journalism studies as well. By reviewing the existing literature in the field, this article examines how journalism studies approach the use of encryption and information security tools for journalistic purposes. Based on research on the major journalism studies journals and other publications, the article offers an overview of the research advancements, highlighting current major trends and research areas. |
Author | Di Salvo, Philip |
Author_xml | – sequence: 1 givenname: Philip orcidid: 0000-0003-2165-0590 surname: Di Salvo fullname: Di Salvo, Philip email: philip.di.salvo@usi.ch organization: Università della Svizzera italiana |
BookMark | eNp9kL1OwzAURi1UJNrCwhNYYkNK8U8SO2woKlCpqAMwW7Zjg6vEDnYq1LenJR2YuMu9w7mfPp0ZmPjgDQDXGC3wYe5S0PkCk6rEZ2CKWYGzChE0-XNfgFlKW4RKUiE6BcuVtyF2cnDBw2T0LrphD6Vv4DbsopetS909fJF97_wHlNDLpI0fYDTJyKg_oXWmbS7BuZVtMlenPQfvj8u3-jlbb55W9cM605QynCmlZc7LRlFqTcVwkTeUq4YUjSElY1JzpSrOFCsJ5VwiSzAqLNVIMq4ZIXQObsbcPoavnUmDOLVMgpQ0p6xgtDpQtyOlY0gpGiv66DoZ9wIjcdQkjprEr6YDjEf427Vm_w8pXjd1Pv78ACdPaws |
CitedBy_id | crossref_primary_10_1080_1461670X_2023_2206494 crossref_primary_10_1080_17512786_2022_2130818 crossref_primary_10_47124_viraverita_995046 crossref_primary_10_54105_ijmcj_A1047_093123 |
Cites_doi | 10.1080/21670811.2016.1243452 10.1177/0163443719843867 10.1080/21670811.2020.1777882 10.1080/17512786.2021.2014346 10.1080/17512786.2018.1555006 10.1080/24701475.2021.1935547 10.17645/mac.v3i2.281 10.1002/9781118027974 10.1080/1369118X.2018.1451908 10.1080/17512786.2020.1743199 10.1177/1464884918809276 10.1386/nl.16.1.97_1 10.1080/17512786.2021.1925947 10.1177/1461444818804847 10.1080/17512786.2021.1908839 10.1080/17531055.2021.1949119 10.1515/popets-2016-0048 10.4324/9780203490037 10.1080/1461670X.2020.1842233 10.1080/21670811.2020.1818111 10.1016/S0920-5489(03)00003-5 10.4324/9780429490187-10 10.1386/ajms.5.2.297_1 10.24908/ss.v9i4.4345 10.1177/2053951716669381 10.1057/9781137313546 10.1177/2056305117701163 10.1111/soc4.12457 10.1177/1464884919849418 10.1016/S0167-4048(03)00407-3 10.7312/bell17612-010 10.1080/17512786.2016.1179587 10.1080/21670811.2017.1365616 10.7312/bell17612 10.1007/978-3-030-38505-7 10.1080/21670811.2021.1889384 10.1093/acprof:oso/9780199759477.001.0001 10.1080/21670811.2016.1251329 10.1080/17512786.2021.1877179 10.1191/1478088706qp063oa 10.1080/17512786.2021.1927802 10.1177/0163443713483793 10.1002/9781118841570.iejs0261 10.1177/2053951720938091 10.7312/mcgr19232 10.1080/23743670.2020.1730215 10.1108/9781800437623 10.1080/21670811.2019.1653207 10.1080/17512786.2016.1218296 10.7312/bell17612-011 10.1080/17512781003640752 |
ContentType | Journal Article |
Copyright | 2022 The Authors. Sociology Compass published by John Wiley & Sons Ltd. 2022. This article is published under http://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2022 The Authors. Sociology Compass published by John Wiley & Sons Ltd. – notice: 2022. This article is published under http://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | 24P WIN AAYXX CITATION 7U4 BHHNA DWI WZK |
DOI | 10.1111/soc4.12961 |
DatabaseName | Wiley-Blackwell Titles (Open access) Wiley Online Library Free Content CrossRef Sociological Abstracts (pre-2017) Sociological Abstracts Sociological Abstracts Sociological Abstracts (Ovid) |
DatabaseTitle | CrossRef Sociological Abstracts (pre-2017) Sociological Abstracts |
DatabaseTitleList | Sociological Abstracts (pre-2017) CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Sociology & Social History |
EISSN | 1751-9020 |
EndPage | n/a |
ExternalDocumentID | 10_1111_soc4_12961 SOC412961 |
Genre | article |
GrantInformation_xml | – fundername: The Swiss National Science Foundation (SNSF) funderid: P2TIP1_191492 |
GroupedDBID | 05W 0R~ 10A 123 1OC 24P 31~ 33P 4.4 52S 52U 8-0 8-1 A00 AABNI AAESR AAHHS AAONW AAOUF AASGY AAXRX AAZKR ABCUV ABJNI ABSOO ACAHQ ACBKW ACBWZ ACCFJ ACCZN ACFBH ACGFO ACGFS ACPOU ACXQS ADBBV ADEMA ADEOM ADIZJ ADKYN ADMGS ADXAS ADZJE ADZMN AEEZP AEGXH AEIGN AEIMD AEQDE AEUYR AFBPY AFFPM AFGKR AFKFF AFPWT AFRAH AFZJQ AHBTC AIAGR AIFKG AIURR AIWBW AJBDE ALMA_UNASSIGNED_HOLDINGS ALUQN AMBMR AMYDB ASPBG ASTYK AVWKF AZFZN AZVAB BDRZF BFHJK BMXJE BNVMJ BQESF BRXPI CS3 DCZOG DRFUL DRSSH EBS EJD ESI FEDTE G-S GODZA HGLYW HVGLF HZ~ LATKE LEEKS LH4 LITHE LOXES LUTES LW6 LYRES MEWTI MRFUL MRSSH MSFUL MSSSH MXFUL MXSSH MY~ O66 O9- OIG P2P P2W P4E QB0 ROL SUPJJ V8K WBKPD WIH WII WIN WMRSR WOHZO WSUWO WXSBR WYJ XG1 ZZTAW AAMNL AAYXX CITATION 7U4 BHHNA DWI WZK |
ID | FETCH-LOGICAL-c3371-bbca486db33fe97154d38bd25de2677ac8bb987b762388a0f2105f3c0a78c7223 |
IEDL.DBID | 33P |
ISSN | 1751-9020 |
IngestDate | Thu Oct 10 20:20:40 EDT 2024 Thu Nov 21 23:40:33 EST 2024 Sat Aug 24 01:13:14 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
License | Attribution-NonCommercial |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c3371-bbca486db33fe97154d38bd25de2677ac8bb987b762388a0f2105f3c0a78c7223 |
ORCID | 0000-0003-2165-0590 |
OpenAccessLink | https://onlinelibrary.wiley.com/doi/abs/10.1111%2Fsoc4.12961 |
PQID | 2634375739 |
PQPubID | 1046353 |
PageCount | 0 |
ParticipantIDs | proquest_journals_2634375739 crossref_primary_10_1111_soc4_12961 wiley_primary_10_1111_soc4_12961_SOC412961 |
PublicationCentury | 2000 |
PublicationDate | March 2022 |
PublicationDateYYYYMMDD | 2022-03-01 |
PublicationDate_xml | – month: 03 year: 2022 text: March 2022 |
PublicationDecade | 2020 |
PublicationPlace | Hoboken |
PublicationPlace_xml | – name: Hoboken |
PublicationTitle | Sociology compass |
PublicationYear | 2022 |
Publisher | Wiley Subscription Services, Inc |
Publisher_xml | – name: Wiley Subscription Services, Inc |
References | 2017; 5 2017; 6 2017; 3 2020; 20 2019; 19 2016; 2016 2013; 6 2020; 8 2020; 7 1990 2001 2019; 20 2019; 22 2010; 4 2019; 8 2015; 1 2021a; 9 2015; 3 2012 2011 2015; 52 2008 2021b 1995 2006; 3 2005 2004 2018; 21 2016; 11 1999 2016; 5 2016; 6 2021; 15 2019; 40 2016; 3 2019; 41 2021 2013; 35 2020 2017; 11 2019 2003; 25 2018 2017 2016 2015 2014 2013 2020; 21 2018; 16 2003; 22 2012; 9 2018; 13 Milosavljevič M. (e_1_2_7_60_1) 2015; 52 e_1_2_7_5_1 e_1_2_7_3_1 Henrichsen J. R. (e_1_2_7_35_1) 2017 Monsees L. (e_1_2_7_61_1) 2020 e_1_2_7_7_1 Heemsbergen L. (e_1_2_7_28_1) 2013; 6 e_1_2_7_19_1 Di Salvo P. (e_1_2_7_20_1) 2019 e_1_2_7_83_1 e_1_2_7_17_1 Reporters Without Borders (e_1_2_7_71_1) 2018 e_1_2_7_81_1 e_1_2_7_41_1 e_1_2_7_87_1 e_1_2_7_13_1 e_1_2_7_66_1 e_1_2_7_85_1 Kirchgaessner S. (e_1_2_7_43_1) 2021 e_1_2_7_11_1 e_1_2_7_45_1 e_1_2_7_68_1 Human Rights Watch and ACLU (e_1_2_7_40_1) 2014 e_1_2_7_49_1 Neumann P. (e_1_2_7_64_1) 1995 Lyon D. (e_1_2_7_50_1) 2001 Peltier T. R. (e_1_2_7_65_1) 2005 Burnham D. (e_1_2_7_14_1) 1990 Goldberg I. (e_1_2_7_26_1) 2008 e_1_2_7_73_1 e_1_2_7_92_1 e_1_2_7_25_1 Moon R. (e_1_2_7_62_1) 2021 e_1_2_7_23_1 e_1_2_7_33_1 e_1_2_7_54_1 Shelton M. (e_1_2_7_74_1) 2021 e_1_2_7_75_1 Carlsson U. (e_1_2_7_15_1) 2017 e_1_2_7_21_1 e_1_2_7_56_1 e_1_2_7_37_1 e_1_2_7_58_1 e_1_2_7_79_1 e_1_2_7_39_1 Scott‐Railton J. (e_1_2_7_72_1) 2018 Heft A. (e_1_2_7_31_1) 2021 Taylor P. A. (e_1_2_7_77_1) 1999 Higgins P. (e_1_2_7_36_1) 2020 Posetti J. (e_1_2_7_70_1) 2019 e_1_2_7_4_1 Posetti J. (e_1_2_7_69_1) 2017 e_1_2_7_80_1 e_1_2_7_8_1 Marczak B. (e_1_2_7_51_1) 2020 e_1_2_7_18_1 e_1_2_7_84_1 Greenberg A. (e_1_2_7_27_1) 2012 e_1_2_7_16_1 e_1_2_7_82_1 e_1_2_7_2_1 Henrichsen J. R. (e_1_2_7_34_1) 2015 e_1_2_7_42_1 e_1_2_7_63_1 Woodhams S. (e_1_2_7_90_1) 2021 e_1_2_7_12_1 e_1_2_7_44_1 e_1_2_7_86_1 e_1_2_7_46_1 e_1_2_7_67_1 e_1_2_7_48_1 Boghosian H. (e_1_2_7_10_1) 2013 e_1_2_7_29_1 McGregor S. (e_1_2_7_53_1) 2016; 6 Westcott L. (e_1_2_7_88_1) 2019 Berret C. (e_1_2_7_9_1) 2017 Suraj O. A. (e_1_2_7_76_1) 2017 Di Salvo P. (e_1_2_7_24_1) 2020; 20 Lee M. (e_1_2_7_47_1) 2019; 19 e_1_2_7_91_1 Marczak B. (e_1_2_7_52_1) 2018 e_1_2_7_30_1 e_1_2_7_32_1 e_1_2_7_55_1 e_1_2_7_22_1 e_1_2_7_57_1 e_1_2_7_59_1 e_1_2_7_38_1 Taylor R. (e_1_2_7_78_1) 2015; 1 Westcott L. (e_1_2_7_89_1) 2020 Baack S. (e_1_2_7_6_1) 2016 |
References_xml | – year: 2011 – volume: 41 start-page: 565 issue: 4 year: 2019 end-page: 571 article-title: How has the fight for anonymity and privacy advanced since Snowden’s whistle‐blowing? publication-title: Media, Culture & Society – volume: 22 start-page: 308 issue: 4 year: 2003 end-page: 313 article-title: Why we need a new definition of information security publication-title: Computers & Security – year: 2005 – start-page: 1 year: 2021 end-page: 22 article-title: Coping with the Murder: The Impact of Ján Kuciak’s Assassination on Slovak Investigative Journalists publication-title: Journalism Practice – volume: 20 start-page: 243 issue: 2 year: 2020 end-page: 254 article-title: Hybrid professionalism in journalism: Opportunities and risks of hacker sources publication-title: SComS ‐ Studies in Communication Sciences – volume: 9 start-page: 441 issue: 4 year: 2012 end-page: 456 article-title: Resistance against cyber‐surveillance within social movements and how surveillance adapts publication-title: Surveillance and Society – year: 2001 – volume: 8 start-page: 1068 issue: 8 year: 2020 end-page: 1091 article-title: The information security cultures of journalism publication-title: Digital Journalism – year: 2021 – start-page: 1 year: 2021 end-page: 24 article-title: Promoting Newsafety from the Exile: The Emergence of New Journalistic Roles in Diaspora Journalists’ Networks publication-title: Journalism Practice – volume: 1 start-page: 45 issue: 3 year: 2015 end-page: 47 article-title: The need for a paradigm shift toward cybersecurity in journalism publication-title: National Cybersecurity Institute Journal – volume: 6 start-page: 33 issue: 1 year: 2016 end-page: 49 article-title: ‘Security by obscurity’: Journalists’ mental models of information security publication-title: International Symposium on Online Journalism – volume: 19 start-page: 807 issue: 4 year: 2019 end-page: 824 article-title: How to protect the truth? Challenges of cybersecurity, investigative journalism and whistleblowing in times of surveillance capitalism. An interview with Micah lee publication-title: Ephemera: theory and politics in organization – volume: 11 start-page: 302 issue: 2–3 year: 2016 end-page: 318 article-title: Helping Syrians tell their story to the world. Training Syrian citizen journalists through connective journalism publication-title: Journalism Practice – volume: 15 start-page: 583 issue: 5 year: 2021 end-page: 600 article-title: Nick, nick. Who’s there? Ethical considerations when reporting on the dark net publication-title: Journalism Practice – volume: 9 start-page: 443 issue: 4 year: 2021a end-page: 460 article-title: Securing whistleblowing in the digital age: SecureDrop and the changing Journalistic practices for source protection publication-title: Digital Journalism – year: 2018 – year: 2014 – volume: 4 start-page: 309 issue: 3 year: 2010 end-page: 318 article-title: “We’re going to crack the world open”. Wikileaks and the future of investigative reporting publication-title: Journalism Practice – start-page: 329 year: 2017 end-page: 336 – start-page: 119 year: 2019 end-page: 131 – volume: 5 start-page: 297 issue: 2 year: 2016 end-page: 311 article-title: Cross‐border collaborative journalism: Why journalists and scholars should talk about an emerging method publication-title: Journal of Applied Journalism & Media Studies – volume: 8 start-page: 1030 issue: 8 year: 2020 end-page: 1046 article-title: Mob censorship: Online Harassment of US Journalists in times of digital hate and populism publication-title: Digital Journalism – start-page: 130 year: 2017 end-page: 141 – year: 2008 – start-page: 1 year: 2021 end-page: 27 article-title: Cypherpunk ideology: Objectives, profiles, and influences (1992‐1998) publication-title: Internet Histories – year: 2004 – start-page: 94 year: 1990 end-page: 105 – volume: 13 start-page: 690 issue: 6 year: 2018 end-page: 707 article-title: Now you see me – now you don’t: Journalists’ experiences with surveillance publication-title: Journalism Practice – volume: 21 start-page: 693 issue: 3 year: 2018 end-page: 711 article-title: Killing secrets from Panama to Paradise: Understanding the ICIJ through bifurcating communicative and political affordances publication-title: New Media & Society – volume: 2016 start-page: 418 issue: 4 year: 2016 end-page: 435 article-title: Individual versus organizational computer security and privacy concerns in Journalism publication-title: Proceedings on Privacy Enhancing Technologies – year: 2019 – volume: 8 start-page: 328 issue: 3 year: 2019 end-page: 346 article-title: Breaking through the ambivalence: Journalistic responses to information security technologies publication-title: Digital Journalism – volume: 25 start-page: 147 issue: 2 year: 2003 end-page: 158 article-title: Privacy‐Enhancing Technologies—approaches and development publication-title: Computer Standards & Interfaces – start-page: 249 year: 2019 end-page: 261 – year: 2015 – volume: 3 issue: 2 year: 2016 article-title: Reluctant activists? The impact of legislative and structural attempts of surveillance on investigative journalism publication-title: Big Data & Society – volume: 5 start-page: 299 issue: 3 year: 2016 end-page: 317 article-title: Cryptic Journalism. News reporting of encryption publication-title: Digital Journalism – year: 2016 article-title: What big data leaks tell us about the future of journalism ‐ and its past publication-title: Internet Policy Review – start-page: 1 year: 2021 end-page: 19 article-title: Cross‐bordering journalism: How intermediaries of change drive the adoption of new practices publication-title: Journalism – start-page: 114 year: 2017 end-page: 129 – volume: 5 start-page: 334 issue: 3 year: 2017 end-page: 352 article-title: Chilling Effect. Regional journalists’ source protection and information security practice in the wake of the Snowden and Regulation of Investigatory Powers Act (RIPA) revelations publication-title: Digital Journalism – volume: 21 start-page: 2285 issue: 16 year: 2020 end-page: 2304 article-title: The accountability and transparency of whistleblowing platforms issues of networked Journalism and contested boundaries publication-title: Journalism Studies – volume: 52 start-page: 612 issue: 4 year: 2015 end-page: 630 article-title: Securing the communication of journalists with their sources as a for of source protection ‐ editorial policy of Slovenian media regarding communication and technology publication-title: Teorija in Praksa – volume: 40 start-page: 89 issue: 3 year: 2019 end-page: 106 article-title: “Wearing a bullet‐proof vest”: Social media use in Journalism production within african–intercontinental investigative networks publication-title: African Journalism Studies – volume: 7 start-page: 1 issue: 2 year: 2020 end-page: 6 article-title: Cambridge Analytica’s black box publication-title: Big Data & Society – volume: 21 start-page: 1014 issue: 7 year: 2018 end-page: 1029 article-title: Counter‐surveillance and alternative new media in Turkey publication-title: Information, Communication & Society – volume: 35 start-page: 489 issue: 4 year: 2013 end-page: 505 article-title: WikiLeaks and the problem of anonymity: A network control perspective publication-title: Media, Culture & Society – start-page: 1 year: 2021 end-page: 21 article-title: Understanding Nascent Newsroom Security and Safety Cultures: The Emergence of the “Security Champion” publication-title: Journalism Practice – volume: 15 start-page: 421 issue: 3 year: 2021 end-page: 441 article-title: When watchdogs fight back: Resisting state surveillance in everyday investigative reporting practices among Zimbabwean journalists publication-title: Journal of Eastern African Studies – start-page: 1 year: 2021b end-page: 19 article-title: “We Have to act Like our Devices are Already Infected”: Investigative Journalists and Internet Surveillance publication-title: Journalism Practice – volume: 22 start-page: 1317 year: 2019 end-page: 1339 article-title: How journalists understand the threats and opportunities of new technologies: A study of security mindsets and its implications for press freedom publication-title: Journalism – volume: 6 start-page: 1294 issue: 10 year: 2017 end-page: 1313 article-title: The effects of mass surveillance on Journalists’ relations with confidential sources. A constant comparative study publication-title: Digital Journalism – volume: 16 start-page: 97 issue: 1 year: 2018 end-page: 111 article-title: Protecting journalistic sources against contemporary means of surveillance publication-title: Northern Lights: Film & Media Studies Yearbook – year: 2012 – volume: 6 start-page: 45 issue: 1 year: 2013 end-page: 65 article-title: Radical transparency in Journalism: Digital evolutions from historical precedents publication-title: Global Media Journal ‐ Canadian Edition – volume: 3 start-page: 77 issue: 2 year: 2006 end-page: 101 article-title: Using thematic analysis in psychology publication-title: Qualitative Research in Psychology – volume: 11 start-page: 665 issue: 6 year: 2016 end-page: 688 article-title: No more sources? The impact of Snowden’s revelations on journalists and their confidential sources publication-title: Journalism Practice – volume: 20 start-page: 80 issue: 1 year: 2019 end-page: 82 article-title: The importance of digital security to securing press freedom publication-title: Journalism – start-page: 1 year: 2021 end-page: 20 article-title: Reporting Conflict from Afar: Journalists, Social Media, Communication Technologies, and War publication-title: Journalism Practice – start-page: 11 year: 2017 end-page: 20 – year: 2020 – volume: 3 start-page: 77 issue: 2 year: 2015 end-page: 87 article-title: The role of hackers in countering surveillance and promoting democracy publication-title: Media and Communication – year: 1995 – volume: 11 issue: 3 year: 2017 article-title: WikiLeaks: Between disclosure and whistle‐blowing in digital times publication-title: Sociology Compass – year: 2017 – volume: 3 start-page: 1 issue: 1 year: 2017 end-page: 10 article-title: The changing physical and social environment of newsgathering: A case study of foreign correspondents using chat apps during unrest publication-title: Social Media + Society – year: 2013 – year: 1999 – ident: e_1_2_7_79_1 doi: 10.1080/21670811.2016.1243452 – ident: e_1_2_7_18_1 doi: 10.1177/0163443719843867 – ident: e_1_2_7_19_1 doi: 10.1080/21670811.2020.1777882 – ident: e_1_2_7_23_1 doi: 10.1080/17512786.2021.2014346 – ident: e_1_2_7_58_1 doi: 10.1080/17512786.2018.1555006 – ident: e_1_2_7_87_1 – ident: e_1_2_7_41_1 doi: 10.1080/24701475.2021.1935547 – ident: e_1_2_7_45_1 doi: 10.17645/mac.v3i2.281 – ident: e_1_2_7_75_1 doi: 10.1002/9781118027974 – ident: e_1_2_7_5_1 doi: 10.1080/1369118X.2018.1451908 – volume: 6 start-page: 45 issue: 1 year: 2013 ident: e_1_2_7_28_1 article-title: Radical transparency in Journalism: Digital evolutions from historical precedents publication-title: Global Media Journal ‐ Canadian Edition contributor: fullname: Heemsbergen L. – ident: e_1_2_7_38_1 doi: 10.1080/17512786.2020.1743199 – ident: e_1_2_7_81_1 doi: 10.1177/1464884918809276 – ident: e_1_2_7_25_1 doi: 10.1386/nl.16.1.97_1 – volume-title: RSF appalled by investigative reporter’s murder in Slovakia year: 2018 ident: e_1_2_7_71_1 contributor: fullname: Reporters Without Borders – volume-title: With liberty to monitor all: How large‐scale US surveillance is harming Journalism, law, and American democracy year: 2014 ident: e_1_2_7_40_1 contributor: fullname: Human Rights Watch and ACLU – volume: 1 start-page: 45 issue: 3 year: 2015 ident: e_1_2_7_78_1 article-title: The need for a paradigm shift toward cybersecurity in journalism publication-title: National Cybersecurity Institute Journal contributor: fullname: Taylor R. – volume: 19 start-page: 807 issue: 4 year: 2019 ident: e_1_2_7_47_1 article-title: How to protect the truth? Challenges of cybersecurity, investigative journalism and whistleblowing in times of surveillance capitalism. An interview with Micah lee publication-title: Ephemera: theory and politics in organization contributor: fullname: Lee M. – ident: e_1_2_7_67_1 doi: 10.1080/17512786.2021.1925947 – volume-title: Leaks. Whistleblowing e hacking nell’età senza segreti year: 2019 ident: e_1_2_7_20_1 contributor: fullname: Di Salvo P. – volume-title: Hide and seek: Tracking NSO group’s Pegasus spyware to operations in 45 countries year: 2018 ident: e_1_2_7_52_1 contributor: fullname: Marczak B. – ident: e_1_2_7_29_1 doi: 10.1177/1461444818804847 – ident: e_1_2_7_17_1 doi: 10.1080/17512786.2021.1908839 – ident: e_1_2_7_63_1 doi: 10.1080/17531055.2021.1949119 – ident: e_1_2_7_55_1 doi: 10.1515/popets-2016-0048 – volume-title: Reckless VI: Mexican Journalists investigating cartels targeted with NSO spyware following assassination of colleague year: 2018 ident: e_1_2_7_72_1 contributor: fullname: Scott‐Railton J. – ident: e_1_2_7_42_1 doi: 10.4324/9780203490037 – ident: e_1_2_7_68_1 doi: 10.1080/1461670X.2020.1842233 – ident: e_1_2_7_84_1 doi: 10.1080/21670811.2020.1818111 – ident: e_1_2_7_73_1 doi: 10.1016/S0920-5489(03)00003-5 – volume: 52 start-page: 612 issue: 4 year: 2015 ident: e_1_2_7_60_1 article-title: Securing the communication of journalists with their sources as a for of source protection ‐ editorial policy of Slovenian media regarding communication and technology publication-title: Teorija in Praksa contributor: fullname: Milosavljevič M. – ident: e_1_2_7_86_1 doi: 10.4324/9780429490187-10 – volume-title: Building digital safety for Journalism: A survey of selected issues year: 2015 ident: e_1_2_7_34_1 contributor: fullname: Henrichsen J. R. – volume-title: Hackers. Crime in the digital sublime year: 1999 ident: e_1_2_7_77_1 contributor: fullname: Taylor P. A. – ident: e_1_2_7_2_1 doi: 10.1386/ajms.5.2.297_1 – start-page: 94 volume-title: Computers, Ethics and society year: 1990 ident: e_1_2_7_14_1 contributor: fullname: Burnham D. – ident: e_1_2_7_48_1 doi: 10.24908/ss.v9i4.4345 – volume-title: The great iPwn: Journalists hacked with suspected NSO group iMessage ‘zero‐Click’Exploit year: 2020 ident: e_1_2_7_51_1 contributor: fullname: Marczak B. – volume-title: Signal for beginners. Medium year: 2021 ident: e_1_2_7_74_1 contributor: fullname: Shelton M. – ident: e_1_2_7_59_1 doi: 10.1177/2053951716669381 – year: 2016 ident: e_1_2_7_6_1 article-title: What big data leaks tell us about the future of journalism ‐ and its past publication-title: Internet Policy Review contributor: fullname: Baack S. – ident: e_1_2_7_57_1 doi: 10.1057/9781137313546 – volume-title: Moto‐taxis, drivers, weather, and WhatsApp: Contextualizing new technology in Rwandan newsrooms year: 2021 ident: e_1_2_7_62_1 contributor: fullname: Moon R. – volume-title: Information security fundamentals year: 2005 ident: e_1_2_7_65_1 contributor: fullname: Peltier T. R. – ident: e_1_2_7_7_1 doi: 10.1177/2056305117701163 – ident: e_1_2_7_13_1 doi: 10.1111/soc4.12457 – ident: e_1_2_7_82_1 doi: 10.1177/1464884919849418 – ident: e_1_2_7_3_1 doi: 10.1016/S0167-4048(03)00407-3 – ident: e_1_2_7_4_1 doi: 10.7312/bell17612-010 – ident: e_1_2_7_46_1 doi: 10.1080/17512786.2016.1179587 – volume-title: This machine kills secrets. Julian Assange, the cypherpunks, and their fight to empower whistleblowers year: 2012 ident: e_1_2_7_27_1 contributor: fullname: Greenberg A. – ident: e_1_2_7_85_1 doi: 10.1080/21670811.2017.1365616 – volume-title: Spyware: An unregulated and escalating threat to independent media year: 2021 ident: e_1_2_7_90_1 contributor: fullname: Woodhams S. – volume-title: ‘The threats follow us home’: Survey details risks for female Journalists in U.S., Canada.” committee to protect Journalists year: 2019 ident: e_1_2_7_88_1 contributor: fullname: Westcott L. – volume-title: Protecting journalism sources in the digital age year: 2017 ident: e_1_2_7_69_1 contributor: fullname: Posetti J. – ident: e_1_2_7_8_1 doi: 10.7312/bell17612 – ident: e_1_2_7_21_1 doi: 10.1007/978-3-030-38505-7 – volume-title: Electronic communications surveillance: What Journalists and media organizations need to know year: 2017 ident: e_1_2_7_35_1 contributor: fullname: Henrichsen J. R. – volume: 6 start-page: 33 issue: 1 year: 2016 ident: e_1_2_7_53_1 article-title: ‘Security by obscurity’: Journalists’ mental models of information security publication-title: International Symposium on Online Journalism contributor: fullname: McGregor S. – ident: e_1_2_7_22_1 doi: 10.1080/21670811.2021.1889384 – volume: 20 start-page: 243 issue: 2 year: 2020 ident: e_1_2_7_24_1 article-title: Hybrid professionalism in journalism: Opportunities and risks of hacker sources publication-title: SComS ‐ Studies in Communication Sciences contributor: fullname: Di Salvo P. – ident: e_1_2_7_16_1 doi: 10.1093/acprof:oso/9780199759477.001.0001 – volume-title: Surveillance society: Monitoring everyday life year: 2001 ident: e_1_2_7_50_1 contributor: fullname: Lyon D. – volume-title: How do newsrooms get their news tips? We reviewed over 80 news outlets year: 2020 ident: e_1_2_7_36_1 contributor: fullname: Higgins P. – ident: e_1_2_7_11_1 doi: 10.1080/21670811.2016.1251329 – ident: e_1_2_7_83_1 doi: 10.1080/17512786.2021.1877179 – ident: e_1_2_7_12_1 doi: 10.1191/1478088706qp063oa – volume-title: Digital privacy. Theory, technologies, and practices year: 2008 ident: e_1_2_7_26_1 contributor: fullname: Goldberg I. – ident: e_1_2_7_33_1 doi: 10.1080/17512786.2021.1927802 – ident: e_1_2_7_44_1 – ident: e_1_2_7_92_1 doi: 10.1177/0163443713483793 – start-page: 11 volume-title: The Assault on Journalism Building knowledge to protect freedom of expression year: 2017 ident: e_1_2_7_15_1 contributor: fullname: Carlsson U. – ident: e_1_2_7_37_1 doi: 10.1002/9781118841570.iejs0261 – volume-title: Newsrooms are making leaking easier–and more secure–than ever year: 2017 ident: e_1_2_7_9_1 contributor: fullname: Berret C. – ident: e_1_2_7_66_1 – volume-title: NY times reporter davey alba on covering COVID‐19 conspiracy theories, facing online harassment. Committee to protect Journalists year: 2020 ident: e_1_2_7_89_1 contributor: fullname: Westcott L. – volume-title: Crypto‐Politics. Encryption and democratic practices in the digital era year: 2020 ident: e_1_2_7_61_1 contributor: fullname: Monsees L. – ident: e_1_2_7_39_1 doi: 10.1177/2053951720938091 – start-page: 329 volume-title: The Assault on Journalism Building knowledge to protect freedom of expression year: 2017 ident: e_1_2_7_76_1 contributor: fullname: Suraj O. A. – volume-title: Revealed: Leak uncovers global abuse of cyber‐surveillance weapon year: 2021 ident: e_1_2_7_43_1 contributor: fullname: Kirchgaessner S. – ident: e_1_2_7_54_1 doi: 10.7312/mcgr19232 – volume-title: Spying on democracy year: 2013 ident: e_1_2_7_10_1 contributor: fullname: Boghosian H. – ident: e_1_2_7_56_1 doi: 10.1080/23743670.2020.1730215 – volume-title: Computer related risks year: 1995 ident: e_1_2_7_64_1 contributor: fullname: Neumann P. – ident: e_1_2_7_30_1 doi: 10.1108/9781800437623 – ident: e_1_2_7_32_1 doi: 10.1080/21670811.2019.1653207 – ident: e_1_2_7_91_1 doi: 10.1080/17512786.2016.1218296 – start-page: 1 year: 2021 ident: e_1_2_7_31_1 article-title: Cross‐bordering journalism: How intermediaries of change drive the adoption of new practices publication-title: Journalism contributor: fullname: Heft A. – ident: e_1_2_7_80_1 doi: 10.7312/bell17612-011 – start-page: 249 volume-title: Digital Investigative Journalism: Data, visual analytics and innovative methodologies in International reporting year: 2019 ident: e_1_2_7_70_1 contributor: fullname: Posetti J. – ident: e_1_2_7_49_1 doi: 10.1080/17512781003640752 |
SSID | ssj0062903 |
Score | 2.295069 |
Snippet | Information security (infosec) has become a field of primary interest for journalism, especially in the wake of the 2013 Edward Snowden revelations about the... |
SourceID | proquest crossref wiley |
SourceType | Aggregation Database Publisher |
SubjectTerms | cryptography Cybersecurity encryption hacking information security investigative journalism Journalism Journalists Newsrooms Security Surveillance whistleblowing |
Title | Information security and journalism: Mapping a nascent research field |
URI | https://onlinelibrary.wiley.com/doi/abs/10.1111%2Fsoc4.12961 https://www.proquest.com/docview/2634375739 |
Volume | 16 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwED5BJxbeiJaCLIEYkIJSnxPbiAWVVl14SAWJLbLjFBgaEKED_x7bcdqyICG2DInjnO8Z3fcdwAkzhsuezCPKHCQnSXgkWYERUm3DgTFWjxw4eTTmt0_ieuBoci4bLEzNDzH_4eYsw_trZ-BKV0tGbjfPzm208rWPLRM8fgPvGzecUunHItvw6HoQaBy4SV0bz-LRn9FokWIuJ6o-0gw3_rfHTVgPGSa5qlViC1aKchs6c2AKOSU1JJfUDCFfOzAImCR3RqQKA-2IKg0JmvZaTS_IjXJUDs9EkVJ5CigSiIJeiG-D24XH4eChP4rCeIUoR-S9SGvHaJ4ajTgpJLe5lEGhDU1MQVPOVS60loJr6y5RCBVPbHWYTDCPFRc5t2nFHrTKt7LYB-JovBTHItFuFY1W9MK-A-O8Z-s5pttw3Ig5e69ZNLKm-nAyyryM2tBtTiAL31dlNEWGPOEo23DmZf3LCtn4rs_8VecvNx_AGnWoBt9a1oXW58esOITVysyOvE59A944yxQ |
link.rule.ids | 315,782,786,1408,27933,27934,46064,46488 |
linkProvider | Wiley-Blackwell |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV09T8MwED1BGWDhG9FSwBKIASkotZ3YQWJA0KqItiC1SGxRHKfAQECEDvx7fI7TlgUJsWVIbOd857uz7r0DOOZai6gVpR7lCMkJAuFFPGMeo8q4A62NHiE4uTsUg0d53UaanIsKC1PyQ0wv3NAy7HmNBo4X0nNWblbPz4y7wuRniYdGExHBwe6rgzikkW2MbBwkViFQ37GTYiHP7Nuf_mgWZM6HqtbXdNb-ucp1WHVBJrkstWIDFrJ8ExpTbAo5ISUql5QkIV9b0HawJNwmUriediTJNXHK9lK8npN-gmwOTyQheWJZoIjjCnomthJuGx467dFV13MdFryUMdHylEJS81ArxsZZJEw4pZlUmgY6o6EQSSqViqRQ5sRkUib-2CSIwZilfiJkKkxksQO1_C3PdoEgk1ciWBYoHEUxI3tp5mB-2jIpHVd1OKrkHL-XRBpxlYCgjGIrozo0qy2I3f8VMQ0ZZyIQLKrDqRX2LyPEw7srbp8af3n5EJa7o34v7t0MbvdghSLIwVaaNaH2-THJ9mGx0JMDq2DfzcXPPA |
linkToPdf | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NS8MwFH_oBPHit7g5NaB4ECpbXtq04kXcxkSdgyl4K0nTqgfrsO7gf2-Sptu8COKthzZNX95neb_fAzhmSvGoHSUeZQaS4_vci1iKHlKpw4FSWo8MOLk_4oOnsNM1NDkXFRam5IeY_nAzlmH9tTHwscrmjFxvnp3paGVqnyWm83DDnI84rPxwQCM7F1nHR9OEQFuOnNT08cye_RmOZjnmfKZqQ01v7X-bXIdVl2KSy1InNmAhzTehMUWmkBNSYnJJSRHytQVdB0oyh0QKN9GOiFwRp2qvxds5uROGy-GZCJILywFFHFPQC7F9cNvw2Os-XPU9N1_BSxB525PSUJoHSiJmacR1MqUwlIr6KqUB5yIJpYxCLrW_xDAUrUyXh36GSUvwMOE6r9iBWv6ep7tADI-X4Jj60qwiUYs-1O_AVtLWBR2TdTiqxByPSxqNuCo_jIxiK6M6NKsTiN33FTENkCH3OUZ1OLWy_mWFeHR_xexV4y83H8LysNOLb68HN3uwQg3CwbaZNaH2-TFJ92GxUJMDq17fa2nN4g |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Information+security+and+journalism%3A+Mapping+a+nascent+research+field&rft.jtitle=Sociology+compass&rft.au=Di+Salvo%2C+Philip&rft.date=2022-03-01&rft.issn=1751-9020&rft.eissn=1751-9020&rft.volume=16&rft.issue=3&rft.epage=n%2Fa&rft_id=info:doi/10.1111%2Fsoc4.12961&rft.externalDBID=10.1111%252Fsoc4.12961&rft.externalDocID=SOC412961 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-9020&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-9020&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-9020&client=summon |