Information security and journalism: Mapping a nascent research field

Information security (infosec) has become a field of primary interest for journalism, especially in the wake of the 2013 Edward Snowden revelations about the ramifications of Internet mass surveillance. Following the increasing dangers posed by digital threats—and surveillance in particular—to the s...

Full description

Saved in:
Bibliographic Details
Published in:Sociology compass Vol. 16; no. 3
Main Author: Di Salvo, Philip
Format: Journal Article
Language:English
Published: Hoboken Wiley Subscription Services, Inc 01-03-2022
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Information security (infosec) has become a field of primary interest for journalism, especially in the wake of the 2013 Edward Snowden revelations about the ramifications of Internet mass surveillance. Following the increasing dangers posed by digital threats—and surveillance in particular—to the safety of journalists and their sources, newsrooms and reporters have shown an increased interest in technological solutions for improved protection of their work and sources. In particular, the adoption of strong encryption tools for communication purposes has become an urgent matter for journalists worldwide, becoming a niche of research in journalism studies as well. By reviewing the existing literature in the field, this article examines how journalism studies approach the use of encryption and information security tools for journalistic purposes. Based on research on the major journalism studies journals and other publications, the article offers an overview of the research advancements, highlighting current major trends and research areas.
AbstractList Information security (infosec) has become a field of primary interest for journalism, especially in the wake of the 2013 Edward Snowden revelations about the ramifications of Internet mass surveillance. Following the increasing dangers posed by digital threats—and surveillance in particular—to the safety of journalists and their sources, newsrooms and reporters have shown an increased interest in technological solutions for improved protection of their work and sources. In particular, the adoption of strong encryption tools for communication purposes has become an urgent matter for journalists worldwide, becoming a niche of research in journalism studies as well. By reviewing the existing literature in the field, this article examines how journalism studies approach the use of encryption and information security tools for journalistic purposes. Based on research on the major journalism studies journals and other publications, the article offers an overview of the research advancements, highlighting current major trends and research areas.
Author Di Salvo, Philip
Author_xml – sequence: 1
  givenname: Philip
  orcidid: 0000-0003-2165-0590
  surname: Di Salvo
  fullname: Di Salvo, Philip
  email: philip.di.salvo@usi.ch
  organization: Università della Svizzera italiana
BookMark eNp9kL1OwzAURi1UJNrCwhNYYkNK8U8SO2woKlCpqAMwW7Zjg6vEDnYq1LenJR2YuMu9w7mfPp0ZmPjgDQDXGC3wYe5S0PkCk6rEZ2CKWYGzChE0-XNfgFlKW4RKUiE6BcuVtyF2cnDBw2T0LrphD6Vv4DbsopetS909fJF97_wHlNDLpI0fYDTJyKg_oXWmbS7BuZVtMlenPQfvj8u3-jlbb55W9cM605QynCmlZc7LRlFqTcVwkTeUq4YUjSElY1JzpSrOFCsJ5VwiSzAqLNVIMq4ZIXQObsbcPoavnUmDOLVMgpQ0p6xgtDpQtyOlY0gpGiv66DoZ9wIjcdQkjprEr6YDjEf427Vm_w8pXjd1Pv78ACdPaws
CitedBy_id crossref_primary_10_1080_1461670X_2023_2206494
crossref_primary_10_1080_17512786_2022_2130818
crossref_primary_10_47124_viraverita_995046
crossref_primary_10_54105_ijmcj_A1047_093123
Cites_doi 10.1080/21670811.2016.1243452
10.1177/0163443719843867
10.1080/21670811.2020.1777882
10.1080/17512786.2021.2014346
10.1080/17512786.2018.1555006
10.1080/24701475.2021.1935547
10.17645/mac.v3i2.281
10.1002/9781118027974
10.1080/1369118X.2018.1451908
10.1080/17512786.2020.1743199
10.1177/1464884918809276
10.1386/nl.16.1.97_1
10.1080/17512786.2021.1925947
10.1177/1461444818804847
10.1080/17512786.2021.1908839
10.1080/17531055.2021.1949119
10.1515/popets-2016-0048
10.4324/9780203490037
10.1080/1461670X.2020.1842233
10.1080/21670811.2020.1818111
10.1016/S0920-5489(03)00003-5
10.4324/9780429490187-10
10.1386/ajms.5.2.297_1
10.24908/ss.v9i4.4345
10.1177/2053951716669381
10.1057/9781137313546
10.1177/2056305117701163
10.1111/soc4.12457
10.1177/1464884919849418
10.1016/S0167-4048(03)00407-3
10.7312/bell17612-010
10.1080/17512786.2016.1179587
10.1080/21670811.2017.1365616
10.7312/bell17612
10.1007/978-3-030-38505-7
10.1080/21670811.2021.1889384
10.1093/acprof:oso/9780199759477.001.0001
10.1080/21670811.2016.1251329
10.1080/17512786.2021.1877179
10.1191/1478088706qp063oa
10.1080/17512786.2021.1927802
10.1177/0163443713483793
10.1002/9781118841570.iejs0261
10.1177/2053951720938091
10.7312/mcgr19232
10.1080/23743670.2020.1730215
10.1108/9781800437623
10.1080/21670811.2019.1653207
10.1080/17512786.2016.1218296
10.7312/bell17612-011
10.1080/17512781003640752
ContentType Journal Article
Copyright 2022 The Authors. Sociology Compass published by John Wiley & Sons Ltd.
2022. This article is published under http://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2022 The Authors. Sociology Compass published by John Wiley & Sons Ltd.
– notice: 2022. This article is published under http://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID 24P
WIN
AAYXX
CITATION
7U4
BHHNA
DWI
WZK
DOI 10.1111/soc4.12961
DatabaseName Wiley-Blackwell Titles (Open access)
Wiley Online Library Free Content
CrossRef
Sociological Abstracts (pre-2017)
Sociological Abstracts
Sociological Abstracts
Sociological Abstracts (Ovid)
DatabaseTitle CrossRef
Sociological Abstracts (pre-2017)
Sociological Abstracts
DatabaseTitleList
Sociological Abstracts (pre-2017)
CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Sociology & Social History
EISSN 1751-9020
EndPage n/a
ExternalDocumentID 10_1111_soc4_12961
SOC412961
Genre article
GrantInformation_xml – fundername: The Swiss National Science Foundation (SNSF)
  funderid: P2TIP1_191492
GroupedDBID 05W
0R~
10A
123
1OC
24P
31~
33P
4.4
52S
52U
8-0
8-1
A00
AABNI
AAESR
AAHHS
AAONW
AAOUF
AASGY
AAXRX
AAZKR
ABCUV
ABJNI
ABSOO
ACAHQ
ACBKW
ACBWZ
ACCFJ
ACCZN
ACFBH
ACGFO
ACGFS
ACPOU
ACXQS
ADBBV
ADEMA
ADEOM
ADIZJ
ADKYN
ADMGS
ADXAS
ADZJE
ADZMN
AEEZP
AEGXH
AEIGN
AEIMD
AEQDE
AEUYR
AFBPY
AFFPM
AFGKR
AFKFF
AFPWT
AFRAH
AFZJQ
AHBTC
AIAGR
AIFKG
AIURR
AIWBW
AJBDE
ALMA_UNASSIGNED_HOLDINGS
ALUQN
AMBMR
AMYDB
ASPBG
ASTYK
AVWKF
AZFZN
AZVAB
BDRZF
BFHJK
BMXJE
BNVMJ
BQESF
BRXPI
CS3
DCZOG
DRFUL
DRSSH
EBS
EJD
ESI
FEDTE
G-S
GODZA
HGLYW
HVGLF
HZ~
LATKE
LEEKS
LH4
LITHE
LOXES
LUTES
LW6
LYRES
MEWTI
MRFUL
MRSSH
MSFUL
MSSSH
MXFUL
MXSSH
MY~
O66
O9-
OIG
P2P
P2W
P4E
QB0
ROL
SUPJJ
V8K
WBKPD
WIH
WII
WIN
WMRSR
WOHZO
WSUWO
WXSBR
WYJ
XG1
ZZTAW
AAMNL
AAYXX
CITATION
7U4
BHHNA
DWI
WZK
ID FETCH-LOGICAL-c3371-bbca486db33fe97154d38bd25de2677ac8bb987b762388a0f2105f3c0a78c7223
IEDL.DBID 33P
ISSN 1751-9020
IngestDate Thu Oct 10 20:20:40 EDT 2024
Thu Nov 21 23:40:33 EST 2024
Sat Aug 24 01:13:14 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License Attribution-NonCommercial
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c3371-bbca486db33fe97154d38bd25de2677ac8bb987b762388a0f2105f3c0a78c7223
ORCID 0000-0003-2165-0590
OpenAccessLink https://onlinelibrary.wiley.com/doi/abs/10.1111%2Fsoc4.12961
PQID 2634375739
PQPubID 1046353
PageCount 0
ParticipantIDs proquest_journals_2634375739
crossref_primary_10_1111_soc4_12961
wiley_primary_10_1111_soc4_12961_SOC412961
PublicationCentury 2000
PublicationDate March 2022
PublicationDateYYYYMMDD 2022-03-01
PublicationDate_xml – month: 03
  year: 2022
  text: March 2022
PublicationDecade 2020
PublicationPlace Hoboken
PublicationPlace_xml – name: Hoboken
PublicationTitle Sociology compass
PublicationYear 2022
Publisher Wiley Subscription Services, Inc
Publisher_xml – name: Wiley Subscription Services, Inc
References 2017; 5
2017; 6
2017; 3
2020; 20
2019; 19
2016; 2016
2013; 6
2020; 8
2020; 7
1990
2001
2019; 20
2019; 22
2010; 4
2019; 8
2015; 1
2021a; 9
2015; 3
2012
2011
2015; 52
2008
2021b
1995
2006; 3
2005
2004
2018; 21
2016; 11
1999
2016; 5
2016; 6
2021; 15
2019; 40
2016; 3
2019; 41
2021
2013; 35
2020
2017; 11
2019
2003; 25
2018
2017
2016
2015
2014
2013
2020; 21
2018; 16
2003; 22
2012; 9
2018; 13
Milosavljevič M. (e_1_2_7_60_1) 2015; 52
e_1_2_7_5_1
e_1_2_7_3_1
Henrichsen J. R. (e_1_2_7_35_1) 2017
Monsees L. (e_1_2_7_61_1) 2020
e_1_2_7_7_1
Heemsbergen L. (e_1_2_7_28_1) 2013; 6
e_1_2_7_19_1
Di Salvo P. (e_1_2_7_20_1) 2019
e_1_2_7_83_1
e_1_2_7_17_1
Reporters Without Borders (e_1_2_7_71_1) 2018
e_1_2_7_81_1
e_1_2_7_41_1
e_1_2_7_87_1
e_1_2_7_13_1
e_1_2_7_66_1
e_1_2_7_85_1
Kirchgaessner S. (e_1_2_7_43_1) 2021
e_1_2_7_11_1
e_1_2_7_45_1
e_1_2_7_68_1
Human Rights Watch and ACLU (e_1_2_7_40_1) 2014
e_1_2_7_49_1
Neumann P. (e_1_2_7_64_1) 1995
Lyon D. (e_1_2_7_50_1) 2001
Peltier T. R. (e_1_2_7_65_1) 2005
Burnham D. (e_1_2_7_14_1) 1990
Goldberg I. (e_1_2_7_26_1) 2008
e_1_2_7_73_1
e_1_2_7_92_1
e_1_2_7_25_1
Moon R. (e_1_2_7_62_1) 2021
e_1_2_7_23_1
e_1_2_7_33_1
e_1_2_7_54_1
Shelton M. (e_1_2_7_74_1) 2021
e_1_2_7_75_1
Carlsson U. (e_1_2_7_15_1) 2017
e_1_2_7_21_1
e_1_2_7_56_1
e_1_2_7_37_1
e_1_2_7_58_1
e_1_2_7_79_1
e_1_2_7_39_1
Scott‐Railton J. (e_1_2_7_72_1) 2018
Heft A. (e_1_2_7_31_1) 2021
Taylor P. A. (e_1_2_7_77_1) 1999
Higgins P. (e_1_2_7_36_1) 2020
Posetti J. (e_1_2_7_70_1) 2019
e_1_2_7_4_1
Posetti J. (e_1_2_7_69_1) 2017
e_1_2_7_80_1
e_1_2_7_8_1
Marczak B. (e_1_2_7_51_1) 2020
e_1_2_7_18_1
e_1_2_7_84_1
Greenberg A. (e_1_2_7_27_1) 2012
e_1_2_7_16_1
e_1_2_7_82_1
e_1_2_7_2_1
Henrichsen J. R. (e_1_2_7_34_1) 2015
e_1_2_7_42_1
e_1_2_7_63_1
Woodhams S. (e_1_2_7_90_1) 2021
e_1_2_7_12_1
e_1_2_7_44_1
e_1_2_7_86_1
e_1_2_7_46_1
e_1_2_7_67_1
e_1_2_7_48_1
Boghosian H. (e_1_2_7_10_1) 2013
e_1_2_7_29_1
McGregor S. (e_1_2_7_53_1) 2016; 6
Westcott L. (e_1_2_7_88_1) 2019
Berret C. (e_1_2_7_9_1) 2017
Suraj O. A. (e_1_2_7_76_1) 2017
Di Salvo P. (e_1_2_7_24_1) 2020; 20
Lee M. (e_1_2_7_47_1) 2019; 19
e_1_2_7_91_1
Marczak B. (e_1_2_7_52_1) 2018
e_1_2_7_30_1
e_1_2_7_32_1
e_1_2_7_55_1
e_1_2_7_22_1
e_1_2_7_57_1
e_1_2_7_59_1
e_1_2_7_38_1
Taylor R. (e_1_2_7_78_1) 2015; 1
Westcott L. (e_1_2_7_89_1) 2020
Baack S. (e_1_2_7_6_1) 2016
References_xml – year: 2011
– volume: 41
  start-page: 565
  issue: 4
  year: 2019
  end-page: 571
  article-title: How has the fight for anonymity and privacy advanced since Snowden’s whistle‐blowing?
  publication-title: Media, Culture & Society
– volume: 22
  start-page: 308
  issue: 4
  year: 2003
  end-page: 313
  article-title: Why we need a new definition of information security
  publication-title: Computers & Security
– year: 2005
– start-page: 1
  year: 2021
  end-page: 22
  article-title: Coping with the Murder: The Impact of Ján Kuciak’s Assassination on Slovak Investigative Journalists
  publication-title: Journalism Practice
– volume: 20
  start-page: 243
  issue: 2
  year: 2020
  end-page: 254
  article-title: Hybrid professionalism in journalism: Opportunities and risks of hacker sources
  publication-title: SComS ‐ Studies in Communication Sciences
– volume: 9
  start-page: 441
  issue: 4
  year: 2012
  end-page: 456
  article-title: Resistance against cyber‐surveillance within social movements and how surveillance adapts
  publication-title: Surveillance and Society
– year: 2001
– volume: 8
  start-page: 1068
  issue: 8
  year: 2020
  end-page: 1091
  article-title: The information security cultures of journalism
  publication-title: Digital Journalism
– year: 2021
– start-page: 1
  year: 2021
  end-page: 24
  article-title: Promoting Newsafety from the Exile: The Emergence of New Journalistic Roles in Diaspora Journalists’ Networks
  publication-title: Journalism Practice
– volume: 1
  start-page: 45
  issue: 3
  year: 2015
  end-page: 47
  article-title: The need for a paradigm shift toward cybersecurity in journalism
  publication-title: National Cybersecurity Institute Journal
– volume: 6
  start-page: 33
  issue: 1
  year: 2016
  end-page: 49
  article-title: ‘Security by obscurity’: Journalists’ mental models of information security
  publication-title: International Symposium on Online Journalism
– volume: 19
  start-page: 807
  issue: 4
  year: 2019
  end-page: 824
  article-title: How to protect the truth? Challenges of cybersecurity, investigative journalism and whistleblowing in times of surveillance capitalism. An interview with Micah lee
  publication-title: Ephemera: theory and politics in organization
– volume: 11
  start-page: 302
  issue: 2–3
  year: 2016
  end-page: 318
  article-title: Helping Syrians tell their story to the world. Training Syrian citizen journalists through connective journalism
  publication-title: Journalism Practice
– volume: 15
  start-page: 583
  issue: 5
  year: 2021
  end-page: 600
  article-title: Nick, nick. Who’s there? Ethical considerations when reporting on the dark net
  publication-title: Journalism Practice
– volume: 9
  start-page: 443
  issue: 4
  year: 2021a
  end-page: 460
  article-title: Securing whistleblowing in the digital age: SecureDrop and the changing Journalistic practices for source protection
  publication-title: Digital Journalism
– year: 2018
– year: 2014
– volume: 4
  start-page: 309
  issue: 3
  year: 2010
  end-page: 318
  article-title: “We’re going to crack the world open”. Wikileaks and the future of investigative reporting
  publication-title: Journalism Practice
– start-page: 329
  year: 2017
  end-page: 336
– start-page: 119
  year: 2019
  end-page: 131
– volume: 5
  start-page: 297
  issue: 2
  year: 2016
  end-page: 311
  article-title: Cross‐border collaborative journalism: Why journalists and scholars should talk about an emerging method
  publication-title: Journal of Applied Journalism & Media Studies
– volume: 8
  start-page: 1030
  issue: 8
  year: 2020
  end-page: 1046
  article-title: Mob censorship: Online Harassment of US Journalists in times of digital hate and populism
  publication-title: Digital Journalism
– start-page: 130
  year: 2017
  end-page: 141
– year: 2008
– start-page: 1
  year: 2021
  end-page: 27
  article-title: Cypherpunk ideology: Objectives, profiles, and influences (1992‐1998)
  publication-title: Internet Histories
– year: 2004
– start-page: 94
  year: 1990
  end-page: 105
– volume: 13
  start-page: 690
  issue: 6
  year: 2018
  end-page: 707
  article-title: Now you see me – now you don’t: Journalists’ experiences with surveillance
  publication-title: Journalism Practice
– volume: 21
  start-page: 693
  issue: 3
  year: 2018
  end-page: 711
  article-title: Killing secrets from Panama to Paradise: Understanding the ICIJ through bifurcating communicative and political affordances
  publication-title: New Media & Society
– volume: 2016
  start-page: 418
  issue: 4
  year: 2016
  end-page: 435
  article-title: Individual versus organizational computer security and privacy concerns in Journalism
  publication-title: Proceedings on Privacy Enhancing Technologies
– year: 2019
– volume: 8
  start-page: 328
  issue: 3
  year: 2019
  end-page: 346
  article-title: Breaking through the ambivalence: Journalistic responses to information security technologies
  publication-title: Digital Journalism
– volume: 25
  start-page: 147
  issue: 2
  year: 2003
  end-page: 158
  article-title: Privacy‐Enhancing Technologies—approaches and development
  publication-title: Computer Standards & Interfaces
– start-page: 249
  year: 2019
  end-page: 261
– year: 2015
– volume: 3
  issue: 2
  year: 2016
  article-title: Reluctant activists? The impact of legislative and structural attempts of surveillance on investigative journalism
  publication-title: Big Data & Society
– volume: 5
  start-page: 299
  issue: 3
  year: 2016
  end-page: 317
  article-title: Cryptic Journalism. News reporting of encryption
  publication-title: Digital Journalism
– year: 2016
  article-title: What big data leaks tell us about the future of journalism ‐ and its past
  publication-title: Internet Policy Review
– start-page: 1
  year: 2021
  end-page: 19
  article-title: Cross‐bordering journalism: How intermediaries of change drive the adoption of new practices
  publication-title: Journalism
– start-page: 114
  year: 2017
  end-page: 129
– volume: 5
  start-page: 334
  issue: 3
  year: 2017
  end-page: 352
  article-title: Chilling Effect. Regional journalists’ source protection and information security practice in the wake of the Snowden and Regulation of Investigatory Powers Act (RIPA) revelations
  publication-title: Digital Journalism
– volume: 21
  start-page: 2285
  issue: 16
  year: 2020
  end-page: 2304
  article-title: The accountability and transparency of whistleblowing platforms issues of networked Journalism and contested boundaries
  publication-title: Journalism Studies
– volume: 52
  start-page: 612
  issue: 4
  year: 2015
  end-page: 630
  article-title: Securing the communication of journalists with their sources as a for of source protection ‐ editorial policy of Slovenian media regarding communication and technology
  publication-title: Teorija in Praksa
– volume: 40
  start-page: 89
  issue: 3
  year: 2019
  end-page: 106
  article-title: “Wearing a bullet‐proof vest”: Social media use in Journalism production within african–intercontinental investigative networks
  publication-title: African Journalism Studies
– volume: 7
  start-page: 1
  issue: 2
  year: 2020
  end-page: 6
  article-title: Cambridge Analytica’s black box
  publication-title: Big Data & Society
– volume: 21
  start-page: 1014
  issue: 7
  year: 2018
  end-page: 1029
  article-title: Counter‐surveillance and alternative new media in Turkey
  publication-title: Information, Communication & Society
– volume: 35
  start-page: 489
  issue: 4
  year: 2013
  end-page: 505
  article-title: WikiLeaks and the problem of anonymity: A network control perspective
  publication-title: Media, Culture & Society
– start-page: 1
  year: 2021
  end-page: 21
  article-title: Understanding Nascent Newsroom Security and Safety Cultures: The Emergence of the “Security Champion”
  publication-title: Journalism Practice
– volume: 15
  start-page: 421
  issue: 3
  year: 2021
  end-page: 441
  article-title: When watchdogs fight back: Resisting state surveillance in everyday investigative reporting practices among Zimbabwean journalists
  publication-title: Journal of Eastern African Studies
– start-page: 1
  year: 2021b
  end-page: 19
  article-title: “We Have to act Like our Devices are Already Infected”: Investigative Journalists and Internet Surveillance
  publication-title: Journalism Practice
– volume: 22
  start-page: 1317
  year: 2019
  end-page: 1339
  article-title: How journalists understand the threats and opportunities of new technologies: A study of security mindsets and its implications for press freedom
  publication-title: Journalism
– volume: 6
  start-page: 1294
  issue: 10
  year: 2017
  end-page: 1313
  article-title: The effects of mass surveillance on Journalists’ relations with confidential sources. A constant comparative study
  publication-title: Digital Journalism
– volume: 16
  start-page: 97
  issue: 1
  year: 2018
  end-page: 111
  article-title: Protecting journalistic sources against contemporary means of surveillance
  publication-title: Northern Lights: Film & Media Studies Yearbook
– year: 2012
– volume: 6
  start-page: 45
  issue: 1
  year: 2013
  end-page: 65
  article-title: Radical transparency in Journalism: Digital evolutions from historical precedents
  publication-title: Global Media Journal ‐ Canadian Edition
– volume: 3
  start-page: 77
  issue: 2
  year: 2006
  end-page: 101
  article-title: Using thematic analysis in psychology
  publication-title: Qualitative Research in Psychology
– volume: 11
  start-page: 665
  issue: 6
  year: 2016
  end-page: 688
  article-title: No more sources? The impact of Snowden’s revelations on journalists and their confidential sources
  publication-title: Journalism Practice
– volume: 20
  start-page: 80
  issue: 1
  year: 2019
  end-page: 82
  article-title: The importance of digital security to securing press freedom
  publication-title: Journalism
– start-page: 1
  year: 2021
  end-page: 20
  article-title: Reporting Conflict from Afar: Journalists, Social Media, Communication Technologies, and War
  publication-title: Journalism Practice
– start-page: 11
  year: 2017
  end-page: 20
– year: 2020
– volume: 3
  start-page: 77
  issue: 2
  year: 2015
  end-page: 87
  article-title: The role of hackers in countering surveillance and promoting democracy
  publication-title: Media and Communication
– year: 1995
– volume: 11
  issue: 3
  year: 2017
  article-title: WikiLeaks: Between disclosure and whistle‐blowing in digital times
  publication-title: Sociology Compass
– year: 2017
– volume: 3
  start-page: 1
  issue: 1
  year: 2017
  end-page: 10
  article-title: The changing physical and social environment of newsgathering: A case study of foreign correspondents using chat apps during unrest
  publication-title: Social Media + Society
– year: 2013
– year: 1999
– ident: e_1_2_7_79_1
  doi: 10.1080/21670811.2016.1243452
– ident: e_1_2_7_18_1
  doi: 10.1177/0163443719843867
– ident: e_1_2_7_19_1
  doi: 10.1080/21670811.2020.1777882
– ident: e_1_2_7_23_1
  doi: 10.1080/17512786.2021.2014346
– ident: e_1_2_7_58_1
  doi: 10.1080/17512786.2018.1555006
– ident: e_1_2_7_87_1
– ident: e_1_2_7_41_1
  doi: 10.1080/24701475.2021.1935547
– ident: e_1_2_7_45_1
  doi: 10.17645/mac.v3i2.281
– ident: e_1_2_7_75_1
  doi: 10.1002/9781118027974
– ident: e_1_2_7_5_1
  doi: 10.1080/1369118X.2018.1451908
– volume: 6
  start-page: 45
  issue: 1
  year: 2013
  ident: e_1_2_7_28_1
  article-title: Radical transparency in Journalism: Digital evolutions from historical precedents
  publication-title: Global Media Journal ‐ Canadian Edition
  contributor:
    fullname: Heemsbergen L.
– ident: e_1_2_7_38_1
  doi: 10.1080/17512786.2020.1743199
– ident: e_1_2_7_81_1
  doi: 10.1177/1464884918809276
– ident: e_1_2_7_25_1
  doi: 10.1386/nl.16.1.97_1
– volume-title: RSF appalled by investigative reporter’s murder in Slovakia
  year: 2018
  ident: e_1_2_7_71_1
  contributor:
    fullname: Reporters Without Borders
– volume-title: With liberty to monitor all: How large‐scale US surveillance is harming Journalism, law, and American democracy
  year: 2014
  ident: e_1_2_7_40_1
  contributor:
    fullname: Human Rights Watch and ACLU
– volume: 1
  start-page: 45
  issue: 3
  year: 2015
  ident: e_1_2_7_78_1
  article-title: The need for a paradigm shift toward cybersecurity in journalism
  publication-title: National Cybersecurity Institute Journal
  contributor:
    fullname: Taylor R.
– volume: 19
  start-page: 807
  issue: 4
  year: 2019
  ident: e_1_2_7_47_1
  article-title: How to protect the truth? Challenges of cybersecurity, investigative journalism and whistleblowing in times of surveillance capitalism. An interview with Micah lee
  publication-title: Ephemera: theory and politics in organization
  contributor:
    fullname: Lee M.
– ident: e_1_2_7_67_1
  doi: 10.1080/17512786.2021.1925947
– volume-title: Leaks. Whistleblowing e hacking nell’età senza segreti
  year: 2019
  ident: e_1_2_7_20_1
  contributor:
    fullname: Di Salvo P.
– volume-title: Hide and seek: Tracking NSO group’s Pegasus spyware to operations in 45 countries
  year: 2018
  ident: e_1_2_7_52_1
  contributor:
    fullname: Marczak B.
– ident: e_1_2_7_29_1
  doi: 10.1177/1461444818804847
– ident: e_1_2_7_17_1
  doi: 10.1080/17512786.2021.1908839
– ident: e_1_2_7_63_1
  doi: 10.1080/17531055.2021.1949119
– ident: e_1_2_7_55_1
  doi: 10.1515/popets-2016-0048
– volume-title: Reckless VI: Mexican Journalists investigating cartels targeted with NSO spyware following assassination of colleague
  year: 2018
  ident: e_1_2_7_72_1
  contributor:
    fullname: Scott‐Railton J.
– ident: e_1_2_7_42_1
  doi: 10.4324/9780203490037
– ident: e_1_2_7_68_1
  doi: 10.1080/1461670X.2020.1842233
– ident: e_1_2_7_84_1
  doi: 10.1080/21670811.2020.1818111
– ident: e_1_2_7_73_1
  doi: 10.1016/S0920-5489(03)00003-5
– volume: 52
  start-page: 612
  issue: 4
  year: 2015
  ident: e_1_2_7_60_1
  article-title: Securing the communication of journalists with their sources as a for of source protection ‐ editorial policy of Slovenian media regarding communication and technology
  publication-title: Teorija in Praksa
  contributor:
    fullname: Milosavljevič M.
– ident: e_1_2_7_86_1
  doi: 10.4324/9780429490187-10
– volume-title: Building digital safety for Journalism: A survey of selected issues
  year: 2015
  ident: e_1_2_7_34_1
  contributor:
    fullname: Henrichsen J. R.
– volume-title: Hackers. Crime in the digital sublime
  year: 1999
  ident: e_1_2_7_77_1
  contributor:
    fullname: Taylor P. A.
– ident: e_1_2_7_2_1
  doi: 10.1386/ajms.5.2.297_1
– start-page: 94
  volume-title: Computers, Ethics and society
  year: 1990
  ident: e_1_2_7_14_1
  contributor:
    fullname: Burnham D.
– ident: e_1_2_7_48_1
  doi: 10.24908/ss.v9i4.4345
– volume-title: The great iPwn: Journalists hacked with suspected NSO group iMessage ‘zero‐Click’Exploit
  year: 2020
  ident: e_1_2_7_51_1
  contributor:
    fullname: Marczak B.
– volume-title: Signal for beginners. Medium
  year: 2021
  ident: e_1_2_7_74_1
  contributor:
    fullname: Shelton M.
– ident: e_1_2_7_59_1
  doi: 10.1177/2053951716669381
– year: 2016
  ident: e_1_2_7_6_1
  article-title: What big data leaks tell us about the future of journalism ‐ and its past
  publication-title: Internet Policy Review
  contributor:
    fullname: Baack S.
– ident: e_1_2_7_57_1
  doi: 10.1057/9781137313546
– volume-title: Moto‐taxis, drivers, weather, and WhatsApp: Contextualizing new technology in Rwandan newsrooms
  year: 2021
  ident: e_1_2_7_62_1
  contributor:
    fullname: Moon R.
– volume-title: Information security fundamentals
  year: 2005
  ident: e_1_2_7_65_1
  contributor:
    fullname: Peltier T. R.
– ident: e_1_2_7_7_1
  doi: 10.1177/2056305117701163
– ident: e_1_2_7_13_1
  doi: 10.1111/soc4.12457
– ident: e_1_2_7_82_1
  doi: 10.1177/1464884919849418
– ident: e_1_2_7_3_1
  doi: 10.1016/S0167-4048(03)00407-3
– ident: e_1_2_7_4_1
  doi: 10.7312/bell17612-010
– ident: e_1_2_7_46_1
  doi: 10.1080/17512786.2016.1179587
– volume-title: This machine kills secrets. Julian Assange, the cypherpunks, and their fight to empower whistleblowers
  year: 2012
  ident: e_1_2_7_27_1
  contributor:
    fullname: Greenberg A.
– ident: e_1_2_7_85_1
  doi: 10.1080/21670811.2017.1365616
– volume-title: Spyware: An unregulated and escalating threat to independent media
  year: 2021
  ident: e_1_2_7_90_1
  contributor:
    fullname: Woodhams S.
– volume-title: ‘The threats follow us home’: Survey details risks for female Journalists in U.S., Canada.” committee to protect Journalists
  year: 2019
  ident: e_1_2_7_88_1
  contributor:
    fullname: Westcott L.
– volume-title: Protecting journalism sources in the digital age
  year: 2017
  ident: e_1_2_7_69_1
  contributor:
    fullname: Posetti J.
– ident: e_1_2_7_8_1
  doi: 10.7312/bell17612
– ident: e_1_2_7_21_1
  doi: 10.1007/978-3-030-38505-7
– volume-title: Electronic communications surveillance: What Journalists and media organizations need to know
  year: 2017
  ident: e_1_2_7_35_1
  contributor:
    fullname: Henrichsen J. R.
– volume: 6
  start-page: 33
  issue: 1
  year: 2016
  ident: e_1_2_7_53_1
  article-title: ‘Security by obscurity’: Journalists’ mental models of information security
  publication-title: International Symposium on Online Journalism
  contributor:
    fullname: McGregor S.
– ident: e_1_2_7_22_1
  doi: 10.1080/21670811.2021.1889384
– volume: 20
  start-page: 243
  issue: 2
  year: 2020
  ident: e_1_2_7_24_1
  article-title: Hybrid professionalism in journalism: Opportunities and risks of hacker sources
  publication-title: SComS ‐ Studies in Communication Sciences
  contributor:
    fullname: Di Salvo P.
– ident: e_1_2_7_16_1
  doi: 10.1093/acprof:oso/9780199759477.001.0001
– volume-title: Surveillance society: Monitoring everyday life
  year: 2001
  ident: e_1_2_7_50_1
  contributor:
    fullname: Lyon D.
– volume-title: How do newsrooms get their news tips? We reviewed over 80 news outlets
  year: 2020
  ident: e_1_2_7_36_1
  contributor:
    fullname: Higgins P.
– ident: e_1_2_7_11_1
  doi: 10.1080/21670811.2016.1251329
– ident: e_1_2_7_83_1
  doi: 10.1080/17512786.2021.1877179
– ident: e_1_2_7_12_1
  doi: 10.1191/1478088706qp063oa
– volume-title: Digital privacy. Theory, technologies, and practices
  year: 2008
  ident: e_1_2_7_26_1
  contributor:
    fullname: Goldberg I.
– ident: e_1_2_7_33_1
  doi: 10.1080/17512786.2021.1927802
– ident: e_1_2_7_44_1
– ident: e_1_2_7_92_1
  doi: 10.1177/0163443713483793
– start-page: 11
  volume-title: The Assault on Journalism Building knowledge to protect freedom of expression
  year: 2017
  ident: e_1_2_7_15_1
  contributor:
    fullname: Carlsson U.
– ident: e_1_2_7_37_1
  doi: 10.1002/9781118841570.iejs0261
– volume-title: Newsrooms are making leaking easier–and more secure–than ever
  year: 2017
  ident: e_1_2_7_9_1
  contributor:
    fullname: Berret C.
– ident: e_1_2_7_66_1
– volume-title: NY times reporter davey alba on covering COVID‐19 conspiracy theories, facing online harassment. Committee to protect Journalists
  year: 2020
  ident: e_1_2_7_89_1
  contributor:
    fullname: Westcott L.
– volume-title: Crypto‐Politics. Encryption and democratic practices in the digital era
  year: 2020
  ident: e_1_2_7_61_1
  contributor:
    fullname: Monsees L.
– ident: e_1_2_7_39_1
  doi: 10.1177/2053951720938091
– start-page: 329
  volume-title: The Assault on Journalism Building knowledge to protect freedom of expression
  year: 2017
  ident: e_1_2_7_76_1
  contributor:
    fullname: Suraj O. A.
– volume-title: Revealed: Leak uncovers global abuse of cyber‐surveillance weapon
  year: 2021
  ident: e_1_2_7_43_1
  contributor:
    fullname: Kirchgaessner S.
– ident: e_1_2_7_54_1
  doi: 10.7312/mcgr19232
– volume-title: Spying on democracy
  year: 2013
  ident: e_1_2_7_10_1
  contributor:
    fullname: Boghosian H.
– ident: e_1_2_7_56_1
  doi: 10.1080/23743670.2020.1730215
– volume-title: Computer related risks
  year: 1995
  ident: e_1_2_7_64_1
  contributor:
    fullname: Neumann P.
– ident: e_1_2_7_30_1
  doi: 10.1108/9781800437623
– ident: e_1_2_7_32_1
  doi: 10.1080/21670811.2019.1653207
– ident: e_1_2_7_91_1
  doi: 10.1080/17512786.2016.1218296
– start-page: 1
  year: 2021
  ident: e_1_2_7_31_1
  article-title: Cross‐bordering journalism: How intermediaries of change drive the adoption of new practices
  publication-title: Journalism
  contributor:
    fullname: Heft A.
– ident: e_1_2_7_80_1
  doi: 10.7312/bell17612-011
– start-page: 249
  volume-title: Digital Investigative Journalism: Data, visual analytics and innovative methodologies in International reporting
  year: 2019
  ident: e_1_2_7_70_1
  contributor:
    fullname: Posetti J.
– ident: e_1_2_7_49_1
  doi: 10.1080/17512781003640752
SSID ssj0062903
Score 2.295069
Snippet Information security (infosec) has become a field of primary interest for journalism, especially in the wake of the 2013 Edward Snowden revelations about the...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Publisher
SubjectTerms cryptography
Cybersecurity
encryption
hacking
information security
investigative journalism
Journalism
Journalists
Newsrooms
Security
Surveillance
whistleblowing
Title Information security and journalism: Mapping a nascent research field
URI https://onlinelibrary.wiley.com/doi/abs/10.1111%2Fsoc4.12961
https://www.proquest.com/docview/2634375739
Volume 16
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwED5BJxbeiJaCLIEYkIJSnxPbiAWVVl14SAWJLbLjFBgaEKED_x7bcdqyICG2DInjnO8Z3fcdwAkzhsuezCPKHCQnSXgkWYERUm3DgTFWjxw4eTTmt0_ieuBoci4bLEzNDzH_4eYsw_trZ-BKV0tGbjfPzm208rWPLRM8fgPvGzecUunHItvw6HoQaBy4SV0bz-LRn9FokWIuJ6o-0gw3_rfHTVgPGSa5qlViC1aKchs6c2AKOSU1JJfUDCFfOzAImCR3RqQKA-2IKg0JmvZaTS_IjXJUDs9EkVJ5CigSiIJeiG-D24XH4eChP4rCeIUoR-S9SGvHaJ4ajTgpJLe5lEGhDU1MQVPOVS60loJr6y5RCBVPbHWYTDCPFRc5t2nFHrTKt7LYB-JovBTHItFuFY1W9MK-A-O8Z-s5pttw3Ig5e69ZNLKm-nAyyryM2tBtTiAL31dlNEWGPOEo23DmZf3LCtn4rs_8VecvNx_AGnWoBt9a1oXW58esOITVysyOvE59A944yxQ
link.rule.ids 315,782,786,1408,27933,27934,46064,46488
linkProvider Wiley-Blackwell
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV09T8MwED1BGWDhG9FSwBKIASkotZ3YQWJA0KqItiC1SGxRHKfAQECEDvx7fI7TlgUJsWVIbOd857uz7r0DOOZai6gVpR7lCMkJAuFFPGMeo8q4A62NHiE4uTsUg0d53UaanIsKC1PyQ0wv3NAy7HmNBo4X0nNWblbPz4y7wuRniYdGExHBwe6rgzikkW2MbBwkViFQ37GTYiHP7Nuf_mgWZM6HqtbXdNb-ucp1WHVBJrkstWIDFrJ8ExpTbAo5ISUql5QkIV9b0HawJNwmUriediTJNXHK9lK8npN-gmwOTyQheWJZoIjjCnomthJuGx467dFV13MdFryUMdHylEJS81ArxsZZJEw4pZlUmgY6o6EQSSqViqRQ5sRkUib-2CSIwZilfiJkKkxksQO1_C3PdoEgk1ciWBYoHEUxI3tp5mB-2jIpHVd1OKrkHL-XRBpxlYCgjGIrozo0qy2I3f8VMQ0ZZyIQLKrDqRX2LyPEw7srbp8af3n5EJa7o34v7t0MbvdghSLIwVaaNaH2-THJ9mGx0JMDq2DfzcXPPA
linkToPdf http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NS8MwFH_oBPHit7g5NaB4ECpbXtq04kXcxkSdgyl4K0nTqgfrsO7gf2-Sptu8COKthzZNX95neb_fAzhmSvGoHSUeZQaS4_vci1iKHlKpw4FSWo8MOLk_4oOnsNM1NDkXFRam5IeY_nAzlmH9tTHwscrmjFxvnp3paGVqnyWm83DDnI84rPxwQCM7F1nHR9OEQFuOnNT08cye_RmOZjnmfKZqQ01v7X-bXIdVl2KSy1InNmAhzTehMUWmkBNSYnJJSRHytQVdB0oyh0QKN9GOiFwRp2qvxds5uROGy-GZCJILywFFHFPQC7F9cNvw2Os-XPU9N1_BSxB525PSUJoHSiJmacR1MqUwlIr6KqUB5yIJpYxCLrW_xDAUrUyXh36GSUvwMOE6r9iBWv6ep7tADI-X4Jj60qwiUYs-1O_AVtLWBR2TdTiqxByPSxqNuCo_jIxiK6M6NKsTiN33FTENkCH3OUZ1OLWy_mWFeHR_xexV4y83H8LysNOLb68HN3uwQg3CwbaZNaH2-TFJ92GxUJMDq17fa2nN4g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Information+security+and+journalism%3A+Mapping+a+nascent+research+field&rft.jtitle=Sociology+compass&rft.au=Di+Salvo%2C+Philip&rft.date=2022-03-01&rft.issn=1751-9020&rft.eissn=1751-9020&rft.volume=16&rft.issue=3&rft.epage=n%2Fa&rft_id=info:doi/10.1111%2Fsoc4.12961&rft.externalDBID=10.1111%252Fsoc4.12961&rft.externalDocID=SOC412961
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-9020&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-9020&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-9020&client=summon