Search database
Filter
5
Topics
Safety of Journalists, Safety Risks of Media Workers
3
Cybersecurity, Digital Safety, Privacy, Right to Privacy
2
Journalists Dealing with Risks & Threats, Resilience & Wellbeing of Media Workers
2
Internet Censorship Circumvention Tools & Strategies
1
Press Freedom & Communication Rights Violations
1
Harassment & Intimidation of Journalists
1
Surveillance, Surveillance Technologies, Spyware
1
Journalism Education Curricula
1
Language
Document type
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"This chapter examines the intersection of journalist security and safety with the condition of happiness to proffer solutions at the individual and organizational levels, including vis a vis boundaries, mental models, and security champions, with the aim of contributing to journalistic happiness, s ... more
"Journalists are increasingly attacked in response to their work yet they often lack the necessary support and training to protect themselves, their sources, and their communications. Despite this, there has been limited scholarly attention that addresses how journalism schools approach digital secu ... more
"Mob censorship, which “expresses the will of ordinary citizens to exert power over journalists through discursive violence” is traditionally considered a grassroots phenomenon. However, within technically mediated systems, who is behind the mob is sometimes unclear. We therefore ask how the tec ... more
"This paper utilizes concepts from new institutionalism to help explain journalists’ and news organizations’ resistance to implementing security-related practices despite a deteriorating safety and security environment for journalists in the United States. Through 30 interviews with journalists, ... more
"This publication identifies at least 12 digital threats, including illegal or arbitrary digital surveillance, location tracking, and software and hardware exploits without the knowledge of the target. Further examples that are considered are: phishing, fake domain attacks, Man-in-the-Middle (MitM) ... more