Information Security and Cryptography-Encryption in Journalism
Main Article Content
Abstract
The purpose of this review paper is to garner knowledge about the information security and cryptography encryption practices implementation for journalistic work and its effectiveness in thwarting software security breaches in the wake of ‘Journalism After Snowden’. Systematic literature review for the ‘information security and cryptography encryption in journalism’ employed with an eye to synthesize existing practices in this field. For this, at first the existing approachable research article databases and search engines employed to download or get the abstract of relevant scientific articles which are then used for citation and summarization works in a systematic rigorous anatomization. Contingent upon them their analysis and synthesis employed to arrive at the findings. Research papers collated for the purpose of writing this review paper lighted up the vital issues related to investigative journalists’ safety practices promulgation inadequacies even after the UNESCO 2017 and 2022 guidelines for urgent instrumentalization needs of journalists on the part of its’ member States.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
S. Arulchelvan, “Internal Threats and Safety of Journalists. A study from India,” Assault Journal. Build. Knowl. to Prot. Free. Expr., 2017.
C. Berret, “Newsrooms are making leaking easier–and more secure–than ever,” Columbia J. Rev., 2017.
M. Hu, “Cambridge Analytica’s black box,” Big Data Soc., vol. 7, no. 2, p. 2053951720938091, 2020. ttps://doi.org/10.1177/2053951720938091
S. Kirchgaessner, P. Lewis, D. Pegg, S. Cutler, N. Lakhani, and M. Safi, “Revealed: Leak uncovers global abuse of cyber-surveillance weapon,” Pegasus Proj. Guard., 2021.
M. R. Patil and C. F. Mulimani, “Pegasus: Transforming Phone Into A Spy,” Think India J., vol. 22, no. 14, pp. 7883–7890, 2019.
G. A. Sinha, With Liberty to Monitor All: How Large-scale US Surveillance is Harming Journalism, Law and American Democracy. Human Rights Watch, 2014.
C. Savage, “Holder tightens rules on getting reporters’ data. New York, NY,” New York Times, p. A7, 2013.
C. Savage and L. Kaufman, “Phone records of journalists seized by US,” New York Times, vol. 13, 2013.
A. E. Marimow, “Justice Department’s scrutiny of Fox News reporter James Rosen in leak case draws fire,” Washington Post, 2013.
M. Crete-Nishihata, J. Oliver, C. Parsons, D. Walker, L. Tsui, and R. Deibert, “The information security cultures of journalism,” Digit. Journal., vol. 8, no. 8, pp. 1068–1091, 2020. https://doi.org/10.1080/21670811.2020.1777882
R. Anderson, “Why information security is hard-an economic perspective,” in Seventeenth Annual Computer Security Applications Conference, 2001, pp. 358–365.
R. Benson, “Book Review: Normative Theories of the Media: Journalism in Democratic Societies.” SAGE Publications Sage UK: London, England, 2011. https://doi.org/10.1080/21670811.2020.1777882
C. G. Christians, T. Glasser, D. McQuail, K. Nordenstreng, and R. A. White, Normative theories of the media: Journalism in democratic societies. University of Illinois Press, 2010.
A. Russell, R. Kunelius, H. Heikkilä, and D. Yagodin, Journalism and the NSA revelations: Privacy, security and the press. Bloomsbury Publishing, 2017.
V. Bakir, “Journalism and the NSA Revelations: Privacy, Security and the Press.” SAGE Publications Sage UK: London, England, 2017. https://doi.org/10.1177/0267323117730717
S. Coll, “5. Source Protection In The Age Of Surveillance,” in Journalism After Snowden, Columbia University Press, 2017, pp. 85– 96.
R. V Ericson and K. D. Haggerty, “The surveillant assemblage,” Br. J. Sociol., vol. 51, no. 4, pp. 605–622, 2000. https://doi.org/10.1080/00071310020015280
A. Kwon, D. Lu, and S. Devadas, “{XRD}: Scalable messaging system with cryptographic privacy,” in 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20), 2020, pp. 759–776.
A. E. B. Tomaz, J. C. do Nascimento, and J. N. de Souza, “Blockchainbased whistleblowing service to solve the problem of journalistic conflict of interest,” Ann. Telecommun., vol. 77, no. 1, pp. 101–118, 2022. https://doi.org/10.1007/s12243-021-00860-0
J. M. Anderson, “Why we need a new definition of information security,” Comput. Secur., vol. 22, no. 4, pp. 308–313, 2003. https://doi.org/10.1016/S0167-4048(03)00407-3
S. E. Chang and C. B. Ho, “Organizational factors to the effectiveness of implementing information security management,” Ind. Manag. Data Syst., 2006.
K. J. Knapp, T. E. Marshall, R. K. Rainer, and F. N. Ford, “Information security: management’s effect on culture and policy,” Inf. Manag. Comput. Secur., vol. 14, no. 1, pp. 24–36, 2006. https://doi.org/10.1108/09685220610648355
J.-N. Ezingeard and M. Bowen-Schrire, “Triggers of change in information security management practices,” J. Gen. Manag., vol. 32, no. 4, pp. 53–72, 2007. https://doi.org/10.1177/030630700703200404
J. Aycock and J. Aycock, “Getting There,” Spyware and Adware, pp. 9– 27, 2011. https://doi.org/10.1007/978-0-387-77741-2_2
B. A. Forouzan, Data Communications and Networking Global Edition 5e. McGraw Hill, 2012.
S. Baack, “What big data leaks tell us about the future of journalism– and its past,” Internet Policy Rev., vol. 12, no. 23, pp. 9–17, 2016.
B. Brevini, “WikiLeaks: Between disclosure and whistle‐blowing in digital times,” Sociol. Compass, vol. 11, no. 3, p. e12457, 2017. https://doi.org/10.1111/soc4.12457
B. Alfter, “Cross-border collaborative journalism: Why journalists and scholars should talk about an emerging method,” J. Appl. Journal. Media Stud., vol. 5, no. 2, pp. 297–311, 2016. https://doi.org/10.1386/ajms.5.2.297_1
P. Di Salvo, “Hacking/journalism,” Limn, vol. 8, pp. 36–39, 2017.
P. Bradshaw, “Chilling Effect: Regional journalists’ source protection and information security practice in the wake of the Snowden and Regulation of Investigatory Powers Act (RIPA) revelations,” Digit. Journal., vol. 5, no. 3, pp. 334–352, 2017. https://doi.org/10.1080/21670811.2016.1251329
R. Abu-Salma, M. A. Sasse, J. Bonneau, A. Danilova, A. Naiakshina, and M. Smith, “Obstacles to the adoption of secure communication tools,” in 2017 IEEE Symposium on Security and Privacy (SP), 2017, pp. 137–153. https://doi.org/10.1109/SP.2017.65
J. Angwin, “7. Digital Security For Journalists,” in Journalism After Snowden, Columbia University Press, 2017, pp. 114–129. https://doi.org/10.7312/bell17612-010
B. Ataman and B. Çoban, “Counter-surveillance and alternative new media in Turkey,” Information, Commun. Soc., vol. 21, no. 7, pp. 1014– 1029, 2018. https://doi.org/10.1080/1369118X.2018.1451908
P. Di Salvo, “Securing whistleblowing in the digital age: SecureDrop and the changing Journalistic practices for source protection,” Digit. Journal., vol. 9, no. 4, pp. 443–460, 2021. https://doi.org/10.1080/21670811.2021.1889384
J. R. Henrichsen, “Understanding Nascent Newsroom Security and Safety Cultures: The Emergence of the ‘Security Champion,’” Journal. Pract., vol. 16, no. 9, pp. 1829–1848, 2022. https://doi.org/10.1080/17512786.2021.1927802
L. Tsui and F. Lee, “How journalists understand the threats and opportunities of new technologies: A study of security mind-sets and its implications for press freedom,” Journalism, vol. 22, no. 6, pp. 1317– 1339, 2021. https://doi.org/10.1177/1464884919849418
P. Di Salvo, “Information security and journalism: Mapping a nascent research field,” Sociol. Compass, vol. 16, no. 3, p. e12961, 2022. https://doi.org/10.1111/soc4.12961
M. E. Whitman, “In defense of the realm: understanding the threats to information security,” Int. J. Inf. Manage., vol. 24, no. 1, pp. 43–57, 2004. https://doi.org/10.1016/j.ijinfomgt.2003.12.003
J. M. Hagen, E. Albrechtsen, and J. Hovden, “Implementation and effectiveness of organizational information security measures,” Inf. Manag. Comput. Secur., 2008.
S. Carlo and A. Kamphuis, “Information security for journalists,” Cent. Investig. Journal. London, 2014.
J. Posetti, Protecting journalism sources in the digital age. Unesco Publishing, 2017.
C. F. Kleberg, “The death of source protection? Protecting journalists’ source in a post-Snowden age,” 2015.
P. Lashmar, “No more sources? The impact of Snowden’s revelations on journalists and their confidential sources,” Journal. Pract., vol. 11, no. 6, pp. 665–688, 2017. https://doi.org/10.1080/17512786.2016.1179587
E. Sidnam-Mauch et al., “Usable Cryptographic Provenance: A Proactive Complement to Fact-Checking for Mitigating Misinformation,” in Proceedings of the International AAAI Conference on Weblogs and Social Media, 2022, vol. 16, no. 2022.
D. Glowacka, K. Siemaszko, J. Smtek, and Z. Warso, “Protecting journalistic sources against contemporary means of surveillance,” North. Light. Film Media Stud. Yearb., vol. 16, no. 1, pp. 97–111, 2018. https://doi.org/10.1386/nl.16.1.97_1
A. Mills, “Now you see me–now you don’t: Journalists’ experiences with surveillance,” Journal. Pract., vol. 13, no. 6, pp. 690–707, 2019. https://doi.org/10.1080/17512786.2018.1555006
A. Mills and K. Sarikakis, “Reluctant activists? The impact of legislative and structural attempts of surveillance on investigative journalism,” Big Data Soc., vol. 3, no. 2, p. 2053951716669381, 2016. https://doi.org/10.1177/2053951716669381
P. Di Salvo and E. Leaks, Digital Whistleblowing Platforms in Journalism. Springer, 2020. https://doi.org/10.1007/978-3-030-38505-7
A. Greenberg, This machine kills secrets: Julian Assange, the Cypherpunks, and their fight to empower whistleblowers. Penguin, 2013.
L. Heemsbergen, Radical transparency and digital democracy: Wikileaks and beyond. Emerald Group Publishing, 2021. https://doi.org/10.1108/9781800437623
P. Di Salvo and C. Porlezza, “Hybrid professionalism in journalism: Opportunities and risks of hacker sources,” Stud. Commun. Sci., vol. 20, no. 2, pp. 243–254, 2020. https://doi.org/10.24434/j.scoms.2020.02.007
L. Lynch, “‘We’re Going to Crack the World Open’: Wikileaks and the future of investigative reporting,” in The Future of Journalism, Routledge, 2013, pp. 243–252.
R. Zajácz, “WikiLeaks and the problem of anonymity: A network control perspective,” Media, Cult. Soc., vol. 35, no. 4, pp. 489–505, 2013. https://doi.org/10.1177/0163443713483793
R. Meyer, “‘Wearing a Bullet-Proof Vest’: Social Media Use in Journalism Production Within African–Intercontinental Investigative Networks,” African Journal. Stud., vol. 40, no. 3, pp. 89–106, 2019. https://doi.org/10.1080/23743670.2020.1730215
O. A. Suraj and O. Olaleye, “Digital Safety among Nigerian Journalists,” Assault Journal., p. 329.
A. Munoriyarwa, “When watchdogs fight back: resisting state surveillance in everyday investigative reporting practices among Zimbabwean journalists,” J. East. African Stud., vol. 15, no. 3, pp. 421– 441, 2021. https://doi.org/10.1080/17531055.2021.1949119
S. E. McGregor and E. A. Watkins, “‘Security by Obscurity’: Journalists’ Mental Models of Information Security,” in International Symposium on Online Journalism, 2016, vol. 6, no. 1, pp. 33–49.
E. A. Watkins, M. N. Al-Ameen, F. Roesner, K. Caine, and S. McGregor, “Creative and set in their ways: Challenges of security sensemaking in newsrooms,” in 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17), 2017. https://doi.org/10.36227/techrxiv.19351679.v1
H. Ali et al., “SPAM-DaS: Secure and privacy-aware misinformation detection as a service.” TechRxiv, 2022.
M. Yarter, G. Uehara, and A. Spanias, “Implementation and Analysis of Quantum Homomorphic Encryption,” in 2022 13th International Conference on Information, Intelligence, Systems & Applications (IISA), 2022, pp. 1–5. https://doi.org/10.1109/IISA56318.2022.9904399