Information security for criminological ethnographers

Author:

Kindynis TheoORCID,Fleetwood Jennifer1

Affiliation:

1. Goldsmiths College, UK

Abstract

Information security refers to ‘the practice of defending information from unauthorised access’. Information security practices include everyday activities such as protecting your bank details, or keeping your workplace logins secure. Despite increasingly restrictive approaches to research ethics, academia continues to lag behind journalism when it comes to best practice with regards to information security. This article discusses information security as it pertains to qualitative and especially ethnographic research into crime and deviance. In doing so, the article addresses a gap in the methodological literature by drawing on lessons and real-world examples from journalism, academia and activism, in order to offer guidance for researchers seeking to maintain information security in a digital, networked social world. The article proceeds in three parts. First, the article considers what information researchers might want to protect, who they might want to protect it from and what the consequences might be if they failed to do so (an exercise known as ‘threat modelling’). The different powers, resources and capacities of, and threats posed by, state actors such as the police and intelligence agencies, as well as an array of non-state actors, are considered. Second, the article outlines some general principles of information security and how they might apply to ethnographic research into crime and deviance. Third, the article discusses a range of practical considerations when it comes to using mobile phones (cell phones), social media, passwords and encryption in the course of researching crime and deviance.

Publisher

SAGE Publications

Subject

Law,Arts and Humanities (miscellaneous),Communication,Cultural Studies

Reference85 articles.

1. Wheeling and Dealing

2. al-Rasheed M (2021) Pegasus project: Why I was targeted by Israeli spyware. Middle East Eye, 20 July. Available at: https://www.middleeasteye.net/opinion/pegasus-israel-saudi-arabia-why-targeted-spyware (accessed 30 July 2021).

3. Albergotti R (2014) Judge rules suspect can be required to unlock phone with fingerprint. Wall Street Journal, 31 October. Available at: https://www.wsj.com/articles/BL-DGB-38641 (accessed 29 July 2021).

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3