2020
DOI: 10.1080/17512786.2020.1743199
|View full text |Cite
|
Sign up to set email alerts
|

Nick, Nick. Who’s There? Ethical Considerations When Reporting on the Dark Net

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Encryption as a safety measure has also emerged from the analysis of ethical reporting practices on the dark web and in relation to covering the drug trade and child sex abuse. In this context as well, whereas encryption has been indicated as a security solution, regular online presence in such a dangerous digital environment could still make journalists vulnerable to anonymous, digital threats (Hognestad, 2021).…”
Section: The Use Of Infosec Tools and Practices In Journalistic Contextsmentioning
confidence: 99%
“…Encryption as a safety measure has also emerged from the analysis of ethical reporting practices on the dark web and in relation to covering the drug trade and child sex abuse. In this context as well, whereas encryption has been indicated as a security solution, regular online presence in such a dangerous digital environment could still make journalists vulnerable to anonymous, digital threats (Hognestad, 2021).…”
Section: The Use Of Infosec Tools and Practices In Journalistic Contextsmentioning
confidence: 99%
“…Technologically, it is a niche system (an amalgam of many technological solutions, see Reid & Fox, 2020), not used by most internet users, and it is often presented as technically challenging to use properly. Socially, it has a dangerous reputation: News coverage, television representations, and academic work often stress the illicit activities happening on it (e.g., Hognestad, 2021)-although the darknet has more mundane uses, as well. Politically, darknet technologies have been developed by states seeking information security, but they also are vilified by law enforcement (Ghappour, 2017).…”
Section: Introductionmentioning
confidence: 99%