Information security for criminological ethnographers

Kindynis, Theo and Fleetwood, Jennifer. 2024. Information security for criminological ethnographers. Crime, Media, Culture, ISSN 1741-6590 [Article] (In Press)

[img]
Preview
Text
kindynis-fleetwood-2024-information-security-for-criminological-ethnographers.pdf - Published Version
Available under License Creative Commons Attribution.

Download (190kB) | Preview
[img] Text
CMC-22-0041.R2_Proof_hi.pdf - Accepted Version
Permissions: Administrator Access Only
Available under License Creative Commons Attribution Non-commercial No Derivatives.

Download (263kB)

Abstract or Description

Information security refers to ‘the practice of defending information from unauthorised access’. Information security practices include everyday activities such as protecting your bank details, or keeping your workplace logins secure. Despite increasingly restrictive approaches to research ethics, academia continues to lag behind journalism when it comes to best practice with regards to information security. This article discusses information security as it pertains to qualitative and especially ethnographic research into crime and deviance. In doing so, the article addresses a gap in the methodological literature by drawing on lessons and real-world examples from journalism, academia and activism, in order to offer guidance for researchers seeking to maintain information security in a digital, networked social world. The article proceeds in three parts. First, the article considers what information researchers might want to protect, who they might want to protect it from, and what the consequences might be if they failed to do so (an exercise known as 'threat modelling'). The different powers, resources and capacities of, and threats posed by, state actors such as the police and intelligence agencies, as well as an array of non-state actors, are considered. Second, the article outlines some general principles of information security and how they might apply to ethnographic research into crime and deviance. Third, the article discusses a range of practical considerations when it comes to using mobile phones (cell phones), social media, passwords and encryption in the course of researching crime and deviance.

Item Type:

Article

Identification Number (DOI):

https://doi.org/10.1177/17416590231219746

Keywords:

ethnography, methodology, ethics, information security, digital security, surveillance, encryption, privacy, anonymity, threat modelling

Departments, Centres and Research Units:

Sociology

Dates:

DateEvent
4 November 2022Accepted
12 January 2024Published Online

Item ID:

32472

Date Deposited:

09 Nov 2022 10:30

Last Modified:

23 Jan 2024 10:38

Peer Reviewed:

Yes, this version has been peer-reviewed.

URI:

https://research.gold.ac.uk/id/eprint/32472

View statistics for this item...

Edit Record Edit Record (login required)