Information security for criminological ethnographers
Kindynis, T and Fleetwood, Jennifer. 2024. Information security for criminological ethnographers. Crime, Media, Culture, 20(4), pp. 405-425. ISSN 1741-6590 [Article]
|
Text
kindynis-fleetwood-2024-information-security-for-criminological-ethnographers.pdf - Published Version Available under License Creative Commons Attribution. Download (190kB) | Preview |
|
Text
CMC-22-0041.R2_Proof_hi.pdf - Accepted Version Permissions: Administrator Access Only Available under License Creative Commons Attribution Non-commercial No Derivatives. Download (263kB) |
Abstract or Description
Information security refers to ‘the practice of defending information from unauthorised access’. Information security practices include everyday activities such as protecting your bank details, or keeping your workplace logins secure. Despite increasingly restrictive approaches to research ethics, academia continues to lag behind journalism when it comes to best practice with regards to information security. This article discusses information security as it pertains to qualitative and especially ethnographic research into crime and deviance. In doing so, the article addresses a gap in the methodological literature by drawing on lessons and real-world examples from journalism, academia and activism, in order to offer guidance for researchers seeking to maintain information security in a digital, networked social world. The article proceeds in three parts. First, the article considers what information researchers might want to protect, who they might want to protect it from, and what the consequences might be if they failed to do so (an exercise known as 'threat modelling'). The different powers, resources and capacities of, and threats posed by, state actors such as the police and intelligence agencies, as well as an array of non-state actors, are considered. Second, the article outlines some general principles of information security and how they might apply to ethnographic research into crime and deviance. Third, the article discusses a range of practical considerations when it comes to using mobile phones (cell phones), social media, passwords and encryption in the course of researching crime and deviance.
Item Type: |
Article |
||||||||
Identification Number (DOI): |
|||||||||
Keywords: |
ethnography, methodology, ethics, information security, digital security, surveillance, encryption, privacy, anonymity, threat modelling |
||||||||
Departments, Centres and Research Units: |
|||||||||
Dates: |
|
||||||||
Item ID: |
32472 |
||||||||
Date Deposited: |
09 Nov 2022 10:30 |
||||||||
Last Modified: |
01 Nov 2024 13:38 |
||||||||
Peer Reviewed: |
Yes, this version has been peer-reviewed. |
||||||||
URI: |
View statistics for this item...
Edit Record (login required) |