{"id":1986,"date":"2015-04-20T09:45:49","date_gmt":"2015-04-20T09:45:49","guid":{"rendered":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/?p=1986"},"modified":"2024-11-26T17:50:08","modified_gmt":"2024-11-26T17:50:08","slug":"media-in-the-age-of-cybersurveillance","status":"publish","type":"post","link":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/2015\/04\/20\/media-in-the-age-of-cybersurveillance\/","title":{"rendered":"Media in the Age of Cybersurveillance"},"content":{"rendered":"<p>What is the nature, extent and impact of Internet surveillance on journalism? \u00a0This question is considered in a new report <a href=\"http:\/\/www.cima.ned.org\/resource\/watchdogs-under-watch\/\">Watching the watchdogs<\/a> just released by CIMA (Center for International Media Assistance).\u00a0 It forms part of a wider campaign website which also has blog posts featuring case studies about individual journalists.<\/p>\n<p>It was published\u00a0 for the Global Conference on CyberSpace 2015 held at the Hague 16-17 April 2015.\u00a0 The website currently provides free access to some associated papers and videos. \u00a0Key themes internet freedom growth and security. Includes representatives from governments, industry and civil society.\u00a0 For example one topic discussed in the <a href=\"https:\/\/www.gccs2015.com\/themes\/security\">security theme<\/a> is <a href=\"https:\/\/www.gccs2015.com\/sites\/default\/files\/documents\/BestPracticeRD-20150409.pdf\">ethical hacking<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is the nature, extent and impact of Internet surveillance on journalism? \u00a0This question is considered in a new report Watching the watchdogs just released by CIMA (Center for International Media Assistance).\u00a0 It forms part of a wider campaign website which also has blog posts featuring case studies about individual journalists. It was published\u00a0 for [&hellip;]<\/p>\n","protected":false},"author":89,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,12,15],"tags":[209,61,241,126],"class_list":["post-1986","post","type-post","status-publish","format-standard","hentry","category-criminology","category-media-and-communication","category-sociology","tag-cyber-security","tag-internet","tag-media-and-communication","tag-surveillance"],"_links":{"self":[{"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/posts\/1986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/comments?post=1986"}],"version-history":[{"count":1,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/posts\/1986\/revisions"}],"predecessor-version":[{"id":1987,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/posts\/1986\/revisions\/1987"}],"wp:attachment":[{"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/media?parent=1986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/categories?post=1986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/tags?post=1986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}