{"id":2833,"date":"2016-11-11T13:53:33","date_gmt":"2016-11-11T13:53:33","guid":{"rendered":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/?p=2833"},"modified":"2024-11-26T17:49:35","modified_gmt":"2024-11-26T17:49:35","slug":"al-jazeera-news-game","status":"publish","type":"post","link":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/2016\/11\/11\/al-jazeera-news-game\/","title":{"rendered":"Al Jazeera News game"},"content":{"rendered":"<p>Interesting example of a game produced by Al Jazeera English which aims to raise questions about investigative journalism and cybersecurity:\u00a0\u00a0\u00a0<a href=\"https:\/\/syhacked.com\/\">HACKED: Syria&#8217;s Electronic Armies<\/a>, is an interactive web app that aims to take audiences inside the cyber conflict in Syria.<br \/>\nThe project #HACKED is based on <a href=\"http:\/\/www.aljazeera.com\/programmes\/peopleandpower\/2015\/06\/syria-electronic-armies-150617151503360.html\">a film with the same name<\/a> produced in 2015 by senior Al Jazeera correspondent <a href=\"https:\/\/twitter.com\/julianaruhfus?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor\">Juliana Ruhfus<\/a> for <em>People and Power<\/em>, the broadcaster&#8217;s weekly investigative documentary programme.\u00a0 The aim is for players to collect as much information as possible about the cyber war in Syria in 5 days , by finding and interviewing sources, reviewing documents and making decisions such as whether or not to pay hackers in exchange for help.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Interesting example of a game produced by Al Jazeera English which aims to raise questions about investigative journalism and cybersecurity:\u00a0\u00a0\u00a0HACKED: Syria&#8217;s Electronic Armies, is an interactive web app that aims to take audiences inside the cyber conflict in Syria. The project #HACKED is based on a film with the same name produced in 2015 by [&hellip;]<\/p>\n","protected":false},"author":89,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,12],"tags":[209,64,68],"class_list":["post-2833","post","type-post","status-publish","format-standard","hentry","category-criminology","category-media-and-communication","tag-cyber-security","tag-journalism","tag-middle-east"],"_links":{"self":[{"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/posts\/2833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/comments?post=2833"}],"version-history":[{"count":1,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/posts\/2833\/revisions"}],"predecessor-version":[{"id":2834,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/posts\/2833\/revisions\/2834"}],"wp:attachment":[{"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/media?parent=2833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/categories?post=2833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staffblogs.le.ac.uk\/socscilibrarians\/wp-json\/wp\/v2\/tags?post=2833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}