Launched just four months ago, East Grinstead Online is already generating substantial traffic, and publishes multiple stories every day. Here’s their story…
1. Who were the people behind the blog?
I have been a journalist all my working life, and many years ago was news editor of the local paid-for paper.
I moved on as Group Feature Writer for the Croydon Advertiser group and subsequently set up a freelance agency with a photographer colleague which supplied features to newspapers and magazines around the world.
I am mainly retired, although I still do the PR for East Grinstead Town Council and write regularly for the Catholic press.
This latest post in the FAQ series answers questions posed by a student in Belgium regarding ethics and data journalism.
Q: Do ethical issues in the practice of computational journalism differ from those of “traditional” journalism?
No, I don’t think they do particularly – any more than ethics in journalism differ from ethics in life in general. However, as in journalism versus life, there are areas which attract more attention because they are the places we find the most conflict between different ethical demands.
For example, the tension between public interest and an individual’s right to privacy is a general ethical issue in journalism but which has particular salience in data journalism, when you’re dealing with data which names individuals.
You could be forgiven for not having heard of John Henry Skillern. The 41 year old is facing charges of possession and promotion of child pornography after Google detected images of child abuse on his Gmail account.
Because of his case we now know that Google “proactively scours hundreds of millions of email accounts” for certain images. The technology has raised some privacy concerns which have been largely brushed aside because, well, it’s child pornography.
Sky’s technology correspondent Tom Cheshire, for example, doesn’t think it is an invasion of our privacy for “technical and moral reasons”. But should journalists be worried about the wider applications of the technology, and the precedent being set?
Not all hyperlocal sites cover everything that’s happening in the patch, some focus on specific subject areas. The latest in our series of Hyperlocal Voices sees Damian Radcliffe look at Coventry Culture. As the site celebrates its first anniversary this month, founder and editor Matthew Duffy tells him about his journey over the past 12 months.Continue reading →
My post on threat models for journalists is quite lengthy, so I thought I’d put the sample threat models from that in their own, separate post. Here they are – note that these are very simple, sketchy threat models and you would want to expand on these. But hopefully they provide a starting point.
A basic threat model for anyone with access to a key social media account – or colleagues who do.
This is an example of a threat model for anyone who deals with protestors, complainants, or others who might be targets of others
When dealing with whistleblowers, leaks, or sources in oppressive regimes, you need to protect identity and location. Here’s a sample threat model for that.
When working with documents, you may need to prevent others getting access to them. Here’s a sample threat model for that.
If you’re a journalist in the 21st century you have two choices: you can choose to be paranoid, or you can choose to be delusional.
The paranoid journalist assumes that someone is out to get them. The delusional journalist assumes that no one is.
In this post I will explain why and how every journalist – whether you’re a music reporter or a political correspondent – can take a serious and informed look at their security and arrive at a reasonable evaluation of risks and safeguards.
Don’t panic. I promise that by the end of this piece you will be less anxious about security, and no longer paranoid. I also promise to use lots of lolcats. Continue reading →