A Study on Cybersecurity News Coverage in Bangladeshi Newspapers
Abstract
At the present world, people are more connected with cyber issues, with the emergence of the cyber world, cybersecurity has also become more important in its users’ life either in personal or official cases. Media has a great role in establishing cybersecurity by providing accurate and responsible information. This paper analyzed the presentation of cybersecurity-related news items and photos in Bangladeshi newspapers. All copies published during the time frame of October to December 2019 were selected for this study and a total 59 number of news items were collected and analyzed. This paper analyzed the news items under different issues, like hacking and tracking, stealing and passing information, information leaking, security of cyberspace users, etc. This study explored the news types, photograph presentation, placement of news, and using news sources. This study followed Gatekeeping and Social Responsibility theories and found that most of the news is event-driven, news items have just been translated from foreign newspapers, especially Kaler Kantho published lots of foreign news without mentioning exact sources, and the number of investigative and awareness-raising news is very poor which also means that these newspapers played very little social responsibility role.
Keywords
Cybersecurity; Cyber Space; Internet; News Coverage; Bangladesh
References
- Amoroso, E. 2006. Cyber Security. New Jersey: Silicon Press.
- Calhoun, C. (1988). Populist politics, communications media and large scale societal integration. Sociological theory, 219-241. DOI: 10.2307/202117
- Christians, C. G., Glasser, T., McQuail, D., Nordenstreng, K., & White, R. A. (2010). Normative theories of the media: Journalism in democratic societies. University of Illinois Press.
- Chronopoulos, M., Panaousis, E., & Grossklags, J. (2017). An options approach to cybersecurity investment. IEEE Access, 6, 12175-12186. DOI:10.1109/ACCESS.2017.2773366.
- Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining Cybersecurity. Technology Innovation Management Review, p. 17. October 2014. Retrieved from https://timreview.ca/sites/default/files/Issue_PDF/TIMReview_October2014.pdf
- De Bruijn, H., & Janssen, M. (2017). Building Cybersecurity Awareness: The Need for Evidence-based Framing Strategies. Government Information Quarterly. Volume 34. Issue 1. January 2017. Pages 1-7. DOI: https://doi.org/10.1016/j.giq.2017.02.007
- Erzikova, E. (2018). Gatekeeping. The International Encyclopedia of Strategic Communication, p. 1. https://doi.org/10.1002/9781119010722.iesc0080
- Farrell, H. (2012). The consequences of the internet for politics. Annual review of political science, 15, 35-52. DOI: 030810-110815
- FE Online Report (2020, August 7). Number of internet users crosses 103 million in Bangladesh. The Financial Express. Retrieved from https://thefinancialexpress.com.bd/trade/number-of-internet-users-crosses-103-million-in-bangladesh-1596786757
- Geers, K. (2011). Strategic cyber security. NATO Cooperative Cyber Defence Centre of Excellence.
- Ghosh, I. (2019). Visualizing the Massive Cost of Cybercrime. World Economic Forum. Retrieved from: https://www.weforum.org/agenda/2019/11/cost-cybercrime-cybersecurity
- Guinchard, A. (2011). Between hype and understatement: reassessing cyber risks as a security strategy. Journal of Strategic Security, 4(2), 75-96. DOI: 26463928
- Hanitzsch, T. (2007). Deconstructing journalism culture: Toward a universal theory. Communication theory, 17(4), 367-385. https://doi.org/10.1111/j.1468-2885.2007.00303.x
- Hsieh, H. F., & Shannon, S. E. (2005). Three approaches to qualitative content analysis. Qualitative health research, 15(9), 1277-1288.
- Internet World Stats (2021). INTERNET USAGE STATISTICS. The Internet Big Picture. World Internet Users and 2021 Population Stats. Retrieved from https://www.internetworldstats.com/stats.htm
- Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973-993. DOI: https://doi.org/10.1016/j.jcss.2014.02.005
- Jardine, E. (2015). Global Cyberspace Is Safer than you Think: Real Trends in Cybercrime. Global Commission on Internet Governance. Paper Series no 16. Chatham House.
- Kamruzzaman, M. (2020). Bangladesh: Free press woes amid controversial surveillance law. Anadolu Agency.Retrieved from https://www.aa.com.tr/en/asia-pacific/bangladesh-free-press-woes-amid-controversial-surveillance-law/1827461
- Kemmerer. R. A. (2003). Cybersecurity. Proceedings of the 25th IEEE International Conference on Software Engineering. IEEE Computer Society, p. 3. DOI: http://dx.doi.org/10.1109/ICSE.2003.1201257
- Krippendorf, K. (1980). Content Analysis: An Introduction to Its Methodology. SAGE Publications.
- Kshetri, N. (2017). Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications policy, 41(10), 1027-1038. https://doi.org/10.1016/j.telpol.2017.09.003
- Lewis. J. A. (2006). Cybersecurity and Critical Infrastructure Protection. Center for Strategic and International, Washington, DC. Retrieved from http://csis.org/publication/cybersecurity-and-criticalinfrastructure- protection
- McQuail, D. (1987). Mass Communication Theory: An Introduction. SAGE Publication.
- Nabi, M. N., & Islam, M. T. (2014). CYBER SECURITY IN THE GLOBALIZED WORLD: CHALLENGES FOR BANGLADESH. Economic and Social Development. New York City.
- Neuendorf, K. A. (2017). The content analysis guidebook. Los Angeles, Sage Publications.
- Rathore, S., Sharma, P. K., Loia, V., Jeong, Y. S., & Park, J. H. (2017). Social network security: Issues, challenges, threats, and solutions. Information sciences, 421, 43-69. DOI: j.ins.2017.08.063
- Schwab, K. (2017). La cuarta revolución industrial. Penguin Random House.
- Shoemaker, P. J., & Vos, T. (2009). Gatekeeping theory, p. 1. Routledge.
- Simon, K. (2020). DIGITAL 2020: BANGLADESH. Data Reportal, Retrieved from https://datareportal.com/reports/digital-2020-bangaldesh
- Van Loon, J. (2002). Risk and Technological Culture: Towards a Sociology of Virulence (1st ed.). Routledge. https://doi.org/10.4324/9780203466384
- We are Social Hootsuite (2021). Digital 2021. Global Overview Report. Retrieved from https://wearesocial.com/blog/2021/01/digital-2021-the-latest-insights-into-the-state-of-digital