Ir para o menu de navegação principal Ir para o conteúdo principal Ir para o rodapé

Um estudo sobre a cobertura de notícias de segurança cibernética em jornais de Bangladesh

Resumo

No mundo atual, as pessoas estão mais conectadas com questões cibernéticas, com o surgimento do mundo cibernético, a segurança cibernética também se tornou mais importante na vida de seus usuários, seja em casos pessoais ou oficiais. A mídia tem um grande papel no estabelecimento da segurança cibernética, fornecendo informações precisas e responsáveis. Este artigo analisou a apresentação de notícias e fotos relacionadas à segurança cibernética em jornais de Bangladesh. Todos os exemplares publicados no período de outubro a dezembro de 2019 foram selecionados para este estudo e um total de 59 notícias foram coletadas e analisadas. Este artigo analisou as notícias sob diferentes questões, como hacking e rastreamento, roubo e transmissão de informações, vazamento de informações, segurança dos usuários do ciberespaço, etc. Este estudo seguiu as teorias de Gatekeeping e Responsabilidade Social e descobriu que a maioria das notícias são orientadas por eventos, as notícias acabam de ser traduzidas de jornais estrangeiros, especialmente Kaler Kantho publicou muitas notícias estrangeiras sem mencionar as fontes exatas, e o número de investigações e conscientização -a divulgação de notícias é muito fraca, o que também significa que esses jornais desempenharam muito pouco papel de responsabilidade social.

Palavras-chave

Cibersegurança; ciberespaço; Internet; Cobertura de notícias; Bangladesh

PDF (Español (España)) Ver en línea (Español (España))

Referências

  1. Amoroso, E. 2006. Cyber Security. New Jersey: Silicon Press.
  2. Calhoun, C. (1988). Populist politics, communications media and large scale societal integration. Sociological theory, 219-241. DOI: 10.2307/202117
  3. Christians, C. G., Glasser, T., McQuail, D., Nordenstreng, K., & White, R. A. (2010). Normative theories of the media: Journalism in democratic societies. University of Illinois Press.
  4. Chronopoulos, M., Panaousis, E., & Grossklags, J. (2017). An options approach to cybersecurity investment. IEEE Access, 6, 12175-12186. DOI:10.1109/ACCESS.2017.2773366.
  5. Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining Cybersecurity. Technology Innovation Management Review, p. 17. October 2014. Retrieved from https://timreview.ca/sites/default/files/Issue_PDF/TIMReview_October2014.pdf
  6. De Bruijn, H., & Janssen, M. (2017). Building Cybersecurity Awareness: The Need for Evidence-based Framing Strategies. Government Information Quarterly. Volume 34. Issue 1. January 2017. Pages 1-7. DOI: https://doi.org/10.1016/j.giq.2017.02.007
  7. Erzikova, E. (2018). Gatekeeping. The International Encyclopedia of Strategic Communication, p. 1. https://doi.org/10.1002/9781119010722.iesc0080
  8. Farrell, H. (2012). The consequences of the internet for politics. Annual review of political science, 15, 35-52. DOI: 030810-110815
  9. FE Online Report (2020, August 7). Number of internet users crosses 103 million in Bangladesh. The Financial Express. Retrieved from https://thefinancialexpress.com.bd/trade/number-of-internet-users-crosses-103-million-in-bangladesh-1596786757
  10. Geers, K. (2011). Strategic cyber security. NATO Cooperative Cyber Defence Centre of Excellence.
  11. Ghosh, I. (2019). Visualizing the Massive Cost of Cybercrime. World Economic Forum. Retrieved from: https://www.weforum.org/agenda/2019/11/cost-cybercrime-cybersecurity
  12. Guinchard, A. (2011). Between hype and understatement: reassessing cyber risks as a security strategy. Journal of Strategic Security, 4(2), 75-96. DOI: 26463928
  13. Hanitzsch, T. (2007). Deconstructing journalism culture: Toward a universal theory. Communication theory, 17(4), 367-385. https://doi.org/10.1111/j.1468-2885.2007.00303.x
  14. Hsieh, H. F., & Shannon, S. E. (2005). Three approaches to qualitative content analysis. Qualitative health research, 15(9), 1277-1288.
  15. Internet World Stats (2021). INTERNET USAGE STATISTICS. The Internet Big Picture. World Internet Users and 2021 Population Stats. Retrieved from https://www.internetworldstats.com/stats.htm
  16. Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973-993. DOI: https://doi.org/10.1016/j.jcss.2014.02.005
  17. Jardine, E. (2015). Global Cyberspace Is Safer than you Think: Real Trends in Cybercrime. Global Commission on Internet Governance. Paper Series no 16. Chatham House.
  18. Kamruzzaman, M. (2020). Bangladesh: Free press woes amid controversial surveillance law. Anadolu Agency.Retrieved from https://www.aa.com.tr/en/asia-pacific/bangladesh-free-press-woes-amid-controversial-surveillance-law/1827461
  19. Kemmerer. R. A. (2003). Cybersecurity. Proceedings of the 25th IEEE International Conference on Software Engineering. IEEE Computer Society, p. 3. DOI: http://dx.doi.org/10.1109/ICSE.2003.1201257
  20. Krippendorf, K. (1980). Content Analysis: An Introduction to Its Methodology. SAGE Publications.
  21. Kshetri, N. (2017). Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications policy, 41(10), 1027-1038. https://doi.org/10.1016/j.telpol.2017.09.003
  22. Lewis. J. A. (2006). Cybersecurity and Critical Infrastructure Protection. Center for Strategic and International, Washington, DC. Retrieved from http://csis.org/publication/cybersecurity-and-criticalinfrastructure- protection
  23. McQuail, D. (1987). Mass Communication Theory: An Introduction. SAGE Publication.
  24. Nabi, M. N., & Islam, M. T. (2014). CYBER SECURITY IN THE GLOBALIZED WORLD: CHALLENGES FOR BANGLADESH. Economic and Social Development. New York City.
  25. Neuendorf, K. A. (2017). The content analysis guidebook. Los Angeles, Sage Publications.
  26. Rathore, S., Sharma, P. K., Loia, V., Jeong, Y. S., & Park, J. H. (2017). Social network security: Issues, challenges, threats, and solutions. Information sciences, 421, 43-69. DOI: j.ins.2017.08.063
  27. Schwab, K. (2017). La cuarta revolución industrial. Penguin Random House.
  28. Shoemaker, P. J., & Vos, T. (2009). Gatekeeping theory, p. 1. Routledge.
  29. Simon, K. (2020). DIGITAL 2020: BANGLADESH. Data Reportal, Retrieved from https://datareportal.com/reports/digital-2020-bangaldesh
  30. Van Loon, J. (2002). Risk and Technological Culture: Towards a Sociology of Virulence (1st ed.). Routledge. https://doi.org/10.4324/9780203466384
  31. We are Social Hootsuite (2021). Digital 2021. Global Overview Report. Retrieved from https://wearesocial.com/blog/2021/01/digital-2021-the-latest-insights-into-the-state-of-digital