Um estudo sobre a cobertura de notícias de segurança cibernética em jornais de Bangladesh
![](https://ryp.cheersportwildcats.com/public/journals/1/cover_issue_36_es_ES.jpg)
Resumo
No mundo atual, as pessoas estão mais conectadas com questões cibernéticas, com o surgimento do mundo cibernético, a segurança cibernética também se tornou mais importante na vida de seus usuários, seja em casos pessoais ou oficiais. A mídia tem um grande papel no estabelecimento da segurança cibernética, fornecendo informações precisas e responsáveis. Este artigo analisou a apresentação de notícias e fotos relacionadas à segurança cibernética em jornais de Bangladesh. Todos os exemplares publicados no período de outubro a dezembro de 2019 foram selecionados para este estudo e um total de 59 notícias foram coletadas e analisadas. Este artigo analisou as notícias sob diferentes questões, como hacking e rastreamento, roubo e transmissão de informações, vazamento de informações, segurança dos usuários do ciberespaço, etc. Este estudo seguiu as teorias de Gatekeeping e Responsabilidade Social e descobriu que a maioria das notícias são orientadas por eventos, as notícias acabam de ser traduzidas de jornais estrangeiros, especialmente Kaler Kantho publicou muitas notícias estrangeiras sem mencionar as fontes exatas, e o número de investigações e conscientização -a divulgação de notícias é muito fraca, o que também significa que esses jornais desempenharam muito pouco papel de responsabilidade social.
Palavras-chave
Cibersegurança; ciberespaço; Internet; Cobertura de notícias; Bangladesh
Referências
- Amoroso, E. 2006. Cyber Security. New Jersey: Silicon Press.
- Calhoun, C. (1988). Populist politics, communications media and large scale societal integration. Sociological theory, 219-241. DOI: 10.2307/202117
- Christians, C. G., Glasser, T., McQuail, D., Nordenstreng, K., & White, R. A. (2010). Normative theories of the media: Journalism in democratic societies. University of Illinois Press.
- Chronopoulos, M., Panaousis, E., & Grossklags, J. (2017). An options approach to cybersecurity investment. IEEE Access, 6, 12175-12186. DOI:10.1109/ACCESS.2017.2773366.
- Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining Cybersecurity. Technology Innovation Management Review, p. 17. October 2014. Retrieved from https://timreview.ca/sites/default/files/Issue_PDF/TIMReview_October2014.pdf
- De Bruijn, H., & Janssen, M. (2017). Building Cybersecurity Awareness: The Need for Evidence-based Framing Strategies. Government Information Quarterly. Volume 34. Issue 1. January 2017. Pages 1-7. DOI: https://doi.org/10.1016/j.giq.2017.02.007
- Erzikova, E. (2018). Gatekeeping. The International Encyclopedia of Strategic Communication, p. 1. https://doi.org/10.1002/9781119010722.iesc0080
- Farrell, H. (2012). The consequences of the internet for politics. Annual review of political science, 15, 35-52. DOI: 030810-110815
- FE Online Report (2020, August 7). Number of internet users crosses 103 million in Bangladesh. The Financial Express. Retrieved from https://thefinancialexpress.com.bd/trade/number-of-internet-users-crosses-103-million-in-bangladesh-1596786757
- Geers, K. (2011). Strategic cyber security. NATO Cooperative Cyber Defence Centre of Excellence.
- Ghosh, I. (2019). Visualizing the Massive Cost of Cybercrime. World Economic Forum. Retrieved from: https://www.weforum.org/agenda/2019/11/cost-cybercrime-cybersecurity
- Guinchard, A. (2011). Between hype and understatement: reassessing cyber risks as a security strategy. Journal of Strategic Security, 4(2), 75-96. DOI: 26463928
- Hanitzsch, T. (2007). Deconstructing journalism culture: Toward a universal theory. Communication theory, 17(4), 367-385. https://doi.org/10.1111/j.1468-2885.2007.00303.x
- Hsieh, H. F., & Shannon, S. E. (2005). Three approaches to qualitative content analysis. Qualitative health research, 15(9), 1277-1288.
- Internet World Stats (2021). INTERNET USAGE STATISTICS. The Internet Big Picture. World Internet Users and 2021 Population Stats. Retrieved from https://www.internetworldstats.com/stats.htm
- Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973-993. DOI: https://doi.org/10.1016/j.jcss.2014.02.005
- Jardine, E. (2015). Global Cyberspace Is Safer than you Think: Real Trends in Cybercrime. Global Commission on Internet Governance. Paper Series no 16. Chatham House.
- Kamruzzaman, M. (2020). Bangladesh: Free press woes amid controversial surveillance law. Anadolu Agency.Retrieved from https://www.aa.com.tr/en/asia-pacific/bangladesh-free-press-woes-amid-controversial-surveillance-law/1827461
- Kemmerer. R. A. (2003). Cybersecurity. Proceedings of the 25th IEEE International Conference on Software Engineering. IEEE Computer Society, p. 3. DOI: http://dx.doi.org/10.1109/ICSE.2003.1201257
- Krippendorf, K. (1980). Content Analysis: An Introduction to Its Methodology. SAGE Publications.
- Kshetri, N. (2017). Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications policy, 41(10), 1027-1038. https://doi.org/10.1016/j.telpol.2017.09.003
- Lewis. J. A. (2006). Cybersecurity and Critical Infrastructure Protection. Center for Strategic and International, Washington, DC. Retrieved from http://csis.org/publication/cybersecurity-and-criticalinfrastructure- protection
- McQuail, D. (1987). Mass Communication Theory: An Introduction. SAGE Publication.
- Nabi, M. N., & Islam, M. T. (2014). CYBER SECURITY IN THE GLOBALIZED WORLD: CHALLENGES FOR BANGLADESH. Economic and Social Development. New York City.
- Neuendorf, K. A. (2017). The content analysis guidebook. Los Angeles, Sage Publications.
- Rathore, S., Sharma, P. K., Loia, V., Jeong, Y. S., & Park, J. H. (2017). Social network security: Issues, challenges, threats, and solutions. Information sciences, 421, 43-69. DOI: j.ins.2017.08.063
- Schwab, K. (2017). La cuarta revolución industrial. Penguin Random House.
- Shoemaker, P. J., & Vos, T. (2009). Gatekeeping theory, p. 1. Routledge.
- Simon, K. (2020). DIGITAL 2020: BANGLADESH. Data Reportal, Retrieved from https://datareportal.com/reports/digital-2020-bangaldesh
- Van Loon, J. (2002). Risk and Technological Culture: Towards a Sociology of Virulence (1st ed.). Routledge. https://doi.org/10.4324/9780203466384
- We are Social Hootsuite (2021). Digital 2021. Global Overview Report. Retrieved from https://wearesocial.com/blog/2021/01/digital-2021-the-latest-insights-into-the-state-of-digital