A. T. Garbett, R. Comber, P. Egglestone, M. Glancy, and P. Olivier, “Finding real people: trust and diversity in the interface between professional and citizen journalists,” in 32nd Annual ACM Conference on Human Factors in Computing Systems. ACM, 2014, pp. 3015-3024.
 U.S. Supreme Court, “Risen v. United States,” SCOTUSblog, Retrieved: June 5, 2014.
 A. E. Marimow, “Justice Department’s scrutiny of Fox News reporter James Rosen in leak case draws fire,” The Washington Post, May 2013. [Online]. Available: http://www.washingtonpost.com/local/justicedepartments-scrutiny-of-fox-news-reporter-james-rosenin-leak-case-draws-fire/2013/05/20/c6289eba-c162-11e2-8bd8-2788030e6b44_story.html
 N. Perlroth, “Hackers in China Attacked The Times for Last 4 Months,” The New York Times, January 2013. [Online]. Available: http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-timescomputers.html?pagewanted=2&_r=0
 N. Perloth, “Washington Post Joins List of News Media Hacked by the Chinese,” The New York Times, February 2013. [Online]. Available: http://www.nytimes.com/2013/02/02/technology/washington-posts-joins-list-ofmedia-hacked-by-the-chinese.html?_r=0
 -, “Wall Street Journal Announces That It, Too, Was Hacked by the Chinese,” The New York Times, January 2013. [Online]. Available: http://www.nytimes.com/2013/02/01/technology/wall-street-journal-reports-attackby-china-hackers.html?ref=technology
 Human Rights Watch, “With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law, and American Democracy,” Jul. 2014, http://www.hrw.org/node/127364.
 K. A. Ruane, “Journalists’ Privilege: Overview of the Law and Legislation in Recent Congresses,” 2011. [Online]. Available: http://www.fas.org/sgp/crs/secrecy/RL34193.pdf
 S. Hardy, M. Crete-Nishihata, K. Kleemola, A. Senft, B. Sonne, G. Wiseman, P. Gill, and R. J. Deibert, “Targeted threat index: Characterizing and quantifying politicallymotivated targeted malware,” in Proceedings of the 23rd USENIX Security Symposium, 2014.
 W. R. Marczak, J. Scott-Railton, M. Marquis-Boire, and V. Paxson, “When governments hack opponents: A look at actors and technology,” in 23rd USENIX Security Symposium, 2014.
 S. E. McGregor, P. Charters, T. Holliday, and F. Roesner, “Investigating the computer security practices and needs of journalists,” in 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, 2015.
 G. Greenwald, No Place To Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books, 2014.
 C. Savage and L. Kaufman, “Phone Records of Journalists Seized by U.S.” The New York Times, May 2013. [Online]. Available: http://www.nytimes.com/2013/05/14/us/phonerecords-of-journalists-of-the-associated-press-seized-byus.html
 S. Huntley and M. Marquis-Boire, “Tomorrow’s News is Today’s Intel: Journalists as Targets and Compromise Vectors,” BlackHat Asia, Mar. 2014, https://www.blackhat.com/docs/asia-14/materials/Huntley/BH_Asia_2014_Boire_Huntley.pdf.
 Freedom of the Press Foundation, “SecureDrop (formerly known as DeadDrop, originally developed by Aaron Swartz),” 2013. [Online]. Available: https://pressfreedomfoundation.org/securedrop
 K. Biscuitwala, W. Bult, T. J. P. Mathias Lecuyer, M. K. B. Ross, A. Chaintreau, C. Haseman, M. S. Lam, and S. E. Mc- Gregor, “Secure, Resilient Mobile Reporting,” in Proceedings of ACM SIGCOMM, 2013. [Web of Science]
 S. Carlo and A. Kamphuis, “Information Security for Journalists,” The Centre for Investigative Journalism, Jul. 2014. [Online]. Available: http://www.tcij.org/resources/handbooks/infosec
 S. E. McGregor, “Digital Security and Source Protection for Journalists,” Tow Center for Digital Journalism, Jul. 2014. [Online]. Available: http://towcenter.org/blog/digitalsecurity-and-source-protection-for-journalists/
 M. Keys, “Google experts reveal how top organizations are in danger,” The Blot, 2014, https://www.theblot.com/googleexperts-reveal-top-organizations-danger-7717511.
 A. Soltani, “12 of the top 25 news sites (incl. @washingtonpost) rely on Microsoft or Google for hosted email services,” Twitter, 2014, https://twitter.com/ashk4n/status/448105177439285248.
 P. Thornton, “Outlook/Exchange vs. GMAIL,” The Journalism Iconoclast, May 2008. [Online]. Available: http://patthorntonfiles.com/blog/2008/05/26/outlookexchangevs-gmail/
 N. Borisov, I. Goldberg, and E. Brewer, “Off-the-record communication, or, why not to use PGP,” in ACM Workshop on Privacy in the Electronic Society, 2004.
 P. R. Zimmermann, The Official PGP User’s Guide. Cambridge, MA, USA: MIT Press, 1995.
 R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The second-generation onion router,” in Proceedings of the 13th USENIX Security Symposium, 2004.
 N. Unger, S. Dechand, J. Bonneau, S. Fahl, H. Perl, I. Goldberg, and M. Smith, “SoK: Secure Messaging,” in Proceedings of the IEEE Symposium on Security and Privacy, 2015.
 M. Brennan, K. Metzroth, and R. Stafford, “Building Effective Internet Freedom Tools: Needfinding with the Tibetan Exile Community,” in 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014.
 Internews Center for Innovation & Learning, “Digital Security and Journalists: A SnapShot of Awareness and Practices in Pakistan,” 2012, https://www.fes.de/themen/menschenrechtspreis/pdf/mrp2012/Internews.pdf.
 J. L. Sierra, “Digital and Mobile Security for Mexican Journalists and Bloggers,” Freedom House, 2013. [Online]. Available: http://www.freedomhouse.org/report/specialreports/digital-and-mobile-security-mexican-journalists-andbloggers
 S. Gaw, E. W. Felten, and P. Fernandez-Kelly, “Secrecy, flagging, and paranoia: adoption criteria in encrypted email,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2006, pp. 591-600.
 G. Norcie, J. Blythe, K. Caine, and L. J. Camp, “Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems,” in Workshop on Usable Security (USEC), 2014.
 A. Whitten and J. D. Tygar, “Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0,” in Proceedings of the 8th USENIX Security Symposium, 1999.
 N. Diakopoulos, M. De Choudhury, and M. Naaman, “Finding and assessing social media information sources in the context of journalism,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2012, pp. 2451-2460.
 N. Taylor, D. M. Frohlich, P. Egglestone, J. Marshall, J. Rogers, A. Blum-Ross, J. Mills, M. Shorter, and P. Olivier, “Utilising insight journalism for community technology design,” in Proceedings of the 32nd ACM Conference on Human Factors in Computing Systems. ACM, 2014, pp. 2995-3004.
 A. Adams and M. A. Sasse, “Users are not the enemy,” Communications of the ACM, vol. 42, no. 12, pp. 40-46, 1999.
 Y.-Y. Choong and M. Theofanos, What 4,500+ People Can Tell You - Employees’ Attitudes Toward Organizational Password Policy Do Matter, ser. Lecture Notes in Computer Science. Springer International Publishing, 2015, vol. 9190, ch. 27, pp. 299-310.
 K. Renaud, M. Volkamer, and A. Renkema-Padmos, “Why Doesn’t Jane Protect Her Privacy?” in Proceedings of the 2014 Privacy Enhancing Technology Symposium, 2014.
 J. Corbin and A. Strauss, Basics of qualitative research: Techniques and procedures for developing grounded theory. Sage publications, 2014.
 V. Venkatesh and H. Bala, “Technology Acceptance Model 3 and a Research Agenda on Interventions,” Decision Sciences, vol. 39, no. 2, pp. 273-315, 2008.
 A. Greenberg, “How the Syrian electronic army hacked us: A detailed timeline,” Forbes, February 2014. [Online]. Available: http://www.forbes.com/sites/andygreenberg/2014/02/20/how-the-syrian-electronic-army-hacked-us-adetailed-timeline/
 Symantec, “Internet security threat report 2014,” 2014. [Online]. Available: http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf
 D. D. Caputo, S. L. Pfleeger, J. D. Freeman, and M. E. Johnson, “Going spear phishing: Exploring embedded training and awareness,” Security & Privacy, IEEE, vol. 12, no. 1, pp. 28-38, 2014.
 A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang, “The tangled web of password reuse,” in Symposium on Network and Distributed System Security (NDSS), 2014.
 K. E. Caine, “Supporting privacy by preventing misclosure,” in CHI’09 Extended Abstracts on Human Factors in Computing Systems. ACM, 2009, pp. 3145-3148.
 P. Kumaraguru, S. Sheng, A. Acquisti, L. F. Cranor, and J. Hong, “Teaching Johnny Not to Fall for Phish,” ACM Transactions on Internet Technology, vol. 10, no. 2, pp. 7:1-7:31, Jun. 2010.
 PhishMe, http://phishme.com/. [Web of Science]
 K. Niknejad, A. Kaphle, A. A. Omran, B. Baykurt, and J. Graham, “The New Global Journalism: Foreign Correspondence in Transition,” Tow Center for Digital Journalism, Sep. 2014. [Online]. Available: http://towcenter.org/wp-content/uploads/2014/09/The-New-Global-Journalism-1.pdf
About the article
Published Online: 2016-07-14
Published in Print: 2016-10-01
© 2016. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. (CC BY-NC-ND 4.0)