Professional Documents
Culture Documents
To cite this article: Jennifer R. Henrichsen & Martin Shelton (2022): Expanding the Analytical
Boundaries of Mob Censorship: How Technology and Infrastructure Enable Novel Threats to
Journalists and Strategies for Mitigation, Digital Journalism, DOI: 10.1080/21670811.2022.2112520
ABSTRACT KEYWORDS
Mob censorship, which “expresses the will of ordinary citizens to Information security;
exert power over journalists through discursive violence” is trad- journalists; mob censorship;
itionally considered a grassroots phenomenon. However, within online harassment;
technically mediated systems, who is behind the mob is some- technology; trauma
times unclear. We therefore ask how the technical affordances of
the Internet and telecommunications networks complicate the
identification of attackers and their motivations and multiply the
forms of retaliation that attackers level against journalists. We
conducted 18 semistructured interviews with seven current or for-
mer journalists, as well as 11 professionals with experience
defending news organizations, including security specialists, press
freedom advocates, and newsroom infrastructure support staff.
Through a constructivist grounded theory approach and in con-
versation with Lewis and Westlund’s (2015) 4A framework, we
found that journalists and those defending news organizations do
not reliably identify sources and motivations behind attacks,
which may be grassroots in nature but may also be instigated by
corporate or government actors. Journalists nonetheless infer
attribution and motivation from the context surrounding attacks.
Systemic issues related to the lack of diversity, ongoing financial
constraints, and journalistic norms of engagement, alongside a
lack of internal and platform support, exacerbate repercussions
from these attacks and harm journalism’s role in a democracy.
Introduction
Online abuse against journalists is increasing around the world, resulting in self-cen-
sorship among journalists and affecting the robustness and plurality of democratic
communication in public spheres. A variety of actors are engaged in digital abuse
against the media, from ordinary citizens who aim to intimidate and silence the press
through mob censorship (Waisbord 2020a) to state and parastate actors who use
sophisticated surveillance technologies and other methods to track, harass, and inflict
digital and physical harm against journalists (Kirchgaessner et al. 2021). These attacks
range in scope and sophistication but can encompass harassment, surveillance, hack-
ing, and physical harm (Brooks 2017; Henrichsen, Betz, and Lisosky 2015; Miller 2021;
Posetti et al. 2021; Waisbord 2020a, 2020b). They frequently intersect with misogynistic
and racist sentiments (Posetti et al. 2021) and have harmful repercussions for journal-
ists and news organizations, from censorship, intimidation, and trauma to labor precar-
ity, financial strain, and violence (Posetti et al. 2021; Stoycheff 2016).
As Waisbord (2020a) notes, three main developments have contributed to online
harassment of journalists in the United States: “easy public access to journalists, the
presence of toxic internet right-wing and far-right cultures, and populist demonization
of the mainstream press” (p. 1037). Mob censorship is an outgrowth of these three fac-
tors and has been framed as “bottom-up citizen vigilantism aimed at disciplining and
silencing journalists” (p. 1031). This definition captures a growing trend of discursive
attacks lobbed at journalists. The example of then-New York Times reporter Taylor
Lorenz is illustrative, with spikes of insults, threats, and toxicity appearing in her social
media feeds any time the mob is stoked by right-wing commentators (Brown,
Sanderson, and Silva Ortega 2022). To date, this framing of mob censorship does not
yet engage explicitly with the underlying technical systems used to organize and
enact such attacks. Some forms of mob censorship involve breaches of computers and
networks, such as distributed denial-of-service attacks on newsrooms and using mal-
ware to retaliate against reporting. Such technical attacks may overlap with discursive
mob censorship, constituting aggressive actions that exercise power over journalists
and that prevent them from doing their work. Yet, little research has examined how
mob censorship is enacted through the exploitation of computers, software, and net-
works, and mitigated or preempted through journalistic digital security practices.
To assess this gap, we use Waisbord’s (2020a) notion of mob censorship and Lewis
and Westlund (2015) 4A analytical framework of social actors (e.g., journalists, technol-
ogists, businesspeople), technological actants (e.g., email), audiences (e.g., recipients,
commodities, active participants), and activities (access/observation, selection/filtering,
processing/editing, distribution, interpretation). The 4A framework provides a way to
think through the different technological and sociocultural aspects that are associated
with journalism practice in a digital environment.
Drawing on these concepts and frameworks, we ask the following research ques-
tions: (1) How does the abuse of technical systems introduce distinct vulnerabilities
that further enable mob censorship?; (2) How do attackers’ uses of technical systems
challenge concepts of motivation and attribution?; (3) How have journalists imple-
mented digital security practices to mitigate mob censorship attempts?; and (4) What
are the responsibilities of news organizations and digital platforms in preventing and
responding to attacks?
that further enable mob censorship and how technological affordances challenge con-
cepts of attribution and motivation behind attacks on journalists. Although attribution
and motivation should be informed by contextual clues, such as the political climate
surrounding attacks against journalists, it is increasingly difficult to assume the identi-
ties of attackers who, under the cloak of relative anonymity online, may borrow other
identities. In an environment where attackers leverage bots to send targeted hate
messages on Twitter, and spam networks to overload journalists’ email servers, tech-
nically mediated attacks complicate the assumptions scholars and others may make
when describing who is attacking journalists and their motivations for doing so.
Methods
Following IRB approval, and between December 2021 and January 2022, the authors
utilized a snowball sample to conduct 18 semistructured interviews with seven current
or former journalists, as well as 11 professionals with experience defending news
organizations, including security specialists, press freedom advocates, and newsroom
infrastructure support staff. A snowball sample was used because of the sensitivity of
the topic, the need for trust, and because it facilitates inductive, theory-building analy-
ses (Miles, Huberman, and Saldan ~ a 2014). The authors did not conduct additional
interviews once theoretical saturation occurred because saturation is an indication of
validity. The authors required that participants have experience (1) being the victim of
a technically mediated attack, (2) having worked to support newsroom infrastructure
against such attacks, or (3) having worked for a technology company or organization
that has developed strategies/services to help journalists counter attacks. Nearly all
participants are U.S. nationals, and the majority of the interviewees work in the United
States, so the analysis is primarily U.S. focused. Interviews averaged 53 min in length
and were recorded and transcribed. The authors solicited participation through email,
Slack groups, LinkedIn, and private messages on Twitter. Interviewees were given the
option to be anonymized, but all chose to be identified for this article.
Through a constructivist grounded theory approach (Charmaz 2006), the authors read
through the transcripts multiple times and inductively identified interview themes fol-
lowing open, select, and theoretical coding using MaxQDA 2022 software. The authors
then collaboratively iterated to unite those themes. In constructing this analysis, the
authors relied on Lewis and Westlund (2015) framework examining actors, actants, audi-
ences, and activities in journalistic work. This framing is especially insightful for orienting
journalists’ experiences of harassment in relation to the numerous technologies that
journalists use to interface with each other and their audiences, the expansive networks
of workers and related business interests within media institutions and technology pro-
viders, and the behaviors of media organizations and mob harassers.
The authors also discovered a lack of support from newsrooms and platforms to miti-
gate or prevent such attacks and conclude with possible solutions for the amelioration
of mob censorship.
The abuse was fairly amateur in the beginning, with attackers frequently linking her
stories and her Wikipedia to their blog and mentioning her name, which had the
effect of leading search engines to rank malicious entries higher than genuine ones.
She says they were “ahead of the game” and knew how to co-opt the algorithms,
including how many times they should mention her name or what to link it to.
“Eventually, Wikipedia locked my page because it got so bad [with] all these people
messing with it.”
Social media companies are often aware of users gaming these feedback systems,
such as Facebook’s work on coordinated inauthentic behavior, but abuse persists
(Iosifidis and Nicoli, 2020; Keller et al. 2020). When Twitter introduced a content mod-
eration policy intended to prohibit people from posting images without the permis-
sion of the depicted individuals, New York Times journalist Kate Conger (December 21,
2021) recounts how it started being weaponized against groups that were reporting
on white supremacist groups because it forced the removal of posts and images that
identified white supremacists.
Another factor that can facilitate mob censorship is the ability of users to engage
in cross-platform coordination. As Ferrier (January 7, 2022) notes, sometimes these are
smear campaigns designed with coordinated activity that occurs on platforms like
8kun, 4chan, or subreddits. PEN America Program Director of Digital Safety and
Freedom of Expression, Viktorya Vilk (January 4, 2022) concurs, pointing to how coord-
ination can occur in “really dark corners of the Internet … where people say, ‘Let’s stalk
this person next’” then point the mob to resources where they can find the personal
information necessary to harass that individual. In the end, “it looks organic on Twitter
or Facebook, but it’s not, it actually started in various dark corners of the Internet.”
DIGITAL JOURNALISM 7
Social media platforms like Twitter operate as interstitial actants that serve as
bridges between journalists’ work products (i.e., stories) decided on internally within a
newsroom and the promotion of the finished products on Twitter. Journalists leverage
the affordances of Twitter to connect with sources and research story ideas, revealing
a fluid exchange of activities mediated by the platform. Simultaneously, mob harassers
leverage the technological affordances of Twitter and its interstitial nature to game
algorithms and reporting functions to carry out coordinated harassment campaigns
against journalists. Harassers thus use technological actants to disrupt journalistic
activities, punish journalists who are social actors, and shape audiences’ perspectives
on journalism.
Pundits who have written Twitter posts to harass and intimidate members of the
press may have far-right or conservative platforms, amplifying their harassment to an
audience beyond journalists’ traditional orbit (Holmes, January 12, 2022). This amplifi-
cation points to an underlying feature of the media ecosystem, namely that engage-
ment—regardless of merit or tone—is often lucrative to the business model of the
media. As Holmes notes, “as much as it’s hurtful, as much as it’s so psychologically
damaging and harmful, it’s very good for business, no matter where on the ideological
spectrum you’re coming from.” Such “cycles of amplification” (Phillips 2015) suggest
an interplay between trolls who are explicitly trying to instigate and grab media atten-
tion and the media who may unwittingly or deliberately play into it.
Assessing motivation for harassment requires looking closely at the context sur-
rounding the attack. Kate Conger describes a story about Indian women in journalism
who were targeted by scammers masquerading as Harvard University staff. After
extensive conversations with the women, the scammers extended offers for roles at
Harvard—roles that didn’t exist (Gettleman, Conger, and Raj 2021). Victims sometimes
quit their jobs, only later to learn the reality. Conger (December 21, 2021) concurs
with the difficulty in assigning attribution for such attacks and notes how attacks can
be “a weird crossover between nation-state behavior and state and culture.” The diffi-
culty in determining who is behind an attack leads some defenders to deprioritize
attribution. Tigas (December 20, 2021) says, “You’ll never get the explicit link between
A and B … I care less about that, I just care more about being able to survive
the attacks.”
To the extent mob censorship is conducted by a grassroots collective, that collect-
ive may be politically motivated by state or corporate actors. These actors can lever-
age technical actants to disguise themselves as citizen actors engaged in harassment
while they coordinate campaigns across platforms and through a sophisticated relay
with the broader media ecosystem. These conditions suggest the concept of a mob as
a “bottom-up” phenomenon is porous and requires closely examining the context sur-
rounding a particular mob attack.
important to not fixate on terrible things that you’re working on” (Lee, December
15, 2021).
Sometimes journalists choose to keep the harassment they’ve experienced to them-
selves. Security consultant and former New York Times Information Security Director
Runa Sandvik (December 17, 2021) argues that the subjectivity underscoring harass-
ment is partly what makes online risks so dangerous and effective because:
You’ve got reporters that receive a lot of hate, but don’t necessarily say anything, and, at
least to colleagues and to the general public, don’t seem affected by it, and don’t really
talk about it … It’s just become normal.
Experiences of harassment and abuse are taxing because they require constant
evaluation and, in turn, push journalists to either disengage or confront attackers.
These constant evaluations accumulate and demand coping responses, such as setting
boundaries around participation at work or on social media—a difficult task consider-
ing the journalistic norm of engagement with audiences.
about diversity, equity, and inclusion occur within newsrooms, they now include con-
versations around safety, security, and even mental health because journalists of color
and female journalists tend to be disproportionately harassed (Vilk, January 4, 2022).
Incongruent experiences of harassment between reporters and more senior staff
may leave reporters feeling isolated and frustrated. When journalist Yael Grauer
(December 13, 2021) received suspicious emails from a group of readers questioning
the veracity of her reporting about China’s regional surveillance of Uyghurs, she was
willing to point to specific documents to defend her reporting, yet she was told
by individuals at a former organization she was freelancing for, to just ignore it.
Because experiences of online attacks are deeply exhausting and increasingly visible,
Carew Grovum (January 5, 2021) questions why so many newsrooms have failed to
formulate responses: “There’s just so much visibility for the stuff that is so toxic … we
just haven’t as an industry stopped and looked these staffers in the eye and said, ‘Are
you okay?’”
Even when newsroom leadership anticipate the seriousness of technically mediated
attacks on their reporters, they may be forced to consider the potential costs of
reasonable defenses against such attacks; thereby implicating the business side of
cross-media newswork. They may also imagine these attacks to be disproportionately
expensive to address, which depends on each news organization’s individual capacity.
Holmes (January 12, 2022) notes:
people are always just thinking, “Oh, man, people are going to tell us to put everybody in
a hotel when they get retweeted.” No, part of that decision-making tree is having
resources and support systems on hand for somebody to just get through a bad day
on Twitter.
The splintered experiences of harassment among newsroom staff often leave jour-
nalists improvising defensive and psychological strategies, yet platforms also play a
role in how the abuse proliferates. For example, the incentive structures within social
media platforms sometimes promote abusive behavior because toxic content brings
more engagement while the solutions that exist around online abuse on social media
platforms cost money to build and don’t bring in profit (Vilk, January 4, 2022).
Additionally, platforms’ business models often prioritize engagement and lend support
to more high profile individuals like celebrities rather than journalists because they
attract more ad traffic and money to the platforms. Journalists are rarely superusers,
and, in Mitchell’s experience, it’s that level of following that social media platforms pri-
oritize: “The level of response you get from the company is tied to the level of
engagement around your account. Stats that you’ll never know. Stats that you cannot
see and they do not share.”
who are most vulnerable would also stand to benefit the most from such interven-
tions. That said, anti harassment interventions from platforms and policymakers are
rarely obvious and widely deployable, and need to be considered carefully for how
they may be used to inflict further abuse in the contexts where they will be utilized.
Interviewees acknowledged the need for social media platforms to take more
responsibility in combating mob censorship against journalists by building the tooling
and reporting systems necessary to stop the spread of vitriol, such as tools for parsing
account histories and acting on old content in bulk.
“I feel there should be pushback. BuzzFeed does this really well if trolls come. It’s not
the writer responding, it’s the editors swatting the trolls on their behalf.” Despite this,
blocking and reporting is sometimes not easy or possible amid massive coordinated
attacks, like those that have targeted Filipino journalist and Nobel Prize winner Maria
Ressa (International Press Institute 2020).
A constellation of policy changes and technical support systems belies a deeper
need for cultural change within news institutions and a more enduring commitment
to prioritizing colleagues’ safety and well-being. In essence, structural changes need to
occur at the individual, institutional, and societal levels because of the technologically
mediated interplay that occurs between news organizations, platforms, and publics.
Conclusion
This article addresses how actors use technological infrastructure and its inherent
properties of ambiguity to reshape the dimensions of mob censorship beyond bot-
tom-up citizen attacks to encompass a broader range of actors, who use the guise of
grassroots action to launch attacks against journalists. When abuse is filtered through
pseudonymous websites and abusers leverage attack techniques that do not provide
obvious attribution, the identities of attackers are often obscured. Journalists and
those who defend newsrooms are ill-equipped to discern the identities and motiva-
tions of their harassers, as unknown trolls and state actors disguise themselves as
grassroots mobs to retaliate against the press (Angwin 2017; Reporters Without
Borders 2018). In turn, state-aligned grassroots actors aim to discredit journalists,
inflamed by the words of political leaders and even media actors. These issues are fur-
ther amplified by ambiguities surrounding coordination, when attackers may work
together through concealed backchannels, may pile on dyadic harassment in an ad-
hoc manner, or may hurl similar attacks at journalists independently of other harassers’
actions.
The boundaries of mob censorship are also expanded because not all mob attacks
on reporters are discursive in nature, such as campaigns to overwhelm newsroom
email servers with mass spam (Angwin 2017) or denial-of-service attacks that take a
news organization’s servers offline (Tigas, December 20, 2022). Journalists may none-
theless look to the context surrounding these technical attacks and recognize when
they may be retaliatory. At other times, such attacks are not intended to harass.
Newsrooms may be simply in the crossfire of an ongoing campaign, as with financially
motivated ransomware attacks that lock up newsroom computers so they can only be
unlocked for a hefty payment (Brooks 2017). Many attacks are possible only through
the technical affordances of online platforms, such as coordinated, mass campaigns
that abuse reporting functions on social media sites to deplatform journalists’
accounts (Harwell 2021).
The 4A framework clarifies the ways in which journalism is increasingly intercon-
nected with “technological tools, processes, and ways of thinking as the new organiz-
ing logics of media work” (Lewis and Westlund 2015, 21). Mob harassers using
technological affordances complicate the well-established conceptual notions of audi-
ences as recipients (e.g., Westley and MacLean 1957), commodities (e.g., Smythe 1977),
DIGITAL JOURNALISM 15
and active participants (e.g., Singer et al. 2011) because they leverage technological
actants like Twitter to shape the intersection between actors (journalists) and journalis-
tic activities. Although active audiences may be involved in journalistic activities and
innovation (Picard and Westlund 2012, as cited in Lewis and Westlund 2015), scholars
have also shown that journalists view active participants as only reacting to journalistic
work rather than taking an active role in the creation of news (Singer et al. 2011).
While active audiences have generally been conceptualized as prosocial in their reac-
tions to journalistic work (e.g., when news media utilize a participation-centric
approach (Picard and Westlund 2012, as cited in Lewis and Westlund 2015), mob har-
assers may be active audience members with malicious agendas.
Despite this, journalists often follow the journalistic norm of engagement in which
they interact with audiences in good faith. Scholars have conceptualized this prosocial
relationship between journalists and their audiences as “reciprocal journalism” (Lewis,
Holton, and Coddington 2014) or a mutually beneficial exchange that underpins
norms and participatory practices in journalism (Coddington, Lewis, and Holton 2018)
and that seeks to explain the ways in which audiences and journalists interact (see
also Groshek and Tandoc 2017; Russell 2019).
Our findings expand the boundaries of mob censorship by showing how mob har-
assers indirectly affect some of the journalistic activities outlined by Domingo et al.
(2008) and utilized in the 4A framework. For instance, mob harassers may pollute the
typically internal process of selection/filtering if the harassment is severe and the jour-
nalist self-censors or changes beats to avoid harassment. The activity of distribution
through a technological actant like Twitter may also be impacted if individual journal-
ists decide to not promote their stories on the platform in order to mitigate harass-
ment. The activity of interpretation is also on display in the context of mob censorship
with mob harassers commenting on social media platforms following the publication
and/or promotion of a story. The other activities articulated by Domingo et al. (2008)
and utilized in the 4A framework (i.e., Access/Observation, Processing/Editing) are not
as clearly implicated in our study.
Our findings also reveal how the lack of systematic support structures within news
organizations, including among important actors in the newsroom (e.g., technologists
and business people), compound journalistic difficulties when responding to mob cen-
sorship. Power differentials within the newsroom, which are often informed by gender,
race, and role, contribute to incongruent experiences of harassment between reporters
on the front lines and more senior staff and limit the ways in which attacks
are mediated.
As the practice of digital journalism continues to expand, the role of new social
actors and technological actants are increasingly important to evaluate in the context
of mob censorship. The emergence of new social actors—from grassroots individuals
to parastate or state actors pretending to be grassroots actors—who leverage inter-
connected technological actants and technological infrastructure to attack and silence
journalists reveals the newly expansive ways that they can influence and change jour-
nalistic activities and journalistic engagement with audiences.
Alongside discursive harassment, technical forms of aggression place even steeper
demands on contemporary journalism. The kaleidoscopic properties of computing
16 J. R. HENRICHSEN AND M. SHELTON
systems enable novel forms of hostility against journalists and newsrooms, contesting
existing ideas of attribution, motivation, and the nature of attacks themselves. While
contemporary attacks may depend on overwhelming newsroom infrastructure with
unwanted data or abusing the features of social media websites to deplatform journal-
ists, future attacks will continue in relation to the affordances of newsroom and plat-
form infrastructure in unforeseen ways.
These forms of aggression have important implications for the practice of journal-
ism in a technologically mediated environment, where journalistic norms necessitate
online engagement, yet where journalists remain undersupported in responding to
attacks. Scholars have shown how female journalists have engaged in culturally gen-
dered strategies to confront intimidation, threats and violence in their work because
they do not have systematic support from their news organizations (Konow-Lund and
Høiby 2021). Similarly, scholars (Henrichsen 2021) have shown how “security
champions” fill gaps in news organizations that lack systematic solutions to hostile
environments. Sustained harassment and mob censorship have real impacts on jour-
nalists, including trauma, self-doubt, and psychological exhaustion, leading to disen-
gagement, disassociation, self-censorship (Waisbord 2002), and departure from the
profession (Ferrier 2018; Freedom House 2017). Harassment also impacts journalistic
autonomy or “the ability of individual journalists to work and act independently of fac-
tors internal and external to the newsroom” (Lo €
€fgren Nilsson and Ornebring 2016; see
also Reich and Hanitzsch 2013, 315), thereby complicating journalists’ ability to carry
out their roles in a democratic society.
The technical dimensions of attacks on journalists have implications for the further
study of mob censorship, raising thorny questions: How might researchers better
detect and attribute technically contingent attacks? What policy or technology
changes at the organizational and platform levels could minimize harms? The answers
to these questions are important to investigate amid an increasingly polluted informa-
tion ecosystem rife with mob censorship and other digital attacks against journalists
whose work remains important to democracy.
Acknowledgements
The authors would like to thank their interviewees for sharing their time and expertise.
Disclosure Statement
No potential conflict of interest was reported by the author(s).
ORCID
Jennifer R. Henrichsen http://orcid.org/0000-0003-4527-151X
Martin Shelton http://orcid.org/0000-0002-6130-5823
References
Angwin, J. 2017, November 9. “Cheap Tricks: The Low Cost of Internet Harassment.” ProPublica.
https://www.propublica.org/article/cheap-tricks-the-low-cost-of-internet-harassment
DIGITAL JOURNALISM 17
Brooks, J. 2017, November 21. “At KQED, Lessons from a Crippling Ransomware Attack.”
Columbia Journalism Review. https://www.cjr.org/analysis/kqed-npr-lessons-ransomware-attack.
php
Brown, M., Z. Sanderson, and M. A. Silva Ortega. 2022, January 26. “Gender-Based Online
Violence Spikes after Prominent Media Attacks.” Tech Stream. Brookings. https://www.brook-
ings.edu/techstream/gender-based-online-violence-spikes-after-prominent-media-attacks/
Charmaz, K. 2006. Constructing Grounded Theory: A Practical Guide through Qualitative Analysis.
London: Sage Publications.
Chen, G. M., P. Pain, V. Y. Chen, M. Mekelburg, N. Springer, and F. Troger. 2020. “‘You Really
Have to Have a Thick Skin’: A Cross-Cultural Perspective on How Online Harassment
Influences Female Journalists.” Journalism 21 (7): 877–895.
Coddington, M., S. C. Lewis, and A. E. Holton. 2018. “Measuring and Evaluating Reciprocal
Journalism as a Concept.” Journalism Practice 12 (8): 1039–1050.
Crete-Nishihata, M., J. Oliver, C. Parsons, D. Walker, L. Tsui, and R. Deibert. 2020. “The
Information Security Cultures of Journalism.” Digital Journalism 8 (8): 1068–1091.
Domingo, D., T. Quandt, A. Heinonen, S. Paulussen, J. B. Singer, and M. Vujnovic. 2008.
“Participatory Journalism Practices in the Media and beyond: An International Comparative
Study of Initiatives in Online Newspapers.” Journalism Practice 2 (3): 326–342.
Eddy, K., and R. K. Nielsen. 2022, March 21. “Race and Leadership in the News Media 2022:
Evidence from Five Markets.” Reuters Institute. https://reutersinstitute.politics.ox.ac.uk/race-
and-leadership-news-media-2022-evidence-five-markets
Ferrier, M. 2018. “Attacks and Harassment: The Impact on Female Journalists and Their
Reporting.” International Women’s Media Foundation and TrollBusters. https://www.iwmf.org/
wp-content/uploads/2018/09/Attacks-and-Harassment.pdf
Freedom House. 2017. “Chasing Stories, Women Journalists Are Pursued by Trolls.” Freedom
House. https://freedomhouse.org/article/chasing-stories-women-journalists-are-pursued-trolls
Gettleman, J., K. Conger, and S. Raj. 2021, December 16. “The Harvard Job Offer No One at
Harvard Ever Heard of.” The New York Times. https://www.nytimes.com/2021/12/16/technol-
ogy/harvard-job-scam-india.html
Groshek, J., and E. Tandoc. 2017. “The Affordance Effect: Gatekeeping and (Non)Reciprocal
Journalism on Twitter.” Computers in Human Behavior 66 (1): 201–2010.
Harwell, D. 2021, December 3. “Twitter Says It Suspended Accounts in Error Following Flood of
‘Coordinated and Malicious’ Reports.” The Washington Post. https://www.washingtonpost.com/
technology/2021/12/03/twitter-admits-error-in-account-suspensions/
Henrichsen, J. R. 2020. “The Rise of the Security Champion: Beta-Testing Newsroom Security
Cultures.” Tow Center for Digital Journalism at Columbia University. https://www.cjr.org/tow_
center_reports/security-cultures-champions.php
Henrichsen, J. R. 2021. “Understanding Nascent Newsroom Security and Safety Cultures: The
Emergence of the “Security Champion.” Journalism Practice, 1–20.
Henrichsen, J. R., M. Betz, and J. M. Lisosky. 2015. Building Digital Safety for Journalism: A Survey
of Selected Issues. Paris, France: UNESCO Publishing. http://unesdoc.unesco.org/images/0023/
002323/232358e.pdf.
International Press Institute. 2020, September 17. “Maria Ressa: Social Media Being Weaponized
to Discredit Journalists Online.” International Press Institute. https://ipi.media/maria-ressa-
social-media-being-weaponized-to-discredit-journalists-online/
Iosifidis, P., and N. Nicoli. 2020. “The Battle to End Fake News: A Qualitative Content Analysis of
Facebook Announcements on How It Combats Disinformation.” International Communication
Gazette 82 (1): 60–81.
Keller, T. R., T. Graham, D. Angus, A. Bruns, N. Marchal, L.-M. Neudert, R. Nijmeijer, et al. 2020.
“Coordinated Inauthentic Behaviour’ and Other Online Influence Operations in Social Media
Spaces.” Panel presented at AoIR 2020: The 21st Annual Conference of the Association of
Internet Researchers. Virtual Event: AoIR. October 28–31. Retrieved from http://spir.aoir.org
Kirchgaessner, S., P. Lewis, D. Pegg, S. Cutler, N. Lakhani, and M. Safi. 2021, July 18. “Revealed:
Leak Uncovers Global Abuse of Cyber-Surveillance Weapon.” The Guardian. https://www.
18 J. R. HENRICHSEN AND M. SHELTON
theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-
weapon-nso-group-pegasus
Konow-Lund, M, and M. Høiby. 2021. “Female Investigative Journalists: Overcoming Threats,
Intimidation, and Violence with Gendered Strategies.” Journalism Practice, 1–16. https://doi.
org/10.1080/17512786.2021.2008810.
Kovic, M., A. Rauchfleisch, M. Sele, and C. Caspar. 2018. “Digital Astroturfing in Politics:
Definition, Typology, and Countermeasures.” Studies in Communication Sciences 18 (1): 69–85.
Lewis, S. C., A. E. Holton, and M. Coddington. 2014. “Reciprocal Journalism: A Concept of Mutual
Exchange between Journalists and Audiences.” Journalism Practice 8 (2): 229–241.
Lewis, S. C., and O. Westlund. 2015. “Actors, Actants, Audiences, and Activities in Cross-Media
News Work.” Digital Journalism 3 (1): 19–37.
Lo €
€fgren Nilsson, M., and H. Ornebring. 2016. “Journalism under Threat: Intimidation and
Harassment of Swedish Journalists.” Journalism Practice 10 (7): 880–890.
Marvin, R. 2019, January 29. “How Google’s Jigsaw Is Trying to Detoxify the Internet.” PC
Magazine. https://www.pcmag.com/news/how-googles-jigsaw-is-trying-to-detoxify-the-internet
McGregor, S. E. 2021. Information Security Essentials: A Guide for Reporters, Editors, and Newsroom
Leaders. New York: Columbia University Press.
McGregor, S., P. Charters, T. Holliday, and F. Roesner. 2015. “Investigating the Computer Security
Practices and Needs of Journalists.” In Proceedings of the 24th USENIX Security Symposium,
Washington, DC.
McGregor, S., and E. Watkins. 2016. “‘Security by Obscurity’: Journalists’ Mental Models of
Information Security.” International Symposium on Online Journalism 6 (1): 33–49. https://iso-
jjournal.wordpress.com/2016/04/14/security-by-obscurity-journalists-mental-models-of-informa-
tion-security/
Miles, M., A. M. Huberman, and J. Saldan ~a. 2014. Qualitative Data Analysis: A Methods
Sourcebook. Thousand Oaks: Sage Publications.
Miller, K. C. 2020. “Harassing the Fourth Estate: The Prevalence and Effects of Outsider-Initiated
Harassment towards Journalists.” PhD diss., University of Oregon.
Miller, K. C. 2021. “Hostility toward the Press: A Synthesis of Terms, Research, and Future
Directions in Examining Harassment of Journalists.” Digital Journalism, 1–20.
Nelson, J. 2021. “A Twitter Tightrope without a Net: Journalists’ Reactions to Newsroom Social
Media Policies.” Columbia Journalism Review. https://www.cjr.org/tow_center_reports/news-
room-social-media-policies.php
Petersen, A. H. 2018. “The Cost of Reporting While Female.” Columbia Journalism Review. https://
www.cjr.org/special_report/reporting-female-harassment-journalism.phpS
Phillips, W. 2015. This Is Why We Can’t Have Nice Things: Mapping the Relationship between
Online Trolling and Mainstream Culture. Cambridge, MA: The MIT Press.
Picard, R. G., and O. Westlund. 2012. “The Dynamic Innovation Learning Model: A
Conceptualization of Media Innovation.” Paper presented at the 10th World Media Economics
and Management Conference, Thessaloniki, Greece, May 23–27.
Posetti, J., N. Shabbir, D. Maynard, K. Bontcheva, and N. Aboulez. 2021. “The Chilling: Global
Trends in Online Violence Against Women Journalists.” UNESCO. https://en.unesco.org/publi-
cations/thechilling
Reich, Z., and T. Hanitzsch. 2013. “Determinants of Journalists’ Professional Autonomy: Individual
and National Level Factors Matter More than Organizational Ones.” Mass Communication and
Society 16 (1): 133–156.
Reporters Without Borders. 2018. “Online Harassment of Journalists: Attack of the Trolls.”
Reporters Without Borders. https://rsf.org/sites/default/files/rsf_report_on_online_harassment.
pdf
Reuters Institute. 2021, March 30. “Do You Want to Fix the News Media Race Problem? Put
Fewer White Men at the Top.” Reuters Institute. https://reutersinstitute.politics.ox.ac.uk/news/
do-you-want-fix-news-media-race-problem-put-fewer-white-men-top
Russell, F. M. 2019. “Twitter and News Gatekeeping: Interactivity, Reciprocity, and Promotion in
News Organizations’ Tweets.” Digital Journalism 7 (1): 80–99.
DIGITAL JOURNALISM 19
Appendix. Interviewees