{"id":88618,"date":"2015-02-05T10:56:22","date_gmt":"2015-02-05T15:56:22","guid":{"rendered":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/2015\/02\/05\/adoption-of-digital-security-tools\/"},"modified":"2024-04-14T04:15:28","modified_gmt":"2024-04-14T09:15:28","slug":"adoption-of-digital-security-tools","status":"publish","type":"post","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/adoption-of-digital-security-tools\/","title":{"rendered":"Adoption of Digital Security Tools"},"content":{"rendered":"<p class=\"wp-block-paragraph\">Beyond specific questions about how IRE reporters are communicating with their sources is a broader one: What kinds of steps are survey respondents taking to protect their own data, devices, and communications \u2014 not just with sources, but with each other? The survey finds that fully half (49%) of all respondents indicate that in the past year they have changed the way they share and store sensitive documents \u201ca lot\u201d (17%) or \u201csome\u201d (32%). Three-in-ten have changed the way they communicate with colleagues.<\/p>\n\n<p class=\"wp-block-paragraph\">The survey asked about a range of practices these journalists might adopt, such as clearing their browser history, and then separately about a range of tools or software they might use to protect their digital privacy.<\/p>\n\n<figure class=\"wp-block-image alignright\"><a href=\"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/investigative-journalists-and-digital-security\/pj_2015-02-05_investigative-journalists_09\/\" rel=\"attachment wp-att-47650\"><img data-dominant-color=\"5d7a91\" data-has-transparency=\"false\" style=\"--dominant-color: #5d7a91;\" decoding=\"async\" sizes=\"(max-width: 1024px) 100vw, 1024px\" class=\"wp-image-47650 not-transparent\" src=\"https:\/\/assets.pewresearch.org\/wp-content\/uploads\/sites\/13\/2015\/02\/PJ_2015-02-05_investigative-journalists_09.png\" alt=\"Using Different Passwords for Different Online Accounts Most Common Practice to Protect Digital Privacy\" ><\/a><\/figure>\n\n<p class=\"wp-block-paragraph\">Half or more of all respondents said they engage in each of five specific practices asked about. The most commonly used technique is the simple step of using different passwords for different online accounts (91%), followed by changing privacy settings on social network sites (73%) and turning off the geolocation feature on mobile devices (67%). Most respondents who report using these approaches say they have done so for more than a year.<\/p>\n\n<figure class=\"wp-block-image alignright\"><a href=\"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/investigative-journalists-and-digital-security\/pj_2015-02-05_investigative-journalists_10\/\" rel=\"attachment wp-att-47651\"><img decoding=\"async\" class=\"wp-image-47651\" src=\"https:\/\/assets.pewresearch.org\/wp-content\/uploads\/sites\/13\/2015\/02\/PJ_2015-02-05_investigative-journalists_10.png\" alt=\"Use of Digital Security Tools Varies\" ><\/a><\/figure>\n\n<p class=\"wp-block-paragraph\">Usage of specific tools and software is less common.<\/p>\n\n<p class=\"wp-block-paragraph\">Respondents were asked about eight different tools they could employ on their home or work computers, tablets or cellphones, as well as whether they had adopted them recently. While we do not list these tools individually due to concerns expressed by those surveyed, they included everything from turning off geolocation on mobile devices to using email encryption or privacy-enhanced search engines.[2. numoffset=&#8221;2&#8243; Due to concerns expressed by some in the survey population, the Pew Research Center has agreed to refrain from publishing specific, detailed data about individual tools or software used by IRE members, and instead uses summary calculations to convey trends.]<\/p>\n\n<p class=\"wp-block-paragraph\">Half of respondents (50%) do not employ any of the eight measures on their personal or work-issued devices, while just one-in-ten (9%) employ five or more. Three-in-ten (30%) employ one or two.<\/p>","protected":false},"excerpt":{"rendered":"<p>Beyond specific questions about how IRE reporters are communicating with their sources is a broader one: What kinds of steps are survey respondents taking to protect their own data, devices, and communications \u2014 not just with sources, but with each other? The survey finds that fully half (49%) of all respondents indicate that in the [&hellip;]<\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","sub_headline":"","sub_title":"","_prc_public_revisions":[],"_ppp_expiration_hours":0,"_ppp_enabled":false,"ai_generated_summary":"","prc_watchers":[],"relatedPosts":[],"reportMaterials":[],"multiSectionReport":[],"package_parts__enabled":false,"package_parts":[],"_prc_fork_parent":0,"_prc_fork_status":"","_prc_active_fork":0,"datacite_doi":"","datacite_doi_citation":"","_prc_seo_qr_attachment_id":0,"spoken_article_player_enabled":true,"bylines":[{"key":"a81c82e6-8804-4f14-9e53-6fa3b16d41a5","termId":855},{"key":"16dfb0bf-118f-4b5b-b840-d0a047f08970","termId":987}],"acknowledgements":[],"displayBylines":true,"footnotes":""},"categories":[],"tags":[],"bylines":[987,855],"collection":[],"datasets":[],"level_of_effort":[],"primary_audience":[],"information_type":[],"_post_visibility":[],"formats":[458],"_fund_pool":[],"languages":[],"regions-countries":[],"research-teams":[527],"workflow-status":[],"class_list":["post-88618","post","type-post","status-publish","format-standard","hentry","bylines-amy-mitchell","bylines-jesse-holcomb","formats-report","research-teams-journalism"],"label":false,"post_parent":88455,"word_count":324,"canonical_url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/adoption-of-digital-security-tools\/","art_direction":{"A1":{"id":110539,"rawUrl":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2015\/02\/PJ_15.02.05_InvestigativeJournalistsDigitalSecurity_640x320-copy.png","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2015\/02\/PJ_15.02.05_InvestigativeJournalistsDigitalSecurity_640x320-copy.png?w=564&h=317&crop=1","width":564,"height":317,"chartArt":false},"A2":{"id":110539,"rawUrl":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2015\/02\/PJ_15.02.05_InvestigativeJournalistsDigitalSecurity_640x320-copy.png","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2015\/02\/PJ_15.02.05_InvestigativeJournalistsDigitalSecurity_640x320-copy.png?w=268&h=151&crop=1","width":268,"height":151,"chartArt":false},"A3":{"id":110539,"rawUrl":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2015\/02\/PJ_15.02.05_InvestigativeJournalistsDigitalSecurity_640x320-copy.png","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2015\/02\/PJ_15.02.05_InvestigativeJournalistsDigitalSecurity_640x320-copy.png?w=194&h=110&crop=1","width":194,"height":110,"chartArt":false},"A4":{"id":110539,"rawUrl":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2015\/02\/PJ_15.02.05_InvestigativeJournalistsDigitalSecurity_640x320-copy.png","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2015\/02\/PJ_15.02.05_InvestigativeJournalistsDigitalSecurity_640x320-copy.png?w=268&h=151&crop=1","width":268,"height":151,"chartArt":false},"XL":{"id":110539,"rawUrl":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2015\/02\/PJ_15.02.05_InvestigativeJournalistsDigitalSecurity_640x320-copy.png","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2015\/02\/PJ_15.02.05_InvestigativeJournalistsDigitalSecurity_640x320-copy.png?w=641&h=320&crop=1","width":641,"height":320,"chartArt":false},"social":{"id":110539,"rawUrl":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2015\/02\/PJ_15.02.05_InvestigativeJournalistsDigitalSecurity_640x320-copy.png","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2015\/02\/PJ_15.02.05_InvestigativeJournalistsDigitalSecurity_640x320-copy.png?w=641&h=320&crop=1","width":641,"height":320,"chartArt":false}},"_embeds":[],"watchers":[],"table_of_contents":[{"id":88455,"title":"Investigative Journalists and Digital Security","slug":"investigative-journalists-and-digital-security","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/investigative-journalists-and-digital-security\/","is_active":false},{"id":88602,"title":"Investigative Journalists\u2019 Perceptions About the Surveillance Climate","slug":"investigative-journalists-perceptions-about-the-surveillance-climate","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/investigative-journalists-perceptions-about-the-surveillance-climate\/","is_active":false},{"id":88609,"title":"Impact of Security Concerns on News Reporting","slug":"impact-of-security-concerns-on-news-reporting","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/impact-of-security-concerns-on-news-reporting\/","is_active":false},{"id":88618,"title":"Adoption of Digital Security Tools","slug":"adoption-of-digital-security-tools","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/adoption-of-digital-security-tools\/","is_active":true},{"id":88624,"title":"Journalist Training and Knowledge About Digital Security","slug":"journalist-training-and-knowledge-about-digital-security","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/journalist-training-and-knowledge-about-digital-security\/","is_active":false},{"id":88443,"title":"Heightened Concerns Among National Government\/Security\/Foreign Affairs Journalists","slug":"heightened-concerns-among-national-governmentsecurityforeign-affairs-journalists","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/heightened-concerns-among-national-governmentsecurityforeign-affairs-journalists\/","is_active":false},{"id":88631,"title":"Weighing Surveillance Against Other Concerns","slug":"weighing-surveillance-against-other-concerns","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/weighing-surveillance-against-other-concerns\/","is_active":false},{"id":88637,"title":"Methodology","slug":"methodology-58-2","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/methodology-58-2\/","is_active":false}],"report_materials":[{"key":"e496ee84-a471-451a-a3e0-5151b3888196","type":"report","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/8\/2015\/02\/PJ_InvestigativeJournalists_0205152.pdf","label":"","icon":"","attachmentId":""},{"key":"42387af0-7218-48d2-8bc1-17ee84c2bb15","type":"topline","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/8\/2015\/02\/IREJournalistsSurvey.pdf","label":"","icon":"","attachmentId":""},{"key":"4a4a0b21-ecbb-42a3-ad83-fae8675d2fb3","type":"promo","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/how-investigative-journalists-view-surveillance-and-digital-security\/","label":"Interactive<span aria-hidden=\"true\">:<\/span> How Investigative Journalists View Surveillance and Digital Security","icon":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/wp-content\/uploads\/sites\/8\/2015\/02\/INT_dataviz-InvestigativeReporters-copy.png?w=75&h=75&crop=1","attachmentId":"47615"}],"report_pagination":{"current_post":{"id":88618,"title":"Adoption of Digital Security Tools","slug":"adoption-of-digital-security-tools","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/adoption-of-digital-security-tools\/","is_active":true,"page_num":4},"next_post":{"id":88624,"title":"Journalist Training and Knowledge About Digital Security","slug":"journalist-training-and-knowledge-about-digital-security","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/journalist-training-and-knowledge-about-digital-security\/","is_active":false,"page_num":5},"previous_post":{"id":88609,"title":"Impact of Security Concerns on News Reporting","slug":"impact-of-security-concerns-on-news-reporting","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/impact-of-security-concerns-on-news-reporting\/","is_active":false,"page_num":3},"pagination_items":[{"id":88455,"title":"Investigative Journalists and Digital Security","slug":"investigative-journalists-and-digital-security","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/investigative-journalists-and-digital-security\/","is_active":false,"page_num":1},{"id":88602,"title":"Investigative Journalists\u2019 Perceptions About the Surveillance Climate","slug":"investigative-journalists-perceptions-about-the-surveillance-climate","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/investigative-journalists-perceptions-about-the-surveillance-climate\/","is_active":false,"page_num":2},{"id":88609,"title":"Impact of Security Concerns on News Reporting","slug":"impact-of-security-concerns-on-news-reporting","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/impact-of-security-concerns-on-news-reporting\/","is_active":false,"page_num":3},{"id":88618,"title":"Adoption of Digital Security Tools","slug":"adoption-of-digital-security-tools","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/adoption-of-digital-security-tools\/","is_active":true,"page_num":4},{"id":88624,"title":"Journalist Training and Knowledge About Digital Security","slug":"journalist-training-and-knowledge-about-digital-security","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/journalist-training-and-knowledge-about-digital-security\/","is_active":false,"page_num":5},{"id":88443,"title":"Heightened Concerns Among National Government\/Security\/Foreign Affairs Journalists","slug":"heightened-concerns-among-national-governmentsecurityforeign-affairs-journalists","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/heightened-concerns-among-national-governmentsecurityforeign-affairs-journalists\/","is_active":false,"page_num":6},{"id":88631,"title":"Weighing Surveillance Against Other Concerns","slug":"weighing-surveillance-against-other-concerns","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/weighing-surveillance-against-other-concerns\/","is_active":false,"page_num":7},{"id":88637,"title":"Methodology","slug":"methodology-58-2","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/journalism\/2015\/02\/05\/methodology-58-2\/","is_active":false,"page_num":8}]},"parent_info":{"parent_title":"Investigative Journalists and Digital Security","parent_id":88455},"materialsOrdered":[],"chaptersOrdered":[],"partsOrdered":[],"partsEnabled":false,"datacite_doi":"","prc_seo_data":{"title":"Adoption of Digital Security Tools","description":"Beyond specific questions about how IRE reporters are communicating with their sources is a broader one: What kinds of steps are survey respondents taking to protect their own data, devices,&hellip;","og_title":"Adoption of Digital Security Tools","og_description":"Beyond specific questions about how IRE reporters are communicating with their sources is a broader one: What kinds of steps are survey respondents taking to protect their own data, devices,&hellip;","schema_type":"Article","noindex":false,"canonical_url":"","primary_terms":[],"custom_schema":[],"og_image":110539,"indexnow_submitted_at":null,"gsc_index_status":null},"prepublish_checks":{"prc-image-alt-text":{"status":"incomplete","message":"2 images are missing alt text.","data":{"count":2}},"prc-about-this-research":{"status":"incomplete","message":"Add an \"About this research\" details block.","data":null},"prc-paragraph-count":{"status":"complete","message":"Found 6 paragraphs.","data":{"count":6}},"prc-internal-link":{"status":"complete","message":"Found 2 internal links.","data":{"count":2}}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"relatedPostsOrdered":[],"bylinesOrdered":[{"key":"a81c82e6-8804-4f14-9e53-6fa3b16d41a5","termId":855},{"key":"16dfb0bf-118f-4b5b-b840-d0a047f08970","termId":987}],"acknowledgementsOrdered":[],"_links":{"self":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts\/88618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/comments?post=88618"}],"version-history":[{"count":2,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts\/88618\/revisions"}],"predecessor-version":[{"id":135116,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts\/88618\/revisions\/135116"}],"wp:attachment":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/media?parent=88618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/categories?post=88618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/tags?post=88618"},{"taxonomy":"bylines","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/bylines?post=88618"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/collection?post=88618"},{"taxonomy":"datasets","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/datasets?post=88618"},{"taxonomy":"level_of_effort","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/level_of_effort?post=88618"},{"taxonomy":"primary_audience","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/primary_audience?post=88618"},{"taxonomy":"information_type","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/information_type?post=88618"},{"taxonomy":"_post_visibility","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/_post_visibility?post=88618"},{"taxonomy":"formats","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/formats?post=88618"},{"taxonomy":"_fund_pool","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/_fund_pool?post=88618"},{"taxonomy":"languages","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/languages?post=88618"},{"taxonomy":"regions-countries","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/regions-countries?post=88618"},{"taxonomy":"research-teams","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/research-teams?post=88618"},{"taxonomy":"workflow-status","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/workflow-status?post=88618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}