How Journalists Should Approach Audience Engagement

By: Juan Manuel Casanueva | 06/30/2015

Alongside the potential for increased interaction, there are possible risks and complexities, especially when addressing the security and privacy of user information. Here are five key questions to ask when addressing citizen engagement tech projects.

1. Who will read and address people's inputs?

Receiving user input can involve operational and branding challenges. As user input increases so does the need to read, assess and reply to the sources. User engagement projects should have dedicated teams that can be responsive to input and enable channeling high-value stories and information within the newsroom. Also, everyday contact with users should follow protocols that encourage user loyalty and further interactions.

2. Should people's inputs be public or private?

Even if Internet users should be responsible for what they publish online, whenever there is a request for information from users, they become new sources and as such, they should be under adequate protection. If citizen input touches on sensitive issues, adequate technologies and processes should be put in place so that input can be private or even anonymous. For instance, sensitive information can be shared using secure services. Also, many citizen reporting tools receive private reports that are publicly published only when approved.

3. Who owns the information that is shared, stored and published?

Users can become confused about intellectual property rights when content is shared so widely. Information flow is vast, multi-source and remixable, and it is not always clear when a person or company has the right to republish or remix content. No matter if the project runs closed or open approaches on intellectual property, the most important thing is that users can clearly know what kind of ownership and attribution their input has once it reaches the news organization. Agreed terms of service should be understandable and simple in order to strengthen the user's trust.

4. How safe is the information that is managed and stored?

All citizen engagement tools manage and store information. Once the user has submitted information, the secrecy and integrity of it becomes the responsibility of the tool's manager. Depending on the degree of privacy and sensitivity of the data managed and stored, different security protocols should be set in place so that hackers and malicious software aren't able to access or disrupt the data. When dealing with very sensitive information, encryption should be considered as a default throughout the information pipeline and data sources should be made anonymous.

5. Who has control over the technology?

In technology there's always a tough decision to make when choosing to either build in-house technology or use available solutions and services. When assessing technologies and services, it is recommended to assess if the technical team (either internal or external) is fully capable of managing data, performance, security and privacy. The fact that a technology solution is fully usable is only a part of an organization’s responsibility to its users. Whoever is responsible for managing the tool should deliver on the standards agreed to by the end user on data privacy, digital security, intellectual property and ownership of gathered information.

Juan Manuel Casanueva is an ICFJ Knight International Journalism Fellow working to improve collaboration between technologists, journalists and civil society organizations in Latin America.

This post is also published on IJNet, which is produced by ICFJ.

Main image CC-licensed by Flickr via International Monetary Fund.

Latest News

Hans Staiger Award Winner Investigates Russian Soldiers Secretly Treated in Belarus Hospitals, Including Those Linked to War Crimes

Leaked data from the Russian Defense Ministry shook the story loose. A team of investigators found that during the first 21 months of the invasion of Ukraine, nearly 1,000 Russian soldiers were treated at Belarusian hospitals, including war crime suspects. These “secret patients,” as they were known, directly tied Belarus to Moscow’s war effort.

I Blew Up on TikTok with Journalism — Here's How You Can, Too

l'll never forget the day when an editor at the BBC told a 25-year-old me that journalists shouldn’t be on TikTok because “there’s so much misinformation on there.” By that point, I had maybe 10,000 followers on the platform, possibly more, and the comment stung. My TikToks, which had amplified my journalism as well as my passion for learning new languages, were well researched and I hoped the direct opposite of misinformation. 

A New Era for News: Sharon Moshavi on AI, Micro Media and More

ICFJ President Sharon Moshavi recently joined Interlochen Public Radio News Director Ed Ronco for a public conversation on the state of journalism, hosted by the International Affairs Forum at Northwestern Michigan College. The discussion, part of the forum’s ongoing series focused on global affairs and press freedom, brought together journalists, students and community members from across northern Michigan. Topics included the erosion of trust in media, the collapse of traditional business models, the growing impact of artificial intelligence and the need for innovation in how journalism is practiced and supported.