StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Confidentiality and Anonymous Sources - Assignment Example

Cite this document
Summary
This assignment "Confidentiality and Anonymous Sources" will begin with the statement that every seasoned reporter/journalist has kept confidential ‘off the record’ quotes out of a story.  The trust that must be developed between reporters and the newsworthy necessitates this inaction.  …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.7% of users find it useful
Confidentiality and Anonymous Sources
Read Text Preview

Extract of sample "Confidentiality and Anonymous Sources"

Confidentiality and Anonymous Sources Every seasoned reporter/journalist has kept confidential ‘off the record’ quotes out of a story. The trust that must be developed between reporters and the newsworthy necessitates this inaction. A sportswriter, for example, does not report every dirty word a coach might bark at the team. If the coach thinks that the reporter has betrayed them, they will not be as cooperative, not goods news for the person dependent on the coach’s quotes to keep their job. Most of those persons in the news on a regular basis including mayors, fire chiefs, etc. understand that the responsible journalist must report the truth but expect some latitude when they make a gaffe that has nothing to do with the issue at hand. Many feel that the journalist crosses the line of credibility when they extend this confidentiality to the identity of the story’s source. They suggest that reporters use anonymous sources as a shortcut. It’s easier than using investigative techniques such as uncovering documented evidence and speaking to a larger number of people then solving an intricate but credible puzzle. A journalist that wants their story to be believed uses at least two named sources in a story. Using just one source that is unknown to the reader, and sometimes the reporter, for the sake of sensationalism and competition is unfortunately becoming a common practice. Others, including responsible journalists firmly believe that use of confidential or anonymous sources by journalists is essential in providing the public with vital information. This is because certain potential sources in sensitive government or business positions would not be willing to offer information without the assurance that their identity remains confidential. Many journalists view their job as a duty to inform the public regarding unscrupulous dealings by those who wield power over the public. Those that advocate free speech argue that if the media employs the use of anonymous sources conscientiously in a genuine effort to generate credible stories, the significance of the information outweighs any apprehensions regarding the origination of those sources. Both lines of reasoning are valid yet each must admit the other’s weaknesses Washington Post reporters Carl Bernstein and Bob Woodward exposed what became known as Watergate by use of an anonymous source (Deep-throat). They lived up to their journalistic responsibility by exposing unlawful conduct by government officials including President Nixon who resigned from office in 1973. This one anonymous source brought down the most powerful man in the world and catapulted Woodward and Bernstein to rock-star status (Willing, 2006). The use of anonymous sources became popular during this time because of Watergate and the publication by the New York Times of the Pentagon Papers in 1971. This story enraged the American public as it revealed that the Pentagon intentionally and repeatedly lied about events in Vietnam so as to gain support for the continuation of the war (Smith & Jones, 2006). More recently, the Abu Ghraib prison scandal was broken by the actions of an anonymous soldier. These examples showcase the benefit of using confidential sources in a story. If used responsibly and sparingly, the use of anonymous sources assists journalists in their honorable quest of being the citizen’s watchdog, a responsibility given to the press by the nation’s founding fathers. By today’s standards, the media in the 18th Century lacked credibility. Most newspapers were terribly biased and editorialized throughout stories without apology. Still, the people depended on the media to keep a check on the government. If not the press, then who would keep an eye on government officials? This assumes of course that those that wield absolute power over the people may be subject to corruption. Journalists often cite the Constitution when asked to reveal sources they wish not to expose. The Supreme Court has agreed with this position. In 1972, the Court ruled that the Constitution protects the right of a reporter to not reveal confidential sources. According to Justice William O. Douglas, “A reporter is no better than his source of information. If he can be summoned to testify in secret before a grand jury, his sources will dry up and the attempted exposure, the effort to enlighten the public, will be ended” (Paulson, 2006). While the motivations of journalists vary, newspapers and other forms of media serve to offer a peek behind the curtain of corporate and governmental activities. This service would be severely hampered if ‘whistleblowers’ had no guarantee of anonymity. Corporate officials such as those of BALCO and Enron would ultimately be less accountable to the public if not for the protection guarantee of the anonymous source (Rogers, 2005). There is a cost for freedom of the press and speech including the ability for journalists to keep confidentialities. Anonymous sources, if not used responsibly, can destroy the credibility of the journalist and the media source, a commodity neither can survive without. An example of a publication that has lost credibility due to faulty anonymous information, the French newspaper L'Est Republicain published a story, along with a large accompanying headline, proclaiming that Osama Bin Laden was dead. The source was what they later described by the newspaper as ‘a usually credible source.’ Appearing last month, the story has yet to be corroborated by any source. In a twist of irony, a French government official offered the statement, “We have no response to the question of whether bin Laden is dead or alive” on the condition his identity wasn’t revealed as he was not authorized to make a statement (“French Want Probe”, 2006). Also relying on a confidential source, Time Magazine reported that Bin Laden “has become seriously ill and may have already died from a water-borne illness” (“Rumors Swirl”, 2006). When a named, credible source, Prince Turki al-Faisal, Saudi ambassador to the United States was asked, he said, “Don’t believe everything you hear on the news. Osama Bin Laden is alive and well.” The use, or overuse of anonymous sources leads to lazy habits including erroneous reporting. It also allows unscrupulous newspapers to run a new scandal on the front page everyday and always be first to publish big stories, not necessarily accurately but first. A dedicated journalist craves credibility but risks losing it when anonymous sources are used irresponsibly. Readers view unnamed sources with skepticism, as they rightly should. How does the reader know that this ‘anonymous source’ is not a figment of the author’s imagination used because they needed more copy in the story? (Coronel, 2005). Conversations regarding the proper and ethical use of anonymous sources are ongoing and compelling but should first include an accurate description of the terminologies involved. The term anonymous source refers to a person who remains unknown to even the journalist. This could take the form of a tip given by an anonymous person whose quotes are not in the story but has helped point the way to the truth. This information must be verified by other means to be deemed credible. As stated before, it’s an issue of trust. How can the reporter trust information provided by someone that doesn’t trust the reporter with their identity? A confidential source is known to and judged credible by the reporter. Ethical journalists that misidentify anonymous with confidential source erode their credibility. Accurate terms for a confidential source include “unidentified sources, unnamed sources, or undisclosed sources” (Buttry, 2006). Whatever the term used, the story can only have as much credibility as the journalist writing it. This produces both positive and negative journalistic outcomes. It’s the price we endure to enjoy the freedom of the press. Works Cited Buttry, Steve. “You Didn’t Hear This from Me…” Ethics Resources. (2006). October 11, 2006 Coronel, Sheila. “Unnamed Sources.” Philippine Center for Investigative Journalism. (May 8, 2005). October 11, 2006 “French Want Probe into Bin Laden Leak.” CBS News. (September 23, 2006). October 11, 2006 < http://www.cbsnews.com/stories/2006/09/23/terror/main2035760.shtml> Paulson, Ken. “Use Unnamed Sources Rarely, but Protect Them.” USA Today. (July 7, 2006). October 11, 2006 Rogers, Dick. “The Use and Misuse of Unnamed Sources.” San Francisco Chronicle. (July 24, 2005). October 11, 2006 “Rumors Swirl About Bin Laden’s Health.” CBS News. (September 23, 2006). October 11, 2006 < http://www.cbsnews.com/stories/2006/09/23/terror/main2035766.shtml> Smith, Kevin & Jones, Alex. “Pentagon Papers Author Daniel Ellsberg Says 9/11 Deserves Further Investigation.” InfoWars. (July 19, 2006). October 11, 2006 Willing, Richard. “Journalists See Troubling Court Trend.” USA Today. (September 13, 2006). October 11, 2006 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Confidentiality and Anonymous Sources Assignment”, n.d.)
Confidentiality and Anonymous Sources Assignment. Retrieved from https://studentshare.org/journalism-communication/1537903-journalism-essay-confidentiality-and-anonymous-sources
(Confidentiality and Anonymous Sources Assignment)
Confidentiality and Anonymous Sources Assignment. https://studentshare.org/journalism-communication/1537903-journalism-essay-confidentiality-and-anonymous-sources.
“Confidentiality and Anonymous Sources Assignment”, n.d. https://studentshare.org/journalism-communication/1537903-journalism-essay-confidentiality-and-anonymous-sources.
  • Cited: 0 times

CHECK THESE SAMPLES OF Confidentiality and Anonymous Sources

Medical Information Confidentiality

Firstly, patients' knowledge on medical information confidentiality and their attitude towards the sharing of information among various organizations were determined using a brief questionnaire.... The study will use primary and secondary sources of data to offer a comprehensive coverage of the issue of medical information confidentiality.... The study will use primary and secondary sources of data to offer a comprehensive coverage of the issue of medical information confidentiality....
5 Pages (1250 words) Research Paper

The case of banjo jones and his blog

The Banjo Jones case was about a journalist that started an anonymous web blog in which he expressed his opinions online and by doing so eventually was fired from his job at the Houston Chronicle newspaper.... The fact that the website was anonymous was very important in this case.... Did he ever serve jail time for his alleged bridge of confidentiality?...
5 Pages (1250 words) Essay

The Importance of Privacy to the Medical Reports of a Patient

The standards for the protection of electronic health information are contained in this policy and confidentiality and Anyone who goes against these rules risk imprisonment and expulsion of their license.... In addition his hospital has also signed the business associate agreement that highly protects the patients' rights to privacy and confidentiality....
3 Pages (750 words) Case Study

Ethics Form

ssues of conflict were catered for in the selection of respondents and sources of existing data to ensure none of the respondents had any preemption that had to do with their personal interests.... (While a consent signature is standard, note that anonymous surveys can obtain implied consent by informing the participant, “To protect your privacy, no consent signature is requested.... A researcher with a dual role must use anonymous surveys or some other method that permits potential participants to opt out without fear of negative consequences....
2 Pages (500 words) Essay

The Qualitative Research Methods on Alcoholism

The samples are real stories of people who have recovered from alcoholism though their names are anonymous and their demographic details have been changed to project their identity.... imilarly, the researcher will also apply the qualitative data to understand the social phenomenon of alcoholism by engaging with the respondents within the alcohol anonymous setting where direct communication and observation is carried....
6 Pages (1500 words) Essay

Legal Issues of Telephone

n addition, sources from which the information is to be collected should be given notice: subjects whose data is being collected should be become aware of such collection.... data policy a company has to encourage confidentiality by avoiding anonymous reporting.... data policy a company has to encourage confidentiality by avoiding anonymous reporting.... also the information distributed… This protect the information from leaking to wrong hands, it ensures company data and information are encrypted to avoid leakage. Inaccurate and Inappropriate complaints should be eliminated at first stage to evade Telephone Telephone This involves the necessary precaution and procedures of European Union, which includes privacy, confidentiality, and professionalism....
1 Pages (250 words) Assignment

The Middle Ground Method of Argumentation

Additional sources will be needed so as to assist in research of the confidentiality method that can be used to make the middle ground solution a success.... This would have involved considering both the advantages and disadvantages of mandatory drug testing and settling on middle ground where no side gets it all but each side gets something (anonymous).... This would have necessitated a change of the claim from mandatory drug testing having adverse effects to there being a confidentiality mechanism for the results of drug tests (anonymous)....
1 Pages (250 words) Coursework

Internet and Our Information Privacy

The paper "Internet Security Debate Provoked by Invasive Techniques That Infringe on the Privacy Rights of Individuals" explores the privacy debate caused by intrusive techniques used by internet companies, governments, and individuals that infringe on the privacy rights of individuals.... hellip; Article 12 of the United Nations Charter defines privacy as the right of an individual to control his or her own individual information....
9 Pages (2250 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us