{"title":"Embodiment, Endorsement, and Policy: Considerations for Intellectual Freedom in the Library","authors":"Emily J. M. Knox","doi":"10.7560/ic59201","DOIUrl":"https://doi.org/10.7560/ic59201","url":null,"abstract":"ABSTRACT:This article provides some considerations for understanding policies in libraries and how they intersect with intellectual freedom and social justice using Pierre Bourdieu’s theory of social fields and scale. The article includes a case study on the development of ALA’s meeting room guidelines and considerations for developing institutional policies.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"2014 21","pages":"109 - 124"},"PeriodicalIF":0.6,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141706990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Does Short Video Viewing Influence Young Children’s Everyday Language Practices? A Case Study of China","authors":"Y. Yang, Tianru Guan","doi":"10.7560/ic59204","DOIUrl":"https://doi.org/10.7560/ic59204","url":null,"abstract":"ABSTRACT:This study offers the first examination of the most widely downloaded short video app, TikTok, in its launching country, China, and the app’s impacts on young children’s language development. The analysis of quantitative data (N = 216) and qualitative data demonstrates significantly positive correlations between time spent watching TikTok and young children’s use of Standard Chinese in verbal communication. This suggests an earlier occurrence of Standard Chinese fluency in young children in dialect-speaking areas of China. The research findings of this study contribute to our understanding of the newly emerging and increasingly popular form of screen media—short-form video clips—and its impacts on young children’s language practices.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"89 11","pages":"182 - 202"},"PeriodicalIF":0.6,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141697319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamics of Gender Bias within Computer Science","authors":"Thomas J. Misa","doi":"10.7560/IC59203","DOIUrl":"https://doi.org/10.7560/IC59203","url":null,"abstract":"ABSTRACT:A new dataset (N = 7,456) analyzes women’s research authorship in the Association for Computing Machinery’s founding thirteen special interest groups (SIGs), a proxy for computer science. ACM SIGs expanded between 1970 and 2000; each experienced increasing women’s authorship. But diversity abounds. Several SIGs had less than 10 percent women authors, while university computing centers (SIGUCCS) exceeded 40 percent. Three SIGs experienced accelerating growth in women’s authorship; most, including a composite ACM, had decelerating growth. This research may encourage reform efforts, often focusing on general education or workforce factors (across “computer science”), to examine understudied dynamics within computer science that shaped changes in women’s participation.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"30 120","pages":"161 - 181"},"PeriodicalIF":0.6,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141696559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Literary versus Nonliterary People: Rhetorical Strategies of Derogation in the Sensitivity Reading Debate","authors":"E. E. Lawrence","doi":"10.7560/ic59202","DOIUrl":"https://doi.org/10.7560/ic59202","url":null,"abstract":"ABSTRACT:Sensitivity reading (SR)—the expert, ameliorative assessment of literary texts for superficial, inaccurate, or degradative depictions of oppressed groups—is a hotly contested service in the book industry, one that some hold is censorious. This article explicates how these detractors’ critiques function as informal suppression, drawing inspiration from Joanna Russ to expose key rhetorical strategies that reinforce a pernicious distinction between “literary” insidersand “nonliterary” out siders. The construction and propagation of this distinction ultimately encodes minoritized editors as “sensitive readers” who constitute a threat to the literary enterprise itself, thereby rationalizing their continued marginalization on aesthetic grounds.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"22 1","pages":"125 - 160"},"PeriodicalIF":0.6,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141690173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Turtles, Tablets, and Boxes: Computer Technology and Education in the 1970s","authors":"Elizabeth Petrick","doi":"10.7560/ic58303","DOIUrl":"https://doi.org/10.7560/ic58303","url":null,"abstract":"ABSTRACT:One of the most powerful ideas behind the potential of computer technology is that it could revolutionize education. To understand this idea historically, this article brings together computer science researchers with theories of education and childhood development. These researchers—Seymour Papert at MIT and Alan Kay and Adele Goldberg at Xerox’s Palo Alto Research Center—drew on a group of midtwentiethcentury education theorists. These cases offer a window into how computer researchers have read and interpreted scientific theories about education and childhood development that then make their way into computer technology or fail to do so entirely.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"34 1","pages":"274 - 294"},"PeriodicalIF":0.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Examining Sensitive Personal Information Protection in China: Framework, Obstacles, and Solutions","authors":"Qian Li, Tao Jiang, Xijian Fan","doi":"10.7560/ic58302","DOIUrl":"https://doi.org/10.7560/ic58302","url":null,"abstract":"ABSTRACT:In 2021 China passed the Personal Information Protection Law. One of the most important features of the law is its regulation of sensitive personal information processing. This article examines how Chinese legal frameworks treat sensitive personal information and analyzes how the Personal Information Protection Law protects sensitive personal information by creating general rules for personal information processing and specific rules for sensitive information. This article also analyzes three obstacles to sensitive personal information protection: context sensitivity, the influence of widespread use of digital technologies, and the balance among various interests. In response, this article proposes three solutions: (1) a contextual strategy for risk governance, including contextual risk analysis and resilience; (2) algorithm compliance, including the algorithmic impact assessment and algorithmic supervision; and (3) a two-step test for balancing various interests.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"20 1","pages":"247 - 273"},"PeriodicalIF":0.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139300972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"(New) Media and the Circulation of Knowledge: A Historical Framework for The Conversation Canada","authors":"Gene Allen, Nathan Lucky","doi":"10.7560/ic58301","DOIUrl":"https://doi.org/10.7560/ic58301","url":null,"abstract":"ABSTRACT:New media and new applications of existing media are typically seen as ways of distributing knowledge more effectively, often with hopes that this process will strengthen democracy. Adopting a history-of-knowledge approach, the authors analyze methods of knowledge circulation attending early print, nineteenth-century mechanics’ institutes and public libraries, early radio broadcasting, and explanatory journalism, providing a comparative historical framework for a recent new-media platform for distributing knowledge, The Conversation network. Appealing to a socially broad audience has consistently been a challenge. Efforts to distribute knowledge also reflected differences in prevailing media ecosystems, national systems of political economy, and contemporary social/political concerns.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"5 1","pages":"221 - 246"},"PeriodicalIF":0.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139297237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Legitimate Language: James E. Shepard’s Use of Mitigation Strategies to Advance Black Education","authors":"Latesha Velez","doi":"10.7560/ic58304","DOIUrl":"https://doi.org/10.7560/ic58304","url":null,"abstract":"ABSTRACT:This research offers a critical context-sensitive discourse-historical analysis of a speech by James E. Shepard, the Black president and founder of North Carolina Central University. Shepard’s speech negotiated his identity as an educated Black man in the Jim Crow South by using perspectivation to switch between the point of view of an African American and that of a North Carolinian, thus establishing a bond with white members of his audience based on locational loyalty. A better understanding of how language is used by oppressed populations contributes to LIS scholars’ understandings of the usage of information in society.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"25 1","pages":"295 - 311"},"PeriodicalIF":0.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139304620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Information Theory of Translation","authors":"Qiang Pi","doi":"10.7560/ic58203","DOIUrl":"https://doi.org/10.7560/ic58203","url":null,"abstract":"abstract:New ideas and theories continue to emerge in the fast-changing field of translation studies. This article attempts to conceptualize translation beyond the linguistic confinement. It begins by reviewing the mainstream translation conceptualizations. It adopts information as the fundamental concept underlying translation and reveals concepts like source and target text, meaning transfer, and language to be more of special cases of the information-based concept of translation; translation is, as a result, expanded to include not only human actions of creation and behaviors, but also actions of other life forms, inanimate or artificial substances that are capable of meaning-making. The article thus proposes the information theory of translation (ITT). It defines translation as a meaning-making process of an agent within its specific informational boundary and time limit to achieve goals. Finally, key problems in translation studies are discussed.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"58 1","pages":"166 - 179"},"PeriodicalIF":0.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45231452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Taxonomizing Information Practices in a Large Conspiracy Movement: Using Early QAnon as a Case Study","authors":"J. Hodges","doi":"10.7560/ic58201","DOIUrl":"https://doi.org/10.7560/ic58201","url":null,"abstract":"abstract:This article presents a taxonomy of the information practices apparent in an imageboard discussion thread that was influential in jump-starting the worldwide QAnon movement. After introducing QAnon with a review of literature, the author examines 4Chan /pol/ thread #147547939 (key in introducing multiple key elements of the QAnon narrative) to enumerate and classify the information practices deployed by discussion participants. In conclusion, the article expands beyond existing research's previous focus on outright fabrication, showing that early QAnon participants' information practices are also defined in large part by suspicious and idiosyncratic modes of reading authentic sources, not simply the propagation of falsehoods.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"58 1","pages":"129 - 144"},"PeriodicalIF":0.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48219654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}