{"title":"Trusting the untrustable: The construction of politicians’ self-image on Facebook","authors":"Tamar Ashuri, Nathan Stolero","doi":"10.1080/01972243.2022.2112329","DOIUrl":"https://doi.org/10.1080/01972243.2022.2112329","url":null,"abstract":"Abstract Informed by the signaling theory, we argue that the use of social media by both politicians and potential voters may mitigate the information asymmetry between them. A politician normally strives to construct an idealized image of herself, and is therefore eager to convey to the public reliable information regarding her unobservable personal qualities that are conducive to this purpose. Voters, for their part, are interested in obtaining information about candidates’ qualities to make their voting decisions. Based on semi-structured interviews with 12 Israeli female politicians and a qualitative analysis of their posts on Facebook, we identify the tactics participants use to publicize their salient qualities. The signaling model for SNS political communication developed for the analysis here could be used to study information asymmetry in online interactions in other social settings.","PeriodicalId":51481,"journal":{"name":"Information Society","volume":"38 1","pages":"377 - 387"},"PeriodicalIF":3.5,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47871770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The seer and the seen: Surveying Palantir’s surveillance platform","authors":"A. Iliadis, Amelia Acker","doi":"10.1080/01972243.2022.2100851","DOIUrl":"https://doi.org/10.1080/01972243.2022.2100851","url":null,"abstract":"Abstract Palantir is among the most secretive and understudied surveillance firms globally. The company supplies information technology solutions for data integration and tracking to police and government agencies, humanitarian organizations, and corporations. To illuminate and learn more about Palantir’s opaque surveillance practices, we begin by sketching Palantir’s company history and contract network, followed by an explanation of key terms associated with Palantir’s technology area and a description of the firm’s platform ecosystem. We then summarize current scholarship on Palantir’s continuing role in policing, intelligence, and security operations. Our primary contribution and analysis are a computational topic modeling of Palantir’s surveillance patents (n = 155), including their topics and themes. We end by discussing the concept of infrastructuring to understand Palantir as a surveillance platform, where we theorize information standards like administrative metadata as phenomena for structuring social worlds in and through access to digital information.","PeriodicalId":51481,"journal":{"name":"Information Society","volume":"38 1","pages":"334 - 363"},"PeriodicalIF":3.5,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46658060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Nicholson, Petter Nielsen, Sundeep Sahay, J. Sæbø
{"title":"Digital public goods platforms for development: The challenge of scaling","authors":"B. Nicholson, Petter Nielsen, Sundeep Sahay, J. Sæbø","doi":"10.1080/01972243.2022.2105999","DOIUrl":"https://doi.org/10.1080/01972243.2022.2105999","url":null,"abstract":"Abstract In this article we consider the notion of digital global public good and articulate our understanding of it. Against this conceptual foil, we examine the development of DHIS2, a global health platform inspired by public goods, focusing on the paradoxes that arise in the scaling process. We find that the scaling dynamics played out differently at the macro and micro levels, giving rise to the following paradoxes: addition of new functionalities to cater to the universe of users across the world (macro level) works counter to the needs of users in particular locations (micro level); responsiveness to the requests of the donors with a global view (macro level) distorts the production process, as the voices of users, situated in remote locations in developing countries, are not adequately heard; the system needs to be simultaneously relevant across the global (macro level) and the local (micro level), when the former calls for decontextualization and the later (re)contextualization. We then discuss challenges these paradoxes create with regard to attaining non-rivalry and non-exclusion, the defining characteristics of a public good.","PeriodicalId":51481,"journal":{"name":"Information Society","volume":"38 1","pages":"364 - 376"},"PeriodicalIF":3.5,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46686668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Darja Grošelj, Bianca C. Reisdorf, V. Dolničar, A. Petrovčič
{"title":"A decade of proxy internet use: The changing role of socio-demographics and family support in nonusers’ indirect internet access to online services","authors":"Darja Grošelj, Bianca C. Reisdorf, V. Dolničar, A. Petrovčič","doi":"10.1080/01972243.2022.2080782","DOIUrl":"https://doi.org/10.1080/01972243.2022.2080782","url":null,"abstract":"Abstract Internet nonuse persists among the most excluded groups of people, particularly among aging and low-educated populations. Proxy internet use (PIU), where nonusers ask internet users to do things online for them, helps nonusers mitigate their exclusion from the digital realm. This study examines the changing factors that shape PIU activation. Specifically, it focuses on the changing role of socio-demographics and family support in internet nonusers’ access to online services by comparing factors engendering active engagement in PIU in 2009 and 2018. The results from multivariate analyses of cross-sectional survey data from two nationwide representative samples collected nine years apart in Slovenia show that both sets of factors have lost their explanatory power over time. At the same time, internet nonusers are increasingly concentrated in the most vulnerable groups of people. Specifically, the decreasing importance of (grand)children as proxy users and the newly emerging importance of spouses or partners represents a shift away from intergenerational support and toward intragenerational support in regards to who nonusers rely on when asking for help with online tasks and services.","PeriodicalId":51481,"journal":{"name":"Information Society","volume":"38 1","pages":"240 - 256"},"PeriodicalIF":3.5,"publicationDate":"2022-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46025902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Doing more with less: Behavioral insights for anti-piracy messages","authors":"G. Grolleau, Luc Meunier","doi":"10.1080/01972243.2022.2095683","DOIUrl":"https://doi.org/10.1080/01972243.2022.2095683","url":null,"abstract":"Abstract Using the lens of behavioral economics, we analyze recurrent elements used in anti-piracy messages: statistics on infringements, quantifications of economic losses caused by piracy, and a mix of strong and weak arguments. We argue that the more-is-better heuristic used in these messages can generate counterproductive outcomes because of the statistical victim bias, the scope severity paradox, the social norm trap, and the excessive number of arguments. While “the higher the numbers, the more convincing they are” seems appealing, we show that this logic is flawed and can be detrimental for the attainment of the desired objectives. We propose to design messages based on the homo heuristicus perspective, which activate and channel automatic processes in human beings toward desirable directions.","PeriodicalId":51481,"journal":{"name":"Information Society","volume":"38 1","pages":"388 - 393"},"PeriodicalIF":3.5,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43863094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution of social informatics: Publications, research, and educational activities","authors":"Vasja Vehovar, Zdenek Smutný, Jošt Bartol","doi":"10.1080/01972243.2022.2092570","DOIUrl":"https://doi.org/10.1080/01972243.2022.2092570","url":null,"abstract":"Abstract A comprehensive review of 1985–2019 trends related to the (English) term social informatics was conducted for scholarly literature, research and educational institutions, conferences, journals, blogs, and presentations at the International Conference on Social Informatics. The bibliographic search yielded 275 scientific documents with the term social informatics in the title, abstract, or keywords; which were coded according to ten characteristics. The analysis showed that corresponding scientific publications peaked in 2005–2009 and then roughly stagnated. At the same time, they increasingly spread worldwide, with most authors still referring to the concept of social informatics developed by Rob Kling. Other activities related to social informatics were mostly stagnant or slightly declining after 2010–2014, except for the number of educational courses. In contrast, the widespread general use of the term social informatics grew rapidly, especially in the context of computational social science. This is most evident in the analysis of 476 papers from the proceedings of International Conference on Social Informatics (2009–2019), which revealed a very weak identification with the notion of social informatics. Considering these findings, the prospects of social informatics are discussed in a broader context.","PeriodicalId":51481,"journal":{"name":"Information Society","volume":"38 1","pages":"307 - 333"},"PeriodicalIF":3.5,"publicationDate":"2022-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45982282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Does public opinion shape public policy? Effect of citizen dissent on legislative outcomes","authors":"Nara Park, J. Ham","doi":"10.1080/01972243.2022.2077493","DOIUrl":"https://doi.org/10.1080/01972243.2022.2077493","url":null,"abstract":"Abstract In South Korea, the Advance Notice Legislation (ANL) system requires by law that a public announcement be issued on any proposed bill that is likely to affect the fundamental rights, duties, and/or daily life of the general public. By investigating the effects of public dissent submitted via the online ANL system in South Korea, this study attempts to address the critical issue of how to increase citizen participation in the political process and to offer a possible strategy that modern democratic governments can employ in this regard. The findings suggest that citizens will actively participate in the political process to make their voices heard when an appropriate participatory mechanism is available, but they will be more active if the administration encourages citizen participation with various policies and institutions. In other words, formal and informal institutions actively interact to affect the behavior of actors both within and outside the political arena.","PeriodicalId":51481,"journal":{"name":"Information Society","volume":"38 1","pages":"269 - 289"},"PeriodicalIF":3.5,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43088638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Governance of news aggregators’ practices across five emblematic cases: Policy regimes between normative acceptance and resistance","authors":"S. Ganter","doi":"10.1080/01972243.2022.2076180","DOIUrl":"https://doi.org/10.1080/01972243.2022.2076180","url":null,"abstract":"Abstract During the 2005–2015 decade, news publishers, governments, and digital news aggregators re-negotiated the parameters of control over the circulation of digital content. Using governance and regime theory, we analyze five emblematic cases—Brazil, France, Germany, Spain, and the United Kingdom—of early governance reactions to news aggregators’ practices and identify different types of strategies: (1) discursive resistance; (2) controlled drop-out; (3) one-time payments; (4) opt-in ancillary copyright law; and (5) strict ancillary copyright law. Through contextualizing and triangulating, we explain the nuanced ways in which legacy actors struggled to find adequate strategies to maintain their definitional power when technology companies first manifested their interest in the news sector. The findings indicate a link between the strength of policy regimes that sustained copyright as a normative monopoly and shifts in normative interpretations. With that, we highlight the importance of considering policy regimes’ constituencies as an explanatory dimension when studying change and maintenance in media governance.","PeriodicalId":51481,"journal":{"name":"Information Society","volume":"38 1","pages":"290 - 306"},"PeriodicalIF":3.5,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46068929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session replay scripts: A privacy analysis","authors":"F. Grodzinsky, Keith W. Miller, Marty J. Wolf","doi":"10.1080/01972243.2022.2078916","DOIUrl":"https://doi.org/10.1080/01972243.2022.2078916","url":null,"abstract":"Abstract Session replay scripts record a user’s actions while visiting a website or using a computer application. These recordings are typically sent to third party companies whose stated purpose is to analyze the recordings to help correct bottlenecks and illuminate problems that are difficult for users to navigate. We examine how session replay scripts are being marketed and how they are used by application developers. The extent of gathered data is intrusive, often going beyond the stated objectives, and often collected without users’ knowledge. Using Nissenbaum’s privacy as contextual integrity framework, we demonstrate how replay scripts violate the norms of both appropriateness and distribution, and hence the privacy of the user. We examine two scenarios: one where the session replay data are sent back to the application developer, and another where captured data are sent to third party companies. We compare the scenarios to two analogous situations: surveys taken at a museum and video surveillance in a brick-and-mortar store. We analyze in detail the case of FullStory, a vendor of session replay scripts. In conclusion, we offer suggestions on how to preserve private information in both scenarios.","PeriodicalId":51481,"journal":{"name":"Information Society","volume":"38 1","pages":"257 - 268"},"PeriodicalIF":3.5,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45979257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}