Journal of Information Policy最新文献

筛选
英文 中文
Communication Rights for Social Bots?: Options for the Governance of Automated Computer-Generated Online Identities 社交机器人的通讯权?:计算机自动生成在线身份的治理方案
IF 0.9
Journal of Information Policy Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.2020.0549
Stefano Pedrazzi, Franziska Oehmer
{"title":"Communication Rights for Social Bots?: Options for the Governance of Automated Computer-Generated Online Identities","authors":"Stefano Pedrazzi, Franziska Oehmer","doi":"10.5325/jinfopoli.10.2020.0549","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0549","url":null,"abstract":"\u0000 Social bots, automated agents operating in social networks, are suspected of influencing online debates, opinion-formation processes and thus, the outcome of elections and votes. They do so by contributing to the dissemination of illegal content and disinformation and by jeopardizing an accurate perception of the relevance and popularity of persons, topics, or positions, through their potentially unlimited communication and networking activities, all under the false pretense of human identity. This paper identifies and discusses preventive and repressive governance options for dealing with social bots on state, organizational, and individual levels respecting the constitutional provisions on free expression and opinion-formation.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"37 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79387220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Four Discourses of Digital Rights: Promises and Problems of Rights-Based Politics 数字权利的四种话语:权利政治的承诺与问题
IF 0.9
Journal of Information Policy Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.1.0304
Kari Karppinen,Outi Puukko
{"title":"Four Discourses of Digital Rights: Promises and Problems of Rights-Based Politics","authors":"Kari Karppinen,Outi Puukko","doi":"10.5325/jinfopoli.10.1.0304","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.1.0304","url":null,"abstract":"Abstract The notion of digital rights has recently generated a number of political declarations and civil society initiatives across the world. By critically examining these declarations and academic debates on digital rights, this article asks: Why is it that information policy issues are increasingly framed in terms of individual rights? And on what understandings of rights do various political, corporate, and civil society declarations of digital rights rest? The article identifies four discourses of digital rights, linked to different ideological assumptions and political contexts. Finally, possible limitations and pathologies of the rights discourse are discussed.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"56 1","pages":"304-328"},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138541911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Liability to Accountability: The Ethics of Citing Section 230 to Avoid the Obligations of Running a Social Media Platform 从责任到问责:引用第230条以避免运行社交媒体平台的义务的道德
IF 0.9
Journal of Information Policy Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.1.0123
Benjamin W. Cramer
{"title":"From Liability to Accountability: The Ethics of Citing Section 230 to Avoid the Obligations of Running a Social Media Platform","authors":"Benjamin W. Cramer","doi":"10.5325/jinfopoli.10.1.0123","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.1.0123","url":null,"abstract":"Abstract In the United States, Section 230 of the Communications Decency Act provides immunity from liability for Internet operators who host information submitted by their users. This article will argue that Section 230 allows firms to avoid accountability for the malfeasance that their platforms have enabled. With a focus on the ethical differences between liability (a legal concept) and accountability (an ethical concept), the article will recommend ways to compel today's social media platforms to address their responsibilities toward the proliferating misbehavior that they have enabled.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"345 1","pages":"123-150"},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
More Than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws 不仅仅是一个嫌疑人:调查数据泄露,身份盗窃和数据泄露通知法之间的联系
IF 0.9
Journal of Information Policy Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.2020.0045
F. Bisogni, H. Asghari
{"title":"More Than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws","authors":"F. Bisogni, H. Asghari","doi":"10.5325/jinfopoli.10.2020.0045","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0045","url":null,"abstract":"\u0000 This article investigates the relationship between data breaches and identity theft, including the impact of Data Breach Notification Laws (DBNL) on these incidents (using empirical data and Bayesian modeling). We collected incident data on breaches and identity thefts over a 13-year timespan (2005–2017) in the United States. Our analysis shows that the correlation is driven by the size of a state. Enacting a DBNL still slightly reduces rates of identity theft; while publishing breaches notifications by Attorney Generals helps the broader security community learning about them. We conclude with an in-depth discussion on what the European Union can learn from the US experience.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"23 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82897280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Protecting Academic Freedom or Managing Reputation? An Evaluation of University Social Media Policies 保护学术自由还是管理学术声誉?大学社交媒体政策评估
IF 0.9
Journal of Information Policy Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.2020.0151
Kwestel, Milano
{"title":"Protecting Academic Freedom or Managing Reputation? An Evaluation of University Social Media Policies","authors":"Kwestel, Milano","doi":"10.5325/jinfopoli.10.2020.0151","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0151","url":null,"abstract":"\u0000 University social media policies appear to favor institutional reputation over the tenets of academic freedom upon which research and teaching are based. A content analysis of social media policies of 82 doctoral-granting research universities found that policies used language and concepts that restrain online faculty speech. Two-thirds of policies are overseen by marketing departments rather than by committees that include faculty members as recommended by the American Association of University Professors. Contradictory boundary logic presented double binds for faculty who were enjoined to be brand ambassadors, creating tension for them and creating paradoxes for institutions whose social media policies contradict their commitment to freedom of research and teaching.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"80 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80033725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Conducting Critical Analysis on International Communication Rights Standards: The Contributions of Graphical Knowledge Modeling 对国际通信权标准进行批判性分析:图形知识建模的贡献
IF 0.9
Journal of Information Policy Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.1.0329
Normand Landry,Anne-Marie Pilote,Anne-Marie Brunelle
{"title":"Conducting Critical Analysis on International Communication Rights Standards: The Contributions of Graphical Knowledge Modeling","authors":"Normand Landry,Anne-Marie Pilote,Anne-Marie Brunelle","doi":"10.5325/jinfopoli.10.1.0329","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.1.0329","url":null,"abstract":"Abstract Using the computerized application of Modeling using Object Types (MOT) theory, this article examines the normative dimension of official interpretations of a corpus of core “communication rights” (the right to freedom of opinion and expression, the right to privacy, the right to participate in cultural life, and the right to education) enshrined and protected by the International Covenants on Human Rights. This article proposes a methodological contribution whereby the computerized application of knowledge modeling theory promotes the analysis and popularization of international human rights standards. Research findings draw attention to significant conceptual deficiencies included as part of international human rights standards. These deficiencies undermine the applicability of these standards and their relative usefulness in the context of complex sociopolitical issues relating to communication. In addition, this article underscores the need for communication rights studies to further integrate contributions from the field of international human rights law research. It demonstrates that interdisciplinary dialogue can open up new research agendas for communication rights scholars and contribute to a renewed critical analysis of international human rights standards.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"173 1","pages":"329-387"},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Liability to Accountability: The Ethics of Citing Section 230 to Avoid the Obligations of Running a Social Media Platform 从责任到问责:引用第230条以避免运行社交媒体平台的义务的道德
IF 0.9
Journal of Information Policy Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.2020.0123
Cramer
{"title":"From Liability to Accountability: The Ethics of Citing Section 230 to Avoid the Obligations of Running a Social Media Platform","authors":"Cramer","doi":"10.5325/jinfopoli.10.2020.0123","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0123","url":null,"abstract":"\u0000 In the United States, Section 230 of the Communications Decency Act provides immunity from liability for Internet operators who host information submitted by their users. This article will argue that Section 230 allows firms to avoid accountability for the malfeasance that their platforms have enabled. With a focus on the ethical differences between liability (a legal concept) and accountability (an ethical concept), the article will recommend ways to compel today's social media platforms to address their responsibilities toward the proliferating misbehavior that they have enabled.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"42 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82515927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Examining How GDPR Challenges Emerging Technologies 研究GDPR如何挑战新兴技术
IF 0.9
Journal of Information Policy Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.1.0237
Rania El-Gazzar,Karen Stendal
{"title":"Examining How GDPR Challenges Emerging Technologies","authors":"Rania El-Gazzar,Karen Stendal","doi":"10.5325/jinfopoli.10.1.0237","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.1.0237","url":null,"abstract":"Abstract Emerging technologies, particularly cloud computing, blockchain, Internet of Things, and artificial intelligence, have received noticeable attention from research and industry. These technologies contribute to innovation in public and private organizations, but threaten the privacy of individuals. The natural characteristics of these technologies are challenged by the new general data protection regulation (GDPR). In this article, we examine the compliance challenges between these technologies' characteristics and GDPR both individually and when combined. We identified compliance opportunities related to the characteristics of these technologies. We discuss possible approaches to address the compliance challenges identified and raise questions for further research in the area.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"284 ","pages":"237-275"},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Communication Rights for Social Bots?: Options for the Governance of Automated Computer-Generated Online Identities 社交机器人的通讯权?:计算机自动生成在线身份的治理方案
IF 0.9
Journal of Information Policy Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.1.0549
Stefano Pedrazzi,Franziska Oehmer
{"title":"Communication Rights for Social Bots?: Options for the Governance of Automated Computer-Generated Online Identities","authors":"Stefano Pedrazzi,Franziska Oehmer","doi":"10.5325/jinfopoli.10.1.0549","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.1.0549","url":null,"abstract":"Abstract Social bots, automated agents operating in social networks, are suspected of influencing online debates, opinion-formation processes and thus, the outcome of elections and votes. They do so by contributing to the dissemination of illegal content and disinformation and by jeopardizing an accurate perception of the relevance and popularity of persons, topics, or positions, through their potentially unlimited communication and networking activities, all under the false pretense of human identity. This paper identifies and discusses preventive and repressive governance options for dealing with social bots on state, organizational, and individual levels respecting the constitutional provisions on free expression and opinion-formation.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"287 ","pages":"549-581"},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Four Phases of Internet Policy Development: Risks to the Public Interest 互联网政策发展的四个阶段:对公共利益的风险
IF 0.9
Journal of Information Policy Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.2020.0184
Wilkinson
{"title":"Four Phases of Internet Policy Development: Risks to the Public Interest","authors":"Wilkinson","doi":"10.5325/jinfopoli.10.2020.0184","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0184","url":null,"abstract":"\u0000 This article investigates what risks to the public interest may arise in Internet policy development facilitated by Canada's communications regulator, the Canadian Radio-television and Telecommunications Commission (CRTC). It finds that different risks exist in four distinct phases of CRTC policy formation. Although these threats are wide-ranging, they often relate to the strategic behaviors of well-resourced groups that advocate for policy positions that are adjacent or contrary to the public interest, a regulatory process in some ways unsuited for robust civil society participation, and the resource constraints of public interest groups that regularly participate in this process.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"47 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79193315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信