Journal of Information Policy最新文献

筛选
英文 中文
Conducting Critical Analysis on International Communication Rights Standards: The Contributions of Graphical Knowledge Modeling 对国际通信权标准进行批判性分析:图形知识建模的贡献
IF 0.9
Journal of Information Policy Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.2020.0329
N. Landry, Annie Pilote, Anne-Marie Brunelle
{"title":"Conducting Critical Analysis on International Communication Rights Standards: The Contributions of Graphical Knowledge Modeling","authors":"N. Landry, Annie Pilote, Anne-Marie Brunelle","doi":"10.5325/jinfopoli.10.2020.0329","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0329","url":null,"abstract":"\u0000 Using the computerized application of Modeling using Object Types (MOT) theory, this article examines the normative dimension of official interpretations of a corpus of core “communication rights” (the right to freedom of opinion and expression, the right to privacy, the right to participate in cultural life, and the right to education) enshrined and protected by the International Covenants on Human Rights. This article proposes a methodological contribution whereby the computerized application of knowledge modeling theory promotes the analysis and popularization of international human rights standards. Research findings draw attention to significant conceptual deficiencies included as part of international human rights standards. These deficiencies undermine the applicability of these standards and their relative usefulness in the context of complex sociopolitical issues relating to communication. In addition, this article underscores the need for communication rights studies to further integrate contributions from the field of international human rights law research. It demonstrates that interdisciplinary dialogue can open up new research agendas for communication rights scholars and contribute to a renewed critical analysis of international human rights standards.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"15 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85234030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public Service Media as a Political Issue: How Does the European Parliament Approach PSM and Communication Rights? 公共服务媒体作为一个政治问题:欧洲议会如何处理PSM和传播权?
IF 0.9
Journal of Information Policy Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.2020.0439
M. Rodríguez-Castro, F. Campos-Freire, A. López-Cepeda
{"title":"Public Service Media as a Political Issue: How Does the European Parliament Approach PSM and Communication Rights?","authors":"M. Rodríguez-Castro, F. Campos-Freire, A. López-Cepeda","doi":"10.5325/jinfopoli.10.2020.0439","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0439","url":null,"abstract":"\u0000 Platform dominance, threats to media freedom and disinformation are some of the key phenomena that are shaping the current media environment in Europe and threatening citizens' communication rights. Within this context, Public Service Media (PSM) could have an important role to play, although explicit political support is needed. This article studies the main communication and PSM topics that have been discussed in the European Parliament during the past term (2014–2019) as well as the proposals drafted by political parties for the 2019 European election. The results show that the main proposals linked to PSM involve their independence and the need for increased collaboration, including the establishment of a European public service platform that would enhance the development of a European public sphere.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"39 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82587871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Addressing Misinformation on Whatsapp in India Through Intermediary Liability Policy, Platform Design Modification, and Media Literacy 通过中介责任政策、平台设计修改和媒体素养来解决印度Whatsapp上的错误信息
IF 0.9
Journal of Information Policy Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.2020.0276
Ben Medeiros, Pawanpreet Singh
{"title":"Addressing Misinformation on Whatsapp in India Through Intermediary Liability Policy, Platform Design Modification, and Media Literacy","authors":"Ben Medeiros, Pawanpreet Singh","doi":"10.5325/jinfopoli.10.2020.0276","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0276","url":null,"abstract":"\u0000 Through a case study of lynchings in India that are perceived to have been catalyzed by misinformation on WhatsApp, this article explores how policymakers can mitigate social media misinformation without compromising public discourse. We evaluate the costs and benefits of three approaches to managing misinformation: intermediary liability reform, changes to platform design, and public information endeavors addressing user attitudes and behaviors. We find that while current media literacy endeavors seem somewhat misdirected, more locally attuned initiatives might productively address the underlying susceptibility to misinformation while avoiding the free speech compromises that come with stringent liability rules and restrictions on anonymous speech.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"35 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80173333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Trust Zones: A Path to a More Secure Internet Infrastructure 信任区域:通往更安全的互联网基础设施之路
IF 0.9
Journal of Information Policy Pub Date : 2020-01-01 DOI: 10.2139/ssrn.3746071
D. D. Clark, K. Claffy
{"title":"Trust Zones: A Path to a More Secure Internet Infrastructure","authors":"D. D. Clark, K. Claffy","doi":"10.2139/ssrn.3746071","DOIUrl":"https://doi.org/10.2139/ssrn.3746071","url":null,"abstract":"We propose a path to measurably improve a particular set of Internet infrastructure security weaknesses. By Internet infrastructure we mean the Internet as a packet transport architecture: the transport/network layer protocols (TCP/IP), the Internet routing protocol (BGP), and the naming protocol (DNS). Higher-layer security threats – such as malware, phishing, ransomware, fake news and trolling – get enormous media attention. But the less publicized security concerns with the Internet as a packet transport layer can, and sometimes do, destabilize the foundation on which all higher-level activities occur, and facilitate execution of higher-layer malicious actions. It is the foundational nature of the packet transport layer that motivates our focus. The insecurity of the Internet infrastructure poses a threat to users, businesses, governments, and society at large. As a further point of concern, many of the known security flaws in these systems have persisted for decades. Insecurity persists for five entangled reasons: lack of agreement on appropriate protective measures; misaligned incentives and negative externalities; inability for relevant actors to coordinate actions—especially across national boundaries; the generality of the Internet as a service platform, which allows malicious actors great fluidity in their attacks; and information asymmetries that leave those who need to act without sufficient knowledge to inform planning and execution. While many of these considerations can apply to security challenges more broadly, the generality of the Internet, the tensions among the different sets of private-sector actors, and the lack of any effective mechanism for high-level direction-setting compound the problem. We do not imagine that we are going to make the Internet “secure”, if by that we mean free of risk. Risk is a part of living, and the Internet experience will be no exception. Our goal should be to reduce the risk to the level that users are not fearful of using the Internet, while preserving the core benefits of the Internet—the freedom from unnecessary constraint. The call for better security is aspirational. Any serious attempt to improve security must begin by defining it operationally: breaking the problem into actionable parts; carefully studying the constraints, capabilities and incentives of the relevant actors; analyzing the merits and practicality of different approaches; and developing a strategy to achieve sufficient consensus to motivate progress. These steps are part of any serious system security analysis; our goal is to apply this line of reasoning to the Internet infrastructure layer.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"7 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87716560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Policy Challenges in Mapping Internet Interdomain Congestion 映射互联网域间拥塞的政策挑战
IF 0.9
Journal of Information Policy Pub Date : 2020-01-01 DOI: 10.5325/jinfopoli.10.2020.0001
claffy,Clark,Bauer,Dhamdhere
{"title":"Policy Challenges in Mapping Internet Interdomain Congestion","authors":"claffy,Clark,Bauer,Dhamdhere","doi":"10.5325/jinfopoli.10.2020.0001","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0001","url":null,"abstract":"","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"331 1","pages":"1"},"PeriodicalIF":0.9,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sen’s Capabilities Approach and the Measurement of Communication Outcomes 森的能力方法与沟通结果的测量
IF 0.9
Journal of Information Policy Pub Date : 2019-12-01 DOI: 10.5325/jinfopoli.9.1.0111
Tom Jacobson,Leanne Chang
{"title":"Sen’s Capabilities Approach and the Measurement of Communication Outcomes","authors":"Tom Jacobson,Leanne Chang","doi":"10.5325/jinfopoli.9.1.0111","DOIUrl":"https://doi.org/10.5325/jinfopoli.9.1.0111","url":null,"abstract":"Abstract Amartya Sen’s capabilities approach to development defines development as an increase in freedoms citizens have to choose preferred development options. While Sen’s more recent writings are theoretical and philosophical his work was originally based in social choice theory, which comprises a tradition in quantifying and analyzing collective preferences, or choices among preferences. This article argues that such aggregation procedures can be useful in research devoted to communication for development (C4D). They can be employed in evaluating the outcomes of processes intended to facilitate participation in decision making, in both small and large-scale project settings.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"330 1","pages":"111-131"},"PeriodicalIF":0.9,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sen’s Capabilities Approach and the Measurement of Communication Outcomes 森的能力方法与沟通结果的测量
IF 0.9
Journal of Information Policy Pub Date : 2019-12-01 DOI: 10.5325/JINFOPOLI.9.2019.0111
Jacobson, Chang
{"title":"Sen’s Capabilities Approach and the Measurement of Communication Outcomes","authors":"Jacobson, Chang","doi":"10.5325/JINFOPOLI.9.2019.0111","DOIUrl":"https://doi.org/10.5325/JINFOPOLI.9.2019.0111","url":null,"abstract":"\u0000 Amartya Sen’s capabilities approach to development defines development as an increase in freedoms citizens have to choose preferred development options. While Sen’s more recent writings are theoretical and philosophical his work was originally based in social choice theory, which comprises a tradition in quantifying and analyzing collective preferences, or choices among preferences. This article argues that such aggregation procedures can be useful in research devoted to communication for development (C4D). They can be employed in evaluating the outcomes of processes intended to facilitate participation in decision making, in both small and large-scale project settings.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"90 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84578391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cybersecurity Capacity: Does It Matter? 网络安全能力:重要吗?
IF 0.9
Journal of Information Policy Pub Date : 2019-12-01 DOI: 10.5325/jinfopoli.9.1.0280
William H. Dutton,Sadie Creese,Ruth Shillair,Maria Bada
{"title":"Cybersecurity Capacity: Does It Matter?","authors":"William H. Dutton,Sadie Creese,Ruth Shillair,Maria Bada","doi":"10.5325/jinfopoli.9.1.0280","DOIUrl":"https://doi.org/10.5325/jinfopoli.9.1.0280","url":null,"abstract":"Abstract National cybersecurity capacity building involves the development of managerial, technical, social, legal, policy, and regulatory initiatives by a growing ecology of actors to enhance the resilience of nations to cybersecurity breaches, cybercrime, and terrorism. Capacity building is therefore resource intensive, requiring attention across sectors of society, ranging from governments to Internet users. However, it is difficult to justify commitments to capacity building when the benefits of building national cybersecurity capacity are largely based on logical reasoning, limited case studies, anecdotal evidence, and expert opinion rather than systematic empirical evidence. To explore the value of capacity building, this article reports on the early phase of a systematic effort to bring together cross-national data from multiple sources to examine whether indicators related to the cybersecurity capacity of a nation help explain the experiences of Internet users—one of the final payoffs of cybersecurity capacity building.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"347 1","pages":"280-306"},"PeriodicalIF":0.9,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Influence of Topography and Fracking on Cellular Network Availability in Unserved Areas of North Central Pennsylvania 地形和水力压裂对宾夕法尼亚州中北部未服务地区蜂窝网络可用性的影响
IF 0.9
Journal of Information Policy Pub Date : 2019-12-01 DOI: 10.5325/jinfopoli.9.2019.0238
Cramer
{"title":"The Influence of Topography and Fracking on Cellular Network Availability in Unserved Areas of North Central Pennsylvania","authors":"Cramer","doi":"10.5325/jinfopoli.9.2019.0238","DOIUrl":"https://doi.org/10.5325/jinfopoli.9.2019.0238","url":null,"abstract":"\u0000 North Central Pennsylvania suffers from sparse cellular network coverage due to the longstanding challenges of low populations and rugged topography that are common in other remote areas. However, in recent years the natural gas (“fracking”) industry has entered the region and enjoys much better network coverage than citizens. Based on field research by the author, this article analyzes the geographical, economic, and political causes of these patterns. The article considers the impact on local citizens and recommends solutions based on existing Pennsylvania law.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"75 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80918164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Normative Analysis in the Communications Field: Why We Should Distinguish Communicative Means and Ends of Justice 传播领域的规范分析:为什么要区分传播手段与正义目的
IF 0.9
Journal of Information Policy Pub Date : 2019-12-01 DOI: 10.5325/jinfopoli.9.1.0056
Max Hänska
{"title":"Normative Analysis in the Communications Field: Why We Should Distinguish Communicative Means and Ends of Justice","authors":"Max Hänska","doi":"10.5325/jinfopoli.9.1.0056","DOIUrl":"https://doi.org/10.5325/jinfopoli.9.1.0056","url":null,"abstract":"Abstract In the social sciences, we often face normative questions, not least because many areas of inquiry intersect with public policy. Understanding and explaining media and communications is one task, deciding how communication systems should be organized quite another, but normative analysis receives scant attention. This article explores normative analysis: what is involved in answering questions about justice and communication, about how sociopolitical and indeed communicative arrangements ought to be organized.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"343 3","pages":"56-78"},"PeriodicalIF":0.9,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信