{"title":"Conducting Critical Analysis on International Communication Rights Standards: The Contributions of Graphical Knowledge Modeling","authors":"N. Landry, Annie Pilote, Anne-Marie Brunelle","doi":"10.5325/jinfopoli.10.2020.0329","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0329","url":null,"abstract":"\u0000 Using the computerized application of Modeling using Object Types (MOT) theory, this article examines the normative dimension of official interpretations of a corpus of core “communication rights” (the right to freedom of opinion and expression, the right to privacy, the right to participate in cultural life, and the right to education) enshrined and protected by the International Covenants on Human Rights. This article proposes a methodological contribution whereby the computerized application of knowledge modeling theory promotes the analysis and popularization of international human rights standards. Research findings draw attention to significant conceptual deficiencies included as part of international human rights standards. These deficiencies undermine the applicability of these standards and their relative usefulness in the context of complex sociopolitical issues relating to communication. In addition, this article underscores the need for communication rights studies to further integrate contributions from the field of international human rights law research. It demonstrates that interdisciplinary dialogue can open up new research agendas for communication rights scholars and contribute to a renewed critical analysis of international human rights standards.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"15 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85234030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rodríguez-Castro, F. Campos-Freire, A. López-Cepeda
{"title":"Public Service Media as a Political Issue: How Does the European Parliament Approach PSM and Communication Rights?","authors":"M. Rodríguez-Castro, F. Campos-Freire, A. López-Cepeda","doi":"10.5325/jinfopoli.10.2020.0439","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0439","url":null,"abstract":"\u0000 Platform dominance, threats to media freedom and disinformation are some of the key phenomena that are shaping the current media environment in Europe and threatening citizens' communication rights. Within this context, Public Service Media (PSM) could have an important role to play, although explicit political support is needed. This article studies the main communication and PSM topics that have been discussed in the European Parliament during the past term (2014–2019) as well as the proposals drafted by political parties for the 2019 European election. The results show that the main proposals linked to PSM involve their independence and the need for increased collaboration, including the establishment of a European public service platform that would enhance the development of a European public sphere.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"39 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82587871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Addressing Misinformation on Whatsapp in India Through Intermediary Liability Policy, Platform Design Modification, and Media Literacy","authors":"Ben Medeiros, Pawanpreet Singh","doi":"10.5325/jinfopoli.10.2020.0276","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0276","url":null,"abstract":"\u0000 Through a case study of lynchings in India that are perceived to have been catalyzed by misinformation on WhatsApp, this article explores how policymakers can mitigate social media misinformation without compromising public discourse. We evaluate the costs and benefits of three approaches to managing misinformation: intermediary liability reform, changes to platform design, and public information endeavors addressing user attitudes and behaviors. We find that while current media literacy endeavors seem somewhat misdirected, more locally attuned initiatives might productively address the underlying susceptibility to misinformation while avoiding the free speech compromises that come with stringent liability rules and restrictions on anonymous speech.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"35 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80173333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust Zones: A Path to a More Secure Internet Infrastructure","authors":"D. D. Clark, K. Claffy","doi":"10.2139/ssrn.3746071","DOIUrl":"https://doi.org/10.2139/ssrn.3746071","url":null,"abstract":"We propose a path to measurably improve a particular set of Internet infrastructure security weaknesses. By Internet infrastructure we mean the Internet as a packet transport architecture: the transport/network layer protocols (TCP/IP), the Internet routing protocol (BGP), and the naming protocol (DNS). Higher-layer security threats – such as malware, phishing, ransomware, fake news and trolling – get enormous media attention. But the less publicized security concerns with the Internet as a packet transport layer can, and sometimes do, destabilize the foundation on which all higher-level activities occur, and facilitate execution of higher-layer malicious actions. It is the foundational nature of the packet transport layer that motivates our focus. The insecurity of the Internet infrastructure poses a threat to users, businesses, governments, and society at large. As a further point of concern, many of the known security flaws in these systems have persisted for decades. Insecurity persists for five entangled reasons: lack of agreement on appropriate protective measures; misaligned incentives and negative externalities; inability for relevant actors to coordinate actions—especially across national boundaries; the generality of the Internet as a service platform, which allows malicious actors great fluidity in their attacks; and information asymmetries that leave those who need to act without sufficient knowledge to inform planning and execution. While many of these considerations can apply to security challenges more broadly, the generality of the Internet, the tensions among the different sets of private-sector actors, and the lack of any effective mechanism for high-level direction-setting compound the problem. We do not imagine that we are going to make the Internet “secure”, if by that we mean free of risk. Risk is a part of living, and the Internet experience will be no exception. Our goal should be to reduce the risk to the level that users are not fearful of using the Internet, while preserving the core benefits of the Internet—the freedom from unnecessary constraint. The call for better security is aspirational. Any serious attempt to improve security must begin by defining it operationally: breaking the problem into actionable parts; carefully studying the constraints, capabilities and incentives of the relevant actors; analyzing the merits and practicality of different approaches; and developing a strategy to achieve sufficient consensus to motivate progress. These steps are part of any serious system security analysis; our goal is to apply this line of reasoning to the Internet infrastructure layer.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"7 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87716560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Policy Challenges in Mapping Internet Interdomain Congestion","authors":"claffy,Clark,Bauer,Dhamdhere","doi":"10.5325/jinfopoli.10.2020.0001","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0001","url":null,"abstract":"","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"331 1","pages":"1"},"PeriodicalIF":0.9,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sen’s Capabilities Approach and the Measurement of Communication Outcomes","authors":"Tom Jacobson,Leanne Chang","doi":"10.5325/jinfopoli.9.1.0111","DOIUrl":"https://doi.org/10.5325/jinfopoli.9.1.0111","url":null,"abstract":"Abstract Amartya Sen’s capabilities approach to development defines development as an increase in freedoms citizens have to choose preferred development options. While Sen’s more recent writings are theoretical and philosophical his work was originally based in social choice theory, which comprises a tradition in quantifying and analyzing collective preferences, or choices among preferences. This article argues that such aggregation procedures can be useful in research devoted to communication for development (C4D). They can be employed in evaluating the outcomes of processes intended to facilitate participation in decision making, in both small and large-scale project settings.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"330 1","pages":"111-131"},"PeriodicalIF":0.9,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sen’s Capabilities Approach and the Measurement of Communication Outcomes","authors":"Jacobson, Chang","doi":"10.5325/JINFOPOLI.9.2019.0111","DOIUrl":"https://doi.org/10.5325/JINFOPOLI.9.2019.0111","url":null,"abstract":"\u0000 Amartya Sen’s capabilities approach to development defines development as an increase in freedoms citizens have to choose preferred development options. While Sen’s more recent writings are theoretical and philosophical his work was originally based in social choice theory, which comprises a tradition in quantifying and analyzing collective preferences, or choices among preferences. This article argues that such aggregation procedures can be useful in research devoted to communication for development (C4D). They can be employed in evaluating the outcomes of processes intended to facilitate participation in decision making, in both small and large-scale project settings.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"90 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84578391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
William H. Dutton,Sadie Creese,Ruth Shillair,Maria Bada
{"title":"Cybersecurity Capacity: Does It Matter?","authors":"William H. Dutton,Sadie Creese,Ruth Shillair,Maria Bada","doi":"10.5325/jinfopoli.9.1.0280","DOIUrl":"https://doi.org/10.5325/jinfopoli.9.1.0280","url":null,"abstract":"Abstract National cybersecurity capacity building involves the development of managerial, technical, social, legal, policy, and regulatory initiatives by a growing ecology of actors to enhance the resilience of nations to cybersecurity breaches, cybercrime, and terrorism. Capacity building is therefore resource intensive, requiring attention across sectors of society, ranging from governments to Internet users. However, it is difficult to justify commitments to capacity building when the benefits of building national cybersecurity capacity are largely based on logical reasoning, limited case studies, anecdotal evidence, and expert opinion rather than systematic empirical evidence. To explore the value of capacity building, this article reports on the early phase of a systematic effort to bring together cross-national data from multiple sources to examine whether indicators related to the cybersecurity capacity of a nation help explain the experiences of Internet users—one of the final payoffs of cybersecurity capacity building.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"347 1","pages":"280-306"},"PeriodicalIF":0.9,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Influence of Topography and Fracking on Cellular Network Availability in Unserved Areas of North Central Pennsylvania","authors":"Cramer","doi":"10.5325/jinfopoli.9.2019.0238","DOIUrl":"https://doi.org/10.5325/jinfopoli.9.2019.0238","url":null,"abstract":"\u0000 North Central Pennsylvania suffers from sparse cellular network coverage due to the longstanding challenges of low populations and rugged topography that are common in other remote areas. However, in recent years the natural gas (“fracking”) industry has entered the region and enjoys much better network coverage than citizens. Based on field research by the author, this article analyzes the geographical, economic, and political causes of these patterns. The article considers the impact on local citizens and recommends solutions based on existing Pennsylvania law.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"75 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80918164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Normative Analysis in the Communications Field: Why We Should Distinguish Communicative Means and Ends of Justice","authors":"Max Hänska","doi":"10.5325/jinfopoli.9.1.0056","DOIUrl":"https://doi.org/10.5325/jinfopoli.9.1.0056","url":null,"abstract":"Abstract In the social sciences, we often face normative questions, not least because many areas of inquiry intersect with public policy. Understanding and explaining media and communications is one task, deciding how communication systems should be organized quite another, but normative analysis receives scant attention. This article explores normative analysis: what is involved in answering questions about justice and communication, about how sociopolitical and indeed communicative arrangements ought to be organized.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"343 3","pages":"56-78"},"PeriodicalIF":0.9,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}