While pure deliberation has still not been found online, the field of online deliberation research is blossoming. Born out of the "frustrations and possibilities" of the 1990s, a current theme in the field is to re-link deliberative theory with empirical political science. The aim of this systematic literature review is to sort out and examine important features of this development; to identify and categorise important research themes and issues as well as to pinpoint some research gaps. Using citation analysis as a method for article selection, 788 abstracts were retrieved and out of these, 130 items were chosen for further analysis. First the review shows that researchers from several different disciplines are involved in the field and that these researchers are studying online deliberation in a variety of arenas aided by a wide range of methods. Second the review reveals that the field struggles with a highly diversified concept of deliberation; that newer theoretical developments are underutilised in the operationalisation of theoretical concepts for empirical analyses, and that it there is a rather low degree of cumulativity in the field. Finally, more attention is paid on deliberation per se, rather than the political and democratic consequences of deliberation.
{"title":"The Challenges for Online Deliberation Research: A Literature Review","authors":"Magnus E. Jonsson, Joachim Åström","doi":"10.4018/ijep.2014010101","DOIUrl":"https://doi.org/10.4018/ijep.2014010101","url":null,"abstract":"While pure deliberation has still not been found online, the field of online deliberation research is blossoming. Born out of the \"frustrations and possibilities\" of the 1990s, a current theme in the field is to re-link deliberative theory with empirical political science. The aim of this systematic literature review is to sort out and examine important features of this development; to identify and categorise important research themes and issues as well as to pinpoint some research gaps. Using citation analysis as a method for article selection, 788 abstracts were retrieved and out of these, 130 items were chosen for further analysis. First the review shows that researchers from several different disciplines are involved in the field and that these researchers are studying online deliberation in a variety of arenas aided by a wide range of methods. Second the review reveals that the field struggles with a highly diversified concept of deliberation; that newer theoretical developments are underutilised in the operationalisation of theoretical concepts for empirical analyses, and that it there is a rather low degree of cumulativity in the field. Finally, more attention is paid on deliberation per se, rather than the political and democratic consequences of deliberation.","PeriodicalId":13695,"journal":{"name":"Int. J. E Politics","volume":"56 1","pages":"1-15"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90992425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study examines relations between indicators of knowledge work and worker attitudes toward employers, collective action, and union efficacy. Previous writing on these relations are used to develop hypotheses. Data are drawn from the 2009 Young Workers Survey. Results fail to show any statistically significant main effect relations between knowledge work indicators and the worker attitudes examined, despite a sample size sufficient to detect at least medium effect sizes. Further, there is very limited support for moderator effects. A discussion section discusses limitations, implications, and issues for future research.
{"title":"Distrust of Employers, Collectivism, and Union Efficacy","authors":"J. Fiorito, D. Gallagher","doi":"10.4018/ijep.2013100102","DOIUrl":"https://doi.org/10.4018/ijep.2013100102","url":null,"abstract":"This study examines relations between indicators of knowledge work and worker attitudes toward employers, collective action, and union efficacy. Previous writing on these relations are used to develop hypotheses. Data are drawn from the 2009 Young Workers Survey. Results fail to show any statistically significant main effect relations between knowledge work indicators and the worker attitudes examined, despite a sample size sufficient to detect at least medium effect sizes. Further, there is very limited support for moderator effects. A discussion section discusses limitations, implications, and issues for future research.","PeriodicalId":13695,"journal":{"name":"Int. J. E Politics","volume":"1 1","pages":"13-26"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84689745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Information Communication Technology ICT offers unions a greater capacity to build cohesion and expand membership. An important issue in assessing the potential benefits of ICT is the nature and scope of union members' use of this technology. Unions must have an Internet presence. Using data from a 2010 Current Population Survey CPS, the authors examine the extent to which union members have and use computers and the Internet. In addition, the authors review Facebook pages and Twitter accounts established by or for national labor organizations. The authors find that labor union usage of these social networks has not produced anticipated usage by members.
{"title":"The Face(book) of Unionism","authors":"R. Gibney, Thomas J. Zagenczyk, M. Masters","doi":"10.4018/ijep.2013100101","DOIUrl":"https://doi.org/10.4018/ijep.2013100101","url":null,"abstract":"Information Communication Technology ICT offers unions a greater capacity to build cohesion and expand membership. An important issue in assessing the potential benefits of ICT is the nature and scope of union members' use of this technology. Unions must have an Internet presence. Using data from a 2010 Current Population Survey CPS, the authors examine the extent to which union members have and use computers and the Internet. In addition, the authors review Facebook pages and Twitter accounts established by or for national labor organizations. The authors find that labor union usage of these social networks has not produced anticipated usage by members.","PeriodicalId":13695,"journal":{"name":"Int. J. E Politics","volume":"14 1","pages":"1-12"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91214444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper explores the use of interactive communication and dialogic relationship building strategies on political campaign Web sites. In contrast to presidential races that often feature substantially more sophisticated campaign Web sites, congressional candidates' ability and willingness to use the Web as an electioneering tool has varied greatly. The present research sought to address two broad research questions: 1 how candidates from the same electoral districts used their Web sites during the 2006 and 2010 congressional elections; and 2 to what extent could several candidate and district level variables explain the differences in Web utilization. A typology was proposed to examine the first question, while content analysis was performed to collect empirical data that addressed the second question. Results indicate that while the use of interactive Web strategies may be concentrated among candidates with certain characteristics in 2006, the adoption of social media in political campaigns has trickled down from the presidential level, and that interactive tools have become a norm in the 2010 congressional election, with virtually no observable differences emerging among candidates. Theoretical and practical implication for online political public relations is discussed.
{"title":"Mapping Web Interactivity: A Comparative Study of Congressional Campaign Websites","authors":"Kevin Y. Wang, H. Lee, D. Atkin, Cheonsoo Kim","doi":"10.4018/ijep.2013100104","DOIUrl":"https://doi.org/10.4018/ijep.2013100104","url":null,"abstract":"This paper explores the use of interactive communication and dialogic relationship building strategies on political campaign Web sites. In contrast to presidential races that often feature substantially more sophisticated campaign Web sites, congressional candidates' ability and willingness to use the Web as an electioneering tool has varied greatly. The present research sought to address two broad research questions: 1 how candidates from the same electoral districts used their Web sites during the 2006 and 2010 congressional elections; and 2 to what extent could several candidate and district level variables explain the differences in Web utilization. A typology was proposed to examine the first question, while content analysis was performed to collect empirical data that addressed the second question. Results indicate that while the use of interactive Web strategies may be concentrated among candidates with certain characteristics in 2006, the adoption of social media in political campaigns has trickled down from the presidential level, and that interactive tools have become a norm in the 2010 congressional election, with virtually no observable differences emerging among candidates. Theoretical and practical implication for online political public relations is discussed.","PeriodicalId":13695,"journal":{"name":"Int. J. E Politics","volume":"247 12 1","pages":"39-55"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90776386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper discusses how political parties and candidates try to enhance the public visibility of their websites during electoral campaigns, through a process that the author proposes calling the "meta-campaign." This process significantly depends on the actions of journalists and the way in which they cover electoral campaigns. The discussion is based on an exploratory and qualitative study of the Portuguese campaign for the 2009 European Parliament election. The main reason the authors chose this election was that European themes, being less familiar to Portuguese citizens than national ones, would highlight the need for information about the salient issues as well as the tools for attaining this information, with the websites of political parties and candidates clearly being one of the latter.
{"title":"The Visibility of Political Websites during Electoral Campaigns","authors":"J. Serra","doi":"10.4018/ijep.2013100103","DOIUrl":"https://doi.org/10.4018/ijep.2013100103","url":null,"abstract":"This paper discusses how political parties and candidates try to enhance the public visibility of their websites during electoral campaigns, through a process that the author proposes calling the \"meta-campaign.\" This process significantly depends on the actions of journalists and the way in which they cover electoral campaigns. The discussion is based on an exploratory and qualitative study of the Portuguese campaign for the 2009 European Parliament election. The main reason the authors chose this election was that European themes, being less familiar to Portuguese citizens than national ones, would highlight the need for information about the salient issues as well as the tools for attaining this information, with the websites of political parties and candidates clearly being one of the latter.","PeriodicalId":13695,"journal":{"name":"Int. J. E Politics","volume":"42 1","pages":"27-38"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80711412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the post 9/11 world, homeland security has become focal issue for every country and governments are constantly improving security mechanisms to protect their citizens. Pakistan being the front line state in the war against terror is one of the heavily affected countries by terrorism. Timely information dissemination to public by security agencies can help citizens to be prepared and carry out protective measures. Information technology artifacts and the internet can be very beneficial for information dissemination purpose. In this paper the author specifically looked at Pakistani security agency websites 1to evaluate usability aspects. Initially we conducted a usability testing in lab setting, where our questions were based on Jakob Nielson's heuristics. In order to further validate our findings the authors prepared a questionnaire and got it filled out by end users. Survey results highlighted that these websites have several usability problems which need to be rectified before they could effectively be used. The findings of the study help e-government practitioners and policy makers to develop their websites according to user needs.
{"title":"Usability Evaluation of Pakistani Security Agencies Websites","authors":"S. Saeed, I. Malik, Fazal Wahab","doi":"10.4018/jep.2013070105","DOIUrl":"https://doi.org/10.4018/jep.2013070105","url":null,"abstract":"In the post 9/11 world, homeland security has become focal issue for every country and governments are constantly improving security mechanisms to protect their citizens. Pakistan being the front line state in the war against terror is one of the heavily affected countries by terrorism. Timely information dissemination to public by security agencies can help citizens to be prepared and carry out protective measures. Information technology artifacts and the internet can be very beneficial for information dissemination purpose. In this paper the author specifically looked at Pakistani security agency websites 1to evaluate usability aspects. Initially we conducted a usability testing in lab setting, where our questions were based on Jakob Nielson's heuristics. In order to further validate our findings the authors prepared a questionnaire and got it filled out by end users. Survey results highlighted that these websites have several usability problems which need to be rectified before they could effectively be used. The findings of the study help e-government practitioners and policy makers to develop their websites according to user needs.","PeriodicalId":13695,"journal":{"name":"Int. J. E Politics","volume":"37 1","pages":"57-69"},"PeriodicalIF":0.0,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90685712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper explores the different yet complementary aspects of the panopticon and the panspectron using the case study of the Israeli controlled Palestinian territory, the Gaza Strip. Beginning with a brief theoretical discussion of the concept of panopticon and panspectron expanding on the existing literature, the paper moves on to discuss the implementation of panoptical and panspectral technologies and practices in the Gaza Strip and situates these within a larger framework of control of the Palestinian population under Israeli occupation, and discusses seepage of these surveillance technologies into Israeli society proper and beyond into the international arena.
{"title":"The Gaza Strip as Panopticon and Panspectron: The Disciplining and Punishing of a Society","authors":"M. Dahan","doi":"10.4018/jep.2013070104","DOIUrl":"https://doi.org/10.4018/jep.2013070104","url":null,"abstract":"This paper explores the different yet complementary aspects of the panopticon and the panspectron using the case study of the Israeli controlled Palestinian territory, the Gaza Strip. Beginning with a brief theoretical discussion of the concept of panopticon and panspectron expanding on the existing literature, the paper moves on to discuss the implementation of panoptical and panspectral technologies and practices in the Gaza Strip and situates these within a larger framework of control of the Palestinian population under Israeli occupation, and discusses seepage of these surveillance technologies into Israeli society proper and beyond into the international arena.","PeriodicalId":13695,"journal":{"name":"Int. J. E Politics","volume":"21 1","pages":"44-56"},"PeriodicalIF":0.0,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87110283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Decentralized organizational approaches to security provision introduce new challenges for controlling information-sharing practices, safeguarding civil liberties, and ensuring accountability. Department of Homeland Security "fusion centers," and the multiple organizations and databases that are part of fusion centers, engender an environment in which information is migrating beyond original purposes of counterterrorism. Indeed, based on intensive qualitative research, the authors have found that fusion centers that were originally oriented toward "counterterrorism" have quickly broadened their scope to include all crimes, and those that began as "all crimes" have migrated only marginally to terrorism. This is the result of three quite predictable factors: fusion centers have to be valuable to their states, there is too little activity that is clearly terrorism related, and fusion center personnel have to use their time and skills constructively. Nonetheless, even if local policing needs are met through fusion-center funding and support, many of the activities of fusion-center analysts lend themselves to mission creep and violations of civil liberties.
{"title":"Beyond Counterterrorism: Data Sharing, Privacy, and Organizational Histories of DHS Fusion Centers","authors":"Priscilla M. Regan, T. Monahan","doi":"10.4018/jep.2013070101","DOIUrl":"https://doi.org/10.4018/jep.2013070101","url":null,"abstract":"Decentralized organizational approaches to security provision introduce new challenges for controlling information-sharing practices, safeguarding civil liberties, and ensuring accountability. Department of Homeland Security \"fusion centers,\" and the multiple organizations and databases that are part of fusion centers, engender an environment in which information is migrating beyond original purposes of counterterrorism. Indeed, based on intensive qualitative research, the authors have found that fusion centers that were originally oriented toward \"counterterrorism\" have quickly broadened their scope to include all crimes, and those that began as \"all crimes\" have migrated only marginally to terrorism. This is the result of three quite predictable factors: fusion centers have to be valuable to their states, there is too little activity that is clearly terrorism related, and fusion center personnel have to use their time and skills constructively. Nonetheless, even if local policing needs are met through fusion-center funding and support, many of the activities of fusion-center analysts lend themselves to mission creep and violations of civil liberties.","PeriodicalId":13695,"journal":{"name":"Int. J. E Politics","volume":"38 1","pages":"1-14"},"PeriodicalIF":0.0,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76334270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The events of 9/11 along with the bombarding in Madrid and London forced governments to resort to new structures of privacy safeguarding and electronic surveillance under the common denominator of terrorism and transnational crime fighting. Legislation as US PATRIOT Act and EU Data Retention Directive altered fundamentally the collection, processing and sharing methods of personal data, while it granted increased powers to police and law enforcement authorities concerning their jurisdiction in obtaining and processing personal information to an excessive degree. As an aftermath of the resulted opacity and the public outcry, a shift is recorded during the last years towards a more open governance by the implementation of open data and cloud computing practices in order to enhance transparency and accountability from the side of governments, restore the trust between the State and the citizens, and amplify the citizens' participation to the decision-making procedures. However, privacy and personal data protection are major issues in all occasions and, thus, must be safeguarded without sacrificing national security and public interest on one hand, but without crossing the thin line between protection and infringement on the other. Where this delicate balance stands, is the focal point of this paper trying to demonstrate that it is better to be cautious with open practices than hostage of clandestine practices.
{"title":"Privacy in the 21st Century: From the \"Dark Ages\" to \"Enlightenment\"?","authors":"P. Kitsos, Aikaterini Yannoukakou","doi":"10.4018/jep.2013070102","DOIUrl":"https://doi.org/10.4018/jep.2013070102","url":null,"abstract":"The events of 9/11 along with the bombarding in Madrid and London forced governments to resort to new structures of privacy safeguarding and electronic surveillance under the common denominator of terrorism and transnational crime fighting. Legislation as US PATRIOT Act and EU Data Retention Directive altered fundamentally the collection, processing and sharing methods of personal data, while it granted increased powers to police and law enforcement authorities concerning their jurisdiction in obtaining and processing personal information to an excessive degree. As an aftermath of the resulted opacity and the public outcry, a shift is recorded during the last years towards a more open governance by the implementation of open data and cloud computing practices in order to enhance transparency and accountability from the side of governments, restore the trust between the State and the citizens, and amplify the citizens' participation to the decision-making procedures. However, privacy and personal data protection are major issues in all occasions and, thus, must be safeguarded without sacrificing national security and public interest on one hand, but without crossing the thin line between protection and infringement on the other. Where this delicate balance stands, is the focal point of this paper trying to demonstrate that it is better to be cautious with open practices than hostage of clandestine practices.","PeriodicalId":13695,"journal":{"name":"Int. J. E Politics","volume":"30 1","pages":"15-29"},"PeriodicalIF":0.0,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85023004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
While most would suggest that more effective use of ICT bodes well for emergency services, there are issues associated with the introduction of such use. To explore these issues in Texas, the authors administered a survey of Texas Emergency Services Districts ESDs. These districts are charged with delivery of emergency and medical services throughout the state and receive modest tax revenue to fund operations. The results show that in Texas ESDs political and organizational factors are important. Budgets are closely related to the political process in the ESDs, so politics plays a central role. Organizational culture and prevailing sentiments in Texas ESDs are generally supportive of ICT adoption and use. While ICT is seen as essential to service delivery, survey results show that problems of interoperability of communication systems is an issue. The most commonly used ICTs include email, GPS, Google Maps, standard web pages, Wi-Fi networks, smart phones, reverse 911, emergency alerts, Facebook, and database management. GIS, You Tube, VOIP, Cloud Computing, Twitter, LinkedIn, Digital Billboards, 311 for non-emergency disaster, 3D mapping, blogs, podcasts, and Wikis were used by few ESDs. When social media are used, they are not used in such a way as to encourage wider participation of the community in information gathering rather they are used only as an alternative traditional delivery service from the ESDs to the community. Data analysis of past events is used to improve performance. Data management issues of significant concerns include privacy and security.
{"title":"Information and Communication Technology (ICT) for Emergency Services: A Survey of Texas Emergency Services Districts","authors":"D. Rahm, C. Reddick","doi":"10.4018/jep.2013070103","DOIUrl":"https://doi.org/10.4018/jep.2013070103","url":null,"abstract":"While most would suggest that more effective use of ICT bodes well for emergency services, there are issues associated with the introduction of such use. To explore these issues in Texas, the authors administered a survey of Texas Emergency Services Districts ESDs. These districts are charged with delivery of emergency and medical services throughout the state and receive modest tax revenue to fund operations. The results show that in Texas ESDs political and organizational factors are important. Budgets are closely related to the political process in the ESDs, so politics plays a central role. Organizational culture and prevailing sentiments in Texas ESDs are generally supportive of ICT adoption and use. While ICT is seen as essential to service delivery, survey results show that problems of interoperability of communication systems is an issue. The most commonly used ICTs include email, GPS, Google Maps, standard web pages, Wi-Fi networks, smart phones, reverse 911, emergency alerts, Facebook, and database management. GIS, You Tube, VOIP, Cloud Computing, Twitter, LinkedIn, Digital Billboards, 311 for non-emergency disaster, 3D mapping, blogs, podcasts, and Wikis were used by few ESDs. When social media are used, they are not used in such a way as to encourage wider participation of the community in information gathering rather they are used only as an alternative traditional delivery service from the ESDs to the community. Data analysis of past events is used to improve performance. Data management issues of significant concerns include privacy and security.","PeriodicalId":13695,"journal":{"name":"Int. J. E Politics","volume":"48 1","pages":"30-43"},"PeriodicalIF":0.0,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81146801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}