ABSTRACT:This article provides some considerations for understanding policies in libraries and how they intersect with intellectual freedom and social justice using Pierre Bourdieu’s theory of social fields and scale. The article includes a case study on the development of ALA’s meeting room guidelines and considerations for developing institutional policies.
ABSTRACT:This article provides some considerations for understanding policies in libraries and how they intersect with intellectual freedom and social justice using Pierre Bourdieu's theory of social fields and scale.文章包括一个关于制定 ALA 会议室指南的案例研究,以及制定机构政策的注意事项。
{"title":"Embodiment, Endorsement, and Policy: Considerations for Intellectual Freedom in the Library","authors":"Emily J. M. Knox","doi":"10.7560/ic59201","DOIUrl":"https://doi.org/10.7560/ic59201","url":null,"abstract":"ABSTRACT:This article provides some considerations for understanding policies in libraries and how they intersect with intellectual freedom and social justice using Pierre Bourdieu’s theory of social fields and scale. The article includes a case study on the development of ALA’s meeting room guidelines and considerations for developing institutional policies.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"2014 21","pages":"109 - 124"},"PeriodicalIF":0.6,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141706990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ABSTRACT:This study offers the first examination of the most widely downloaded short video app, TikTok, in its launching country, China, and the app’s impacts on young children’s language development. The analysis of quantitative data (N = 216) and qualitative data demonstrates significantly positive correlations between time spent watching TikTok and young children’s use of Standard Chinese in verbal communication. This suggests an earlier occurrence of Standard Chinese fluency in young children in dialect-speaking areas of China. The research findings of this study contribute to our understanding of the newly emerging and increasingly popular form of screen media—short-form video clips—and its impacts on young children’s language practices.
{"title":"How Does Short Video Viewing Influence Young Children’s Everyday Language Practices? A Case Study of China","authors":"Y. Yang, Tianru Guan","doi":"10.7560/ic59204","DOIUrl":"https://doi.org/10.7560/ic59204","url":null,"abstract":"ABSTRACT:This study offers the first examination of the most widely downloaded short video app, TikTok, in its launching country, China, and the app’s impacts on young children’s language development. The analysis of quantitative data (N = 216) and qualitative data demonstrates significantly positive correlations between time spent watching TikTok and young children’s use of Standard Chinese in verbal communication. This suggests an earlier occurrence of Standard Chinese fluency in young children in dialect-speaking areas of China. The research findings of this study contribute to our understanding of the newly emerging and increasingly popular form of screen media—short-form video clips—and its impacts on young children’s language practices.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"89 11","pages":"182 - 202"},"PeriodicalIF":0.6,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141697319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ABSTRACT:A new dataset (N = 7,456) analyzes women’s research authorship in the Association for Computing Machinery’s founding thirteen special interest groups (SIGs), a proxy for computer science. ACM SIGs expanded between 1970 and 2000; each experienced increasing women’s authorship. But diversity abounds. Several SIGs had less than 10 percent women authors, while university computing centers (SIGUCCS) exceeded 40 percent. Three SIGs experienced accelerating growth in women’s authorship; most, including a composite ACM, had decelerating growth. This research may encourage reform efforts, often focusing on general education or workforce factors (across “computer science”), to examine understudied dynamics within computer science that shaped changes in women’s participation.
摘要:一个新的数据集(N = 7,456)分析了女性在计算机协会(Association for Computing Machinery)创始的 13 个特殊兴趣小组(SIG)(计算机科学的代表)中的研究作者身份。ACM SIG 在 1970 年至 2000 年间不断扩大;每个 SIG 的女性作者人数都在增加。但是,多样性仍然存在。一些 SIG 的女性作者比例不足 10%,而大学计算机中心(SIGUCCS)的女性作者比例则超过了 40%。三个 SIG 的女性作者人数增长加速;而大多数 SIG(包括 ACM 的一个综合 SIG)的女性作者人数增长减速。这项研究可能会鼓励通常关注普通教育或劳动力因素(跨越 "计算机科学")的改革工作,以研究计算机科学内部影响女性参与变化的未被充分研究的动态因素。
{"title":"Dynamics of Gender Bias within Computer Science","authors":"Thomas J. Misa","doi":"10.7560/IC59203","DOIUrl":"https://doi.org/10.7560/IC59203","url":null,"abstract":"ABSTRACT:A new dataset (N = 7,456) analyzes women’s research authorship in the Association for Computing Machinery’s founding thirteen special interest groups (SIGs), a proxy for computer science. ACM SIGs expanded between 1970 and 2000; each experienced increasing women’s authorship. But diversity abounds. Several SIGs had less than 10 percent women authors, while university computing centers (SIGUCCS) exceeded 40 percent. Three SIGs experienced accelerating growth in women’s authorship; most, including a composite ACM, had decelerating growth. This research may encourage reform efforts, often focusing on general education or workforce factors (across “computer science”), to examine understudied dynamics within computer science that shaped changes in women’s participation.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"30 120","pages":"161 - 181"},"PeriodicalIF":0.6,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141696559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ABSTRACT:Sensitivity reading (SR)—the expert, ameliorative assessment of literary texts for superficial, inaccurate, or degradative depictions of oppressed groups—is a hotly contested service in the book industry, one that some hold is censorious. This article explicates how these detractors’ critiques function as informal suppression, drawing inspiration from Joanna Russ to expose key rhetorical strategies that reinforce a pernicious distinction between “literary” insidersand “nonliterary” out siders. The construction and propagation of this distinction ultimately encodes minoritized editors as “sensitive readers” who constitute a threat to the literary enterprise itself, thereby rationalizing their continued marginalization on aesthetic grounds.
{"title":"Literary versus Nonliterary People: Rhetorical Strategies of Derogation in the Sensitivity Reading Debate","authors":"E. E. Lawrence","doi":"10.7560/ic59202","DOIUrl":"https://doi.org/10.7560/ic59202","url":null,"abstract":"ABSTRACT:Sensitivity reading (SR)—the expert, ameliorative assessment of literary texts for superficial, inaccurate, or degradative depictions of oppressed groups—is a hotly contested service in the book industry, one that some hold is censorious. This article explicates how these detractors’ critiques function as informal suppression, drawing inspiration from Joanna Russ to expose key rhetorical strategies that reinforce a pernicious distinction between “literary” insidersand “nonliterary” out siders. The construction and propagation of this distinction ultimately encodes minoritized editors as “sensitive readers” who constitute a threat to the literary enterprise itself, thereby rationalizing their continued marginalization on aesthetic grounds.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"22 1","pages":"125 - 160"},"PeriodicalIF":0.6,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141690173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ABSTRACT:One of the most powerful ideas behind the potential of computer technology is that it could revolutionize education. To understand this idea historically, this article brings together computer science researchers with theories of education and childhood development. These researchers—Seymour Papert at MIT and Alan Kay and Adele Goldberg at Xerox’s Palo Alto Research Center—drew on a group of midtwentiethcentury education theorists. These cases offer a window into how computer researchers have read and interpreted scientific theories about education and childhood development that then make their way into computer technology or fail to do so entirely.
{"title":"Turtles, Tablets, and Boxes: Computer Technology and Education in the 1970s","authors":"Elizabeth Petrick","doi":"10.7560/ic58303","DOIUrl":"https://doi.org/10.7560/ic58303","url":null,"abstract":"ABSTRACT:One of the most powerful ideas behind the potential of computer technology is that it could revolutionize education. To understand this idea historically, this article brings together computer science researchers with theories of education and childhood development. These researchers—Seymour Papert at MIT and Alan Kay and Adele Goldberg at Xerox’s Palo Alto Research Center—drew on a group of midtwentiethcentury education theorists. These cases offer a window into how computer researchers have read and interpreted scientific theories about education and childhood development that then make their way into computer technology or fail to do so entirely.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"34 1","pages":"274 - 294"},"PeriodicalIF":0.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ABSTRACT:In 2021 China passed the Personal Information Protection Law. One of the most important features of the law is its regulation of sensitive personal information processing. This article examines how Chinese legal frameworks treat sensitive personal information and analyzes how the Personal Information Protection Law protects sensitive personal information by creating general rules for personal information processing and specific rules for sensitive information. This article also analyzes three obstacles to sensitive personal information protection: context sensitivity, the influence of widespread use of digital technologies, and the balance among various interests. In response, this article proposes three solutions: (1) a contextual strategy for risk governance, including contextual risk analysis and resilience; (2) algorithm compliance, including the algorithmic impact assessment and algorithmic supervision; and (3) a two-step test for balancing various interests.
{"title":"Examining Sensitive Personal Information Protection in China: Framework, Obstacles, and Solutions","authors":"Qian Li, Tao Jiang, Xijian Fan","doi":"10.7560/ic58302","DOIUrl":"https://doi.org/10.7560/ic58302","url":null,"abstract":"ABSTRACT:In 2021 China passed the Personal Information Protection Law. One of the most important features of the law is its regulation of sensitive personal information processing. This article examines how Chinese legal frameworks treat sensitive personal information and analyzes how the Personal Information Protection Law protects sensitive personal information by creating general rules for personal information processing and specific rules for sensitive information. This article also analyzes three obstacles to sensitive personal information protection: context sensitivity, the influence of widespread use of digital technologies, and the balance among various interests. In response, this article proposes three solutions: (1) a contextual strategy for risk governance, including contextual risk analysis and resilience; (2) algorithm compliance, including the algorithmic impact assessment and algorithmic supervision; and (3) a two-step test for balancing various interests.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"20 1","pages":"247 - 273"},"PeriodicalIF":0.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139300972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ABSTRACT:New media and new applications of existing media are typically seen as ways of distributing knowledge more effectively, often with hopes that this process will strengthen democracy. Adopting a history-of-knowledge approach, the authors analyze methods of knowledge circulation attending early print, nineteenth-century mechanics’ institutes and public libraries, early radio broadcasting, and explanatory journalism, providing a comparative historical framework for a recent new-media platform for distributing knowledge, The Conversation network. Appealing to a socially broad audience has consistently been a challenge. Efforts to distribute knowledge also reflected differences in prevailing media ecosystems, national systems of political economy, and contemporary social/political concerns.
{"title":"(New) Media and the Circulation of Knowledge: A Historical Framework for The Conversation Canada","authors":"Gene Allen, Nathan Lucky","doi":"10.7560/ic58301","DOIUrl":"https://doi.org/10.7560/ic58301","url":null,"abstract":"ABSTRACT:New media and new applications of existing media are typically seen as ways of distributing knowledge more effectively, often with hopes that this process will strengthen democracy. Adopting a history-of-knowledge approach, the authors analyze methods of knowledge circulation attending early print, nineteenth-century mechanics’ institutes and public libraries, early radio broadcasting, and explanatory journalism, providing a comparative historical framework for a recent new-media platform for distributing knowledge, The Conversation network. Appealing to a socially broad audience has consistently been a challenge. Efforts to distribute knowledge also reflected differences in prevailing media ecosystems, national systems of political economy, and contemporary social/political concerns.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"5 1","pages":"221 - 246"},"PeriodicalIF":0.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139297237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ABSTRACT:This research offers a critical context-sensitive discourse-historical analysis of a speech by James E. Shepard, the Black president and founder of North Carolina Central University. Shepard’s speech negotiated his identity as an educated Black man in the Jim Crow South by using perspectivation to switch between the point of view of an African American and that of a North Carolinian, thus establishing a bond with white members of his audience based on locational loyalty. A better understanding of how language is used by oppressed populations contributes to LIS scholars’ understandings of the usage of information in society.
ABSTRACT:This research offers a critical context-sensitive discourse-historical analysis of a speech by James E. Shepard, the Black president and founder of North Carolina Central University.谢泼德在演讲中运用视角转换法,在非裔美国人的视角和北卡罗来纳州人的视角之间切换,从而在地域忠诚的基础上与听众中的白人建立了联系,以此来协商他作为吉姆-克劳南方受过教育的黑人的身份。更好地理解受压迫人群如何使用语言有助于 LIS 学者理解信息在社会中的使用。
{"title":"Legitimate Language: James E. Shepard’s Use of Mitigation Strategies to Advance Black Education","authors":"Latesha Velez","doi":"10.7560/ic58304","DOIUrl":"https://doi.org/10.7560/ic58304","url":null,"abstract":"ABSTRACT:This research offers a critical context-sensitive discourse-historical analysis of a speech by James E. Shepard, the Black president and founder of North Carolina Central University. Shepard’s speech negotiated his identity as an educated Black man in the Jim Crow South by using perspectivation to switch between the point of view of an African American and that of a North Carolinian, thus establishing a bond with white members of his audience based on locational loyalty. A better understanding of how language is used by oppressed populations contributes to LIS scholars’ understandings of the usage of information in society.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"25 1","pages":"295 - 311"},"PeriodicalIF":0.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139304620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:New ideas and theories continue to emerge in the fast-changing field of translation studies. This article attempts to conceptualize translation beyond the linguistic confinement. It begins by reviewing the mainstream translation conceptualizations. It adopts information as the fundamental concept underlying translation and reveals concepts like source and target text, meaning transfer, and language to be more of special cases of the information-based concept of translation; translation is, as a result, expanded to include not only human actions of creation and behaviors, but also actions of other life forms, inanimate or artificial substances that are capable of meaning-making. The article thus proposes the information theory of translation (ITT). It defines translation as a meaning-making process of an agent within its specific informational boundary and time limit to achieve goals. Finally, key problems in translation studies are discussed.
{"title":"The Information Theory of Translation","authors":"Qiang Pi","doi":"10.7560/ic58203","DOIUrl":"https://doi.org/10.7560/ic58203","url":null,"abstract":"abstract:New ideas and theories continue to emerge in the fast-changing field of translation studies. This article attempts to conceptualize translation beyond the linguistic confinement. It begins by reviewing the mainstream translation conceptualizations. It adopts information as the fundamental concept underlying translation and reveals concepts like source and target text, meaning transfer, and language to be more of special cases of the information-based concept of translation; translation is, as a result, expanded to include not only human actions of creation and behaviors, but also actions of other life forms, inanimate or artificial substances that are capable of meaning-making. The article thus proposes the information theory of translation (ITT). It defines translation as a meaning-making process of an agent within its specific informational boundary and time limit to achieve goals. Finally, key problems in translation studies are discussed.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"58 1","pages":"166 - 179"},"PeriodicalIF":0.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45231452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
abstract:This article presents a taxonomy of the information practices apparent in an imageboard discussion thread that was influential in jump-starting the worldwide QAnon movement. After introducing QAnon with a review of literature, the author examines 4Chan /pol/ thread #147547939 (key in introducing multiple key elements of the QAnon narrative) to enumerate and classify the information practices deployed by discussion participants. In conclusion, the article expands beyond existing research's previous focus on outright fabrication, showing that early QAnon participants' information practices are also defined in large part by suspicious and idiosyncratic modes of reading authentic sources, not simply the propagation of falsehoods.
{"title":"Taxonomizing Information Practices in a Large Conspiracy Movement: Using Early QAnon as a Case Study","authors":"J. Hodges","doi":"10.7560/ic58201","DOIUrl":"https://doi.org/10.7560/ic58201","url":null,"abstract":"abstract:This article presents a taxonomy of the information practices apparent in an imageboard discussion thread that was influential in jump-starting the worldwide QAnon movement. After introducing QAnon with a review of literature, the author examines 4Chan /pol/ thread #147547939 (key in introducing multiple key elements of the QAnon narrative) to enumerate and classify the information practices deployed by discussion participants. In conclusion, the article expands beyond existing research's previous focus on outright fabrication, showing that early QAnon participants' information practices are also defined in large part by suspicious and idiosyncratic modes of reading authentic sources, not simply the propagation of falsehoods.","PeriodicalId":42337,"journal":{"name":"Information & Culture","volume":"58 1","pages":"129 - 144"},"PeriodicalIF":0.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48219654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}