首页 > 最新文献

Policy and Internet最新文献

英文 中文
Issue Information 问题信息
IF 4.9 1区 文学 Q1 Social Sciences Pub Date : 2020-03-01 DOI: 10.1002/poi3.205
{"title":"Issue Information","authors":"","doi":"10.1002/poi3.205","DOIUrl":"https://doi.org/10.1002/poi3.205","url":null,"abstract":"","PeriodicalId":46894,"journal":{"name":"Policy and Internet","volume":null,"pages":null},"PeriodicalIF":4.9,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/poi3.205","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41539777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond Breitbart: Comparing Right‐Wing Digital News Infrastructures in Six Western Democracies 超越布赖特巴特:比较六个西方民主国家的右翼数字新闻基础设施
IF 4.9 1区 文学 Q1 Social Sciences Pub Date : 2020-03-01 DOI: 10.1002/poi3.219
Annett Heft, Eva Mayerhöffer, Susanne Reinhardt, C. Knüpfer
{"title":"Beyond Breitbart: Comparing Right‐Wing Digital News Infrastructures in Six Western Democracies","authors":"Annett Heft, Eva Mayerhöffer, Susanne Reinhardt, C. Knüpfer","doi":"10.1002/poi3.219","DOIUrl":"https://doi.org/10.1002/poi3.219","url":null,"abstract":"","PeriodicalId":46894,"journal":{"name":"Policy and Internet","volume":null,"pages":null},"PeriodicalIF":4.9,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/poi3.219","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42916222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 97
Countering Violent Extremist Narratives Online: Lessons From Offline Countering Violent Extremism 线上反暴力极端主义叙事:线下反暴力极端主义的经验教训
IF 4.9 1区 文学 Q1 Social Sciences Pub Date : 2020-03-01 DOI: 10.1002/poi3.204
Talene Bilazarian
{"title":"Countering Violent Extremist Narratives Online: Lessons From Offline Countering Violent Extremism","authors":"Talene Bilazarian","doi":"10.1002/poi3.204","DOIUrl":"https://doi.org/10.1002/poi3.204","url":null,"abstract":"","PeriodicalId":46894,"journal":{"name":"Policy and Internet","volume":null,"pages":null},"PeriodicalIF":4.9,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/poi3.204","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42427860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Countering Extremists on Social Media: Challenges for Strategic Communication and Content Moderation 在社交媒体上打击极端分子:战略传播和内容节制的挑战
IF 4.9 1区 文学 Q1 Social Sciences Pub Date : 2020-03-01 DOI: 10.1002/poi3.236
B. Ganesh, Jonathan Bright
Extremist exploitation of social media platforms is an important regulatory question for civil society, government, and the private sector. Extremists exploit social media for a range of reasons-from spreading hateful narratives and propaganda to financing, recruitment, and sharing operational information. Policy responses to this question fit under two headings, strategic communication and content moderation. At the center of both of these policy responses is a calculation about how best to limit audience exposure to extremist narratives and maintain the marginality of extremist views, while being conscious of rights to free expression and the appropriateness of restrictions on speech. This special issue on "Countering Extremists on Social Media: Challenges for Strategic Communication and Content Moderation" focuses on one form of strategic communication, countering violent extremism. In this editorial we discuss the background and effectiveness of this approach, and introduce five articles which develop multiple strands of research into responses and solutions to extremist exploitation of social media. We conclude by suggesting an agenda for future research on how multistakeholder initiatives to challenge extremist exploitation of social media are conceived, designed, and implemented, and the challenges these initiatives need to surmount.
极端分子利用社交媒体平台是公民社会、政府和私营部门面临的一个重要监管问题。极端分子利用社交媒体是出于一系列原因——从传播仇恨言论和宣传到融资、招募和分享行动信息。对这个问题的政策回应可以分为两大类:战略沟通和内容节制。这两种政策反应的核心都是考虑如何最好地限制观众接触极端主义叙事,保持极端主义观点的边缘性,同时意识到言论自由的权利和限制言论的适当性。本期《打击社交媒体上的极端分子:战略传播和内容节制的挑战》特刊重点关注一种战略传播形式,即打击暴力极端主义。在这篇社论中,我们讨论了这种方法的背景和有效性,并介绍了五篇文章,这些文章对极端分子利用社交媒体的反应和解决方案进行了多种研究。最后,我们提出了一个未来研究的议程,即如何构思、设计和实施多方利益相关者倡议,以挑战极端分子对社交媒体的利用,以及这些倡议需要克服的挑战。
{"title":"Countering Extremists on Social Media: Challenges for Strategic Communication and Content Moderation","authors":"B. Ganesh, Jonathan Bright","doi":"10.1002/poi3.236","DOIUrl":"https://doi.org/10.1002/poi3.236","url":null,"abstract":"Extremist exploitation of social media platforms is an important regulatory question for civil society, government, and the private sector. Extremists exploit social media for a range of reasons-from spreading hateful narratives and propaganda to financing, recruitment, and sharing operational information. Policy responses to this question fit under two headings, strategic communication and content moderation. At the center of both of these policy responses is a calculation about how best to limit audience exposure to extremist narratives and maintain the marginality of extremist views, while being conscious of rights to free expression and the appropriateness of restrictions on speech. This special issue on \"Countering Extremists on Social Media: Challenges for Strategic Communication and Content Moderation\" focuses on one form of strategic communication, countering violent extremism. In this editorial we discuss the background and effectiveness of this approach, and introduce five articles which develop multiple strands of research into responses and solutions to extremist exploitation of social media. We conclude by suggesting an agenda for future research on how multistakeholder initiatives to challenge extremist exploitation of social media are conceived, designed, and implemented, and the challenges these initiatives need to surmount.","PeriodicalId":46894,"journal":{"name":"Policy and Internet","volume":null,"pages":null},"PeriodicalIF":4.9,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/poi3.236","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42298424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Expressing and Challenging Racist Discourse on Facebook: How Social Media Weaken the “Spiral of Silence” Theory 在Facebook上表达和挑战种族主义话语:社交媒体如何削弱“沉默螺旋”理论
IF 4.9 1区 文学 Q1 Social Sciences Pub Date : 2020-03-01 DOI: 10.1002/POI3.197
I. Chaudhry, A. Gruzd
{"title":"Expressing and Challenging Racist Discourse on Facebook: How Social Media Weaken the “Spiral of Silence” Theory","authors":"I. Chaudhry, A. Gruzd","doi":"10.1002/POI3.197","DOIUrl":"https://doi.org/10.1002/POI3.197","url":null,"abstract":"","PeriodicalId":46894,"journal":{"name":"Policy and Internet","volume":null,"pages":null},"PeriodicalIF":4.9,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/POI3.197","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44175146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Countering Violent Extremism Online: The Experiences of Informal Counter Messaging Actors 网上反暴力极端主义:非正式反信息行为者的经验
IF 4.9 1区 文学 Q1 Social Sciences Pub Date : 2020-03-01 DOI: 10.1002/POI3.210
B. Lee
The online space is a haven for extremists of all kinds. Although efforts to remove violent and extremist content are increasing, there is a widely accepted need to also contest extremist messages with counter messages designed to undermine and disrupt extremist narratives. While the majority of academic focus has been on large and well‐funded efforts linked to governments, this article considers the experiences of informal actors who are active in contesting extremist messaging but who lack the support of large institutions. Informal actors come without some of the baggage that accompanies formal counter message campaigns, which have been attacked as lacking in credibility and constituting “just more government propaganda.” This has been noted by some of the wider countering violent extremism industry and the appetite for incorporating “real‐world” content in their campaigns seems to be rising. This article fills a gap in our knowledge of the experiences of informal counter messaging actors. Through a series of in‐depth qualitative interviews it demonstrates that, despite the potentially serious risks of incorporating greater levels of informal content, there is an appetite among informal actors to engage with formal campaigns where they can be selective over who they work with and maintain a degree of control.
网络空间是各种极端分子的天堂。尽管消除暴力和极端主义内容的努力正在增加,但人们普遍认为,还需要用旨在破坏和破坏极端主义叙述的反信息来对抗极端主义信息。虽然大多数学术界关注的是与政府有关的大型和资金充足的努力,但本文考虑的是那些积极反对极端主义信息但缺乏大型机构支持的非正式行动者的经历。非正式的行动者没有正式的反信息运动所伴随的一些包袱,后者被攻击为缺乏可信度,构成了“更多的政府宣传”。一些更广泛的反暴力极端主义行业已经注意到这一点,并且在他们的活动中加入“现实世界”内容的胃口似乎正在上升。本文填补了我们在非正式反消息传递参与者经验方面的知识空白。通过一系列深入的定性访谈,它表明,尽管合并更大程度的非正式内容存在潜在的严重风险,但非正式参与者对参与正式活动有兴趣,他们可以选择与谁合作并保持一定程度的控制。
{"title":"Countering Violent Extremism Online: The Experiences of Informal Counter Messaging Actors","authors":"B. Lee","doi":"10.1002/POI3.210","DOIUrl":"https://doi.org/10.1002/POI3.210","url":null,"abstract":"The online space is a haven for extremists of all kinds. Although efforts to remove violent and extremist content are increasing, there is a widely accepted need to also contest extremist messages with counter messages designed to undermine and disrupt extremist narratives. While the majority of academic focus has been on large and well‐funded efforts linked to governments, this article considers the experiences of informal actors who are active in contesting extremist messaging but who lack the support of large institutions. Informal actors come without some of the baggage that accompanies formal counter message campaigns, which have been attacked as lacking in credibility and constituting “just more government propaganda.” This has been noted by some of the wider countering violent extremism industry and the appetite for incorporating “real‐world” content in their campaigns seems to be rising. This article fills a gap in our knowledge of the experiences of informal counter messaging actors. Through a series of in‐depth qualitative interviews it demonstrates that, despite the potentially serious risks of incorporating greater levels of informal content, there is an appetite among informal actors to engage with formal campaigns where they can be selective over who they work with and maintain a degree of control.","PeriodicalId":46894,"journal":{"name":"Policy and Internet","volume":null,"pages":null},"PeriodicalIF":4.9,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/POI3.210","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45347001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Do Machines Replicate Humans? Toward a Unified Understanding of Radicalizing Content on the Open Social Web. 机器能复制人类吗?统一理解开放式社交网络上的激进内容
IF 4.9 1区 文学 Q1 Social Sciences Pub Date : 2020-03-01 Epub Date: 2019-09-26 DOI: 10.1002/poi3.223
Margeret Hall, Michael Logan, Gina S Ligon, Douglas C Derrick

The advent of the Internet inadvertently augmented the functioning and success of violent extremist organizations. Terrorist organizations like the Islamic State in Iraq and Syria (ISIS) use the Internet to project their message to a global audience. The majority of research and practice on web-based terrorist propaganda uses human coders to classify content, raising serious concerns such as burnout, mental stress, and reliability of the coded data. More recently, technology platforms and researchers have started to examine the online content using automated classification procedures. However, there are questions about the robustness of automated procedures, given insufficient research comparing and contextualizing the difference between human and machine coding. This article compares output of three text analytics packages with that of human coders on a sample of one hundred nonindexed web pages associated with ISIS. We find that prevalent topics (e.g., holy war) are accurately detected by the three packages whereas nuanced concepts (Lone Wolf attacks) are generally missed. Our findings suggest that naïve approaches of standard applications do not approximate human understanding, and therefore consumption, of radicalizing content. Before radicalizing content can be automatically detected, we need a closer approximation to human understanding.

互联网的出现无意中增强了暴力极端组织的运作和成功。像伊拉克和叙利亚伊斯兰国(ISIS)这样的恐怖组织利用互联网向全球受众传播他们的信息。大多数关于基于网络的恐怖主义宣传的研究和实践都使用人类编码人员对内容进行分类,这引起了严重的担忧,如倦怠、精神压力和编码数据的可靠性。最近,技术平台和研究人员开始使用自动分类程序检查在线内容。然而,由于对人类和机器编码之间的差异进行比较和背景化的研究不足,关于自动化程序的鲁棒性存在问题。本文将三个文本分析包的输出与人类编码人员在100个与ISIS相关的非索引网页上的输出进行比较。我们发现流行的话题(例如,圣战)被三个包准确地检测到,而微妙的概念(孤狼攻击)通常被遗漏。我们的研究结果表明,naïve标准应用程序的方法不接近人类的理解,因此消费,激进的内容。在自动检测激进内容之前,我们需要更接近人类的理解。
{"title":"Do Machines Replicate Humans? Toward a Unified Understanding of Radicalizing Content on the Open Social Web.","authors":"Margeret Hall, Michael Logan, Gina S Ligon, Douglas C Derrick","doi":"10.1002/poi3.223","DOIUrl":"10.1002/poi3.223","url":null,"abstract":"<p><p>The advent of the Internet inadvertently augmented the functioning and success of violent extremist organizations. Terrorist organizations like the Islamic State in Iraq and Syria (ISIS) use the Internet to project their message to a global audience. The majority of research and practice on web-based terrorist propaganda uses human coders to classify content, raising serious concerns such as burnout, mental stress, and reliability of the coded data. More recently, technology platforms and researchers have started to examine the online content using automated classification procedures. However, there are questions about the robustness of automated procedures, given insufficient research comparing and contextualizing the difference between human and machine coding. This article compares output of three text analytics packages with that of human coders on a sample of one hundred nonindexed web pages associated with ISIS. We find that prevalent topics (e.g., holy war) are accurately detected by the three packages whereas nuanced concepts (Lone Wolf attacks) are generally missed. Our findings suggest that naïve approaches of standard applications do not approximate human understanding, and therefore consumption, of radicalizing content. Before radicalizing content can be automatically detected, we need a closer approximation to human understanding.</p>","PeriodicalId":46894,"journal":{"name":"Policy and Internet","volume":null,"pages":null},"PeriodicalIF":4.9,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/poi3.223","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49266448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The Effects of Digital Media Images on Political Participation Online: Results of an Eye‐Tracking Experiment Integrating Individual Perceptions of “Photo News Factors” 数字媒体图像对在线政治参与的影响:一项整合个人“图片新闻因素”感知的眼动追踪实验结果
IF 4.9 1区 文学 Q1 Social Sciences Pub Date : 2020-02-21 DOI: 10.1002/poi3.235
S. Geise, Axel Heck, D. Panke
© 2020 The Authors. Policy & Internet published by Wiley Periodicals, Inc. on behalf of Policy Studies Organization. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited. The Effects of Digital Media Images on Political Participation Online: Results of an Eye‐Tracking Experiment Integrating Individual Perceptions of “Photo News Factors”
©2020作者。股份有限公司威利期刊代表政策研究组织出版的政策与互联网。这是一篇根据知识共享署名许可证条款的开放获取文章,该许可证允许在任何媒体上使用、分发和复制,前提是正确引用了原作。数字媒体图像对网络政治参与的影响:整合个人对“照片新闻因素”感知的眼动追踪实验结果
{"title":"The Effects of Digital Media Images on Political Participation Online: Results of an Eye‐Tracking Experiment Integrating Individual Perceptions of “Photo News Factors”","authors":"S. Geise, Axel Heck, D. Panke","doi":"10.1002/poi3.235","DOIUrl":"https://doi.org/10.1002/poi3.235","url":null,"abstract":"© 2020 The Authors. Policy & Internet published by Wiley Periodicals, Inc. on behalf of Policy Studies Organization. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited. The Effects of Digital Media Images on Political Participation Online: Results of an Eye‐Tracking Experiment Integrating Individual Perceptions of “Photo News Factors”","PeriodicalId":46894,"journal":{"name":"Policy and Internet","volume":null,"pages":null},"PeriodicalIF":4.9,"publicationDate":"2020-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/poi3.235","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42976542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Regulating Digital Campaigning: The Need for Precision in Calls for Transparency 规范数字竞选活动:呼吁透明度需要精确
IF 4.9 1区 文学 Q1 Social Sciences Pub Date : 2020-02-12 DOI: 10.1002/poi3.234
K. Dommett
{"title":"Regulating Digital Campaigning: The Need for Precision in Calls for Transparency","authors":"K. Dommett","doi":"10.1002/poi3.234","DOIUrl":"https://doi.org/10.1002/poi3.234","url":null,"abstract":"","PeriodicalId":46894,"journal":{"name":"Policy and Internet","volume":null,"pages":null},"PeriodicalIF":4.9,"publicationDate":"2020-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/poi3.234","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44819560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
No Backdoors: Investigating the Dutch Standpoint on Encryption 没有后门:调查荷兰对加密的立场
IF 4.9 1区 文学 Q1 Social Sciences Pub Date : 2020-02-06 DOI: 10.1002/poi3.233
J. Veen, S. Boeke
The use of end‐to‐end encryption services by terrorists and criminals has led many of the world's security and law enforcement agencies to emphasize the need for exceptional access: a backdoor in encryption. The debate involves governments and private parties, and can be approached through the different prisms of privacy, national security, and economics. This article provides historical background and context on the issue of government access to encryption, before focusing on the Dutch government's position on encryption. In January 2016 the Netherlands was the first country to adopt an official and unambiguous standpoint that ruled out backdoors in encryption. Building on interviews conducted with policymakers in various ministries, the authors elucidate the decision making process and identify key factors that led to the government's position. The impetus provided by Parliament, the role of the NGO Bits of Freedom, and an approach that transcended sectoral interests all contributed. While the unique political context and culture of the Netherlands complicates the application of lessons identified to other countries, the case study does illustrate how a multistakeholder process can lead to a clear standpoint of ruling out backdoors in encryption.
恐怖分子和罪犯使用端到端加密服务,导致世界上许多安全和执法机构强调需要特殊访问:加密后门。这场辩论涉及政府和私人党派,可以从隐私、国家安全和经济的不同角度进行。本文提供了政府访问加密问题的历史背景和背景,然后重点介绍了荷兰政府对加密的立场。2016年1月,荷兰是第一个采取官方明确立场排除加密后门的国家。在对各部委决策者进行采访的基础上,作者阐明了决策过程,并确定了导致政府立场的关键因素。议会提供的动力、非政府组织“自由碎片”的作用以及超越部门利益的方法都起到了推动作用。虽然荷兰独特的政治背景和文化使将已确定的经验教训应用于其他国家变得复杂,但案例研究确实说明了多方利益相关者程序如何能够导致排除加密后门的明确立场。
{"title":"No Backdoors: Investigating the Dutch Standpoint on Encryption","authors":"J. Veen, S. Boeke","doi":"10.1002/poi3.233","DOIUrl":"https://doi.org/10.1002/poi3.233","url":null,"abstract":"The use of end‐to‐end encryption services by terrorists and criminals has led many of the world's security and law enforcement agencies to emphasize the need for exceptional access: a backdoor in encryption. The debate involves governments and private parties, and can be approached through the different prisms of privacy, national security, and economics. This article provides historical background and context on the issue of government access to encryption, before focusing on the Dutch government's position on encryption. In January 2016 the Netherlands was the first country to adopt an official and unambiguous standpoint that ruled out backdoors in encryption. Building on interviews conducted with policymakers in various ministries, the authors elucidate the decision making process and identify key factors that led to the government's position. The impetus provided by Parliament, the role of the NGO Bits of Freedom, and an approach that transcended sectoral interests all contributed. While the unique political context and culture of the Netherlands complicates the application of lessons identified to other countries, the case study does illustrate how a multistakeholder process can lead to a clear standpoint of ruling out backdoors in encryption.","PeriodicalId":46894,"journal":{"name":"Policy and Internet","volume":null,"pages":null},"PeriodicalIF":4.9,"publicationDate":"2020-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/poi3.233","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41784259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Policy and Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1