首页 > 最新文献

Journal of Information Policy最新文献

英文 中文
From Liability to Accountability: The Ethics of Citing Section 230 to Avoid the Obligations of Running a Social Media Platform 从责任到问责:引用第230条以避免运行社交媒体平台的义务的道德
IF 0.9 Q2 Social Sciences Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.1.0123
Benjamin W. Cramer
Abstract In the United States, Section 230 of the Communications Decency Act provides immunity from liability for Internet operators who host information submitted by their users. This article will argue that Section 230 allows firms to avoid accountability for the malfeasance that their platforms have enabled. With a focus on the ethical differences between liability (a legal concept) and accountability (an ethical concept), the article will recommend ways to compel today's social media platforms to address their responsibilities toward the proliferating misbehavior that they have enabled.
摘要在美国,《通信规范法》第230条规定,互联网运营商托管其用户提交的信息可免于承担责任。本文将论证第230条允许公司避免对其平台所导致的渎职行为承担责任。本文将重点关注责任(法律概念)和问责(道德概念)之间的道德差异,并提出一些方法,以迫使当今的社交媒体平台解决其对其所促成的激增的不当行为的责任。
{"title":"From Liability to Accountability: The Ethics of Citing Section 230 to Avoid the Obligations of Running a Social Media Platform","authors":"Benjamin W. Cramer","doi":"10.5325/jinfopoli.10.1.0123","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.1.0123","url":null,"abstract":"Abstract In the United States, Section 230 of the Communications Decency Act provides immunity from liability for Internet operators who host information submitted by their users. This article will argue that Section 230 allows firms to avoid accountability for the malfeasance that their platforms have enabled. With a focus on the ethical differences between liability (a legal concept) and accountability (an ethical concept), the article will recommend ways to compel today's social media platforms to address their responsibilities toward the proliferating misbehavior that they have enabled.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting Academic Freedom or Managing Reputation? An Evaluation of University Social Media Policies 保护学术自由还是管理学术声誉?大学社交媒体政策评估
IF 0.9 Q2 Social Sciences Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.2020.0151
Kwestel, Milano
University social media policies appear to favor institutional reputation over the tenets of academic freedom upon which research and teaching are based. A content analysis of social media policies of 82 doctoral-granting research universities found that policies used language and concepts that restrain online faculty speech. Two-thirds of policies are overseen by marketing departments rather than by committees that include faculty members as recommended by the American Association of University Professors. Contradictory boundary logic presented double binds for faculty who were enjoined to be brand ambassadors, creating tension for them and creating paradoxes for institutions whose social media policies contradict their commitment to freedom of research and teaching.
大学的社交媒体政策似乎更看重学校的声誉,而不是作为研究和教学基础的学术自由原则。一项对82所授予博士学位的研究型大学的社交媒体政策的内容分析发现,这些政策使用了限制教师在线言论的语言和概念。三分之二的政策是由营销部门监督的,而不是像美国大学教授协会(American Association of University Professors)建议的那样,由包括教职员工在内的委员会监督。矛盾的边界逻辑给那些被要求成为品牌大使的教师带来了双重束缚,给他们制造了紧张,给那些社交媒体政策与他们对研究和教学自由的承诺相矛盾的机构制造了悖论。
{"title":"Protecting Academic Freedom or Managing Reputation? An Evaluation of University Social Media Policies","authors":"Kwestel, Milano","doi":"10.5325/jinfopoli.10.2020.0151","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0151","url":null,"abstract":"\u0000 University social media policies appear to favor institutional reputation over the tenets of academic freedom upon which research and teaching are based. A content analysis of social media policies of 82 doctoral-granting research universities found that policies used language and concepts that restrain online faculty speech. Two-thirds of policies are overseen by marketing departments rather than by committees that include faculty members as recommended by the American Association of University Professors. Contradictory boundary logic presented double binds for faculty who were enjoined to be brand ambassadors, creating tension for them and creating paradoxes for institutions whose social media policies contradict their commitment to freedom of research and teaching.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80033725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Conducting Critical Analysis on International Communication Rights Standards: The Contributions of Graphical Knowledge Modeling 对国际通信权标准进行批判性分析:图形知识建模的贡献
IF 0.9 Q2 Social Sciences Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.1.0329
Normand Landry,Anne-Marie Pilote,Anne-Marie Brunelle
Abstract Using the computerized application of Modeling using Object Types (MOT) theory, this article examines the normative dimension of official interpretations of a corpus of core “communication rights” (the right to freedom of opinion and expression, the right to privacy, the right to participate in cultural life, and the right to education) enshrined and protected by the International Covenants on Human Rights. This article proposes a methodological contribution whereby the computerized application of knowledge modeling theory promotes the analysis and popularization of international human rights standards. Research findings draw attention to significant conceptual deficiencies included as part of international human rights standards. These deficiencies undermine the applicability of these standards and their relative usefulness in the context of complex sociopolitical issues relating to communication. In addition, this article underscores the need for communication rights studies to further integrate contributions from the field of international human rights law research. It demonstrates that interdisciplinary dialogue can open up new research agendas for communication rights scholars and contribute to a renewed critical analysis of international human rights standards.
摘要本文运用对象类型建模(MOT)理论的计算机化应用,考察了官方对《国际人权公约》所规定和保护的核心“传播权利”(见解和表达自由权、隐私权、参与文化生活的权利和受教育权)的解释的规范维度。本文提出了一种方法上的贡献,即知识建模理论的计算机化应用促进了国际人权标准的分析和普及。研究结果提请注意作为国际人权标准一部分的重大概念缺陷。这些缺陷损害了这些标准的适用性及其在与传播有关的复杂社会政治问题方面的相对有用性。此外,本文强调了传播权研究需要进一步整合国际人权法研究领域的贡献。它表明,跨学科对话可以为传播权学者开辟新的研究议程,并有助于对国际人权标准进行新的批判性分析。
{"title":"Conducting Critical Analysis on International Communication Rights Standards: The Contributions of Graphical Knowledge Modeling","authors":"Normand Landry,Anne-Marie Pilote,Anne-Marie Brunelle","doi":"10.5325/jinfopoli.10.1.0329","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.1.0329","url":null,"abstract":"Abstract Using the computerized application of Modeling using Object Types (MOT) theory, this article examines the normative dimension of official interpretations of a corpus of core “communication rights” (the right to freedom of opinion and expression, the right to privacy, the right to participate in cultural life, and the right to education) enshrined and protected by the International Covenants on Human Rights. This article proposes a methodological contribution whereby the computerized application of knowledge modeling theory promotes the analysis and popularization of international human rights standards. Research findings draw attention to significant conceptual deficiencies included as part of international human rights standards. These deficiencies undermine the applicability of these standards and their relative usefulness in the context of complex sociopolitical issues relating to communication. In addition, this article underscores the need for communication rights studies to further integrate contributions from the field of international human rights law research. It demonstrates that interdisciplinary dialogue can open up new research agendas for communication rights scholars and contribute to a renewed critical analysis of international human rights standards.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
More Than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws 不仅仅是一个嫌疑人:调查数据泄露,身份盗窃和数据泄露通知法之间的联系
IF 0.9 Q2 Social Sciences Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.2020.0045
F. Bisogni, H. Asghari
This article investigates the relationship between data breaches and identity theft, including the impact of Data Breach Notification Laws (DBNL) on these incidents (using empirical data and Bayesian modeling). We collected incident data on breaches and identity thefts over a 13-year timespan (2005–2017) in the United States. Our analysis shows that the correlation is driven by the size of a state. Enacting a DBNL still slightly reduces rates of identity theft; while publishing breaches notifications by Attorney Generals helps the broader security community learning about them. We conclude with an in-depth discussion on what the European Union can learn from the US experience.
本文研究了数据泄露和身份盗窃之间的关系,包括数据泄露通知法(DBNL)对这些事件的影响(使用经验数据和贝叶斯模型)。我们收集了美国13年间(2005-2017年)的数据泄露和身份盗窃事件。我们的分析表明,这种相关性是由一个州的大小驱动的。制定DBNL仍能略微降低身份盗窃率;同时发布司法部长的违规通知,帮助更广泛的安全社区了解它们。最后,我们深入讨论了欧盟可以从美国的经验中学到什么。
{"title":"More Than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws","authors":"F. Bisogni, H. Asghari","doi":"10.5325/jinfopoli.10.2020.0045","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0045","url":null,"abstract":"\u0000 This article investigates the relationship between data breaches and identity theft, including the impact of Data Breach Notification Laws (DBNL) on these incidents (using empirical data and Bayesian modeling). We collected incident data on breaches and identity thefts over a 13-year timespan (2005–2017) in the United States. Our analysis shows that the correlation is driven by the size of a state. Enacting a DBNL still slightly reduces rates of identity theft; while publishing breaches notifications by Attorney Generals helps the broader security community learning about them. We conclude with an in-depth discussion on what the European Union can learn from the US experience.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82897280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
From Liability to Accountability: The Ethics of Citing Section 230 to Avoid the Obligations of Running a Social Media Platform 从责任到问责:引用第230条以避免运行社交媒体平台的义务的道德
IF 0.9 Q2 Social Sciences Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.2020.0123
Cramer
In the United States, Section 230 of the Communications Decency Act provides immunity from liability for Internet operators who host information submitted by their users. This article will argue that Section 230 allows firms to avoid accountability for the malfeasance that their platforms have enabled. With a focus on the ethical differences between liability (a legal concept) and accountability (an ethical concept), the article will recommend ways to compel today's social media platforms to address their responsibilities toward the proliferating misbehavior that they have enabled.
在美国,《通信规范法》(Communications Decency Act)第230条规定,托管用户提交的信息的互联网运营商免于承担责任。本文将论证第230条允许公司避免对其平台所导致的渎职行为承担责任。本文将重点关注责任(法律概念)和问责(道德概念)之间的道德差异,并提出一些方法,以迫使当今的社交媒体平台解决其对其所促成的激增的不当行为的责任。
{"title":"From Liability to Accountability: The Ethics of Citing Section 230 to Avoid the Obligations of Running a Social Media Platform","authors":"Cramer","doi":"10.5325/jinfopoli.10.2020.0123","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0123","url":null,"abstract":"\u0000 In the United States, Section 230 of the Communications Decency Act provides immunity from liability for Internet operators who host information submitted by their users. This article will argue that Section 230 allows firms to avoid accountability for the malfeasance that their platforms have enabled. With a focus on the ethical differences between liability (a legal concept) and accountability (an ethical concept), the article will recommend ways to compel today's social media platforms to address their responsibilities toward the proliferating misbehavior that they have enabled.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82515927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Examining How GDPR Challenges Emerging Technologies 研究GDPR如何挑战新兴技术
IF 0.9 Q2 Social Sciences Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.1.0237
Rania El-Gazzar,Karen Stendal
Abstract Emerging technologies, particularly cloud computing, blockchain, Internet of Things, and artificial intelligence, have received noticeable attention from research and industry. These technologies contribute to innovation in public and private organizations, but threaten the privacy of individuals. The natural characteristics of these technologies are challenged by the new general data protection regulation (GDPR). In this article, we examine the compliance challenges between these technologies' characteristics and GDPR both individually and when combined. We identified compliance opportunities related to the characteristics of these technologies. We discuss possible approaches to address the compliance challenges identified and raise questions for further research in the area.
新兴技术,特别是云计算、区块链、物联网和人工智能,已经受到了学术界和产业界的广泛关注。这些技术促进了公共和私人组织的创新,但也威胁到了个人的隐私。这些技术的自然特性受到新的通用数据保护法规(GDPR)的挑战。在本文中,我们将研究这些技术的特性与GDPR之间的合规性挑战,无论是单独的还是结合起来的。我们确定了与这些技术的特征相关的遵从性机会。我们讨论了解决合规挑战的可能方法,并为该领域的进一步研究提出了问题。
{"title":"Examining How GDPR Challenges Emerging Technologies","authors":"Rania El-Gazzar,Karen Stendal","doi":"10.5325/jinfopoli.10.1.0237","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.1.0237","url":null,"abstract":"Abstract Emerging technologies, particularly cloud computing, blockchain, Internet of Things, and artificial intelligence, have received noticeable attention from research and industry. These technologies contribute to innovation in public and private organizations, but threaten the privacy of individuals. The natural characteristics of these technologies are challenged by the new general data protection regulation (GDPR). In this article, we examine the compliance challenges between these technologies' characteristics and GDPR both individually and when combined. We identified compliance opportunities related to the characteristics of these technologies. We discuss possible approaches to address the compliance challenges identified and raise questions for further research in the area.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Four Phases of Internet Policy Development: Risks to the Public Interest 互联网政策发展的四个阶段:对公共利益的风险
IF 0.9 Q2 Social Sciences Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.2020.0184
Wilkinson
This article investigates what risks to the public interest may arise in Internet policy development facilitated by Canada's communications regulator, the Canadian Radio-television and Telecommunications Commission (CRTC). It finds that different risks exist in four distinct phases of CRTC policy formation. Although these threats are wide-ranging, they often relate to the strategic behaviors of well-resourced groups that advocate for policy positions that are adjacent or contrary to the public interest, a regulatory process in some ways unsuited for robust civil society participation, and the resource constraints of public interest groups that regularly participate in this process.
本文调查了由加拿大通信监管机构加拿大广播电视和电信委员会(CRTC)推动的互联网政策制定中可能出现的公共利益风险。研究发现,在CRTC政策形成的四个不同阶段存在不同的风险。尽管这些威胁范围广泛,但它们往往与资源充足的团体的战略行为有关,这些团体倡导与公共利益相邻或相反的政策立场,监管过程在某些方面不适合公民社会的积极参与,以及定期参与这一过程的公共利益团体的资源限制。
{"title":"Four Phases of Internet Policy Development: Risks to the Public Interest","authors":"Wilkinson","doi":"10.5325/jinfopoli.10.2020.0184","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0184","url":null,"abstract":"\u0000 This article investigates what risks to the public interest may arise in Internet policy development facilitated by Canada's communications regulator, the Canadian Radio-television and Telecommunications Commission (CRTC). It finds that different risks exist in four distinct phases of CRTC policy formation. Although these threats are wide-ranging, they often relate to the strategic behaviors of well-resourced groups that advocate for policy positions that are adjacent or contrary to the public interest, a regulatory process in some ways unsuited for robust civil society participation, and the resource constraints of public interest groups that regularly participate in this process.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79193315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Functions of Data in the Competition between Audiovisual Media and Video Sharing Platforms for Advertising 数据在视听媒体与视频分享平台广告竞争中的作用
IF 0.9 Q2 Social Sciences Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.2020.0514
Sally Broughton Micova, Sabine Jacques
The European Union's (EU) 2018 Audiovisual Media Services Directive attempted to level the playing field upon which video sharing platforms and audiovisual media services compete by evening out advertising and consumer protection rules. Recent competition policy literature identifies data as a source of dominance in platform markets, suggesting its relevance to such situations where platforms compete with other services. Drawing on a study of this playing field involving stakeholder interviews and a comparison of regulatory frameworks, we present a nuanced understanding of imbalances across three distinct functions of data. We consider the policy implications, arguing for more equitable access to insight from aggregate, anonymized data and financial data.
欧盟(EU) 2018年《视听媒体服务指令》试图通过制定广告和消费者保护规则,为视频分享平台和视听媒体服务提供公平的竞争环境。最近的竞争政策文献将数据确定为平台市场主导地位的来源,表明它与平台与其他服务竞争的情况相关。通过对这一竞争环境的研究,包括利益相关者访谈和监管框架的比较,我们对数据的三种不同功能之间的失衡有了细致入微的理解。我们考虑了政策影响,主张更公平地获取汇总、匿名数据和财务数据的洞察力。
{"title":"The Functions of Data in the Competition between Audiovisual Media and Video Sharing Platforms for Advertising","authors":"Sally Broughton Micova, Sabine Jacques","doi":"10.5325/jinfopoli.10.2020.0514","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0514","url":null,"abstract":"\u0000 The European Union's (EU) 2018 Audiovisual Media Services Directive attempted to level the playing field upon which video sharing platforms and audiovisual media services compete by evening out advertising and consumer protection rules. Recent competition policy literature identifies data as a source of dominance in platform markets, suggesting its relevance to such situations where platforms compete with other services. Drawing on a study of this playing field involving stakeholder interviews and a comparison of regulatory frameworks, we present a nuanced understanding of imbalances across three distinct functions of data. We consider the policy implications, arguing for more equitable access to insight from aggregate, anonymized data and financial data.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85682016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Communication Rights for Social Bots?: Options for the Governance of Automated Computer-Generated Online Identities 社交机器人的通讯权?:计算机自动生成在线身份的治理方案
IF 0.9 Q2 Social Sciences Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.1.0549
Stefano Pedrazzi,Franziska Oehmer
Abstract Social bots, automated agents operating in social networks, are suspected of influencing online debates, opinion-formation processes and thus, the outcome of elections and votes. They do so by contributing to the dissemination of illegal content and disinformation and by jeopardizing an accurate perception of the relevance and popularity of persons, topics, or positions, through their potentially unlimited communication and networking activities, all under the false pretense of human identity. This paper identifies and discusses preventive and repressive governance options for dealing with social bots on state, organizational, and individual levels respecting the constitutional provisions on free expression and opinion-formation.
社交机器人是在社交网络中运行的自动代理,被怀疑影响在线辩论、意见形成过程,从而影响选举和投票的结果。他们的做法是助长非法内容和虚假信息的传播,并通过他们潜在的无限交流和网络活动,危害人们对人物、话题或立场的相关性和受欢迎程度的准确感知,所有这些都是在人类身份的虚假伪装下进行的。本文确定并讨论了在国家、组织和个人层面上处理社交机器人的预防性和压制性治理选择,这些选择尊重宪法关于自由表达和意见形成的规定。
{"title":"Communication Rights for Social Bots?: Options for the Governance of Automated Computer-Generated Online Identities","authors":"Stefano Pedrazzi,Franziska Oehmer","doi":"10.5325/jinfopoli.10.1.0549","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.1.0549","url":null,"abstract":"Abstract Social bots, automated agents operating in social networks, are suspected of influencing online debates, opinion-formation processes and thus, the outcome of elections and votes. They do so by contributing to the dissemination of illegal content and disinformation and by jeopardizing an accurate perception of the relevance and popularity of persons, topics, or positions, through their potentially unlimited communication and networking activities, all under the false pretense of human identity. This paper identifies and discusses preventive and repressive governance options for dealing with social bots on state, organizational, and individual levels respecting the constitutional provisions on free expression and opinion-formation.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stop Spreading The Data: PSM, Trust, and Third-Party Services 停止传播数据:PSM、信任和第三方服务
IF 0.9 Q2 Social Sciences Pub Date : 2020-05-01 DOI: 10.5325/JINFOPOLI.10.2020.0474
J. Sørensen, H. V. D. Bulck, Sokol Kosta
The article analyzes problems relating to public service media use of third-party services that track, collect, and analyze user behavior. The article extends a rights-based conception of privacy to privacy as a social phenomenon based in trust, relevant to public service media as “islands of trust.” However, data of European public and private media sites show that public service media, especially those that run advertising, show few differences with private media in their use of third-party services. The European Union's (EU's) General Data Protection Regulation (GDPR) did significantly change this, suggesting a need for public service media to prioritize ethical values over market considerations.
本文分析了与公共服务媒体使用跟踪、收集和分析用户行为的第三方服务有关的问题。本文将隐私权的概念从基于权利的概念扩展到隐私权作为一种基于信任的社会现象,将公共服务媒体视为“信任岛屿”。然而,欧洲公共和私人媒体网站的数据显示,公共服务媒体,特别是那些运行广告的媒体,在使用第三方服务方面与私人媒体几乎没有区别。欧盟(EU)的《通用数据保护条例》(GDPR)确实显著改变了这一点,表明公共服务媒体需要将道德价值观置于市场考虑之上。
{"title":"Stop Spreading The Data: PSM, Trust, and Third-Party Services","authors":"J. Sørensen, H. V. D. Bulck, Sokol Kosta","doi":"10.5325/JINFOPOLI.10.2020.0474","DOIUrl":"https://doi.org/10.5325/JINFOPOLI.10.2020.0474","url":null,"abstract":"\u0000 The article analyzes problems relating to public service media use of third-party services that track, collect, and analyze user behavior. The article extends a rights-based conception of privacy to privacy as a social phenomenon based in trust, relevant to public service media as “islands of trust.” However, data of European public and private media sites show that public service media, especially those that run advertising, show few differences with private media in their use of third-party services. The European Union's (EU's) General Data Protection Regulation (GDPR) did significantly change this, suggesting a need for public service media to prioritize ethical values over market considerations.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91115314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Journal of Information Policy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1