首页 > 最新文献

Journal of Information Policy最新文献

英文 中文
Conducting Critical Analysis on International Communication Rights Standards: The Contributions of Graphical Knowledge Modeling 对国际通信权标准进行批判性分析:图形知识建模的贡献
IF 0.9 Q3 COMMUNICATION Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.2020.0329
N. Landry, Annie Pilote, Anne-Marie Brunelle
Using the computerized application of Modeling using Object Types (MOT) theory, this article examines the normative dimension of official interpretations of a corpus of core “communication rights” (the right to freedom of opinion and expression, the right to privacy, the right to participate in cultural life, and the right to education) enshrined and protected by the International Covenants on Human Rights. This article proposes a methodological contribution whereby the computerized application of knowledge modeling theory promotes the analysis and popularization of international human rights standards. Research findings draw attention to significant conceptual deficiencies included as part of international human rights standards. These deficiencies undermine the applicability of these standards and their relative usefulness in the context of complex sociopolitical issues relating to communication. In addition, this article underscores the need for communication rights studies to further integrate contributions from the field of international human rights law research. It demonstrates that interdisciplinary dialogue can open up new research agendas for communication rights scholars and contribute to a renewed critical analysis of international human rights standards.
本文通过使用对象类型建模(MOT)理论的计算机化应用,考察了官方对《国际人权公约》所规定和保护的核心“传播权利”(见解和表达自由权、隐私权、参与文化生活的权利和受教育权)的解释的规范性维度。本文提出了一种方法上的贡献,即知识建模理论的计算机化应用促进了国际人权标准的分析和普及。研究结果提请注意作为国际人权标准一部分的重大概念缺陷。这些缺陷损害了这些标准的适用性及其在与传播有关的复杂社会政治问题方面的相对有用性。此外,本文强调了传播权研究需要进一步整合国际人权法研究领域的贡献。它表明,跨学科对话可以为传播权学者开辟新的研究议程,并有助于对国际人权标准进行新的批判性分析。
{"title":"Conducting Critical Analysis on International Communication Rights Standards: The Contributions of Graphical Knowledge Modeling","authors":"N. Landry, Annie Pilote, Anne-Marie Brunelle","doi":"10.5325/jinfopoli.10.2020.0329","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0329","url":null,"abstract":"\u0000 Using the computerized application of Modeling using Object Types (MOT) theory, this article examines the normative dimension of official interpretations of a corpus of core “communication rights” (the right to freedom of opinion and expression, the right to privacy, the right to participate in cultural life, and the right to education) enshrined and protected by the International Covenants on Human Rights. This article proposes a methodological contribution whereby the computerized application of knowledge modeling theory promotes the analysis and popularization of international human rights standards. Research findings draw attention to significant conceptual deficiencies included as part of international human rights standards. These deficiencies undermine the applicability of these standards and their relative usefulness in the context of complex sociopolitical issues relating to communication. In addition, this article underscores the need for communication rights studies to further integrate contributions from the field of international human rights law research. It demonstrates that interdisciplinary dialogue can open up new research agendas for communication rights scholars and contribute to a renewed critical analysis of international human rights standards.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"15 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85234030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public Service Media as a Political Issue: How Does the European Parliament Approach PSM and Communication Rights? 公共服务媒体作为一个政治问题:欧洲议会如何处理PSM和传播权?
IF 0.9 Q3 COMMUNICATION Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.2020.0439
M. Rodríguez-Castro, F. Campos-Freire, A. López-Cepeda
Platform dominance, threats to media freedom and disinformation are some of the key phenomena that are shaping the current media environment in Europe and threatening citizens' communication rights. Within this context, Public Service Media (PSM) could have an important role to play, although explicit political support is needed. This article studies the main communication and PSM topics that have been discussed in the European Parliament during the past term (2014–2019) as well as the proposals drafted by political parties for the 2019 European election. The results show that the main proposals linked to PSM involve their independence and the need for increased collaboration, including the establishment of a European public service platform that would enhance the development of a European public sphere.
平台主导、对媒体自由的威胁和虚假信息是影响欧洲当前媒体环境并威胁公民传播权利的一些关键现象。在这方面,公共服务媒体可以发挥重要作用,尽管需要明确的政治支持。本文研究了过去一届(2014-2019年)欧洲议会讨论的主要传播和PSM主题,以及各政党为2019年欧洲选举起草的提案。结果表明,与PSM相关的主要建议涉及其独立性和加强合作的必要性,包括建立一个欧洲公共服务平台,以促进欧洲公共领域的发展。
{"title":"Public Service Media as a Political Issue: How Does the European Parliament Approach PSM and Communication Rights?","authors":"M. Rodríguez-Castro, F. Campos-Freire, A. López-Cepeda","doi":"10.5325/jinfopoli.10.2020.0439","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0439","url":null,"abstract":"\u0000 Platform dominance, threats to media freedom and disinformation are some of the key phenomena that are shaping the current media environment in Europe and threatening citizens' communication rights. Within this context, Public Service Media (PSM) could have an important role to play, although explicit political support is needed. This article studies the main communication and PSM topics that have been discussed in the European Parliament during the past term (2014–2019) as well as the proposals drafted by political parties for the 2019 European election. The results show that the main proposals linked to PSM involve their independence and the need for increased collaboration, including the establishment of a European public service platform that would enhance the development of a European public sphere.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"39 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82587871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Addressing Misinformation on Whatsapp in India Through Intermediary Liability Policy, Platform Design Modification, and Media Literacy 通过中介责任政策、平台设计修改和媒体素养来解决印度Whatsapp上的错误信息
IF 0.9 Q3 COMMUNICATION Pub Date : 2020-05-01 DOI: 10.5325/jinfopoli.10.2020.0276
Ben Medeiros, Pawanpreet Singh
Through a case study of lynchings in India that are perceived to have been catalyzed by misinformation on WhatsApp, this article explores how policymakers can mitigate social media misinformation without compromising public discourse. We evaluate the costs and benefits of three approaches to managing misinformation: intermediary liability reform, changes to platform design, and public information endeavors addressing user attitudes and behaviors. We find that while current media literacy endeavors seem somewhat misdirected, more locally attuned initiatives might productively address the underlying susceptibility to misinformation while avoiding the free speech compromises that come with stringent liability rules and restrictions on anonymous speech.
通过对印度私刑的案例研究,本文探讨了政策制定者如何在不影响公共话语的情况下减轻社交媒体上的错误信息。我们评估了管理错误信息的三种方法的成本和收益:中介责任改革,平台设计的变化,以及解决用户态度和行为的公共信息努力。我们发现,虽然目前的媒体素养努力似乎有些误导,但更适合当地的举措可能会有效地解决对错误信息的潜在敏感性,同时避免言论自由妥协,这些妥协伴随着严格的责任规则和对匿名言论的限制。
{"title":"Addressing Misinformation on Whatsapp in India Through Intermediary Liability Policy, Platform Design Modification, and Media Literacy","authors":"Ben Medeiros, Pawanpreet Singh","doi":"10.5325/jinfopoli.10.2020.0276","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0276","url":null,"abstract":"\u0000 Through a case study of lynchings in India that are perceived to have been catalyzed by misinformation on WhatsApp, this article explores how policymakers can mitigate social media misinformation without compromising public discourse. We evaluate the costs and benefits of three approaches to managing misinformation: intermediary liability reform, changes to platform design, and public information endeavors addressing user attitudes and behaviors. We find that while current media literacy endeavors seem somewhat misdirected, more locally attuned initiatives might productively address the underlying susceptibility to misinformation while avoiding the free speech compromises that come with stringent liability rules and restrictions on anonymous speech.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"35 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80173333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Trust Zones: A Path to a More Secure Internet Infrastructure 信任区域:通往更安全的互联网基础设施之路
IF 0.9 Q3 COMMUNICATION Pub Date : 2020-01-01 DOI: 10.2139/ssrn.3746071
D. D. Clark, K. Claffy
We propose a path to measurably improve a particular set of Internet infrastructure security weaknesses. By Internet infrastructure we mean the Internet as a packet transport architecture: the transport/network layer protocols (TCP/IP), the Internet routing protocol (BGP), and the naming protocol (DNS). Higher-layer security threats – such as malware, phishing, ransomware, fake news and trolling – get enormous media attention. But the less publicized security concerns with the Internet as a packet transport layer can, and sometimes do, destabilize the foundation on which all higher-level activities occur, and facilitate execution of higher-layer malicious actions. It is the foundational nature of the packet transport layer that motivates our focus. The insecurity of the Internet infrastructure poses a threat to users, businesses, governments, and society at large. As a further point of concern, many of the known security flaws in these systems have persisted for decades. Insecurity persists for five entangled reasons: lack of agreement on appropriate protective measures; misaligned incentives and negative externalities; inability for relevant actors to coordinate actions—especially across national boundaries; the generality of the Internet as a service platform, which allows malicious actors great fluidity in their attacks; and information asymmetries that leave those who need to act without sufficient knowledge to inform planning and execution. While many of these considerations can apply to security challenges more broadly, the generality of the Internet, the tensions among the different sets of private-sector actors, and the lack of any effective mechanism for high-level direction-setting compound the problem. We do not imagine that we are going to make the Internet “secure”, if by that we mean free of risk. Risk is a part of living, and the Internet experience will be no exception. Our goal should be to reduce the risk to the level that users are not fearful of using the Internet, while preserving the core benefits of the Internet—the freedom from unnecessary constraint. The call for better security is aspirational. Any serious attempt to improve security must begin by defining it operationally: breaking the problem into actionable parts; carefully studying the constraints, capabilities and incentives of the relevant actors; analyzing the merits and practicality of different approaches; and developing a strategy to achieve sufficient consensus to motivate progress. These steps are part of any serious system security analysis; our goal is to apply this line of reasoning to the Internet infrastructure layer.
我们提出了一种可衡量地改进一组特定的互联网基础设施安全弱点的途径。通过Internet基础设施,我们指的是作为数据包传输体系结构的Internet:传输/网络层协议(TCP/IP)、Internet路由协议(BGP)和命名协议(DNS)。更高层的安全威胁——比如恶意软件、网络钓鱼、勒索软件、假新闻和网络钓鱼——得到了媒体的极大关注。但是,对于作为数据包传输层的Internet,鲜为人知的安全问题可能(有时确实会)破坏所有高层活动发生的基础,并促进高层恶意行为的执行。正是数据包传输层的基本性质激发了我们的关注。互联网基础设施的不安全性对用户、企业、政府和整个社会构成了威胁。更值得关注的是,这些系统中许多已知的安全漏洞已经存在了几十年。不安全感的持续存在有五个相互纠缠的原因:在适当的保护措施上缺乏共识;错位的激励和负外部性;相关行为体无法协调行动,特别是跨国界的行动;互联网作为服务平台的通用性,使得恶意行为者的攻击具有很大的流动性;信息不对称使得那些需要采取行动的人没有足够的知识来指导计划和执行。虽然这些考虑中的许多因素可以更广泛地适用于安全挑战,但互联网的普遍性、不同私营部门参与者之间的紧张关系,以及缺乏任何有效的高层方向设定机制,都使问题复杂化。我们不认为我们将使互联网“安全”,如果我们的意思是没有风险。风险是生活的一部分,互联网体验也不例外。我们的目标应该是将风险降低到用户不害怕使用互联网的程度,同时保留互联网的核心好处——免受不必要的限制。加强安全的呼吁是令人鼓舞的。任何提高安全性的严肃尝试都必须从可操作的定义开始:将问题分解为可操作的部分;认真研究相关行为主体的约束条件、能力和激励因素;分析了不同方法的优点和实用性;并制定一项战略,以达成充分的共识,推动进展。这些步骤是任何严肃的系统安全分析的一部分;我们的目标是将这种推理方法应用到互联网基础设施层。
{"title":"Trust Zones: A Path to a More Secure Internet Infrastructure","authors":"D. D. Clark, K. Claffy","doi":"10.2139/ssrn.3746071","DOIUrl":"https://doi.org/10.2139/ssrn.3746071","url":null,"abstract":"We propose a path to measurably improve a particular set of Internet infrastructure security weaknesses. By Internet infrastructure we mean the Internet as a packet transport architecture: the transport/network layer protocols (TCP/IP), the Internet routing protocol (BGP), and the naming protocol (DNS). Higher-layer security threats – such as malware, phishing, ransomware, fake news and trolling – get enormous media attention. But the less publicized security concerns with the Internet as a packet transport layer can, and sometimes do, destabilize the foundation on which all higher-level activities occur, and facilitate execution of higher-layer malicious actions. It is the foundational nature of the packet transport layer that motivates our focus. The insecurity of the Internet infrastructure poses a threat to users, businesses, governments, and society at large. As a further point of concern, many of the known security flaws in these systems have persisted for decades. Insecurity persists for five entangled reasons: lack of agreement on appropriate protective measures; misaligned incentives and negative externalities; inability for relevant actors to coordinate actions—especially across national boundaries; the generality of the Internet as a service platform, which allows malicious actors great fluidity in their attacks; and information asymmetries that leave those who need to act without sufficient knowledge to inform planning and execution. While many of these considerations can apply to security challenges more broadly, the generality of the Internet, the tensions among the different sets of private-sector actors, and the lack of any effective mechanism for high-level direction-setting compound the problem. We do not imagine that we are going to make the Internet “secure”, if by that we mean free of risk. Risk is a part of living, and the Internet experience will be no exception. Our goal should be to reduce the risk to the level that users are not fearful of using the Internet, while preserving the core benefits of the Internet—the freedom from unnecessary constraint. The call for better security is aspirational. Any serious attempt to improve security must begin by defining it operationally: breaking the problem into actionable parts; carefully studying the constraints, capabilities and incentives of the relevant actors; analyzing the merits and practicality of different approaches; and developing a strategy to achieve sufficient consensus to motivate progress. These steps are part of any serious system security analysis; our goal is to apply this line of reasoning to the Internet infrastructure layer.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"7 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87716560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Policy Challenges in Mapping Internet Interdomain Congestion 映射互联网域间拥塞的政策挑战
IF 0.9 Q3 COMMUNICATION Pub Date : 2020-01-01 DOI: 10.5325/jinfopoli.10.2020.0001
claffy,Clark,Bauer,Dhamdhere
{"title":"Policy Challenges in Mapping Internet Interdomain Congestion","authors":"claffy,Clark,Bauer,Dhamdhere","doi":"10.5325/jinfopoli.10.2020.0001","DOIUrl":"https://doi.org/10.5325/jinfopoli.10.2020.0001","url":null,"abstract":"","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"331 1","pages":"1"},"PeriodicalIF":0.9,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sen’s Capabilities Approach and the Measurement of Communication Outcomes 森的能力方法与沟通结果的测量
IF 0.9 Q3 COMMUNICATION Pub Date : 2019-12-01 DOI: 10.5325/jinfopoli.9.1.0111
Tom Jacobson,Leanne Chang
Abstract Amartya Sen’s capabilities approach to development defines development as an increase in freedoms citizens have to choose preferred development options. While Sen’s more recent writings are theoretical and philosophical his work was originally based in social choice theory, which comprises a tradition in quantifying and analyzing collective preferences, or choices among preferences. This article argues that such aggregation procedures can be useful in research devoted to communication for development (C4D). They can be employed in evaluating the outcomes of processes intended to facilitate participation in decision making, in both small and large-scale project settings.
阿马蒂亚·森的能力发展方法将发展定义为公民选择首选发展方案的自由的增加。虽然森最近的作品是理论性和哲理性的,但他的工作最初是基于社会选择理论,这包括量化和分析集体偏好或偏好中的选择的传统。这篇文章认为,这种汇总程序在致力于传播促进发展(C4D)的研究中是有用的。它们可用于评价旨在促进参与小型和大型项目决策的过程的结果。
{"title":"Sen’s Capabilities Approach and the Measurement of Communication Outcomes","authors":"Tom Jacobson,Leanne Chang","doi":"10.5325/jinfopoli.9.1.0111","DOIUrl":"https://doi.org/10.5325/jinfopoli.9.1.0111","url":null,"abstract":"Abstract Amartya Sen’s capabilities approach to development defines development as an increase in freedoms citizens have to choose preferred development options. While Sen’s more recent writings are theoretical and philosophical his work was originally based in social choice theory, which comprises a tradition in quantifying and analyzing collective preferences, or choices among preferences. This article argues that such aggregation procedures can be useful in research devoted to communication for development (C4D). They can be employed in evaluating the outcomes of processes intended to facilitate participation in decision making, in both small and large-scale project settings.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"330 1","pages":"111-131"},"PeriodicalIF":0.9,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Capacity: Does It Matter? 网络安全能力:重要吗?
IF 0.9 Q3 COMMUNICATION Pub Date : 2019-12-01 DOI: 10.5325/jinfopoli.9.1.0280
William H. Dutton,Sadie Creese,Ruth Shillair,Maria Bada
Abstract National cybersecurity capacity building involves the development of managerial, technical, social, legal, policy, and regulatory initiatives by a growing ecology of actors to enhance the resilience of nations to cybersecurity breaches, cybercrime, and terrorism. Capacity building is therefore resource intensive, requiring attention across sectors of society, ranging from governments to Internet users. However, it is difficult to justify commitments to capacity building when the benefits of building national cybersecurity capacity are largely based on logical reasoning, limited case studies, anecdotal evidence, and expert opinion rather than systematic empirical evidence. To explore the value of capacity building, this article reports on the early phase of a systematic effort to bring together cross-national data from multiple sources to examine whether indicators related to the cybersecurity capacity of a nation help explain the experiences of Internet users—one of the final payoffs of cybersecurity capacity building.
国家网络安全能力建设涉及管理、技术、社会、法律、政策和监管举措的发展,以增强国家对网络安全漏洞、网络犯罪和恐怖主义的应变能力。因此,能力建设是资源密集型的,需要从政府到互联网用户等社会各部门的关注。然而,当建设国家网络安全能力的好处主要基于逻辑推理、有限的案例研究、轶事证据和专家意见,而不是系统的经验证据时,很难证明能力建设的承诺是合理的。为了探索能力建设的价值,本文报告了一项系统工作的早期阶段,该工作汇集了来自多个来源的跨国数据,以检验与一个国家的网络安全能力相关的指标是否有助于解释互联网用户的体验——网络安全能力建设的最终回报之一。
{"title":"Cybersecurity Capacity: Does It Matter?","authors":"William H. Dutton,Sadie Creese,Ruth Shillair,Maria Bada","doi":"10.5325/jinfopoli.9.1.0280","DOIUrl":"https://doi.org/10.5325/jinfopoli.9.1.0280","url":null,"abstract":"Abstract National cybersecurity capacity building involves the development of managerial, technical, social, legal, policy, and regulatory initiatives by a growing ecology of actors to enhance the resilience of nations to cybersecurity breaches, cybercrime, and terrorism. Capacity building is therefore resource intensive, requiring attention across sectors of society, ranging from governments to Internet users. However, it is difficult to justify commitments to capacity building when the benefits of building national cybersecurity capacity are largely based on logical reasoning, limited case studies, anecdotal evidence, and expert opinion rather than systematic empirical evidence. To explore the value of capacity building, this article reports on the early phase of a systematic effort to bring together cross-national data from multiple sources to examine whether indicators related to the cybersecurity capacity of a nation help explain the experiences of Internet users—one of the final payoffs of cybersecurity capacity building.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"347 1","pages":"280-306"},"PeriodicalIF":0.9,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sen’s Capabilities Approach and the Measurement of Communication Outcomes 森的能力方法与沟通结果的测量
IF 0.9 Q3 COMMUNICATION Pub Date : 2019-12-01 DOI: 10.5325/JINFOPOLI.9.2019.0111
Jacobson, Chang
Amartya Sen’s capabilities approach to development defines development as an increase in freedoms citizens have to choose preferred development options. While Sen’s more recent writings are theoretical and philosophical his work was originally based in social choice theory, which comprises a tradition in quantifying and analyzing collective preferences, or choices among preferences. This article argues that such aggregation procedures can be useful in research devoted to communication for development (C4D). They can be employed in evaluating the outcomes of processes intended to facilitate participation in decision making, in both small and large-scale project settings.
阿马蒂亚·森的能力发展方法将发展定义为公民选择首选发展方案的自由的增加。虽然森最近的作品是理论性和哲理性的,但他的工作最初是基于社会选择理论,这包括量化和分析集体偏好或偏好中的选择的传统。这篇文章认为,这种汇总程序在致力于传播促进发展(C4D)的研究中是有用的。它们可用于评价旨在促进参与小型和大型项目决策的过程的结果。
{"title":"Sen’s Capabilities Approach and the Measurement of Communication Outcomes","authors":"Jacobson, Chang","doi":"10.5325/JINFOPOLI.9.2019.0111","DOIUrl":"https://doi.org/10.5325/JINFOPOLI.9.2019.0111","url":null,"abstract":"\u0000 Amartya Sen’s capabilities approach to development defines development as an increase in freedoms citizens have to choose preferred development options. While Sen’s more recent writings are theoretical and philosophical his work was originally based in social choice theory, which comprises a tradition in quantifying and analyzing collective preferences, or choices among preferences. This article argues that such aggregation procedures can be useful in research devoted to communication for development (C4D). They can be employed in evaluating the outcomes of processes intended to facilitate participation in decision making, in both small and large-scale project settings.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"90 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84578391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Influence of Topography and Fracking on Cellular Network Availability in Unserved Areas of North Central Pennsylvania 地形和水力压裂对宾夕法尼亚州中北部未服务地区蜂窝网络可用性的影响
IF 0.9 Q3 COMMUNICATION Pub Date : 2019-12-01 DOI: 10.5325/jinfopoli.9.2019.0238
Cramer
North Central Pennsylvania suffers from sparse cellular network coverage due to the longstanding challenges of low populations and rugged topography that are common in other remote areas. However, in recent years the natural gas (“fracking”) industry has entered the region and enjoys much better network coverage than citizens. Based on field research by the author, this article analyzes the geographical, economic, and political causes of these patterns. The article considers the impact on local citizens and recommends solutions based on existing Pennsylvania law.
由于人口稀少和地形崎岖的长期挑战,宾夕法尼亚州中北部的蜂窝网络覆盖率很低,这在其他偏远地区很常见。然而,近年来天然气(“水力压裂”)行业已进入该地区,并享有比公民更好的网络覆盖。本文在实地调研的基础上,从地理、经济、政治等方面分析了这些格局形成的原因。本文考虑了对当地公民的影响,并根据宾夕法尼亚州现行法律提出了解决方案。
{"title":"The Influence of Topography and Fracking on Cellular Network Availability in Unserved Areas of North Central Pennsylvania","authors":"Cramer","doi":"10.5325/jinfopoli.9.2019.0238","DOIUrl":"https://doi.org/10.5325/jinfopoli.9.2019.0238","url":null,"abstract":"\u0000 North Central Pennsylvania suffers from sparse cellular network coverage due to the longstanding challenges of low populations and rugged topography that are common in other remote areas. However, in recent years the natural gas (“fracking”) industry has entered the region and enjoys much better network coverage than citizens. Based on field research by the author, this article analyzes the geographical, economic, and political causes of these patterns. The article considers the impact on local citizens and recommends solutions based on existing Pennsylvania law.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"75 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80918164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Normative Analysis in the Communications Field: Why We Should Distinguish Communicative Means and Ends of Justice 传播领域的规范分析:为什么要区分传播手段与正义目的
IF 0.9 Q3 COMMUNICATION Pub Date : 2019-12-01 DOI: 10.5325/jinfopoli.9.1.0056
Max Hänska
Abstract In the social sciences, we often face normative questions, not least because many areas of inquiry intersect with public policy. Understanding and explaining media and communications is one task, deciding how communication systems should be organized quite another, but normative analysis receives scant attention. This article explores normative analysis: what is involved in answering questions about justice and communication, about how sociopolitical and indeed communicative arrangements ought to be organized.
在社会科学中,我们经常面临规范性问题,尤其是因为许多研究领域与公共政策交叉。理解和解释媒体和传播是一项任务,决定如何组织传播系统则是另一项任务,但规范分析却很少受到关注。这篇文章探讨了规范分析:在回答关于正义和沟通的问题时涉及到什么,关于社会政治和沟通安排应该如何组织。
{"title":"Normative Analysis in the Communications Field: Why We Should Distinguish Communicative Means and Ends of Justice","authors":"Max Hänska","doi":"10.5325/jinfopoli.9.1.0056","DOIUrl":"https://doi.org/10.5325/jinfopoli.9.1.0056","url":null,"abstract":"Abstract In the social sciences, we often face normative questions, not least because many areas of inquiry intersect with public policy. Understanding and explaining media and communications is one task, deciding how communication systems should be organized quite another, but normative analysis receives scant attention. This article explores normative analysis: what is involved in answering questions about justice and communication, about how sociopolitical and indeed communicative arrangements ought to be organized.","PeriodicalId":55617,"journal":{"name":"Journal of Information Policy","volume":"343 3","pages":"56-78"},"PeriodicalIF":0.9,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information Policy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1