[pre-print Draft – December, 2007, Jasist-journal of the American Society for Information Science and Technology] toward a Theory of Network Gatekeeping: a Framework for Exploring Information Control
نویسندگان
چکیده
Gatekeeping theories have been a popular heuristic for describing information control for years, but none have attained a full theoretical status in the context of networks. This paper aims to propose a theory of Network Gatekeeping comprised of two components: Identification and Salience. Network Gatekeeping Identification lays out vocabulary and naming foundations through the identification of gatekeepers, gatekeeping and gatekeeping mechanisms. Network Gatekeeping Salience, which is built on the bases of the Network Identification Theory, utilizes this infrastructure to understand relationships among gatekeepers and between gatekeepers and gated, the entity subjected to a gatekeeping process. Network Gatekeeping Salience proposes identifying gated and their salience to gatekeepers by four attributes (1) their political power in relation to the gatekeeper; (2) their information production ability; (3) their relationship with the gatekeeper; and (4) their alternatives in the context of gatekeeping.
منابع مشابه
Toward a theory of network gatekeeping: A framework for exploring information control
Gatekeeping theories have been a popular heuristic for describing information control for years, but none have attained a full theoretical status in the context of networks. This article aims to propose a theory of network gatekeeping comprised of two components: identification and salience. Network gatekeeping identification lays out vocabulary and naming foundations through the identification...
متن کاملBarriers to Commercialization of Research Findings in Humanities in Iran
Nowadays, the changes in the dominant economic models, the emergence of knowledge-based economy and the lack of research budgets have caused the academic and research centers to pay attention to the commercialization of research findings. Although, there exist some studies pertaining to this topic, most of them have dealt with natural sciences rather than humanities and soft technology. To brid...
متن کاملCoPE: Enabling collaborative privacy management in online social networks
s on Human Factors in Computing Systems (pp. 4585–4590). New York: ACM Press. Buchanan, T., Paine, C., Joinson, A.N., & Reips, U. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology,
متن کاملStrategic Cost-Cutting in Information Technology: toward a Framework for Enhancing the Business Value of IT
The increasing dependency of many businesses with information technology (IT)and the high percentage of the IT investment in all invested capital in businessenvironment ask for more attention to this important driver of business. Thelimitation of capital budget forces the managers to look for more wise investment inIT. There are many cost-cutting techniques in the literature and each of them ha...
متن کاملDevelopment of measures of online privacy concern and protection for use on the Internet
As the Internet grows in importance, concerns about online privacy have arisen. We describe the development and validation of three short Internet-administered scales measuring privacy related attitudes ('Privacy Concern') and behaviors ('General Caution' and 'Technical Protection'). Internet Privacy Scales 1 In Press: Journal of the American Society for Information Science and Technology UNCOR...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007