GATEKEEPING IN NETWORKS: A META- THEORETICAL FRAMEWORK FOR EXPLORING INFORMATION CONTROL
暂无分享,去创建一个
[1] M. Shaver. Who Owns the Media? Competition and Concentration in the Mass Media Industry , 2001 .
[2] Clarice N. Olien,et al. Structure and Constraints on Community Newspaper Gatekeepers , 1989 .
[3] J. P. Bailey,et al. Understanding Digital Markets: Review and Assessment , 2001 .
[4] Pamela J. Shoemaker,et al. Individual and Routine Forces in Gatekeeping , 2001 .
[5] K. Lewin. Frontiers in Group Dynamics , 1947 .
[6] Phillip Ein-Dor,et al. A Classification of Information Systems: Analysis and Interpretation , 1993, Inf. Syst. Res..
[7] Robert L. Jones,et al. News Selection Patterns from a State TTS-Wire , 1961 .
[8] Bruce H. Westley,et al. A conceptual model for communications research , 1955 .
[9] Minako O'Hagan,et al. Translation-mediated Communication in a Digital World: Facing the Challenges of Globalization and Localization , 2002 .
[10] Walter Gieber,et al. Across the Desk: A Study of 16 Telegraph Editors , 1956 .
[11] H Henry,et al. Cyberspace Self-Government: Town-Hall Democracy or Rediscovered Royalism? , 1997 .
[12] C. Sunstein. Republic.com , 2001 .
[13] Larry Press,et al. The Internet in India and China , 2002, First Monday.
[14] Antonis C. Stylianou,et al. Global corporate web sites: an empirical investigation of content and design , 2003, Inf. Manag..
[15] Remo Hacki,et al. The future of the networked company , 2001 .
[16] Carsten Sørensen,et al. Navigating the World Wide Web: bookmark maintenance architectures , 2001, Interact. Comput..
[17] Lawrence Lessig,et al. The future of ideas - the fate of the commons in a connected world , 2002 .
[18] Eszter Hargittai,et al. Second-level digital divide , 2002 .
[19] R. Watson,et al. U-commerce: Expanding the universe of marketing , 2002 .
[20] Younghee M. Kim,et al. Mass Communication Research -Major Issues and Future Directions- , 1976 .
[21] Antonio Gramsci. Selections from the prison notebooks , 2020, The Applied Theatre Reader.
[22] Edieal J. Pinker,et al. Gatekeepers and Referrals in Services , 2003, Manag. Sci..
[23] M. Collins,et al. Perceptions of e‐moderators about their roles and functions in moderating electronic mailing lists , 2000 .
[24] Kevin C. Desouza,et al. Information politics on the Web , 2007, J. Assoc. Inf. Sci. Technol..
[25] Kalle Lyytinen,et al. Reach and Grasp , 2004, MIS Q..
[26] M. Smith. Field Theory in Social Science: Selected Theoretical Papers. , 1951 .
[27] Lynda Lee Kaid,et al. Hyperlinking as Gatekeeping: online newspaper coverage of the execution of an American terrorist , 2003 .
[28] David C. Yen,et al. Awareness and challenges of Internet security , 2000, Inf. Manag. Comput. Secur..
[29] Robert D. Galliers,et al. Change as Crisis or Growth? Toward a Trans-disciplinary View of Information Systems as a Field of Study: A Response to Benbasat and Zmud's Call for Returning to the IT Artifact , 2003, J. Assoc. Inf. Syst..
[30] Gaye Tuchman. Making News by Doing Work: Routinizing the Unexpected , 1973, American Journal of Sociology.
[31] William Stallings. Business Data Communications , 1990 .
[32] Benjamin M. Compaine,et al. Re-examining the digital divide , 2001 .
[33] Kar Yan Tam,et al. Does Animation Attract Online Users' Attention? The Effects of Flash on Information Search Performance and Perceptions , 2004, Inf. Syst. Res..
[34] Dale A. Stirling,et al. Information rules , 2003, SGMD.
[35] Eszter Hargittai,et al. Second-Level Digital Divide: Differences in People's Online Skills , 2002, First Monday.
[36] Marc A. Smith. Invisible Crowds in Cyberspace: Mapping the Social Structure of the Usenet , 1999 .
[37] Ben H. Bagdikian,et al. The new media monopoly , 1983 .
[38] P. H. Friesen,et al. Archetypes of Strategy Formulation , 1978 .
[39] Kwangtae Park,et al. Empirical taxonomy of services and service products in electronic commerce , 2002, Electron. Commer. Res. Appl..
[40] Laurie Lewis,et al. Internet Access in U.S. Public Schools and Classrooms: 1994-2005. Highlights. NCES 2007-020. , 2006 .
[41] Eric G. Hansen,et al. The Culture of Strangers: Globalization, Localization and the Phenomenon of Exchange , 2002 .
[42] Keith W. Ross,et al. Computer networking - a top-down approach featuring the internet , 2000 .
[43] Ronald J. Deibert. Dark Guests and Great Firewalls: The Internet and Chinese Security Policy , 2002 .
[44] D. Kenny,et al. Contextual marketing--the real business of the Internet. , 2000, Harvard business review.
[45] Karine Nahon,et al. Cultured Technology: The Internet and Religious Fundamentalism , 2005, Inf. Soc..
[46] Jonathan D. Blake,et al. The National Information Infrastructure Initiative and the Emergence of the Electronic Superhighway , 1997 .
[47] Claudio U. Ciborra,et al. Crisis and foundations: an inquiry into the nature and limits of models and methods in the information systems discipline , 1998, J. Strateg. Inf. Syst..
[48] Seev Neumann,et al. Bounded in Cyberspace: An Empirical Model of Self-Regulation in Virtual Communities , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[49] 金榮熙. Mass Communication Research , 1976 .
[50] Ann E. Schlosser,et al. The Evolution of the Digital Divide: How Gaps in Internet Access May Impact Electronic Commerce , 2006, J. Comput. Mediat. Commun..
[51] Yaman Akdeniz. Internet Content Regulation: UK Government and the Control of Internet Content , 2001, Comput. Law Secur. Rev..
[52] Gary T. Marx,et al. An Ethics For The New Surveillance , 1998, Inf. Soc..
[53] Eric Abbott,et al. Comparing Decisions on Releases by TV and Newspaper Gatekeepers , 1989 .
[54] Matthew B. Miles,et al. Qualitative Data Analysis: An Expanded Sourcebook , 1994 .
[55] Shirley Gregor,et al. A Theory of Theories in Information Systems , 2002 .
[56] Michael D Birnhack,et al. The Invisible Handshake: The Reemergence of the State in the Digital Environment , 2003 .
[57] Edlth Seligmann Silva. In the age of smart machine - the future of work and power , 1992 .
[58] Richard E. Nisbett,et al. Human Inference: Strategies and Shortcomings of Social Judgement , 1981 .
[59] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[60] D. White. The “Gate Keeper”: A Case Study in the Selection of News , 1950 .
[61] Erik Brynjolfsson,et al. Global Village or Cyberbalkans: Modeling and Measuring the Integration of Electronic Communities , 2005, Manag. Sci..
[62] Helen Nissenbaum,et al. Shaping the Web: Why the Politics of Search Engines Matters , 2000, Inf. Soc..
[63] Abraham Z. Bass. Refining the “Gatekeeper” Concept: A UN Radio Case Study , 1969 .
[64] Shanthi Kalathil,et al. The Internet and State Control in Authoritarian Regimes: China, Cuba, and the Counterrevolution , 2001, First Monday.
[65] Hua Wang. State control of the internet in China. , 2022 .
[66] Sriram Raghavan,et al. Searching the Web , 2001, ACM Trans. Internet Techn..
[67] William Stallings. Business Data Communications (5th Edition) , 2004 .
[68] Ulrika Sjöberg,et al. The rise of the electronic individual: A study of how young Swedish teenagers use and perceive Internet , 1999, Telematics Informatics.
[69] Paul B. Snider. “Mr. Gates” Revisited: A 1966 Version of the 1949 Case Study , 1967 .
[70] Philip E. Agre,et al. Real-Time Politics: The Internet and the Political Process , 2002, Inf. Soc..
[71] R. Amit,et al. Value creation in E‐business , 2001 .
[72] Eszter Hargittai. Standing before the portals: non‐profit Websites in an age of commercial gatekeepers , 2000 .
[73] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[74] O. Gandy. Beyond Agenda Setting: Information Subsidies and Public Policy , 1982 .
[75] Abbe Mowshowitz,et al. Bias on the web , 2002, CACM.
[76] V.F. Kleist,et al. The code book: the science of secrecy from ancient egypt to quantum cryptography [Book Review] , 2002, IEEE Annals of the History of Computing.
[77] Mark Deuze,et al. Online Journalism: Modelling the First Generation of News Media on the World Wide Web , 2001, First Monday.
[78] Paul DiMaggio,et al. From the 'Digital Divide' to 'Digital Inequality': Studying Internet Use as Penetration Increases , 2001 .
[79] C. Lee Giles,et al. Accessibility of information on the web , 1999, Nature.
[80] Marianne W. Lewis,et al. Metatriangulation: Building Theory from Multiple Paradigms , 1999 .
[81] Stuart Hannabuss,et al. Digital Crossroads: American Telecommunications Policy in the Internet Age , 2006 .
[82] A. Tversky,et al. Judgment under Uncertainty: Heuristics and Biases , 1974, Science.
[83] Robin Teigland,et al. Collective Action and Knowledge Contribution in Electronic Networks of Practice , 2004, J. Assoc. Inf. Syst..
[84] M. Huysman,et al. The Impact of Social Capital on Project-Based Learning , 2004 .
[85] K. Lewin,et al. Field Theory in Social Science: Selected Theoretical Papers , 1951 .
[86] Constance Elise Porter,et al. A Typology of Virtual Communities: A Multi-Disciplinary Foundation for Future Research , 2006, J. Comput. Mediat. Commun..
[87] Michael H. Goldhaber,et al. The Attention Economy and the Net , 1997, First Monday.
[88] Richard C. Leone,et al. The Control Revolution , 1999 .
[89] E. Segev. Business unit strategy , 1997 .
[90] Adolfo S. Coronado,et al. Corporate Computer and Network Security , 2003 .
[91] Laura P. Hartman,et al. Technology and Ethics: Privacy in the Workplace , 2001 .
[92] V. Mays,et al. Educating Community Gatekeepers about Alcohol Abuse in Women: Changing Attitudes, Knowledge and Referral Practices , 1985, Journal of drug education.
[93] Charles R. Bantz. Organizational Communication, Media Industries, and Mass Communication , 1990 .
[94] Katherine A. Miltner. Discriminatory Filtering: CIPA's Effect on Our Nation's Youth and Why the Supreme Court Erred in Upholding the Constitutionality of the Children's Internet Protection Act , 2005 .
[95] Eszter Hargittai,et al. Open portals or closed gates? Channeling Content on the World Wide Web , 2000 .
[96] W. Bennett,et al. Gatekeeping, Indexing, and Live-Event News: Is Technology Altering the Construction of News? , 2003 .
[97] Brian Detlor,et al. Pre-Purchase Online Information Seeking: Search versus Browse , 2003, J. Electron. Commer. Res..
[98] L. Prusak,et al. How to invest in social capital. , 2001, Harvard business review.
[99] Graham Greenleaf,et al. An Endnote on Regulating Cyberspace: Architecture vs Law? , 1998 .
[100] Kalle Lyytinen,et al. Nothing At The Center?: Academic Legitimacy in the Information Systems Field , 2004, J. Assoc. Inf. Syst..
[101] Izak Benbasat,et al. Trust-Related Arguments in Internet Stores: A Framework for Evaluation , 2003, J. Electron. Commer. Res..
[102] P. Kollock,et al. Communities in Cyberspace , 2002 .
[103] J. Galtung,et al. The Structure of Foreign News , 1965 .
[104] Yochai Benkler,et al. From Consumers to Users: Shifting the Deeper Structures of Regulation Toward Sustainable Commons and User Access , 2000 .
[105] Andrei Z. Broder,et al. Graph structure in the Web , 2000, Comput. Networks.
[106] Eli Segev,et al. A Framework for a Grounded Theory of Corporate Policy , 1988 .
[107] George Ritzer,et al. Metatheorizing in sociology , 1991 .
[108] Jane B. Singer,et al. Envisioning the Caucus Community: Online Newspaper Editors Conceptualize Their Political Roles , 2003 .