A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Editorial independence in an automated media system
2021
Internet Policy Review
Preventing the manipulation of the media's audience is not only a question of media law, however. ...
insulate the audience from manipulation by (for example) advertisers. ...
doi:10.14763/2021.3.1569
fatcat:55mrlc7forcvti7gqw5h6ketvm
Developing the "Control Identity" Typology to Create More Effective Testicular Health Promotional Messaging
2015
American Journal of Men's Health
These weaknesses are, in part, driven by the failure to tailor messaging based on theoretical frameworks that segment population based off of meaningful psychological differences (see Campo, Askelson, ...
Knowledge-based CIAS variables were not used in the clustering process since the typology was to be based on health attitudes and values, and not knowledge. ...
doi:10.1177/1557988315621143
pmid:26669773
pmcid:PMC5987963
fatcat:rwtfko5mufdmzdjbh4bjgfy3ne
The Problem of Inclusion in Deliberative Environmental Valuation
2017
Environmental Values
In this review two deliberative valuation frameworks are compared. The first is grounded on the idea of rational discourse that emphasizes argument at the expense of other communicative strategies. ...
It seeks to secure inclusion through procedural rules and pre-requisites but fails to address the underlying democratic limitation of argumentation. ...
Rhetoric always accompanies argument, by situating the argument for a particular audience and giving it embodied style and tone. ...
doi:10.3197/096327117x14847335385472
fatcat:42xrs7msnzchxmngbabuzwhjzi
Hacking Nimes
2016
Zenodo
Yet many modern NIMEs could be hacked from smart-phones in the audience. ...
In this paper we discuss how NIMEs are in danger of being hacked, and yet how hacking can be an act of performance too. ...
[5] used twitter in TweetDreams to promote audience participation by aggregating audience tweets to alter the music instrument watching that twitter account. ...
doi:10.5281/zenodo.1176025
fatcat:u2u2cvjcdjbzjeqffjt7ius3q4
A Framework for Future Paintings
2019
Electronic Visualisation and the Arts London Conference
Specifically by implementing a Digital Painting Interface and software framework to allow for the manipulation of computer graphics through painting and exploring the differences between these two historically ...
This paper seeks to outline principles necessary to build with software in a dynamic way -leaving space for creative observation, discovery and evolution. ...
They are a complex aggregate effect of their components. Both are understood from the direct manipulation of their parameters, simplified abstractions. ...
doi:10.14236/ewic/eva2019.59
dblp:conf/eva/Batchelor19
fatcat:uu6lwvxdobbs7f4ihbs3y6xi2m
Mapping Boundaries of the Hostile Media Effect
2004
Journal of Communication
In addition, content evaluations based on perceived influence on oneself vs. influence on a broader audience suggested that the hostile media perception may be explained by perceived reach of the information ...
Consistent with the hypotheses, partisans saw the information as disagreeably biased in a news story format. ...
Aggregate data in the essay condition did not appear to support Hypothesis 1b. ...
doi:10.1111/j.1460-2466.2004.tb02613.x
fatcat:r26chde7y5fyzoqgaslpqicc4y
Mapping Boundaries of the Hostile Media Effect
2004
Journal of Communication
In addition, content evaluations based on perceived influence on oneself vs. influence on a broader audience suggested that the hostile media perception may be explained by perceived reach of the information ...
Consistent with the hypotheses, partisans saw the information as disagreeably biased in a news story format. ...
Aggregate data in the essay condition did not appear to support Hypothesis 1b. ...
doi:10.1093/joc/54.1.55
fatcat:gzs36gmwunfxpl7myl2mqtnw4i
Supporting Story Synthesis: Bridging the Gap between Visual Analytics and Storytelling
2019
IEEE Transactions on Visualization and Computer Graphics
We address this problem by proposing a general framework where data analysis and result presentation are linked by story synthesis, in which the analyst creates and organises story contents. ...
We propose a workflow for applying the proposed conceptual framework in designing visual analytics systems and demonstrate the generality of the approach by applying it to two diverse domains, social media ...
ACKNOWLEDGMENTS This research was supported by Fraunhofer Cluster of Excellence on "Cognitive Internet Technologies", by EU in projects DiSIEM and SoBigData, by DFG (German Research Foundation) in priority ...
doi:10.1109/tvcg.2018.2889054
pmid:30582542
fatcat:m7wdxykcavhsrfydpixolvvpv4
Employee Anonymous Online Dissent: Dynamics and Ethical Challenges for Employees, Targeted Organisations, Online Outlets, and Audiences
2017
Business Ethics Quarterly
ABSTRACT:This article aims to enhance understanding of employee anonymous online dissent (EAOD), a controversial phenomenon in contemporary digital environments. ...
We conceptualise and scrutinise EAOD as a communicative and interactional process among four key actors: dissenting employees, online outlet administrators, audiences, and targeted organisations. ...
of one's argument but not to persuade or manipulate by means of strategic instrumentalization" (Palazzo & Scherer, 2006: 81) . ...
doi:10.1017/beq.2017.29
fatcat:uzbusi6m4rhwraqf23uh5c5fhy
Why does individual learning endure when crowds are wiser?
[article]
2020
arXiv
pre-print
We propose an evolutionary model solving this paradox, provided agents (i) aim not only at information quality but also vie for audience and prestige, and (ii) do not only value accuracy but also reward ...
But if social learning is indeed more efficient (whether less costly or more accurate) than individual learning, it raises the question of why would anyone engage in individual information seeking, which ...
, preventing informed agents from having an audience. ...
arXiv:2012.14524v1
fatcat:nhyan5wdrbcf3ktym7evbe2dba
Ontology-Based Cyber Security Policy Implementation in Saudi Arabia
2018
Journal of Information Security
The revolutionary contribution of this research lies in the argument that ontology can assist in defining a version that describes the relationships between different cyber security additives. ...
It's going to gift retrospective reflections, in addition to proposed destiny paintings on selected methodologies and frameworks with a purpose to enable the implementation of this kind of policy. ...
Preventing and Securing Data from Cyber Crime Using New Authentication Method Based on Block Cipher Scheme The proposed method of preventing data against cybercrime based on block cipher scheme [21] . ...
doi:10.4236/jis.2018.94021
fatcat:h7soybhryjfnrpbjvjz2o3woyi
Active inoculation boosts attitudinal resistance against extremist persuasion techniques: a novel approach towards the prevention of violent extremism
2021
Behavioural Public Policy
The first measured participants' ability and confidence in assessing the manipulativeness of fictitious WhatsApp messages making use of an extremist manipulation technique before and after playing. ...
We find that playing Radicalise significantly improves participants' ability and confidence in spotting manipulative messages and the characteristics associated with vulnerability. ...
manipulation techniques and in terms of voluntary engagement with popular game-based interventions. ...
doi:10.1017/bpp.2020.60
fatcat:tg5vmbf3afbdnmuc5v3ijhxsom
The Online Museum: A "Placeless" Space of the "Civic Laboratory"
2014
Museum Anthropology Review
Building on Tony Bennett's (1995) understanding of a museum as a "civic laboratory," this study advances this framework by researching a museum space in a virtual world. ...
The analysis reveals that the historical development of online museum-audience research has gone through methodological stages similar to those of traditional visitor research. ...
an aggregate format. ...
doi:10.14434/mar.v8i1.3187
fatcat:77cpgxt5tfetzcka5alhlaymhy
THE BALKANS AND NON-MILITARY SECURITY THREATS – QUALITY COMPARATIVE ANALYSES OF RESILIENCE CAPABILITIES REGARDING HYBRID THREATS
2018
Security and Defence Quarterly
The methodology used was based on the approach with multi-valued sets of variables and conditions. ...
A theoretical framework was based on contemporary theories of state power and hybrid warfare concept. ...
In general, mvQCA was developed to meet the limitations of csQCA and prevent a simplifi ed dichotomous approach in multivalued, aggregated variables usage. ...
doi:10.5604/01.3001.0012.7224
fatcat:4qk5k55oizbadkjp66sjemjlhy
Policy and Political Marketing: Promoting Conflict as Policy
2020
Journal of Political Marketing
that are norm and value-based (democracy, security, justice … etc.). ...
Emotionally based political relationships need to be formed between the lobbyist and the target audience, the exchange in their relationship can be often be found in notions of intangible values and normsdemocracy ...
doi:10.1080/15377857.2020.1724426
fatcat:qyflpbt32ngnja4evbg227ngdu
« Previous
Showing results 1 — 15 out of 13,438 results