Filters








13,438 Hits in 4.6 sec

Editorial independence in an automated media system

Max van Drunen
2021 Internet Policy Review  
Preventing the manipulation of the media's audience is not only a question of media law, however.  ...  insulate the audience from manipulation by (for example) advertisers.  ... 
doi:10.14763/2021.3.1569 fatcat:55mrlc7forcvti7gqw5h6ketvm

Developing the "Control Identity" Typology to Create More Effective Testicular Health Promotional Messaging

Michael J. Rovito, Thomas F. Gordon, Sarah B. Bass, Joseph DuCette, Ashley M. Tierney, Nicholas Coles
2015 American Journal of Men's Health  
These weaknesses are, in part, driven by the failure to tailor messaging based on theoretical frameworks that segment population based off of meaningful psychological differences (see Campo, Askelson,  ...  Knowledge-based CIAS variables were not used in the clustering process since the typology was to be based on health attitudes and values, and not knowledge.  ... 
doi:10.1177/1557988315621143 pmid:26669773 pmcid:PMC5987963 fatcat:rwtfko5mufdmzdjbh4bjgfy3ne

The Problem of Inclusion in Deliberative Environmental Valuation

Andrés Vargas, Alex Lo, Michael Howes, Nicholas Rohde
2017 Environmental Values  
In this review two deliberative valuation frameworks are compared. The first is grounded on the idea of rational discourse that emphasizes argument at the expense of other communicative strategies.  ...  It seeks to secure inclusion through procedural rules and pre-requisites but fails to address the underlying democratic limitation of argumentation.  ...  Rhetoric always accompanies argument, by situating the argument for a particular audience and giving it embodied style and tone.  ... 
doi:10.3197/096327117x14847335385472 fatcat:42xrs7msnzchxmngbabuzwhjzi

Hacking Nimes

Abram Hindle
2016 Zenodo  
Yet many modern NIMEs could be hacked from smart-phones in the audience.  ...  In this paper we discuss how NIMEs are in danger of being hacked, and yet how hacking can be an act of performance too.  ...  [5] used twitter in TweetDreams to promote audience participation by aggregating audience tweets to alter the music instrument watching that twitter account.  ... 
doi:10.5281/zenodo.1176025 fatcat:u2u2cvjcdjbzjeqffjt7ius3q4

A Framework for Future Paintings

Stuart Faromarz Batchelor
2019 Electronic Visualisation and the Arts London Conference  
Specifically by implementing a Digital Painting Interface and software framework to allow for the manipulation of computer graphics through painting and exploring the differences between these two historically  ...  This paper seeks to outline principles necessary to build with software in a dynamic way -leaving space for creative observation, discovery and evolution.  ...  They are a complex aggregate effect of their components. Both are understood from the direct manipulation of their parameters, simplified abstractions.  ... 
doi:10.14236/ewic/eva2019.59 dblp:conf/eva/Batchelor19 fatcat:uu6lwvxdobbs7f4ihbs3y6xi2m

Mapping Boundaries of the Hostile Media Effect

Albert C. Gunther, Kathleen Schmitt
2004 Journal of Communication  
In addition, content evaluations based on perceived influence on oneself vs. influence on a broader audience suggested that the hostile media perception may be explained by perceived reach of the information  ...  Consistent with the hypotheses, partisans saw the information as disagreeably biased in a news story format.  ...  Aggregate data in the essay condition did not appear to support Hypothesis 1b.  ... 
doi:10.1111/j.1460-2466.2004.tb02613.x fatcat:r26chde7y5fyzoqgaslpqicc4y

Mapping Boundaries of the Hostile Media Effect

A. C. Gunther
2004 Journal of Communication  
In addition, content evaluations based on perceived influence on oneself vs. influence on a broader audience suggested that the hostile media perception may be explained by perceived reach of the information  ...  Consistent with the hypotheses, partisans saw the information as disagreeably biased in a news story format.  ...  Aggregate data in the essay condition did not appear to support Hypothesis 1b.  ... 
doi:10.1093/joc/54.1.55 fatcat:gzs36gmwunfxpl7myl2mqtnw4i

Supporting Story Synthesis: Bridging the Gap between Visual Analytics and Storytelling

Siming Chen, Jie Li, Gennady Andrienko, Natalia Andrienko, Yun Wang, Phong H. Nguyen, Cagatay Turkay
2019 IEEE Transactions on Visualization and Computer Graphics  
We address this problem by proposing a general framework where data analysis and result presentation are linked by story synthesis, in which the analyst creates and organises story contents.  ...  We propose a workflow for applying the proposed conceptual framework in designing visual analytics systems and demonstrate the generality of the approach by applying it to two diverse domains, social media  ...  ACKNOWLEDGMENTS This research was supported by Fraunhofer Cluster of Excellence on "Cognitive Internet Technologies", by EU in projects DiSIEM and SoBigData, by DFG (German Research Foundation) in priority  ... 
doi:10.1109/tvcg.2018.2889054 pmid:30582542 fatcat:m7wdxykcavhsrfydpixolvvpv4

Employee Anonymous Online Dissent: Dynamics and Ethical Challenges for Employees, Targeted Organisations, Online Outlets, and Audiences

Silvia Ravazzani, Alessandra Mazzei
2017 Business Ethics Quarterly  
ABSTRACT:This article aims to enhance understanding of employee anonymous online dissent (EAOD), a controversial phenomenon in contemporary digital environments.  ...  We conceptualise and scrutinise EAOD as a communicative and interactional process among four key actors: dissenting employees, online outlet administrators, audiences, and targeted organisations.  ...  of one's argument but not to persuade or manipulate by means of strategic instrumentalization" (Palazzo & Scherer, 2006: 81) .  ... 
doi:10.1017/beq.2017.29 fatcat:uzbusi6m4rhwraqf23uh5c5fhy

Why does individual learning endure when crowds are wiser? [article]

Benoît de Courson, Léo Fitouchi, Jean-Philippe Bouchaud, Michael Benzaquen
2020 arXiv   pre-print
We propose an evolutionary model solving this paradox, provided agents (i) aim not only at information quality but also vie for audience and prestige, and (ii) do not only value accuracy but also reward  ...  But if social learning is indeed more efficient (whether less costly or more accurate) than individual learning, it raises the question of why would anyone engage in individual information seeking, which  ...  , preventing informed agents from having an audience.  ... 
arXiv:2012.14524v1 fatcat:nhyan5wdrbcf3ktym7evbe2dba

Ontology-Based Cyber Security Policy Implementation in Saudi Arabia

Amir Mohamed Talib, Fahad Omar Alomary, Hanan Fouad Alwadi, Rawan Rashed Albusayli
2018 Journal of Information Security  
The revolutionary contribution of this research lies in the argument that ontology can assist in defining a version that describes the relationships between different cyber security additives.  ...  It's going to gift retrospective reflections, in addition to proposed destiny paintings on selected methodologies and frameworks with a purpose to enable the implementation of this kind of policy.  ...  Preventing and Securing Data from Cyber Crime Using New Authentication Method Based on Block Cipher Scheme The proposed method of preventing data against cybercrime based on block cipher scheme [21] .  ... 
doi:10.4236/jis.2018.94021 fatcat:h7soybhryjfnrpbjvjz2o3woyi

Active inoculation boosts attitudinal resistance against extremist persuasion techniques: a novel approach towards the prevention of violent extremism

NABIL F. SALEH, JON ROOZENBEEK, FADI A. MAKKI, WILLIAM P. MCCLANAHAN, SANDER VAN DER LINDEN
2021 Behavioural Public Policy  
The first measured participants' ability and confidence in assessing the manipulativeness of fictitious WhatsApp messages making use of an extremist manipulation technique before and after playing.  ...  We find that playing Radicalise significantly improves participants' ability and confidence in spotting manipulative messages and the characteristics associated with vulnerability.  ...  manipulation techniques and in terms of voluntary engagement with popular game-based interventions.  ... 
doi:10.1017/bpp.2020.60 fatcat:tg5vmbf3afbdnmuc5v3ijhxsom

The Online Museum: A "Placeless" Space of the "Civic Laboratory"

Natalia Grincheva
2014 Museum Anthropology Review  
Building on Tony Bennett's (1995) understanding of a museum as a "civic laboratory," this study advances this framework by researching a museum space in a virtual world.  ...  The analysis reveals that the historical development of online museum-audience research has gone through methodological stages similar to those of traditional visitor research.  ...  an aggregate format.  ... 
doi:10.14434/mar.v8i1.3187 fatcat:77cpgxt5tfetzcka5alhlaymhy

THE BALKANS AND NON-MILITARY SECURITY THREATS – QUALITY COMPARATIVE ANALYSES OF RESILIENCE CAPABILITIES REGARDING HYBRID THREATS

Miroslav MITROVIC
2018 Security and Defence Quarterly  
The methodology used was based on the approach with multi-valued sets of variables and conditions.  ...  A theoretical framework was based on contemporary theories of state power and hybrid warfare concept.  ...  In general, mvQCA was developed to meet the limitations of csQCA and prevent a simplifi ed dichotomous approach in multivalued, aggregated variables usage.  ... 
doi:10.5604/01.3001.0012.7224 fatcat:4qk5k55oizbadkjp66sjemjlhy

Policy and Political Marketing: Promoting Conflict as Policy

Greg Simons
2020 Journal of Political Marketing  
that are norm and value-based (democracy, security, justice … etc.).  ...  Emotionally based political relationships need to be formed between the lobbyist and the target audience, the exchange in their relationship can be often be found in notions of intangible values and normsdemocracy  ... 
doi:10.1080/15377857.2020.1724426 fatcat:qyflpbt32ngnja4evbg227ngdu
« Previous Showing results 1 — 15 out of 13,438 results