In the age of the smart machine: the future of work and power
In the age of the smart machine: the future of work and power
Identification of technological gatekeepers in the information technology profession
Journal of the American Society for Information Science
Inner-city gatekeepers: an exploratory survey of their information use environment
Journal of the American Society for Information Science - Special topic issue: youth issues in information science
Telematics and Informatics - Special issue on Internet consumers
Social Science Computer Review - State of the art of computing in the social sciences, 1999
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
ACM Transactions on Internet Technology (TOIT)
Internet and Intranet Security, Second Edition
Internet and Intranet Security, Second Edition
Republic.com
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography
The Control Revolution: How the Internet is Putting Individuals in Charge and Changing the World We Know
Understanding the Digital Economy: Data. Tools, and Research
Understanding the Digital Economy: Data. Tools, and Research
Translation-Mediated Communication in a Digital World: Facing the Challenges of Globalization and Localization
Communications of the ACM
Security in Computing
Global corporate web sites: an empirical investigation of content and design
Information and Management
Gatekeepers and Referrals in Services
Management Science
Bounded in Cyberspace: An Empirical Model of Self-Regulation in Virtual Communities
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 07
Digital Crossroads: American Telecommunications Policy in the Internet Age
Digital Crossroads: American Telecommunications Policy in the Internet Age
Information Politics on the Web
Information Politics on the Web
Corporate Computer and Network Security
Corporate Computer and Network Security
Code: Version 2.0
Egalitarians at the gate: one-sided gatekeeping practices in social media
Proceedings of the 2010 ACM conference on Computer supported cooperative work
Blogs: spinning a web of virality
Proceedings of the 2011 iConference
International Journal of Interdisciplinary Telecommunications and Networking
Bias in algorithmic filtering and personalization
Ethics and Information Technology
Hi-index | 0.00 |
Gatekeeping theories have been a popular heuristic for describing information control for years, but none have attained a full theoretical status in the context of networks. This article aims to propose a theory of network gatekeeping comprised of two components: identification and salience. Network gatekeeping identification lays out vocabulary and naming foundations through the identification of gatekeepers, gatekeeping, and gatekeeping mechanisms. Network gatekeeping salience, which is built on the bases of the network identification theory, utilizes this infrastructure to understand relationships among gatekeepers and between gatekeepers and gated, the entity subjected to a gatekeeping process. Network gatekeeping salience Salience refers to the degree to which gatekeepers give priority to competing gated claims. proposes identifying gated and their salience to gatekeepers by four attributes: (a) their political power in relation to the gatekeeper, (b) their information production ability, (c) their relationship with the gatekeeper, and (d) their alternatives in the context of gatekeeping. © 2008 Wiley Periodicals, Inc.