103 research outputs found

    MEPs online: Understanding communication strategies for remote representatives

    Get PDF
    This article explores the use of the Internet by Members of the European Parliament (MEPs), assessing the adoption of online communication as well as its strategic uses. In particular we analysed the websites, weblogs and social networking site profiles of all MEPs who linked to an online presence from the European parliament homepage, a total of 440 MEPs representing all 27 member nations. Through a thorough analysis of the content using a scheme designed to record the presence and functionality of 103 specific features and tools and recency of updates, we assess how MEPs use the Internet to connect with a range of audiences; from journalists to loyal supporters. We find MEPs embracing a range of features which would be appealing to a wide range of different visitors. There is a minor generational divide among MEPs based both on their age and the length of time their country has been a member of the European Union. However overall we suggest there is an ebb and flow of innovation within the online political communication of these parliamentarians

    Broadcasting to the masses or building communities: Polish political parties online communication during the 2011 election

    Get PDF
    The professionalisation of political communication is an evolutionary process (Lilleker & Negrine, 2002), a process that adapts to trends in communication in order to better engage and persuade the public. One of the most dramatic developments in communication has been the move towards social communication via the Internet. It is argued to affect every area of public communication, from commercial advertising and public relations to education (Macnamara, 2010). It is no longer sufficient to have an online presence; we are now in an age of i-branding; with the ‘i’ standing for interactive. Yet, trends in online political electoral campaigning over recent years indicate a shallow adoption of Web 2.0 tools, features and platforms; limited interactivity; and managed co-production. The Internet is now embedded as a campaigning tool however, largely, the technologies are adapted to the norms of political communication rather than technologies impacting upon internal organizational structures, party relationships to members and supporters, or the content and style of their communication. We examine these themes, and develop them through a focus on the targeting and networking strategies of political parties, in more detail in the context of the Polish parliamentary election of 2011. Through a sophisticated content analysis and coding scheme our paper examines the extent to which parties use features that are designed to inform, engage, mobilise or allow interaction, which audiences they seek to communicate with and how these fit communication strategies. Comparing these findings with maps built from webcrawler analysis we build a picture of the strategies of the parties and the extent to which this links to short and long term political goals. This paper firstly develops our rationale for studying party and candidate use of the Internet during elections within the Polish context. Secondly we develop a conceptual framework which contrasts the politics as usual thesis (Margolis & Resnick, 2000) with arguments surrounding the social shaping of technologies (Lievrouw, 2006) and the impact on organisational adoption of communication technologies and post-Obama trends in Internet usage (Lilleker & Jackson, 2011) and posit that, despite the threats from an interactive strategy (Stromer-Galley, 2000) one would be expected within the context of a networked society (Van Dyjk, 2006). Following an overview of our methodology and innovative analysis strategy, we present our data which focuses on three key elements. Firstly we focus on the extent to which party and candidate websites inform, engage, mobilise or permit interaction (Lilleker et al, 2011). Secondly we assess the extent to which websites attract different visitor groups (Lilleker & Jackson, 2011) and build communities (Lilleker & Koc-Michalska, 2012). Thirdly we assess the reach strategies of the websites using Webcrawler technology which analyses the use of hyperlinks and whether parties lock themselves within cyberghettoes (Sunstein, 2007) or attempt to harness the power of the network (Benkler, 2006)

    cRIsp: Crowdsourcing Representation Information to Support Preservation

    Get PDF
    In this paper, we describe a new collaborative approach to the collection of representation information to ensure long term access to digital content. Representation information is essential for successful rendering of digital content in the future. Manual collection and maintenance of representation information has so far proven to be highly resource intensive and is compounded by the massive scale of the challenge, especially for repositories with no format limitations. This solution combats these challenges by drawing upon the wisdom and knowledge of the crowd to identify online sources of representation information, which are then collected, classified, and managed using existing tools. We suggest that nominations can be harvested and preserved by participating established web archives, which themselves could obviously benefit from such extensive collections. This is a low cost, low resource approach to collecting essential representation information of widespread relevance

    Technology in learning

    Get PDF
    An Association for Learning Technology and Technology Enhanced Learning Research Programme response to some questions from the Department of Business Innovation and Skills, with a foreword by John Cook and Richard Noss

    Artificial intelligence in the cyber domain: Offense and defense

    Get PDF
    Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis. In the cybersecurity domain, AI-based techniques can provide better cyber defense tools and help adversaries improve methods of attack. However, malicious actors are aware of the new prospects too and will probably attempt to use them for nefarious purposes. This survey paper aims at providing an overview of how artificial intelligence can be used in the context of cybersecurity in both offense and defense.Web of Science123art. no. 41

    Authority in the Virtual Sangat : Sikhism, Ritual and Identity in the Twenty-First Century

    Get PDF
    In her paper Authority in the Virtual Sanga. Sikhism, Ritual and Identity in the Twenty-First Century, Doris Jakobsh analyses the change of authority based on her research on Sikhs on the Internet. She stresses the Web as a ‘third place’ of communication among the Sikhs as well as the phenomenon of new authorities online. However, this does not imply the replacement of the traditional seats of authority, the Akal Takht, SGPC, or gurdwara managements, but one can recognize a significant shift away from these traditional sites of authority toward the ‘new authorities’, the intermediaries of cyberspace. Her analysis shows that this aspect of the Sikh experience brings with it the most profound challenges and, most importantly, a need to bridge the post-modern individual, i.e. ‘Sikh tradition’ intertwined and legitimated by the metanarrative, and the proliferation of new authorities who have become intermediaries of Sikhism online by virtue of their expertise within the digital domain

    Using Web Archives to Enrich the Live Web Experience Through Storytelling

    Get PDF
    Much of our cultural discourse occurs primarily on the Web. Thus, Web preservation is a fundamental precondition for multiple disciplines. Archiving Web pages into themed collections is a method for ensuring these resources are available for posterity. Services such as Archive-It exists to allow institutions to develop, curate, and preserve collections of Web resources. Understanding the contents and boundaries of these archived collections is a challenge for most people, resulting in the paradox of the larger the collection, the harder it is to understand. Meanwhile, as the sheer volume of data grows on the Web, storytelling is becoming a popular technique in social media for selecting Web resources to support a particular narrative or story . In this dissertation, we address the problem of understanding the archived collections through proposing the Dark and Stormy Archive (DSA) framework, in which we integrate storytelling social media and Web archives. In the DSA framework, we identify, evaluate, and select candidate Web pages from archived collections that summarize the holdings of these collections, arrange them in chronological order, and then visualize these pages using tools that users already are familiar with, such as Storify. To inform our work of generating stories from archived collections, we start by building a baseline for the structural characteristics of popular (i.e., receiving the most views) human-generated stories through investigating stories from Storify. Furthermore, we checked the entire population of Archive-It collections for better understanding the characteristics of the collections we intend to summarize. We then filter off-topic pages from the collections the using different methods to detect when an archived page in a collection has gone off-topic. We created a gold standard dataset from three Archive-It collections to evaluate the proposed methods at different thresholds. From the gold standard dataset, we identified five behaviors for the TimeMaps (a list of archived copies of a page) based on the page’s aboutness. Based on a dynamic slicing algorithm, we divide the collection and cluster the pages in each slice. We then select the best representative page from each cluster based on different quality metrics (e.g., the replay quality, and the quality of the generated snippet from the page). At the end, we put the selected pages in chronological order and visualize them using Storify. For evaluating the DSA framework, we obtained a ground truth dataset of hand-crafted stories from Archive-It collections generated by expert archivists. We used Amazon’s Mechanical Turk to evaluate the automatically generated stories against the stories that were created by domain experts. The results show that the automatically generated stories by the DSA are indistinguishable from those created by human subject domain experts, while at the same time both kinds of stories (automatic and human) are easily distinguished from randomly generated storie

    Environmental Virtual Observatories (EVOs): Prospects for knowledge co-creation and resilience in the Information Age

    Get PDF
    Developments in technologies are shaping information access globally. This presents opportunities and challenges for understanding the role of new technologies in sustainability research. This article focuses on a suite of technologies termed Environmental Virtual Observatories (EVOs) developed for communicating observations and simulation of environmental processes. A strength of EVOs is that they are open and decentralised, thus democratising flow and ownership of information between multiple actors. However, EVOs are discussed rarely beyond their technical aspects. By evaluating the evolution of EVOs, we illustrate why it is timely to engage with policy and societal aspects as well. While first generation EVOs are primed for scientists, second generation EVOs can have broader implications for knowledge co-creation and resilience through their participatory design

    Poland's 2011 Online Election Campaign: New Tools, New Professionalism, New Ways to Win Votes

    Get PDF
    This article analyzes the use of the online environment within the context of the Polish parliamentary election of 2011. Using traditional methods of content analysis, we find that parties tend to adhere to a professionalized model of campaigning, and adapting online tools to suit the objectives of the campaign. There also appears to be a recognition that their most likely visitors to these online presences would be converts, and so they attempt to mobilize supporters rather than convert browsers. New parties and candidates are more likely to target browsers, with the latter offering a more personalized experience to online visitors. Importantly, when analyzing the outcome of the contest, we find that being online matters for candidates when controlling for all other variables. Equally, the reach the candidate has, which may well influence their vote share, is dependent on offering a more personalized, representational image and having a frequently updated online presence that should encourage repeat visits. Cumulatively, we suggest the future of online campaigning must not only focus on having a presence, but on using it in a way that appeals to a range of visitors, encouraging repeat visits, and that this strategy could have a positive impact on election outcomes. © Taylor & Francis Group, LLC
    corecore