The Handbook of Media Education Research


Book Description

Over the past forty years, media education research has emerged as a historical, epistemological and practical field of study. Shifts in the field—along with radical transformations in media technologies, aesthetic forms, ownership models, and audience participation practices—have driven the application of new concepts and theories across a range of both school and non-school settings. The Handbook on Media Education Research is a unique exploration of the complex set of practices, theories, and tools of media research. Featuring contributions from a diverse range of internationally recognized experts and practitioners, this timely volume discusses recent developments in the field in the context of related scholarship, public policy, formal and non-formal teaching and learning, and DIY and community practice. Offering a truly global perspective, the Handbook focuses on empirical work from Media and Information Literacy (MIL) practitioners from around the world. The book’s five parts explore global youth cultures and the media, trans-media learning, media literacy and scientific controversies, varying national approaches to media research, media education policies, and much more. A ground breaking resource on the concepts and theories of media research, this important book: Provides a diversity of views and experiences relevant to media literacy education research Features contributions from experts from a wide-range of countries including South Africa, Finland, India, Italy, Brazil, and many more Examines the history and future of media education in various international contexts Discusses the development and current state of media literacy education institutions and policies Addresses important contemporary issues such as social media use; datafication; digital privacy, rights, and divides; and global cultural practices. The Handbook of Media Education Research is an invaluable guide for researchers in the field, undergraduate and graduate students in media studies, policy makers, and MIL practitioners.




Data Protection in the Internet


Book Description

This book identifies and explains the different national approaches to data protection – the legal regulation of the collection, storage, transmission and use of information concerning identified or identifiable individuals – and determines the extent to which they could be harmonised in the foreseeable future. In recent years, data protection has become a major concern in many countries, as well as at supranational and international levels. In fact, the emergence of computing technologies that allow lower-cost processing of increasing amounts of information, associated with the advent and exponential use of the Internet and other communication networks and the widespread liberalization of the trans-border flow of information have enabled the large-scale collection and processing of personal data, not only for scientific or commercial uses, but also for political uses. A growing number of governmental and private organizations now possess and use data processing in order to determine, predict and influence individual behavior in all fields of human activity. This inevitably entails new risks, from the perspective of individual privacy, but also other fundamental rights, such as the right not to be discriminated against, fair competition between commercial enterprises and the proper functioning of democratic institutions. These phenomena have not been ignored from a legal point of view: at the national, supranational and international levels, an increasing number of regulatory instruments – including the European Union’s General Data Protection Regulation applicable as of 25 May 2018 – have been adopted with the purpose of preventing personal data misuse. Nevertheless, distinct national approaches still prevail in this domain, notably those that separate the comprehensive and detailed protective rules adopted in Europe since the 1995 Directive on the processing of personal data from the more fragmented and liberal attitude of American courts and legislators in this respect. In a globalized world, in which personal data can instantly circulate and be used simultaneously in communications networks that are ubiquitous by nature, these different national and regional approaches are a major source of legal conflict.




Records, Computers, and the Rights of Citizens


Book Description




Recent Developments in Individual and Organizational Adoption of ICTs


Book Description

In recent years, information and communication technologies (ICTs) have gained significant importance and become vital to the operations of both organizations and individuals. However, there are numerous factors that have affected the adoption of ICTs including access and accessibility barriers, political participation, and social empowerment. This has attracted the attention of researchers who are interested in understanding the socioeconomic influences of ICT adoption and how these technologies impact the infrastructure of modern organizational activities. Recent Developments in Individual and Organizational Adoption of ICTs is a collection of innovative research on the methods of organizational and infrastructural advancement through the application of information and communication technologies. While highlighting topics including internet banking, supply chain management, and e-government services, this book is ideally designed for managers, researchers, policymakers, politicians, business practitioners, educators, decision scientists, strategists, and students seeking current research on the socioeconomic impact of ICT adoption.




Public Response to Alerts and Warnings Using Social Media


Book Description

Following an earlier NRC workshop on public response to alerts and warnings delivered to mobile devices, a related workshop was held on February 28 and 29, 2012 to look at the role of social media in disaster response. This was one of the first workshops convened to look systematically at the use of social media for alerts and warnings-an event that brought together social science researchers, technologists, emergency management professionals, and other experts on how the public and emergency managers use social media in disasters.In addition to exploring how officials monitor social media, as well as the resulting privacy considerations, the workshop focused on such topics as: what is known about how the public responds to alerts and warnings; the implications of what is known about such public responses for the use of social media to provide alerts and warnings to the public; and approaches to enhancing the situational awareness of emergency managers. Public Response to Alerts and Warnings Using Social Media: Report of a Workshop on Current Knowledge and Research Gaps summarizes presentations made by invited speakers, other remarks by workshop participants, and discussions during parallel breakout sessions. It also points to potential topics for future research, as well as possible areas for future research investment, and it describes some of the challenges facing disaster managers who are seeking to incorporate social media into regular practice.




Reinventing Data Protection?


Book Description

data. Furthermore, the European Union established clear basic principles for the collection, storage and use of personal data by governments, businesses and other organizations or individuals in Directive 95/46/EC and Directive 2002/58/EC on Privacy and Electronic communications. Nonetheless, the twenty-?rst century citizen – utilizing the full potential of what ICT-technology has to offer – seems to develop a digital persona that becomes increasingly part of his individual social identity. From this perspective, control over personal information is control over an aspect of the identity one projects in the world. The right to privacy is the freedom from unreasonable constraints on one’s own identity. Transactiondata–bothtraf?candlocationdata–deserveourparticularattention. As we make phone calls, send e-mails or SMS messages, data trails are generated within public networks that we use for these communications. While traf?c data are necessary for the provision of communication services, they are also very sensitive data. They can give a complete picture of a person’s contacts, habits, interests, act- ities and whereabouts. Location data, especially if very precise, can be used for the provision of services such as route guidance, location of stolen or missing property, tourist information, etc. In case of emergency, they can be helpful in dispatching assistance and rescue teams to the location of a person in distress. However, p- cessing location data in mobile communication networks also creates the possibility of permanent surveillance.




APEC Privacy Framework


Book Description




Social Media and Democracy


Book Description

A state-of-the-art account of what we know and do not know about the effects of digital technology on democracy.




Consumer Law and Economics


Book Description

This edited volume covers the challenges currently faced by consumer law in Europe and the United States, ranging from fundamental theoretical questions, such as what goals consumer law should pursue, to practical questions raised by disclosure requirements, the General Data Protection Regulation and technology advancements. With governments around the world enacting powerful new regulations concerning consumers, consumer law has become an important topic in the economic analysis of law. Intended to protect consumers, these regulations typically seek to do so by giving them tools to make better decisions, or by limiting the consequences of their bad decisions. Legal scholars are divided, however, regarding the efficacy and effects of these regulations; some call for certain policies to be abolished, while others support a regulatory expansion.




Privacy and Capitalism in the Age of Social Media


Book Description

This book explores commodification processes of personal data and provides a critical framing of the ongoing debate of privacy in the Internet age, using the example of social media and referring to interviews with users. It advocates and expands upon two main theses: First, people’s privacy is structurally invaded in contemporary informational capitalism. Second, the best response to this problem is not accomplished by invoking the privacy framework as it stands, because it is itself part of the problematic nexus that it struggles against. Informational capitalism poses weighty problems for making the Internet a truly social medium, and aspiring to sustainable privacy simultaneously means to struggle against alienation and exploitation. In the last instance, this means opposing the capitalist form of association – online and offline.