Open Access. Powered by Scholars. Published by Universities.®

Communication Technology and New Media Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Communication Technology and New Media

Piloting Participatory Arts-Based Methods For Exploring Indonesians’ Experiences In A U.S. Biotechnology Training Program, Jamie Loizzo, Richard E. Goodman, Mary Garbacz Nov 2018

Piloting Participatory Arts-Based Methods For Exploring Indonesians’ Experiences In A U.S. Biotechnology Training Program, Jamie Loizzo, Richard E. Goodman, Mary Garbacz

Journal of Applied Communications

Science communication faculty and professionals often train scientists about conveying and delivering critical and sometimes controversial scientific information to public audiences. This qualitative case study was situated in a U.S.-based biotechnology training program funded by the United States Department of Agriculture for connecting Indonesian science fellows with university biotechnology scientists and science communication experts. The researchers piloted a participatory arts-based approach for instructing and researching Indonesian scientists’, professionals’, and educators’ learning and experiences in the program. Participatory and arts-based research has the potential to uncover and bring to light participants’ perceptions. Participants used iPad multimedia kits to demonstrate their learning …


Hackers And The Dark Net: A Look Into Hacking And The Deep Web, Danielle Lefrancois, Christina Reilly, Russell Munn, Andy Strasel, Jess Garcia, Lindsey Chiles May 2018

Hackers And The Dark Net: A Look Into Hacking And The Deep Web, Danielle Lefrancois, Christina Reilly, Russell Munn, Andy Strasel, Jess Garcia, Lindsey Chiles

James Madison Undergraduate Research Journal (JMURJ)

The dark web is notorious for the illicit activities it facilitates, including human trafficking, narcotics and weapons sales, and illegally obtained information transfers. In order to combat this constant, invisible threat to security, governments and experts have called for tougher legislation and increased surveillance. But on the opposite end of all this crime and villainy lie persecuted groups who use the dark web and the anonymity it affords to protect themselves from retaliation. This article uses Atavist’s digital storytelling medium to explore how hackers “hack” the web, ethical questions surrounding the dark web, and policy solutions to cyber security.


Media Literacy Policy In Flanders – Belgium: From Parliamentary Discussions To Public Policy, Leo Van Audenhove, Hadewijch Vanwynsberghe, Ilse Mariën May 2018

Media Literacy Policy In Flanders – Belgium: From Parliamentary Discussions To Public Policy, Leo Van Audenhove, Hadewijch Vanwynsberghe, Ilse Mariën

Journal of Media Literacy Education

The discussion on media literacy in Flanders starts in the Flemish Parliament in 2006. It will take until 2013 before the Flemish Government will set up the Knowledge Center for Media Literacy—Mediawijs. Flanders is therefore rather late in establishing a dedicated institute for media literacy. The same can be said for developing a formal policy framework in relation to media literacy. This article starts with a theoretical discussion of three major trends in the current media literacy debate. The article moves on to describe and analyze Flanders media literacy policy debates and policy formulation. It highlights the development and remit …


Poverty, Literacy, And Social Transformation: An Interdisciplinary Exploration Of The Digital Divide, Amy J. Bach, Todd Wolfson, Jessica K. Crowell May 2018

Poverty, Literacy, And Social Transformation: An Interdisciplinary Exploration Of The Digital Divide, Amy J. Bach, Todd Wolfson, Jessica K. Crowell

Journal of Media Literacy Education

Harnessing scholarship focused on literacy and poverty, in this article we aim to complicate the common understanding of the digital divide. First, we argue that the dominant literature on the digital divide misses broader connections between technological exclusion and broader forms of economic and social exclusion. Accordingly, and following recent qualitative research on the digital divide, we believe future scholarship must examine the complicated relationships between poverty, inequality, and the digital divide and we look to poverty scholarship to understand the complicated and shifting nature of poverty. Finally, we make the case that scholars and practitioners focused on digital literacy …


“Hello? Are You Still There?” The Impact Of Social Media On Self-Disclosure And Reciprocity In Interpersonal Relationships: A Literature Review, Clara D. Costello Apr 2018

“Hello? Are You Still There?” The Impact Of Social Media On Self-Disclosure And Reciprocity In Interpersonal Relationships: A Literature Review, Clara D. Costello

Channels: Where Disciplines Meet

Social Media sites have become increasingly popular platforms for developing and maintaining interpersonal relationships. Although the usage of computer-mediated communication is normal in day-to-day life, the understanding behind how and why these relationships grow is scarce. This literature review considers relational elements such as self-disclosure and reciprocity, and how they are impacted by online elements such as an asynchronous context, controllability, and the disinhibition effect. Contrary to interpersonal relationships that develop in a physical context, the law of reciprocity is fulfilled and replaced by affirmation and recognition from relational partners, while self-disclosure continues to be a vital element within relationships. …


The Rhetorical Algorithm: Wikileaks And The Elliptical Secrets Of Donald J. Trump, Atilla Hallsby Feb 2018

The Rhetorical Algorithm: Wikileaks And The Elliptical Secrets Of Donald J. Trump, Atilla Hallsby

Secrecy and Society

Algorithms were a generative force behind many of the leaks and secrets that dominated the 2016 election season. Taking the form of the identity-anonymizing Tor software that protected the identity of leakers, mathematical protocols occupied a prominent place in the secrets generated during the presidential campaign. This essay suggests that the rhetorical trope of ellipsis offers an equally crucial, algorithmic formula for explaining the public production of these secrets and leaks. It then describes the 2016 DNC leak and Donald Trump’s “I love Wikileaks” moment using the trope of ellipsis, which marks a discursive omission or gap in official executive …