Search Results

1 - 8 of 8 items :

  • "journalism" x
  • Computer Sciences x
Clear All
Individual versus Organizational Computer Security and Privacy Concerns in Journalism

Times, February 2013. [Online]. Available: http://www.nytimes.com/2013/02/02/technology/washington-posts-joins-list-ofmedia-hacked-by-the-chinese.html?_r=0 [6] -, “Wall Street Journal Announces That It, Too, Was Hacked by the Chinese,” The New York Times, January 2013. [Online]. Available: http://www.nytimes.com/2013/02/01/technology/wall-street-journal-reports-attackby-china-hackers.html?ref=technology [7] Human Rights Watch, “With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law, and American

Open access
An Automatic Method to Identify Citations to Journals in News Stories: A Case Study of UK Newspapers Citing Web of Science Journals

.1136/bmj.310.6984.920 7719187 Entwistle V. 1995 Reporting research in medical journals and newspapers BMJ 310 6984 920 Evans, W. (1995). The mundane and the arcane: Prestige media coverage of social and natural science. Journalism & Mass Communication Quarterly, 72(1), 168–177. 10.1177/107769909507200114 Evans W. 1995 The mundane and the arcane: Prestige media coverage of social and natural science Journalism & Mass Communication Quarterly 72 1 168 177 Fanelli, D. (2013). Any publicity is better than none: Newspaper coverage increases

Open access
Identification and Prediction of Interdisciplinary Research Topics: A Study Based on the Concept Lattice Theory

–65. Liu P. Wu Q. 2014 Detecting disciplinary knowledge structure based on formal concept analysis: An empirical investigation on library and information science 58 18 50 65 Min, C., & Sun, J.J. (2014). Clustering analysis on discipline-crossing research hotspots: An example of library and information science and journalism and communication studies. Library and Information Service, 58(1), 109–116. Min C. Sun J.J. 2014 Clustering analysis on discipline-crossing research hotspots: An example of library and information science and journalism and

Open access
Under-reporting of Adverse Events in the Biomedical Literature

statements cannot be dismissed easily. If his allegations can be confirmed, with the implication that the CDC organization had the objective of proving the MMR vaccine safe, then the credibility of any CDC in-house or sponsored vaccine study has to be questioned. (iii) Food and Drug Administration (FDA) A Clinical Trial Violations Unreported Charles Seife is a journalism Professor at New York University. He performed a study whose objectives were “to identify published clinical trials in which an FDA inspection found significant evidence of objectionable

Open access
The Relationship between Motivation of Social Viewing Experiences, Satisfaction, and Loyalty in Sports Broadcasting

service: Comparative study on parasocial interaction and social presence among live sports streaming video service users. Korean Journal of Journalism & Communication Studies, 58 (1), 148-177. Lee, H., & Lim, J. (2009). Structural equation model analysis and AMOS 16.0 . Gyeonggi-do: Bobmunsa. Lee, J. M., Park, J. S., & Oh, J. S. (2007). A study on the influence of trust on customer loyalty through the moderation of commitment in the internet shopping environment. The Journal of Internet Electronic Commerce Research, 7 (1), 107-132. Lee, S. G., Han

Open access
Flying Eyes and Hidden Controllers: A Qualitative Study of People’s Privacy Perceptions of Civilian Drones in The US

. Risk analysis (2015). [14] Consumer Electronics Association (CEA). 2015. U.S. Consumer Electronics Sales and Forecasts. Technical Report. Consumer Electronics Association (CEA). https://www.cta.tech/News/News-Releases/Press-Releases/2015-Press-Releases/New-Tech-to-Drive-CE-Industry-Growth-in-2015,-Proj.aspx [15] Kathleen Bartzen Culver. 2014. From battlefield to newsroom: Ethical implications of drone technology in journalism. Journal of Mass Media Ethics 29, 1 (2014), 52-64. [16] Tamara Denning, Zakariya Dehlawi, and

Open access
SoK: Making Sense of Censorship Resistance Systems

Security, (Berkeley, CA, USA), pp. 227-240, USENIX Association, 2013. [35] Journalism and Media Studies Centre, “Weiboscope.” http://weiboscope.jmsc.hku.hk, Nov. 2015. [36] K. Fisher, “The Death of SuprNova.org.” Ars Technica, http://arstechnica.com/staff/2005/12/2153/, Dec. 2005. [37] D. Goodin, “Massive denial-of-service attack on GitHub tied to Chinese government.” Ars Technica, http://arstechnica.com/security/2015/03/massive-denial-of-service-attack-ongithub-tied-to-chinese-government/, Mar. 2015. [38] C

Open access