International audience ; Together with politics, international news is often considered to be one of the most prestigious elds of journalism. However, making international news attractive is increasingly dicult. Today, one of the main strategies employed by journalists consists in mentioning individuals in the news. The reader is supposed to identify with the mentioned individual(s), and the story is expected to be more successful as a consequence. This paper investigates the interest of using quali-quantitative content analysis to study the semiotics of international news. We analyse six daily newspapers from three developed countries and examine three complementary aspects of the relation between individuals and international news : the level of personication, the type of individual mentioned and the geographical scale to which individuals is connected.
International audience ; Together with politics, international news is often considered to be one of the most prestigious elds of journalism. However, making international news attractive is increasingly dicult. Today, one of the main strategies employed by journalists consists in mentioning individuals in the news. The reader is supposed to identify with the mentioned individual(s), and the story is expected to be more successful as a consequence. This paper investigates the interest of using quali-quantitative content analysis to study the semiotics of international news. We analyse six daily newspapers from three developed countries and examine three complementary aspects of the relation between individuals and international news : the level of personication, the type of individual mentioned and the geographical scale to which individuals is connected.
International audience ; Together with politics, international news is often considered to be one of the most prestigious elds of journalism. However, making international news attractive is increasingly dicult. Today, one of the main strategies employed by journalists consists in mentioning individuals in the news. The reader is supposed to identify with the mentioned individual(s), and the story is expected to be more successful as a consequence. This paper investigates the interest of using quali-quantitative content analysis to study the semiotics of international news. We analyse six daily newspapers from three developed countries and examine three complementary aspects of the relation between individuals and international news : the level of personication, the type of individual mentioned and the geographical scale to which individuals is connected.
International audience ; Together with politics, international news is often considered to be one of the most prestigious elds of journalism. However, making international news attractive is increasingly dicult. Today, one of the main strategies employed by journalists consists in mentioning individuals in the news. The reader is supposed to identify with the mentioned individual(s), and the story is expected to be more successful as a consequence. This paper investigates the interest of using quali-quantitative content analysis to study the semiotics of international news. We analyse six daily newspapers from three developed countries and examine three complementary aspects of the relation between individuals and international news : the level of personication, the type of individual mentioned and the geographical scale to which individuals is connected.
International audience ; Together with politics, international news is often considered to be one of the most prestigious elds of journalism. However, making international news attractive is increasingly dicult. Today, one of the main strategies employed by journalists consists in mentioning individuals in the news. The reader is supposed to identify with the mentioned individual(s), and the story is expected to be more successful as a consequence. This paper investigates the interest of using quali-quantitative content analysis to study the semiotics of international news. We analyse six daily newspapers from three developed countries and examine three complementary aspects of the relation between individuals and international news : the level of personication, the type of individual mentioned and the geographical scale to which individuals is connected.
International audience ; Together with politics, international news is often considered to be one of the most prestigious elds of journalism. However, making international news attractive is increasingly dicult. Today, one of the main strategies employed by journalists consists in mentioning individuals in the news. The reader is supposed to identify with the mentioned individual(s), and the story is expected to be more successful as a consequence. This paper investigates the interest of using quali-quantitative content analysis to study the semiotics of international news. We analyse six daily newspapers from three developed countries and examine three complementary aspects of the relation between individuals and international news : the level of personication, the type of individual mentioned and the geographical scale to which individuals is connected.
The theoretical framework of vigilant interaction theory is used to examine information exchange and decision-making quality in virtual teams. Groups completed a hidden profile task in one of three geographic dispersion conditions: all members colocated, isolated, or mixed with two colocated and two isolated members. Vigilant interaction—discussion of task information, attention to other group members' information, discussion of positive and negative attributes of the alternatives, and systematic information processing—predicted decision quality. Explicit reminders of information differences predicted pooling of unique information. No evidence was found for difficulties in interaction and task performance due to subgroup faultline dynamics; instead vigilant interaction was highest in groups with mixed distributions, suggesting they exerted compensatory effort. Exploratory analyses suggested that temporal vigilance was lowest in completely distributed groups. Implications for new dimensions of the vigilant interaction theory framework are discussed.
The article gathers information about the Rule of Law Framework and analyzes the Rule of Law Framework and its implementation. It starts by introducing the Framework itself. It further maps out its implementation via the Recommendations made against Poland. The Recommendations are set within their context, and their reception by Poland follows. Building on the experience, the European Commission opened a discussion on the future of the Framework and its potential improvement. The discussion is touched upon in the article as well. The article analyzes the effectiveness of the Framework in a case study in Poland. It concludes that the Framework was ineffective with regard to achieving its three functions.
The government of Tanzania adopted an e-Government strategy in 2009 that is aimed at improving efficiency in government and providing better services to citizens. Information security is identified as one of the requirements for the successful e-Government implementation although the government has not adopted any standards or issued guidelines to government agencies with regards to information security. Comprehensive addressing of information security can be an expensive undertaking and without guidelines information security implementations may be more prone to failure. In a resource poor country such as Tanzania, there is a need for a cost effective and sustainable means of addressing information security in e-Government implementations. In this paper the authors present a case study of an e-Government interaction between a ministry and a government agency and the information security challenges identified in the implementation. In order to address these challenges an information security framework is conceptualized using action research. The framework is applied in the case study to address the identified challenges and the means to address future challenges in a sustainable manner is identified. Finally, the proposed framework is evaluated against Tanzanian and international metrics.
The government of Tanzania adopted an e-Government strategy in 2009 that is aimed at improving efficiency in government and providing better services to citizens. Information security is identified as one of the requirements for the successful e-Government implementation although the government has not adopted any standards or issued guidelines to government agencies with regards to information security. Comprehensive addressing of information security can be an expensive undertaking and without guidelines information security implementations may be more prone to failure. In a resource poor country such as Tanzania, there is a need for a cost effective and sustainable means of addressing information security in e-Government implementations. In this paper the authors present a case study of an e-Government interaction between a ministry and a government agency and the information security challenges identified in the implementation. In order to address these challenges an information security framework is conceptualized using action research. The framework is applied in the case study to address the identified challenges and the means to address future challenges in a sustainable manner is identified. Finally, the proposed framework is evaluated against Tanzanian and international metrics.
Purpose – The purpose of this paper is to attempt to fill the need to identify critical information security issues at national level, both technical and social in the Indian context, and create a framework of these issues to provide interesting managerial insights about their hierarchy. Current literature advocates relevance of both technical and social issues in a potential framework to address national and organizational information security concerns. Such a framework can guide users in developing insight for strategy in the maize of important information security issues and their intricate interdependency.
Design/methodology/approach – Delphi methodology is used to identify a set of topical issues with help from members of a cyber security group. These issues are further analyzed using Interpretive Structural Modeling (ISM) to impose order and direction to the complex relationships among them.
Findings – The analysis using ISM creates a framework of these issues and provides interesting managerial insights about their hierarchy. These insights are used to recommend prioritized action for information security at national and organizational levels.
Research limitations/implications – The highlight of this research is ingenious deployment of two idea engineering methods in developing interpretable structural model of 25 information security issues. This model provides valuable insights and can guide the policy formulation. This is the key contribution of this paper. It needs hardly any emphasis on the need for continuous search of all technical and social issues and formulating policies and programs using experts" judgment in a rigorous manner. Subsequent research may scale up to the global level for extension and validation by empanelling Delphi experts from nations belonging to different regions. Time-variant analysis can be attempted with the help of System Dynamics Modeling using causal-loop diagrams to account for the supportive and inhibiting influences of various issues. This approach has the potential to generate more realistic insights that can inform policy formulation.
Practical implications – It brings about key information security issues connected with its various facets, viz. national/organizational level initiatives, supportive processes, capabilities and objectives. These issues, identified by Indian experts in the Indian context, offer a method that one could apply in other national contexts and see whether substantial differences occur, and how other experts prioritize these issues. The analysis of social issues along with technical issues using the ISM tool provides us insights that are considered applicable to a larger context than India. The policy and program formulations in other nations can benefit from the insights generated by this research. The fast-paced proliferation of technology and its resultant vulnerabilities have given birth to an underground economy of malware trading by criminals, terrorists and hostile nation states. Secure cyber space for legitimate use by the globalized world can only be achieved by international cooperation.
Social implications – A "digital divide" in cyber defense cannot be afforded. As explained earlier, cyber security is a challenge for both developed and developing nations. Prioritization of resources in a sequence suggested by ISM analysis would help face the challenge of cyber security better. The methodology suggested in this paper would ensure adequate response to cyber threats and eliminate knee-jerk reaction.
Originality/value – This research emphasizes identification of hierarchical relationship among the identified topical issues of information security rather than using them as a flat checklist. It helps us segregate the end objectives from root issues and highlights the necessity of addressing these root issues to achieve those objectives.
'In der Entwicklung familialer Erwerbsmuster hat sich in Europa in den letzten Jahrzehnten ein tief greifender Wandel vollzogen. Bis Mitte des vergangenen Jahrhunderts existierte in vielen Familien mit Kindern noch eine eindeutige Arbeitsteilung zwischen einem erwerbstätigen, männlichen 'Familienernährer' und einer auf Kindererziehung und Hausarbeit spezialisierten Ehefrau. International vergleichende Daten belegen jedoch in allen modernen Gesellschaften für die jüngere Vergangenheit eine Annäherung der Erwerbsquoten von Männern und Frauen (Hofäcker 2006a). Sozialwissenschaftliche Diagnosen sehen zudem das Verhältnis zwischen den Geschlechtern 'im Umbruch' (Leitner et al. 2004) und das 'klassische Ernährermodell' in einem Zustand zunehmender Auflösung in Richtung einer Erwerbstätigkeit beider Ehepartner (Lewis 2004). Vor dem Hintergrund dieser Annäherung von Männern und Frauen im Erwerbsleben wird auch eine Angleichung in der familialen Arbeitsteilung zwischen den Geschlechtern gefordert: 'Neue Väter' sollen mehr Verantwortung für die Erziehung der Kinder übernehmen und sich bei der Erledigung alltäglicher Haushaltsarbeiten umfassender engagieren. Mehrere europäische Länder unterstützen diese innerfamiliale Angleichung zudem durch spezielle familienpolitische Programme. Lässt sich jedoch de facto ein Trend zu solchen, an einer gleichmäßigen Aufteilung von Haus- und Erwerbsarbeit orientierten 'neuen Vätern' erkennen? Der vorliegende Beitrag geht auf Basis der 1988, 1994 und 2002 erhobenen Daten des ISSP-Moduls 'Family and Changing Gender Roles' dieser Frage in insgesamt 18 Ländern Europas nach. Er rekonstruiert Einstellungsmuster von Vätern als notwendige Grundbedingung eines Verhaltenswandels und stellt diese anschließend der tatsächlichen Beteiligung von Vätern an Familien- und Haushaltsarbeit gegenüber. Der systematische Vergleich nationaler Kontextbedingungen ermöglicht es dabei zu rekonstruieren, inwiefern es nationaler Familien- und Arbeitsmarktpolitik gelungen ist, Männer verstärkt zur Übernahme familialer Verantwortung zu bewegen.' (Autorenreferat)
In: International journal of legal information: IJLI ; the official journal of the International Association of Law Libraries, Band 11, Heft 1-2, S. 77-78