IDEAS home Printed from https://ideas.repec.org/a/bla/jamist/v59y2008i9p1493-1512.html
   My bibliography  Save this article

Toward a theory of network gatekeeping: A framework for exploring information control

Author

Listed:
  • Karine Barzilai‐Nahon

Abstract

Gatekeeping theories have been a popular heuristic for describing information control for years, but none have attained a full theoretical status in the context of networks. This article aims to propose a theory of network gatekeeping comprised of two components: identification and salience. Network gatekeeping identification lays out vocabulary and naming foundations through the identification of gatekeepers, gatekeeping, and gatekeeping mechanisms. Network gatekeeping salience, which is built on the bases of the network identification theory, utilizes this infrastructure to understand relationships among gatekeepers and between gatekeepers and gated, the entity subjected to a gatekeeping process. Network gatekeeping salience1 Salience refers to the degree to which gatekeepers give priority to competing gated claims. proposes identifying gated and their salience to gatekeepers by four attributes: (a) their political power in relation to the gatekeeper, (b) their information production ability, (c) their relationship with the gatekeeper, and (d) their alternatives in the context of gatekeeping.

Suggested Citation

  • Karine Barzilai‐Nahon, 2008. "Toward a theory of network gatekeeping: A framework for exploring information control," Journal of the American Society for Information Science and Technology, Association for Information Science & Technology, vol. 59(9), pages 1493-1512, July.
  • Handle: RePEc:bla:jamist:v:59:y:2008:i:9:p:1493-1512
    DOI: 10.1002/asi.20857
    as

    Download full text from publisher

    File URL: https://doi.org/10.1002/asi.20857
    Download Restriction: no

    File URL: https://libkey.io/10.1002/asi.20857?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bla:jamist:v:59:y:2008:i:9:p:1493-1512. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://www.asis.org .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.