Law Enforcement Framing on Social Media

Total Page:16

File Type:pdf, Size:1020Kb

Law Enforcement Framing on Social Media Law enforcement framing on social media A comparative frame analysis of the police forces in Sweden and China and their presence on social media services Facebook and Sina Weibo Niklas Jonsson Westerlund Supervisor Göran Svensson Department of Informatics and Media Master Programme in Social Sciences, Digital Media and Society Spring 2016 Abstract In less than a decade, social media has become one of the most important tools for interpersonal communication in the developed world. Social media also provide a platform for companies, organizations and government institutions to disseminate information and interact with users. This thesis examines the use of social media by law enforcement agencies in Sweden and China by looking at Facebook and Sina Weibo respectively. The study has used a qualitative content analysis as its method and frame analysis as its theoretical framework. The purpose of the thesis has been to examine how the police frame their content on social media, and whether the framing differs between the two countries’ law enforcement agencies. The findings suggest that the police in Sweden and China frame their content differently; the Swedish police frame their posts with emotions, and appeal to readers to be responsible citizens to a higher degree than their Chinese counterparts do. The Chinese police (Beijing Public Security Bureau) frame their posts with more authoritative language, although this is contrasted with their use of frames that are humorous as well. However, both agencies tend to frame their content in a neutral way most of the time. This suggests that both agencies put an emphasis on disseminating neutral information for a variety of different topics, rather than framing their content for a specific purpose. Keywords: Social media, frame analysis, qualitative content analysis, Sina Weibo, Facebook, law enforcement, police, Public Security Bureau, 死哪微博, 平安北京, 金盾工程. 2 Acknowledgements While writing this thesis, I was lucky to receive outstanding help from two people in particular. Firstly, I would like to thank my supervisor Göran Svensson for his continuous engagement and helpful comments and suggestions throughout the semester. Secondly, I would like to thank my wonderful translator 小胡胡. Because without you, this thesis would not have been written. In addition, I want to give a special thanks to Uppsala University for sending me to Peking University to study Chinese, and to all my classmates in the Digital Media and Society class of 2014. 3 Table of contents Abstract .............................................................................................................................................................. 2 Acknowledgements ............................................................................................................................................ 3 Table of contents ................................................................................................................................................ 4 List of figures ...................................................................................................................................................... 6 1. Introduction ................................................................................................................................................... 7 1.2 Research Purpose ..................................................................................................................................... 9 1.3 Research Questions ................................................................................................................................ 10 1.4 Research limitations ............................................................................................................................... 10 1.5 Thesis outline .......................................................................................................................................... 11 2. Background................................................................................................................................................... 13 2.1 The dawn of social media and web 2.0 ................................................................................................... 13 2.2 Mass media and Internet ........................................................................................................................ 14 2.3 The early days of the Internet ................................................................................................................. 16 2.4 The Silicon Valley’s of Sweden and China ................................................................................................ 17 2.5 The rise of social media use by public authorities in Sweden and China ................................................... 18 2.5 Previous research.................................................................................................................................... 19 3. Framing theory ............................................................................................................................................. 22 3.1 Framing defined ..................................................................................................................................... 22 3.2 Framing theory in social media research ................................................................................................. 24 3.3 Framing in China ..................................................................................................................................... 25 3.4 Critique of framing theory....................................................................................................................... 27 3.5 Framing theory as a conceptual framework ............................................................................................ 27 4. Methodology ................................................................................................................................................ 30 4.1 Qualitative research defined ................................................................................................................... 30 4.1 Qualitative content analysis as a research method ................................................................................. 31 4.2 Defining the data selection ..................................................................................................................... 31 4.3 Coding, reliability and validity ................................................................................................................. 34 4.4 Ethical considerations ............................................................................................................................. 36 4 5. Analysis ........................................................................................................................................................ 37 5.1 Frames defined ....................................................................................................................................... 37 5.2 Identifying frames................................................................................................................................... 38 5.3 Christmas and Spring Festival posts analyzed ......................................................................................... 43 5.4 Violence and crime posts analyzed .......................................................................................................... 48 5.5 Holiday posts analyzed ........................................................................................................................... 54 5.6 Organizational posts analyzed ................................................................................................................ 61 5.7 Summary ................................................................................................................................................ 67 6. Conclusions................................................................................................................................................... 71 6.1 Research questions revisited ................................................................................................................... 71 6.2 Frames used by the two agencies ........................................................................................................... 71 6.3 Differences in framing............................................................................................................................. 72 6.4 Discussion ............................................................................................................................................... 73 6.4 Future research....................................................................................................................................... 74 Bibliography ..................................................................................................................................................... 76 Appendix .......................................................................................................................................................... 84 Swedish police SP#1 – 44 .............................................................................................................................. 84 Public Security Bureau PSB#1 – 44 ...............................................................................................................
Recommended publications
  • Part Four - 'Made in America: Christian Fundamentalism' Transcript
    Part Four - 'Made in America: Christian Fundamentalism' Transcript Date: Wednesday, 10 November 2010 - 2:00PM Location: Barnard's Inn Hall 10 November 2010 Made in America Christian Fundamentalism Dr John A Dick Noam Chomsky: “We must bear in mind that the U.S. is a very fundamentalist society, perhaps more than any other society in the world – even more fundamentalist than Saudi Arabia or the Taliban. That's very surprising.” Overview: (1) Introduction (2) Five-stage evolution of fundamentalism in the United States (3) Features common to all fundamentalisms (4) What one does about fundamentalism INTRODUCTION: In 1980 the greatly respected American historian, George Marsden published Fundamentalism and American Culture, a history of the first decades of American fundamentalism. The book quickly rose to prominence, provoking new studies of American fundamentalism and contributing to a renewal of interest in American religious history. The book’s timing was fortunate, for it was published as a resurgent fundamentalism was becoming active in politics and society. The term “fundamentalism” was first applied in the 1920’s to Protestant movements in the United States that interpreted the Bible in an extreme and literal sense. In the United States, the term “fundamentalism” was first extended to other religious traditions around the time of the Iranian Revolution in 1978-79. In general all fundamentalist movements arise when traditional societies are forced to face a kind of social disintegration of their way of life, a loss of personal and group meaning and the introduction of new customs that lead to a loss of personal and group orientation.
    [Show full text]
  • Do Diffusion Protocols Govern Cascade Growth?
    Proceedings of the Twelfth International AAAI Conference on Web and Social Media (ICWSM 2018) Do Diffusion Protocols Govern Cascade Growth? Justin Cheng,1 Jon Kleinberg,2 Jure Leskovec,3 David Liben-Nowell,4 Bogdan State,1 Karthik Subbian,1 Lada Adamic1 [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] 1Facebook, 2Cornell University, 3Stanford University, 4Carleton College Abstract Large cascades can develop in online social networks as peo- ple share information with one another. Though simple re- share cascades have been studied extensively, the full range of cascading behaviors on social media is much more di- verse. Here we study how diffusion protocols, or the social ex- changes that enable information transmission, affect cascade growth, analogous to the way communication protocols de- fine how information is transmitted from one point to another. Studying 98 of the largest information cascades on Facebook, we find a wide range of diffusion protocols – from cascading reshares of images, which use a simple protocol of tapping a single button for propagation, to the ALS Ice Bucket Chal- lenge, whose diffusion protocol involved individuals creating and posting a video, and then nominating specific others to do the same. We find recurring classes of diffusion protocols, and identify two key counterbalancing factors in the con- struction of these protocols, with implications for a cascade’s growth: the effort required to participate in the cascade, and Figure 1: The diffusion tree of a cascade with a volunteer the social cost of staying on the sidelines.
    [Show full text]
  • TRADITIONAL WEDDING CEREMONY Hillside Christian Church (Disciples of Christ)
    TRADITIONAL WEDDING CEREMONY Hillside Christian Church (Disciples of Christ) Minister: Dearly beloved, we are here assembled in the presence of God to unite A_______ (groom’s name) and B________(bride’s name) in marriage. The Bible teaches that marriage is to be a permanent relationship of one man and one woman freely and totally committed to each other as companions for life. Our Lord declared that man shall leave his father and mother and unite with his wife in the building of a home, and the two shall become one flesh. Who gives the bride to be married? Bride’s Father: I do. Minister: The home is built upon love, which virtue is best portrayed in the thirteenth chapter of Paul’s first letter to the Corinthians. “Love is patient and kind; love is not jealous or boastful; it is not arrogant or rude. Love does not insist on its own way; it is not irritable or resentful; it does not rejoice at wrong, but rejoices in the right. Love bears all things, believes all things, hopes all things, endures all things. Love never ends; ...So faith, hope, love abide, these three; but the greatest of these is love” (I Corinthians 13:4-13, RSV). Marriage is a companionship which involves mutual commitment and responsibility. You will share alike in the responsibilities and the joys of life. When companions share a sorrow the sorrow is halved, and when they share a joy the joy is doubled. You are exhorted to dedicate your home to your Creator. Take his Word, the Bible, for your guide.
    [Show full text]
  • Duty-To-Protect.Pdf
    2 APA PRACTICE ORGANIZATION LEGAL ISSUES Duty to Protect A BRIEF HISTORY OF DUTY TO PROTECT In 1976, the California Supreme Court issued its decision in Tarasoff v. Regents of the University of Roles and Responsibilities for California after a patient carried out a threat to kill a Psychologists young woman. In that case, the court ruled: When a therapist determines, or pursuant to the ecent mass shootings heightened the focus on standards of his profession should determine, that widespread state laws that require or allow his patient presents a serious danger of violence psychologists and other mental health professionals R to another [person], he incurs an obligation to use to breach confidentiality in order to prevent harm by their reasonable care to protect the intended victim potentially violent patients. This article is intended to help against such danger . [This duty] may call for practitioners with the challenging task of applying these [the therapist] to warn the intended victim or duty to protect* laws in working with these individuals. others likely to apprise the victim of the danger, to notify the police, or take whatever other steps are Mandatory versus permissive laws reasonably necessary under the circumstances. Most psychologists think of duty to protect laws as those After the Tarasoff case, many states passed legislation that create a mandatory obligation to take action and impose defining a “duty to protect”* and the steps needed to liability for failing to carry out that duty. But there are closely discharge that duty. In other states, courts created a related laws that give psychologists discretion or permission duty to protect through case law.
    [Show full text]
  • Addressing Fundamentalism by Legal and Spiritual Means
    H UMAN R IGHTS & H UMAN W ELFARE Addressing Fundamentalism by Legal and Spiritual Means By Dan Wessner Religion and Humane Global Governance by Richard A. Falk. New York: Palgrave, 2001. 191 pp. Gender and Human Rights in Islam and International Law: Equal before Allah, Unequal before Man? by Shaheen Sardar Ali. The Hague: Kluwer Law International, 2000. 358 pp. Religious Fundamentalisms and the Human Rights of Women edited by Courtney W. Howland. New York: St. Martin’s Press, 1999. 326 pp. The Islamic Quest for Democracy, Pluralism, and Human Rights by Ahmad S. Moussalli. Gainesville: University Press of Florida, 2001. 226 pp. The post-Cold War era stands at a crossroads. Some sort of new world order or disorder is under construction. Our choice to move more toward multilateralism or unilateralism is informed well by inter-religious debate and international law. Both disciplines rightly challenge the “post- Enlightenment divide between religion and politics,” and reinvigorate a spiritual-legal dialogue once thought to be “irrelevant or substandard” (Falk: 1-8, 101). These disciplines can dissemble illusory walls between spiritual/sacred and material/modernist concerns, between realpolitik interests and ethical judgment (Kung 1998: 66). They place praxis and war-peace issues firmly in the context of a suffering humanity and world. Both warn as to how fundamentalism may subjugate peace and security to a demagogic, uncompromising quest. These disciplines also nurture a community of speech that continues to find its voice even as others resort to war. The four books considered in this essay respond to the rush and risk of unnecessary conflict wrought by fundamentalists.
    [Show full text]
  • B.U.I.L.D. Rites of Passage/Mentoring Project
    Know About Rites of Passage (ROP), But Didn’t Know To Ask: How To Implement A ROP/Mentoring Project FRANKI GIBSON, Ed.D DIRECTOR, CLINICAL SERVICES MMA PRESENTER WHY A RITE OF PASSAGE “It takes a village to raise a child” African proverb This is predicated on the premise that healthy villages and communities exist. They do, yet my experience was (and is) that in America they are the exception rather than the rule. Youth do not develop in a vacuum, they develop in unhealthy villages and communities that we as adults are responsible for allowing to exist (Some, 1993). THE BEGINNING • A personal desire to emulate the order, ritual and ceremony of traditional African Rites of Passage and in the process empower a generation • A passion to develop a program to confront the feelings of hopelessness, self-hatred, cultural confusion and moral uncertainty that plagued African-American youth in Philadelphia • Initial focus on African –American males WHAT IS A RITE OF PASSAGE? • A rite of passage is a social ritual which marks a change-transition-transformation in consciousness, character and community. During the process, a door of new awareness opens and expanded possibilities and horizons are envisioned. • It is (traditionally) an organized system designed to indicate mastery of a particular level of life. • In our culture, rites of passage fills the gap between formal education and home training. B.U.I.L.D. EXPLAINED • Birth of Unique Individuals Lessens Delinquency (B.U.I.L.D.) is a contemporary rites of passage/mentoring project. It consists of a comprehensive three-phase prevention/intervention program that utilizes a wellness foundation, designed to develop consciousness, confidence, competence, commitment and character as well as to instill a sense of self, history and community.
    [Show full text]
  • Monitoring the Duty to Monitor
    Corporate Governance WWW. NYLJ.COM MONDAY, NOVEMBER 28, 2011 Monitoring the Duty to Monitor statements. As a result, the stock prices of Chinese by an actual intent to do harm” or an “intentional BY LOUIS J. BEVILACQUA listed companies have collapsed. Do directors dereliction of duty, [and] a conscious disregard have a duty to monitor and react to trends that for one’s responsibilities.”9 Examples of conduct HE SIGNIFICANT LOSSES suffered by inves- raise obvious concerns that are industry “red amounting to bad faith include “where the fidu- tors during the recent financial crisis have flags,” but not specific to the individual company? ciary intentionally acts with a purpose other than again left many shareholders clamoring to T And if so, what is the appropriate penalty for the that of advancing the best interests of the corpo- find someone responsible. Where were the direc- board’s failure to act? “Sine poena nulla lex.” (“No ration, where the fiduciary acts with the intent tors who were supposed to be watching over the law without punishment.”).3 to violate applicable positive law, or where the company? What did they know? What should they fiduciary intentionally fails to act in the face of have known? Fiduciary Duties Generally a known duty to act, demonstrating a conscious Obviously, directors should not be liable for The duty to monitor arose out of the general disregard for his duties.”10 losses resulting from changes in general economic fiduciary duties of directors. Under Delaware law, Absent a conflict of interest, claims of breaches conditions, but what about the boards of mort- directors have fiduciary duties to the corporation of duty of care by a board are subject to the judicial gage companies and financial institutions that and its stockholders that include the duty of care review standard known as the “business judgment had a business model tied to market risk.
    [Show full text]
  • Networked Framing Between Source Posts and Their Reposts: an Analysis of Public Opinion on China’S Microblogs CM3 ¶ Joyce Y
    INFORMATION, COMMUNICATION & SOCIETY, 2015 http://dx.doi.org/10.1080/1369118X.2015.1104372 5 Networked framing between source posts and their reposts: an analysis of public opinion on China’s microblogs CM3 ¶ Joyce Y. M. Nipa and King-wa Fub aDepartment of Media and Communications, The University of Sydney, Sydney, NSW, Australia; bJournalism 10 and Media Studies Centre, The University of Hong Kong, Hong Kong ABSTRACT ARTICLE HISTORY Retweeting a post on a social media platform is a part of a process of Received 20 January 2015 growing significance through which public opinion formation takes Accepted 2 October 2015 place. A ‘retweet count’ on, say Twitter or weibo, can be taken as a KEYWORDS 15 measure of user influence. The assumption is that when B retweets ’ China; framing; public A s message, B empathizes with A and wishes to disseminate the opinion; retweet; social message more widely. But this assumption has hardly been tested media; Twitter; weibo and preliminary evidence suggests practices for retweeting on Twitter vary. Nor can retweeting practices on Twitter be assumed to apply on weibo. This paper makes the first effort to understand 20 the practice of reposting on China’s weibo, focusing on the content of reposts in comparison to that of the original messages. A quantitative comparison is made of the frame [Entman, R. M. (1993). Framing: Toward clarification of a fractured paradigm. Journal of Communication, 43(4), 51–58; Gamson, W. A., & Modigliani, A. (1989). Media discourse and public opinion on nuclear power: A constructionist approach. American Journal of 25 Sociology, 95,1–37] of the source post of 21 cases, and their reposts.
    [Show full text]
  • Libertarianism
    LIBERTARIANISM Libertarianism is a theory of justice that holds that agents initially fully own themselves and have moral powers to acquire private property rights in external things. It judges non-consensual force against a person to be just only when it is necessary to prevent that person from infringing someone’s rights or to impose rectification for such infringement (e.g., compensation or punishment). These limits on the use of force radically limit the just powers of government. Libertarianism is often thought of as “right-wing” doctrine. This, however, is mistaken for at least two reasons. First, on social—rather than economic—issues, libertarianism tends to be “left-wing”. It opposes laws that restrict consensual and private sexual relationships between adults, laws that restrict drug use, laws that impose religious views or practices on individuals, and compulsory military service. Second, in addition to the better-known version of libertarianism—right-libertarianism—there is also a version known as “left-libertarianism” (described below), which holds that unappropriated natural resources belong to everyone in some egalitarian manner. Libertarianism can be understood as a basic principle or as a derivative one. Here it will be understood as a basic moral/principle (e.g., based on natural rights). It is possible, however, to defend libertarianism as a derivative principle. Rule utilitarianism could lead to libertarian principles, as could rule contractarianism. Libertarianism is normally advocated as a theory of justice in one of two senses. In one sense, justice is concerned with the moral duties that we owe others. It does not address impersonal duties (duties owed to no one) or duties owed to self.
    [Show full text]
  • 5. What Matters Is the Motive / Immanuel Kant
    This excerpt is from Michael J. Sandel, Justice: What's the Right Thing to Do?, pp. 103-116, by permission of the publisher. 5. WHAT MATTERS IS THE MOTIVE / IMMANUEL KANT If you believe in universal human rights, you are probably not a utili- tarian. If all human beings are worthy of respect, regardless of who they are or where they live, then it’s wrong to treat them as mere in- struments of the collective happiness. (Recall the story of the mal- nourished child languishing in the cellar for the sake of the “city of happiness.”) You might defend human rights on the grounds that respecting them will maximize utility in the long run. In that case, however, your reason for respecting rights is not to respect the person who holds them but to make things better for everyone. It is one thing to con- demn the scenario of the su! ering child because it reduces overall util- ity, and something else to condemn it as an intrinsic moral wrong, an injustice to the child. If rights don’t rest on utility, what is their moral basis? Libertarians o! er a possible answer: Persons should not be used merely as means to the welfare of others, because doing so violates the fundamental right of self-ownership. My life, labor, and person belong to me and me alone. They are not at the disposal of the society as a whole. As we have seen, however, the idea of self-ownership, consistently applied, has implications that only an ardent libertarian can love—an unfettered market without a safety net for those who fall behind; a 104 JUSTICE minimal state that rules out most mea sures to ease inequality and pro- mote the common good; and a celebration of consent so complete that it permits self-in" icted a! ronts to human dignity such as consensual cannibalism or selling oneself into slav ery.
    [Show full text]
  • Opinion on Whether Or to What Extent Applications for Nomination by Convention May Be Challenged at Or Before the Convention for Which the Applications Are Made
    IN THE SUPREME COURT OF TEXAS ══════════ No. 20-0663 ══════════ IN RE TEXAS HOUSE REPUBLICAN CAUCUS PAC, ET AL., RELATORS ══════════════════════════════════════════ ON PETITION FOR WRIT OF MANDAMUS ══════════════════════════════════════════ PER CURIAM CHIEF JUSTICE HECHT and JUSTICE BOYD did not participate in the decision. Several Republican Party candidates and organizations seek to prevent 44 Libertarian Party candidates from appearing on the 2020 general-election ballot due to the Libertarians’ failure to pay the filing fee required by section 141.041 of the Texas Election Code. The Republicans concede that the statutory deadline to have the Libertarians removed from the ballot using a declaration of ineligibility passed on August 21. See TEX. ELEC. CODE § 145.035. They claim a later deadline applies to their petition, which they describe as a challenge to the Libertarians’ ballot applications governed by the deadline in section 141.034. For the reasons explained below, the Election Code does not authorize the requested relief. Because the Libertarian Party nominates candidates by convention rather than primary election, its candidates’ applications are governed by chapter 181 of the Election Code, not by chapter 141’s procedures for challenging ballot applications. See id. §§ 181.031–.034. The relators invoke deadlines governing challenges to “an application for a place on the ballot” under chapter 141, but Libertarian Party candidates do not file such applications. Instead, they file “an application for nomination by convention” under chapter 181, which is a statutorily separate type of application governed by a separate set of statutes. Id. The Election Code does not subject the Libertarian candidates’ applications for nomination by convention to the procedures and deadlines for ballot-application challenges on which the relators rely.
    [Show full text]
  • Light Duty Assignments
    Policy Urbana Police Department 1025 Urbana PD Policy Manual Light Duty Assignments 1025.1 PURPOSE AND SCOPE This policy establishes procedures for providing temporary modified-duty assignments. This policy is not intended to affect the rights or benefits of employees under federal or state law, City rules, and current memorandums of understanding or collective bargaining agreements. For example, nothing in this policy affects the obligation of the Department to engage in a good faith, interactive process to consider reasonable accommodations for any employee with a temporary or permanent disability that is protected under federal or state law. 1025.2 POLICY Subject to operational considerations, the Urbana Police Department may identify temporary modified-duty assignments for employees who have an injury or medical condition resulting in temporary work limitations or restrictions. A temporary assignment allows the employee to work, while providing the Department with a productive employee during the temporary period. 1025.2.1 DEFINITIONS Light Duty - Means a temporary, limited term assignment not requiring performance of the full range of duties associated with the regular job classification. Light duty also may be termed as modified-duty assignments. 1025.3 GENERAL CONSIDERATIONS Priority consideration for temporary modified-duty assignments will be given to employees with work-related injuries or illnesses that are temporary in nature. Employees having disabilities covered under the Americans with Disabilities Act (ADA) or the Illinois Human Rights Act (775 ILCS 5/1-101 et seq.) shall be treated equally, without regard to any preference for a work-related injury. No position in the Urbana Police Department shall be created or maintained as a temporary modified-duty assignment.
    [Show full text]