Issue Networks in Online Debate Over the USA Patriot Act

Total Page:16

File Type:pdf, Size:1020Kb

Issue Networks in Online Debate Over the USA Patriot Act University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Doctoral Dissertations Graduate School 12-2006 Political Advocacy on the Web: Issue Networks in Online Debate Over the USA Patriot Act Margot Leigh Emery University of Tennessee - Knoxville Follow this and additional works at: https://trace.tennessee.edu/utk_graddiss Part of the Library and Information Science Commons Recommended Citation Emery, Margot Leigh, "Political Advocacy on the Web: Issue Networks in Online Debate Over the USA Patriot Act. " PhD diss., University of Tennessee, 2006. https://trace.tennessee.edu/utk_graddiss/1933 This Dissertation is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a dissertation written by Margot Leigh Emery entitled "Political Advocacy on the Web: Issue Networks in Online Debate Over the USA Patriot Act." I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Doctor of Philosophy, with a major in Communication and Information. Benjamin J. Bates, Major Professor We have read this dissertation and recommend its acceptance: William L. Seaver, Sally J. McMillan, Gretchen Whitney Accepted for the Council: Carolyn R. Hodges Vice Provost and Dean of the Graduate School (Original signatures are on file with official studentecor r ds.) To the Graduate Council: I am submitting herewith a dissertation written by Margot Leigh Emery entitled “Political Advocacy on the Web: Issue Networks in Online Debate Over the USA Patriot Act.” I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the requirements for the degree of Doctor of Philosophy, with a major in Communication and Information. Benjamin J. Bates Major Professor We have read this dissertation and recommend its acceptance: William L. Seaver Sally J. McMillan Gretchen Whitney Accepted for the Council: Linda Painter Interim Dean of Graduate Studies (Original signatures are on file with official student records.) Political Advocacy on the Web: Issue Networks in Online Debate Over the USA Patriot Act A Dissertation Presented for the Doctor of Philosophy Degree The University of Tennessee, Knoxville Margot Leigh Emery December 2006 Copyright © 2006 by Margot Leigh Emery All rights reserved. ii ACKNOWLEDGEMENTS I received assistance from many quarters to accomplish this project. In fact, the adage, ‘It takes a whole village to raise a single child,’ remains in my mind as I reflect on the support and generosity that has aided me as I worked toward the goal of completing the degree. My family never wavered in their faith in me, and I received much support from an extended network of friends and associates, among them Dr. Vince Pantalone, David James, and Drs. James Foster, Martin Gebrow, and Barbara Haning. Also supportive of my goals were my employers. First, Tennessee Technological University, which allowed me to work a flex schedule while commuting for my studies, and then the Tennessee Agricultural Experiment Station and Institute of Agriculture at the University of Tennessee, which gave me career opportunities that provided fee waivers and income as I studied for the degree. I deeply appreciate their flexibility and backing in enabling me to pursue my goal. In particular I’d like to acknowledge Dr. Tom Klindt, who was also pivotal in assisting another doctoral graduate, Dr. Bonnie Riechert, the former communications coordinator and my former supervisor at the Tennessee Agricultural Experiment Station. My academic mentors Drs. Benjamin J. Bates and M. Mark Miller have been unstinting in their support, understanding, and enthusiasm for my growth and development, and I appreciate the friendship I’ve had with them and with the fellow doctoral students I’ve known, and worked with, during my course of study. Through UT’s Intercollegiate Graduate Statistics Program (IGSP), I minored in statistics. I value iii my time in the Department of Statistics and, in particular, the opportunity to learn from Dr. Bill Seaver. I appreciate the patience and enthusiasm for his discipline that he has shown as he guided me, and his contributions as a member of my doctoral committee. I also appreciate the support and guidance of my other committee members, Dr. Sally McMillan and Dr. Gretchen Whitney. Each has contributed importantly to the quality of this work and to my ability to complete it. Finally, I’d like to express my appreciation to Dr. Richard Rogers and the Govcom.org organization in Amsterdam, whose research theory and methods helped to made this dissertation possible. iv ABSTRACT This dissertation examines how people and organizations used the World Wide Web to discuss and debate a public policy in 2005, at a point of time when the Internet was viewed as a maturing medium for communication. Combining descriptive and quantitative frame analyses with an issue network analysis, the study evaluated the frames apparent in discourse concerning two key sections of the USA Patriot Act, while the issue network analysis probed hypertext linkages among Web pages where discussion was occurring. Sections 214 and 215 of the USA Patriot Act provided a contentious national issue with multiple stakeholders presumed to be attempting to frame issues connected to the two sections. The focus on two sections allowed frame and issue network contrasts to be made. The study sought evidence of an Internet effect to determine whether the Web, through the way people were using it, was having a polarizing, synthesizing, or fragmentizing effect on discussion and debate. Frame overlap and hypertext linkage patterns among actors in the issue networks indicated an overall tendency toward synthesis. The study also probed the degree to which there is a joining, or symbiosis, of Web content and structure, in part evidenced by whether patterns exist that like-minded groups are coming together to form online community through hypertext linkages. Evidence was found to support this conclusion among Web pages in several Internet domains, although questions remain about linking patterns among blogs due to limitations of the software used in the study. v Organizational Web sites on average used a similar number of frames compared to other Web page types, including blogs. The organizational Web pages were found to be briefer in how they discussed issues, however. The study contributes to theory by offering the first known empirical study of online community formation and issue advocacy on a matter of public policy and through its finding of a linkage between Web content and Web structure. Methodologically, the study presents a flexible mixed-methods model of descriptive and quantitative approaches that appears excellently suited for Internet studies. The dissertation’s use of fuzzy clustering and discriminant analysis offer important improvements over existing approaches in factor-based frame analysis and frame mapping techniques. vi TABLE OF CONTENTS CHAPTER I ....................................................................................................................1 INTRODUCTION...........................................................................................................1 Objectives....................................................................................................................6 Summary .....................................................................................................................8 CHAPTER II...................................................................................................................9 THEORETICAL FOUNDATIONS .................................................................................9 Frame Analysis..........................................................................................................10 Origins and Development of Framing and Frame Analysis.....................................10 Criticism of Framing..............................................................................................16 Framing in Media Studies ......................................................................................17 Framing in Internet Studies....................................................................................20 Framing in Issue Advocacy Studies........................................................................24 Methodological Considerations of Frame Analysis ................................................26 Summary ...............................................................................................................28 Social Network Analysis............................................................................................29 Origins and Development of Social Network Analysis...........................................29 Core Concepts of Social Network Analysis............................................................31 Linkage Analysis ...................................................................................................35 Integration of Framing Analysis and Issue Network Analysis ....................................39 CHAPTER III................................................................................................................41
Recommended publications
  • NSA Fact Sheet on Section 215 of the PATRIOT
    Section 215 Section 215 of the USA PATRIOT Act of 2001, which amended Title V, Section 501 of the Foreign Intelligence Surveillance Act (FISA), “Access to Certain Business Records for Foreign Intelligence and International Terrorism Investigations” (50 U.S.C. sec. 1861) x This program concerns the collection only of telephone metadata. Under this program, the government does not acquire the content of any communication, the identity of any party to the communication, or any cell-site locational information. x This metadata is stored in repositories within secure networks, must be uniquely marked, and can only be accessed by a limited number of authorized personnel who have received appropriate and adequate training. x This metadata may be queried only when there is a reasonable suspicion, based on specific and articulated facts, that the identifier that will be used as the basis for the query is associated with specific foreign terrorist organizations. x The basis for these queries must be documented in writing in advance. x Fewer than two dozen NSA officials may approve such queries. x The documented basis for these queries is regularly audited by the Department of Justice. x Only seven senior officials may authorize the dissemination of any U.S. person information outside of NSA (e.g. to the FBI) after determining that the information is related to and is necessary to understand counterterrorism information, or assess its importance. x Every 30 days, the government must file with the Foreign Intelligence Surveillance Court a report describing the implementation of the program, to include a discussion of the application of the Reasonable Articulable Suspicion (RAS) standard, the number of approved queries and the number of instances that query results that contain U.S.
    [Show full text]
  • The Hidden Costs of Terrorist Watch Lists
    University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 2013 The Hidden Costs of Terrorist Watch Lists Anya Bernstein Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Anya Bernstein, "The Hidden Costs of Terrorist Watch Lists," 61 Buffalo Law Review 461 (2013). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. BUFFALO LAW REVIEW VOLUME 61 MAY 2013 NUMBER 3 The Hidden Costs of Terrorist Watch Lists ANYA BERNSTEIN† INTRODUCTION The No Fly List, which is used to block suspected terrorists from flying, has been in use for years. But the government still appears “stymied” by the “relatively straightforward question” of what people who “believe they have been wrongly included on” that list should do.1 In recent months, courts have haltingly started to provide their own answer, giving some individuals standing to sue to remove their names or receive additional process.2 This step is particularly important as the No Fly List continues † Bigelow Fellow and Lecturer in Law, The University of Chicago Law School. J.D., Yale Law School; Ph.D., Anthropology, The University of Chicago. Thanks to Daniel Abebe, Ian Ayres, Alexander Boni-Saenz, Anthony Casey, Anjali Dalal, Nicholas Day, Bernard Harcourt, Aziz Huq, Jerry Mashaw, Jonathan Masur, Nicholas Parrillo, Victoria Schwartz, Lior Strahilevitz, Laura Weinrib, Michael Wishnie, and James Wooten for helpful commentary.
    [Show full text]
  • Public Perceptions of Nigeria Police Monetary Bribery in Awka, Nigeria
    Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2021 Public Perceptions of Nigeria Police Monetary Bribery in Awka, Nigeria Benjamin Chukwuka Nnadozie Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Public Administration Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Benjamin Chukwuka Nnadozie has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Ernesto Escobedo, Committee Chairperson, Public Policy and Administration Faculty Dr. Raj Singh, Committee Member, Public Policy and Administration Faculty Dr. Meena Clowes, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer and Provost Sue Subocz, Ph.D. Walden University 2021 Abstract Public Perceptions of Nigeria Police Monetary Bribery in Awka, Nigeria By Benjamin Chukwuka Nnadozie Dissertation Submitted in Partial Fulfullment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University February 2021 Abstract The Nigerian police are often perceived by the Nigerian public as a very corrupt institution due to reports in the media and direct experiences of police brutality, extortion, injustice, and especially monetary bribery. The refusal to pay monetary bribes to the police has led to loss of lives and a lack of trust in the police.
    [Show full text]
  • The Role of the Media, Law, and National Resolve in the War on Terror
    Denver Journal of International Law & Policy Volume 33 Number 1 Winter - 2004 Sutton Colloquium Article 10 April 2020 The Role of the Media, Law, and National Resolve in the War on Terror Robert Hardaway Follow this and additional works at: https://digitalcommons.du.edu/djilp Recommended Citation Robert Hardaway, The Role of the Media, Law, and National Resolve in the War on Terror, 33 Denv. J. Int'l L. & Pol'y 104 (2004). This Article is brought to you for free and open access by Digital Commons @ DU. It has been accepted for inclusion in Denver Journal of International Law & Policy by an authorized editor of Digital Commons @ DU. For more information, please contact [email protected],[email protected]. THE ROLE OF THE MEDIA, LAW, AND NATIONAL RESOLVE IN THE WAR ON TERROR ROBERT HARDAWAY* I. INTRODUCTION In the aftermath of the terrorist attacks of September 11, 2001, the govern- ment of the United States took unprecedented steps to protect American lives and property.' Measures imposed included tightened security at nuclear power plants,2 airports,3 and numerous other government and private installations around the United States.4 Debate over an appropriate U.S. response centered on whether there was proof of a foreign state's complicity in the attacks. On September 15, 2001, a New York Times/CBS News poll revealed that eighty-five percent of Americans would Professor of Law, University of Denver Sturm College of Law. 1. See, e.g., Michael R. Gordon, After the Attacks: An Assessment, U.S. Force vs, Terrorists: From Reactive to Active, N.Y.
    [Show full text]
  • The USA PATRIOT Act: Preserving Life and Liberty (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism)
    The Department of Justice's first priority is to prevent future terrorist attacks. Since its passage following the September 11, 2001 attacks, the Patriot Act has played a key part - and often the leading role - in a number of successful operations to protect innocent Americans from the deadly plans of terrorists dedicated to destroying America and our way of life. While the results have been important, in passing the Patriot Act, Congress provided for only modest, incremental changes in the law. Congress simply took existing legal principles and retrofitted them to preserve the lives and liberty of the American people from the challenges posed by a global terrorist network. The USA PATRIOT Act: Preserving Life and Liberty (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism) Congress enacted the Patriot Act by overwhelming, bipartisan margins, arming law enforcement with new tools to detect and prevent terrorism: The USA Patriot Act was passed nearly unanimously by the Senate 98-1, and 357-66 in the House, with the support of members from across the political spectrum. The Act Improves Our Counter-Terrorism Efforts in Several Significant Ways: 1. The Patriot Act allows investigators to use the tools that were already available to investigate organized crime and drug trafficking. Many of the tools the Act provides to law enforcement to fight terrorism have been used for decades to fight organized crime and drug dealers, and have been reviewed and approved by the courts. As Sen. Joe Biden (D-DE) explained during the floor debate about the Act, "the FBI could get a wiretap to investigate the mafia, but they could not get one to investigate terrorists.
    [Show full text]
  • Qualitative Research 1
    Qualitative research 1 Dr Raqibat Idris, MBBS, DO, MPH Geneva Foundation for Medical Education and Research 28 November 2017 From Research to Practice: Training Course in Sexual and Reproductive Health Research Geneva Workshop 2017 Overview of presentation This presentation will: • Introduce qualitative research, its advantages, disadvantages and uses • Discuss the various approaches to qualitative design Introduction • Qualitative research is a study done to explain and understand the meaning or experience of a phenomenon or social process and the viewpoints of the affected individuals. • Investigates opinions, feelings and experiences. • Understands and describes social phenomena in their natural occurrence- holistic approach. • Does not test theories but can develop theories. Mason, 2002 Features of qualitative research • Exploratory • Fluid and flexible • Data-driven • Context sensitive • Direct interaction with affected individuals Mason, 2002 Advantages and disadvantages Advantages: • Richer information • Deeper understanding of the phenomenon under study Disadvantages: • Time consuming • Expensive • Less objective • Findings cannot be generalized Mason, 2002 Uses of qualitative studies Exploratory or pilot study: • Precedes a quantitative study to help refine hypothesis • Pilot study to examine the feasibility of a program/ project implementation • Designing survey questionnaires • To improve the reliability, validity and sensibility of new or existing survey instruments in a new population Green, 2013 Uses of qualitative studies To explain quantitative data findings: • Can follow a quantitative research to help provide a deeper understanding of the results. For example, the use of ethnography to explain the social context in which mortality and birth rate data are produced. • Parallel studies in a mixed qualitative and quantitative design to provide greater understanding of a phenomenon under study.
    [Show full text]
  • Tom Eagleton and the "Curse to Our Constitution"
    TOM EAGLETON AND THE “CURSE TO OUR CONSTITUTION” By William H. Freivogel Director, School of Journalism, Southern Illinois University Carbondale Associate Professor, Paul Simon Public Policy Institute This paper is scheduled for publication in St. Louis University Law Journal, Volume 52, honoring Sen. Eagleton. Introduction: If my friend Tom Eagleton had lived a few more months, I’m sure he would have been amazed – and amused in a Tom Eagleton sort of way - by the astonishing story of Alberto Gonzales’ late night visit to John Aschroft’s hospital bed in 2004 to persuade the then attorney general to reauthorize a questionable intelligence operation related to the president’s warrantless wiretapping program. No vignette better encapsulates President George W. Bush’s perversion of the rule of law. Not since the Saturday Night Massacre during Watergate has there been a moment when a president’s insistence on having his way resulted in such chaos at the upper reaches of the Justice Department. James Comey, the deputy attorney general and a loyal Republican, told Congress in May, 2007 how he raced to George Washington hospital with sirens blaring to beat Gonzeles to Ashcroft’s room.1 Comey had telephoned FBI Director Robert S. Mueller to ask that he too come to the hospital to back up the Justice Department’s view that the president’s still secret program should not be reauthorized as it then operated.2 Ashcroft, Comey and Mueller held firm in the face of intense pressure from White House counsel Gonzales and Chief of Staff Andrew Card. Before the episode was over, the three were on the verge of tendering their resignations if the White House ignored their objections; the resignations were averted by some last-minute changes in the program – changes still not public.3 Before Eagleton’s death, he and I had talked often about Bush and Ashcroft’s overzealous leadership in the war on terrorism.
    [Show full text]
  • Current Issues in Qualitative Data Analysis Software (QDAS): a User and Developer Perspective
    The Qualitative Report Volume 23 Number 13 Article 5 3-6-2018 Current Issues in Qualitative Data Analysis Software (QDAS): A User and Developer Perspective Jeanine C. Evers Erasmus University of Rotterdam, [email protected] Follow this and additional works at: https://nsuworks.nova.edu/tqr Part of the Law Commons, Quantitative, Qualitative, Comparative, and Historical Methodologies Commons, and the Social Statistics Commons Recommended APA Citation Evers, J. C. (2018). Current Issues in Qualitative Data Analysis Software (QDAS): A User and Developer Perspective. The Qualitative Report, 23(13), 61-73. https://doi.org/10.46743/2160-3715/2018.3205 This Article is brought to you for free and open access by the The Qualitative Report at NSUWorks. It has been accepted for inclusion in The Qualitative Report by an authorized administrator of NSUWorks. For more information, please contact [email protected]. Current Issues in Qualitative Data Analysis Software (QDAS): A User and Developer Perspective Abstract This paper describes recent issues and developments in Qualitative Data Analysis Software (QDAS) as presented in the opening plenary at the KWALON 2016 conference. From a user perspective, it reflects current features and functionality, including the use of artificial intelligence and machine learning; implications of the cloud; user friendliness; the role of digital archives; and the development of a common exchange format. This user perspective is complemented with the views of software developers who took part in the “Rotterdam Exchange Format Initiative,” an outcome of the conference. Keywords Qualitative Data Analysis Software, QDAS, Artificial Intelligence, Machine Learning, TLA AS.ti, Cassandre, Dedoose, f4analyse, MAXQDA, NVivo, QDA Miner, Quirkos, Transana, Exchange format, Interoperability, Qualitative Data Analysis, Learning Curve QDAS, Textual Data Mining, Cloud services.
    [Show full text]
  • The Value of CAQDAS for Systematising Literature Reviews
    BY DR. CHRISTINA SILVER, [email protected] RESEARCH FELLOW, UNIVERSITY OF SURREY The value of CAQDAS for systematising literature reviews Software designed to facilitate qualitative and mixed methods research is collectively known as CAQDAS Undertaking a literature review is similar to con- (Computer Assisted Qualitative Data AnalysiS). ducting a qualitative data analysis (QDA) in terms Available since the 1980s it provides tools designed of the analytic activities involved (Table 2.). Specific to support a range of analytic activities across disci- analytic requirements should drive the way tools are plines and sectors. Using references from bibliographic used rather than the availability of product features software (e.g. Endnote, Zotero, Mendeley) enables systematic literature reviewing, integrated with data Table 2. analysis. This article outlines some possibilities, high- Analytic activities supported by CAQDAS lighting considerations in planning a literature review for librarians and others. Integration revy revy • Bring together all relevant material into one “workspace” • Quantify qualitative data / qualify quantitative data 01 2016 01 What CAQDAS packages “do”? Organisation The acronym “CAQDAS” is misleading because • Manage facts about data (metadata, socio-demo- these programs do not “do” analysis; users remain in graphics etc.) control of and responsible for everything. It’s there- • Represent ideas that form the basis of analysis fore better to think of them as project management tools. Harnessing CAQDAS powerfully involves their Exploration use from start to finish, whether for an academic • Familiarise with data study, service evaluation, public consultation, liter- • Access and mark inherent structure ature review, or anything else. Each program has a suite of features, too many to list here.
    [Show full text]
  • The Coding Manual for Qualitative Researchers for Manual Coding The
    2E Second Edition The Coding Manual for Qualitative Researchers ‘This book fills a major gap in qualitative research methods courses. Saldaña has accomplished what has not been done before - creating a text that clearly identifies the many choices one has in coding their data. I wish I had this book when I started conducting qualitative research. It should be required reading for all.’ Mark Winton, Criminal Justice Instructor, University of Central Florida ‘An excellent handbook that helps demystify the coding process with a comprehensive assessment of different coding types, examples and exercises. As such it is a valuable teaching resource and it will also be of use to anyone undertaking qualitative analysis.’ Kevin Meethan, Associate Professor in Sociology, Plymouth University The ‘The Coding Manual describes the qualitative coding process with clarity and expertise. Its wide array of strategies, from the more straightforward to the more complex, are skillfully explained and exemplified. This extremely usable manual is a must-have resource for qualitative researchers at all levels.’ Coding Manual for Tara M. Brown, Assistant Professor of Education, Brandeis University The second edition of Johnny Saldaña’s international bestseller provides an in-depth guide to the Qualitative Researchers multiple approaches available for coding qualitative data. Fully up-to-date, it includes new chapters, more coding techniques and an additional glossary. Clear, practical and authoritative, the book: • Describes how coding initiates qualitative data analysis • Demonstrates the writing of analytic memos • Discusses available analytic software • Suggests how best to use The Coding Manual for Qualitative Researchers for particular studies In total, 32 coding methods are profiled that can be applied to a range of research genres from grounded theory to phenomenology to narrative inquiry.
    [Show full text]
  • U.S. Individuals' Perceptions of Government Electronic Surveillance After Passage of the USA Patriot Act Floyd Edwards Walden University
    Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2018 U.S. Individuals' Perceptions of Government Electronic Surveillance After Passage of the USA Patriot Act Floyd Edwards Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Public Policy Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Floyd Alexander Edwards has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Patricia Ripoll, Committee Chairperson, Public Policy and Administration Faculty Dr. Kathleen Schulin, Committee Member, Public Policy and Administration Faculty Dr. James Mosko, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2017 Abstract U.S. Individuals’ Perceptions of Government Electronic Surveillance After Passage of the USA Patriot Act by Floyd Edwards MS, Troy State University, 2000 BS, Troy State University, 1996 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University February 2018 Abstract Since the implementation of the USA Patriot Act in October 2001, public trust in the U.S. federal government to protect individuals’ right to privacy has been affected negatively.
    [Show full text]
  • Working with Feeds, RSS, and Atom
    CHAPTER 4 Working with Feeds, RSS, and Atom A fundamental enabling technology for mashups is syndication feeds, especially those packaged in XML. Feeds are documents used to transfer frequently updated digital content to users. This chapter introduces feeds, focusing on the specific examples of RSS and Atom. RSS and Atom are arguably the most widely used XML formats in the world. Indeed, there’s a good chance that any given web site provides some RSS or Atom feed—even if there is no XML-based API for the web site. Although RSS and Atom are the dominant feed format, other formats are also used to create feeds: JSON, PHP serialization, and CSV. I will also cover those formats in this chapter. So, why do feeds matter? Feeds give you structured information from applications that is easy to parse and reuse. Not only are feeds readily available, but there are many applications that use those feeds—all requiring no or very little programming effort from you. Indeed, there is an entire ecology of web feeds (the data formats, applications, producers, and consumers) that provides great potential for the remix and mashup of information—some of which is starting to be realized today. This chapter covers the following: * What feeds are and how they are used * The semantics and syntax of feeds, with a focus on RSS 2.0, RSS 1.0, and Atom 1.0 * The extension mechanism of RSS 2.0 and Atom 1.0 * How to get feeds from Flickr and other feed-producing applications and web sites * Feed formats other than RSS and Atom in the context of Flickr feeds * How feed autodiscovery can be used to find feeds * News aggregators for reading feeds and tools for validating and scraping feeds * How to remix and mashup feeds with Feedburner and Yahoo! Pipes Note In this chapter, I assume you have an understanding of the basics of XML, including XML namespaces and XML schemas.
    [Show full text]