information withholding
Recently Published Documents


TOTAL DOCUMENTS

11
(FIVE YEARS 2)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
Author(s):  
Halimatus Sa’diyah ◽  
Masdar Fahmi

Podcasts are gaining popularity in Indonesia (Daily Social, 2018). Audio podcasts produced by Jakartans with urban life and Jakarta-centric narrative dominates the podcast in Indonesia. However, Yogyakarta podcasters are trying to become the antithesis of the Jakarta-narrative podcasts with local messages. This study aimed to determine how the gatekeeping process of audio podcasts in Yogyakarta fight Jakarta-centric podcast domination. This research used a descriptive qualitative research method with grounded theories. The theories used were: (1) Podcast Production Management by Michael W. Geoghegan and Dan Klass (2007) and (2) Network Gatekeeping Theory by Karine Barzilai-Nahon (2008). In this study, the theory was limited to gatekeeping identification and mechanisms described in the Network Gatekeeping Identification Theory in the context of the network in information technology (Internet). The results of this study indicated that there was no standard mechanism related to the gatekeeping process. The gatekeeping process determinants are individual factors, where each podcaster has a different understanding of gatekeeping process. In pre-production, the gatekeeping process consists of selection (selection of themes/content materials), localization, use local language and avoiding Jakarta-centric narrative, and adding information like quotes from books or experts for sensitive issues. The gatekeeping process in production includes repetition (repeating words/sentences related to self-identity, greetings, podcast names) and shaping information into podcast nuances (formal/informal). Postproduction consists of displays (back sound and sound effects), deletion (removing irrelevant information), withholding (withholding information or, in some cases, not publishing the podcast episode), and channelling (distribute to specific channels). Podcasts that consciously aim to fight against the Jakarta-centrist podcasts are “Temukonco” and “The Podcast Sambat.” The gatekeeping process used includes the contents of the Javanese (Yogyakarta) culture as seen from the podcast name and gatekeeping bases such as (1) selection; (2) display; (3) shaping; and (4) localizing. Keywords: content, podcast, gatekeeping


2021 ◽  
Vol 60 (1) ◽  
pp. 3-21
Author(s):  
Kyle A. Hilburn ◽  
Imme Ebert-Uphoff ◽  
Steven D. Miller

AbstractThe objective of this research is to develop techniques for assimilating GOES-R series observations in precipitating scenes for the purpose of improving short-term convective-scale forecasts of high-impact weather hazards. Whereas one approach is radiance assimilation, the information content of GOES-R radiances from its Advanced Baseline Imager saturates in precipitating scenes, and radiance assimilation does not make use of lightning observations from the GOES Lightning Mapper. Here, a convolutional neural network (CNN) is developed to transform GOES-R radiances and lightning into synthetic radar reflectivity fields to make use of existing radar assimilation techniques. We find that the ability of CNNs to utilize spatial context is essential for this application and offers breakthrough improvement in skill compared to traditional pixel-by-pixel based approaches. To understand the improved performance, we use a novel analysis method that combines several techniques, each providing different insights into the network’s reasoning. Channel-withholding experiments and spatial information–withholding experiments are used to show that the CNN achieves skill at high reflectivity values from the information content in radiance gradients and the presence of lightning. The attribution method, layerwise relevance propagation, demonstrates that the CNN uses radiance and lightning information synergistically, where lightning helps the CNN focus on which neighboring locations are most important. Synthetic inputs are used to quantify the sensitivity to radiance gradients, showing that sharper gradients produce a stronger response in predicted reflectivity. Lightning observations are found to be uniquely valuable for their ability to pinpoint locations of strong radar echoes.


2020 ◽  
Vol 34 (02) ◽  
pp. 2014-2021
Author(s):  
Hadi Hosseini ◽  
Sujoy Sikdar ◽  
Rohit Vaish ◽  
Hejun Wang ◽  
Lirong Xia

Envy-freeness up to one good (EF1) is a well-studied fairness notion for indivisible goods that addresses pairwise envy by the removal of at most one good. In the worst case, each pair of agents might require the (hypothetical) removal of a different good, resulting in a weak aggregate guarantee. We study allocations that are nearly envy-free in aggregate, and define a novel fairness notion based on information withholding. Under this notion, an agent can withhold (or hide) some of the goods in its bundle and reveal the remaining goods to the other agents. We observe that in practice, envy-freeness can be achieved by withholding only a small number of goods overall. We show that finding allocations that withhold an optimal number of goods is computationally hard even for highly restricted classes of valuations. In contrast to the worst-case results, our experiments on synthetic and real-world preference data show that existing algorithms for finding EF1 allocations withhold a close-to-optimal amount of information.


2018 ◽  
Vol 21 (01) ◽  
pp. 1850002 ◽  
Author(s):  
GUY KELMAN ◽  
ERAN MANES ◽  
MARCO LAMIERI ◽  
DAVID S. BRÉE

Many real-world networks are known to exhibit facts that counter our knowledge prescribed by the theories on network creation and communication patterns. A common prerequisite in network analysis is that information on nodes and links will be complete because network topologies are extremely sensitive to missing information of this kind. Therefore, many real-world networks that fail to meet this criterion under random sampling may be discarded.In this paper, we offer a framework for interpreting the missing observations in network data under the hypothesis that these observations are not missing at random. We demonstrate the methodology with a case study of a financial trade network, where the awareness of agents to the data collection procedure by a self-interested observer may result in strategic revealing or withholding of information. The non-random missingness has been overlooked despite the possibility of this being an important feature of the processes by which the network is generated. The analysis demonstrates that strategic information withholding may be a valid general phenomenon in complex systems. The evidence is sufficient to support the existence of an influential observer and to offer a compelling dynamic mechanism for the creation of the network.


2017 ◽  
Vol 1 (1) ◽  
pp. 61-73 ◽  
Author(s):  
Yongqiang Sun ◽  
Dina Liu ◽  
Nan Wang

Abstract Although user information disclosure behavior in the context of social network service(SNS) has been well studied in previous literature, there is a lack of understanding about user information withholding behavior. To fill this research gap, the present study assumes that there might be a three-way interaction among information sensitivity, prevention focus, and interdependent self-construal regarding information withholding. The proposed model is empirically tested through an online survey of 479 users in the context of WeChat, one of the most popular SNSs in China. The results of hierarchical regression analysis verify the three-way interaction that prevention focus positively moderates the relationship between information sensitivity and information withholding, and interdependent self-construal strengthens the moderating effect of prevention focus. Findings in light of theoretical and practical implications as well as limitations of the study are discussed.


2014 ◽  
Vol 35 (1) ◽  
pp. 2-19 ◽  
Author(s):  
David Perkins

Purpose – The purpose of this paper is to gain a greater understanding of fear-based information withholding in project-manager-to-project-sponsor (PM2PS) communication and to propose future research directions. Design/methodology/approach – The research consisted of a review of the literature related to the withholding of information in subordinate-to-superior communication and in PM2PS communication. Literature from project communication studies and literature from general communication theory was consulted. Findings – Using defensive silence theory as a conceptual framework, five research propositions specific to fear-based information withholding in PM2PS communication are offered. Research limitations/implications – The study findings are limited to PM2PS communication based upon fear. The study provides a foundation for further research in this area within the conceptual framework of defensive silence theory. Practical implications – The practical implication of this paper is that certain perceptions and behaviors of a project sponsor can be related to fear-based information withholding in PM2PS communication. Originality/value – The originality of this paper is that it extends defensive silence theory into the realm of PM2PS communication. The value of this paper is to provide a catalyst for subsequent empirical-based research in order gain greater insight into fear-based information withholding in PM2PS communication.


1989 ◽  
Vol 18 (3) ◽  
pp. 315-341 ◽  
Author(s):  
Niko Besnier

ABSTRACTThis article examines the organization and function of information-withholding sequences, a conversational strategy used by participants in gossip interactions on Nukulaelae, a Polynesian atoll of the Central Pacific. A withholding sequence is a three-turn sequence whereby a piece of information is withheld in the first turn, an other-repair is initiated in the second turn, and the withheld material is provided in the third turn. Information-withholding sequences thus involve moves that in other contexts would be construed as face-threatening. They have a dual function: they provide speakers an opportunity to manipulate their audiences into becoming coproducers of the gossip, and they reinforce the status of their initiator as controller of the floor. Withholding sequences illustrate how ambiguity and repairs can be exploited to meet the communicative demands of particular interactional contexts. They also illustrate how gossip may be framed simultaneously as group-cohesive behavior and self-serving behavior. (Conversation analysis, ethnography of speaking, gossip, conversational repair, Polynesia, Nukulaelae Tuvaluan)


Sign in / Sign up

Export Citation Format

Share Document