<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0122-8285</journal-id>
<journal-title><![CDATA[Palabra Clave]]></journal-title>
<abbrev-journal-title><![CDATA[Palabra Clave]]></abbrev-journal-title>
<issn>0122-8285</issn>
<publisher>
<publisher-name><![CDATA[Universidad de La Sabana]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0122-82852016000400972</article-id>
<article-id pub-id-type="doi">10.5294/pacla.2016.19.4.2</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A Critical Axiology for Big Data Studies]]></article-title>
<article-title xml:lang="es"><![CDATA[Una axiología crítica para los estudios de Big Data]]></article-title>
<article-title xml:lang="pt"><![CDATA[Uma axiologia crítica para os estudos de Big Data]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Shahin]]></surname>
<given-names><![CDATA[Saif]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Bowling Green State University  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>USA</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>10</month>
<year>2016</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>10</month>
<year>2016</year>
</pub-date>
<volume>19</volume>
<numero>4</numero>
<fpage>972</fpage>
<lpage>996</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S0122-82852016000400972&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S0122-82852016000400972&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S0122-82852016000400972&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Big Data is having a huge impact on journalism and communication studies. At the same time, it has raised a plethora of social concerns ranging from mass surveillance to the legitimization of prejudices such as racism. This article develops an agenda for critical Big Data research. It discusses what the purpose of such research should be, what pitfalls it should guard against, and the possibility of adapting Big Data methods to conduct empirical research from a critical standpoint. Such a research program will not only enable critical scholarship to meaningfully challenge Big Data as a hegemonic tool, but will also make it possible for scholars to draw upon Big Data resources to address a range of social issues in previously impossible ways. The article calls for methodological innovation in combining emerging Big Data techniques with critical/qualitative methods of research, such as ethnography and discourse analysis, in ways that allow them to complement each other.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Los datos masivos (BigData) han tenido un gran impacto en el periodismo y los estudios de comunicación, a la vez que han generado un gran número de preocupaciones sociales que van desde la vigilancia masiva hasta la legitimación de prejuicios, como el racismo. En este artículo, se desarrolla una agenda para la investigación crítica de Big Data y se discute cuál debería ser el propósito de dicha investigación, de qué obstáculos protegerse y la posibilidad de adaptar los métodos de Big Data para llevar a cabo la investigación empírica desde un punto de vista crítico. Dicho programa de investigación no solo permitirá que la erudición crítica desafíe significativamente a Big Data como una herramienta hegemónica, sino que también permitirá que los académicos usen los recursos de Big Data para abordar una serie de problemas sociales de formas previamente imposibles. El artículo llama a la innovación metodológica para combinar las técnicas emergentes de Big Data y los métodos críticos y cualitativos de investigación, como la etnografía y el análisis del discurso, de tal manera que se puedan complementar.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo Os megadados (Big Data) têm tido um grande impacto sobre o jornalismo e os estudos de comunicação, e têm gerado um grande número de preocupações sociais, desde a vigilância em massa até a legitimação de preconceitos, como o racismo. Neste artigo se desenvolve uma agenda para a investigação crítica do Big Data e se discute qual deveria ser o propósito dessa investigação, de quais obstáculos se protegerem e a possibilidade de adaptar os métodos de Big Data para realizar a pesquisa empírica a partir de um ponto de vista crítico. Esse programa de pesquisa não apenas permite que a erudição crítica desafie significativamente os megadados como uma ferramenta hegemônica, também permite que os acadêmicos usem os recursos de Big Data para abordar uma série de problemas sociais de formas antes impossíveis. O artigo pede uma inovação metodológica para combinar técnicas emergentes de Big Data e os métodos críticos e qualitativos de pesquisa, tais como a etnografia e a análise do discurso, para que possam se complementar.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Big data]]></kwd>
<kwd lng="en"><![CDATA[technology]]></kwd>
<kwd lng="en"><![CDATA[social media]]></kwd>
<kwd lng="en"><![CDATA[critical research]]></kwd>
<kwd lng="en"><![CDATA[surveillance]]></kwd>
<kwd lng="es"><![CDATA[Big Data]]></kwd>
<kwd lng="es"><![CDATA[tecnología]]></kwd>
<kwd lng="es"><![CDATA[medios de comunicación sociales]]></kwd>
<kwd lng="es"><![CDATA[investigación crítica]]></kwd>
<kwd lng="es"><![CDATA[vigilancia]]></kwd>
<kwd lng="pt"><![CDATA[Big Data]]></kwd>
<kwd lng="pt"><![CDATA[tecnologia]]></kwd>
<kwd lng="pt"><![CDATA[mídias sociais]]></kwd>
<kwd lng="pt"><![CDATA[pesquisa crítica]]></kwd>
<kwd lng="pt"><![CDATA[monitoramento]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Angwin]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Larson]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Mattu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kirchner]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Machine bias.]]></source>
<year>2016</year>
<publisher-name><![CDATA[ProPublica]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Anderson]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[The end of theory: The data deluge makes the scientific method obsolete.]]></source>
<year>2008</year>
<publisher-name><![CDATA[Wired]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Andrejevic]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[iSpy: Surveillance and power in the interactive era.]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Lawrence ]]></publisher-loc>
<publisher-name><![CDATA[University Press of Kansas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Critical Media Studies 2.0: An interactive upgrade.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Andrejevic]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Interactions: Studies in Communication and Culture]]></source>
<year>2009</year>
<volume>1</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>35-51</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The Big Data divide]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Andrejevic]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[International Journal of Communication]]></source>
<year>2014</year>
<numero>8</numero>
<issue>8</issue>
<page-range>1673-89</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[After Snowden: Rethinking the impact of surveillance.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bauman]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Bigo]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Esteves]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Guild]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Jabri]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Lyon]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Walker]]></surname>
<given-names><![CDATA[R.B.]]></given-names>
</name>
</person-group>
<source><![CDATA[International Political Sociology]]></source>
<year>2014</year>
<volume>8</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>121-44</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Critical questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boyd]]></surname>
<given-names><![CDATA[Danah.]]></given-names>
</name>
<name>
<surname><![CDATA[Crawford]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Information, Communication &amp; Society]]></source>
<year>2012</year>
<volume>15</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>662-79</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The logic of connective action: Digital media and the personalization of contentious politics.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bennett]]></surname>
<given-names><![CDATA[W.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Segerberg]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Information, Communication &amp; Society]]></source>
<year>2012</year>
<volume>15</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>739-68</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Emerging methods for digital media research: An introduction.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Burgess]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Bruns]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hjorth]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Broadcasting &amp; Electronic Media]]></source>
<year>2013</year>
<volume>57</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-3</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The robotic reporter: Automated journalism and the redefinition of labor, compositional forms, and journalistic authority.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carlson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Journalism]]></source>
<year>2015</year>
<volume>3</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>416-31</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Enter the Robot Journalist: Users' perceptions of automated content.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Clerwall]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journalism Practice]]></source>
<year>2014</year>
<volume>8</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>519-31</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Clarifying journalism's quantitative turn: A typology for evaluating data journalism, computational journalism, and computer-assisted reporting.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Coddington]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Journalism]]></source>
<year>2015</year>
<volume>3</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>331-48</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Crawford]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Artificial intelligence's white guy problem]]></source>
<year>2016</year>
<publisher-name><![CDATA[New York Times]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Critiquing Big Data: Politics, ethics, epistemology.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Crawford]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Miltner]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Gray]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
</person-group>
<source><![CDATA[International Journal of Communication]]></source>
<year>2014</year>
<numero>8</numero>
<issue>8</issue>
<page-range>1663-72</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Immersive journalism: immersive virtual reality for the first-person experience of news.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[De la Peña]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Weil]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Llobera]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Giannopoulos]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Pomés]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Spanlang]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Slater]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Presence: Teleoperators and Virtual Environments]]></source>
<year>2010</year>
<volume>19</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>291-301</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dewey]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[98 personal data points that Facebook uses to target ads to you.]]></source>
<year>2016</year>
<publisher-name><![CDATA[Washington Post]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Exploiting affinities between topic modeling and the sociological perspective on culture: Application to newspaper coverage of U.S. government arts funding.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[DiMaggio]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Nag]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Blei]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Poetics]]></source>
<year>2013</year>
<numero>41</numero>
<issue>41</issue>
<page-range>570-606</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Privacy in the Age of Google and Facebook]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dwyer]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Technology and Society Magazine]]></source>
<year>2011</year>
<volume>30</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>58-63</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Are you scared yet? Evaluating fear appeal messages in tweets about the tips campaign.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Emery]]></surname>
<given-names><![CDATA[S. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Szczypka]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Abril]]></surname>
<given-names><![CDATA[E.P.]]></given-names>
</name>
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Vera]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Communication]]></source>
<year>2014</year>
<volume>64</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>278-95</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Second screen and participation: A content analysis on a full season dataset of tweets.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Giglietto]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Selva]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Communication]]></source>
<year>2014</year>
<volume>64</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>260-77</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gil de Zúñiga]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Garcia-Perdomo]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[McGregor]]></surname>
<given-names><![CDATA[S.C.]]></given-names>
</name>
</person-group>
<source><![CDATA[What is second screening? Exploring motivations of second screen use and its effect on online political participation.]]></source>
<year>2015</year>
<volume>65</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>793-815</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Social media, political expression, and political participation: Panel analysis of lagged and concurrent relationships.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gil de Zúñiga]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Molyneux]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Communication]]></source>
<year>2014</year>
<volume>64</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>612-34</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gitelman]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Raw data is an oxymoron]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Cambridge, MA ]]></publisher-loc>
<publisher-name><![CDATA[MIT Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Media sociology: The dominant paradigm.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gitlin]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Theory and Society]]></source>
<year>1978</year>
<volume>6</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>205-53</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Digital divisions of labor and informational magnetism: Mapping participation in Wikipedia]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Graham]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Straumann]]></surname>
<given-names><![CDATA[R.K.]]></given-names>
</name>
<name>
<surname><![CDATA[Hogan]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Annals of the Association of American Geographers]]></source>
<year>2015</year>
<volume>105</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1158-78</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The application of social network analysis in agenda setting research: A methodological exploration.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guo]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Broadcasting &amp; Electronic Media]]></source>
<year>2012</year>
<volume>4</volume>
<numero>616</numero>
<issue>616</issue>
<page-range>631</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Big Social Data analytics in journalism and mass communication comparing dictionary-based text analysis and unsupervised topic modeling.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guo]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Vargo]]></surname>
<given-names><![CDATA[C.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Pan]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Ishwar]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journalism &amp; Mass Communication Quarterly]]></source>
<year>2016</year>
<volume>93</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>332-59</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Making data-big data and beyond: Introduction to the special issue.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Helles]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Jensen]]></surname>
<given-names><![CDATA[K.B.]]></given-names>
</name>
</person-group>
<source><![CDATA[First Monday]]></source>
<year>2013</year>
<volume>18</volume>
<numero>10</numero>
<issue>10</issue>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Introna]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Nissenbaum]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The public good vision of the internet and the politics of search engines]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Rogers]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Preferred Placement - Knowledge Politics on the Web]]></source>
<year>2000</year>
<page-range>25-47</page-range><publisher-loc><![CDATA[Maastricht ]]></publisher-loc>
<publisher-name><![CDATA[Jan van Eyck Akademy]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Katz]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Lazarsfeld]]></surname>
<given-names><![CDATA[P.F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Personal influence: The part played by people in the flow of mass communications.]]></source>
<year>1955</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Free Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Beyond networks in structural theories of exchange: Promises from computational social science.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kitts]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Advances in Group Processes]]></source>
<year>2014</year>
<numero>31</numero>
<issue>31</issue>
<page-range>263-98</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Experimental evidence of massive-scale emotional contagion through social networks]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kramer]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Guillory]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hancock]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Proceedings of the National Academy of Sciences]]></source>
<year>2014</year>
<volume>111</volume>
<numero>24</numero>
<issue>24</issue>
<page-range>8788-90</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kuhn]]></surname>
<given-names><![CDATA[T. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[The structure of scientific revolutions.]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Chicago ]]></publisher-loc>
<publisher-name><![CDATA[University of Chicago Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Code, collaboration, and the future of journalism: a case study of the Hacks/Hackers global network.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lewis]]></surname>
<given-names><![CDATA[S.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Usher]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Journalism]]></source>
<year>2014</year>
<volume>2</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>383-93</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Actors, actants, audiences, and activities in cross-media news work: A matrix and a research agenda.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lewis]]></surname>
<given-names><![CDATA[S.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Westlund]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Journalism]]></source>
<year>2015</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>19-37</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Content analysis in an era of Big Data: A hybrid approach to computational and manual methods.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lewis]]></surname>
<given-names><![CDATA[S.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Zamith]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Hermida]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Broadcasting &amp; Electronic Media]]></source>
<year>2013</year>
<volume>57</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>34-52</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Surveillance, Snowden, and big data: Capacities, consequences, critique.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lyon]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Big Data &amp; Society]]></source>
<year>2014</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Algorithmic ideology: How capitalist society shapes search engines]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mager]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Information, Communication &amp; Society]]></source>
<year>2012</year>
<volume>15</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>769-87</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Defining algorithmic ideology: Using ideology critique to scrutinize corporate search engines.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mager]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Triple C: Communication, Capitalism &amp; Critique. Open Access Journal for a Global Sustainable Information Society]]></source>
<year>2014</year>
<volume>12</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>28-39</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The value of Big Data in digital media research]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mahrt]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Scharkow]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Broadcasting &amp; Electronic Media]]></source>
<year>2013</year>
<volume>57</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>20-33</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Manovich]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Trending: The promises and the challenges of big social data]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Gold]]></surname>
<given-names><![CDATA[M. K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Debates in the digital humanities]]></source>
<year>2012</year>
<page-range>460-75</page-range><publisher-loc><![CDATA[Minneapolis, MN ]]></publisher-loc>
<publisher-name><![CDATA[University of Minnesota Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McChesney]]></surname>
<given-names><![CDATA[R. W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital disconnect: How capitalism is turning the Internet against democracy]]></source>
<year>2013</year>
<publisher-loc><![CDATA[New York and London ]]></publisher-loc>
<publisher-name><![CDATA[The New Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Talking Politics on Twitter: Gender, Elections, and Social Networks.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[McGregor]]></surname>
<given-names><![CDATA[S.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Mourão]]></surname>
<given-names><![CDATA[R. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Social Media + Society]]></source>
<year>2016</year>
<numero>July-September</numero>
<issue>July-September</issue>
<page-range>1-14</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Big Data solutions on a small scale: Evaluating accessible high-performance computing for social research.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Murthy]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Bowman]]></surname>
<given-names><![CDATA[S.A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Big Data &amp; Society]]></source>
<year>2014</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1-12</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Ethnographic Research 2.0: The potentialities of emergent digital technologies for qualitative organizational research.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Murthy]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Organizational Ethnography]]></source>
<year>2013</year>
<volume>2</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>23-36</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The dynamics of public attention: Agenda-setting theory meets big data.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Neuman]]></surname>
<given-names><![CDATA[W. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Guggenheim]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Mo Jang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Bae]]></surname>
<given-names><![CDATA[S. Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Communication]]></source>
<year>2014</year>
<volume>64</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>193-214</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Reassessing the Facebook experiment: critical thinking about the validity of Big Data research.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Panger]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Information, Communication &amp; Society]]></source>
<year>2016</year>
<volume>19</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1108-26</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cross-Cultural Comparison of Nonverbal Cues in Emoticons on Twitter: Evidence from Big Data Analysis.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Park]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Baek]]></surname>
<given-names><![CDATA[Y. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Cha]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Communication]]></source>
<year>2014</year>
<volume>64</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>333-54</page-range></nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Big data in communication research: Its contents and discontents.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Parks]]></surname>
<given-names><![CDATA[M.R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Communication]]></source>
<year>2014</year>
<volume>64</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>355-60</page-range></nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Metaphors of big data]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Puschmann]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Burgess]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[International Journal of Communication]]></source>
<year>2014</year>
<numero>8</numero>
<issue>8</issue>
<page-range>1690-709</page-range></nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Net neutrality: Media discourses and public perception]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quail]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Larabie]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Global Media Journal]]></source>
<year>2010</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>31-50</page-range></nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Privacy by design: A counterfactual analysis of Google and Facebook privacy incidents.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rubinstein]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Good]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[NYU School of Law, Public Law Research]]></source>
<year>2013</year>
<numero>Paper No. 12-43</numero>
<issue>Paper No. 12-43</issue>
</nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schutt]]></surname>
<given-names><![CDATA[R.K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Investigating the social world: The process and practice of research]]></source>
<year>2009</year>
<edition>6th</edition>
<publisher-loc><![CDATA[Thousand Oaks, CA ]]></publisher-loc>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Big data, digital media, and computational social science: Possibilities and perils.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shah]]></surname>
<given-names><![CDATA[D.V.]]></given-names>
</name>
<name>
<surname><![CDATA[Cappella]]></surname>
<given-names><![CDATA[J. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Neuman]]></surname>
<given-names><![CDATA[W. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[The ANNALS of the American Academy of Political and Social Science]]></source>
<year>2015</year>
<numero>659</numero>
<issue>659</issue>
<page-range>6-13</page-range></nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[When scale meets depth: Integrating natural language processing and textual analysis for studying digital corpora.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shahin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Communication Methods and Measures]]></source>
<year>2016</year>
<month>a</month>
<volume>10</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>28-50</page-range></nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Right to Be forgotten: How national identity, political orientation, and capitalist ideology structured a trans-Atlantic debate on information access and control.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shahin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journalism &amp; Mass Communication Quarterly]]></source>
<year>2016</year>
<month>b</month>
<volume>93</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>360-82</page-range></nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Simon]]></surname>
<given-names><![CDATA[A.F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A unified method for analyzing media framing]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Hart]]></surname>
<given-names><![CDATA[R.P.]]></given-names>
</name>
<name>
<surname><![CDATA[Shaw]]></surname>
<given-names><![CDATA[D.R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Communication in U.S. elections: New agendas]]></source>
<year>2001</year>
<page-range>75-89</page-range><publisher-loc><![CDATA[Lanham, MD ]]></publisher-loc>
<publisher-name><![CDATA[Rowman and Littlefield]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Public service news on the Web: A large-scale content analysis of the Norwegian Broadcasting Corporation's online news.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sjøvaag]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Moe]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Stavelin]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journalism Studies]]></source>
<year>2012</year>
<volume>13</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>90-106</page-range></nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Under surveillance examining Facebook's spiral of silence effects in the wake of NSA internet monitoring.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stoycheff]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journalism &amp; Mass Communication Quarterly]]></source>
<year>2016</year>
<volume>93</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>296-311</page-range></nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Analyzing public sentiments online: Combining human-and computer-based content analysis.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Su]]></surname>
<given-names><![CDATA[L.Y. F.,]]></given-names>
</name>
<name>
<surname><![CDATA[Cacciatore]]></surname>
<given-names><![CDATA[M.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Liang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Brossard]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Scheufele]]></surname>
<given-names><![CDATA[D.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Xenos]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Information, Communication &amp; Society]]></source>
<year>2016</year>
<page-range>1-22</page-range></nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Big Data classification: Problems and challenges in network intrusion prediction with machine learning.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suthaharan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[SIGMETRICS Performance Evaluation Review]]></source>
<year>2014</year>
<volume>41</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>70-3</page-range></nlm-citation>
</ref>
<ref id="B62">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Privacy in the age of big data: A time for big decisions]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tene]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Polonetsky]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Stanford Law Review Online]]></source>
<year>2012</year>
<numero>64</numero>
<issue>64</issue>
<page-range>63-9</page-range></nlm-citation>
</ref>
<ref id="B63">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Van Atteveldt]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Semantic network analysis: Techniques for extracting, representing, and querying media content.]]></source>
<year>2008</year>
<publisher-loc><![CDATA[Charleston, SC ]]></publisher-loc>
<publisher-name><![CDATA[Book-Surge Publishers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B64">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Where is the governance in Internet governance?]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Van Eeten]]></surname>
<given-names><![CDATA[M.J.G.]]></given-names>
</name>
<name>
<surname><![CDATA[Mueller]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[New Media &amp; Society]]></source>
<year>2012</year>
<volume>15</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>720-36</page-range></nlm-citation>
</ref>
<ref id="B65">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Network issue agendas on Twitter during the 2012 US presidential election.]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vargo]]></surname>
<given-names><![CDATA[C. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Guo]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[McCombs]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Shaw]]></surname>
<given-names><![CDATA[D. L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Communication]]></source>
<year>2014</year>
<volume>64</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>296-316</page-range></nlm-citation>
</ref>
<ref id="B66">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Westwood]]></surname>
<given-names><![CDATA[S.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Weiss]]></surname>
<given-names><![CDATA[R.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Iyengar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[All the news that is fit to print? Gatekeeping effects in newspaper coverage of international affairs]]></source>
<year>2013</year>
<conf-name><![CDATA[ 63rdannual conference of the International Communication Association]]></conf-name>
<conf-loc>London </conf-loc>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
