Hostname: page-component-cd9895bd7-q99xh Total loading time: 0 Render date: 2024-12-26T05:20:47.806Z Has data issue: false hasContentIssue false

Editors' Introduction to Technology, Data, and Politics

Published online by Cambridge University Press:  28 March 2013

Sheena Chestnut Greitens
Affiliation:
Harvard University, guest editor
Gabriel Koehler-Derrick
Affiliation:
United States Military Academy, West Point, guest editor

Extract

This symposium addresses the rise of Internet data—and, more broadly, the data that is generated by a range of information and communication technologies (ICTs). Global ICT growth could have wide-ranging implications for the study of politics, but political science is currently lagging behind other disciplines in its use of ICT-derived data—particularly compared to fields such as public health and economics (Nadav et al. 2011; Carneiro and Mylonakis 2009; Choi and Varian 2009; Christakis and Fowler 2009; Ginsberg et al. 2009; Jensen 2011). The articles in this symposium, therefore, focus on the question of how political scientists can and should think about using ICT-derived data in their research.

Type
Symposium: Technology, Data, and Politics
Copyright
Copyright © American Political Science Association 2013

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

REFERENCES

Bamman, David, O'Connor, Brendan, and Smith, Noah A.. 2012. “Censorship and Deletion Practices in Chinese Social Media.” FirstMonday 17 (3). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/3943/3169.Google Scholar
Bond, Robert M., Fariss, Christopher J., Jones, Jason J., Kramer, Adam D. I., Marlow, Cameron, Settle, Jaime E., and Fowler, James H.. 2012. “A 61-Million-Person Experiment in Social Influence and Political Mobilization.” Nature 489 (7415): 295–98. http://www.nature.com/nature/journal/v489/n7415/pdf/nature11421.pdf.CrossRefGoogle ScholarPubMed
Carneiro, Herman Anthony, and Mylonakis, Eleftherios. 2009. “Google Trends: A Web-Based Tool for Real-Time Surveillance of Disease Outbreaks.” Clinical Infectious Diseases 49 (10): 1557–64. http://www.ncbi.nlm.nih.gov/pubmed/19845471.CrossRefGoogle ScholarPubMed
Christakis, N., and Fowler, J.. 2009. “Social Network Visualizations in Epidemiology.” Norwegian Journal of Epidemiology 19 (1): 516.Google ScholarPubMed
Finn, Holly. 2012. “New Gumshoes Go Deep with Data.” The Wall Street Journal, October 20. http://online.wsj.com/article/SB10000872396390444354004578060654273228618.html.Google Scholar
Ginsberg, Jeremy, Mohebbi, Matthew, Patel, Rajan, Brammer, Lynnette, Smolinski, Mark, and Brilliant, Larry. 2009. “Detecting Influenza Epidemics Using Search Engine Query Data.” Nature 457: 1012–14.CrossRefGoogle ScholarPubMed
Jensen, Robert. 2011. “The Digital Provide: Information (Technology), Market Performance, and Welfare in the South Indian Fisheries Sector.” Quarterly Journal of Economics 122 (3): 879924.CrossRefGoogle Scholar
King, Gary, Pan, Jennifer, and Roberts, Molly. 2012. “How Censorship in China Allows Government Criticism but Silences Collective Expression.” Paper prepared for the Annual Meeting of the American Political Science Association. New Orleans, August.CrossRefGoogle Scholar
Mostak, Todd. 2012. “Social Media as Passive Polling: Using Twitter and Online Forums to Map Islamism in Egypt.” MA Thesis, Center for Middle Eastern Studies.Google Scholar
Nadav, Aharony, Pan, Wei, Ip, Cory, Khayal, Inas, and Pentland, Alex. 2011. “Social fMRI, investigating and shaping social mechanism in the real world.” Pervasive and Mobile Computing 7: 643659.Google Scholar
Nielsen, Rich. 2012. “Jihadi Radicalization of Muslim Clerics.” Working paper. August 31. Online at http://people.fas.harvard.edu/~rnielsen/jihad.pdf.Google Scholar
Shapiro, Jacob N., and Weidmann, Nils B.. 2012. “Is the Phone Mightier Than the Sword? Cell Phones and Insurgent Violence in Iraq.” Working paper, September 3, 2012. Online at http://www.princeton.edu/~jns/papers/SW_2011_Cell_Phones_Insurgency_06SEP12.pdf.Google Scholar