Vous êtes sur la page 1sur 21

Gatekeeping Theory

from Social Fields to Social Networks


David Deluliis
deiuliisd@duq.edu

Gatekeeping theory refers to the control of infor­ mation on the Web necessitates some form of gate-
mation as it passes through a gate (Shoemaker & Vos, keeping, what does it look like? Brown (1979) and,
2009). The gate is guarded by gatekeepers, who make more recently, Shoemaker and Vos (2009) and
decisions about what information to let through and Shoemaker and Reese (2014), call for a return to
what to keep out (Lewin, 1947b). In making these deci­ Lewin. They argue that Lewin’s field theory remains
sions, gatekeepers exercise power over those on the relevant for gatekeeping. Much early gatekeeping
other side of the gate. The intellectual origins of gate- research followed White (1950) and left Lewin’s field
keeping can be traced to Kurt Lewin, a Berlin-bom theory behind (Shoemaker & Vos, 2009). For
social scientist who applied the methods of individual Shoemaker and Vos (2009), gatekeeping must recon­
psychology to the whole social world. Lewin nect with its origins in field theory and add an audience
approached gatekeeping as just one of many interrelat­ channel to old models of gatekeeping. In several arti­
ed phenomena that together make up a social field. To cles and chapters, Karine Barzilai-Nahon disagrees.
understand gatekeeping, one had to understand the For Barziali-Nahon (2009), adding new channels to old
whole field. Lewin’s student, David Manning White, models does not adequately account for the dynamism
was the first to apply the concept of gatekeeping to of gatekeeping in new media, and the changed roles of
mass communication. White’s (1950) analysis of the gatekeeper and gated. Barzilai-Nahon proposes a new
gatekeeping decisions of one newspaper editor, called concept, the “gated,” and a new theory, network gate-
Mr. Gates, focused on the subjective factors that influ­ keeping, to model the dynamism of gatekeeping on
ence gatekeeping decisions. Following White (1950), new media.
the field of communication has most often conceptual­ In this review essay, I first describe the intellectu­
ized gatekeeping as the selection of news, where a small al origins of gatekeeping theory in Lewin’s field theo­
number of news items pass a gate manned by journal­ ry. I then trace the development of gatekeeping theory
ists. In making their selections, gatekeepers construct from early debates about its focus to modem questions
social reality for the gated (Shoemaker, 1991). about its applicability to new media.
The World Wide Web has presented new chal­ I then outline the conceptual apparatus of network
lenges to these traditional models of gatekeeping, gatekeeping theory, and situate network gatekeeping
where raw content passes uni-directionally through a theory within communication studies. Finally, I apply
gate manned by journalists before reaching the reading network gatekeeping in the context of Digg, Twitter,
public. The ability of users to create and disseminate and Facebook, three social networks that demonstrate
their own content has uprooted and inverted the roles the capacity for not only selecting, but also repeating,
of gatekeeper and gated. However, if the mass of infor­ channeling, and manipulating infonnation.

1. Intellectual Origins of Gatekeeping Theory

A. Lewin and field theory


chology in the United States. From his early days in
The father of gatekeeping theory is Kurt Lewin Berlin, Lewin developed a conceptual apparatus for
(Shoemaker & Vos, 2009). Bom in Poland in 1890 and studying human behavior and motives with method­
raised in Berlin, Lewin was a pioneer of applied psy­ ological rigor. Lewin developed best practices for

4 — V olume 34 (2015) No. 1 C ommunication R esearch T rends


social scientists to understand the social world with the ical, economic, and legal processes, must be included
same precision that natural scientists understand the in the life space because they directly affect behavior.
physical world (Cartwright, 1951). In Lewin’s time, Remote events and movements have minimal effect
social science was tom between speculative theory and and need not be included. The life space moves through
objective empiricism. Lewin called for a middle history and is affected by past experiences, but only the
ground that makes generalizations about the social system as a whole can show effects at any one time
world from observations of human behavior. For (Cartwright, 1951, p. xiii). Lewin’s work had a ripple
Lewin, the task of social science should be to concep­ effect on the social sciences, extending centrifugally
tualize the world. This process of conceptualization, the limits of the life space.
the translating of phenomena in the world to concepts Similarly, the idea of gatekeeping is inherent
in the mind (Cartwright, 1951, p. ix), is the heart of sci­ within Lewin’s conception of the social sciences,
entific inquiry and the building block of theory. Good informed by Gestalt psychology and logical posi­
conceptualization oscillates between qualitative and tivism, as well as the philosophy of Ernst Cassirer.
quantitative, general and particular, part and whole, Logical positivism arose in Germany in the 1920s as a
and group and individual. response to the idealism of German philosopher Georg
The theory of gatekeeping emerged organically Wilhelm Friedrich Hegel (1770-1831), whose idealist
out of this process of conceptualization. Lewin con­ philosophy emphasized abstract Spirit over concrete
ceptualized the social world as a relationship between reality (Ayer, 1966). The movement of logical posi­
individuals and groups. Each individual constitutes a tivism brought philosophy back down to earth by
“lifespace,” which consists of the individual and the grounding human knowledge in only experience and
individual’s environment (Lewin, 1947a). Groups too, reason. Logical positivists rejected metaphysics, the
comprise lifespaces, made up of the group and its envi­ study of the underlying nature of things, as meaning­
ronment. Together, the life spaces of the social world less (Ayer, 1966). All theoretical statements are also
make up a “social field” (Lewin, 1947a). In a social meaningless until verified. Logical positivists
field, the lifespaces of every individual and group assigned meaning to words according to their practical
coexist within one “ecological setting” (Lewin, 1951, use and considered language only a representation of
p. 14). The relationship of social field to individual life- the true nature of things. For logical positivists, the
space determines human behavior. The social scientist language of science should be the common language
defines a life space by identifying its individual parts, of human knowledge (Ayer, 1966). Like logical posi­
then determining how they relate to the whole social tivism, Gestalt psychology emerged in Germany in the
field in space and time (Cartwright, 1951). In defining 20th century as a response to certain schools of psy­
a lifespace, the social scientist acts as a gatekeeper who chology that divided psychological experience into
“determines specifically what things are to be included isolated and distinct parts (Kohler, 1969). Grounded in
in the representation of any given life space at any par­ phenomenology, the study of human conscious experi­
ticular time” (Cartwright, 1951, p. xi). With a series of ence, Gestalt psychology argues that the sum of psy­
“in” and “out” decisions about what to include and chological experience is other than any of its parts, and
exclude from an individual life space (Lewin, 1947b, p. understanding any of the parts requires an understand­
145; White, 1950, p. 383), the social scientist defines ing of the whole (Kohler, 1969).
the relationship between life space and social field, and Lewin’s conception of the social sciences was
individual psychology and social interaction also heavily influenced by Cassirer (1874-1945), a
(Shoemaker, 1991). prominent German philosopher and cultural theorist
Gatekeeping decisions about the life space were who taught Lewin philosophy at the University of
informed by the intellectual climate in the early 20th Berlin. In his three-volume Philosophy o f Symbolic
century. For Lewin, the individual life space included Forms (1923, 1925, 1929), Cassirer grounded knowl­
the thought processes of the individual (Gestalt psy­ edge in human culture. Humans make sense of the
chology), as well as the environment that the individ­ world through signs and sign systems (1923). For
ual perceives (Husserlian phenomenology), and any Cassirer, these signs form the fundamental unit of sci­
unconscious states that affect the individual’s psychol­ entific analysis (Lewin, 1949). Cassirer’s philosophy
ogy (Freudian psychoanalysis). Lewin argued that of symbolic forms looked to early, more primitive,
needs, goals, and cognitive structures, as well as polit­ forms of human knowledge expressed in natural lan-

COMMUNICATION RESEARCH TRENDS V olume 34 (2015) No. 1 — 5


guage. For Cassirer, religion and art emerge from myth, variables by controlling for alternative explanations
and science from natural language (Lewin, 1949). (Shoemaker & Vos, 2009).
Symbolic forms progress from emotional expressions Lewin also saw a disconnect between theory and
of experience with no distinction between appearance practice (Cartwright, 1951). Practitioners of the social
and reality, to more abstract representations of types world, such as priests, parents, and politicians, tend to
and forms of appearances in natural language, to pure favor intuition and experience over conceptual analysis
signification of reality in theoretical science (Cassirer, and social rules (Lewin, 1947a). For these practition­
1923). Cassirer encouraged Lewin to expand the reach ers, events are complex reflections of the whole envi­
of psychology beyond the limits of individual psychol­ ronment, not the whims of specific individuals. Lewin
ogy (Lewin, 1949). argues that social scientists should look for these
In response, Lewin wanted to develop a more reflections as underlying conditions of the social world
democratic method of social management (Cartwright, by situating life spaces within social fields, then moni­
1951). Lewin saw an opportunity to combine the objec­ toring changes in the social field caused by individual
tivity of science with the objectives of people to under­ or group behavior. For instance, to understand the steps
stand this turmoil. Concepts in individual psychology, leading to war between two nations, the social scientist
such as force fields, fluctuations, and phase spaces, starts with the lifespace of each nation, then observes
could be used for social processes, and the mathemati­ what each nation does, then reevaluates the goals, stan­
cal tools used to study quasi-stationary equilibria in dards, and values of each nation. Both the scientist and
economics could be used in cultural settings (Lewin, practitioner approach elements of the social world as
1951). For Lewin, economic equilibria such as supply part of a dynamic whole.
and demand were conceptually similar to social Lewin conceptualized social processes objective­
processes such as the productivity of a work team. By ly as the result of conflicting forces. Lewin’s goal was
employing experimental and mathematical procedures to isolate, identify, and measure the forces, then manip­
of the natural sciences, the social sciences can achieve ulate the forces to achieve a desired objective. For
the same level of specificity as the natural sciences instance, to change the level of productivity of a work
(Lewin, 1951). team, a manager must unfreeze the current level of per­
However, the Jewish-bom Lewin faced a num­ formance, then introduce a new level, then refreeze the
ber of challenges in the years following World War new level in the same way as the old (Lewin, 1947a).
II. As the crimes committed by Hitler’s Third Reich The productivity of a work team is a “quasi-stationary
came to light, some natural scientists acknowledged equilibrium” that fluctuates around an average level
the potential for social events to shape the natural (Lewin, 1947a, p. 6). The level of productivity of a
world. However, not all social scientists agreed about work team proceeds in a predictable way despite
the objective reality of the social world. Some con­ changing demands and worker turnover. The fluctua­
cepts, like leadership, could not shake a “halo of tion is due to equal and opposite forces, such as the
mysticism” that kept them outside the purview of orders of managers and laziness of employees, that
social sciences (Lewin, 1947a, p. 7). In the natural push productivity above or below the average level.
sciences, debates about reality concern the most ele­ The productivity of the work team ceases to be quasi-
mentary of physical phenomena, like atoms and elec­ stationary when forces push the level of fluctuation
trons. In the social sciences, debates concern the real­ outside the area of the average. When such a force is
ity of the whole social world (Lewin, 1947a). Lewin strong enough to change the average level of fluctua­
argued that, if the body as a whole has different prop­ tion, opposing forces may bring the average back to the
erties from individual molecules, and molecules from previous level. However, the force may also be so
individual atoms, the dynamic social whole will have strong that it moves the average level of fluctuation
different properties from individuals. Both are as permanently, as in the case of social revolutions
equally real as atoms and the human body. Social sci­ (Lewin, 1947a).
ence just had to identify the right constructs, then Changing the level of fluctuation around a quasi-
measure them in relation to a social whole, then infer stationary equilibrium requires attention to the social
laws about human behavior (Lewin, 1947a). Lewin’s whole within which the equilibrium fluctuates. The
methods have informed modern multivariate analy­ level of fluctuation is often associated with a social
sis, which measures causal relationships between two custom or habit that resists change, such as procrasti-

6 — V olume 34 (2015) No. 1 C ommunication Research T rends


nation in the workplace. In this case, additional force is purchased, put in the icebox or pantry, prepared for
needed to break the “inner resistance” of habit and consumption, and placed on the kitchen table. From
ensure that the level of fluctuation does not revert back the garden, food is planted and picked, then put in the
to its previous level (Lewin, 1947a). The standards of pantry, prepared for consumption, and placed on the
conduct within a group may also acquire a positive kitchen table. Decisions about what to buy or grow
force of their own that ousts individual members of the will determine what foods enter the channels. The
group who deviate too far from the group standards. In points at which decisions are made within a channel
this case, the social equilibrium itself becomes a stan­ are sections. Once a potato is chosen from either the
dard of individual conduct, pushing a work team mem­ grocer or garden, the cook must decide how to serve it,
ber to keep up with its pace of productivity. Lewin what to serve it with, and how much to save for tomor­
accounts for not only the relationship between the indi­ row. Of all the potato plants grown in a given year,
vidual and work team, but also the relationship only a few make it through all of the sections of a
between the work team and whole cultural context channel to a dinner table.
(Cartwright, 1951). Decisions in each section of the channel are guid­
ed by forces. Purchasing decisions at the grocer will be
B. Lewin and gatekeeping theory affected by positive forces in favor of buying, such as
Lewin articulated his field theory in two articles low prices and personal preference, and forces against
published in the journal Human Relations in 1947. buying, such as high price or low nutrition. If the total
These papers, along with several other theoretical forces in favor of buying the food outweigh the total
papers, were collected in 1951 and posthumously pub­ forces against buying the food, the food will be bought,
lished as Field Theoiy in Social Science. In the first or the reverse. Consider pork chops. As you stand in
paper, Lewin developed the constructs of social fields the grocery store, deciding whether to buy the pork
and quasi-stationary equilibria, described above. In the chops, there is a strong force in favor of buying the
second, Lewin proposed “gatekeeping” as a way to pork chops, if you like pork chops, but also a strong
examine how objective problems, such as the movement force against buying the pork chops, if they are expen­
of goods and people, are affected by subjective states sive. Lewin’s housewife is similarly conflicted.
and cultural values. In this famous article, Lewin shifts Once the housewife decides to buy or grow the
his focus to the social channels that connect individuals food, it enters either the grocer or garden channel, and
to social fields, and the ways to make change at the level is pushed through the channel by forces that change
of not only a work team, but also society as a whole. direction once a decision is made. If the forces in favor
When making widespread social change, such as of buying expensive pork chops prevail, the forces for­
changing the eating habits of a population, it is imprac­ merly keeping the pork chops from the table now push
tical and expensive to educate every member of the them through the channel, because a housewife would
community. Instead, one needs to target the most influ­ not want to waste expensive pork chops. The point at
ential members of the community who are in a “key which this force changes direction, from keeping food
position” to spread the message and model the desired out of a channel to keeping it in the channel, is a gate
behavior (Lewin, 1947b). The key position will depend (Lewin, 1947b). At this critical point, the character of
on the desired social change. For instance, in the late the force changes. For instance, an elite university
1940s American housewives were in a key position to admissions board may produce strong forces against
change the eating habits of their families. Rather than admission by admitting only the highest scoring stu­
educating every single American about nutritional dents but, once they are admitted, the university helps
value of orange juice, one should look to the person the students to graduate in order to keep its matricula­
who buys the food for the family. tion rate high.
In this context, Lewin introduced his theory of The decisions about what items to let in and keep
gatekeeping using the terms channel, section, force, out of a channel are made by “gatekeepers” (Lewin,
and gate. A channel determines what obstacles an item 1947b, p. 145), such as the housewife and university
will face from discovery to use (Lewin, 1947b). Lewin admission board. Lewin (1947b) argued that social
mapped two channels through which food passes on change was the product of forces acting on these gate­
its way to the American kitchen table, the grocery keepers. To understand the forces, one must first identi­
store and the garden. From the grocery store, food is fy the gatekeepers, then change, or change the mind of

C ommunication R esearch T rends V olume 34 (2015) No. 1 — 7


the gatekeepers. For Lewin, gatekeeping is always situ­ social sciences in general was fundamentally practical.
ational, subject to changing circumstances in the pres­ Lewin saw himself as a “gatekeeper of civilization”
ent, and ideological, informed by long- tenn value sys­ (White, 1950, p. 390) who laid tracks through the vast
tems in the past and future (Cartwright, 1951). With this expanses of human knowledge. Lewin was a careful
understanding of gatekeeping, Lewin answered his own and thoughtful theoretician who subscribed to the
call to combine the concepts and methods of natural sci­ “method of careful approximation” (Cartwright, 1951,
ence and economics with social science. The subjective p. xiv). For Lewin, methods must always match ques­
forces acting on the housewife directly impact objective tions. With this in mind, Lewin proposed the concepts
output, such as units of food sold (Lewin, 1947b). of the gate and gatekeeper in order to inspire the next
Lewin’s approach to gatekeeping in particular and generation of social scientists.

2. Gatekeeping Theory after Lewin

A. Mr. Gates
decisions based on their own backgrounds (p. 383). At
After Lewin, the trajectory of gatekeeping theory the end of this chain is Mr. Gates, a middle-aged man
progressed in the spirit of its creator, rippling outward who edits a morning paper with a circulation of 30,000
from individual factors to organizational and external in a Midwestern city of 100,000 citizens (p. 384).
factors, to the entire social milieu in which gatekeep­ Mr. Gates was responsible for choosing a select
ing occurs (Shoemaker & Vos, 2009). Wilbur few stories from the “mass” of wire copy he received
Schramm, one of the founders of the field of commu­ every day (White, 1950, p. 384). The stories that Mr.
nication studies (White, 1950, p. 383), had written that Gates saw had already made it through several gates
“no aspect of communication is so impressive as the manned by reporters, rewriters, and lower-level edi­
enormous number of choices and discards which have tors. It was up to Mr. Gates to make the final decision.
to be made between the formation of the symbol in the Over a period of one week, Mr. Gates saved all of the
mind of the communicator, and the appearance of a copy that crossed his desk, and wrote justifications on
related symbol in the mind of the receiver” (p. 289). A every piece of rejected copy. Mr. Gates rejected 90% of
year later, David Manning White became the first to the 12,400 column inches of wire copy he received.
explicitly apply Lewin’s gatekeeping theory to the Among the reasons given by Mr. Gates for rejecting
mass media with “one of the first studies of its kind” in events were, “BS,” “Propaganda,” “He’s too red,” and
Journalism Quarterly (White, 1950, p. 383). With his “Don’t care for suicide stories,” (p. 386). Also, reasons
article, “The ‘Gate Keeper’: A Case Study in the such as, “No space” and “Would use-if space,” were
Selection of News,” White tried to understand how one paired with subjective judgments such as “Better
media gatekeeper, called “Mr. Gates,” “operates his story,” or “Lead more interesting” (p. 387).
gate” (White, 1950, p. 383). White interpreted these findings as evidence of
Staffed by anchors, reporters, editors, and corre­ how “highly subjective, how reliant upon value judg­
spondents, the first gate of the media is the point at ments based on the gatekeeper’s own set of experi­
which initial decisions about the newsworthiness of ences, attitudes and expectations the communication of
events are made (White, 1950). The impact of these ‘news’ really is” (p. 387).
decisions is easy to see, said White, by reading two White has become synonymous in gatekeeping
accounts of a controversial policy issue from opposing literature with individual influences on gatekeeping
political perspectives. The media gatekeeper deter­ decisions (Shoemaker & Vos, 2009). However, he was
mines not only what events the public knows about, also prescient in ascribing to gatekeepers the power to
but also how the public thinks about events based on construct social reality: “in his position as ‘gatekeep­
the gatekeeper’s own experiences, attitudes, and er,’ the newspaper editor sees to it (even though he may
expectations (p. 384). In a chain of communication never be consciously aware of it) that the community
from discovery to dissemination, a news item passes shall hear as a fact only those events which the news­
through many people who all make “in” and “out” man, as the representative of his culture, believes to be

8 — V olume 34 (2015) No. 1 C ommunication Research T rends


true” (White, 1950, p. 390). These two themes run gender norms on individual gatekeeping decisions.
through all subsequent gatekeeping research. Bleske found that Mr. and Ms. Gates assigned the same
relative importance to human interest and national and
B. Levels o f analysis international politics stories. While Bleske’s results
In the decades after Lewin, gatekeeping research were similar to White’s, they also show the importance
has attended to both individual and cultural factors. of industry standards if a woman with the same job
There are four levels of analysis in Lewin’s field theo­ makes the same decisions 50 years later.
ry: microsystem, or immediate context; mesosystem, or More recently, Enli (2007) replicated White’s
collection of immediate contexts; exosystem, or exter­ study in the context of the Norweigian current affairs
nal institutional standards; and macrosystem, or cul­ program SevenThirty. In SevenThirty, viewers can
ture. Gatekeeping occurs in a microsystem (e.g., White, respond to content by texting a moderator. If chosen,
1950), in a mesosystem as the product of competing the text will be displayed on the screen or presented to
interests among news outlets, in an exosystem of jour­ the program’s hosts as discussion prompts. The moder­
nalistic standards and organizational policies, and in a ator act as a “boundary gatekeeper” by selecting which
macrosystem of cultural influences. Following Lewin, text messages to air (Shoemaker & Vos, 2009, p. 113).
Shoemaker and Reese (1996) and Shoemaker and Vos Over a two month period, only 15% of the nearly 1100
(2009) identified five levels of analysis for the study of text messages sent to SevenThirty appeared on the
gatekeeping: individual, communication routines, show. All messages were edited for length and themat­
organizational, social institutions, and social system. ic content. Enli (2007) identified the opposing forces at
The individual level of analysis concerns the work in the individual gatekeeping decisions as jour­
characteristics of individual gatekeepers, or the com­ nalistic norms and participatory ideals. Messages that
municative products of individuals such as blog posts, were too sympathetic or antipathetic were rejected, as
emails, webpages, statuses, updates, podcasts, etc. The were personalized and elitist messages.
communicative routines level of analysis concerns the For Dimmick (1974), on the other hand, gate­
practices of a profession embodied in instincts and keepers value their sources, colleagues, opinion lead­
news values and judgments (e.g., Berkowitz, 1990). ers, reference institutions, and organizational policies
For instance, values of timeliness, proximity, and over their own intuition. Similarly, Gieber (1956, 1960,
newsworthiness, and the practice of inverted pyramid 1964), Westley and MacLean (1957), and Chibnall
style of journalistic writing, represent the field of jour­ (1975) emphasized the routines and practices of jour­
nalism as a whole, not the preferences of an individual nalism. For Gieber (1956), structural considerations,
journalist. The organizational level of analysis makes space limitations and a “straitjacket of mechanical
some news organizations different from others details” (p. 432) limit the decisions a gatekeeper can
(Shoemaker & Vos, 2009). The forces affecting gate- make. Under an impending deadline, Mr. Gates cannot
keeping decisions at a small rural newspaper will differ make subjective judgments about every piece of copy
from those at large national operations. The social that crosses his desk. Shoemaker and his colleagues
institution level of analysis focuses on forces that act also argue that gatekeeping is more influenced by the
on an organization, such as advertisers, governments, “routinized practices of news work” than by any per­
and activist groups. Media outlets may tailor their con­ sonal beliefs of the gatekeeper. Routine forces serve as
tent to appease one or all of these social institutions. heuristics, or mental shortcuts, for making gatekeeping
Finally, the social system level of analysis concerns decisions under deadlines (Shoemaker, Eichholz, Kim,
how more abstract forces, such as ideology, culture, & Wrigley, 2001, p. 235).
economics, and politics, affect the gatekeeping process Cassidy (2006) found that routine forces had a
(Shoemaker & Vos, 2009). greater impact on the gatekeeping decisions of both
online and print journalists than individual factors.
C. Gatekeeping after Mr. Gates Cassidy shows that impending deadlines, as well as the
Some researchers have found support for White’s online ethos of instantaneity, make White’s individual
(1950) emphasis on the individual and subjective (e.g., factors less relevant. For Cassidy, immediacy is now a
Chang & Lee, 1992). Bleske (1991) replicated White’s journalistic norm. Decades earlier, McNeilly (1959)
study with a woman, Ms. Gates, to determine the and Bass (1969) had emphasized the roles of the jour­
affects of technological development and changing nalist in gatekeeping decisions. McNeilly (1959) mod-

COMMUNICATION RESEARCH TRENDS V olum e 34 (2015) No. 1 — 9


eled international news gatekeeping as an “obstacle reality. They answer Lewin’s call to extend the limits of
course” (p. 230) of gatekeepers, from correspondents the life space.
to copy editors, who all make decisions about whether Shoemaker and Vos (2009) defined gatekeeping
and how a story should pass through their gate. In as the “process of culling and crafting countless bits of
McNealy’s model, gatekeepers could provide feedback information into the limited number of messages that
to other gatekeepers, and stories could emerge at dif­ reach people every day” (p. 1). Shoemaker and Vos
ferent stages of the gatekeeping process independently echo White (1950) that gatekeeping decisions make
of the initial story. Bass (1969) divided the gatekeeping many versions of the same material reality (2009, p. 2),
process into two levels: news gatherers—the writers, and that the news reported by various media outlets is
reporters, and local editors who turn raw news into very similar (Shoemaker & Cohen, 2006). White’s
news copy—and the news processers— the editors, (1950) chain of communication consists of reporters,
copy readers, and translators—who turn news copy rewriters, and wire editors. Shoemaker and Vos’ (2009)
into a completed product. gatekeeping process begins when a news worker is
While some (e.g., Halloran, Elliott, & Murdock, exposed to an event and ends with selection of the most
1970) followed Bass (1969) by focusing on raw news newsworthy and dissemination as news. However,
gatherers, others (e.g., Chibnall, 1975) argued that another gatekeeping process begins when an audience
news stories are shaped from raw observations. For member chooses what to consume. Gatekeeping is not
instance, Westley and MacLean (1957) had modeled arbitrary or random, but the result of deliberate deci­
gatekeeping as a dynamic process where information sions from exposure to dissemination (Shoemaker &
moves from sender to receiver through a media chan­ Vos, 2009). News items that make it through all gates
nel to an audience. At any time in the process, there are draw the “cognitive maps” of news consumers
multiple senders sending information through various (Ranney, 1983), and set the agenda for what it is impor­
media channels, each with its own chain of communi­ tant to think about (McCombs & Shaw, 1976).
cation and series of gatekeepers. Information can With this in mind, Shoemaker and Vos (2009)
bypass the sender and flow directly to the channel or, if synthesized the extant models of gatekeeping into a
an audience member experiences an event directly, model of the gatekeeping field. They argue that the
may bypass both sender and channel. The dynamism of constructs of gates, gatekeepers, forces, and channels
Westley and MacLean’s model attracted many subse­ are as relevant now as they were for Lewin. In their
quent gatekeeping theorists. model, raw information flows through three gate-
keeping channels: source, media, and audience.
D. Contemporary gatekeeping models
Information enters the source channel through
In Gatekeeping, Pamela Shoemaker (1991) experts, observers, participants, commentators, and
defined gatekeeping as the “process by which the bil­ interested parties. Information enters the media chan­
lions of messages that are available in the world get cut nel through reporters, editors, production staff, inter­
down and transformed into the hundreds of messages active staff, and editorial and marketing assistants.
that reach a given person in a given day (p. 1). With this The source and media channels converge as news
definition, Shoemaker focused on the actual decisions content. Audience members then take what they want
of gatekeepers. Shoemaker and her colleagues later from the field of news content. Information enters the
defined gatekeeping in the spirit of Lewin, as the audience channel through Twitter feeds, Facebook
“overall process through which social reality transmit­ posts, smart phone cameras, or any communication
ted by the news media is constructed, and is not just a technology that records events. Information that is
series of in and out decisions” (Shoemaker, et al., 2001, odd or unusual, of personal relevance, or a threat to
p. 233). Shoemaker extended gatekeeping beyond public well-being is most likely to make it through the
micro-level decisions to the whole construction of audience channel and reach the public (Shoemaker &
social reality (Shoemaker & Vos, 2009), to what Vos, 2009). In this model, the audience is a gatekeep­
“exists” for those subjected to a gatekeeping process er that allows only attention-grabbing information
(Lewin, 1947a, p. 6). Shoemaker et al. (2001) account through the channel, and attention-grabbing has
for the many forces that affect gatekeeping decisions replaced newsworthiness as a marker of journalistic
and for the power of the mass media to construct social credibility (Shoemaker & Vos, 2009).

10 — V olume 34 (2015) No. 1 C ommunication R esearch T rends


In this model, messages move through communi­ focusing on or referencing gatekeeping of all the disci­
cation organizations such as blogs, newspapers, news plines studied. However, most articles only alluded to
outlets, television networks, and public relations agen­ or cited gatekeeping without analysis (Barzilai-Nahon,
cies. Within each organization, boundary gatekeepers 2009).
make initial decisions about what information to let Barzilai-Nahon (2009) writes that communica­
into their channel. Once information passes these tion scholars, like Shoemaker, see gatekeepers as
boundary gatekeepers, it moves to internal gatekeepers, trained and trusted elites, while information scientists,
who make decisions based on journalistic routines and like Barzilai-Nahon, see gatekeepers as embedded
standards. The internal gatekeepers then pass informa­ within a larger community. Also, communication
tion to boundary output gatekeepers, who make final scholars tend to focus on individual characteristics of
decisions about how to the present information based gatekeeper elites, and information scientists on the
on feedback from the audience. Gates bracket each relationships between individual gatekeepers and
gatekeeper, and forces surround each gate. All gate­ larger networks. Within both fields, however,
keepers weigh the influences of organizational social­ Barzilai-Nahon saw increasing attention to new media
ization, conception of their role, cognitive heuristics, technologies in gatekeeping research, but without a
and values, attitudes, and ethics (Shoemaker & Vos, compatible theoretical foundation. With its attention
2009, p. 115). The source, media, and audience chan­ to new media technologies, gatekeeping research has
nels all exist within a journalistic field. shifted from the process of gatekeeping to the capac­
Shoemaker and Vos (2009) argue that future stud­ ity of gatekeepers to construct social reality. For
ies of gatekeeping theory must be attentive to history instance, Hardin (2005) found that sports editors base
and transcend their own social system while account­ gatekeeping decisions on their perceptions of the
ing for globalization. Furthermore, gatekeeping theo­ reading audience, not demographics of the audience
rists should mix descriptive and interpretive accounts itself. Their perceptions are often sexist and serve to
of gatekeeping with quantitative studies. They should perpetuate patriarchy in sports.
follow Shoemaker’s (1991) sociological gatekeeping F. Gatekeeping on the Web
research by employing new statistical techniques to
Both Barzilai-Nahon (2009) and Singer (2006)
gatekeeping as a single variable in a sociological field.
identified the comparison of old and new media as
Shoemaker and Vos (2009) call for theorists to account
another theme in gatekeeping research. The Web has
for journalism practice, and for journalists to pay more
expanded the reach of gatekeeping to anyone with an
attention to gatekeeping theory.
Internet connection. Sources outside the scope of tradi­
E. The gated tional journalism, and without its professional stan­
Barzilai-Nahon (2009) echoes Shoemaker and dards, have taken their place alongside the giants of
Vos (2009) in noting that more attention to the audi­ journalism as destinations for news (Singer, 2006).
ence is needed. However, Barzilai-Nahon calls for a However, journalists maintain that their privileged
new construct—the gated—and a new model that position as gatekeepers is safe, hardened by a “cultural
accounts for its dynamics. She bases her call on a understanding” that they are the most qualified to gate-
review of all articles published from 1995 to March keep (Singer, 2006). Nevertheless, journalists have
2007 in Communication Research', Information, acknowledged the increasingly prominent role of non-
Communication and Society', Journalism and Mass journalists or untrained citizen journalists to make
Communication Quarterly, and New Media and decisions about newsworthiness. Working from
Society. Of the 2800 articles published in these journals Shoemaker and Vos’ (2009) model of journalistic field,
during the 12-year period, 98 articles either mentioned Singer (2014) identifies the audience as secondary
gatekeeping or used it as an implicit conceptual foun­ gatekeepers who judge the contributions of journalists
dation. Journalism and Mass Communication and other users.
Quarterly had the highest percentage of articles con­ Singer (2014) attempted to characterize the deci­
taining a gatekeeping concept at 4.4%, followed by sions of these secondary gatekeepers and to determine
New Media and Society at 4.2%, Information, the criteria they use to make decisions about the value
Communication and Society at 1.2%, and and quality of content. A majority of the 138 newspa­
Communication Research at 0.6%. The field of com­ per websites studied by Singer (2014) allowed users to
munication had the highest total percentage of articles flag inappropriate comments. A smaller majority of

C ommunication R esearch T rends V olume 34 (2015) No. 1 — 11


papers allowed users to rate or recommend content. apply a label to the “gated,” those subjected to a gate-
The vast majority of papers allowed readers to rate the keeping process. Barzilai-Nahon also found that the
merit of content through social networking or social majority of scholars were concerned with editorial
bookmarking tools. With this affordance, users “identi­ decisions made by editorial staffs and journalists about
fy what they see as worthwhile material for their own what items were newsworthy enough to be disseminat­
personal use, communicate that assessment to others, ed. Later, the view of gatekeeping as the preservation
and republish or otherwise disseminate their selected of culture through construction of social reality also
items to a mass audience” (p. 66). They are gatekeep­ became commonplace.
ers as White (1950) understood the term. This is consistent with the work of Shoemaker
While communications scholars have theorized and Reese (1996), who emphasized the historical and
extensively about the old and new media dichotomy, social content of the media. Just as Lewin applied the
information scientists tend to focus on the identity of methods of individual psychology to social phenome­
gatekeepers within new media (Barzilai-Nahon, na, Shoemaker and Reese (1996) applied the methods
2009). Other themes identified by Barzilai-Nahon of media effects to cultures and media organizations.
include the influence of gatekeepers on production of Their 2014 book, Mediating the Message in the 21st
cultural artifacts and portrayal of various social Century, is an updated edition of their influential
groups, as well as how the gatekeeping process 1991 and 1996 editions of Mediating the Message.
works, and normative questions about who should be For Shoemaker and Reese (2014), the symbolic envi­
gatekeepers. Overall, Barzilai-Nahon calls the period ronment is made up of messages. These media mes­
from 1995-2007 a period of stagnation for gatekeep­ sages are not an objective mirror of reality, but a co-
ing theory, where traditional gatekeeping theory can­ creative construction of reality. The early editions of
not keep up with changing communication environ­ Mediating the Message focused on theory building
ments. Barzilai-Nahon’s work is a response to an through not only effects of the media on people, but
interdisciplinary failure to ask important questions also the influences of individuals, routine practices,
about gatekeeping on the assumption that its 50-year- media organizations, social institutions, and social
old foundations are firmly in place. systems on the production of the messages that make
Barzilai-Nahon (2009) sees an unwillingness to up the symbolic environment.
rethink the foundations of gatekeeping theory as a fail­ From the perspective of media effects, media
ure of theory building. However, Shoemaker’s early content acts on individual psychology as an independ­
work, especially Shoemaker, Tankard, and Lasorsa’s ent variable. From Shoemaker and Reese’s (1991,
2004 book, How to Build Social Science Theories, 1996, 2014) perspective, media content is treated as a
addresses this very issue. Nevertheless, Barzilai- dependent variable, acted on by a variety of independ­
Nahon (2009) argues that Shoemaker’s gatekeeping ent variables within a social field. In the 1991 and 1996
theory is unfaithful to her own rules for theory build­ versions of Mediating the Message, Shoemaker and
ing. She argues that current definitions of gatekeeping Reese model influences of media production as a two-
are too disparate and contradictory to ground a mature dimensional bullseye, with individual influences in the
and adaptable theory, and that a new theory of gate- center, followed by routines, media organizations,
keeping is needed for several reasons. First, the Web social institutions, and social systems in concentric cir­
redefines the roles of “gate,” “gatekeeper,” and cles (Shoemaker & Reese, 2014). In Mediating the
“gated.” The traditional model of gatekeeping needs Message in the 21st Century, Shoemaker and Reese
more than tweaking because its conceptual apparatus is (2014) model influences on the media as a three-
no longer applicable. Second, gatekeeping theory has dimensional wedding cake, with individual newlyweds
been held back by disciplinary boundaries. An interdis­ on top, and social systems as the bottom and biggest
ciplinary concept needs a theory that can learn from layer of cake. While the early versions focused on indi­
each discipline rather than using terminology under­ vidual influences, the new model can be approached in
stood only within each discipline. Third, even within two ways. From the perspective of the individual, the
the same discipline, there is no shared vocabulary for lower layers empower individuals to succeed. From a
speaking about the gated. While early gatekeeping media sociological perspective, the individual is
models through Shoemaker and Vos (2009) speak of perched precariously atop a supporting structure that, if
the audience, Barzilai-Nahon (2009) was the first to destroyed, will bring down the whole cake. From either

12 — V olume 34 (2015) No. 1 C ommunication Research T rends


perspective, each layer of the cake part of a larger now have the arduous additional task of sifting through
social field. By three-dimensionalizing their model, information of unknown pedigree and determing its
Shoemaker and Reese (2014) answer their own call for veridicality instead of simply attending to news of
a return to Lewin, and Barzilai-Nahon’s (2009) call for established credibility” (Kalyanaraman & Sundar,
more thorough explication of the theory’s foundation. 2008, p. 239). The audience member now makes deci­
However, neither Shoemaker and Reese (2014) sions about the credibility of information and sources,
nor Shoemaker and Vos (2009) cite Barzilai-Nahon, but the algorithm is the gatekeeper as White (1950)
and Barzilai-Nahon (2009) cites Shoemaker only in understood the term.
passing. Both agree, however, that gatekeeping deci­ Barzilai-Nahon (2009) argues that these new
sions have shifted from “in” and “out” (Lewin, 1947b, forms of gatekeeping call for a new model. The space
p. 145) decisions to “more or less” rules of presentation for information is finite, making it “necessary to have
(Shoemaker & Reese, 2014). On the Web, for instance, established mechanisms which police these gates and
news portals like Google News employ a set of rules select events to be reported according to specific crite­
(Lewin, 1947b) to collect news articles from various ria of newsworthiness” (Bruns, 2003, p. 1). However,
outlets and display them on a single interface. in social and information networks that serve as both
Algorithms organize the articles into topics (e.g., hosts and conduits of information, there is no lack of
World News, Local, Sports, Science) and rank them space and few established mechanisms to police
according to recency, source credibility, and newswor­ ambiguous gates. The mass of information in this “con­
thiness (Kalyanaraman & Sundar, 2008). In this con­ textual vacuum” (Sundar & Nass, 2001, p. 57) necessi­
text, the people in a “key position” to make gatekeep­ tates some form of gatekeeping, either individual or
ing decisions are the mathematicians who manipulate institutional. For Lewin, the housewife is in a position
the algorithms. The experiences of the user replace the to be a gatekeeper, but it is the social scientist with the
experiences of the news worker as the determining fac­ power to make social change by studying her gate-
tor in the gatekeeping “decisions” of a nonhuman news keeping decisions. This is no longer the case.
portal: “The Web is literally a web woven collectively Laypersons have the power to change the social world
by all citizens on the Internet, resulting in a massive (Shoemaker & Vos, 2009). Whereas Lewin looked
amount of information being disseminated by both pro­ backward to the steps leading to war, today’s social sci­
fessional gatekeepers and laypersons. For casual users entist tracks the organization of a revolution in real
interested in efficiently obtaining news and informa­ time. Barzilai-Nahon’s (2009) empowers the
tion on the net, this proves burdensome because they researcher to reclaim the position of gatekeeper.

3. Network Gatekeeping Theory

To outline the theoretical foundation of and terms gate, the gated, gatekeeping mechanism, network gate­
associated with network gatekeeping, this review relies keeper, and gatekeeping.
on Barzilai-Nahon (2008). In this article, among the
most thorough articulations of her theory, Barzilai- A. Definitions
Nahon proposes a new conceptual framework for gate- The gate is the “entrance to or exit from a net­
keeping. Rather than simply selecting which news work” (Barzilai-Nahon, 2008, p. 1496). Although the
items should pass through a gate, network gatekeepers gate is fluid and dynamic within social and information
aim to: (1) “lock-in” the gated within gatekeeper’s net­ networks, it most often rests at the point at which the
work, (2) isolate the gated within a network to protect gated enter or exit the network. The gated, then, is sim­
their norms and information, and (3) allow for an unin­ ply “the entity subject to gatekeeping” (p. 1496). In
terrupted flow of information within “network bound­ social and information networks, gatekeeping need not
aries” (p. 1496). With these reoriented outcomes in be forced or imposed on the gated. Because they like­
mind, Barzilai-Nahon then defines the conceptual ly have other options across the Web, the gated may
infrastructure of network gatekeeping consisting of the willingly agree to the terms of gatekeeping in order to

C ommunication R esearch T rends V olume 34 (2015) No. 1 — 13


enter a network depending on their relationship with exercise gatekeeping through a gatekeeping mecha­
the gatekeepers. Several factors affect these relation­ nism” (Barzilai-Nahon, 2008, p. 1497). Barzilai-
ships among gatekeepers and the gated. First, political Nahon identifies two dimensions of network gatekeep­
power dictates the extent to which gatekeepers can ers: an authority dimension, which classifies network
control the gated. The dynamics of information control gatekeepers according to their level of authority over
often break down according to the political interests of the gated, and a functional dimension, which organizes
involved parties. Second, the capability of the gated to network gatekeepers according to the level of control
produce information dictates the dynamics of network they exercise over the gatekeeping mechanism. Within
gatekeeping. While communicative technologies allow the authority dimension are governmental, industry
anyone to not only create but also disseminate their regulator, internal authority, and individual levels. At
own content, access to and mastery of these devices the governmental level, network gatekeepers are gov­
will vary. The platforms on which users can dissemi­ ernments. Different types of governments will use
nate their content will also vary, affecting relationships gatekeeping mechanisms in different ways, with non-
among gatekeepers and the gated. Third, relationships democratic states more likely to use gatekeeping mech­
among gatekeepers and gated will determine the level anisms to limit access to information (e.g., age-limits
of gatekeeping present, with more direct and reciprocal on pornographic content). At the industry regulator
ties resulting in less gatekeeping and more indirect and level, public or private entities can establish and
uni-directional ties leading to more gatekeeping. enforce gatekeeping mechanisms within a given indus­
Fourth, the existence of alternative sources of informa­ try, either in collaboration with or independent of gov­
tion changes the gated according to the makeup of the ernmental regulation (e.g., cable television controls).
gatekeeping mechanism. At the internal authority level, an organization itself
A gatekeeping mechanism is a “tool, technology, exercises control of the gatekeeping mechanism (e.g.,
or methodology used to carry out the process of gate- Facebook privacy controls). At the individual level,
keeping” (Barzilai-Nahon, 2008, p. 1496) in any of 10 individuals monitor their own or their families access
ways. First, channeling mechanisms such as search to information (e.g., parents limit their children’s
engines, directories, categorizations, and hyperlinks access to television or Internet content).
direct and attract the gated to various other networks. Within the functional dimension, network gate­
Second, censorship mechanisms delete or exclude keepers can be infrastructure providers, authority site
undesired information or users from an existing net­ properties, or network administrators. First, infrastruc­
work. Third, internationalization mechanisms tailor ture providers, including network, Internet, and carrier
and translate information to local customs and conven­ service companies, determine the speed and flow of
tions. Fourth, security mechanisms manage the authen­ information passing through a network. Second,
ticity of and access to confidential or sensitive infor­ authority site properties and their search, portal, or con­
mation. Fifth, cost-effect mechanisms assign values to tent providers act as gatekeepers by controlling which
entering and exiting a network and using the informa­ information Internet users see first or most often.
tion it provides. Sixth, value-adding mechanisms allow Lastly, network gatekeepers may be designated net­
users to customize and contextualize their information work administrators or content moderators (e.g., news­
on the network. Seventh, infrastructural mechanisms paper employee tasked with regulating an online mes­
control access to the network at algorithmic and infra­ sage board), or also individuals who play a network
structural levels. Eighth, user interaction mechanisms gatekeeping role (e.g., YouTube users who flag inap­
govern a network’s level of interactivity, modality, and propriate material)
navigability (e.g., Sundar, 2008). Ninth, editorial Finally, network gatekeeping is the “process of
mechanisms govern content decisions in much the controlling information as it moves through a gate” (p.
same way as traditional gatekeeping theory and, final­ 1496) through not only selection of news, but also
ly, regulation meta-mechanisms at state, national, or addition, withholding, display, channeling, shaping,
governmental levels may overrule any of the other manipulation, timing, localization, integration, disre­
mechanisms, depending on the makeup of its network gard, and deletion of information. Three of these
gatekeepers (Barzilai-Nahon, 2008). capacities— channeling manipulation, and repetition—
A network gatekeeper is an “an entity (people, are of particular importance for conceptualizing net­
organization, or government) that has the discretion to work gatekeeping on social networks such as

14 — V olume 34 (2015) No. 1 C ommunication Research T rends


Facebook, Digg, and Twitter, platforms to which net­ er’s purpose” (p. 1497). When users of the news aggre­
work gatekeeping applies (Barzilai-Nahon, 2008, p. gator Digg.com submit news articles to the site, they
1497) but has not yet been considered. can be either rewarded, if the submission is highly
B. Gatekeeping on social networks “dugg” and promoted to the front page, or punished, if
the submission receives little attention. Although the
A 2010 report by the Pew Research Center
site advertises itself as an editor-free “place where peo­
revealed that 75% of people who read news online get
ple can collectively determine the value of content”
it through social networks. On social networks, users
(Digg, 2010), users perform their own network gate-
can participate in the gatekeeping process by offering
keeping by manipulating the aesthetics of news arti­
feedback and comments on a particular selection,
cles, as well as digging, burying, sharing, or comment­
even if they do not post content themselves, and by
ing on others’ submissions. Digg may be free of editors
forwarding, sharing, and posting links to news stories.
as conceptualized by traditional gatekeeping theory,
Also, traditional news outlets may be only the first or,
but its users’ success is dependent on their network
as is often the case among Digg.com users, the last
gatekeeping. With this in mind, this section first out­
link in a chain of sources and hyperlinks where news
lines the uses of Digg and, second, further explicates
is not only selected by editors, but also funneled
the dynamics network gatekeeping on the site.
through the Web, where it is “amplified, sustained,
All content on Digg is submitted to a communi­
and potentially morphed as it is re-circulated,
ty of registered users. Users then “digg” articles that
reworked, and reframed by online networks” (Goode,
interest them. If a given submission receives enough
2009, p. 1293) in several ways, identified by Flew and
diggs, it is promoted to the site’s front page along
Wilson (2008) as content work, networking, commu­
with a marker of the user who initially submitted it.
nity work, and technical work.
Because a front page story on Digg.com can result in
First, although its goals differ from traditional
an increase of at least 12-15,000 visitors to the site of
journalism, the content work of network gatekeepers
the news outlet that produced the story (Cohn, 2007),
resembles traditional gatekeeping in that network gate­
Digg.com buttons have become ubiquitous in online
keepers edit, create, and disseminate content that con­
news and social networking environments. Since
forms to journalistic standards and norms. Second, net­
developing a custom widget that ranks the top five
working establishes relationships with other users and
most dug stories on its website, Time Magazine’s
outlets to build a close-knit group of connections.
presence on Digg.com has risen more than twofold,
Drawing attention to obscure news sites by bookmark­
and its Digg-driven clicks increased from 500,000 to
ing their articles on sites like Digg and forwarding or
1.3 million (Shields, 2009). The site has caused simi­
retweeting links to news articles on Facebook or
lar traffic increases for Newsweek.com and
Twitter can also be considered networking (Flew &
Wired.com (Shields, 2009), making it an invaluable
Wilson, 2008). Third, community work includes skills
resource for advertisers targeting Digg.com’s tech-
such as registering on a site, creating a profile, and
savvy audience in search of customizable options.
posting content. Similarly, technical work consists of
The site features a number of customizable
tasks related to the technological affordances of a par­
options, including a choice between seeing the most
ticular medium which, as Barzilai-Nahon (2008) con­
recent content or the top content from the last one,
tends, exist within a horizon of gatekeeping power.
seven, 30, or 365 days. In the most recent option, arti­
To “explore what new modes of gatekeeping
cles are ranked according to the recency with which
power may be emerging” (Goode, 2009, p. 1295), this
they were made popular or received enough diggs to
review article now explicates network gatekeeping on
appear on the homepage. In the top content option, arti­
Digg.com, Facebook, and Twitter, three social networks
cles are ranked according to their number of diggs. In
that represent network gatekeeping’s capacity for
either option, articles are accompanied by a number of
manipulating, channeling, and repeating information.
comments, choices to share or bury, the news outlet
C. Network gatekeeping on Digg that produced the article, and the username of the Digg
member who submitted it. While clicking on the share
In the context of network gatekeeping, Barzilai- icon allows users to share a link to the article by email,
Nahon (2008) defines manipulation as “changing infor­ Facebook, or Twitter, users can also initiate and
mation by artful or unfair means to serve the gatekeep­ respond to comments on the article, either digg or bury

C ommunication R esearch T rends V olume 34 (2015) No. 1 — 15


each comment, and sort comments by oldest, newest, online networks such as Digg reverse this relationship
most controversial, and most dugg. Clicking on the by allowing the audience to determine the efficacy of
username of the user who submitted the article leads to each gatekeeper, an arrangement addressed in two con­
that user’s profile, which features statistics such as troversial redesigns.
number of diggs, submissions, and comments—their In August 2010 and July 2012, the site underwent
network gatekeeping scorecard. significant redesigns, which made it aesthetically simi­
Halavais (2009) argues that this scorecard lar to Facebook and functionally comparable to Twitter.
encourages further participation on the site (p. 445). By Although the front page of the site has arguably been
sampling 30,000 of Digg’s 2.8 million users and down­ made more credible by the infusion of news items from
loading all of the comments they made on the site and traditional sources such as the New York Times,
the total number of diggs and buries each comment Washington Post, BBC, and CNN, Digg’s most ardent
received, Halavais found that comments by experi­ users were unhappy with is the perceived infiltration of
enced users were generally positively correlated with editorial authority from a select number of publishers
both diggs and buries. This indicates that on Digg those (Bohn, 2012). Also, the bury button, which allowed
with experience are more likely to receive a reaction, users to give submissions a low rating, was removed.
either positive or negative. However, while most users Nevertheless, gatekeeping on the site remains funda­
strove for positive feedback and reinforcement through mentally the same, and understanding the dynamics of
a large number of diggs and small amount of buries, network gatekeeping by Digg users will shed addition­
some, through racial and religious slurs, insults, and al light on the complex and multi-layered motivations
profanity, sought to become as little liked by other of network gatekeepers.
users as possible. He suggests that the rewards that Whether they exhibit a similar condescension
encourage participation on the site also enforce a toward other users as editors show toward readers in
“process that trains users to behave in ways that con­ print media, and whether these perceptions have
form to community standards and expectations” changed with the design of the site, will be a crucial
(Halavais, 2009, p. 457). In other words, in the absence first step in determining if sites like Digg.com are
of traditional gatekeeping standards, network gate­ polarizing or uniting network news consumers. Digg’s
keepers develop their own. popularity, at least in part, has been attributed to the
While comments containing the word “liar” were democratic ideals of equality and egalitarianism (e.g.,
likely to be buried, especially when used in reference to Hargittai, 2000) but, because “there seems to be prima
another Digg user, comments by users who supported facie evidence of a powerful core of ‘elite’ at work” on
their arguments with credible sources were likely to be the site, the relationships among its users has been
dugg, despite the site’s pride in operating without edi­ termed an artistocracy, a popularity contest, and a Digg
torial authority (Halavais, 2009). Because the word mafia (Goode, 2009, p. 11). Contrastingly, Digg users
“Digg” itself was associated with editorial authority, have argued that the most popular users earn their sta­
articles with “Digg” in them were likely to be buried, tus through skill and hard work (Goode, 2009) or, from
along with criticisms of spelling or grammar, two com­ the perspective of network gatekeeping, through their
mon editorial tasks (Halavais, 2009). Although the effectiveness as gatekeepers. While this effectiveness
level at which these processes occur is unclear, in the is a function of artful manipulation of information,
context of network gatekeeping they represent an users may also perfonn a network gatekeeping function
abstraction of the relationship between gatekeepers and by channeling news through a social network, one of
the gated in traditional gatekeeping theory, with Digg the least understood motivational mechanisms of Digg
users relying on the wisdom of others to become good (Halavais, 2009) and the hallmark of Twitter.
editors, then using that same wisdom to perpetuate
their own editorial influence. Despite its claim to egal­ D. Network gatekeeping on Twitter
itarian editorship, users of Digg have various levels of For Barzilai-Nahon (2008), channeling refers to
confidence in their fellow gatekeepers, much like tradi­ “conveying or directing infonnation into or through a
tional gatekeeping theory would predict. However, channel” (p. 1497). Introduced in 2006, Twitter is a
whereas in traditional gatekeeping theory editors can microblogging service that has become a source of
be condescending toward their readers and lack confi­ immediate, instantaneous news. It allows users to act as
dence in readers’ gatekeeping ability (Gladney, 1996), network gatekeepers by channeling news through the

16 — V olume 34 (2015) No. 1 C ommunication Research T rends


site. This environment provides an ideal venue for More recently, Xu and Feng (2014) examine con­
examining the gatekeeping decisions of both followers versations between traditional journalists and Twitter
and the followed, or gatekeepers and the gated. This users to determine the identity of gatekeepers and the
section will, first, review the uses and influence of political power of the gated in terms of online connec­
Twitter and, second, discuss several studies with impli­ tivity and political and issue involvement. They found
cations for network gatekeeping. that politically active Twitter users reached out most
Any user of Twitter can follow or be followed by often to journalists with similar political leanings. Also,
any other without any necessary interaction or mutual most of the interactions between journalists and citi­
approval. Followers receive all tweets from those they zens on Twitter occurred more than once, but were
follow, which appear on the user’ s profile chronologi­ most often initiated and retweeted by citizens. Xu and
cally. There is a well-defined language on the site Feng see network gatekeeping as inclusive and
which promotes brevity and conciseness within a 140 empowering of average citizens who may not have had
character limit. “Retweeting,” or forwarding the tweets the opportunity to interact with journalists, even
of other users without their knowledge and beyond though they reach out most often to those they agree
their scope, has become a popular means of dissemi­ with. The inclusiveness and openness of social media
nating news items (Cha, Haddadi, Benevenuto, & may expose citizens to new viewpoints but may also
Gummadi, 2010) and reinforcing a message (Watts & harden their existing opinions.
Dodd, 2007). Much like the sharing function on Leavitt, Burchard, Fisher, and Gilbert (2009)
Facebook, links to stories or tweets themselves can be engaged this makeup by measuring the influence of
retweeted independently of their originator in real time. 12 of the most popular Twitter users over a 10-day
Although those looking to Twitter for news may miss period. They found that while celebrities were men­
newsworthy items among the “other chatter going on,” tioned more often, news outlets were more influential
the biggest advantage of the site is this element of in getting their information retweeted. Although
instantaneity (Weinberg, 2008, para. 3). Weng, Yao, Leonardi, and Lee (2010) found high lev­
In one of the first studies to explore the implica­ els of reciprocity in a nonrandom sample of nearly
tions of instantaneity in the entire “Twittersphere,” 7,000 Twitter users, Cha et al. (2010) found only 10%
Kwak, Lee, Park, and Moon (2010) examined 41.7 mil­ reciprocity in a random sample of users. These mixed
lion profiles, 1.47 billion social interactions, and 106 results concerning levels of reciprocity have implica­
million tweets to study, among many other variables, tions for network gatekeeping because, as Barzilai-
the distributions of reciprocity between followers and Nahon’s (2008) theory posits, one of the advantages
the followed, or gatekeepers and the gated. They found of social networks like Twitter is the ability of the
that most tweets are not reciprocated, but there is some gated, in this case average Twitter users, to interact
evidence of homophily among users. Similarly, Cha with gatekeepers, the 12 most popular Twitter users.
and colleagues (2010) identified three types of a relat­ Low reciprocity on Twitter would indicate a hierar­
ed concept—influence—that Twitter users may attain. chical model of gatekeeping, not the horizontal model
First, in-degree influence refers simply to the number proposed by Barzilai-Nahon (2005).
of followers a user has. It is a straightforward and overt Cha et al. (2010) provided an answer to this
marker of that user’s known audience (Cha et al., inconsistency by examining which particular network
2010). Second, retweet influence is the number of gatekeeping activities result in the most influence in
retweets that bear a particular user’s name. It is a more what topic and at what time. They found that while
subtle way of tracking users’ influence outside of their news sites, politicians, athletes, and celebrities were
network of followers, and measures their ability to pro­ highest in in-degree influence, news sites, content
duce content likely to be enjoyed by a large number of aggregators, and business sites were highest in retweet
users. Third, mention influence is measured by the influence and, for the most part, celebrities were high­
number of times a user’s name is included in a tweet or est in mention influence. Also, because fewer than 30%
retweet, and indicates the “ability of that user to engage of “mentions” contained links to original sources, men­
others in a conversation” (p. 3). All of these types of tions are identity-driven, and retweets more content-
influence are played out in network gatekeeping deci­ driven because they almost always contained a link to
sions, and largely determine the makeup of gatekeepers the original source (Cha et al., 2010). Cha and col­
and the gated. leagues also found that the most influential users of

C ommunication Research T rends V olume 34 (2015) No. 1 — 17


Twitter were public figures, websites, and content of the most applicable work to network gatekeeping
aggregators, and that there was little overlap between theory has been done in the context of online news
the three types of influence. sharing, and the heuristics that motivate news sharing
However, ordinary users can also become influ­ and consumption on Facebook.
ential gatekeepers. In the same study, 20 of the most Within a given network of Facebook friends,
followed users who discussed a single news topic were there exist a small number of users who consistently
examined. Although unknown prior to the news topic share links to news stories. When online news con­
they discussed, users who tweeted consistently about sumers go to Facebook for their news, these users are
one topic increased their influence scores the most over performing a gatekeeping function. The other members
the course of a particular event. This implies that users of a given network can easily go elsewhere for their
can become more influential gatekeepers by focusing news but, if they consistently follow one friend’s links
on a single topic and tweeting detailed, insightful to news stories, that friend is a network gatekeeper,
things about that topic rather than merely conversing either voluntarily or unknowingly. Facebook users vol­
with other users. This finding was confirmed by untarily include personal information on their profiles
Huberman, Romero and Wu (2008), who examined as a function of their trust in the site. Many teenagers
over 300,000 Twitter users and discovered that, are willing to sacrifice privacy for constant connectivi­
although the number of followers did increase with the ty and are more likely to give personal information to a
number of posts, those users with many posts do not perceived “friend” online even if the friend is fake.
necessarily have many followers, making number of More recently, Facebook users have adapted to the
friends a more indicative marker of influence than public nature of the Internet with a reluctance to share
number of followers. private information on their public profiles.
For the purposes of network gatekeeping, these Facebook users make judgments about to friend­
results show that two users who are linked on Twitter ships and connections based on bandwagon heuristics
need not be interacting. Research that has looked only and authority heuristics (Sundar, 2008). In the context
at traffic on the site without measuring influence has of online news sharing, the bandwagon heuristic
found that the top 10% of Twitter users post over 90% posits that, “if others think that this is a good story,
of total tweets on the site (Cheng & Evans, 2009), then I should think so too” (Sundar, 2008, p. 83).
prompting Goode (2009) to posit that “social networks Much e-commerce research has shown the power of
are not flat; they are hierarchical; and they are not as the “bandwagon effect,” whereby products that are
conversational as we often assume” (p. 1293). recommended by a large number of users are more
However, how gatekeepers interact with the gated— likely to be purchased than those with no or a small
and who exactly plays these roles—has not been con­ number of recommendations. For instance, the more
sidered in the context of news sharing and network and more positive reviews a book has, the higher the
gatekeeping. This review essay now turns to Facebook, sales (Chevalier & Mayzlin, 2006). Essentially, e-
the world’s largest social network (Kaplan & Haenlein, commerce websites recognize the need not only to
2010), to lay out directions for future research in net­ sell books to consumers, but to “enable users to sell
work gatekeeping theory. them to each other” interpersonally (Sundar, Xu, &
Oeldorf-Hirsch, 2009, p. 3457). Many online con­
E. Network gatekeeping on Facebook sumers recognize this profusion of bandwagon cues
Facebook is a social network that allows users to and consider a site without them incredible or unrep­
post pictures, comments, and status updates visible to resentative (Sundar, Xu, & Oeldorf-Hirsch, 2009). In
self-chosen Facebook friends. Facebook users make the context of Facebook, the number of “likes” on a
choices about what information to add, withhold, and profile will influence perceptions of the profile owner
disregard, and how to shape, localize, and manipulate based on the bandwagon effect.
the information they channel through their profile. When the New York Times website displays the
While much research has addressed motivations for day’s most e-mailed, searched and blogged articles,
using social networking sites and personal web pages and the Washington Post features a Facebook applica­
(e.g., Banczyk, Kramer & Senokozlieva, 2008; tion displaying friends’ activity, readers assign agency
Papacharissi, 2002), little has specifically analyzed to a mass of other users and trigger the bandwagon
Facebook in the context of network gatekeeping. Some heuristic. In the context of online news, readers may

18 — V olume 34 (2015) No. 1 C ommunication R esearch T rends


make judgments of the quality and credibility of arti­ ceptions of message credibility” (Sundar, Knobloch-
cles, and the people and issues they are written about, Westerwick, & Hastall, 2007) By juxtaposing the two
under the blind direction of other anonymous users heuristics, Sundar, Oeldorf-Hirsch, and Xu (2009)
conveyed through interface cues. Sundar, Knobloch- found that both are psychologically relevant, but band­
Westerwich, & Hastall (2007) explored the effect of wagon cues are generally more persuasive than author­
three such cues: the source of the article, number of ity cues, but only when consistent.
related articles, and how recently it was posted, and The distinction between authority and bandwag­
found that although the source of an article was not on heuristics has implications for content-sharing on
considered credible, it was nevertheless rated as credi­ Facebook. By sharing content on Facebook produced
ble and newsworthy when associated with a large num­ outside Facebook, Facebook users blur the line
ber of related articles, indicating the influence of a between editor and user, bandwagon and authority. For
bandwagon heuristic. Similarly, in a study of an online instance, The Washington Post, one of the most credi­
news portal, Sundar and Nass (2001) found that users ble and recognizable American newspapers, has its
were more likely to choose and spend more time read­ masthead in the upper left-hand side of its online inter­
ing articles that had been strongly recommended by face. On the right side is a Facebook Network News
many other users. Likewise on Facebook, where users application, which allows users to view either the most
with lots of friends are seen as authorities. popular stories of the day accompanied by the number
As defined by Sundar, Oeldorf-Hirsch, and Xu of people who have shared them or a summary of their
(2008), the authority heuristic posits that “experts’ Facebook friends’ news-viewing activity. By logging
statements can be trusted” (p. 3455). In both face-to- into Washingtonpost.com using Facebook Connect,
face and technologically-mediated communication, users can share, like, and comment on content, as well
deference to an authority figure “is likely to directly as see all the content their friends have shared, liked, or
confer importance, believability, and pedigree to the commented on. Also, users can read content recom­
content provided by that source and thereby positively mended by their network, see what Washington Post
impact its credibility” (Sundar, 2008, p. 84). Even in content is most popular across Facebook, and keep a
the context of online news aggregators and portals, profile page showing the content with which their
each article is accompanied by the news outlet that pro­ Facebook friends have interacted. Depending on
duced it, allowing Facebook users to make credibility whether Facebook profile owners psychologically con­
judgments about other users. On Facebook, authority sider themselves editors or part of a community of
heuristics often compete with bandwagon heuristics. If users, juxtaposing these two ontologically distinct edi­
heuristics are influencing the perceptions of Facebook torial roles may not only allow the Washington Post to
users, then cues that trigger both the authority and become much more social, as the site posits, but also
bandwagon heuristics should “directly impact user per­ much less credible.

4. Conclusion

Gatekeeping theory began with individual gate­ These distinctions will determine the nature of rela­
keepers and rippled outward to organizational and tionships among the gated and gatekeeper, dictate the
institutional routines, to the entire social field in which capacities for gatekeeping in various gatekeeping
gatekeeping occurs. Network gatekeeping theory, too, mechanisms, and direct the motivations and practices
must attend to the distinction between individual gate­ of network gatekeepers. For instance, within a given
keepers and network gatekeeping. A social networking network of Facebook friends, there exist small number
site like Facebook, if users are considered sources of of users who consistently share links to news stories.
content themselves, could be considered individual When online news consumers go to Facebook for their
gatekeeping but, if users are conceptualized as part of news, this small number of users is performing a gate-
a community of users interacting with other profile keeping function. Although the other members of that
owners, it would be considered collective gatekeeping. network can easily go elsewhere for their news—they

C ommunication R esearch T rends V olume 34 (2015) No. 1 — 19


have alternatives, in terms of network gatekeeping—if work gatekeeper, and gatekeeping mechanism. Network
they consistently follow a prominent news sharer’s gatekeeping theory extends traditional gatekeeping the­
links and psychologically consider that user a news ory beyond selection of news to addition, withholding,
source (see Sundar & Nass, 2001), the user is a net­ display, channeling, shaping, manipulation, timing,
work gatekeeper, and a very powerful one. localization, integration, disregard, and deletion of
Equally ambiguously, when “individual users infonnation. Social networks like Digg, Twitter, and
control information on their social networking site Facebook allow for more open and diverse exchange of
(SNS) profiles,” Facebook users may engage individ­ infonnation. At the same time, with no trained editors,
ual gatekeeping but, because SNS “offers wall posts the sites may more closely resemble a supermarket
and other interactions between profile owners and their tabloid than a social network. Whatever the outcome,
social networks,” (Hu & Sundar, 2010, p. 105), they this review of gatekeeping in general and of Barzilai-
may also be gatekeeping collectively. Little research to Nahon’s network gatekeeping theory in particular hopes
this point has addressed how, if Facebook users are to provide a first step towards a holistic understanding
considered editors of their own content, their relation­ of network gatekeeping, one that allows researchers to
ship with friends in their network relates to the conde­ keep up with the ever-changing online news landscape
scending and hierarchical relationship between editors and better equips communication practitioners to map
and audiences in traditional journalism (Gladney, the trajectory of infonnation on the Web.
1996) or, as more people use social networks as news
sources (Purcell, Rainie, Mitchell, Rosenstiel, & References
Olmstead, 2010), whether Facebook users’ selection of
Ayer, A.J. (1966). Logical positivism. New York, NY: Free
content on their Facebook profiles begins to resemble
Press.
their selective consumption of news. A similarity
Banczyk, B., Kramer, N. C., & Senokozlieva, M. (2008).
would not only complicate Barzilai-Nahon’s (2005, “The wurst” meets “fatless’’ in MySpace. The rela­
2008, 2009) network gatekeeping theory, but also have tionship between personality, nationality, and self­
implications for how heavy Facebook users interact in presentation in an online community. Paper presented
real life, given Facebook’s purported ability to alleviate at the 58th annual meeting of the International
the tedium of face-to-face communication (Ellison, Communication Association, Montreal, Canada.
Steinfield, & Lampe, 2011). Barzilai-Nahon K. (2005). Network gatekeeping theory. In
Because the popularity of user-generated news K. Fisher, S. Erdelez, & E. McKechnie (Eds.),
sites is, at least in large part, attributable to the “demo­ Theories o f information behavior: A researcher’s
cratic ideals of equality, accountability, transparency, guide (pp. 247-254). Medford, NJ: Information Today.
and empiricism” (Keegan & Gergle, 2010, p. 134), it is Barzilai-Nahon, K. (2008). Toward a theory of network gate-
keeping: A framework for exploring information con­
important to know if users of these collective sites
trol. Journal o f the American Society for Information
abide by the same democratic principles when making
Science and Technology, 59, 1493-1512.
individual decisions about the quality, credibility, and Barzilai-Nahon K. (2009). Gatekeeping: A critical review.
representativeness of online news and, more funda­ Annual Review o f Information Science and
mentally, the gatekeeping ability of fellow online news Technology, 43, 433-478.
consumers. Answers to these questions about collective Bass, A. (1969). Redefining the gatekeeper concept: A U.N.
vs. individual gatekeeping on Digg, Facebook, and radio case study. Journalism Quarterly, 46, 59-72.
Twitter will ultimately reveal whether these technolo­ Berkowitz, D. (1990). Refining the gatekeeping metaphor
gies merely indicate a shift in gatekeeping practices on for local television news. Journal o f Broadcasting &
the Web or signify a more fundamental and consequen­ Electronic Media, 56(1), 45-60.
tial transformation of the way news in produced and Bleske, G. L. (1991). Ms. Gates takes over: An updated ver­
consumed in a digital environment. sion of a 1949 case study. Newspaper Research
Journal, 12(4), 88-97.
The Web poses paradigmatic challenges not only
Bohn, D. (2012, July 31). Digg launches redesign and new
to news production and consumption, but also to tradi­
app with editorial curation, no comments. Verge.
tional understanding of gatekeeping theory. Barzilai- Retrieved October 31, 2013, from http://www.thev-
Nahon’s network gatekeeping theory responds to the erge.com/2012/7/31/3207670/digg-redesign-live
challenge by rebuilding the infrastructure of gatekeep­ Brown, R. M. (1979). The gatekeeper reassessed: A return to
ing theory through the gate, gated, gatekeeping, net­ Lewin. Journalism Quarterly, 59 (3), 595-601.

20 — V olume 34 (2015) No. 1 C ommunication R esearch T rends


Bruns, A. (2003). Gatewatching, not gatekeeping: Enli, S. G (2007). Gatekeeping in the new media age: A case
Collaborative online news. Media International study of the selection of text-messages in a current
Australia Incorporating Culture and Policy: Quarterly affairs programme. Javnost—The Public, 14(2),
Journal o f Media Research and Resources, 107, 47-62.
31-44. Flew, T., & Wilson, J. (2008). Citizen journalism and politi­
Cartwright, D. (1951). Foreword. In D. Cartwright (Ed.), cal participation: The Youdecide 2007 project and the
Field theory in social science: Selected theoretical 2007 Australian Federal Election. Australian Journal
papers (pp. vii-xx). New York: Harper. o f Communication, 55(2), 17-37.
Cassidy, W. (2006). Gatekeeping similar for online, print Gieber, W. (1956) Across the desk: A study of 16 telegraph
journalists. Newspaper Research Journal, 27(2), 6-23. editors. Journalism Quarterly, 33(4), 423^-32.
Cassirer, E. (1923). Philosophic der symbolischen Formen. Gieber, W. (1960). How the ‘gatekeepers’ view local civil
Erster Teil: Die Sprache. Berlin: Bruno Cassirer. liberties news. Journalism Quarterly, 37(1), 199-205.
(Translated as The Philosophy o f Symbolic Forms. Gieber, W. (1964). News is what newspapermen make it. In
Volume One: Language. New Haven: Yale University L. A. Dexter & D. M. White (Eds.), People, society,
Press, 1955.) and mass communication (pp. 172-182). New York,
Cassirer, E. (1925). Philosophic der symbolischen Formen. NY: Free Press.
Zweiter Teil: Das mythische Denken. Berlin: Bruno Gladney, G. (1996). How editors and readers rank and rate
Cassirer. (Translated as The Philosophy o f Symbolic the importance of 18 traditional standards of newspa­
Forms. Volume Two: Mythical Thought. New Haven: per excellence. Journalism & Mass Communication
Yale University Press, 1955.) Quarterly, 73, 319-331.
Cassirer, E. (1929). Philosophic der symbolischen Formen. Goode, L. (2009). Social news, citizen journalism, and
Dritter Teil: Phanomenologie der Erkenntnis. Berlin: democracy. New Media & Society, 11, 1287-1305.
Bruno Cassirer. (Translated as The Philosophy o f Halavais, A. (2009). Do dugg diggers digg diligently?
Symbolic Forms. Volume Three: The Phenomenology Information, Communication, & Society, 12, 444—459.
o f Knowledge. New Haven: Yale University Press, Halloran, J., Elliott, P., & Murdock, G. (1970).
1957.) Demonstrations and communication: A case study.
Cha, M., Haddadi, H., Benevenuto, F., & Gummadi, K. Baltimore: Penguin.
(2010). Measuring user influence in Twitter: The mil­ Hardin, M. (2005). Stopped at the gate: Women’s sports,
lion follower fallacy. Proceedings o f the International ‘reader interest,’ and decision-making by editors.
Conference on Weblogs and Social Media, Journalism & Mass Communication Quarterly, 32(1),
Washington, D.C. Retrieved January 14, 2015 from 62-77.
http://twitter.mpi-sws.org/icwsm2010_fallacy.pdf. Hargittai, E. (2000). Open portals or closed gates:
Chang, T., & Lee, J. (1992). Factors affecting gatekeepers’ Channeling content on the world wide web. Poetics:
selection of foreign news: A national survey of news­ Journal o f Empirical Research on Culture, the Media,
paper editors. Journalism Quarterly, 69(3), 554-561. and the Arts, 27, 233-254.
Cheng, C., & Evans, T. (2009, June). An in-depth look inside Hogg, T., & Lerman, K. (2012). Social dynamics of Digg.
the Twitter world. Sysomos. Retrieved October 31, EPJ Data Science, 1(5). Retrieved January 9, 2015
2013, from http://www.sysomos.com/docs/Inside- from http://www.epjdatascience.eom/content/l/l/5.
Twitter-BySysomos.pdf. Hu, Y., & Sundar, S. S. (2010). Effects of online health
Chevalier, J., & Mayzlin, D. (2006). The effect of word of sources on credibility and behavioral intentions.
mouth on sales: Online book reviews. Journal o f Communication Research, 37 (1), 105-132.
Marketing Research, 43, 345-354. Huberman, B., Romero, D., and Wu, F. (2008). Social net­
Chibnall, S. (1975). The crime reporter: A study in the pro­ works that matter: Twitter under the microscope. First
duction of commercial knowledge. Sociology, 9(1), Monday, 14(1).
49-66. Kalyanaraman, S., & Sundar, S. S. (2008). Portrait of the
Cohn, D. (2007). Digg this. Columbia Journalism Review, portal as a metaphor: Explicating Web portals for com­
45, 8-9. munication research. Journalism & Mass
Digg (2010). What we do. Retrieved January 14, 2015 from Communication Quarterly, 85(2), 239-256.
http://www.jrwhipple.com/fmdit/%28find4.html. Kaplan, A., & Haenlein, M. (2010). Users of the world,
Dimmick, J. (1974). The gate-keeper: An uncertainty theory. unite! The challenges and opportunities of social
Journalism Monographs, 37. media. Business Horizons, 53, 59-68.
Ellison, N., Steinfield, C., & Lampe, C. (2011). Connection Keegan, B., & Gergle, D. (2010). Egalitarians at the gate:
strategies: Social capital implications of Facebook- One-sided gatekeeping practices in social media.
enabled communication practices. New Media & Proceedings o f the 2010 ACM conference on
Society, 13, 873-892. Computer Supported Cooperative Work (pp.

C ommunication R esearch T rends V olume 34 (2015) No. 1 — 21


131-134). Savannah, GA. Retrieved January 14, 2015 Shields, M. (2009). News sites digg deeper. MediaWeek, 19,
from http://research.microsoft.com/enus/um/red- 5-66.
mond/groups/connect/cscw_l O/docs/p 131 .pdf Shoemaker, P. (1991). Gatekeeping. Newbury Park, CA:
Kohler, W. (1969). Gestalt psychology: The definitive state­ Sage Publications.
ment o f the Gestalt theoiy. New York: Liveright. Shoemaker, P., & Cohen, A. (2006). News around the world:
Kwak, H., Lee, C., Park, H., & Moon, S. (2010). What is Content, practitioners and the public. New York, NY:
Twitter, a social network or a news media? Paper pre­ Routledge.
sented at the International World Wide Web Shoemaker, P., Eichholz, M., Kim, E., & Wrigley, B. (2001).
Conference, Raleigh, North Carolina. Individual and routine forces in gatekeeping.
Leavitt, A., Burchard, E., Fisher, D., & Gilbert, S. (2009). Journalism & Mass Communication Quarterly, 78,
The influential: New approaches for analyzing influ­ 233-246.
ence on Twitter. Web Ecology Project. Retrieved Shoemaker, P., & Reese, S. (1991). Mediating the message:
January 9, 2015 from http://tinyurl.com/lzjlzq. Theories o f influence on mass media content. New
Lewin, K. (1947a). Frontiers in group dynamics: Concept, York, NY: Longman.
method, and reality in social science; social equilibria. Shoemaker, P., & Reese, S. (1996). Mediating the message:
Human Relations, 7(1), 5-40. Theories o f influence on mass media content (2nd ed.).
Lewin, K. (1947b). Frontiers in group dynamics: II. London and New York, NY: Routledge.
Channels of group life, social planning, and action Shoemaker, P., & Reese, S. (2014). Mediating the message
research. Human Relations, 7(2), 143-153. in the 21st century: A media sociological perspective.
Lewin, K. (1949). Cassirer’s philosophy of science and the London and New York: Routledge.
social sciences. In A. Schelipp (Ed.). The philosophy Shoemaker, P., Tankard, J., & Lasorsa, D. (2004). How to build
o f Ernest Cassirer (pp. 269-88). Evanston, IL: Library social science theories. Thousand Oaks CA: Sage.
of Living Philosophers. Shoemaker, P., & Vos, T. (2009). Gatekeeping theory.
Lewin, K. (1951). Field theory in social science: Selected London and New York, NY: Routledge.
theoretical papers. New York: Harper. Singer, J. (1997). Still guarding the gate? The newspaper
McCombs, M., & Shaw, D. (1976). Structuring the “unseen journalist’s role in an online world. Convergence: The
environment.” Journal o f Communication, 26(2), Journal o f Research Into New Media Technologies, 1,
18-22. 72-89.
McNeilly, J. (1959). Intermediary communicators in the Singer, J. (2006). Stepping back from the gate: Online news­
international flow of news. Journalism Quarterly, paper editors and the co-production of content in cam­
36(1), 23-26. paign 2004. Journalism & Mass Communication
Papacharissi, Z. (2002). The virtual sphere: The Internet as a Quarterly, 83(2), 265-280.
public sphere. New Media & Society, 4, 9-27. Singer, J. (2014). User-generated visbility: Secondary gate-
Purcell, K., Rainie, L., Mitchell, A., Rosenstiel, T., & keeping in a shared media space. New Media &
Olmstead, K. (2010). Understanding the participatory Society, 76(1), 55-73.
news consumer. Pew Research Center. Retrieved Sturges, P. (2001). Gatekeepers and other intermediaries.
October 1, 2013, from http://www.pewintemet.Org/~/ Aslib Proceedings, 53, 62—67.
media/Files/Reports/2010/PIP_Understanding_the_ Sundar, S. (2008). “The MAIN model: A heuristic approach
Participatory_News_Consumer.pdf. to understanding technology effects on credibility.” In
Porter, L. V., & Sallot, L. M. (2003). The Internet and public M. Metzger and A. Flanigan (Eds.). Digital Media,
relations: Investigating practitioners’ roles and World Youth, and Credibility (pp. 73-100). The John D. and
Wide Web use. Journalism & Mass Communication Catherine T. MacArthur Foundation Series on Digital
Quarterly, 80, 603-622. Media and Learning. Cambridge, MA: The MIT Press.
Ranney, A. (1983). Channels ofpower: The impact o f televi­ Sundar, S. S., Knobloch-Westerwick, S., & Hastall, M. R.
sion on American politics. New York: Basic Books. (2007). News cues: Information scent and cognitive
Schroeder, R., & Kralemann, M. (2005). Journalism ex heuristics. Journal o f the American Society for
machina—Google News Germany and its news selec­ Information Science and Technology, 55(3), 366-378.
tion processes. Journalism studies, 6(2), 245-247. Sundar, S., & Nass, C. (2001). Conceptualizing sources in
Schultz, U., & Boland, R. (2000). Knowledge management online news. Journal o f Communication, 51, 52-72.
technology and reproduction of knowledge work prac­ Sundar, S. S., Oeldorf-Hirsch, A., & Xu, Q. (2008). The
tices. Journal o f Strategic Information Systems, 9, bandwagon effect of collaborative filtering technolo­
193-212. gy. CHI ‘08 extended abstracts on Human factors in
Schramm, W. (1949). Mass communications. Urbana, IL: computing systems (CHI EA ‘08). New York: ACM,
University of Illinois Press. 3453-3458."

22 — V olume 34 (2015) No. 1 C ommunication R esearch T rends


Sundar, S. S., Xu, Q., & Oeldorf-Hirsch, A. (2009). reasons: “games are widely considered simply a form of
Authority vs. peer: How interface cues influence users. young people’s entertainment; video games are often
Proceedings from the 27th international conference on
seen as artificial or unvalued fonns of expression; tech­
human factors in computing systems (CHI EA ‘09).
nology is thought to be secular; and virtual gaming
New York: ACM, 4231—4236.
worlds are seen as unreal” (pp. 2-3). They then demon­
Watts, D., & Dodd, P. (2007). Influential, networks, and
public opinion formation. Journal o f Consumer strate the inaccuracy of each of these assumptions.
Research, 34, 441—458. A few researchers have begun the study of reli­
Weinberg, T. (2008, January 25). Every social network is dif­ gion and gaming. Their brief review of the published
ferent: Here’s what you need to know. Techipedia. work (really only a handful of books and some panels
Retrieved October 1, 2013, from http://www at the annual meetings of the American Academy of
.techipedia.com/2008/every-social-network-differs/. Religion) indicates that researchers have followed one
Weng, J., & Lee, F. (2011). Event detection in Twitter. of several approaches: the use of video games in reli­
Proceedings from the Fifth International AAAI gious education, the use of religion as a plot device or
Conference on Weblogs and Social Media, Barcelona, narrative background in games, and the connection
Spain, 401^108. Retrieved January 14, 2015 from
between gaming and the performance of religion. Their
http://w w w .cse.fau.edu/~xqzhu/courses/cap6777
volume expands these directions.
/event.detection.twitter.pdf.
Weng, J., Yao, Y., Leonardi, E., & Lee, B. (2011). Event Campbell and Grieve divide the volume into three
detection in Twitter. Technical report, HP Labs. equal sections, each consisting of four chapters: explo­
Retrieved January 26, 2015 from http://www.hpl.hp rations of religiously themed games, religion in main­
.com/techreports/2011/HPL-2011 -98.pdf. stream games, and gaming as implicit religion.
Westley, B., & MacLean, M. (1957). A conceptual model for In the first section, Jason Anthony presents a
communications research. Journalism Quarterly, 34, helpful typology. Looking at how games have played a
31-38. role in ancient Greek religious practice, Anthony sees
White, D. (1950). The “gate keeper”: A case study in the four categories: didactic games meant to teach or
selection of news. Journalism Quarterly, 27(4), instruct; hestiasic games, those connected to a sacred
383-390. festival or celebration; poimenic games in which “the
Xu, W., & Feng, M. (2014). Talking to the broadcasters on
divine is an active, interested player” (p. 31); and
Twitter: Networked gatekeeping in Twitter conversa­
praxic games, which engage with the sacred, as for
tions with journalists. Journal o f Broadcasting &
Electronic Media, 58(3), 420—437.
example in seeking the divine will. For each category,
Anthony seeks contemporary digital games, but then
adds some others. Allomythic games provide a first-
Book Reviews person entry into a religious landscape, where players
can practice one or another kind of ritual. Allopolitical
Campbell, Heidi A. and Gregory Price Grieve (Eds). games place the player in a virtual community (Second
Playing with Religion in Digital Games. Bloomington Life, for example) in which worship takes a natural
and Indianapolis: Indiana University Press, 2014. Pp. place. Theoptic games “embrace the category of ‘god
xii, 301. ISBN 978-0-253-01244-9 (cloth) $85.00; 978- games’” in which “the player assume[s] the role of an
0-253-01253-1 (paper) $30.00; 978-0-253-01263-0 (e- all-seeing power, who controls the environmental cir­
book) $29.00. cumstances of the game world” (p. 42).
Other studies in the first section examine specific
Heidi Campbell and Gregory Grieve’s edited col­ games and religious traditions. Isamar Carrillo Masso
lection addresses the intersection of religion and video and Nathan Abrams present an analysis of The Shivah, a
games, providing an outstanding resource, particularly game set in a Jewish cultural tradition and featuring a
for those with interests in communication and religion. Jewish detective. “The Shivah provides new ways and
They note that, in their volume, “digital gaming is trajectories of being Jewish that move beyond other
explored as a field filled with potential for new insights stereotypes and is based on the practice of Jewish faith”
into the place, presentation, and impact of religion with­ (p. 62). Xenia Zeiler turns to Hinduism with an analysis
in popular culture” (p. 2). As they situate the essays, they of the game, Hanuman: Boy Warrior, “the first entirely
argue that scholars and researchers have neglected the India-developed digital game based on Hindu mytholo­
connection between video games and religion for four gy” (p. 66). In addition to providing a summary of the

C ommunication R esearch T rends V olume 34 (2015) No. 1 — 23


Copyright of Communication Research Trends is the property of Centre for the Study of
Communication & Culture and its content may not be copied or emailed to multiple sites or
posted to a listserv without the copyright holder's express written permission. However, users
may print, download, or email articles for individual use.

Vous aimerez peut-être aussi