二 、名 詞 解 釋 🙁 請 將 下 列 英 文 名 詞 譯 為 中 文 , 每 題 2 分

1. public sphere

2. muckraking
3 selective self-presentation .4 cross pressure
.5 echo chamber
6. priming effect
7. media richness

8. internet flaming

9. social capital
10. incidental exposure

 

三、英譯中:(每題10分)

  1. The terms “misinformation,” “disinformation,” and “propaganda” are sometimes used interchangeably, with shifting and overlapping definitions. All three concern false or misleading messages spread under the guise of informative content, whether in the form of elite communication, online messages, advertising, or published articles. We define misinformation as constituting a claim that contradicts or distorts common understandings of verifiable facts.
    ( Source: Persily, N. & Tucker, J. A. (2020) (Eds.) Social Media and Democracy. Cambridge
    University Press.)
  2. One recent development in agenda-setting theory, the network agenda-setting (NAS) model, asserts that the salience of network relationships between objects and attributes can also be transferred from the media to the public agenda. This is considered the third level of agenda setting, which emphasizes the effect of the overall picture of the news coverage rather than the prominence of individual elements. (Source: Chen, H.-T., Guo, L., & Su, C. C. (2020). Network agenda setting, partisan selective exposure, and opinion repertoire: The effects of pro- and counter-attitudinal media in Hong Kong.Journal of Communication. 70(1), 35-59. )
  3. Communications Privacy Management Theory is an evidence-based theory centered on the dialectical tension that exists between one’s need to control one’s personal information and one’s relational need to share it. Its main principles are that people believe they own their private information, as they might own possessions. They believe they have the right to control it and develop privacy rules to help impose this control
    (Source: Mullen, C., & Hamilton, N. F (2016). Adolescents’ response to parental Facebook friend requests: The comparative influence of privacy management, parent-child relational quality, attitude and peer influence, Computer in Human Behavior, 60,165-172.)
  4. Any discussion of social fragmentation and online behavior requires an understanding of social cascades-above all because they become more likely when information, including false information, can be spread to hundreds, thousands, or even millions by the simple press of a button. Cascades are often hard or even impossible to predict, but they are all around us, and they organize our culture and even our lives.
    (Source: Sunstein, C. R. (2017). #Republic: Divided Democracy in the Age of Social Media.
    Princeton, NJ.: Princeton University Press.)
  5. Data colonialism appropriates for profitable exploitation a resource that did not begin to be universally appropriated until two decades ago: data. According to an authoritative definition, data is the “material produced by abstracting the world into categories, measures and other representational forms. that constitute the building blocks from which information and knowledge are created.” More than that, human life, and particularly human social life, is increasingly being constructed so that it generates data from which profit can be extracted.
    (Source: Couldry, N., & Mejias, U. (2019). The Costs of Connection: How Data Is Colonizing Human Life and Appropriating It for Capitalism. Stanford, CA.: Stanford University Press.)