Political, Social and Educational uses
Edited By Sami Zlitni and Fabien Liénard
All this justifies this collective work that proposes to examine electronic communication from various angles. Thus, twenty-three researchers were involved in the drafting of the nine chapters of this volume we introduce, in collaboration with Marina Haan. The transcription of an Yves Winkin conference contextualizes it. This conference took place in June 2014 and was held on the occasion of an international conference on Electronic Communication, Cultures and Identities. The chapters proposed here are not answers but insights from experience and research worldwide. The chapters are grouped into two main parts: ICT and political communication and Education, identity and electronic communication. Two parts which ultimately correspond to areas that use electronic communication with various initial communication objectives.
Chinese Micro-Bloggers’ Behaviors Towards Twiplomacy: Text Analysis of British PM David Cameron’s Micro-blogs
Continuous development of New Information and Communication Technologies (NICTs) has brought about significant, even complete changes in E-era (Castells, 2000; Freeman & Soete, 1997), especially for our behaviors, attitudes and relations in political life.
On one side, policy makers and government officials cannot stand aloof from this new trend as they have to conform to the current development or to explore better opportunities. In fact, the governments and the officials do have paid more and more attention to the interactions with the public by using the forms that NICTs users prefer (such as micro-blog, BBS, IM, multi-media applications and so on), so as to disclose the policies and governmental departments information, express their viewpoints, and listen to the appeals from the public, etc. On the whole, both the governments and the officials have noticed the importance to use NICTs into their daily work and the communication with the public. However, do they really have a good knowledge of how to use NICTs and are they using it effectively?
You are not authenticated to view the full text of this chapter or article.
This site requires a subscription or purchase to access the full text of books or journals.
Do you have any questions? Contact us.Or login to access all content.