Barzilai-Nahon, Karine - Gatekeeping - A Critical Review
Barzilai-Nahon, Karine - Gatekeeping - A Critical Review
Karine Barzilai-Nahon
University of Washington
Introduction
a gate or filter (Barzilai-Nahon, in press) and is associated with exercising different types of
power (e.g., selecting news, enforcing the status quo in parliamentary committees, mediating
between professional and ethnic groups, brokering expert information). The literature on
heuristics, and research challenges both within and between disciplines and fields. This happens
because discourse on the topic of gatekeeping is conducted within each discipline, in relative
isolation. In spite of an extensive literature, few comprehensive reviews are to be found. This
chapter follows in the footsteps of two such reviews (Metoyer-Duran, 1993; Shoemaker, 1991).
It offers a systematic review that explores the main trends and analytical frameworks relating to
gatekeeping in the literature from 1995 to 2007 in eight fields: library and information science
management, political science, public affairs, and sociology. The review demonstrates the lack of
analytical tools to respond to two important phenomena: the dynamism of gatekeeping and
contextualizing move to highlight research threads in the literature through these two missing
10-1
prisms. This new framework is a platform to help researchers develop and further refine
The concept of gatekeeping is well explored, starting with its evolution in the mid-
twentieth century, and covers many fields of research and practice (Bass, 1969; Lewin, 1951;
Schultze & Boland, 2000; Sturges, 2001; Tushman & Katz, 1980). Lewin (1947, 1951), the
creator of the concept, looked at gatekeepers through psychological lenses, researching how and
why the food habits and activities of families differed. He noted that, in the groups he examined,
housewives controlled the decision-making process related to food habits and activities by
creating behavioral barriers and incentives; Lewin referred to these housewives as gatekeepers.
The concept subsequently took on different flavors and theories were developed mainly in the
science. Each discipline and field emphasized different components in the conceptualization of
gatekeeping. The next four sections introduce the premises and foundations put in place by each
field.
ubiquitous and diverse phenomenon, which can be observed in many daily activities. This
chapter deals only with information sources that studied gatekeeping explicitly. By drawing
directly upon concepts that surround gatekeeping, scholars exhibit the importance and centrality
of the gatekeeping phenomenon to their research. Therefore, research that dealt with the
phenomenon only implicitly was excluded. Areas of research that discuss gatekeeping implicitly
include, for example: scholarly publishing (Clemens, Powell, McIIwaine, & Okamoto, 1995),
10-2
impact factor (Garfield & Sher, 1963), the role of brokers in organizations (Wenger, 2000),
knowledge discovery (Davenport & Hall, 2002), selective dissemination of information, agenda
setting (Hammond, 1986; McCombs & Shaw, 1972), search engines and channeling information
(Introna & Nissenbaum, 2000), and cognitive models of thinking (Kahneman, Slovic, &
Tversky, 1982).
Communication Theories
presenting varied theories, Shoemaker (1991, p. 1) defined gatekeeping as follows: “Simply put,
gatekeeping is the process by which the billions of messages that are available in the world get
cut down and transformed into the hundreds of messages that reach a given person on a given
day.” Ten years later Shoemaker admitted a broader concept of gatekeeping: “However, the
gatekeeping process is also thought of as consisting more than just selection. … In fact,
gatekeeping in mass communication can be seen as the overall process through which social
reality transmitted by the news media is constructed, and is not just a series of ‘in’ and ‘out’
decisions” (Shoemaker, Eichholz, Kim, & Wrigley, 2001, p. 233). Thus, theories of
communication focused mainly on the process of gatekeeping and identifying the prominent
Theories assuming individual factors (e.g., personal judgment) as the major determinant
of gatekeeping (Snider, 1967; White, 1950) were among the first evaluated. For example, White
(1950) suggested a simple model to explain the selection process in newspapers and argued that
news items were rejected for three reasons: personal feelings of the gatekeeper, insufficient
10-3
space, and whether the story had appeared previously. Scholars who followed these theories
emphasized personality characteristics (Johnstone, Slawski, & Bowman, 1972; Livingston &
Bennett, 2003; Weaver & Wilhoilt, 1986) or the influence of the gatekeeper’s moral and
normative values on the decision-making process (Gans, 1979). Focusing on individual factors
often entailed relying on external cognitive models of thinking (Hewes & Graham, 1989;
Kahneman et al., 1982; Snodrass, Levy-Berger, & Hayden, 1985) and external decision-making
(1991) labeled routine and organization level theories. These included internal contexts to the
gatekeeping (Bass, 1969; Dimmick, 1974; Westley & MacLean, 1957); routines that establish
the working procedures of gatekeepers (Sigal, 1973); and established industry benchmarks
(Davison & Yu, 1974; Galtung & Ruge, 1965). This wave also includes theories that concentrate
on external constraints to and motivators of routines to gatekeeping, such as cost and time
constraint models (Galtung & Ruge, 1965; Jones, Troldahl, & Hvistendahl, 1961), mechanical
production models (Gieber, 1956), and technology absence factors (Livingston & Bennett,
2003).
gatekeeping as an act of agenda setting and change in society. These investigations fostered the
development of theories focusing on the institutional and social environment, which, among
other things, discuss the impact of group consensus on gatekeeping (Bantz, 1990), how market
pressures affect gatekeeping (Donohue, Olien, & Tichenor, 1989), models of newsworthiness
(Shoemaker et al., 2001), and cultural impact theories (Galtung & Ruge, 1965). Finally, some
10-4
scholars were interested in the characteristics of messages themselves and developed information
characteristics theories that explore how visual factors (Abott & Brassfield, 1989) and the size,
number (Gieber, 1956), and clarity (Galtung & Ruge, 1965) of messages affect editors’ decisions
about whether and how to include messages in the media. To summarize, most communication
theories have viewed gatekeeping as the process of controlling the entry of messages into the
gatekeeper’s space.
Gatekeeping theories in the field of management and technology are monolithic in the
sense that they emerge and branch out from one main meta-theory, the technological gatekeeper.
The concept, first introduced by Allen (1966) in his dissertation and developed and expanded
later by Allen and others (Allen, 1977; Allen & Cohen, 1969; Allen, Piepmeier, & Cooney,
1971; Gerstberger & Allen, 1968), was mainly inspired by Katz and Lazarsfeld’s (1965) studies
of opinion leaders and how they affect many of life’s activities. Unlike Katz and Lazarsfeld,
Allen allowed gatekeepers to be more than formally designated opinion leaders and emphasized
the role of informal gatekeepers. Allen (1977) identified three characteristics of gatekeepers and
the stakeholders who interact with them: (1) The gatekeeper is a high technical performer, (2)
most gatekeepers are first-line supervisors, and (3) gatekeepers are those whom technical
Tushman and Katz (1980, p. 1071) continued developing this direction of research and
organizations and in finding ways to understand the role of gatekeepers as “key individual(s)
who are both strongly connected to internal colleagues and strongly linked to external domains.”
10-5
Tushman and Katz distinguished between gatekeeping and boundary spanning, claiming that a
gatekeeper must be strongly connected both internally and externally but boundary spanners are
connected only externally. Some scholars, particularly those in the current management
literature, treat gatekeepers as boundary spanners and vice versa, blurring the distinction between
the two concepts (Pawlowski & Robey, 2004; Schultze & Orlikowski, 2004). Subsequently, the
concept was applied to particular contexts in R&D management such as human resources issues
(Katz, Tushman, & Allen, 1995) and technology alliances (Soh & Roberts, 2005).
In general the literature in this area either concentrated on developing a set of parameters
to identify technological gatekeepers (Allen, 1977; Myers, 1982; Schultze & Boland, 2000) or
used existing parameters to comprehend how gatekeepers affect the flow of information,
limitation is the lack of variation among the different models from the one originally suggested
by Allen. Finally, the focus is solely on the gatekeeper and not on other actors who may affect
gatekeepers’ interactions. Most of the literature in communication studies treats the gatekeeper
as a selector, one who protects the walls and gates; management studies tend to view gatekeepers
The field of library and information science embraced the gatekeeping subject only after
studies, information science is also rather fragmented, encompassing many different theories and
10-6
borrowed some of its theories and vocabularies from other fields (the editorial gatekeeper from
communication [Glogoff, 1988] and the technological gatekeeper from management [Allen,
1969; Wilkin, 1977]) and applied these concepts to information science. Examples include
studying the editorial review process in academic journals (Glogoff, 1988) and investigating the
role of the technological gatekeeper outside the R&D world, such as in the information
technology profession or academia (Cronin, 1982; Klobas & McGill, 1995). Other variations on
both managerial and communication concepts of gatekeeping were used in exploring the role of
Sturges, 2001).
Most of the theories coming from communication and management are vertical because
they explore questions within the context of a certain profession or organization. For example,
on editors. Two streams of theories in information science challenged these conventions. The
and understanding their roles. As with the editor and technological gatekeeper theories, its roots
came from outside the information field. Norman Kurtz (1968) defined gatekeepers as
individuals who move between two cultures to provide information that links people with
linkage roles in communal and social networks (Booth & Owen, 1985) and the illumination of
other roles they may have in communities; for instance: how to identify gatekeepers (e.g., as
preserving cultural ethos and symbols, as key individuals who help in the political and social
gatekeepers’ roles in the exchange and use of information (Shannon & Magdaline, 1973);
10-7
exploring specific cases of ethnic groups (Borowiec, 1975; Metoyer-Duran, 1991). This stream
has had limited impact because it focuses only on ethnic communities (e.g., African-Americans,
Latinos, Polish Americans) and such a focus sometimes lies outside the scope of traditional
The second stream, information seeking models, is tightly connected with the cultural
stream, making it hard to differentiate between the two. Information seeking models place a
greater emphasis on the information needs and services of a community and the role of
gatekeepers in fulfilling those needs; the cultural stream emphasizes the gatekeeping role in the
community over community information needs. Some scholars apply a hybrid information-
within the context of the individual’s cultural experience (Chatman, 1985; Metoyer-Duran, 1991,
1993). In this context, gatekeepers are analyzed as agents who disseminate information in their
community for acculturation purposes. Still, the focus on gatekeepers within information science
represent.
With few exceptions, the political science literature is very much focused on
10-8
formalized by Denzau and Mackay (1983) and referred to the political behavior of legislature
committees that sought to maintain the status quo. The idea is that one of the principal powers of
a committee is its ability to veto proposals within its jurisdiction. McCubbins, Noll, and
Weingast (1994, p. 18) agree and assert that “in each chamber of Congress, at least one
subcommittee and one full committee have gatekeeping rights in that a bill normally will not be
considered by the entire legislative body until it has been approved in committee.” Researchers
have analyzed these rules and equilibria in other places, such as the European Community
(Fitzmaurice, 1988; Lenaerts & Van Nuffel, 1991). This literature is considered non-mainstream
in political science and in some instances finds its way into law journals. Unlike in other fields,
gatekeeping in the 1980s and 1990s was only beginning to establish itself in political science,
The major objective of this chapter is to provide a consolidated view of current literature
on gatekeeping, reflect on trends, and suggest a starting point for further theorizing. For this
purpose key journals in eight disciplines and fields from 1995 to March 2007 were studied. Table
10.1 provides the list of journals systematically scrutinized, their ranking, and the number of
articles containing a gatekeeping concept. The following considerations were followed: (1)
Priority was given to currently published journal ranking reports generated by experts in a
particular field (the fields of information science [IS] and management of information systems
[MIS] are examples). (2) When no ranking was available within a certain discipline or field, the
study used ISI’s Web of Knowledge to establish the number of citations and used this as the
basis for comparing the journals. (3) If neither of these two measures existed (e.g., as in law and
society), a panel of experts in the field was consulted to determine journal rankings.
10-9
Table 10.1 Gatekeeping articles in journals (March 2007, 1995)
Management Information
ISR 2 4 366 1.1%
Information Systems Research
Systems2 Journal of the
Association for
(MIS) JAIR 9 3 119 2.5%
Information
Systems
MISQ MIS Quarterly 1 16 479 3.3%
Total MIS articles 23 964 2.4%
Management Academy of
AMJ Management 2 18 1045 1.7%
Journal
10-10
(Mgmt) Academy of
AMR Management 4 10 977 1.0%
Review
Management
MS 1 19 2004 1.0%
Science
Total Management articles 47 4026 1.2%
Communication3 Communication
CR 3 2 344 0.6%
Research
(Comm)
Information
ICS Communication and - 4 333 1.2%
Society
Journalism and
Mass
JMCQ 12 76 1739 4.4%
Communication
Quarterly
NMS New Media Society 29 16 380 4.2%
Total Communication articles 98 2796 3.5%
10-11
Law and Society4 Journal of Legal
JLS 3 10 314 3.2%
Studies
(Law)
Law and Social
LSI 2 29 507 5.7%
Inquiry
Law and Society
LSR 1 18 499 3.6%
Review
Total Law articles 57 1320 4.3%
10-12
Total journal articles 453 24669 1.8%
1. See Scholegl and Stock (2004).
2. See Pfeffers and Tang (2003).
3. Journals ranked by ISI impact factor and expert panel.
4. Journals ranked by expert panel.
10-13
Out of a total of 24,669 articles in eight disciplines for the twelve-year period, 453 (2
percent) focused on or made reference to gatekeeping (see Table 10.1). Communications and law
and society have the largest number. However, we need to consider the degree of emphasis on
gatekeeping in individual articles. For this purpose, articles explicitly including gatekeeping
• Factor: Gatekeeping is a factor within the study, but not a large component.
Using these categories, we find that of the 453 articles only a small number deals with the
subject in depth. Table 10.2 presents the distribution of the various types of gatekeeping
presence. Only twelve (3 percent) of all the articles mentioning gatekeeping analyzed the concept
thoroughly (Analysis) and only eighteen articles (4 percent) used gatekeeping as a factor
(Factor). This shows that gatekeeping concepts are mainly used for the purpose of articulating
ideas or to serve as metaphors to characterize a certain state, rather than for a fully developed
theoretical framework.
10-14
Table 10.2 Type of gatekeeping presence by field of study
10-15
The percentage of articles on a topic may reflect how important a certain topic is within a
field. Communication and law and society journals appear to show most interest in gatekeeping
(see Table 10.1). The picture changes when we take into account the depth of treatment (the
factor and analysis types of articles in Table 10.2). As we discuss later, these disciplines also
discourse may indicate an attempt to challenge a hegemonic theoretical framework (for example,
stemming from unsound theories or the inapplicability of these theories, given changes in the
environment (for example, the interactivity of the Internet may necessitate some
Another interesting fact illuminated by Table 10.2 is that MIS, management and public
affairs do not have articles that fully analyze the concept of gatekeeping, yet do have some
utilizing gatekeeping as a factor in a larger study. Did these fields fail to produce new theoretical
frameworks for gatekeeping in the years 1995 to 2007? Deeper analysis shows that these three
are not the only fields that did not contribute new theories on gatekeeping during this era. Later
Gatekeeping Rationales
Interesting questions to explore include the following: Are there new conceptualizations
of gatekeeping in the current literature? If so, what they are? Which research paths did these
fields take in recent years? To address these questions, we examined individual articles to
identify the motivation or rationale underlying the appearance of gatekeeping concepts in the
10-16
Table 10.3 Rationale of gatekeeping conceptualization
Gatekeeping Description
rationale
Access Providing or preventing access to a service, status, or position that includes a level of
screening to determine one’s suitability for passage, and assignment to a designated
category. Used to control participation, inclusion/exclusion.
Editorial A particular type of Access: Processes of selection used by journal editors, reviewers, and
the news media to identify works to be published and disseminated. Often associated with
power to define how field of study progresses, or what items are newsworthy. (Crane,
1967; Shoemaker, 1991)
Protection Regulating information coming from outside and its distribution in order to protect
members of the network or the information. (Metoyer-Duran, 1993)
Preservation A particular type of Protection: Mediating and controlling information for the sake of
of culture preserving core values, norms and continuity of a social network, community, and culture.
(Metoyer-Duran, 1993)
Change agent Engaging either deliberately or whose behavior results in social, cultural or behavioral
change—this is usually done by agenda setting or shaping and changing preferences and
views. (Katz & Lazarsfeld, 1965)
There are two dominant rationales (see Table 10.4): the notion of editorial gatekeeping
(similar to the traditional concept in communication studies) and gatekeeping for the sake of
preservation of culture. Preservation of culture served as one of the main theories in information
science in years past but it has since become marginalized. The current literature instead
emphasizes the editorial meaning of gatekeeping borrowed from communication. At the same
time, preservation of culture did become the main attention driver over other representations of
gatekeeping for social science disciplines such as political science, public affairs, and sociology.
Table 10.4 summarizes all types of gatekeeping rationales in articles that treated the concept of
gatekeeping.
10-17
Table 10.4 Rationale for gatekeeping by field of study
10-18
Key Questions and Definitions of Gatekeeping
Table 10.2 showed that the concept of gatekeeping is still used as a metaphor, symbol, or
illustration mainly for the purpose of articulating ideas rather than as a stand-alone theoretical
framework. In the next section, attention is directed to the analysis of those articles that make in-
depth reference to gatekeeping (analysis and factor type articles), a total of 30 articles (see Table
10.5).
10-19
Table 10.5 Gatekeeping rationale by field for analysis and factor items
Field of Study
Category Poli Total
Comm Info Sci Law MIS Mgmt Pub Aff Soc
Sci
Access 1 1 2
Change agent 1 2 3
Disseminator 1 1 2
Editorial 4 1 1 6
Facilitator 3 2 1 6
Linking 1 1 1 3
Preservation of culture 3 2 2 7
Protection 1 1
Total 7 6 1 2 4 5 1 4 30
10-20
The analysis revealed several trends: Law and society used facilitator and access most
frequently for purposes of illustration (see Table 10.4) but the in-depth articles concentrated on
the linking notion (see Figure 10.1). Surprisingly, access was used rarely for in-depth analysis
purposes. Finally, some disciplines focused on only one main aspect of gatekeeping. For
example, public affairs and law deal only with linking and MIS focused only on facilitator.
Figure 10.1 Gatekeeping rationale by field for analysis and factor articles
communication and information science (for example, information science looks at the
categories of disseminator, editorial, facilitator, and linking as the rationale for analysis). What
does this fragmentation mean? What are the main research questions in the current literature?
Are there narratives shaping gatekeeping research within and across the fields? If so, what are
To answer these questions, Table 10.6 first offers a micro-level insight into the different
10-21
gatekeeping definitions and research questions in each article. This is followed by a within-field
analysis and then a cross-field analysis of themes. The cross-field examination is of particular
importance because it entails searching for patterns that may serve as common denominators for
10-22
Table 10.6 Overview of articles studying gatekeeping in depth
Field Author, date Category Gatekeeping definition from article Key questions
10-23
“Gatekeeping is the process by which the vast array of
potential news messages are winnowed, shaped, and
prodded into those few that are actually transmitted by
the news media. … However, the gatekeeping process Is newspaper gatekeeping
Shoemaker et is also thought of as consisting of more than just influenced more from a
al., 2001 Editorial selection, to include how messages are shaped, timed routine level of analysis
for dissemination, and handled. In fact, gatekeeping in or individual
mass communication can be seen as the overall characteristics?
process through which the social reality transmitted
by the news media is constructed, and is not just a
series of ‘in’ and ‘out’ decisions.” (p. 233)
“The Internet defies the whole notion of a ‘gate’ and
challenges the idea that journalists (or anyone else)
can or should limit what passes through it. At the How does the gatekeeper
Editorial same time, the sheer quantity of information online, role change due to the
along with its wildly varying quality, reinforces the Internet?
Singer, 2006b need for someone to sort it out as well as to lend it
credibility and, ideally, utility.” (p. 265)
“By selecting which public affairs stories will be
Althaus &
reported and by giving special prominence to some Does new media set
Tewksbury,
Change Agent stories, the news media suggest which people, issues, agenda differently from
2002
and events are especially deserving of public traditional media?
attention.” (p. 180)
What are the roles of PR
practitioners in an
Based on definition from Leichty and Springston
Internet world?
Protection (1996): “decisions as to what information to pass
(gatekeeping is one of
along and whom to pass it to” (p. 469)
Porter & Sallot, these roles in a larger
2003 study)
10-24
“Gatekeepers, individuals who promote
communication of technical and professional
Klobas & information by gathering it from a wide range of
Info Sci How to identify a
McGill, 1995 Disseminator sources and disseminating it widely to their
gatekeeper?
colleagues” (p. 581). “We propose that gatekeepers
can be identified primarily by the extent of their
information dissemination activity.” (p. 582)
“Relations between scientific ideas and their
consumers or audiences are typically mediated
through social mechanisms that provide institutional
Braun &
channels for the flow of ideas. These channels, in How can we better
Dióspatonyi,
Editorial turn, are controlled by organizations or persons who understand the process of
2005
control the admission of manuscripts, i.e., they are selection?
gatekeepers of ideas inasmuch as they are empowered
to make decisions as to what is let ‘in’ and what is
kept ‘out’.” (p. 854)
Based on definition from Katz and Tushman (1979).
“‘technological gatekeeper’ or boundary-spanner on What factors contribute
whom project groups rely heavily for information and to failures of
who contributes to an organization’s effectiveness by communication during
filtering and channeling external technology and the process of data
Robbin & Frost-
Facilitator information into the organization (Katz & Tushman, production and data
Kumpf, 1997
1979). The boundary-spanner serves as a mediator utilization? (analyzing
between ‘organizational colleagues and the world gatekeepers’ role and
outside and effectively couples the organization to how they can improve
scientific and technological activity in the world at their role)
large’ (Allen, 1970, p. 192)” (p. 104)
10-25
Gatekeepers “direct inquiring individuals to the
documents that they are most likely to need. Because
the gatekeepers are usually individuals who use, or
have used, the information that they possess, they are
also usually able to interpret or explain the meaning
of that information, that is, how it is used by the
organization. Second, if they do not have the
What is the importance
documents an inquirer wants they can often direct
Blair, 2002 of gatekeepers in context
Facilitator him/her to another gatekeeper who is more likely to
of communities of
have them. Finally, because the storage of paper
practice?
documents has an explicit cost, the gatekeepers will
be selective about what they keep, and will often
weed out and discard documents that are no longer
useful. This makes it more likely that social
information networks will provide access to
information that is useful for the purposes of the
organization.” (p. 1024)
“Gatekeepers are defined as information
intermediaries who move between cultures, linking
1. How to identify a
their community members with alternatives or
gatekeeper?
solutions (Kurtz, 1968). … As intermediaries, they
2. What are their
Agada, 1999 Linking mediate between formal and informal networks
information needs?
(Booth & Owen, 1985); public agencies and ethnic
3. What are their
citizens (Borowiec, 1975); and their cultural
information sources?
communities and the dominant society (Duran,
1977).” (p. 75)
10-26
“Gatekeepers are emergent leaders who decide which
pieces of code get stored in the community and which
How to augment current
don’t. Gatekeepers or trusted developers maintain a
knowledge management
Awazu & quality of knowledge stored (von Krogh, Spaeth, &
Facilitator practices? (gatekeeping is
Desouza, 2004 Lakhari, 2003). Gatekeepers help knowledge transfer
one of the factors that
over time by contributing to the timely update of
facilitates this process)
knowledge and making it immediately available to
others.” (p. 1018)
Gatekeeping activities described as those of Silicon
Valley law firms “determining which clients get
access to which investors, and vice versa.” (p. 698)
“Gatekeeping activities such as these help to establish
Suchman & How do gatekeepers
normative boundaries around the Silicon Valley
Law Cahill, 1996 Linking shape the market of
community, albeit perhaps at the risk of stifling
financing start-ups?
structural innovation. … In essence, gatekeeping
moderates the uncertainty of anonymous market
relations, protecting the cultural underpinnings of the
local economy.” (p. 699)
“Studies of the gatekeeper role in research and
development teams highlight the importance of How to better understand
Pawlowski &
MIS individuals who gather and translate information from gatekeeper-gated
Robey, 2004 Facilitator
other departments and disperse it to fellow team relations in order to
members (Katz & Allen, 1985; Katz & Tushman, explain IT usage?
1981; Tushman & Katz, 1980)” (p. 648)
10-27
“Gatekeeper brokers engage in an alliance or
affiliation with another actor to mediate exchanges
with a third party. … In the gatekeeper brokerage How to better understand
Ulrike Schultze model, the broker’s interests tend to be aligned with the role of IT
& Orlikowski, Facilitator the customer or buyer. As a gatekeeper, the broker professionals as
2004 gathers information from a third party and knowledge brokers
manipulates it (e.g., through aggregation, filtering, [gatekeepers]?
sorting, and editing) before distributing selective
content to the customer.” (pp. 89–90)
How does the review
A gatekeeping role “filtering out information deemed process of journals
Beyer, Chanove, Preservation of
unworthy from that deemed worthy of dissemination [gatekeeping] affect the
& Fox, 1995 Culture
(de Grazia, 1963).” (p. 1219) fate of submitted
manuscripts [of gated]?
How do gatekeepers
Shumsky & “Many service systems are arranged with a front line
perform a routing of a
Pinker, 2003 Facilitator of gatekeepers who refer jobs to a stable of experts.”
customer?
(p. 839)
How do supervisors
Mgmt
R. Katz et al., “Gatekeepers are those key technical professionals [gatekeepers] impact the
Preservation of
1995 who are strongly networked to both internal and ability of technical
Culture
external sources of critical information.” (p. 850) subordinates [gated] to be
promoted?
1. What are the problems
that gatekeepers may face
Pollack &
“The choice of specific projects or endeavors to fund in a decentralized
Zeckhauser, Preservation of
is delegated to decision-makers in subunits, context?
1996 Culture
individuals we refer to as gatekeepers.” (p. 642) 2. Can one assess
distortions in
gatekeepers’ decisions?
10-28
Are human rights and
democracy significant
“The first stage is a ‘gatekeeping’ stage in which
determinants in the
policymakers make a decision about whether a
Blanton, 2000 Access decision to transfer arms
country is eligible to receive any U.S. arms at all.” (p.
abroad? (gatekeeping as a
124)
decision is the multi-
stage process]
Who should set the
Gatekeeping “refers to the people’s ability to check agenda? (suggesting the
Putterman, 2005
Change Agent others who frame the legislative agenda on their gated should switch roles
behalf.” (p. 147) with gatekeepers)
10-29
the primary link to external sources of information
and technology (R. Katz & Tushman, 1981)” (pp.
100–101)
10-30
“Parties play an important gatekeeping role in What are the ways
political systems (Caul, 1999; Kunovich, 2003; political parties
Kunovich & Sanbonmatsu, 2002). [gatekeepers] mediate
Access
Paxton, 2005 Political parties make decisions about what candidates and interact with factors
to field and how much support to give them (e.g., that affect representation
through placement on party lists).” (p. 520) of women [gated]?
10-31
Literature Review (1995–2007): A Within-Field Analysis
Communication
Some recurrent patterns are evident in current communication studies research. First,
there is a focus on the editorial connotation of gatekeeping associated with one of the field’s core
professions, journalism. With few exceptions (Singer, 2001, 2006b), gatekeepers in journalism
are perceived as an integral part of the elite. In other fields, however, they are perceived as part
gatekeepers themselves. The main unit of analysis is the individual gatekeeper with a latent
communal perspective, in this case, the editor’s community. Thus, the unit of analysis does not
rise above the individual level and gatekeepers are seen as part of a collective, institution, or
most studies use traditional frameworks of gatekeeping—ignoring the role of those gated,
including their power and impact on the process. The recurrent theme suggests that gatekeepers
construct and change social reality and therefore act as political agents. For example, Shoemaker
and colleagues (2001, p. 233) refer to this process as “social reality transmitted by the news
media (that) is constructed.” Hardin (2005, p. 65) acknowledges that “it is a powerful force
because it is essentially the way sport editors shape readers’ integrated views of social reality.”
Information Science
The main trend in information science according to within-field analysis is the absence of
a dominant framework or theory and fragmentation of the notion of gatekeeping. Yet, the
10-32
concept has evolved within information science, which initially borrowed its theoretical
frameworks from other disciplines. A differentiating semantics of the editorial rationale has
evolved over the years due to a dialogue between the fields of communication and information
science. Thus, the semantics of scholarly editors emphasize the quality and superiority of
information artifacts entering the gatekeeper’s network (e.g., articles chosen to be published)
controlled by constraining gates of publication (Braun & Dióspatonyi, 2005; Kling, Spector, &
McKim, 2002). In communication studies, quality is perceived as one factor among many others
in framing the editorial gatekeeper; for example, the need to reach out to the largest audience is
the principal consideration and, therefore, quality in some cases suffers at the expense of
itself from enculturation theories of gatekeeping, such as those of Metoyer-Duran (1991) and
Duran (1977). Scholars do not see the benefit of enculturation theories to contexts where
professional, or individual contexts; these are applied mainly in cases where ethnic, off-line
communities are analyzed and the linkage to cultural context is a given (Agada, 1999).
MIS
As has been noted, current gatekeeping studies in both MIS and management do not
analyze gatekeeping in-depth but instead use the concept as a factor in larger studies. MIS relies
solely upon the notion of the gatekeeper as a facilitator, whose origins are embedded mainly in
Allen’s (1977) technological gatekeeper theory. The unit of analysis is at the organizational level
and the goal is to achieve effectiveness and efficiency through knowledge brokers—gatekeepers
10-33
who translate and facilitate the flow of information between units and/or organizations. The
emphasize the remoteness of the gatekeeper as part of an elite group [Mosca, 1938; Pareto,
1935]), is not elitist but follows more of a pluralist paradigm (Dahl, 1983; Truman, 1951). The
pluralism, it is surprising that the articulation and language used in MIS studies still ignore the
Management
The main goal attributed to gatekeeping in the current management literature is the
boundary spanning, and editorial gatekeeping. The means of action is facilitation (Pollack &
Zeckhauser, 1996) but the goal is the preservation of values and norms within networks (e.g.,
organizations and departments) by promoting the preservation of the cultural characteristics that
define these networks. There is confusion as to whether gatekeeping is a neutral process (Pollack
& Zeckhauser, 1996; Shumsky & Pinker, 2003) or a political one (Beyer, Chanove, & Fox, 1995;
Katz et al., 1995), a confusion that reflects the different origins of management studies.
Operations research entails a more neutral approach by concentrating on the process and stages
Sociology
10-34
preservation of culture, editorial, and access), a leitmotif is the representation of reality. Two
types of gated are expressed in the literature of sociology. The first type, a gated community such
as women (Kunovich & Paxton, 2005), Blacks (Pescosolido, Grauerholz, & Milkie, 1997), or
social movements (Smith, McCarthy, McPhail, & Augustyn, 2001), are represented through a
medium (e.g., on the Internet, in books, the mass media, politics). The second type, the gated
individual, lives the social reality constructed by the gatekeeper. These studies manifest a power
discourse where the gatekeeper determines and sets the boundaries of language while the gated
remains deprived of any meaningful resources to intervene in that process without the
gatekeeper’s permission.
Political Science
Political science is unique because it is the only discipline that consistently uses a
pluralist vocabulary for gatekeepers and views them as collective agents with a hegemonic
(Krehbiel, 1997; Segal, 1997); the state (Blanton, 2000); and even provocative arguments that
demonstrate how the common gated, the people, function as gatekeepers (Putterman, 2005). The
power of gatekeepers arises from their ability to preserve the status quo through veto against
measures that may change the political environment against the wishes of the gatekeeper. In
change, political science inverts the gatekeeper role to that of maintaining order and equilibrium.
10-35
A Cross-Field Analysis (1995–2007): Common Gatekeeping Themes
The within-field analysis provided us with some descriptive findings about how each
field treats gatekeeping. To be able to analyze and reflect upon any changes, we need to see
which themes emerge across the various fields. Table 10.7 provides a cross-field analysis. It is
effectively neutralizes the political and power metaphors of gatekeeping by separating them from
subjective factors such as personal feelings and perceptions (Beyer et al., 1995; Smith et al.,
2001). Moreover, by focusing on the process, this approach stifles discourse on how the gated
influence the process. This prevents them from being a potentially equal player in the system
(Kunovich & Paxton, 2005; Shoemaker et al., 2001). Smith and colleagues (2001, p. 1397) put it
10-36
this way: “Even when movements succeed at obtaining the attention of mass media outlets,
media reports portray protests in ways that may undermine social movement agendas.”
The set of research questions raised under this rubric belong exclusively in the
communication field, which attempts to understand the differences between traditional modes of
communication and new ones such as those enabled by the Internet. One can only speculate why
other fields are slow to examine how new technologies affect notions of gatekeeping. Are
communication theories more mature compared to those in other fields? The new-old theme
studies attempt (often unsuccessfully) to analyze new gatekeeping phenomena with an arsenal of
old tools and frameworks that need to be revised. Singer (2006a) highlights the mismatch of
context and theory by arguing that gatekeepers no longer treat information as an end product but
as a basis for user engagement, participation, and personalization. Can traditional communication
theories explain the interactivity of relations between the gatekeeper and the gated or explain the
phenomena.
however, is dominated by information science scholars and is concerned with the basics of
existing theoretical frameworks. The two studies presenting the identity theme (Agada, 1999;
Klobas & McGill, 1995) presume that gatekeepers emerge from within the community in a
10-37
bottom-up process and represent needs of community members. These studies perceive
gatekeepers from both a pluralistic and a neutral perspective. The factors that differentiate
gatekeepers from other members of the network are mainly their information skills rather than
The influence theme is reflected through deterministic questions exploring the impact of
gatekeeping within a certain context. For example, it studies how gatekeeping and gatekeepers
affect cultural change through the portrayal of Blacks in U.S. children’s picture books from
(Kunovich & Paxton, 2005), affect policymakers’ decisions about the transfer of arms to another
country (Blanton, 2000), influence the fate of submitted manuscripts (Clayman & Reisner,
1998), influence the chances of a subordinate being promoted in organizations (Katz et al.,
1995), play roles in public relations (Leichty & Springston, 1996), and affect IT usage within
inter-firm relations (Schultze & Orlikowski, 2004). In these studies, gatekeeping and gatekeepers
are taken as independent variables and the gated, in most cases, are the dependent variables. A
criticism is inevitably leveled against the apparently infinite number of dependent variables and
contexts. Gatekeepers and gatekeeping might be anything, under the appropriate circumstances,
10-38
This theme analyzes relations among different stakeholders by identifying the relevant
stakeholders and their relationships (Mitchell, Agle, & Wood, 1997). Although not the primary
goal, this theme promotes discussion about the type and meaning of relations between
gatekeepers and gated. Nevertheless, the dominant focus is the gatekeeper, not the gated.
The practical theme deals with the motivators of, incentives for, and impediments to the
information flow processes. The main research question under this theme is “How?” The goal is
to explicate gatekeeping incrementally by reflecting on its different stages. This theme is mainly
of interest to researchers in professional fields: management, law, and information services. The
questions raised are practical in nature, with measurable purposes and outcomes (e.g., efficiency,
effectiveness, and cost-benefit analysis). However, its strength is also its weakness because the
The normative and identity themes both ask foundational questions. The identity theme is
dominated by information scientists; the normative theme is the domain of political scientists,
who are interested in such questions as: “Who should be the gatekeeper?” and “What should she
or he do?” (Krehbiel, 1997; Putterman, 2005; Segal, 1997). These sets of questions are
invaluable to the foundation of the next generation of theories. They carefully examine the
premises that constitute existing theories and at the same time shift them away from purely
practical implications.
10-39
1995–2007: A Stagnation Era—What Next?
Only two, the identity and normative themes, critically examine the foundations of gatekeeping
theories and gatekeepers. Most other types of studies do not create new theories or ask fresh
questions about gatekeeping. First-order questions in the context of gatekeeping are usually
questions of “what” and “who” rather than “how” and “when.” For example, what is
from 1995 to 2007 mainly apply existing theories (for example, using the gatekeeping theories
created by Metoyer-Duran [1993], Shoemaker [1991], or Allen [1977]). They prefer to focus on
second-order questions and, assuming that the cornerstones of theories are well firmly in place,
meaningful issues taken for granted. For instance, instead of revisiting definitions of
gatekeeping, they study how a particular factor affects gatekeeping effectiveness or how
A devil’s advocate might claim that the chances of any topic being studied from the
ground up are fairly small. In most studies the preference is to progress incrementally, building
on foundations provided by scholars from the past (Kuhn, 1962). Not every study should be of a
critical nature or attempt to revolutionize the field by addressing first-order questions (Gregor,
2006); however, every field should provide certain mechanisms in order to re-examine the
axioms, assumptions, and hypotheses that advance theory building. Unfortunately, our macro-
level look at eight disciplines/fields in the last decade resulted in almost no discourse about the
conceptualization of gatekeeping. This should raise concerns regarding the future of this topic
and suggest the need for a critical analysis of the field of gatekeeping, re-examining the
foundations.
10-40
What might be the reasons for such stagnation? Perhaps this situation indicates a degree
of stabilization and consolidation rather than stagnation, pointing to the maturation of the topic
and its associated theories. But the findings of this study suggest something different. The
plurality of vocabularies within and across fields2 exemplified in Figure 10.1 implies that there is
no common definition; nor is there a unifying theory that provides the necessary infrastructure
one associates with a mature field. Even the editorial gatekeeping rationale, which represents one
of the anchor frameworks for discussion on gatekeeping, has not evolved to a level that would
ensure agreement on most of the first-order questions. For evidence, we need only look at the
amount of debate and variation on this theoretical framework (Shoemaker, 1991). The
fragmentation reflects a lack of within-field as well as cross-field integration. This does not mean
that particular theoretical frameworks lack rigor or are insubstantial. It demonstrates, however,
that scholars choose not to raise first-order questions that might stir controversy and divert them
from their main research focus. It is as though they prefer to address “safe” questions and avoid
The second reason for stagnation in theory development has to do with nomenclature and
the questions that are being framed within the internal discourse of each field but do not connect
with the narratives of other fields. One reason for scholarly silos is the fear of academic criticism
and fear of not meeting the rigid legitimacy benchmarks of each field or discipline. Scholl (2007)
describes a similar concern in the e-government arena. Gatekeeping is a broad concept, which
needs to borrow, and then integrate, heuristics and basics from a number of fields if it is to deal
concept to stagnate and may also discourage scholars from undertaking foundational work.
10-41
Do We Need a New Theory?
This chapter argues for a fresh approach to the study of gatekeeping. There are three
The first is evidenced by the new-old theme. This theme nicely illustrates some of the
frustrations that scholars have when attempting to describe and analyze new gatekeeping
phenomena using traditional tools and theories. The ubiquity of information and communication
technologies, the widespread use of interactive applications, and the increasing digital skills of
the population oblige scholars to revisit or at least re-examine classical models of gatekeeping.
Singer (2001, 2006a) demonstrates the mismatch in two articles studying how the World Wide
Web changed the newspaper editor’s (the gatekeeper’s) role using traditional communication
theories of gatekeeping (Donohue et al., 1989; Snider, 1967; White, 1950): “We do not exist in
isolation and we do not exist only through our personal interests. We exist as members of a real
community that extends well beyond our newspaper’s primary circulation area” (Singer, 2001, p.
78). Later she acknowledges that “the Internet defies the whole notion of a ‘gate’” (Singer,
2006b, p. 265) and concludes that “these findings suggest that newspaper editors may be
reconceptualizing their gatekeeping role as they become more experienced in creating content for
the Internet, a medium whose open nature obliterates the traditional notion of the professional
journalist deciding what information people can and cannot see” (Singer, 2006b, p. 275). If
gatekeepers have reconceptualized their gatekeeping roles, why should scholars not do the same?
foundations contextualized to their own field or discipline. In keeping with Foucault’s (1972)
claim, these theories create a narrative that disciplines scholars to work within a set of axioms,
vocabularies, and relations between concepts that are perceived as being unique to the discipline.
10-42
The discipline disciplines its scholars through a narrative, a homogenous discourse that
constructs boundaries around the discipline and between it and other disciplines, emphasizing its
uniqueness. The discipline thus legitimizes some aspects of research while excluding others. This
intellectual gatekeeping may foster normative homogeneity but it hinders critical thinking. In
order to understand a concept with all its contextual richness we need to break down the walls of
disciplines and propose a theory that is not limited to any one paradigm. Providing an
interdisciplinary framework that could appeal to various contexts and fields may be of
considerable value. The suggested theoretical framework, sometimes called a meta-theory, can
Thirdly, the findings of this study show that the majority of articles focuses on
gatekeepers’ roles. Surprisingly, after sixty years of gatekeeping research, we have yet to agree
gatekeeping process. Even where gatekeeping has more of a collective connotation (e.g.,
communities, groups, or organizations while the gated have an active, yet ignored role. The
simple fact that no vocabulary exists in the literature identifying these stakeholders exemplifies
the passivity or negligence in the way prevailing discourse treats the gated and scholars’ limited
ability to present alternative thinking. Network Gatekeeping Theory for the first time in the
understand the concept of gatekeeping currently being applied in research. It also exposes the
lacunae that need to be bridged: The difficulty of coping with complex phenomena such as
gatekeeping without adequate analytical tools. For example, we need to refer to the gated as an
10-43
important stakeholder group and the interactivity of information technology. Hence, the need to
draw foundational elements from a number of theories to create a common ground for discussion
process not necessarily limited to one specific type of control (e.g., selection); second, networks
the entity subjected to a gatekeeping process, through their interactions with each other; and
fourth, analyzing the dynamism of gatekeepers and both the gated’s status and position. These
Network Gatekeeping identifies the gated according to their salience to gatekeepers (the
degree to which gatekeepers give priority to competing gated claims) by four attributes (1) their
political power in relation to the gatekeeper, (2) their information production ability, (3) their
relationship with the gatekeeper, and (4) their alternatives in the context of gatekeeping. It
predicts that the salience of a particular gated to a gatekeeper is correlated with possession of
these attributes. Table 10.8 illustrates the typology of gated in Network Gatekeeping Theory
10-44
Table 10.8 Gated typology
interactions among the gated and gatekeepers, at a particular moment and in a specific context.
Table 10.9 applies Network Gatekeeping to the current literature and is followed by a discussion.
10-45
Table 10.9 Articles by gated tier and type
Informa-
Altern- Gated typology
Relationships tion Political power1
atives
production
GK have power/gated
exchange/feedback
exchange/feedback
GK is equal to Gated
End user also creator
Gate-
Circumvention of
Info Production
Another creator
No association
Author, date keeping
Relationships
GK as creator
Alternatives
Gatekeeper
rationale
have none
Frequent
Power
gated
Some
None
Gated Tier Gated Type
Tier II –
Change Potential Change
Hardin, 2005 x x x x x x Potential
agent Agent
Gated
Leichty & Tier II –
Dissemina Potential Change
Springston, x x x x x x Potential
tor Agent
1996 Gated
Tier I –
Singer, 2001 Editorial x x x x x Dormant Vagabond reader
Gated
Shoemaker,
Eichholz, Tier I –
Kim, & Editorial x x x x x x Dormant Vagabond reader
Wrigley, Gated
2001
Tier IV –
Singer, 2006 Editorial x x x x x x x x x Challenging Challenging Gated
Gated
Althaus & Editorial x x x x x x Tier II – Vagabond user
10-46
Tewksbury, Potential
2002 Gated
Tier I –
Porter & Protection x x x x x Captive audience
Dormant
Sallot, 2003
Gated
Comm
3 2 2 4 3 1 1 3 4 3 2 1 1 4 1 4 4
TOTAL
Tier III –
Klobas & Dissemina Choice Bounded
x x x x x x x Bounded
McGill, 1995 tor Gated
Gated
Braun & Tier I –
Dióspatonyi, Editorial x x x x x Dormant Captive audience
2005 Gated
Robbin & Tier II –
Frost-Kumpf, Facilitator x x x x x x Potential Demanding user
1997 Gated
Tier III –
Influence Bounded
Blair, 2002 Facilitator x x x x x x x Bounded
Gated
Gated
Tier III –
Influence Bounded
Agada, 1999 Linking x x x x x x x Bounded
Gated
Gated
Awazu & Preservati Tier I –
Desouza, on of x x x x Dormant Captive audience
2004 culture Gated
Info Sci Total 0 1 5 5 0 1 0 2 3 3 3 0 0 6 1 3 3
Tier I –
Suchman &
Linking x x x x x Dormant Captive audience
Cahill, 1996
Gated
Law Total 0 1 0 0 0 0 1 1 0 1 0 0 0 1 0 0 0
Pawlowski & Tier IV –
Facilitator x x x x x x x x Challenging Gated
Robey, 2004 Challenging
10-47
Gated
Schultze & Tier IV –
Orlikowski, Facilitator x x x x x x x x Challenging Challenging Gated
2004 Gated
MIS Total 0 0 2 0 0 2 0 0 2 0 2 0 0 2 2 2 2
Beyer, Tier II –
Exploited
Chanove, & Editorial x x x x x x Potential
apprentice
Fox, 1995 Gated
Tier II –
Shumsky &
Facilitator x x x x x x Potential Demanding User
Pinker, 2003
Gated
Katz, Preservati Tier I –
Tushman, & on of x x x x x Dormant Captive audience
Allen, 1995 culture Gated
Pollack & Preservati Tier I –
Zeckhauser, on of x x x x x Dormant Captive audience
1996 culture Gated
Mgmt Total 0 3 1 0 2 1 1 3 1 4 0 0 0 4 1 1 0
Tier I –
Blanton, 2000 Access x x x x x Dormant Captive audience
Gated
Tier IV –
Putterman, Change
x x x x x x x x x Challenging Challenging Gated
2005 agent
Gated
Tier I –
Change
Scott, 2005 x x x x x Dormant Captive audience
agent
Gated
Preservati Tier I –
Krehbiel,
on of x x x x x Dormant Captive audience
1997
culture Gated
Preservati Tier III – Influence Bounded
Segal, 1997 x x x x x x x
on of Bounded Gated
10-48
culture Gated
PoliSci Total 0 1 4 0 3 1 2 3 2 3 0 1 1 5 1 2 2
Tier I –
Obstfeld, Dissemina
x x x x x x Dormant Vagabond reader
2005 tor
Gated
Pub Aff Total 0 1 0 1 0 0 0 0 1 1 0 0 0 0 0 1 0
Smith,
Tier III –
McCarthy, Change Influence Bounded
x x x x x x x Bounded
McPhail, & agent Gated
Gated
Augustyn,
2001
Tier I –
Clayman &
Editorial x x x x x x Dormant Captive audience
Reisner, 1998
Gated
Pescosolido,
Preservati Tier I –
Grauerholz,
on of x x x x x Dormant Captive audience
& Milkie,
Culture Gated
1997
Preservati Tier I –
Kunovich &
on of x x x x Dormant Captive audience
Paxton, 2005
Culture Gated
Soc Total 0 4 0 3 1 0 1 2 1 3 1 0 0 4 0 1 1
Total for
3 13 14 13 9 6 6 4 14 18 8 2 2 27 6 14 12
All Fields
1. Counted even if the gated had minimal power in relation to the gatekeeper.
10-49
The Political Power of the Gated
stakeholders who seek to achieve their political interests. The literature across all fields
uniformly avoids any analysis of power of gatekeepers in relation to the gated (see Table 10.9).
In most studies, the gatekeeper is perceived as powerful and the gated as powerless, or at most as
having minimal power relative to the gatekeeper. Exceptions to a gatekeeper’s elitist image can
be found only in four articles in communication and political science (Hardin, 2005; Putterman,
2005; Segal, 1997; Singer, 2006b). Singer (2006b) perceives the gatekeepers as accommodating
to the interactive nature of the Internet; he treats the gated as having power equal to gatekeepers.
Analyzing Hardin’s (2005) approach to power is more complicated due to the dual approach she
takes. Normatively, she refers to the reader’s interest as the factor that should determine the
editor’s (gatekeeper’s) decisions regarding whether, what, and when to publish something.
Empirically, she points out that editors ignore the gated preferences but she hints that the gated
can still have the upper hand if they act collectively to punish gatekeepers (for example, by not
Putterman (2005) claims that the framers of the law ought to be the people (gated) and
not the representative politicians and therefore the people (gated) should actually be considered
as legislative gatekeepers. This argument raises a critical question: If the gated possess power, do
they turn into gatekeepers? The transformation of the gated into gatekeeper is not achieved
through the possession of one of the attributes (political power, information production,
alternatives, relationship); each of these simply represents the potential for gatekeeping.
However, it is the capability of the gated to perform an act of information control, the exercising
of this control, and the surrounding context that makes one a gatekeeper. Being a powerful entity
10-50
does not, necessarily, make one a gatekeeper. It is the discretion to exercise gatekeeping along
with the context that turns the entity into a gatekeeper. Certainly, affiliation with powerful circles
and elites increases one’s chances of playing the role of a gatekeeper. Referring again to
Putterman’s article: If people (gated) were granted the power to frame the law directly and they
exercised that power, and if the purpose of this framing were to exercise information control,
The facilitator and linking rationales for gatekeeping could be expected to involve more
equal powers among the social actors; our study, however, produced different results. Even these
emphasizing only the gatekeeper and not the gated as a source of power (Agada, 1999; Blair,
2002; Pawlowski & Robey, 2004; Robbin & Frost-Kumpf, 1997; Schultze & Orlikowski, 2004;
The second attribute is the information production of the gated. Most of the literature
surveyed investigates the creation of information either by the gatekeeper or by other sources,
such as news articles written by reporters. Only a few studies analyze the information production
of the gated and what this tells us about the nature of gatekeeping (Beyer et al., 1995; Klobas &
McGill, 1995; Pawlowski & Robey, 2004; Putterman, 2005; Singer, 2006b). In classic portrayals
(Bagdikian, 2004; Foucault, 1980; Metoyer-Duran, 1993). Current literature diminishes the role
the gated might have in reality. Scholars portray gatekeepers using metaphors of dominance.
10-51
Information production by the gated may translate into power and undermine gatekeeping as a
process; in many cases scholars therefore prefer to overlook these capabilities and exclude them
from their analysis. The result is that research questions and hypotheses are framed linguistically
around gatekeepers’ production, dissemination, and use of information while the context of the
gated is ignored. This is particularly surprising because the current literature on information use
in the world of Web 2.0, Web 3.0, and other evolutionary technologies underscores the
importance of users as co-producers (Foot & Schneider, 2006). Prevailing discourse seems to
predispose scholars to adopt a one-sided perspective, that of the gatekeeper. The vocabulary
itself favors the gatekeeper, silencing any inclination to raise in-depth questions about the nature
Nevertheless, some new gatekeeping studies are asking questions about the duality of
information production. Singer (2006b) claims that contemporary gatekeepers see information
not as an end product but as a basis for user engagement, participation, and personalization. Foot
and Schneider (2006) describe the Internet as a space for the co-production of political
information by elites and non-elites. Future research may delve into questions of ability to
produce information by gated, the meaning of it to the gatekeeping process, and its effect on
network dynamics.
The third attribute to take into consideration in Network Gatekeeping is the relationship
of the gated with gatekeepers. Having a reciprocal, enduring, and direct exchange enables the
gated to alter their political power and the nature of their relations with the gatekeeper. Table
10.9 reveals that in cases where the rationale for gatekeeping is editorial, access, or protection,
10-52
the relations between gatekeepers and gated tend to be framed as sender and receiver,
gatekeepers and the gated, it does not include in-depth investigations into the meaning of the
reciprocity or the enduring nature of these relations. Foot and Schneider (2006) argue for a
recursive influence between candidates for elections and users (e.g., voters, potential donors) in
the context of Web campaigning. Traditionally the candidates would count as gatekeepers and
the users as the gated. Yet, the authors point to the dynamic, interactive nature of information
feedback, creation, and modification. Web campaigners design their sites and their messages
taking into consideration the feedback they will receive from users. Moreover, their talkbacks
and other types of feedback recursively influence and modify the messages that consequently
influence users. It creates a new dynamic where the gatekeeper-gated roles change frequently.
The authors justly emphasize not only the ability of the gated to produce information by gated,
but also their participation in shaping gatekeepers’ decisions, thereby transforming the
gatekeeper to gated and vice versa. Future research may look into this interplay and investigate
its dialectics and its significance for gatekeeping theory. What are the conditions that transform
gated to gatekeeper? How do the gated control information, which is simultaneously being
controlled by gatekeepers? Do gatekeepers use certain gatekeeping mechanisms more than others
Network Gatekeeping also considers the alternatives that the gated have. Unlike other
attributes, alternatives are a well treated topic in the current literature (Agada, 1999; Obstfeld,
2005; Robbin & Frost-Kumpf, 1997; Schultze & Orlikowski, 2004; Smith et al., 2001). Benkler
10-53
(2006, p. 133) claims there is greater individual autonomy in the network environment due to the
range and diversity of things that individuals can do for and by themselves and by providing
Barzilai-Nahon and Neumann (2005) argue that this growing autonomy in many instances does
not translate to greater freedom or power for the gated due to users’ self-regulation (see also
Sunstein, 2001, 2006). These authors suggest differentiating between legal rights and the de facto
literature is only the first stage. To strengthen the analysis of the complex phenomenon of
gatekeeping, it is also important to consider how attributes interact (reflected in Table 10.9 as
types and tiers of gated) (Barzilai-Nahon, in press). By analyzing Tables 10.9, 10.10, and 10.11,
we discuss how different types of gated are reflected in the current literature. More specifically
we discuss three issues emerging from the literature review: (1) the dominance of lower tiers of
gated, (2) the absence of certain types of gated, and (3) the association of certain gatekeeping
10-54
Table 10.10 Comparison of gatekeeping rationale with gated typology
Gatekeeping Rationale
Tier Change Preservation Total by
Gated Type Access Disseminator Editorial Facilitator Linking Protection
Agent of Culture Typology
Tier I – Vagabond
2 2
Dormant reader
Gated Captive
1 1 2 1 6 1 12
audience
Demanding
1 2 3
user
Tier II –
Exploited
Potential 1 1
apprentice
Gated
Potential
Change 1 1 2
Agent
Vagabond
1 1
user
Influence
Tier III – Bounded 1 1 1 1 4
Bounded Gated
gated Choice
Bounded 1 1
Gated
Tier IV –
Challenging
Challenging 1 1 2 4
Gated
Gated
10-55
Table 10.11 Field by gated tier
Field
Tier
Comm Info Sci Law MIS Mgmt PoliSci Pub Aff Soc Total by Tier
Tier I –
3 2 1 2 3 3 14
Dormant Gated
Tier II –
3 1 2 1 7
Potential Gated
Tier III –
3 1 1 5
Bounded gated
Tier IV –
1 2 1 4
Challenging Gated
Total by Field 7 6 1 2 4 5 1 4 30
10-56
Dominance of Lower Tiers of the Gated
articles (21) that deal with gatekeeping in the literature (see Tables 10.10 and 10.11). Only a
small number deals expressly with Tier IV, challenging gated. Scholars tend to avoid the
complexity of interactions between the gated and gatekeepers and to ignore the importance of the
challenging gated in the context of stakeholder interactions. The low gated tiers indicate that
research questions posed by scholars are framed in elitist rather than in pluralistic terms. For
example, bounded research questions such as “How do gatekeepers set the rules of the game?”
and “What do gatekeepers need in order to mobilize gated?” are addressed in terms of the
dominance and proactivity of gatekeepers. Therefore, gatekeepers are regarded in many cases as
superior in their resources and powers, which may be the case in some instances, but may play
down instances in which the gated are challenging gatekeepers. Scholarly discourse appears to
have centered on gatekeepers to such a degree that gatekeepers have become the main focus of
gatekeepers in strong linguistic terms as the focus of network practices (see also Berger &
We argue that scholars should direct some attention to different mechanisms upon which
both gated and gatekeepers may be able to call in their interactions with each other. Working
within an elitist paradigm may be appropriate but one should not ignore the emerging
mechanisms that the gated may use when interacting with gatekeepers. Examples of such
mechanisms include recommender systems in which the users/gated comment on the quality of
Moreover, the gated type captive audience has a fairly large representation in the
10-57
literature (12 articles). This type is encouraged by the gatekeeper to interact and provide
feedback and is furnished with the means to do so. The relationship requires an information
exchange between the gated and gatekeeper but is constrained by the rules and agenda set by the
Barzilai-Nahon’s Gatekeeping Network Theory spreads sixteen classes of gated over five
tiers. Our review reveals an absence in the literature of seven types of gated. This absence may
indicate a lack of research in the various fields to investigate all classes and to understand them
in depth but it also may suggest a rare type of gated. For example, one of the absent types is lost
voice in Tier I. Gated of the lost voice class are aware of and utilize their ability to produce
information but they do not possess any other attributes. Gatekeepers (one or more) provide the
infrastructure (e.g., easy-to-use blog software, a tool to create and design Web sites) and thus
control the space within which the gated may operate. This type also represents a gated without
alternatives, which may occur for several reasons. For example, existing mechanisms or
technologies may not provide them with an alternative. The context in which lost voice gated
operate implies that the gatekeeper may have a monopoly on the infrastructure governing the
interaction. Another reason may be the cost of switching from one alternative to another. For
example, a user who developed his or her virtual profile under a particular social network
provider may be reluctant to re-develop a profile on another platform. This class of gated may be
a catalyst to achieving network gatekeepers’ goals because they derive some of their political
power and reputation from their ability to attract users, create high volumes of information
traffic, and show their ability to manage these assets (e.g., YouTube, Facebook). This type of
10-58
gated is well explored in other fields, for example in management studies, but from a perspective
Table 10.10 illuminates certain linkages between the rationale for gatekeeping and type
of gated. The editorial and preservation of culture gatekeepers maintain dominance while
interacting with gated in Tier I, specifically the captive audience gated type. Facilitator
gatekeepers interact with gated of Tier IV but also with Tier II and III gated. This raises the
following question: Is it the type of gatekeeping that creates a situation that empowers the gated?
Other observations are that disseminator is linked to Tier II of gated and change agent varies in
all tiers.
Network Gatekeeping Theory offers a road map to address certain gaps that exist
currently for scholars of gatekeeping by: (1) creating a new vocabulary to fit current contexts, (2)
taking account of dynamics, and (3) applying interdisciplinary methods and approaches to
questions of gatekeeping. The theory cannot serve as a panacea or as the ultimate theoretical
framework to illustrate and explain gatekeeping phenomena with all its complexities. It has some
limitations: First, the dynamism reflected in this theory is obfuscated by the dichotomous types
of gated, which does not allow much scope for the gray classifications that are so common in a
dynamic context. Such a limitation is typical of the early stage of theory evolution. Early stage
theory should empower scholars to play a bigger role in molding parts of the theoretical
framework and customizing it to their own needs. At the same time, the current theory is
10-59
sufficiently developed to stimulate a debate and elicit questions that were previously marginal. A
second limitation may become evident if, by presenting these four attributes as a definitive
roadmap, it constrains researchers’ motivation to include or exclude other variables that may be
A New Vocabulary
Nevertheless, each field has its own vocabularies, metaphors, and symbols, which results in
unique theoretical constructs and variables that frame research questions in a field-localized
manner. The cross-field themes analysis (see Table 10.7) attempts to strip idiosyncratic questions
gaps that prevent the transfer and transformation of concepts from one field to another. In other
words, the new vocabulary facilitates the assimilation of well researched concepts by blurring
boundaries while benefiting from the maturity of other concepts. For example, co-production
issues have been well researched in communication and human-computer interaction fields and
would bring added value if idiosyncratic boundaries were passable (Lu, 2007; Scholl, 2007). The
implication of using Network Gatekeeping Theory as a neutralizing mechanism also implies the
ability to deal with language itself as a gatekeeping tool and a mechanism of power (Bourdieu,
1991).
The second advantage of the new vocabulary is the introduction of well-recognized gated
entities that previously were unnamed in the literature. Current and past literature does not ignore
the existence of the gated; after all, gatekeepers need the gated to exercise control of information.
10-60
It prefers not to label them in this way, but rather to use more neutral words such as readers,
team members, and employees (Bennett, 2004; Schultze & Orlikowski, 2004). The gated concept
(Barzilai-Nahon, in press) was originally offered as a way of extending the linguistic benefits of
classification and definition and to encourage new ways of thinking and framing questions,
highlighting the gated as visible actors and the environment as encompassing multiple
stakeholders. It is an environment with different actors, different roles, and a context that
changes constantly. The simple fact that no vocabulary exists in the literature to identify these
stakeholders illustrates the passivity or negligence with which traditional models treat them.
Finally, explication of types and tiers of gated, although somewhat rigid in its
dichotomous framing (thus inviting further refinement), serves as a point of departure for
discussion and debate among researchers. Scholars are called to define the gray areas between
the tiers and types and to study the transformation of gated from one type and tier to another. It
may encourage various disciplines and fields to raise questions while taking into account power
beginning of a discourse among many disciplines and fields, around the complex of practices
the adage “the rich get richer” but instead “the gatekeeper gets more gatekeeper-y.” The
evolution of the gatekeeping role has been presented as linear, with the power of gatekeepers
increasing over time (Bagdikian, 2004; Zittrain, 2006). These representations, essentially static
10-61
maps, are heuristically useful if the intent is to raise consciousness about who, how, and what
really count or to illustrate a stakeholder configuration at a particular context and time. Like all
models, however, one should remember that they are a simplification of reality. Gatekeepers and
the gated are not monolithic social and political entities, nor is their behavior unidimensional.
Accordingly, dynamism is important to represent an environment where the interests and goals
of the stakeholders constantly change, as do their gatekeeping and gated roles. Awareness of the
dynamic character of gatekeeping may help scholars move beyond traditional theories and tools
that cannot explain dynamic situations where the alternatives available to the gated change, the
skills and capabilities of information producers evolve, and relationships between gated and
One question that needs to be raised is whether dynamism invites the contextualization of
Network Gatekeeping Theory. Carens (2004, p. 118) argues that a contextual approach has five
interrelated elements:
First, it involves the use of examples to illustrate theoretical formulations. Second, it entails the
normative exploration of actual cases where the fundamental concerns addressed by the theory
are in play. Third, it leads theorists to pay attention to the question of whether their theoretical
formulations are actually compatible with the normative positions that they themselves take on a
particular issues. Fourth, it includes a search for cases that are especially challenging to theorists
own theoretical position. Fifth, it promotes consideration of a wide range of cases, and especially
a search for cases that are unfamiliar and illuminating because of their unfamiliarity.
approach in political theory; that to the extent that it is distinctive it is not particularly theoretical;
and that to the extent that it is theoretical it is not particularly useful.” Network Gatekeeping
10-62
Theory allows for the understanding of the dynamism of interactions that involve information
control in various contexts while using the various attributes that we suggest. Hence we offer a
framework that theorizes about a large phenomenon and yet accommodates distinctive attributes
of gatekeeping in context.
Interdisciplinarity
Analysis of the current literature suggests the need for an interdisciplinary theoretical
framework in order to unveil the multiple dimensions of gatekeeping in the context of the
information society. Network Gatekeeping Theory is only the first step toward this goal,
frameworks lies not only in constructing core concepts, but more in crafting questions. For
example, scholars would like to understand the various roles of gatekeepers that sometime
contradict each other—reflecting on the gatekeeper as the guardian of boundaries on one hand
theory and model building processes. It may also serve as a starting point for a broader debate
and refinements in various fields and disciplines around first-order questions concerning
networks.
Future Directions
understanding the gated as actors who participate in the gatekeeping process and society. The
10-63
duality of gatekeeper-gated entails further questions emphasizing additional roles of gatekeepers
beyond the traditional ones. Another set of questions has to do with the influence that
gatekeeping mechanisms have on habits, values, norms, awareness, and attitudes. Most current
and past literature on gatekeeping focused on behavioral, positivist questions (e.g., Metoyer-
Duran, 1993). Less emphasis was given to critical questions. Some of that is explored in the
literature that deals with gatekeepers as change agents. Yet, most studies used the elitist prism
where the gatekeeper sets the agenda and the gated are manipulated according the gatekeeper’s
intentions and will. This chapter aims to alter that perspective, taking into account new practices.
Additional topics of inquiry should address how the gated influence the norms of gatekeepers.
Bringing in Communities
diverse population (Agada, 1999). Most studies referenced in this chapter extend discussion to a
more theoretical level, for example, considering different types of gated (e.g., readers, voters,
employees). However, the studies typically use the individual as the unit of analysis rather than
looking into the community of which the gated, and sometimes the gatekeepers, are a part. We
should instead promote theories that emphasize various facets of communities and explore the
crucial role of communities in creating identity and action (Barzilai, 2003; Metoyer-Duran,
1991). It is important to understand the role of the community itself as a gatekeeper, not only
through individuals that represent it (Barzilai-Nahon & Neumann, 2005), but also through its
with power constituted and exercised via its institutions (Barzilai, 2003). Such a perspective
10-64
requires that scholars are receptive to paradigms of gatekeeping that differ from the traditional,
elitist model. The communal perspective will encourage studies about self-regulation and self-
gatekeeping. Many scholars will argue that technology has allowed a higher degree of autonomy
for individuals. Paradoxically, however, autonomy is not necessarily correlated with less
technology and the profusion of information have shifted much human information exchange to
the textual domain (Barzilai-Nahon & Barzilai, 2005). Most uses of social network activities
today rely heavily on literacy. Gatekeeping has also shifted, becoming less associated with
physical activities and more with text and information. Therefore, scholars of gatekeeping should
endeavor to understand the lingual refinements and discourse implications as part of the
Studies that inquire more about process questions reflect the desire to present gatekeeping
abstraction, and prediction. Some scholars prefer to see gatekeepers as monolithic entities,
independently of political forces. However, the dynamism of the information society and of
gatekeeping itself oblige scholars to ask questions about the political power of both gatekeepers
and the gated. Most of the gatekeeping literature does not recognize the major role that politics
plays in understanding gatekeeping. For example, information science and sociology mention the
10-65
gatekeeping role of the editors of academic journals to ensure homogeneity of information and
protect the interests of the community as well as the boundaries of the field. They do not take the
next step and state that understanding stakeholders’/editors’ interests involves analyzing the
politics of gatekeeping. This chapter has presented a theory that requires us to look inside the
Acknowledgments
I am grateful to Nancy Lou for the data gathering, Robert Mason and Gad Barzilai who
helped me refine the various versions of the paper, and Blaise Cronin and the anonymous
Endnotes
1. Two researchers reviewed the articles. The inter-rater reliability, that is, the level of
agreement in categorizing items for the pair of judges using Cohen’s Kappa was higher than
0.87.
2. One should exclude from the fragmentation discussion public affairs and law because they
had only one paper each on the topic that analyzed in-depth gatekeeping.
understand gatekeeping one should look at the concept from a more holistic perspective,
network.
References
Abott, E. A., & Brassfield, L. T. (1989). Comparing decisions on releases by TV and newspaper
10-66
gatekeepers. Journalism Quarterly, 66, 853–856.
environment. Journal of the American Society for Information Science and Technology,
50(1), 74–85.
Allen, T. (1966). Managing the flow of scientific and technological information. Unpublished
Allen, T. (1969). Information needs and uses. Annual Review of Information Science and
Technology, 4, 3–29.
(Eds.), Communication among scientists and engineers (pp. 191–208). Lexington, MA:
Allen, T. (1977). Managing the flow of technology: Technology transfer and the dissemination of
technological information within the R&D organization. Cambridge, MA: MIT Press.
Allen, T., & Cohen, S. (1969). Information flow in research and development laboratories.
Allen, T., Piepmeier, J. M., & Cooney, S. (1971). The international technological gatekeeper.
Althaus, S. L., & Tewksbury, D. (2002). Agenda setting and the new news: Patterns of issue
importance among readers of the paper and online versions of the New York Times.
Awazu, Y., & Desouza, K. C. (2004). Open knowledge management: Lessons from the open
source revolution. Journal of the American Society for Information Science and
10-67
Bagdikian, B. (2004). The new media monopoly. Boston: Beacon.
In J. Anderson (Ed.), Communication yearbook (Vol. 13, pp. 133–141). Newbury Park,
CA: Sage.
Barzilai, G. (2003). Communities and law: Politics and culture of legal identities. Ann Arbor:
exploring information control. Journal of the America Society for Information Science
and Technology.
Barzilai-Nahon, K., & Barzilai, G. (2005). Cultured technology: The Internet and religious
Bass, A. Z. (1969). Refining the “gatekeeper” concept: A UN radio case study. Journalism
Benkler, Y. (2006). The wealth of networks. New Haven, CT: Yale University Press.
Berger, P., & Luckmann, T. (1966). The social construction of reality: A treatise in the sociology
Beyer, J. M., Chanove, R. G., & Fox, W. B. (1995). The review process and the fates of
10-68
manuscripts submitted to AMJ. Academy of Management Journal, 38(5), 1219–1260.
Blair, D. C. (2002). Knowledge management: Hype, hope, or help? Journal of the American
Blanton, S. (2000). Promoting human rights and democracy in the developing world: U.S.
rhetoric versus U.S. arms. American Journal of Political Science, 44(1), 123–131.
Booth, N., & Owen, E. (1985). The relevance of formal and information networks for
Schwarzweller (Eds.), Focus on community (pp. 159–172). Greenwich, CT: JAI Press.
Bordieu, P. (1991). Language and symbolic power. Boston: Harvard University Press.
Borowiec, W. (1975). Persistence and change in the gatekeeper role of ethnic leaders: The case
Braun, T., & Dióspatonyi, I. (2005). Gatekeeping indicators exemplified by the main players in
the American Society for Information Science and Technology, 56(8), 854–860.
Carens, J. (2004). A contextual approach to political theory. Ethical Theory and Moral Practice,
7(2), 117–132.
Caul, M. (1999). Women's representation in Parliament: The role of political parties. Party
Chamberlain, C. (1991). The gatekeeper and information. Library Acquisitions: Practice and
Chatman, E. (1985). Information, mass media use and the working poor. Library & Information
Clayman, S. E., & Reisner, A. (1998). Gatekeeping in action: Editorial conferences and
10-69
assessments of newsworthiness. Administrative Science Quarterly, 63(2), 178–199.
Clemens, E. S., Powell, W. W., McIIwaine, K., & Okamoto, D. (1995). Careers in print: Books,
Crane, D. (1967). The gatekeepers of science: Some factors affecting the selection of articles for
Dahl, R. (1983). Dilemmas of pluralist democracy: Autonomy vs. control. New Haven, CT: Yale
University Press.
Davenport, E., & Hall, H. (2002). Organizational knowledge and communities of practice.
Davison, W. P., & Yu, F. T. C. (Eds.). (1974). Mass communication research: Major issues and
de Grazia, A. (1963). The scientific reception system and Dr. Velikovsky. American Behavioral
Scientist, 7, 33–56.
Denzau, A. T., & Mackay, R. J. (1983). Gatekeeping and monopoly power of committees: An
27(4), 740–761.
Dimmick, J. (1974). The gatekeeper: An uncertainty theory. Journalism Monographs, 37, 1–39.
Donohue, G. A., Olien, C. N., & Tichenor, P. J. (1989). Structure and constraints on community
organizational activity among Mexican Cuban and Puerto Rican residents of Chicago.
10-70
Unpublished doctoral dissertation, University of Wisconsin-Madison.
Ferejohn, J., & Shipan, C. (1990). Congressional influence on bureaucracy. Journal of Law,
Foot, K., & Schneider, S. M. (2006). Web campaigning. Cambridge, MA: MIT Press.
Foucault, M. (1972). The archaeology of knowledge and the discourse on language. London:
Tavistock.
Galtung, J., & Ruge, M. H. (1965). The structure of foreign news. Journal of Peace Research, 2,
64–90.
Garfield, E., & Sher, I. (1963). New factors in the evaluation of scientific literature through
Gerstberger, P. G., & Allen, T. (1968). Criteria used by R and D engineers in the selection of an
Gieber, W. (1956). Across the desk: A study of 16 telegraph editors. Journalism Quarterly,
33(4), 423–432.
Glogoff, S. (1988). Reviewing the gatekeepers: A survey of referees of library journals. Journal
Gregor, S. (2006). The nature of theory in information systems. MIS Quarterly, 30(3), 611–642.
10-71
American Journal of Political Science, 30(2), 379–420.
Hardin, M. (2005). Stopped at the gate: Women's sports, reader interest, and decision making by
Hewes, D. E., & Graham, M. L. (1989). Second-guessing theory: Review and extension. In J. A.
Anderson (Ed.), Communication Yearbook (Vol. 12, pp. 213–248). Newbury Park, CA:
Sage.
Introna, L. D., & Nissenbaum, H. (2000). Shaping the Web: Why the politics of search engines
Johnstone, J. W. C., Slawski, E. J., & Bowman, W. W. (1972). The professional values of
Jones, R. L., Troldahl, V. C., & Hvistendahl, J. K. (1961). News selection patterns from a state
Kahneman, D., Slovic, P., & Tversky, A. (Eds.). (1982). Judgment under uncertainty: Heuristics
Katz, E., & Lazarsfeld, P. F. (1965). Personal influence: The part played by people in the flow of
Katz, R., & Allen, T. (1985). Project performance and the locus of influence in the R&D matrix.
Katz, R., & Tushman, M. (1979). Communication patterns, project performance, and task
Katz, R., & Tushman, M. (1981). An investigation into the managerial roles and career paths of
gatekeepers and project supervisors in a major R&D facility. R&D Management, 11,
10-72
103–110.
Katz, R., Tushman, M., & Allen, T. (1995). The influence of supervisory promotion and network
41(5), 848–863.
Kling, R., Spector, L., & McKim, G. (2002). Locally controlled scholarly publishing via the
Internet: The guild model. Paper presented at the Annual Meeting of the American
Society for Information Science and Technology. Retrieved March 2, 2008, from
rkcsi.indiana.edu/archive/CSI/WP/WP02-01B.html
Klobas, J. E., & McGill, T. (1995). Identification of technological gatekeepers in the information
technology profession. Journal of the American Society for Information Science, 46(8),
581–589.
Krehbiel, K. (1997). Restrictive rules reconsidered. American Journal of Political Science, 41(3),
919–944.
Kuhn, T. S. (1962). The structure of scientific revolutions. Chicago: The University of Chicago
Press.
Kunovich, S. (2003). The representation of Polish and Czech women in national politics.
Kunovich, S., & Paxton, P. (2005). Pathways to power: The role of political parties in women's
Leichty, G., & Springston, J. (1996). Elaborating public relations roles. Journalism and Mass
10-73
Communication Quarterly, 73(2), 467–477.
Lenaerts, K., & Van Nuffel, P. (1991). Some reflections on the separation of powers in the
Lewin, K. (1947). Frontiers in group dynamics, II: Channels of group life; social planning and
Lewin, K. (1951). Field theory in social science: Selected theoretical papers. New York: Harper.
Livingston, S., & Bennett, L. W. (2003). Gatekeeping, indexing and live-event news: Is
Lu, Y. (2007). The human in human information acquisition: Understanding gatekeeping and
proposing new directions in scholarship. Library & Information Science Research, 29,
103–123.
McCombs, M., & Shaw, D. (1972). The agenda-setting function of mass media. Public Opinion
McCubbins, M., Noll, R., & Weingast, B. (1994). Legislative intent: The use of positive political
37.
319–346.
Mitchell, R. K., Agle, B. R., & Wood, D. J. (1997). Toward a theory of stakeholder identification
and salience: Defining the principle of who and what really counts. Academy of
10-74
Management Review, 22(4), 853–886.
Obstfeld, D. (2005). Social networks, the tertius iungens orientation, and involvement in
Pawlowski, S. D., & Robey, D. (2004). Bridging user organizations: Knowledge brokering and
Peffers, K., & Tang, Y. (2003). Identifying and evaluating the universe of outlets for information
systems research: Ranking the journals. Journal of Information Technology Theory and
Pescosolido, B. A., Grauerholz, E., & Milkie, M. A. (1997). Culture and conflict: The portrayal
of Blacks in U.S. children’s picture books through the mid- and late-twentieth century.
Pollack, H., & Zeckhauser, R. (1996). Budgets as dynamic gatekeepers. Management Science,
42(5), 642–658.
Porter, L. V., & Sallot, L. M. (2003). The Internet and public relations: Investigating
practitioners' roles and World Wide Web use. Journalism and Mass Communication
Putterman, E. (2005). Rousseau on the people as legislative gatekeepers, not framers. American
10-75
Political Science Review, 99(1), 145–151.
Robbin, A., & Frost-Kumpf, L. (1997). Extending theory for user-centered information services:
Diagnosing and learning from error in complex statistical data. Journal of the American
Sanbonmatsu, K. (2002). Political parties and the recruitment of women to state legislatures.
Schloegl, C., & Stock, W. G. (2004). Impact and relevance of LIS journals: A scientometric
reader survey. Journal of the American Society or Information Science and Technology,
55(13), 1155–1168.
Scholl, J. (2007). Central research questions in e-government, or which trajectory should the
study domain take? Transforming Government Process, People, Policy, 1(1), 67–88.
Schultze, U., & Boland, R. (2000). Knowledge management technology and reproduction of
Segal, J. A. (1997). Separation-of-powers games in the positive theory of congress and courts.
Shannon, L., & Magdaline, S. (1973). Minority migrants in the urban community: Mexican-
American and Negro adjustment to industrial society. Beverly Hills, CA: Sage.
10-76
Shoemaker, P. (1991). Gatekeeping. Newbury Park, CA: Sage.
Shoemaker, P., Eichholz, M., Kim, E., & Wrigley, B. (2001). Individual and routine forces in
Shumsky, R. A., & Pinker, E. J. (2003). Gatekeepers and referrals in services. Management
Sigal, L. (1973). Reporters and officials: The organization and politics of newsgathering.
Singer, J. B. (2001). The metro wide Web: Changes in newspapers' gatekeeping role online.
Singer, J. B. (2006b). Stepping back from the gate: Online newspaper editors and the co-
Smith, J., McCarthy, J. D., McPhail, C., & Augustyn, B. (2001). From protest to agenda
Snider, P. B. (1967). Mr. Gates revisited: A 1966 version of the 1949 case study. Journalism
Snodrass, J. G., Levy-Berger, G., & Hayden, M. (1985). Human experimental psychology. New
Soh, P.-H., & Roberts, E. B. (2005). Technology alliances and networks: An external link to
10-77
Sturges, P. (2001). Gatekeepers and other intermediaries. Aslib Proceedings, 53(2), 62–67.
Suchman, M. C., & Cahill, M. L. (1996). The hired gun as facilitator: Lawyers and the
suppression of business disputes in Silicon Valley. Law and Social Inquiry, 21(3), 679–
714.
Truman, D. (1951). The governmental process: Political interests and public opinion. New
York: Knopf.
Tushman, M. L., & Katz, R. (1980). External communication and project performance: An
von Krogh, G., Spaeth, S., & Lakhari, K. (2003). Community, joining and specialization in open
Weaver, D. H., & Wilhoilt, G. C. (1986). The American journalist: A portrait of U.S. news
Wenger, E. (2000). Communities of practice and social learning systems. Organization, 7(2),
225–246.
Westley, B. H., & MacLean, M. S. (1957). A conceptual model for communications research.
White, D. M. (1950). The "gate keeper": A case study in the selection of news. Journalism
10-78
Librarianship, 7, 257–297.
Wright, P., & Barbour, F. (1975). The relevance of decision process models in structuring
Zittrain, J. (2006). A history of online gatekeeping. Harvard Journal of Law & Technology,
19(2), 253–298.
10-79