A Return to the Good Old Days: Populism, Fake News, Yellow Journalism, and the Unparalleled Virtue of Business People

  • Mark BalnavesEmail author
Living reference work entry


Primo Levi, a victim of Auschwitz, warned in an interview to The New Republic in 1986 that empathy in contemporary industrial societies can disappear without warning and replaced with a new fascism, which “with its trail of intolerance, abuse, and servitude, can be born outside our country and imported into it, walking on tiptoe and calling itself by other names; or it can loose itself from within with such violence that it routs all defenses.” Anthony Gould in his introductory chapter provides a timely reminder, and warning, that public policy and management theory are not necessarily simply a matter of clinical, scientifically constructed, models, but a part of genuine human forces, historical and otherwise, that have led to an age of crisis. Levi’s point is that events in the contemporary moment can move far faster than we recognize and trusted sources disappear even faster. In this chapter, the author provides a brief overview of the rise of digital personae in the context of intentionality and the trusted source.


Digital persona Trusted news source Internet privacy Electronic markets Persona studies 


  1. Balnaves M, Adam M, James M (2014) A theory of digital persona. Unpublished working paper, University of Newcastle.Google Scholar
  2. Balnaves M, Willson M (2011) A new theory of information and the Internet: Public sphere meets protocol. Peter Lang, New YorkGoogle Scholar
  3. Balow A (2014) 72 Hours of #Gamergate. Digging through 316,669 tweets from three days of Twitter’s Two-Month-old Trainwreck.
  4. Boxall A (2012) Man wins injunction against Google after claiming auto-complete web search ruined his life. Digital Trends, March 26, 2012.
  5. Cialdini RB (1983) Influence: the psychology of persuasion. New York: Harper Collins. p 194Google Scholar
  6. Cialdini RB (1994) Principles and techniques of social influence. In: Tesser A (ed) Advanced social psychology, McGraw-Hill: New YorkGoogle Scholar
  7. Clarke R (2001) Roger Clarke’s dataveillance and information privacy home-page.
  8. Clarke R (2013) Data risks in the cloud. J Theor Appl Electron Commer Res 8(3):59–73CrossRefGoogle Scholar
  9. Clarke R (2014) Persona missing, feared drowned: the digital persona concept, two decades later. Inf Technol People 27(2):182–207CrossRefGoogle Scholar
  10. Cyr D, Head M, Larios H, Pan B (2009) Exploring human images in website design: a multi-method approach. MIS Q 33(3):539–566CrossRefGoogle Scholar
  11. de Kerckhove D, de Almeida CM (2013) What is a digital persona? Technoetic Arts 11(3):277–287CrossRefGoogle Scholar
  12. Dockterman E (2014) What is #Gamergate and why are women being threatened by video games. Time, Oct 16.
  13. Frith CD, Frith U (2006) The neural basis of mentalizing. Neuron 50(4):531–534CrossRefGoogle Scholar
  14. Fulk J, Steinfield CW, Schmitz J, Power JG (1987) A social information processing model of media use in organizations. Commun Res 14(5):529–552CrossRefGoogle Scholar
  15. Gefen D, Straub DW (2003) Managing user trust in B2C e-services. E-Serv J 2(2):7–24CrossRefGoogle Scholar
  16. Gefen D, Karahanna E, Straub DW (2003) Trust and TAM in online shopping. MIS Q 27(1):51–90CrossRefGoogle Scholar
  17. Gibson M (1984) Neuromancer. Grafton-Collins, LondonGoogle Scholar
  18. Goldhill O (2014) How to make millions from your cat: cat videos aren’t just the quirky hobby of generation y, but a source of wealth and fame. Could your moggy be a potential cash cow? The Telegraph, December 8.
  19. Henderson NJ (2014) Online persona as hybrid-object: tracing the problems and possibilities of persona in the short film Noah. M/C J 17(3)Google Scholar
  20. Hindess B (1988) Choice, rationality and social theory. Unwin Hyman, LondonGoogle Scholar
  21. Hongladarom S (2011) Personal identity and the self in the online and offline world. Mind Mach 21(4):533–548CrossRefGoogle Scholar
  22. Kampmark B (2015) To find or be forgotten: global tensions on the right to erasure and internet governance. J Glob Faultlines 2(2):1–18CrossRefGoogle Scholar
  23. Latour B (2006) Reassembling the social: an introduction to actor-network theory. Organ Stud 27(10):1553–1557CrossRefGoogle Scholar
  24. Leaver T, Willson M, Balnaves M (2012) Transparency and the ubiquity of information filtration? Ctrl-Z: New Media Philos 1(2).
  25. Lewis P, Pegg D, Hern A (2018) Cambridge analytica kept Facebook data models through US election. Sunday, 6 May.
  26. Lucy N, Mickler S (2006) The war on democracy: conservative opinion in the Australian press. University of Western Australia Press, NedlandsGoogle Scholar
  27. Lukes S (1974) Power: a radical view. Macmillan Press, LondonCrossRefGoogle Scholar
  28. MacKenzie D (2006) An engine, not a camera: how financial models shape the markets. MIT Press, Cambridge, MACrossRefGoogle Scholar
  29. Madrigal AC (2013) Welcome to the internet of thingies: 61.5% of web traffic is not human, The Atlantic.
  30. Marshall PD (2014) Seriality and persona. M/C J 17(3).
  31. Mason R (2009) Acxiom: the company that knows if you own a cat or if you’re right-handed.…company-that-knows-if-you-own-a-cat-or-if-youre-right-handed.html
  32. Proctor B (1998) William Randolph Hearst, the early years, 1863–1910. Oxford University Press, New YorkGoogle Scholar
  33. Rosen J (2012) The right to be forgotten. Stanford Law Rev Online 64(2012):88Google Scholar
  34. Riedl R, Davis FD, Hevner AR (2014) Towards a NeuroIS research methodology: intensifying the discussion on methods, tools, and measurement. J Assoc Inf Syst 15(10), Article 4.
  35. Schonfeld E (2010) Techcrunch. Zuckerberg: “We are building a web where the default is social.”
  36. Schutz A (1946) The well informed citizen: an essay on the social distribution of knowledge. Soc Res 13(4):463–478Google Scholar
  37. Sneed T (2013) Who is grumpy cat, hollywood’s next big star? The feline internet sensation could be getting a movie deal. US News, May 30.
  38. Takashi D (2010) Google confirms acquisition of virtual currency firm Jamboo. Reuters, August 17.
  39. Teubner T, Adam TP, Camacho MS, Hassanein K (2014) Understanding resource sharing in C2C platforms: the role of picture humanization. ACIS 2014 proceedings, Auckland, pp 1–10Google Scholar
  40. Turkle S (1997) Computational technologies and images of the self. Soc Res 64(3):1093–1111Google Scholar
  41. Vastola A, Cataldo A, Mariani A (2014) Social media marketing and wine: naked wines case study. In: Vrontis D, Weber Y, Tsoukatos E (eds) The future of entrepreneurship, refereed proceedings of the 7th annual EuroMed conference of the EuroMed academy of business, September 18–19, Kristiansand, pp 1640–1652Google Scholar

Copyright information

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Gulf University for Science and TechnologyKuwait CityKuwait
  2. 2.University of NewcastleNewcastleAustralia

Personalised recommendations