{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:28:58Z","timestamp":1761006538068,"version":"build-2065373602"},"reference-count":20,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2014,5,8]],"date-time":"2014-05-08T00:00:00Z","timestamp":1399507200000},"content-version":"vor","delay-in-days":492,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2013,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>It seems that every passing week reveals new developments in the ways in which information policies are being implemented throughout society. Tragedies like the Boston Marathon bombings of March 2013, along with the VIA Rail train plots in the Toronto\u2010Montreal corridor remind and compel us to examine the decade that has passed since the events of 9\/11 and the subsequent legislative and policy impacts on information. The aim is to provide information professionals and scholars with an open forum to critically reflect on post\u20109\/11 legislation, policies, and practices and how they impact access to information and informational activities more generally, including the production, management, and diffusion of public information. With an eye toward the future, we examine the extent to which the discourses and practices of the past decade have contributed to shaping and reshaping our information environment, how the information field has responded in the ten years since this defining event, and why and how information professionals ought to remain engaged in these matters in the future.<\/jats:p>","DOI":"10.1002\/meet.14505001022","type":"journal-article","created":{"date-parts":[[2014,5,8]],"date-time":"2014-05-08T16:35:28Z","timestamp":1399566928000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["In the name of terror?: Information and policy in the decade post 9\/11"],"prefix":"10.1002","volume":"50","author":[{"given":"Nadia","family":"Caidi","sequence":"first","affiliation":[]},{"given":"Kristene","family":"Unsworth","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Leuprecht","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Doty","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2014,5,8]]},"reference":[{"volume-title":"Liquid Surveillance: A Conversation","year":"2012","author":"Bauman Z.","key":"e_1_2_5_2_1"},{"key":"e_1_2_5_3_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7687.001.0001"},{"key":"e_1_2_5_4_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1783.001.0001"},{"key":"e_1_2_5_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2005.11.003"},{"key":"e_1_2_5_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2008.02.001"},{"volume-title":"The New Politics of Surveillance and Visibility","year":"2006","author":"Haggerty K.","key":"e_1_2_5_7_1"},{"key":"e_1_2_5_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490456854"},{"key":"e_1_2_5_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2007.01.004"},{"key":"e_1_2_5_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2007.12.004"},{"key":"e_1_2_5_11_1","unstructured":"Jaeger P. T. Bertot J. C. &Gorham U.(in press).Wake up the nation: Public libraries policy\u2010making and political discourse.Library Quarterly."},{"key":"e_1_2_5_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0740-624X(03)00057-1"},{"key":"e_1_2_5_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20072"},{"key":"e_1_2_5_14_1","doi-asserted-by":"publisher","DOI":"10.1086\/502787"},{"key":"e_1_2_5_15_1","doi-asserted-by":"publisher","DOI":"10.1086\/382843"},{"issue":"2","key":"e_1_2_5_16_1","first-page":"84","article-title":"The Future of Security? Surveillance Operations at Homeland Security Fusion Centers","volume":"37","author":"Monahan T.","year":"2011","journal-title":"Social Justice"},{"key":"e_1_2_5_17_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0829320100010528"},{"key":"e_1_2_5_18_1","first-page":"6","article-title":"Secret names","volume":"96","author":"Mamet D.","year":"2004","journal-title":"Threepenny Review"},{"key":"e_1_2_5_19_1","doi-asserted-by":"publisher","DOI":"10.1215\/01903659-30-3-1"},{"key":"e_1_2_5_20_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139165518"},{"key":"e_1_2_5_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lisr.2004.09.006"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14505001022","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14505001022","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.14505001022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T09:16:44Z","timestamp":1760951804000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.14505001022"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1]]}},"alternative-id":["10.1002\/meet.14505001022"],"URL":"https:\/\/doi.org\/10.1002\/meet.14505001022","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2013,1]]}}}