{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T01:58:17Z","timestamp":1772589497757,"version":"3.50.1"},"reference-count":70,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T00:00:00Z","timestamp":1586563200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JD"],"published-print":{"date-parts":[[2020,4,11]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>This study aims to elaborate the picture of the relationships between information and power by examining how expert power appears in the characterizations of gatekeeping presented in the research literature.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>This study uses conceptual analysis for examining how expert power is constitutive of the construct of gatekeeper and how people subject to the influence of gatekeeping trust or challenge the expert power attributed to gatekeepers. The study draws on the analysis of 40 key studies on the above issues.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>Researchers have mainly constructed the gatekeepers' expert power in terms of superior knowledge and skills applicable to a specific domain, coupled with an ability to control or facilitate access to information. The gatekeeper's expert power has been approached as a contextual factor that facilitates rather than controls access to information. The power relationships between the gatekeepers and those subject to gatekeeping vary contextually, depending on the extent to which the latter have access to alternative sources of information. The findings highlight the need to elaborate the construct of gatekeeping by rethinking its relevance in the networked information environments where the traditional picture of gatekeepers controlling access to information sources is eroding.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title><jats:p>As the study focuses on how expert power figures in gatekeeping, no attention is devoted to the role of social power of other types, for example, reward power and referent power.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>The study pioneers by providing an in-depth analysis of the nature of expert power as a constituent of gatekeeping.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jd-01-2020-0010","type":"journal-article","created":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T06:47:19Z","timestamp":1587106039000},"page":"1215-1232","source":"Crossref","is-referenced-by-count":14,"title":["Manifestations of expert power in gatekeeping: a conceptual study"],"prefix":"10.1108","volume":"76","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9609-3464","authenticated-orcid":false,"given":"Reijo","family":"Savolainen","sequence":"first","affiliation":[]}],"member":"140","reference":[{"issue":"1","key":"key2020092114360723100_ref001","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1002\/(SICI)1097-4571(1999)50:1<74::AID-ASI9>3.0.CO;2-F","article-title":"Inner-city gatekeepers: an exploratory survey of their information use environment","volume":"50","year":"1999","journal-title":"Journal of the American Society for Information Science"},{"issue":"1","key":"key2020092114360723100_ref002","first-page":"87","article-title":"Performance of communication channels in the transfer of technology","volume":"8","year":"1966","journal-title":"Industrial Management Review"},{"key":"key2020092114360723100_ref003","volume-title":"Managing the Flow of Technology. Technology Transfer and the Dissemination of Technological Information within the R & D Organization","year":"1977"},{"issue":"9","key":"key2020092114360723100_ref005","doi-asserted-by":"crossref","first-page":"1493","DOI":"10.1002\/asi.20857","article-title":"Toward a theory of network gatekeeping: a framework for exploring information control","volume":"59","year":"2008","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"key2020092114360723100_ref006","doi-asserted-by":"crossref","unstructured":"Barzilai-Nahon, K. (2009), \u201cGatekeeping: a critical review\u201d, in Cronin, B. (Ed.), Annual Review of Information Science and Technology, Vol. 43, Wiley, Medford, NJ, pp. 1-79.","DOI":"10.1002\/aris.2009.1440430117"},{"issue":"2","key":"key2020092114360723100_ref007","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1177\/0163443712467594","article-title":"Gatekeeping Twitter: Message Diffusion in Political Hashtags","volume":"35","year":"2013","journal-title":"Media, Culture and Society"},{"key":"key2020092114360723100_ref201","year":"1997","journal-title":"The Power of Identity. The Information Age: Economy, Society and Culture"},{"issue":"4","key":"key2020092114360723100_ref008","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1109\/TCSS.2019.2920000","article-title":"Editorial versus audience gatekeeping: analyzing news selection and consumption dynamics in online news media","volume":"6","year":"2019","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"1","key":"key2020092114360723100_ref009","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1080\/13614549909510616","article-title":"Immigrant child mediators (ICM): bridging the literacy gap in immigrant communities","volume":"5","year":"1999","journal-title":"New Review of Children's Literature and Librarianship"},{"key":"key2020092114360723100_ref010","volume-title":"Frameworks of Power","year":"1989"},{"issue":"2","key":"key2020092114360723100_ref011","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1111\/1467-9558.00158","article-title":"The gatekeeper","volume":"20","year":"2002","journal-title":"Sociological Theory"},{"key":"key2020092114360723100_ref012","volume-title":"The Effects of Social Power Bases within Varying Organizational Cultures","year":"2017"},{"key":"key2020092114360723100_ref013","volume-title":"Gatekeeping: Mass Media Systems and Information Control","year":"1972"},{"key":"key2020092114360723100_ref014","article-title":"Social epistemology and cognitive authority in online comments about vaccine safety","year":"2015"},{"issue":"3","key":"key2020092114360723100_ref015","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1108\/17511340810880634","article-title":"Fifty years of influence in the workplace. The evolution of the French and Raven power taxonomy","volume":"14","year":"2008","journal-title":"Journal of Management History"},{"issue":"2","key":"key2020092114360723100_ref016","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/S0022-4405(97)00002-2","article-title":"Social power in school consultation: a contemporary view of French and Raven's bases of power model","volume":"35","year":"1997","journal-title":"Journal of School Psychology"},{"key":"key2020092114360723100_ref017","first-page":"162","article-title":"From intermediation to disintermediation and apomediation: new models for consumers to access and assess the credibility of health information in the age of Web 2.0","volume":"129","year":"2007","journal-title":"Studies in Health Technology and Informatics"},{"key":"key2020092114360723100_ref018","unstructured":"Eysenbach, G. (2008), \u201cCredibility of health information and digital media: new perspectives and implications for youth\u201d, in Metzger, M. and Flanagin, A. (Eds), Digital Media, Youth, and Credibility, The MIT Press, Cambridge, MA, pp. 123-154."},{"issue":"1","key":"key2020092114360723100_ref019","article-title":"Information behaviour of migrant Hispanic farm workers and their families in the Pacific Northwest","volume":"10","year":"2004","journal-title":"Information Research"},{"key":"key2020092114360723100_ref020","volume-title":"Discipline and Punish: The Birth of a Prison","year":"1991"},{"key":"key2020092114360723100_ref021","article-title":"The history of sexuality","volume-title":"An Introduction","year":"1998"},{"key":"key2020092114360723100_ref022","unstructured":"French, J.R.P. and Raven, B. (1959), \u201cThe bases of social power\u201d, in Cartwright, D. (Ed.), Studies in Social Power, University of Michigan Press, Ann Arbor, MI, pp. 259-269."},{"issue":"3-4","key":"key2020092114360723100_ref023","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/s10502-005-2594-8","article-title":"Conceptual analysis: a method for understanding information as evidence, and evidence as information","volume":"4","year":"2004","journal-title":"Archival Science"},{"issue":"5","key":"key2020092114360723100_ref024","doi-asserted-by":"crossref","first-page":"1029","DOI":"10.1108\/JKM-01-2015-0036","article-title":"Crowding at the Frontier: boundary spanners, gatekeepers and knowledge brokers","volume":"19","year":"2015","journal-title":"Journal of Knowledge Management"},{"key":"key2020092114360723100_ref025","unstructured":"Haugaard, M. and Clegg, S.R. (2009), \u201cIntroduction: why power is the central concept of the social sciences\u201d, in Clegg, S.R. and Haugaard, M. (Eds), The Sage Handbook of Power, Sage, London, pp. 1-24."},{"key":"key2020092114360723100_ref026","first-page":"29","article-title":"Reformed gatekeeping","volume-title":"CM: Communication and Media","year":"2016"},{"key":"key2020092114360723100_ref027","unstructured":"Heinderyckx, F. (2015), \u201cGatekeeping redux\u201d, in Vos, T.P. and Heinderyckx, F. (Eds), Gatekeeping in Transition, Routledge, New York, NY, pp. 253-267."},{"issue":"4","key":"key2020092114360723100_ref028","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1108\/JKM-12-2014-0511","article-title":"Power matters: the importance of Foucault's power\/knowledge as a conceptual lens in KM research and practice","volume":"19","year":"2015","journal-title":"Journal of Knowledge Management"},{"key":"key2020092114360723100_ref029","article-title":"Katz and Lazarsfeld revisited: using intermedia theory to enhance health campaigns","year":"2002"},{"issue":"1","key":"key2020092114360723100_ref030","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1108\/JD-05-2018-0083","article-title":"The cognitive authority of user-generated health information in an online forum for girls and young women","volume":"75","year":"2019","journal-title":"Journal of Documentation"},{"issue":"11","key":"key2020092114360723100_ref031","doi-asserted-by":"crossref","first-page":"1993","DOI":"10.1016\/j.pragma.2007.07.009","article-title":"Monitoring organisational boundaries: diverse discourse strategies used in gatekeeping","volume":"39","year":"2007","journal-title":"Journal of Pragmatics"},{"key":"key2020092114360723100_ref032","first-page":"1","article-title":"Context, power, bodies and information: exploring the 'entangled' contexts of information","year":"1999"},{"issue":"2-3","key":"key2020092114360723100_ref033","first-page":"235","article-title":"Fictional reality or real fiction: how can one decide? The strengths and weaknesses of information science concepts and methods in the media world","volume":"5","year":"2007","journal-title":"Journal of Information, Communication and Ethics in Society"},{"key":"key2020092114360723100_ref034","volume-title":"Personal Influence: The Part Played by People in the Flow of Mass Communication","year":"1955"},{"issue":"2","key":"key2020092114360723100_ref035","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/0030-5073(79)90053-9","article-title":"Communication patterns, project performance, and task characteristics","volume":"23","year":"1979","journal-title":"Organizational Behavior and Human Performance"},{"issue":"3","key":"key2020092114360723100_ref036","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1080\/13600869.2010.522334","article-title":"A framework for identifying Internet information gatekeepers","volume":"24","year":"2010","journal-title":"International Review of Law, Computers and Technology"},{"key":"key2020092114360723100_ref037","first-page":"35","article-title":"Forces behind food habits and methods of change","volume":"108","year":"1943","journal-title":"Bulletin of the National Research Council"},{"key":"key2020092114360723100_ref038","unstructured":"Lewin, K. (1951), Field Theory in Social Science: Selected Theoretical Papers, Cartwright, D. (Ed.), Harper & Row, New York: NY."},{"issue":"1","key":"key2020092114360723100_ref039","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.lisr.2006.10.007","article-title":"The human in human information acquisition: understanding gatekeeping and proposing new directions in scholarship","volume":"29","year":"2007","journal-title":"Library and Information Science Research"},{"key":"key2020092114360723100_ref040","volume-title":"Power: A Radical View","year":"1974"},{"issue":"4","key":"key2020092114360723100_ref041","first-page":"319","article-title":"Information-seeking behavior of gatekeepers in ethnolinguistic communities: overview of taxonomy","volume":"13","year":"1991","journal-title":"Library and Information Science Research"},{"key":"key2020092114360723100_ref042","unstructured":"Metoyer-Duran, C. (1993), \u201dInformation gatekeepers\u201d, in Williams, M. (Ed.), Annual Review of Information Science and Technology, Vol. 28, Learned Information, Medford, NJ, pp. 111-150."},{"issue":"3","key":"key2020092114360723100_ref043","first-page":"2078","article-title":"Making sense of credibility on the web: models for evaluating online information and recommendations for future research","volume":"58","year":"2007","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"3","key":"key2020092114360723100_ref044","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1108\/00012530710752043","article-title":"A theoretical exploration of information behaviour: a power perspective","volume":"59","year":"2007","journal-title":"ASLIB Proceedings"},{"issue":"2","key":"key2020092114360723100_ref045","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1016\/j.ipm.2009.09.006","article-title":"The use of information by environmental planners: a qualitative study using grounded theory methodology","volume":"46","year":"2010","journal-title":"Information Processing and Management"},{"issue":"2","key":"key2020092114360723100_ref046","first-page":"389","article-title":"Modelling advances in gatekeeping theory for academic libraries","volume":"76","year":"2020","journal-title":"Journal of Documentation"},{"issue":"4","key":"key2020092114360723100_ref047","article-title":"Power matters: foucault's pouvoir\/savoir as a conceptual lens in information research and practice","volume":"20","year":"2015","journal-title":"Information Research"},{"issue":"2","key":"key2020092114360723100_ref048","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1086\/517845","article-title":"Power\/knowledge: the discursive construction of an author","volume":"77","year":"2007","journal-title":"The Library Quarterly"},{"issue":"4","key":"key2020092114360723100_ref049","doi-asserted-by":"crossref","first-page":"1641","DOI":"10.1016\/j.chb.2013.01.044","article-title":"Does Twitter motivate involvement in politics? Tweeting, opinion leadership, and political engagement","volume":"29","year":"2013","journal-title":"Computers in Human Behavior"},{"issue":"9","key":"key2020092114360723100_ref050","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.1080\/1461670X.2015.1123112","article-title":"How way-finding is challenging gatekeeping in the digital age","volume":"18","year":"2017","journal-title":"Journalism Studies"},{"issue":"5","key":"key2020092114360723100_ref051","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1108\/13673270810902920","article-title":"Proximity and knowledge gatekeepers: the case of the polytechnic University of Turin","volume":"12","year":"2008","journal-title":"Journal of Knowledge Management"},{"issue":"5","key":"key2020092114360723100_ref052","first-page":"852","article-title":"Differentiating cueing from reasoning in agenda-setting effects","volume":"63","year":"2013","journal-title":"Journal of Communication"},{"issue":"1","key":"key2020092114360723100_ref053","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.1530-2415.2008.00159.x","article-title":"The bases of power and the power\/interaction model of interpersonal influence","volume":"8","year":"2008","journal-title":"Analyses of Social Issues and Public Policy"},{"issue":"2","key":"key2020092114360723100_ref054","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1002\/asi.10017","article-title":"Judgment of information quality and cognitive authority in the Web","volume":"53","year":"2002","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"key2020092114360723100_ref202","article-title":"Features of informational and expert power in cognitive authority","year":"2019"},{"issue":"2-3","key":"key2020092114360723100_ref055","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/S0963-8687(00)00043-3","article-title":"Knowledge management technology and the reproduction of knowledge work practices","volume":"9","year":"2000","journal-title":"The Journal of Strategic Information Systems"},{"key":"key2020092114360723100_ref057","volume-title":"Gatekeeping","year":"1991"},{"key":"key2020092114360723100_ref056","volume-title":"Gatekeeping Theory","year":"2009"},{"issue":"2","key":"key2020092114360723100_ref058","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1017\/S002238161100171X","article-title":"The gatekeeping function: distributions of information in media and the real world","volume":"74","year":"2012","journal-title":"The Journal of Politics"},{"issue":"2","key":"key2020092114360723100_ref059","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1108\/EUM0000000007039","article-title":"Gatekeepers and other intermediaries","volume":"53","year":"2001","journal-title":"ASLIB Proceedings"},{"issue":"11","key":"key2020092114360723100_ref060","doi-asserted-by":"crossref","first-page":"1071","DOI":"10.1287\/mnsc.26.11.1071","article-title":"External communication and project performance: an investigation into the role of gatekeepers","volume":"26","year":"1980","journal-title":"Management Science"},{"issue":"6","key":"key2020092114360723100_ref061","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1080\/1461670X.2013.856670","article-title":"News quality from the recipients' perspective. Investigating recipients' ability to judge the normative quality of news","volume":"15","year":"2014","journal-title":"Journalism Studies"},{"key":"key2020092114360723100_ref062","unstructured":"Vos, T.P. (2015), \u201cRevisiting gatekeeping theory during a time of transition\u201d, in Vos, T.P. and Heinderyckx, F. (Eds), Gatekeeping in Transition, Routledge, New York, NY, pp. 3-24."},{"issue":"5","key":"key2020092114360723100_ref063","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1016\/j.ijinfomgt.2015.04.012","article-title":"Developing new categories of knowledge acquisition, translation and dissemination by technological gatekeepers","volume":"35","year":"2015","journal-title":"International Journal of Information Management"},{"key":"key2020092114360723100_ref064","volume-title":"Economy and Society. An Outline of Interpretative Sociology","year":"1978"},{"issue":"4","key":"key2020092114360723100_ref065","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1177\/107769905002700403","article-title":"The \u2018gate keeper\u2019: a case study in the selection of news","volume":"27","year":"1950","journal-title":"Journalism Quarterly"},{"key":"key2020092114360723100_ref066","volume-title":"Second-Hand Knowledge: An Inquiry into Cognitive Authority","year":"1983"},{"key":"key2020092114360723100_ref067","first-page":"705","article-title":"Who says what to whom on Twitter","year":"2011"},{"issue":"3","key":"key2020092114360723100_ref068","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1080\/08838151.2014.935853","article-title":"Talking to the broadcasters on Twitter: networked gatekeeping in Twitter conversations with journalists","volume":"58","year":"2014","journal-title":"Journal of Broadcasting andElectronic Media"},{"issue":"1","key":"key2020092114360723100_ref069","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.lisr.2018.04.003","article-title":"Hybrid gatekeeping framework for value-added information services","volume":"40","year":"2018","journal-title":"Library and Information Science Research"}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-01-2020-0010\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-01-2020-0010\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:33:06Z","timestamp":1753396386000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/76\/6\/1215-1232\/204901"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,11]]},"references-count":70,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,4,11]]}},"alternative-id":["10.1108\/JD-01-2020-0010"],"URL":"https:\/\/doi.org\/10.1108\/jd-01-2020-0010","relation":{},"ISSN":["0022-0418"],"issn-type":[{"value":"0022-0418","type":"print"}],"subject":[],"published":{"date-parts":[[2020,4,11]]}}}