Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-s2hrs Total loading time: 0 Render date: 2024-11-06T11:13:00.405Z Has data issue: false hasContentIssue false

2 - Strategic Communication and the Foundations of Free Expression

Published online by Cambridge University Press:  18 December 2014

Monroe E. Price
Affiliation:
Annenberg School for Communication, University of Pennsylvania
Get access

Summary

Let me turn, then, to my use of the term “strategic communication” to define a class of activities that significantly marks the developing global information environment. The term is now so widely used and by so many that some idiosyncratic narrowing and explanation is necessary for it to have specific meaning here. Strategic communication exists in an environment in which it is hardly possible anymore merely to communicate. The term has come to imply, a bit too generally, forms and programs of communication that are undergirded with a specific vision, programs which are strategic insofar as they serve a larger set of goals. A more directed vector for the term is “targeted communication” – communication designed with a particular schema concerning who should be reached and in what way. In some fashion and in some realms, strategic communication has become a code word for communication strategies by defense and military establishments. Strategic communication, when civilian aspects of government are the communicators, implicates soft power. When the military or defense aspect of the state is concerned, specific objectives are involved, including protecting and advancing missions and complementing command and control. Vast realms of debate and discussion of strategic communication occur in connection with business; there, strategic communication may well mean only how to achieve a firm’s (or state’s or other entity’s) objectives through astute use of modes of communication. This of course gives great leeway for defining what constitutes the “astute” relative to the circumstances and what justifies the intervention of great consulting firms. The consequence of this enlargement of category is that strategic communication is in danger of meaning and implying nothing more nor less than what an industry of autocrats and generals, prime ministers and company managers, scholars and consultants claim it to be.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Baker, C. Edwin, Human Liberty and Freedom of Speech (Oxford: Oxford University Press, 1989), 6.Google Scholar
Milton, John, Areopagitica (1644)
Haworth, Alan, Free Speech (London: Routledge, 1998)CrossRefGoogle Scholar
Williams, Bernard, Truth and Truthfulness: An Essay in Genealogy (Princeton, NJ: Princeton University Press, 2010)Google Scholar
Baker, C. Edwin, “The Media that Citizens Need,” University of Pennsylvania Law Review 147, no. 2 (1998)CrossRefGoogle Scholar
Baker, C. Edwin, Media, Markets, and Democracy (Cambridge: Cambridge University Press, 2002), 125.Google Scholar
Post, Robert C., “Equality and Autonomy in First Amendment Jurisprudence,” Michigan Law Review 95 (1997)CrossRefGoogle Scholar
Fiss, Owen M., Liberalism Divided: Freedom of Speech and the Many Uses of State Power (Boulder, CO: Westview Press, 1996))Google Scholar
Schauer, Frederick, “Who Decides?” in Lichtenberg, Judith, ed., Democracy and the Mass Media: A Collection of Essays (Cambridge: Cambridge University Press, 1990).Google Scholar
Dillon, Michele, Introduction to Sociological Theory: Theorist, Concepts and their Applicability to the Twenty-First Century, second edition (Chichester, West Sussex: Wiley-Blackwell, 2013)Google Scholar
Lyn, Carolyn A. and Atkin, David J., Communication Technology and Social Change: Theory and Implications (Mahwah, NJ: Lawrence Erlbaum Associates, 2007)Google Scholar
Marvin, Carolyn, When Old Technologies Were New (New York: Oxford University Press, 1988)Google Scholar
Downie, Jr. Leonard and Schudson, Michael, “The Reconstruction of American Journalism,” Columbia Journalism Review, October 19, 2009.Google Scholar
Benkler, Yochai, The Wealth of Networks: How Social Production Transforms Markets and Freedom (New Haven, CT: Yale University Press, 2007)Google Scholar
“Secretary Clinton: U.S. is losing the information war,” FREEMEDIAONLINE, May 4, 2011
Zetter, Kim, “U.S. Declassifies Part of Secret Cybersecurity Plan,” Wired, March 2, 2010Google Scholar
Waldron, Jeremy, The Harm in Hate Speech (Cambridge, MA: Harvard University Press, 2012), 232CrossRefGoogle Scholar
Price, Monroe E., “Free Expression and Digital Dreams: The Open and Closed Terrain of Speech,” Critical Inquiry 22 (Autumn 1995)CrossRefGoogle Scholar
Price, Monroe E., Television, the Public Sphere, and National Identity (Oxford: Oxford University Press, 1995)Google Scholar
Gey, Steven G., “Free Will, Religious Liberty, and a Partial Defense of the French Approach to Religious Expression in Public Schools,” 42 HOUS. L. REV (2005–2006)Google Scholar
Erlanger, Steven, “Parliament Moves France Closer to a Ban on Facial Veils,” New York Times, July 13, 2010Google Scholar
Schiller, Herbert, Communication and Cultural Domination (New York: International Arts and Sciences Press, 1976)Google Scholar
Sassen, Saskia, Territory, Authority, Rights: From Medieval to Global Assemblages (Princeton, NJ: Princeton University Press, 2008)CrossRefGoogle Scholar
Ross, Alec, interview by Esfandiari, Golnaz, “U.S. Innovation Adviser: ‘Internet Freedom Is Not A Regime-Change Agenda,’Radio Free Europe/Radio Liberty, July 2011Google Scholar
Remnick, David, “The Culprits,” The New Yorker, April 29, 2013Google Scholar
Fiss, Owen M., “Why the State?Harvard Law Review 100 (1987)CrossRefGoogle Scholar
United Nations General Assembly, Sixteenth session, Agenda item 35, December 11, 1961
Stone, Geoffrey R., Perilous Times: Free Speech in Wartime from the Sedition Act of 1798 to the War on Terrorism (New York: W.W. Norton, 2004)Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×