100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Resumen

Summary - New Media Challenges

Puntuación
3.0
(1)
Vendido
4
Páginas
96
Subido en
24-03-2025
Escrito en
2024/2025

This is a complete English summary for the course New Media Challenges. I passed the course on the first attempt with a solid grade. The summary includes detailed lecture notes and concise summaries of all required articles. It’s well-structured, easy to follow, and covers everything you need to prepare efficiently for the exam. Perfect for students looking for a clear and reliable overview of the material.

Mostrar más Leer menos
Institución
Grado











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Estudio
Grado

Información del documento

Subido en
24 de marzo de 2025
Número de páginas
96
Escrito en
2024/2025
Tipo
Resumen

Temas

Vista previa del contenido

Lecture 1
Introduction, utopian and dystopian views on media infiltration


Between 2013 and 2023 in the UK:
- Increase: Online and social media, stable in recent years.
- Decline: TV and print media.

TV declined but became more popular during COVID. There's a generational split: younger
people prefer online news, while those over 55 favor TV news. Radio and print are less
popular across all generations.

Facebook’s influence on news is declining, while YouTube, Instagram, and TikTok are rising,
especially among 18-24-year-olds.

Concerns are growing about algorithms leading people into "rabbit holes." Younger
generations worry more but still prefer social media over traditional journalistic selection.

Utopian vs. dystopian views:
- Utopian: Media as a force for positive change, knowledge spread, and unity.
- Dystopian: Media as a tool for control and manipulation, threatening freedom and truth.

Industrial revolution: The fourth industrial revolution is underway, driven by AI, big data,
and robotics, following previous revolutions marked by technological advances.

,Lecture 2
Introduction to online privacy

Privacy:

 Involves controlling personal and sensitive information.
 Not only about personal space but also about how others handle your privacy.
 Includes spatial privacy and is considered a social construct.
 Privacy changes over time, from culture to culture, and between individuals.

Privacy defined by time:

 Past: Public announcements about marriage, public bathhouses, nudity was more
common.
 Now: More careful with information about suspects, regulations like GDPR, and less
nudity in public places.

Privacy defined by culture:

 Individual cultures (US, Western Europe): Privacy as a fundamental right,
emphasis on personal autonomy, individual rights, and personal disclosure.
 Collectivist cultures (East Asia, Middle East): Less concern for individual privacy
when it conflicts with group needs, prioritizing group harmony.
 Northern Europe (Scandinavia, UK, Germany, Netherlands): Preference for
personal space, less spontaneous social interaction.
 Southern & Eastern Europe (Spain, Italy, Greece, Balkans): More physical
closeness and casual social interactions, hospitality traditions with unannounced
visits.

Privacy defined by individuals:

Theoretical perspectives:

 Westin (1967) – Political-scientific approach:
o Privacy is a basic need for interpersonal interactions.
o Privacy is a dynamic process where individuals control what to share.
o Privacy is non-monotonic: too little or too much privacy is problematic.
o Four functions of privacy:
 Personal autonomy
 To make independent decisions
 Emotional release
 Freedom from roles and outside expectations
 Self-evaluation
 Freedom to think, process information and make plans
 Protect boundaries
 Ability to limit who has access to what information
o Four states of privacy:
 Solitude
 Complete isolation
 Intimacy
 Small group of people with a strong bond
 Reserve
 The right to decide what to share and what not

,  Anonymity
 The right not to be identified
 Altman (1975) – Psychological approach:
o Privacy for the self (wellbeing and identity regulation)
o Five elements of privacy:
 Dynamic process
 Individuals regulate what they do or don’t want to share
differently, depending on the social context
 Individual vs group levels
 Individuals perceive their own privacy differently from that of
their community
 Desired vs actual level
 Desired level of privacy might be lower/ higher than individuals
have in each context
 Non-monotonic
 There is an optimum level of privacy—too much or too little can
be problematic.
 Bi-directional (inwards and outwards)
 Individuals regulate privacy based on both their actions and the
way others handle privacy.
o Privacy is a social process driven by:
 Unique situations
 Interactions
 Social situations

 Petronio (2002) – Communication approach:
o Focuses on privacy as information ownership and sharing, especially within
families.
o The need to regulate boundaries between what is shared with others.
o Boundaries can be thick or permeable, depending on the situation.
o Shift from physical privacy to information privacy, particularly online.
o Technology can cause negative effects, like privacy risks.

Context collapse: In online spaces, individuals often underestimate their audience, sharing
information with a much wider group than intended. Shown in research by Bernstein, 2013.

, Walther, J. B. (2011). Introduction to privacy online. In Privacy
online
Online communication balances self-expression and privacy. Social media makes this
harder: sharing brings benefits but also risks.

Three common mistakes about online privacy:
1. Thinking online activities are private.
2. The internet is not built for privacy.
3. Assuming privacy expectations mean legal protection.

People treat online chats like private conversations, forgetting that digital content stays,
spreads, and is hard to delete—sometimes with serious effects. Privacy laws are limited, so
learning how online privacy works is important.

Anonymity can help people explore their identity but also creates legal and ethical issues.
Social media adds to the challenge, as users control their image but still expose personal
details. Understanding digital risks is key as technology changes.
$17.91
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
quintyzeggen
3.0
(1)

Reseñas de compradores verificados

Se muestran los comentarios
6 meses hace

3.0

1 reseñas

5
0
4
0
3
1
2
0
1
0
Reseñas confiables sobre Stuvia

Todas las reseñas las realizan usuarios reales de Stuvia después de compras verificadas.

Conoce al vendedor

Seller avatar
quintyzeggen Vrije Universiteit Amsterdam
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
4
Miembro desde
8 meses
Número de seguidores
0
Documentos
4
Última venta
7 meses hace
Samenvattingen

3.0

1 reseñas

5
0
4
0
3
1
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes